Article in Russian
For citation: Zikratov I.A., Viksnin I.I., Zikratova T.V., Shlykov A.A., Medvedkov D.I. Security model of mobile multi-agent robotic systems with collective management.
Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2017, vol. 17, no. 3, pp. 439–449 (in Russian). doi: 10.17586/2226-1494-2017-17-3-439-449
Abstract
The paper deals with creation problem of protection mechanisms for multi-agent robotic systems from attacks by introduced robots-saboteurs. We considered a class of so-called "soft" attacks that involve intercepting of communications, formation and transmission of misinformation to robots group, as well as performing other actions that do not have identified signs of robots-saboteurs invasion. We proposed theoretical security model for multi-agent robotic systems, based on zone security model and model of police stations for distributed computing systems. The basic idea of the proposed subject-object model of access control, is that a logically self-contained entity, the police station, is introduced in information system, in addition to the entities “subject and object”. In accordance with the concept of security monitoring of appeals, it performs the functions of access legitimacy checking and/or integrity of the transactions spatially distributed within a region of subjects and objects. Thus, initially homogeneous multi-agent system is proposed to be designed as heterogeneous, where there are not only agents-executors, but also agents, intended solely for the decision of security problems: identification and authentication, access control, generation, and key distribution and location analysis of agents’ position. For the latter problem solution, the region is divided into several zones with introducing of zonal and interzonal security procedures. The performance of the model is illustrated by an example of its usage in the protection mechanism creation for classical iterative task of robot forces distribution for several purposes. We show the order of agents’ interaction with the police stations of their zone, as well as implementation of interzonal security policy.
Keywords: information security, robots group, multi-agent robotic systems, attack, vulnerability, information security model, distributed cyber-physical systems
References
1. Neeran K.M., Tripathi A.R. Security in the Ajanta MobileAgent system. Technical Report. University of Minnesota, 1999, 28 p.
2. Higgins F., Tomlinson A., Martin K.M. Threats to the swarm: Security considerations for swarm robotics. International Journal on Advances in Security, 2009, vol. 2, no. 2&3, pp. 288–297.
3. Zikratov I.A., Kozlova E.V., Zikratova T.V. Vulnerability analysis of robotic systems with swarm intelligence. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2013, no. 5, pp. 149–154. (In Russian)
4. Isakeev D.G., Zikratova T.V., Lebedev I.S., Shabanov D.P. The estimation of secure condition of multi-agent robotic system in case of information influence on the single component. Herald of Computer and Information Technologies, 2015, no. 1, pp. 43–49. (In Russian)
5. Harrison M.A., Ruzzo W.L., Ullman J.D. Protection in operating systems.
Communication of the ACM, 1976, vol. 19, no. 8, pp. 461–471. doi:
10.1145/360303.360333
6. Bell D.E., LaPadula L.J. Secure Computer Systems: Unified Exposition and Multics Interpretation. Bedford, Mass., MITRE Corp., 1976, 134 p.
7. Garcia-Morchon O., Kuptsov D., Gurtov A., Wehrle K. Cooperative security in distributed networks.
Computer Communications, 2013, vol. 36, no. 12, pp. 1284–1297. doi:
10.1016/j.comcom.2013.04.007
8. Gorodetski V., Kotenko I., Karsaev O. Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning. Computer Systems Science and Engineering, 2003, no. 4, pp. 191–200.
9. Gaidamakin N.A. Zone access control model in distributed computer systems. Nauchno-Tekhnicheskaya Informatsiya. Seriya 2: Informatsionnye Protsessy i Sistemy, 2002, no. 12, pp. 15–22. (In Russian)
10. Xudong G., Yiling Ya., Yinyuan Y. POM-a mobile agent security model against malicious hosts. Proc. 4th Int. Conf. on High Performance Computing in the Asia-Pacific Region, 2000, vol. 2, pp. 1165–1166.
11. Schillo M., Funk P., Rovatsos M. Using trust for detecting deceitful agents in artificial societies.
Applied Artificial Intelligence, 2000, vol. 14, no. 8, pp. 825–848. doi:
10.1080/08839510050127579
12. Golbeck J., Parsia B., Hendler J. Trust networks on the semantic web. Lecture Notes in Artificial Intelligence, 2003, vol. 2782, pp. 238–249.
13. Ramchurn S.D., Huynh D., Jennings N.R. Trust in multi-agent systems.
Knowledge Engineering Review, 2004, vol. 19, no. 1, pp. 1–25. doi:
10.1017/S0269888904000116
14. Carter J., Bitting E., Ghorbani A.A. Reputation formalization for an information-sharing multi-agent system. Computational Intelligence, 2002, vol. 18, no. 2,
pp. 515–534.
15. Kalyaev I.A., Gaiduk A.R., Kapustyan S.G. Models and Algorithms of the Collective Control of Robots Group. Moscow, FIZMATLIT Publ., 2009, 280 p. (In Russian)
16. Zikratov I.A., Zikratova T.V., Lebedev I.S. Trust model for information security of multi-agent robotic systems with a decentralized management. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2014, no. 2, pp. 47–52. (In Russian)
17. Koval E.N., Lebedev I.N. General model of robotic systems information security. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2013, no. 4, pp. 153–154. (In Russian)
18. Sander T., Tschudin Ch.F. Protecting mobile agents against malicious hosts / In: G. Vigna (ed.) Mobile Agents and Security. LNCS, Springer, 1998, pp. 44–60.
19. Beshta A.A., Kirpo M.A. Construction of object trust model in the automated information system for preventing destructive influence on the system. Bulletin of the Tomsk Polytechnic University, 2013, vol. 322, no. 5, pp. 104–108. (In Russian)
20. Viksnin I.I., Iureva R.A., Komarov I.I., Drannik A.L. Assessment of stability of algorithms based on trust and reputation model.
Proc. 18th Conference FRUCT-ISPIT. St. Petersburg, Russia, 2016, pp. 364–369. doi:
10.1109/FRUCT-ISPIT.2016.7561551