doi: 10.17586/2226-1494-2019-19-1-102-108


INFORMATION SECURITY METHODS FOR COMMUNICATION CHANNELS IN MULTIAGENT ROBOTIC SYSTEMS

A. A. Matveeva, Y. V. Kim, I. I. Viksnin


Read the full article  ';
Article in Russian

For citation:
Matveeva A.A., Kim I.V., Viksnin I.I. Information security methods for communication channels in multiagent robotic systems.Scientific and Technical Journal of Information Technologies, Mechanics and Optics , 2019, vol. 19, no. 1, pp. 102–108 (in Russian). doi: 10.17586/2226-1494-2019-19-1-102-108


Abstract

The paper presents the study of multi-agent robotic systems in the context of information security providing. The preference is given to decentralized collective strategy of group management due to secure and consensual agent interaction by common communication channel. For the correct and effective functioning of the robotic group there is a necessity in providing security of information transfer via communication channels. We consider the mechanisms of “hard” and “soft” security in robotic systems. Special consideration is given to pragmatic information integrity maintenance. To avoid violation occurrence in this integrity category the method based on credit theory was developed. The method implies regulation of information volume transferred by agents through determination of fixed amount for information conventional units per time unit (installment plan). In case of data retention by an agent its payment value is reduced subsequently, thus, its indebtedness is increased. After installment plan period completion agent’s level of trust and reputation is calculated for each agent. When a new agent is incorporated into the group the credit is determined, at which the new agent will get not full information from the other group members but information reduced by the established interest rate. At the same time, this agent must transmit data in accordance with predetermined installment plan conditions. After credit period completion the decision is made whether the new agent is accepted or blocked. To assess the effectiveness of the proposed method the interaction in robotic group consisted of ten agents was modelled. Two new agents were introduced into the group, and one of them was a saboteur. The threshold value of indebtedness for the agent's acceptance to the group is the half of established credit size. Series of independent tests were carried out and the saboteur was blocked in the 90.8 % of them.


Keywords: decentralized collective management, multi-agent robotic systems, credit theory, pragmatic integrity, information security

References
1. Komarov I.I., Drannik A.L., Yurieva R.A. Multiagent information security problem’s simulation. V Mire Nauchnykh Otkrytii, 2014, no. 4, pp. 61–70. (in Russian)
2. Ramchurn S.D., Huynh D., Jennings N.R. Trust in multi-agent systems. Knowledge Engineering Review, 2004, vol. 19, no. 1, pp. 1–25. doi: 10.1017/S0269888904000116
3. Shuts V.N. Multiagent motion control vehicles in the road network of the city. Iskusstvennyi Intellekt, 2014, no. 4, pp. 123–128. (in Russian)
4. Landsberg S.E., Khovanskikh A.A. Approach to building multiagent systems support decision based on multilevel hierarchical layered architecture with partially decentralized control. Bulletin of Voronezh State Technical University, 2014, vol. 10, no. 5, pp. 53–55. (in Russian)
5. Kalyaev I.A., Gaiduk A.R., Kapustyan S.G. Models and Algorithms of the Collective Control of Robots Group. Moscow, Fizmatlit Publ., 2009, 280 p. (in Russian)
6. Zikratov I.A., Zikratova T.V., Lebedev I.S., Gurtov A.V. Trust and reputation model design for objects of multi-agent robotics systems with decentralized control. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2014, no. 3, pp. 30–38. (in Russian)
7. Beshta A.A., Kirpo M.A. Construction of object trust model in the automated information system for preventing destructive influence on the system. Bulletin of the Tomsk Polytechnic University, 2013, vol. 322, no. 5, pp. 104–108. (in Russian)
8. Jovanov I., Pajic M. Sporadic data integrity for secure state estimation. Proc. IEEE 56th Annual Conference on Decision and Control. Melbourne, Australia, 2017, pp. 163–169. doi: 10.1109/cdc.2017.8263660
9. Santra P., Roy A., Majumder K. A Comparative analysis of cloud forensic techniques in IaaS. Advances in Intelligent Systems and Computing, 2017, vol. 554, pp. 207–215. doi: 10.1007/978-981-10-3773-3_20
10. Lavrushin O.I. The theory of the credit basis and its use in modern economy. Journal of Economic Regulation, 2017, vol. 8, no. 2, pp. 6–15. (in Russian)
11. Evtuh A.T. Credit theory: socio-economic aspect. Finance and Credit, 2005, no. 25, pp. 21–27. (in Russian)
12. Gurnakova L.N. Essence and theoretical foundations of the credit market concept. Problems of Modern Economics, 2011, no. 2, pp. 83–85. (in Russian)
13. Kosterina T.M., Panova T.A. Methodological bases of the credit limit analysis. Finance and Credit, 2015, vol. 21, no. 32, pp. 26–38. (in Russian)
14. Gataullin R.I., Nazyrov M.V., Viksnin I.I. Algorithms security analysis based on confidence and reputation ratios. Proc. V All-Russian Congress of Young Scientists. St. Petersburg, 2016, pp. 109–112. (in Russian)


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика