Systematic Mapping Study of Security in Multi-Embedded-Agent Systems

<bold>Context:</bold> In this paper, we study distributed and decentralized systems in which each part is modeled as an agent in a multi-agent system. Those systems provide more scalable and easier ways to control complex, distributed and interconnected systems of embedded components. We...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Arthur Baudet, Oum-El-Kheir Aktouf, Annabelle Mercier, Philippe Elbaz-Vincent
Formato: article
Lenguaje:EN
Publicado: IEEE 2021
Materias:
Acceso en línea:https://doaj.org/article/3bda007c7b2546c68aa2d2bc98f41135
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:3bda007c7b2546c68aa2d2bc98f41135
record_format dspace
spelling oai:doaj.org-article:3bda007c7b2546c68aa2d2bc98f411352021-11-25T00:00:39ZSystematic Mapping Study of Security in Multi-Embedded-Agent Systems2169-353610.1109/ACCESS.2021.3128287https://doaj.org/article/3bda007c7b2546c68aa2d2bc98f411352021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9615051/https://doaj.org/toc/2169-3536<bold>Context:</bold> In this paper, we study distributed and decentralized systems in which each part is modeled as an agent in a multi-agent system. Those systems provide more scalable and easier ways to control complex, distributed and interconnected systems of embedded components. We are particularly interested in methods to secure these systems. <bold>Objectives:</bold> This study aims to identify the main security properties studied, the parts of a multi-agent architecture that are considered most often in security studies and the technical solutions used to secure those systems. <bold>Methods:</bold> We conducted a systematic mapping study on research works addressing the security of multi-agent systems with embedded agents. We identified which security features were addressed, and their roles in global security architecture. <bold>Results:</bold> We identified 70 papers published in journals and conferences. We classified the extracted data reporting a tendency to focus on securing the availability of systems under attack by means of trust schemes, sometimes supported by cryptographic primitives. <bold>Conclusion:</bold> The use of cryptography appears to be limited in decentralized systems. However, solutions should be provided to overcome those limits as other solutions such as trust schemes do not protect the system from the same type of attacks.Arthur BaudetOum-El-Kheir AktoufAnnabelle MercierPhilippe Elbaz-VincentIEEEarticleDecentralized securityembedded systemmulti-agent systemsecurity architecturesystematic mapping studyElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 154902-154913 (2021)
institution DOAJ
collection DOAJ
language EN
topic Decentralized security
embedded system
multi-agent system
security architecture
systematic mapping study
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
spellingShingle Decentralized security
embedded system
multi-agent system
security architecture
systematic mapping study
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
Arthur Baudet
Oum-El-Kheir Aktouf
Annabelle Mercier
Philippe Elbaz-Vincent
Systematic Mapping Study of Security in Multi-Embedded-Agent Systems
description <bold>Context:</bold> In this paper, we study distributed and decentralized systems in which each part is modeled as an agent in a multi-agent system. Those systems provide more scalable and easier ways to control complex, distributed and interconnected systems of embedded components. We are particularly interested in methods to secure these systems. <bold>Objectives:</bold> This study aims to identify the main security properties studied, the parts of a multi-agent architecture that are considered most often in security studies and the technical solutions used to secure those systems. <bold>Methods:</bold> We conducted a systematic mapping study on research works addressing the security of multi-agent systems with embedded agents. We identified which security features were addressed, and their roles in global security architecture. <bold>Results:</bold> We identified 70 papers published in journals and conferences. We classified the extracted data reporting a tendency to focus on securing the availability of systems under attack by means of trust schemes, sometimes supported by cryptographic primitives. <bold>Conclusion:</bold> The use of cryptography appears to be limited in decentralized systems. However, solutions should be provided to overcome those limits as other solutions such as trust schemes do not protect the system from the same type of attacks.
format article
author Arthur Baudet
Oum-El-Kheir Aktouf
Annabelle Mercier
Philippe Elbaz-Vincent
author_facet Arthur Baudet
Oum-El-Kheir Aktouf
Annabelle Mercier
Philippe Elbaz-Vincent
author_sort Arthur Baudet
title Systematic Mapping Study of Security in Multi-Embedded-Agent Systems
title_short Systematic Mapping Study of Security in Multi-Embedded-Agent Systems
title_full Systematic Mapping Study of Security in Multi-Embedded-Agent Systems
title_fullStr Systematic Mapping Study of Security in Multi-Embedded-Agent Systems
title_full_unstemmed Systematic Mapping Study of Security in Multi-Embedded-Agent Systems
title_sort systematic mapping study of security in multi-embedded-agent systems
publisher IEEE
publishDate 2021
url https://doaj.org/article/3bda007c7b2546c68aa2d2bc98f41135
work_keys_str_mv AT arthurbaudet systematicmappingstudyofsecurityinmultiembeddedagentsystems
AT oumelkheiraktouf systematicmappingstudyofsecurityinmultiembeddedagentsystems
AT annabellemercier systematicmappingstudyofsecurityinmultiembeddedagentsystems
AT philippeelbazvincent systematicmappingstudyofsecurityinmultiembeddedagentsystems
_version_ 1718414688907165696