A Secure Multiagent Intelligent Conceptual Framework for Modeling Enterprise Resource Planning

  • Kaveh Pashaei
  • Farzad Peyravi
  • Fattaneh Taghyareh
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 6)

Facing the challenge of responding more rapidly to changing markets, manufacturing industries have been motivated to explore many exciting innovations in their business practices and procedures such as MRP, ERP, EIS, CIM, and the like [1–3]. However, economic globalization is forcing companies to look further for world- class manufacturing levels. The limitation of resources, such as technology, people, or money, makes enterprises focus on their own competence as well as try to get involved with others. The core idea here is that enterprises should share their resources and abilities without owning them, in order to exploit the market opportunity that is beyond the ability of a single enterprise [4–6].

The purpose of this chapter is to investigate the use of software agents to achieve the secure system integration of ERP software packages. A secure multiagentbased intelligent ERP (SMAIERP) architecture is proposed to take advantage of the existing information systems and security techniques to simulate the secure ERP system using capabilities and characteristics of the software agent-based computer systems. The rest of the chapter is organized as follows. In the next section, we discuss the MetaMorph I as a model that describes two architectures of the multiagent system, namely, the brokering and recruiting mechanisms for selecting our model. Next architecture of SMAIERP system is provided to highlight its properties, various types, and applications in order to establish its viability for developing an ERP type system. In Sect. 30.4, security issues are discussed. Section 30.5 shows how agents communicate and synchronize with each other. Experimental environment and simulation results in a secure and nonsecure manner is described in Sect. 30.6. Finally, the implications of the SMAIERP system and future research directions are provided.


Multiagent System Secure Manner Planning Agent Virtual Enterprise Data Request 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    E. Teicholz and J. Orr, Computer Integrated Manufacturing Handbook. New York: McGraw-Hill, 1987.Google Scholar
  2. 2.
    AMICE and CIMOSA, Open System Architecture for CIM. New York: Springer Verlag, 1993.Google Scholar
  3. 3.
    P. Bernus and L. Nemes, Modeling and Methodologies for Enterprise Integration: IFIP. New York: Chapman and Hall, 1996.Google Scholar
  4. 4.
    W.H. Davidow and M.S. Malone, The Virtual Corporation: Structuring and Revitalizing the Corporation for the 21st Century. New York: Harper Collins, 1992.Google Scholar
  5. 5.
    J. Browne, “The extended enterprise—Manufacturing and the value chain,” presented at Proceedings of BASYS95, 1995.Google Scholar
  6. 6.
    L.M. Camarinha-Matos and H. Afsarnianesh, Handbook of Life Cycle Engineering: Concepts, Tools and Techniques, Chapter Virtual Enterprise: Life Cycle Supporting Tools and Technologies. New York: Chapman and Hall, 1997.Google Scholar
  7. 7.
    R. Kalakota and M. Robinson, e-Business 2.0: Roadmap for Success. Boston: Addison-Wesley, 2000.Google Scholar
  8. 8.
    K. Kumar and J.V. Hillegersberg, “ERP experiences and evolution,” Communication of the ACM, 43(4), pp. 22–26, 2000.CrossRefGoogle Scholar
  9. 9.
    C. Dahlen and J. Elfsson, “An analysis of the current and future ERP market with focus on Sweden,” Stockholm: available at http://whitepapers.techrepublic.com.com/whitepaper.aspx?&docid=3805&promo=100511, 1999.
  10. 10.
    B. Robinson and F. Wilson, “Planning for the market? Enterprise resource planning systems and the contradictions of capital,” Database for Advances in Information Systems, 32(4), pp. 21–33, 2001.Google Scholar
  11. 11.
    W. Shen and D.H. Norrie, “An agent-based approach for manufacturing enterprise integration and supply chain management,” presented at Globalization of Manufacturing in the Digital Communications Era of the 21st Century: Innovation, Agility, and the Virtual Enterprise, 1998.Google Scholar
  12. 12.
    A.D. Baker, H.V.D. Parunak, and K. Erol, “Manufacturing over the Internet and into your living room: Perspectives from the AARIA project,” ECECS Department, Technical Report 1997.Google Scholar
  13. 13.
    K. Turoski, “Agent-based e-commerce in case of mass customization,” International Journal of Production Economics, 75(1–2), pp. 69–81, 2002.CrossRefGoogle Scholar
  14. 14.
    T. Li and Z. Fong, “A system architecture for agent based supply chain management platform,” In Proceedings of the 2003 Canadian Conference on Electrical And Computer Engineering (CCECE): Toward a Caring and Humane Technology, 2003.Google Scholar
  15. 15.
    D.Z. Zhang, A.I. Anosike, M.K. Lim, and O.M. Akanle, “An agent-based approach for e-manufacturing and supply chain integration,” Computers & Industrial Engineering, 51, pp. 343–360, October 2006.CrossRefGoogle Scholar
  16. 16.
    H.C. Wong and K. Sycara, “Adding security and trust to multi-agent systems,” presented at Autonomous Agents ’99 Workshop on Deception, Fraud and Trust in Agent Societies, 1999.Google Scholar
  17. 17.
    M. Soshi and M. Maekawa, “The Saga security system: A security architecture for open distributed systems,” presented at 6th IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, 1997.Google Scholar
  18. 18.
    C. Thirunavukkarasu, T. Finin, and J. Mayfield, “Secret agents a security architecture for the KQML Agent communication language,” presented at CIKM ’95 Intelligent Information Agents Workshop, Baltimore, December 1995.Google Scholar
  19. 19.
    A. Corradi, R. Montanari, and C. Stefanelli, “Security issues in mobile agent technology. Distributed Computing Systems,” presented at 7th IEEE Workshop on Future Trends of Distributed Computing Systems, 1999.Google Scholar
  20. 20.
    L. Korba, “Towards secure agent distribution and communication,” presented at 32nd Hawaii International Conference on System Sciences, 1999.Google Scholar
  21. 21.
    F. Maturana and D. Norrie, “Multi-agent mediator architecture for distributed manufacturing,” Journal of Intelligent Manufacturing, 7, pp. 257–270, 1996.CrossRefGoogle Scholar
  22. 22.
    K. Decker, “Environment centered analysis and design of coordination mechanisms,” Ph.D. Thesis. Amherst: Massachusetts in Department of Computer Science, 1995.Google Scholar
  23. 23.
    S. Huin, L. Luong, and K. Abhary, “Managing enterprise resources planning systems deployment in SMEs,” presented at Proceedings of the 3rd International Conference on Project Management Society of Project Management, and College of Engineering, Japan, 2002.Google Scholar
  24. 24.
    W. Stalling, Cryptography and Network Security Principles and Practice. Upper Saddle River, NJ: Prentice-Hall, 2003.Google Scholar
  25. 25.
    A. Lansky, “Localized event-based reasoning for multi-agent domains,” presented at SRI International, Stanford University, 1998.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Kaveh Pashaei
    • 1
  • Farzad Peyravi
    • 1
  • Fattaneh Taghyareh
    • 1
  1. 1.Electrical and Computer Engineering Faculty, School of EngineeringUniversity of TehranTehranIran

Personalised recommendations