Abstract
Multi-Agent and distributed systems are widely used in military defense systems, logistics, navigation and motion control systems of unmanned aerial vehicles and other systems. Such systems are complex and include many different types of agents, the number of which can vary in real time. Elements of such a system require proper management of access roles and security keys during the process of sharing sensitive information. In this paper, we tested the applicability of decentralized attribute-based access control for communication in multi-agent systems. By implementing one of the algorithms, the operation speed and practical benefits of attribute-based encryption were evaluated, and also the encryption rate on the synchronization frequency of the multi-agent system was estimated.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Lewis, F.L., Zhang, H., Hengster-Movric, K., Das, A.: Cooperative Control of Multi-agent Systems. Springer, London (2014)
Nyrkov, A., Belousov, A., Sokolov, S.: Algorithmic support of optimization of multicast data transmission in networks with dynamic routing. Mod. Appl. Sci. 9, 162 (2015)
Zhilenkov, A., Nyrkov, A., Chernyi, S., Sokolov, S.: Simulation of in-sensor processes in the sensor – object system type when scanning the elements of underwater communication lines with a probe beam. Int. Rev. Model. Simul. (IREMOS) 10(15), 363–370 (2017)
Nyrkov, A., Sokolov, S., Zhilenkov, A., Chernyi, S.: Complex modeling of power fluctuations stabilization digital control system for parallel operation of gas-diesel generators. In: 2016 IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (EIConRusNW), St. Petersburg, pp. 636–640 (2016)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) Advances in Cryptology – EUROCRYPT 2005. EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494. Springer, Heidelberg (2005)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM CCS (2006)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy (SP 2007), Berkeley, CA, pp. 321–334 (2007)
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), pp. 195–203. ACM, New York (2007)
Rao, Y.S., Dutta, R.: Decentralized ciphertext-policy attribute-based encryption scheme with fast decryption. In: De Decker, B., Dittmann, J., Kraetzer, C., Vielhauer, C. (eds.) Communications and Multimedia Security, CMS 2013. Lecture Notes in Computer Science, vol. 8099. Springer, Heidelberg (2013)
Karp, A.H., Haury, H., Davis, M.H.: From ABAC to ZBAC: the evolution of access control models. Technical report HPL-2009-30, HP Labs (2009)
Ferraiolo, D., Kuhn, D.R.: Role-based access control. In: NIST-NSA National (USA) Computer Security Conference, pp. 554–563 (1992)
Rissanen, E., Brossard, D., Slabbert, A.: Distributed access control management – a XACML-based approach. In: Baresi, L., Chi, C.H., Suzuki, J. (eds.) Service-Oriented Computing. ServiceWave 2009, ICSOC 2009. Lecture Notes in Computer Science, vol. 5900. Springer, Heidelberg (2009)
Chen, Y., Lu, J., Yu, X., Hill, D.J.: Multi-agent systems with dynamical topologies: consensus and applications. IEEE Circuits Syst. Mag. 13(3), 21–34 (2013)
Olfati-Saber, R., Murray, R.: Consensus problems in networks of agents with switching topology and time-delays. IEEE Trans. Autom. Control 49, 1520–1533 (2004)
Olfati-Saber, R., Fax, J., Murray, R.: Consensus and cooperation in networked multi-agent systems. Proc. IEEE 95, 215–233 (2007)
JAVA agent development framework homepage. http://jade.tilab.com. Accessed 15 Jan 2019
Charm: a framework for rapidly prototyping cryptosystems. https://github.com/JHUISI/charm. Accessed 15 Jan 2019
CodeXL. https://github.com/GPUOpen-Tools/CodeXL. Accessed 15 Jan 2019
Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) Advances in Cryptology – EUROCRYPT 2011. EUROCRYPT 2011. Lecture Notes in Computer Science, vol. 6632. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Nyrkov, A., Romanova, Y., Ianiushkin, K., Li, I. (2020). Data Processing Model in Hierarchical Multi-agent System Based on Decentralized Attribute-Based Encryption. In: Murgul, V., Pasetti, M. (eds) International Scientific Conference Energy Management of Municipal Facilities and Sustainable Energy Technologies EMMFT 2018. EMMFT-2018 2018. Advances in Intelligent Systems and Computing, vol 982. Springer, Cham. https://doi.org/10.1007/978-3-030-19756-8_41
Download citation
DOI: https://doi.org/10.1007/978-3-030-19756-8_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19755-1
Online ISBN: 978-3-030-19756-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)