Biologically-Inspired Concepts for Autonomic Self-protection in Multiagent Systems

  • Roy Sterritt
  • Mike Hinchey
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4324)


Biologically-inspired autonomous and autonomic systems (AAS) are essentially concerned with creating self-directed and self-managing systems based on metaphors from nature and the human body, such as the autonomic nervous system. Agent technologies have been identified as a key enabler for engineering autonomy and autonomicity in systems, both in terms of retrofitting into legacy systems and in designing new systems. Handing over responsibility to systems themselves raises concerns for humans with regard to safety and security. This paper reports on the continued investigation into a strand of research on how to engineer self-protection mechanisms into systems to assist in encouraging confidence regarding security when utilizing autonomy and autonomicity. This includes utilizing the apoptosis and quiescence metaphors to potentially provide a self-destruct or self-sleep signal between autonomic agents when needed, and an ALice signal to facilitate self-identification and self-certification between anonymous autonomous agents and systems.


Multiagent System Mobile Agent Autonomic Agent Solar Sail Autonomic Computing 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Jennings, N.R., Wooldridge, M.: Agent-oriented Software Engineering. In: Bradshaw, J. (ed.) Handbook of Agent Technology. AAAI/MIT Press (2000)Google Scholar
  2. 2.
    Huhns, M.N., Holderfield, V.T., Gutierrez, R.L.Z.: Robust software via agent-based redundancy. In: Proc. Second International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2003, Melbourne, Victoria, Australia, July 14-18, pp. 1018–1019 (2003)Google Scholar
  3. 3.
    Kaiser, G., Parekh, J., Gross, P., Valetto, G.: Kinesthetics eXtreme: An External Infrastructure for Monitoring Distributed Legacy Systems. In: Proc. Autonomic Computing Workshop – IEEE Fifth Annual International Active Middleware Workshop, Seattle, WA, USA (June 2003)Google Scholar
  4. 4.
    Lupu, E., et al.: EPSRC AMUSE: Autonomic Management of Ubiquitous Systems for e-Health (2003)Google Scholar
  5. 5.
    Sterritt, R., Bustard, D.W.: Autonomic Computing: a Means of Achieving Dependability? In: Proceedings of IEEE International Conference on the Engineering of Computer Based Systems (ECBS 2003), Huntsville, AL, USA, April 7-11, pp. 247–251 (2003)Google Scholar
  6. 6.
    Sterritt, R.: Pulse Monitoring: Extending the Health-check for the Autonomic GRID. In: Proceedings of IEEE Workshop on Autonomic Computing Principles and Architectures (AUCOPA 2003) at INDIN 2003, Banff, AB, Canada, August 22-23, pp. 433–440 (2003)Google Scholar
  7. 7.
    Sterritt, R.: Towards Autonomic Computing: Effective Event Management. In: Proceedings of 27th Annual IEEE/NASA Software Engineering Workshop (SEW), Maryland, USA, December 3-5, pp. 40–47. IEEE Computer Society Press, Los Alamitos (2002)Google Scholar
  8. 8.
    Sterritt, R., Bantz, D.F.: PAC-MEN: Personal Autonomic Computing Monitoring Environments. In: Proceedings of IEEE DEXA 2004 Workshops - 2nd International Workshop on Self-Adaptive and Autonomic Computing Systems (SAACS 2004), Zaragoza, Spain, August 30-September 3 (2003)Google Scholar
  9. 9.
    Kephart, J.O., Chess, D.M.: The vision of autonomic computing. Computer 36(1), 41–52 (2003)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Sterritt, R., Bustard, D.W.: Towards an Autonomic Computing Environment. In: Proceedings of IEEE DEXA 2003 Workshops - 1st International Workshop on Autonomic Computing Systems, Prague, Czech Republic, September 1-5, pp. 694–698 (2003)Google Scholar
  11. 11.
    Newell, J.: Dying to live: why our cells self-destruct, Focus (December 1994)Google Scholar
  12. 12.
    Lockshin, R., Zakeri, Z.: Programmed cell death and apoptosis: origins of the theory. Nature Reviews Molecular Cell Biology 2, 542–550 (2001)CrossRefGoogle Scholar
  13. 13.
    Ishizaki, Y., Cheng, L., Mudge, A.W., Raff, M.C.: Programmed cell death by default in embryonic cells, fibroblasts, and cancer cells. Mol. Biol. Cell 6(11), 1443–1458 (1995)CrossRefGoogle Scholar
  14. 14.
    Klefstrom, J., Verschuren, E.W., Evan, G.I.: c-Myc Augments the Apoptotic Activity of Cytosolic Death Receptor Signaling Proteins by Engaging the Mitochondrial Apoptotic Pathway. J. Biol. Chem. 277, 43224–43232 (2002)CrossRefGoogle Scholar
  15. 15.
    Hartline, J.D.: Mobile Agents: A Survey of Fault Tolerance and Security. University of Washington (1998)Google Scholar
  16. 16.
    Greenberg, M.S., Byington, J.C., Holding, T., Harper, D.G.: Mobile Agents and Security. IEEE Communications (July 1998)Google Scholar
  17. 17.
    Sterritt, R., Hinchey, M.G.: Apoptosis and Self-Destruct: A Contribution to Autonomic Agents? In: Hinchey, M.G., Rash, J.L., Truszkowski, W.F., Rouff, C.A. (eds.) FAABS 2004. LNCS (LNAI), vol. 3228, pp. 262–270. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  18. 18.
    Sterritt, R., Hinchey, M.G.: Engineering Ultimate Self-Protection in Autonomic Agents for Space Exploration Missions. In: Proceedings of IEEE Workshop on the Engineering of Autonomic Systems (EASe 2005) at 12th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2005), Greenbelt, MD, USA, April 3-8, pp. 506–511. IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  19. 19.
    Sterritt, R., Hinchey, M.G.: Biological Inspired Concepts for Self-Managing Ubiquitous and Pervasive Computing Environments. In: Proceedings WRAC-II, 2nd NASA/IEEE Workshop on Radical Agent Concepts, Greenbelt, MD, September 2005. LNCS. Springer, Heidelberg (2006)Google Scholar
  20. 20.
    Sterritt, R., Gunning, D., Meban, A., Henning, P.: Exploring Autonomic Options in a Unified Fault Management Architecture through Reflex Reactions via Pulse Monitoring. In: Proceedings of IEEE Workshop on the Engineering of Autonomic Systems (EASe 2004) at the 11th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS 2004), Brno, Czech Republic, May 24–27, pp. 449–455 (2004)Google Scholar
  21. 21.
    Love, J.: Science Explained (1999)Google Scholar
  22. 22.
    Hinchey, M.G., Rash, J.L., Truszkowski, W.F., Rouff, C.A., Sterritt, R.: Challenges of Developing New Classes of NASA Self-Managing Missions. In: Proceedings of Workshop on Reliability and Autonomic Management in Parallel and Distributed Systems (RAMPDS 2005) at ICPADS 2005, Fukuoka, Japan, July 20-22, pp. 463–467 (2005)Google Scholar
  23. 23.
    Hinchey, M.G., Rash, J.L., Truszkowski, W.F., Rouff, C.A., Sterritt, R.: Autonomous and Autonomic Swarms. In: Proceedings of Autonomic & Autonomous Space Exploration Systems (A&A-SES-1) at 2005 International Conference on Software Engineering Research and Practice (SERP 2005), Las Vegas, NV, June 27-30, pp. 36–42. CREA Press (2005)Google Scholar
  24. 24.
    McCann, J., Huebscher, M.: Evaluation issues in Autonomic Computing. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds.) GCC 2004. LNCS, vol. 3252, pp. 597–608. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  25. 25.
    Bigus, J.P., et al.: ABLE: a toolkit for building multiagent autonomic systems. IBM Systems J. 41(3), 350–371 (2002)CrossRefGoogle Scholar
  26. 26.
    Rouff, C.A., Hinchey, M.G., Truszkowski, W.F., Rash, J.L.: Experiences Applying Formal Approaches in the Development of Swarm-Based Space Exploration Missions. International Journal of Software Tools for Technology Transfer (2006) (to appear)Google Scholar
  27. 27.
    Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proc. IEEE Symposium on Research in Security and Privacy 1994, May 16-18, pp. 202–212 (1994)Google Scholar
  28. 28.
    D’haeseleer, P., Forrest, S., Helman, P.: An immunological approach to change detection: algorithms, analysis and implications. In: Proc. IEEE Symposium on Security and Privacy, May 6-8, pp. 110–119 (1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Roy Sterritt
    • 1
  • Mike Hinchey
    • 2
  1. 1.School of Computing and MathematicsUniversity of UlsterNorthern Ireland
  2. 2.Lero-The Irish Software Engineering Research CentreUniversity of LimerickIreland

Personalised recommendations