Skip to main content
Log in

Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

The information security problems for open multiagent systems using access control schemes based on RSA algorithm are analyzed. It is shown that when using such schemes, a significant part of the agents’ lifetime is spent on authentication processes. In order to increase the efficiency of multiagent systems by reducing the number of agent authentication processes, a method of access differentiation based on Goppa codes is justified and proposed. For the proposed methodology, an assessment of the security level of agents' information is given.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.

REFERENCES

  1. Rybolovlev, D.A., Karasev, S.V., and Poljakov, S.A., Classification of modern security information and event management systems, Vopr. Kiberbezopasnosti, 2018, no. 327, pp. 47–53. https://doi.org/10.21681/2311-3456-2018-3-47-53

  2. QRadar SIEM. http://q1labs.com/Products/QRadarâ-SIEM.aspx. Cited January 25, 2020.

  3. ArcSight ESM Enterprise Security Manager. https://www.microfocus.com/en-us/products/siem-security-information-event-management/overview. Cited January 25, 2020.

  4. MaxPatrol SIEM. https://www.ptsecurity.com/ru-ru/products/mpsiem/?utm_source=yandex&utm_medium= cpc&utm_campaign=max_patrol_poisk&utm_term=siem&yclid=352061133734568534. Cited January 25, 2020.

  5. Kotenko, I.V., Multiagent technologies for analyzing vulnerabilities and detecting intrusions in computer networks, Zashch. Inf., 2004, no. 3, pp. 72–76.

  6. Masloboev, A.V. and Putilov, V.A., Development and implementation of mechanisms for information security management of mobile agents in distributed multiagent information systems, Vestn. Mosk. Gos. Tekh. Univ., no. 4/2, pp. 1015–1032.

  7. Kotenko, I.V. and Ulanov, A.V., Multiagent modeling of protection mechanisms against distributed computer attacks, Inf. Tekhnol., 2009, no. 2, pp. 38–44.

  8. Guan, X., Yang, Yi., and You, J., POM-A mobile agent security model against malicious hosts, Proc. Fourth Int. Conf./Exhibition on High Performance Computing in the Asia-Pacific Region, Beijing, 2000, IEEE, 2000, vol. 2, pp. 1165–1166. https://doi.org/10.1109/HPC.2000.843621

  9. Kannammal, A. and Iyengar, N.Ch.S.N., A model for mobile agent security in e-business applications, Int. J. Business Inf., 2007, vol. 2, no. 2, pp. 185–197.

    Google Scholar 

  10. Sander, T. and Tschudin, C.F., Protecting mobile agents against malicious hosts, Mobile Agents and Security, Vigna, G., Ed., Lecture Notes in Computer Science, vol. 1419, Berlin: Springer, 1998, pp. 44–60. https://doi.org/10.1007/3-540-68671-1_4

    Book  Google Scholar 

  11. Hohl, F., Time limited blackbox security: Protecting mobile agents from malicious hosts, Mobile Agents and Security, Vigna, G., Ed., Lecture Notes in Computer Science, vol. 1419, Berlin: Springer, 1998, pp. 92–113. https://doi.org/10.1007/3-540-68671-1_6

    Book  Google Scholar 

  12. Bezzateev, S.V., Elina, T.N., Popkova, A.A., and Fomicheva, S.G., Metody zashchishchennogo upravleniya informatsionno-obrazovatel’nymi fondami vuzov (Methods of Protected Management of Information-Educational Foundations at Universities), Norilsk: Noril’skii Ind. Inst., 2012.

  13. Masloboev, A.V., Approaches to providing information security in open distributed multiagent virtual business environments, Nauchn.-Tekh. Vestn. S.-Peterb. Gos. Univ. Inf. Tekhnol., Mekh. Opt., 2010, no. 6, pp. 98–103.

  14. Fomicheva, S.G., Approaches to evaluate and improve system performance security of mobile agents, Nauchn. Vestn. Arktiki, 2017, no. 2, pp. 27–32.

  15. Fomicheva, S., Soft quantization of the production’s knowledgebases for multi-agent systems, 2017 20th Conf. of Open Innovations Association (FRUCT), St. Petersburg, 2017, IEEE, 2017, pp. 69–76. https://doi.org/10.23919/fruct.2017.8071294

  16. Wang, D., Zhang, X., Zhang, Z., and Wang, P., Understanding security failures of multi-factor authentication schemes for multi-server environments, Comput. Secur., 2020, vol. 88, p. 101619. https://doi.org/10.1016/j.cose.2019.101619

    Article  Google Scholar 

  17. Bezzateev, S.V., Multilevel access control system based on the Mac Elis scheme, Probl. Inf. Bezopasnosti. Komp’yuternye Sist., 2010, no. 3, pp. 42–44.

  18. Fomicheva, S.G., Information protection in distributed hierarchical systems, Nauchn.-Tekh. Vedomosti SPbGT-U. Inf., Telekommunikatsii, Upr., 2008, no. 2, pp. 91–97.

  19. Bezzateev, S. and Shekhunova, N., Lower bound of covering radius of binary irreducible Goppa codes, Des., Codes Cryptography, 2017, vol. 82, nos. 1–2, pp. 69–76. https://doi.org/10.1007/s10623-015-0173-4

    Article  MathSciNet  Google Scholar 

  20. Poltavtseva, M.A. and Kalinin, M.O., Modeling big data management systems in information security, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 895–902. https://doi.org/10.3103/s014641161908025x

    Article  Google Scholar 

  21. Poltavtseva, M.A., Zegzhda, D.P., and Kalinin, M.O., Big data management system security threat model, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 903–913. https://doi.org/10.3103/s0146411619080261

    Article  Google Scholar 

  22. Kalinin, M., Krundyshev, V., and Zubkov, E., Estimation of applicability of modern neural network methods for preventing cyberthreats to self-organizing network infrastructures of digital economy platforms, SHS Web Conf., 2018, vol. 44, p. 00044. https://doi.org/10.1051/shsconf/20184400044

  23. Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., Analysis of the information security threats in the digital production networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1071–1075. https://doi.org/10.3103/s0146411618080369

    Article  Google Scholar 

Download references

Funding

The paper was prepared with the financial support of the Ministry of Science and Higher Education of the Russian Federation, grant agreement no. FSRF-2023-0003, “Fundamental principles of building of noise-immune systems for space and satellite communications, relative navigation, technical vision and aerospace monitoring”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. V. Bezzateev.

Ethics declarations

The authors of this work declare that they have no conflicts of interest.

Additional information

Publisher’s Note.

Allerton Press remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bezzateev, S.V., Fomicheva, S.G. & Suprun, A.F. Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods. Aut. Control Comp. Sci. 57, 1005–1017 (2023). https://doi.org/10.3103/S0146411623080035

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411623080035

Keywords:

Navigation