Abstract
The information security problems for open multiagent systems using access control schemes based on RSA algorithm are analyzed. It is shown that when using such schemes, a significant part of the agents’ lifetime is spent on authentication processes. In order to increase the efficiency of multiagent systems by reducing the number of agent authentication processes, a method of access differentiation based on Goppa codes is justified and proposed. For the proposed methodology, an assessment of the security level of agents' information is given.
REFERENCES
Rybolovlev, D.A., Karasev, S.V., and Poljakov, S.A., Classification of modern security information and event management systems, Vopr. Kiberbezopasnosti, 2018, no. 327, pp. 47–53. https://doi.org/10.21681/2311-3456-2018-3-47-53
QRadar SIEM. http://q1labs.com/Products/QRadarâ-SIEM.aspx. Cited January 25, 2020.
ArcSight ESM Enterprise Security Manager. https://www.microfocus.com/en-us/products/siem-security-information-event-management/overview. Cited January 25, 2020.
MaxPatrol SIEM. https://www.ptsecurity.com/ru-ru/products/mpsiem/?utm_source=yandex&utm_medium= cpc&utm_campaign=max_patrol_poisk&utm_term=siem&yclid=352061133734568534. Cited January 25, 2020.
Kotenko, I.V., Multiagent technologies for analyzing vulnerabilities and detecting intrusions in computer networks, Zashch. Inf., 2004, no. 3, pp. 72–76.
Masloboev, A.V. and Putilov, V.A., Development and implementation of mechanisms for information security management of mobile agents in distributed multiagent information systems, Vestn. Mosk. Gos. Tekh. Univ., no. 4/2, pp. 1015–1032.
Kotenko, I.V. and Ulanov, A.V., Multiagent modeling of protection mechanisms against distributed computer attacks, Inf. Tekhnol., 2009, no. 2, pp. 38–44.
Guan, X., Yang, Yi., and You, J., POM-A mobile agent security model against malicious hosts, Proc. Fourth Int. Conf./Exhibition on High Performance Computing in the Asia-Pacific Region, Beijing, 2000, IEEE, 2000, vol. 2, pp. 1165–1166. https://doi.org/10.1109/HPC.2000.843621
Kannammal, A. and Iyengar, N.Ch.S.N., A model for mobile agent security in e-business applications, Int. J. Business Inf., 2007, vol. 2, no. 2, pp. 185–197.
Sander, T. and Tschudin, C.F., Protecting mobile agents against malicious hosts, Mobile Agents and Security, Vigna, G., Ed., Lecture Notes in Computer Science, vol. 1419, Berlin: Springer, 1998, pp. 44–60. https://doi.org/10.1007/3-540-68671-1_4
Hohl, F., Time limited blackbox security: Protecting mobile agents from malicious hosts, Mobile Agents and Security, Vigna, G., Ed., Lecture Notes in Computer Science, vol. 1419, Berlin: Springer, 1998, pp. 92–113. https://doi.org/10.1007/3-540-68671-1_6
Bezzateev, S.V., Elina, T.N., Popkova, A.A., and Fomicheva, S.G., Metody zashchishchennogo upravleniya informatsionno-obrazovatel’nymi fondami vuzov (Methods of Protected Management of Information-Educational Foundations at Universities), Norilsk: Noril’skii Ind. Inst., 2012.
Masloboev, A.V., Approaches to providing information security in open distributed multiagent virtual business environments, Nauchn.-Tekh. Vestn. S.-Peterb. Gos. Univ. Inf. Tekhnol., Mekh. Opt., 2010, no. 6, pp. 98–103.
Fomicheva, S.G., Approaches to evaluate and improve system performance security of mobile agents, Nauchn. Vestn. Arktiki, 2017, no. 2, pp. 27–32.
Fomicheva, S., Soft quantization of the production’s knowledgebases for multi-agent systems, 2017 20th Conf. of Open Innovations Association (FRUCT), St. Petersburg, 2017, IEEE, 2017, pp. 69–76. https://doi.org/10.23919/fruct.2017.8071294
Wang, D., Zhang, X., Zhang, Z., and Wang, P., Understanding security failures of multi-factor authentication schemes for multi-server environments, Comput. Secur., 2020, vol. 88, p. 101619. https://doi.org/10.1016/j.cose.2019.101619
Bezzateev, S.V., Multilevel access control system based on the Mac Elis scheme, Probl. Inf. Bezopasnosti. Komp’yuternye Sist., 2010, no. 3, pp. 42–44.
Fomicheva, S.G., Information protection in distributed hierarchical systems, Nauchn.-Tekh. Vedomosti SPbGT-U. Inf., Telekommunikatsii, Upr., 2008, no. 2, pp. 91–97.
Bezzateev, S. and Shekhunova, N., Lower bound of covering radius of binary irreducible Goppa codes, Des., Codes Cryptography, 2017, vol. 82, nos. 1–2, pp. 69–76. https://doi.org/10.1007/s10623-015-0173-4
Poltavtseva, M.A. and Kalinin, M.O., Modeling big data management systems in information security, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 895–902. https://doi.org/10.3103/s014641161908025x
Poltavtseva, M.A., Zegzhda, D.P., and Kalinin, M.O., Big data management system security threat model, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 903–913. https://doi.org/10.3103/s0146411619080261
Kalinin, M., Krundyshev, V., and Zubkov, E., Estimation of applicability of modern neural network methods for preventing cyberthreats to self-organizing network infrastructures of digital economy platforms, SHS Web Conf., 2018, vol. 44, p. 00044. https://doi.org/10.1051/shsconf/20184400044
Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., Analysis of the information security threats in the digital production networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1071–1075. https://doi.org/10.3103/s0146411618080369
Funding
The paper was prepared with the financial support of the Ministry of Science and Higher Education of the Russian Federation, grant agreement no. FSRF-2023-0003, “Fundamental principles of building of noise-immune systems for space and satellite communications, relative navigation, technical vision and aerospace monitoring”.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors of this work declare that they have no conflicts of interest.
Additional information
Publisher’s Note.
Allerton Press remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Bezzateev, S.V., Fomicheva, S.G. & Suprun, A.F. Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods. Aut. Control Comp. Sci. 57, 1005–1017 (2023). https://doi.org/10.3103/S0146411623080035
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411623080035