CA. An excerpt of the execution trace at step 701 in
shown in Figure 5. It shows that agent 7 changes its
role, broadcasts its new certificate and agents 0 to 6,
which lost their trust in the other CAs, request a cer-
tificate from agent 7. The self-organization algorithm
led to the promotion of a friendly CA and the mali-
cious CAs being ignored.
4 CONCLUSION
In this paper, we introduced a decentralized public
key infrastructure, named MAKI, adapted to open
multi-agent systems of embedded agents. This infras-
tructure secures the communications to allow agents
to securely exchange information to detect intrud-
ers. Those intruders are then revoked thanks to the
use of certificates delivered and revoked by a subset
of trusted certification authorities agents maintained
with no third parties involved. A proof-of-concept of
MAKI is also presented, with the source available to
reviews, to demonstrate how revocations are obtained
once one or more intruders are detected. We are now
focusing our efforts on further validating MAKI us-
ing formal methods such as model checking. We are
also exploring a blockhain-based solution to provide
a way to easily share certificates and allow agents to
better audit certification authorities.
ACKNOWLEDGEMENTS
This work is supported by the French National Re-
search Agency in the framework of the “Investisse-
ments d’avenir” program (ANR-15-IDEX-02).
REFERENCES
Avramidis, A., Kotzanikolaou, P., Douligeris, C., and
Burmester, M. (2012). Chord-PKI: A distributed trust
infrastructure based on P2P networks. Computer Net-
works, 56(1):378–398.
Barker, E. and Dang, Q. (2015). Recommendation for Key
Management Part 3: Application-Specific Key Man-
agement Guidance.
Baudet, A., Aktouf, O.-E.-K., Mercier, A., and Elbaz-
Vincent, P. (2021). Systematic Mapping Study of Se-
curity in Multi-Embedded-Agent Systems. IEEE Ac-
cess, 9:154902–154913.
Baudet, A., Aktouf, O.-E.-K., Mercier, A., and Elbaz-
Vincent, P. (2022). Code and data presented in
ICAART. https://zenodo.org/record/7180985.
Blanch-Torn
´
e, S., Cores, F., and Chiral, R. M. (2015).
Agent-based PKI for Distributed Control System. In
2015 World Congress on Industrial Control Systems
Security (WCICSS), pages 28–35.
Bonnaire, X., Cort
´
es, R., Kordon, F., and Marin, O. (2013).
A Scalable Architecture for Highly Reliable Certifica-
tion. In 2013 12
th
IEEE International Conference on
Trust, Security and Privacy in Computing and Com-
munications, pages 328–335.
Boubiche, D. E., Athmani, S., Boubiche, S., and Toral-
Cruz, H. (2021). Cybersecurity Issues in Wireless
Sensor Networks: Current Challenges and Solutions.
Wireless Personal Communications, 117(1):177–213.
Cui, H. and Deng, R. H. (2016). Revocable and Decen-
tralized Attribute-Based Encryption. The Computer
Journal, 59(8):1220–1235.
Goffee, N. C., Kim, S. H., Smith, S., Taylor, P., Zhao,
M., and Marchesini, J. (2004). Greenpass: Decentral-
ized, PKI-based Authorization for Wireless LANs. In
In 3
rd
Annual PKI Research and Development Work-
shop, pages 26–41.
Jhaveri, R. H. and Patel, N. M. (2017). Attack-pattern dis-
covery based enhanced trust model for secure routing
in mobile ad-hoc networks. International Journal of
Communication Systems, 30(7):e3148.
Kazil, J., Masad, D., and Crooks, A. (2020). Utilizing
Python for Agent-Based Modeling: The Mesa Frame-
work. In Social, Cultural, and Behavioral Modeling,
volume 12268, pages 308–317.
Kukreja, D., Dhurandher, S. K., and Reddy, B. V. R. (2018).
Power aware malicious nodes detection for securing
MANETs against packet forwarding misbehavior at-
tack. Journal of Ambient Intelligence and Humanized
Computing, 9(4):941–956.
Lesueur, F., Me, L., and Tong, V. V. T. (2009). An efficient
distributed PKI for structured P2P networks. In 2009
IEEE Ninth International Conference on Peer-to-Peer
Computing, pages 1–10.
Okamoto, T. and Takashima, K. (2020). Decentralized
Attribute-Based Encryption and Signatures. IEICE
Transactions on Fundamentals of Electronics, Com-
munications and Computer Sciences, E103.A(1):41–
73.
Qin, B., Huang, J., Wang, Q., Luo, X., Liang, B., and Shi,
W. (2020). Cecoin: A decentralized PKI mitigating
MitM attacks. Future Generation Computer Systems,
107:805–815.
Ruan, Y. and Durresi, A. (2016). A survey of trust manage-
ment systems for online social communities – Trust
modeling, trust inference and attacks. Knowledge-
Based Systems, 106:150–163.
Singla, A. and Bertino, E. (2018). Blockchain-Based PKI
Solutions for IoT. In 2018 IEEE 4th International
Conference on Collaboration and Internet Computing
(CIC), pages 9–15.
Yakubov, A., Shbair, W. M., Wallbom, A., Sanda, D., and
State, R. (2018). A Blockchain-Based PKI Manage-
ment Framework. In NOMS 2018 - 2018 IEEE/I-
FIP Network Operations and Management Sympo-
sium, pages 1–6.
ICAART 2023 - 15th International Conference on Agents and Artificial Intelligence
184