
lyzed to ensure that the benefits of resource efficiency
do not come at the expense of scalability or real-time
responsiveness. Another critical avenue for improve-
ment involves developing and simulating strategic at-
tack methods, such as coordinated multi-agent imper-
sonation or evolving adversarial strategies, to test the
resilience of the framework. These refinements would
not only validate the robustness of the AAT model but
also identify potential areas for optimization, allow-
ing more comprehensive and future-proof solutions.
5 CONCLUSIONS
In this paper, we presented a novel trust-based adap-
tive authentication decision process designed for the
dynamic and heterogeneous environments of the In-
ternet of Things. Specifically developed for informa-
tion exchange within embedded MAS, this process
dynamically adjusts the required security level for au-
thentication based on both the trustworthiness of the
claimed identity by the sender and the criticality of
the transmitted information. By evaluating trust lev-
els and criticality, the process selects which identities
to authenticate and employs the most effective combi-
nation of authentication factors. This approach opti-
mizes resource allocation while minimizing the false
positive rate.
The effectiveness of our model is demonstrated
by the results obtained in the multi-agent navigation
simulations, which showed a significant reduction in
the success rate of malicious agent attacks compared
to other, less adaptive models. Additionally, our ap-
proach demonstrates a marked improvement in re-
source efficiency, allowing for the intelligent use of
energy and computational resources. This highlights
that our adaptive authentication strategy not only en-
hances security by foiling more attacks — particu-
larly by strengthening authentication for trustworthy
agents — but also optimizes resource utilization by
minimizing unnecessary authentications.
The integration of trust management and adap-
tive authentication mechanisms in IoT and embedded
MAS represents a promising direction for enhanc-
ing security. By leveraging the strengths of both ap-
proaches, it is possible to create systems that are more
resilient to attacks and better suited to the dynamic
and resource-constrained environments typical of IoT
and MAS. Our future work will focus on the follow-
ing three main areas: validating our model using real
rather than artificial authentication factors, develop-
ing a trust management system with a more sophis-
ticated strategy for selecting authentication factors,
and expanding our model to address other types of
identity-related attacks. These improvements will en-
hance the model’s robustness and flexibility against a
broader range of threats, while dynamically optimiz-
ing agent authentication processes and trust relation-
ships in IoT environments.
ACKNOWLEDGEMENTS
This work is supported by the French National Re-
search Agency (ANR) in the framework of the project
MaestrIoT ANR-21-CE23-0016.
REFERENCES
Arfaoui, A., Cherkaoui, S., Kribeche, A., Senouci, S. M.,
and Hamdi, M. (2019). Context-aware adaptive au-
thentication and authorization in internet of things.
In ICC 2019-2019 IEEE International Conference on
Communications (ICC), pages 1–6. IEEE.
Arias-Cabarcos, P., Krupitzer, C., and Becker, C. (2019). A
survey on adaptive authentication. ACM Computing
Surveys (CSUR), 52(4):1–30.
Babun, L., Denney, K., Celik, Z. B., McDaniel, P., and Ulu-
agac, A. S. (2021). A survey on iot platforms: Com-
munication, security, and privacy perspectives. Com-
puter Networks, 192:108040.
Dasgupta, D., Roy, A., and Nag, A. (2016). Toward the
design of adaptive selection strategies for multi-factor
authentication. computers & security, 63:85–116.
El-Hajj, M., Fadlallah, A., Chamoun, M., and Serhrouchni,
A. (2019). A survey of internet of things (iot) authen-
tication schemes. Sensors, 19(5):1141.
Feng, X., Wang, X., Cui, K., Xie, Q., and Wang, L.
(2023). A distributed message authentication scheme
with reputation mechanism for internet of vehicles.
Journal of Systems Architecture, 145:103029.
Jahangeer, A., Bazai, S. U., Aslam, S., Marjan, S., Anas,
M., and Hashemi, S. H. (2023). A review on the se-
curity of iot networks: From network layer’s perspec-
tive. IEEE Access, 11:71073–71087.
Jamont, J.-P. and Occello, M. (2015). Meeting the chal-
lenges of decentralised embedded applications using
multi-agent systems. International Journal of Agent-
Oriented Software Engineering, 5(1):22–68.
Josang, A. and Ismail, R. (2002). The beta reputation sys-
tem. In Proceedings of the 15th Bled Electronic Com-
merce Conference, volume 5, pages 2502–2511.
Kaur, B., Dadkhah, S., Shoeleh, F., Neto, E. C. P., Xiong,
P., Iqbal, S., Lamontagne, P., Ray, S., and Ghorbani,
A. A. (2023). Internet of things (iot) security dataset
evolution: Challenges and future directions. Internet
of Things, 22:100780.
Kazil, J., Masad, D., and Crooks, A. (2020). Utilizing
python for agent-based modeling: The mesa frame-
work. In Social, Cultural, and Behavioral Mod-
eling: 13th International Conference, SBP-BRiMS
ICAART 2025 - 17th International Conference on Agents and Artificial Intelligence
54