Skip to main content

Authentication Model Based on JWT and Local PKI for Communication Security in Multi-agent Systems

  • Conference paper
  • First Online:
Innovation in Information Systems and Technologies to Support Learning Research (EMENA-ISTL 2019)

Abstract

This paper aims to present a new model based on JSON Web Token (JWT) and Public Key Infrastructure (PKI) for communication security as part of a Multi-Agent System Middleware for massively distributed systems. The proposed model aims to provide secure communications between agents to ensure the integrity of the exchanged messages, the authentication of agents, and the no-repudiation, articulated on an approach based on a Registration Authority (RA) and a Certification Authority (CA) that are managed by a Public Key Infrastructure (PKI). This architecture is based on the Stateless JWT security technology based on the asymmetric cryptographic algorithm used for validation of subsequent client requests for making frequent remote calls to the target server resources. The proposed solution uses a digital signature claim using a KeyStore.p12 generated periodically by the local PKI, to ensure message integrity, transmitter authentication, and non-repudiation based on asymmetric cryptographic technology. The article presents an approach based on digital trust micro-agent for better security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Lee, H., Al Faruque, M.A.: GPU architecture aware instruction scheduling for improving soft-error reliability. IEEE Trans. Multi-Scale Comput. Syst. 3(2), 86–99 (2017)

    Article  Google Scholar 

  2. Lee, H., Faruque, A., Abdullah, M.: GPU-EvR: runtime event based real-time scheduling framework on GPGPU platform. In: Proceedings of the Design, Automation & Test Europe Conference Exhibition, pp. 1–6 (2014)

    Google Scholar 

  3. Maghazeh, A., Bordoloi, U.D., Horga, A., Eles, P., Peng, Z.: Saving energy without defying deadlines on mobile GPU-based heterogeneous systems. In: Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, pp. 1–10 (2014)

    Google Scholar 

  4. Sadowski, G.: Design challenges facing CPU-GPU-accelerator integrated heterogeneous systems. In: Proceedings of the 51st Design Automation Conference, p. 1 (2014)

    Google Scholar 

  5. Chen, Z., Kaeli, D.: Balancing scalar and vector execution on GPU architectures. In: 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS), Chicago, IL, pp. 973–982 (2016)

    Google Scholar 

  6. Juhasz, Z.: Highly parallel online bioelectrical signal processing on GPU architecture. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, pp. 340–346 (2017)

    Google Scholar 

  7. Zhao, G., Liu, Y., Zhang, S., Shen, F., Lin, Y., Shi, G.: Parallel implementation of the range-doppler radar processing on a GPU architecture. In: 2016 15th International Symposium on Parallel and Distributed Computing (ISPDC), Fuzhou, pp. 76–79 (2016)

    Google Scholar 

  8. Eason, G., Noble, B., Sneddon, I.N.: On certain integrals of V. Kulba and S. Somov, “problem of optimal placement of data files in large-scale unreliable distributed systems”. In: 2017 Tenth International Conference Management of Large-Scale System Development (MLSD), Moscow, pp. 1–5 (2017)

    Google Scholar 

  9. Jothi, I.A., Indumathy, P.: Increasing performance of parallel and distributed systems in high performance computing using weight based approach. In: 2015 International Conference on Circuits, Power and Computing Technologies, ICCPCT 2015, Nagercoil, pp. 1–4 (2015)

    Google Scholar 

  10. Hasan, H., et al.: Secure lightweight ECC-based protocol for multi-agent IoT systems. In: 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Rome, pp. 1–8 (2017)

    Google Scholar 

  11. Abdellaoui, A., Laksantini, A., Chaoui, H.: A security scheme for mobile cloud using multi-agents system. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), Tangier, pp. 615–620 (2016)

    Google Scholar 

  12. Alguliev, R.M., Abdullayeva, F.C.: Identity management based security architecture of cloud computing on multi-agent systems. In: Third International Conference on Innovative Computing Technology (INTECH 2013), London, pp. 123–126 (2013)

    Google Scholar 

  13. Cheribi, H., Kholladi, M.K.: A security model for complex applications based on normative multi-agents system. In: 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), Cape Town, pp. 41–46 (2015)

    Google Scholar 

  14. Jones, M.B., Bradley, J., Sakimura, N.: JSON web token (JWT) (2015). https://tools.ietf.org/html/rfc7519

  15. Solapurkar, P.: Building secure healthcare services using OAuth 2.0 and JSON web token in IOT cloud scenario. In: 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), Noida, pp. 99–104 (2016)

    Google Scholar 

  16. Jones, M., Bradley, J., Sakimura, N.: JSON web token (JWT). IETF, May 2015

    Google Scholar 

  17. Ethelbert, O., Moghaddam, F.F., Wieder, P., Yahyapour, R.: A JSON token-based authentication and access management schema for cloud SaaS applications. In: 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), Prague, pp. 47–53 (2017)

    Google Scholar 

  18. Zhang, J., Zhang, Y., Han, W., et al.: Trust mechanism with the mobile IPv6 network for rapid cross-domain authentication method. Comput. Res. Dev. 45(6), 951–959 (2008)

    Google Scholar 

  19. Qi, Z., Yang, Z., Wang, X., et al.: General web research and implementation of cross-domain authentication framework. Computer Applications 26(5), 1796–1798 (2009)

    Google Scholar 

  20. Gutmann, P.: Lessons learned in implementing and deploying crypto software. In: USENIX Security Symposium, pp. 315–325 (2002)

    Google Scholar 

  21. Najjar, M.: A blue print practical implementation of PKI using open PGP at University of Tabuk. In: 2013 Science and Information Conference, London, pp. 358–362 (2013)

    Google Scholar 

  22. Personal information exchange syntax v1.1 RFC 7292. https://tools.ietf.org/html/rfc7292

  23. Yinghui, P.: The application of PKCS#12 digital certificate in user identity authentication system. In: 2009 WRI World Congress on Software Engineering, Xiamen, pp. 351–355 (2009)

    Google Scholar 

  24. Lakshminarayanan, A., Zhou, J.: FlexiCert: merging X.509 identity certificates and attribute certificates. In: 2003 Proceedings of the 14th International Workshop on Database and Expert Systems Applications, Prague, Czech Republic, pp. 489–493 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Badr Eddine Sabir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sabir, B.E., Youssfi, M., Bouattane, O., Allali, H. (2020). Authentication Model Based on JWT and Local PKI for Communication Security in Multi-agent Systems. In: Serrhini, M., Silva, C., Aljahdali, S. (eds) Innovation in Information Systems and Technologies to Support Learning Research. EMENA-ISTL 2019. Learning and Analytics in Intelligent Systems, vol 7. Springer, Cham. https://doi.org/10.1007/978-3-030-36778-7_52

Download citation

Publish with us

Policies and ethics