Вы находитесь на странице: 1из 6

Metamodel for Reputation based Agents System

Case Study for Electrical Distribution SCADA Design


Guy Guemkam Jonathan Blangenois Christophe Feltus, Djamel Khadraoui
Laboratoire dinformatique de Paris 6, Faculty of Computer Science Public Research Centre Henri Tudor

75005 Paris-France University of Namur EE-Team , Luxembourg
guy.guemkam@lip6.fr blangenoisj@gmail.com {firstname.name}@tudor.lu

ABSTRACT
SCADA systems are urged to face more and more complex critical
1. INTRODUCTION
Enterprise architecture models are frameworks that allow
situation and thereby, need to continuously evolve towards
representing the information system (IS) of companies in (or on a
integrated decision making capability driven by fancy reaction
set of) schemas called views. Those models have undergone major
strategy. The current research stream in that field, aims,
improvements during the first decade of the 21st century and some
accordingly, to foster the smartness of the field equipment and
significant frameworks have been developed since, such as
actuators, which predominately exist under the concept of agents.
ArchiMate [1] or the Zachman framework [2]. These models are
Those agents are governed by policies that while dictating the
traditionally structured in layers that correspond to different levels
agent behavior, depending on the agent roles and the context of
of the organizations IS. The business layer, for instance, models
evolution, also confer to the latter the latitude to react based on
the concept that exists at the business layer such as the processes,
their own perception of the evolving environment. This agent
the actors, their business roles, and so forth and which are
ability is referring to as the agent smartness and is strongly
supported or represented by IT application layers. At this
determined by, and depending on, the trust perceived by the agent
application layer the concepts of the IS that are modeled are the
of its environment. Actual work related to agents tends to consider
applications, the databases, or for instance, the application data.
that agents evolve and are organized in systems. There exist some
The advantages of these enterprise architecture models are that
models for representing how these agents are organized at a high
they allow improving the connections between the concepts from
level, models for representing how they are spread in the
each layer and, thereby, allow a better integration and an
networks, models to represent how they communicate to each
enhanced support for the decision making processes. Up to now,
other, and so forth. However, as far as we know, no model exists
agents represented at the business layers [3][4] have been
that integrates all of the above models. Therefore, we do believe
considered human actors playing business roles. However, rising
that such an integrated model could have many advantages like
security requirements for the management of heterogeneous and
e.g. to know the impact from the action from one layer to another,
distributed architecture calls for a rethinking of distribution of the
to decide which action on a component has the most important
security procedures in both: human and software autonomous
impact on a set of other components, to identify the most critical
entities. Although having been handled by human employees for
component for an infrastructure, to align the agent system with the
years, the management of complex systems, nowadays, needs to
corporate objective and to tailor it accordingly. Therefore, we
be shared with intelligent software items, often perceived being
have decided to frame an innovative version of ArchiMate for
more adapted to act in critical situations. This statement is
the multi-agent purpose with the objective to enrich the agent
enforced by the characteristic ability of the agent to act
society collaborations and, more particularly, the description of
autonomously in open, distributed and heterogeneous
the agent behavior endorsed in the policy component and using a
environments, in connection or not with an upper authority.
reputation based trust model to improve the reliability, termed
Acknowledging this situation, we are forced to admit that
ARMAN. Our work has been illustrated in the frame of a critical
software agents are no longer to be considered only as basic
infrastructure in the field of electrical power distribution which is
software components deployed to support business activities, but
a highly sensitive research topic. .1
that they are part of the business actors as well, that they plays
Categories and Subject Descriptors some kind of business role, and they perform business tasks
H.2.7: Security, Integrity, and Protection accordingly. Since then, acquiring an innovative enterprise
architecture framework to represent the behaviors of such agents
General Terms appears fully justified and required by the practitioners, especially
Management, Performance, Design, Reliability, Experimentation, the ones engaged in the management of those critical
Security, Languages, Theory, Verification. infrastructures.
In this paper, we propose to explore ArchiMate and to redraw its
structure in order to fit with agent software actors specificities
Keywords and domain constraints. The main focus concerns the design and
ArchiMate, metamodel, reputation, SCADA, multi-agents the consideration of the policies that are centric concepts related
system, trust, electricity distribution, critical infrastructure. to the activation of agents behaviours. The paper is structured as
follows, after having sighted the related works concerning the
enterprise architecture models in Section II; we review the
reputation base trust that is exploited in the modelling of the agent
Enterprise Engineering Team is a collaboration between CRP smartness in Section II. We model the concept of policy that
Henri Tudor, Radboud University Nijmegen and the University of represents the engine of the agent modelling framework in Section
Applied Science Arnhem-Nijmegen (http://www.ee-team.eu)
IV and in Section V, we explains layer by layer the entire we have redefined the Core of the metamodel (Figure 1) to figure
Reputation based Agents System Metamodel and illustrates its out the concept of Policy that hosts the behaviour and the trust
different components. In Section VI, we present a case study that decision mechanism. The Core represents the handling of Passive
illustrates the exploitation of the enhanced ArchiMate and we Structure by Active Structures during the realization of
perform real-time simulations in Section VII. Finally, Section VII Behaviours. For the Active Structures and the Behaviour, the
concludes the paper. Core differentiates external concepts that represent how the
As we have notice that agent systems are organized in a way architecture is being seen by the external concepts (as a Service
close to the enterprises system, our proposal analyses how an provider attainable by an Interface) and the internal concept
enterprise architecture model may be slightly reworked and which is composed of Structure Elements (Roles, Components)
adapted for MAS. Therefore, we exploit ArchiMate which has and linked to a Policy Execution concept. Passive Structures
the following advantages to be supported by the Open Group 2. It contain Object (Data Object, Organizational Object, Artefacts,)
has a large community and proposes a uniform structure to model that represents information of the architecture.
enterprise architecture. Another advantage of ArchiMate is that Secondly, the concept of Policy has been defined in accordance
it uses referenced existing modelling languages like UML. With with our specialization of the ArchiMate metamodel. The
this aspect we think that it is relevant to provide a lean and simple proposed representation is composed of three concepts defining
structure compliant with the new version of UML to model any the Policy
MAS. As a conclusion of our state of the art, we acknowledge the
many other models or frameworks that provide solutions to MAS 2.2 Policy modelling
models and which are compliant or not with other modelling The organizational and the application policies may, afterwards,
languages. As far as we know no existing approach provides a be modelled as follows:
multiple layer view or an integrated view of these layers.
2.2.1 Organizational Policy.
2. METAMODEL FOR REPUTATION In the Organizational Layer, Organizational Policy can be
represented as an UML Use Case [14] where concepts of Roles
BASED TRUST represent the Actors of the Use Case and the Collaboration
The proposed reputation-based trust management scheme is used
concepts show the connections between them. Concepts of
to predict the future behaviour of a component in order to
Products, Value and Organizational Service provide the Goal
establish trust among agents and hence to improve security in the
of the Use Case. Pre and Post conditions are modelling the
system. The goal of using an architecture using a trust Policy
context of the Use Case and are symbolized in the metamodel as
within a metamodel core is to improve the agent assignment
the Event concept (Precondition) and the Organizational Object
according to his policy. The trust Policy component depicted in
(Pre/Post condition).
the Figure 1 signifies the lower value that is necessary for agent to
be assign to a role. Moreover according to his role fulfilment, a 2.2.2 Application Policy.
reputation score is used to assess this level of trust. Indeed we Application Policy from the Application Layer is defined in
consider reputation as a measure that is derived from direct Section III as the realisation of behaviour by the Application
and/or indirect knowledge of earlier interactions if any, and is domain in a configuration of the Data domain. UML provides
used to access the level of trust an agent puts into another as in support to model the behaviour performed by the Application
[18]. This trust policy is linked with the behavioural policy. domain as Sequence Diagram. Configuration of the Data domain
Indeed these Behaviour and Trust Policy are combined into can be expressed as Preconditions of the Sequence Diagram and
Policy. The rest of the metamodel component is explained in the symbolized by the execution of a test-method on the lifeline of the
next section. diagram (Figure 2).

Figure 2. Active structure connections


2.2.3 Reputation based Trust Policy
Each agent used reputation to derive the trustworthiness that it
Figure 1. Metamodel Core with Trust Policy. puts in another based on information provided by probes.
Implementation of TRM mechanisms are translated into agent
2.1 Policy Concept and Metamodel Core behaviours through the concept of Policies called Trust Policies.
Our goal in modelling the multi-agent system into architecture As it will be later illustrated through the broadcasting mechanism
metamodel is to provide system architects and developers tools to (Figure 8), the trust value of each component at an upper level, for
create their own multi-agent system including the notions of instance MSP agents, is derived from sublevels agents. That
Agents Policy. As explained in Section II, we have selected the signifies that, for two given agents A and B, the trust value of
ArchiMate language to provide a multiple layered view of multi- agent B computed by agents A is calculated using equation 1,
agent system using policies. adapted from [18] as such:
To create this metamodel, we have realized a specialization of TAB=ORAB= DRAB+ (1-)(1IRi1B+ 2IRi2B+1IRi3B) (1)
the original ArchiMate metamodel for agent architecture. Firstly
DRAB=E(Beta(,)) E=/+ (2)
2 with 1+2+2=1 and 0<<1
http://www.opengroup.org/subjectareas/enterprise/archimate
DRAB represents the direct reputation of agent B view by agent to citizens, hospitals, etc. By this way our electric blackout
A and is obtained through direct interactions using the mean of prevention system is easily extensible for future communications
the beta distribution calculated from equation 2 extracted from facilities. MBPs receive generic alert messages from the MSP.
[18]. IRi1B represents reputation coming from other agent i1 (as Then a specific parser converts the incoming alert message to the
well as i2 and i3) and 1, 2 and 3 represent the trustworthiness of appropriate format according to the channel.
the associations between each agent. Applying 1 to the
broadcasting mechanism of figure 8, it gives:
TMBP_ACE= (3)
DRMBP_ACE+(1-)(1IRi1_ACE+2IRi2_ACE+1IRi3_ACE)
with 1, 2 and 3 values calculated based on strategic
broadcasting decision e.g. prioritisation of regional broadcasting
or technology threat mitigation (see Section VII).
Figure 3. MBP architecture
3. CASE STUDY IN ELECTRIC POWER
To consider the mutual trust between agents, each agent
DISTRIBUTION INFRASTRUCTURE maintains within it a database of levels of trust towards its pairs.
The represent the modelling of MAS with ArchiMate for MAS, This means e.g. that the MBP has a dedicated level of trust for the
we complete, in this paper, the case study presented in [8]. To ACE and the MSP.
know: electricity is a difficultly storable good. Its production has The broadcasting alert architecture presented in this section is
to precisely fit with its consumption. To maintain and guarantee based on the ReD project [7]. The ReD (Reaction after Detection)
that balance, electric companies supervise the transport of the project defines and designs a solution to enhance the
electricity and manage the electric network. They keep watching detection/reaction process and improves the overall resilience of
in real time both production (wind turbine) and consumption critical infrastructures. Figure 10 introduces the developed
(electric warmer) values to maintain the safety of the system. In architecture illustrated with our weather broadcast alert system.
case of productivity problem, solutions are deployed like the The flow is supposed to begin with an alert detected by a probe.
importation of electricity from adjoining countries or user
request, made via TV and newspapers, to adapt the usage of
electric machines (e.g. stop washing machine or dryer).
The broadcasting mechanism (Figure 4) aims at sending alerts
to the population using media such as the SMS or tweets
whenever a weather alert occurs. This section presents the core
components of the broadcasting mechanism. The solution relies
on a MAS technology on the top of the JADE framework [6].
Agents are disseminated on three layers of the infrastructure
corresponding to geographical region (city, region or country) and
they retrieve information from probes located in weather station
and on the electric networks and representing with different
values: pressure, temperature and electric voltage.
The agents that compose the critical architecture are the
following: Figure 4. Broadcasting mechanism inside
The Alert Correlation Engine (ACE) collect, aggregates and
analyses weather information coming from probes deployed over This alert is send to the ACE agent (City layer) that does or
the network and weather stations. Confirmed alerts are sent to the does not confirm the alert to the PIE. Afterwards, the PIE decides
Policy Instantiation Engine (PIE). The PIE receives confirmed to apply new policies or to forward the alert to an ACE from a
alert from the ACE, set the severity level and the extent of the higher layer (Region Layer). The PIE agent sends the policies to
geographical response. The PIE instantiates high level alert the MSP agent, which decides which MBP is able to transform the
messages, to be deployed. Finally the high level alert messages are high level alert message into an understandable format for the
transferred to the Message Supervising Point (MSP). The MSP, as selected communication channel.
explained in detailed in [9] is composed of two modules. The In order to manage access rights, we have incorporated to ReD
Policy Analysis (PA) is in charge of analysing the policies a Context Rights Management module (CRM). Block on the right
previously instantiated by the PIE. For that, the Policy Status on Figure 10. The CRM is in charge of providing access rights to
database stores all communication policies and their current status agents (E.g. MBP to the probes and Logs File database, MSP to
(in progress, not applicable, by-passed, enforced, removed) so the Policy Rules Status database). The CRM uses the agent links
that the PA module can check the consistency of the newly and the crisis context database. The first database includes the link
received message to be deployed. The second module is the between two agents (type of contextual access right). The second
Component Configuration Mapper that selects the appropriate database includes a set of crisis contexts. Thanks to these
communication channel. databases the CRM agent is able to detect the agent right to access
Figure 3 presents two different kinds of Message Broadcasting each others at the operational layer depending on the context.
Point (MBP). Indeed, another advantage of MAS is that it is easy
to implement from a model, specific agents in order to perform 3.1 ACE Organizational layer
specific tasks. Concretely it enables us to use different channel of In the Organizational layer of the ACE Agent (Figure 11) we have
communication (e.g. SMS, e-mail, micro-blogging) to send alerts represented separately the monitoring aspect from the transaction
aspect. We call a transaction a communication of information
from one agent to another (e.g. the ACE sends an alert to a PIE)
and then we consider the monitoring as the representation of
information from an external device. Firstly the Organizational
Role of the ACE is represented as a Collaboration of the PIE Role
and the Device Role.

Figure 5. Detailed reaction architecture for electricity


distribution adaptation based on weather parameters
Each Role of the Collaboration communicates with the ACE
through a proper Organizational Interface one for the monitoring
and another one for the transaction. ACE Role is providing two
Organizational Services depending on only one Organizational
Policy which is dealing with two Events respectively for the
monitoring and the transaction. Secondly the two Organizational
Services provided by the ACE agent are regrouped into a Figure 6. ACE agent model
correlation service symbolized by the Product concept. This
Product has the objective Value to reduce a crisis by giving a
3.3 ACE Technical layer
We found in the Technical layer of the ACE Agent (Figure 11)
guaranty of short reaction time represented by the Contract
another representation of the two collaborators of the ACE agent.
concept. Finally the Contract is applied on Organizational Object
Transaction and Monitoring Infrastructure are separated from
as monitoring information and transaction information.
each other. Both of them have Infrastructure Service connected to
the ACE agents Node and an Infrastructure Interface where the
3.2 ACE Application layer collaborators can interact with it. Each Node is respectively
For the Application layer of the ACE Agent (Figure 11) we found connected to a Communication Path (represented by a logical
the separation between the transaction and the monitoring. Event Queuing) and uses different Artifacts to communicate. We
Application Services for transactions and monitoring are, as in the have intentionally not instantiated Nodes for readability but the
Organizational Policy, linked to only one Application Policy. To reader can easily imagine that an ACE agent can be deployed on a
highlight the collaboration between the ACE and the Monitored computer whos running an operating system. Also the Network
Device, we created a Collaboration concept named Monitoring concept is not defined in our instantiation for the same reason. For
Administration and shows that this collaboration is constituted of example Monitoring Event Queue between the ACE agent and the
the Components of the ACE and the Components of the Device. Device can be represented as a Network concept, as an USB cable
Devices components use the Application Monitoring Interface to and for the Transaction Event Queue by an RJ45 cable.
communicate with the ACEs components and the ACEs
components are composed of the Application Monitoring 3.4 ACE Organizational Policy
Interface. To illustrate the Organizational Policies of the ACE we choose to
We use the same approach for the transaction part and rapidly represent the monitoring part of the ACE Role as an UML Use
show that the ACEs components are composed of two interfaces Case (Figure 12). Monitoring Events are illustrated in the Use
deserving the two Application Services. Again the Application Case as Extension Points and show their impacts on the
layer contains Data Object as Transaction Messages and behaviours realized in the Perform Monitoring Policy. Roles are
Monitoring Messages used by the different Application presented as Actors and Collaborations are highlighted by the
Components of the layer. different link between the behaviours.
Table I. PIE perception evolution

10% 50% 90%


ACE Rep ACE Rep ACE Rep
A73 0.8 A73 0.75 A73 0.62
A71 0.86 A71 0.87 A71 0.81
A80 0.69 A80 0.55 A80 0.15
A45 0.72 A45 0.98 A45 0.76
A55 0.91 A55 0.93 A55 0.9
A56 0.93 A56 0.0 A56 0.36
A66 0.82 A66 0.85 A66 0.72
A32 0.8 A32 0.81 A32 0.44
A35 0.84 A35 0.92 A35 0.99
Figure 7. ACE Monitoring Organizational Policies Use Case A0 0.73 A0 0.71 A0 0.66

As the percentage of malicious growth, the threshold evolves


3.5 ACE Application Policy according to the reputation. For instance, the reputation of PIE
Sequences Diagrams have been used to represent the behaviours A35 growth from 0.84 to 0.99 as the percentage of malicious
performed by the Application Domain of the ACE Agent for the PIE grows from 10% to 90%.
Application Policy: Perform Detection (Figure 13).
In the Sequence Diagram, behaviour of each component is fit 5. CONCLUSIONS AND FUTURE WORKS
to his lifeline and in/out Events presented as inter-component We have elaborated a an innovative version of ArchiMate for
methods call. Context analyse is performed by the component MAS purpose to enrich the agent society collaborations and, more
during the execution of his behaviour. particularly, the description of the agent behavior endorsed in the
policy component and using a reputation based trust model
termed ARMAN. To illustrate our work, a case study has been
performed in the frame of a critical infrastructure related to
electrical power distribution. This case study has allowed
illustrating and validating the definition of policies according to
reaction strategy on the first hand, and depending on evolving
trust parameters amongst agents on the other hand. Finally, we
have simulated a heterogeneous network of ACE and PIE agents
running the reputation model and where different load of
malicious agents have been integrated.
As future works, additional validations are expected in the next
months on larger scale infrastructures. In parallel, a supporting
Figure 8. Perform Detection High level Sequence Diagram tool is being developed. The upper validation has been allowed by
the primary functionalities of it. Additional features of that latter
4. SIMULATIONS will allow modulating the environment parameters in which the
In this paragraph we have simulated a heterogeneous network of
agents network is running and thereby, it will allow refining and
ACE and PIE (Figure 14) agents running the reputation model in
validating the trust based policies evolution along more complex
[9]. The framework used for the test environment has been
situations.
developed in JAVA and simulate MAS network in a graphical
environment. Each created agent is deployed on thread and is only 6. ACKNOWLEDGEMENTS
connected to a central supervisor (Composed of an Agent This research is supported and funded by the European FP7-
Manager and a Graph Supervisor) that give him the list of his Security project CockpiCI, Cybersecurity on SCADA: risk
neighbors depending of his location on the network with a prediction, analysis and reaction tools for Critical Infrastructures.
maximum edge size between agents. The protocol used asks ACE
agents to send a message containing the collected data from the 7. REFERENCES
probe to the nearest PIE every five seconds. Test environment [1] M. Lankhorst. ArchiMate language primer, 2004.
represents a city of 50x50km with a maximum of 5 kilometers [2] J. A. Zachman. 2003. The Zachman Framework For Enterprise
connection distance between agents. Also simulations have been Architecture : Primer for Enterprise Engineering and Manufacturing
running several times during 120 seconds with different load of By. Engineering, no. July: 1-11.
malicious agents, respectively 10%, 50% and 90%. [3] F. Zambonelli, N. R. Jennings, and M. Wooldridge. 2003.
Developing multiagent systems: The Gaia methodology. ACM
Trans. Softw. Eng. Methodol. 12, 3 (July 2003), 317-370.
[4] V.Torres da Silva, R. Choren, and C. J. P. de Lucena. 2004. A UML
Based Approach for Modeling and Implementing Multi-Agent
Systems. In Proceedings of the Third International Joint Conference
on Autonomous Agents and Multiagent Systems - (AAMAS '04),
Vol. 2. IEEE Computer Society, Washington, DC, USA, 914-921.
[5] G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. Gteau, D.
Khadraoui, Z. Guessoum, Financial Critical Infrastructure: A MAS
Figure 9. Simulation network Trusted Architecture for Alert Detection and Authenticated
Transactions, Sixth IEEE Conference on Network Architecture and
For each load of malicious agents in the network we have Information System Security (IEEE SAR/SSI2011), France
collected the trust table - equation 3 (section IV.3) - of the same [6] G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, D. Khadraoui,
PIE agent, representing his perception of his neighbors ACE Z. Guessoum, Reputation based Dynamic Responsibility to Agent
(Table I.)
for Critical Infrastructure, IEEE/WIC/ACM International [15]
Conference on Intelligent Agent Technology, 2011, Lyon, France. [16] UML 2 ( http://www.uml.org/)
[7] .
[8] [17]
[9] C. Hahn. 2008. A domain specific modeling language for multiagent [18] .
systems. In Proceedings of the 7th international joint conference on
Autonomous agents and multiagent systems - (AAMAS '08), Vol. 1. [19] G. Guemkam, D. Khadraoui, B. Gteau, Z. Guessoum, ARMAN:
International Foundation for Autonomous Agents and Multiagent Agent-based Reputation for Mobile Ad hoc Networks. 11th
Systems, Richland, SC, 233-240. Conference on Practical Applications of Agents and Multi-Agent
Systems. Salamanca, Spain 22nd-24 May 2013.
[10] AUML (Agent UML), http://www.auml.org/
J. Blangenois, G. Guemkam, C. Feltus, D. Khadraoui,
[11] Prometheus Methodology.
http://www.cs.rmit.edu.au/agents/SAC2/methodology.html Organizational Security Architecture for Critical Infrastructure,
8th International Workshop on Frontiers in Availability, FARES
[12]
2013, an International Workshop of the eight International
[13] M. Lankhorst. ArchiMate language primer, 2004.
Conference ARES.
[14] J. A. Zachman. 2003. The Zachman Framework For Enterprise
Architecture : Primer for Enterprise Engineering and Manufacturing
By. Engineering, no. July: 1-11.

Вам также может понравиться