Netinfo Security ›› 2025, Vol. 25 ›› Issue (7): 1138-1152.doi: 10.3969/j.issn.1671-1122.2025.07.012

Previous Articles     Next Articles

Review of Security Protection Technologies for Multi-Agent Systems

WANG Zhengyang1, LIU Xiaolu1(), SHEN Zhuowei2, WEI Mengli1   

  1. 1. School of Mathematics, Southeast University, Nanjing 211189, China
    2. School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China
  • Received:2025-05-19 Online:2025-07-10 Published:2025-08-07
  • Contact: LIU Xiaolu E-mail:101300566@seu.edu.cn

Abstract:

This study focused on security protection technologies for multi-agent systems, conducting a comprehensive and in-depth exploration from the perspective of threats faced by the system. Firstly, based on the six major characteristics of multi-agent systems,including openness, heterogeneity, autonomy, collaboration, dynamic adaptability, and emergence, the intrinsic security risks were discussed. The security risks were categorized from three dimensions: attack targets, attack methods, and attacker attributes, with relevant attack methods provided. Secondly, A summary of threat identification methods was given, highlighting the limitations of threat modeling approaches. In terms of security defense technologies, challenges and research progress in areas such as encryption and authentication, intrusion detection and response, reputation management, fault tolerance design, and security policies and audits were reviewed. Thirdly, The potential cross-domain attack threats caused by large models directly invoking agents were explored, analyzing the damage that visual and audio attack methods could cause when exploited by large models, and proposing possible defensive measures from the perspective of disrupting the attack chain. Finally, The evolution direction of security architecture was elaborated, introducing elastic security architecture and its internal working logic. Finally, the current research status was summarized, and suggestions for future research are provided from theoretical, technological, and interdisciplinary innovation perspectives.

Key words: multi-agent system, security protection, encryption algorithm, privacy protection, cross-domain attack

CLC Number: