Practical survey and roadmap for four agent interoperability protocols (MCP, ACP, A2A, ANP)

May 4, 20256 min

Overview

Production Readiness

0.7

Novelty Score

0.4

Cost Impact Score

0.7

Citation Count

3

Authors

Abul Ehtesham, Aditi Singh, Gaurav Kumar Gupta, Saket Kumar

Links

Abstract / PDF

Why It Matters For Business

Standardizing agent interfaces reduces engineering cost, improves security, and enables reusable agent services across teams and vendors.

Summary TLDR

This survey compares four emerging protocols for LLM-powered agents: MCP (JSON-RPC for secure tool/context injection), ACP (RESTful, MIME-typed multimodal messaging and session handling), A2A (agent-to-agent capability exchange using Agent Cards and SSE/push updates), and ANP (decentralized DID-based peer discovery and JSON-LD descriptions). It catalogs architectures, transport options, discovery methods, and security threats, and proposes a four-stage adoption roadmap: start with MCP for tool access, add ACP for structured messaging, adopt A2A for enterprise agent workflows, and extend to ANP for open, decentralized agent markets.

Problem Statement

LLM-driven agents need standardized ways to discover capabilities, share structured context, and securely coordinate actions. Current integrations are ad-hoc, hard to scale, and vary across vendors, creating security gaps, brittle adapters, and costly engineering work.

Main Contribution

Survey and concise comparison of four protocols: MCP, ACP, A2A, ANP

Detailed protocol descriptions (architecture, transports, discovery, security) and lifecycle threat tables

Practical phased adoption roadmap sequencing MCP → ACP → A2A → ANP

Identification of concrete security mitigations (manifest signing, JWS/JWT, TLS, DIDs)

Key Findings

Four distinct protocols target different interoperability layers

Numbers4 protocols compared (MCP, ACP, A2A, ANP)

A practical adoption sequence reduces integration risk

Numbers4-stage roadmap (MCP → ACP → A2A → ANP)

Common lifecycle security threats recur across protocols

NumbersMultiple threat tables list ≥10 named risks across lifecycles

Protocols favor different architectures and discovery modes

NumbersClient-server, brokered, peer-like, and P2P mappings (Table 7)

Who Should Care

What To Try In 7 Days

Prototype MCP for model-to-tool calls and centralize tool manifests

Sign and version one Agent Card/manifest and host under /.well-known

Add TLS + JWS-signed message parts to an existing HTTP-based agent endpoint

Agent Features

Memory

  • Session context / session IDs
  • Manifest and Agent Card metadata

Planning

  • Task delegation
  • Session-aware workflows
  • Capability negotiation

Tool Use

  • Tool invocation (model-controlled tools)
  • Typed function calls (JSON schemas)

Frameworks

  • JSON-RPC
  • HTTP/REST
  • JSON-LD
  • W3C DIDs
  • MIME multipart messages
  • Server-Sent Events (SSE)

Is Agentic

true

Architectures

  • client-server (MCP)
  • brokered HTTP/REST (ACP)
  • peer-like client↔remote (A2A)
  • decentralized P2P with DIDs (ANP)

Collaboration

  • Agent discovery
  • Capability / Agent Card exchange
  • Artifact exchange

Optimization Features

System Optimization

  • Stateless default for ACP to enable scalable load balancing

Reproducibility

Open Source Status

  • partial

Risks & Boundaries

Limitations

  • Survey synthesizes protocol specs and early docs; lacks large-scale empirical deployments
  • Protocol specs and adoption status are evolving rapidly; details may change
  • Security guidance is high-level; operator testing still required for each deployment

When Not To Use

  • If you run a single monolithic app with no external tool calls, protocol adoption may add unnecessary complexity
  • Do not adopt decentralized ANP if you require strict centralized control and auditability

Failure Modes

  • Manifest or Agent Card spoofing leading to impersonation
  • Tool or prompt injection causing unsafe model behavior
  • Version drift and stale manifests breaking integrations
  • Orphaned sessions or leaked tokens after shutdown

Context Entities

Models

  • Function calling (OpenAI)
  • RAG (retrieval-augmented generation)