• Corpus ID: 11424560

Steganographic Routing in Multi Agent System Environment

  title={Steganographic Routing in Multi Agent System Environment},
  author={Krzysztof Szczypiorski and Igor Margasinski and Wojciech Mazurczyk},
In this paper we present an idea of trusted communication platform for Multi-Agent Systems (MAS) called TrustMAS. Based on analysis of routing protocols suitable for MAS we have designed a new proactive hidden routing. Proposed steg-agents discovery procedure, as well as further routes updates and hidden communication, are cryptographically independent. Steganographic exchange can cover heterogeneous and geographically outlying environments using available cross-layer covert channels. Finally… 
TrustMAS: Trusted Communication Platform for Multi-Agent Systems
The paper presents TrustMAS --- Trusted Communication Platform for Multi-Agent Systems, which provides trust and anonymity for mobile agents. The platform includes anonymous technique based on
Dynamic routing in covert channel overlays based on control protocols
This work presents a design method for control protocols within covert channels, which provides the advantage of space-efficiency and dynamic extensibility and applies the protocol design to realize OLSR-based dynamic routing for covert channel overlays.
Collaborative Information Management using Distributed Multi-Agent System
A trusted communication platform for Multi-Agent System (MAS) and DIAMS to access resources in distributed environments and some theoretical aspects proving the importance of such protocols to have a better relationship with users are studied.
Multi agent based audio steganography
This research paper presents a trusted communication platform for multi-agents that are able to hide the confidential message in the cover audio stream according to the user request and retrieve the hidden information from the stego audio file.
Network Management in Non-classified Data Hiding System Using Master Resident over Hidden Layer
A practical implementation of the NDHS understood as a military platform for information warfare that takes advantage of the hidden data transmission for voice connections in order to gain informational lead over a potential enemy is presented.
Steganography in Ad Hoc Networks
The proposed solution ensures two layers of security through secret asynchronous data sharing through different paths along with using steganographic concepts to give a new approach to security in ad hoc networks.
Economic Path Scheduling for Mobile Agent System on Computer Network
The need for path scheduling algorithms for agents in multi-agent systems is described and travel salesman problem (TSP) scheme is used to model ordered agents and the unordered agents schedule their path based on random distribution.
Hiding Data in VoIP
A classification of network steganography methods is proposed, which enables manipulating certain properties of the communications medium in an unexpected, unconventional, or unforeseen way to hide secret data in users' normal data transmissions.
Evidence based Access Control over Web Services using Multi Security
A data hiding method, which is applicable through steganography, and the biometric concepts provide full security for data that is passed through the network from different places, supports a remote voter registration scheme that increases the accuracy of the current systems.
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
The issues related to countering network steganography in practice are discussed, an outlook on further research directions and problems are provided and its potential application for harmful purposes is highlighted.


Tor: The Second-Generation Onion Router
This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points.
When agents roam, who can you trust?
  • J. Ordille
  • Computer Science
    Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications
  • 1996
The central security concern for systems that allow agents to roam is how to establish trust, and how to limit risk for both the server and the agent.
Security for Mobile Agents: Authentication and State Appraisal
A unique aspect of the architecture is a “state appraisal” mechanism that protects users and hosts from attacks via state modifications and that provides users with flexible control over the authority of their agents.
Trust Management in Distributed Systems
Different trust models are presented for distributed systems such as the Internet, peer-to-peer networks, and mobile ad hoc networks and also discusses trust management in P2P system.
A reputation-based approach for choosing reliable resources in peer-to-peer networks
This work proposes a self-regulating system where the P2P network is used to implement a robust reputation mechanism, and a distributed polling algorithm by which resource requestors can assess the reliability of a resource offered by a participant before initiating the download.
Mixminion: design of a type III anonymous remailer protocol
Mixminion works in a real-world Internet environment, requires little synchronization or coordination between nodes, and protects against known anonymity-breaking attacks as well as or better than other systems with similar design parameters.
HICCUPS : Hidden Communication System for Corrupted Networks
All functional parts of the HICCUPS (HIdden Communication system for CorrUPted networkS), a steganographic system dedicated to shared medium networks including wireless local area networks, are discussed.
A review of routing protocols for mobile ad hoc networks
Trust in multi-agent systems
The state of the art of trust in multi-agent systems is surveyed and an account of the main directions along which research efforts are being focused is provided and the areas that require further research are outlined.
Routing Protocols for Mobile Ad-hoc Networks : Current Development and Evaluation
This paper examines the routing protocols and their newest improvements for Mobile Ad-hoc NETwork, discussing the metrics used to evaluate these protocols and highlighting the essential problems in the evaluation process itself.