• Corpus ID: 11424560

Steganographic Routing in Multi Agent System Environment

@article{Szczypiorski2008SteganographicRI,
  title={Steganographic Routing in Multi Agent System Environment},
  author={Krzysztof Szczypiorski and Igor Margasinski and Wojciech Mazurczyk},
  journal={ArXiv},
  year={2008},
  volume={abs/0806.0576}
}
In this paper we present an idea of trusted communication platform for Multi-Agent Systems (MAS) called TrustMAS. Based on analysis of routing protocols suitable for MAS we have designed a new proactive hidden routing. Proposed steg-agents discovery procedure, as well as further routes updates and hidden communication, are cryptographically independent. Steganographic exchange can cover heterogeneous and geographically outlying environments using available cross-layer covert channels. Finally… 
TrustMAS: Trusted Communication Platform for Multi-Agent Systems
The paper presents TrustMAS --- Trusted Communication Platform for Multi-Agent Systems, which provides trust and anonymity for mobile agents. The platform includes anonymous technique based on
Dynamic routing in covert channel overlays based on control protocols
TLDR
This work presents a design method for control protocols within covert channels, which provides the advantage of space-efficiency and dynamic extensibility and applies the protocol design to realize OLSR-based dynamic routing for covert channel overlays.
Collaborative Information Management using Distributed Multi-Agent System
TLDR
A trusted communication platform for Multi-Agent System (MAS) and DIAMS to access resources in distributed environments and some theoretical aspects proving the importance of such protocols to have a better relationship with users are studied.
Multi agent based audio steganography
TLDR
This research paper presents a trusted communication platform for multi-agents that are able to hide the confidential message in the cover audio stream according to the user request and retrieve the hidden information from the stego audio file.
Network Management in Non-classified Data Hiding System Using Master Resident over Hidden Layer
TLDR
A practical implementation of the NDHS understood as a military platform for information warfare that takes advantage of the hidden data transmission for voice connections in order to gain informational lead over a potential enemy is presented.
Hiding Data in VoIP
TLDR
A classification of network steganography methods is proposed, which enables manipulating certain properties of the communications medium in an unexpected, unconventional, or unforeseen way to hide secret data in users' normal data transmissions.
Evidence based Access Control over Web Services using Multi Security
TLDR
A data hiding method, which is applicable through steganography, and the biometric concepts provide full security for data that is passed through the network from different places, supports a remote voter registration scheme that increases the accuracy of the current systems.
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
TLDR
The issues related to countering network steganography in practice are discussed, an outlook on further research directions and problems are provided and its potential application for harmful purposes is highlighted.
A Novel Approach for Genetic Audio Watermarking
This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into
ISSE 2014 Securing Electronic Business Processes
TLDR
This paper focuses on standardization of content, i.e. the provisioning of design patterns for security measures that are used by the corporation in order to gain competitive advantages, and the obstacles to get these benefits.
...
...

References

SHOWING 1-10 OF 79 REFERENCES
Tor: The Second-Generation Onion Router
TLDR
This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points.
When agents roam, who can you trust?
  • J. Ordille
  • Computer Science
    Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications
  • 1996
TLDR
The central security concern for systems that allow agents to roam is how to establish trust, and how to limit risk for both the server and the agent.
Security for Mobile Agents: Authentication and State Appraisal
TLDR
A unique aspect of the architecture is a “state appraisal” mechanism that protects users and hosts from attacks via state modifications and that provides users with flexible control over the authority of their agents.
Trust Management in Distributed Systems
TLDR
Different trust models are presented for distributed systems such as the Internet, peer-to-peer networks, and mobile ad hoc networks and also discusses trust management in P2P system.
A reputation-based approach for choosing reliable resources in peer-to-peer networks
TLDR
This work proposes a self-regulating system where the P2P network is used to implement a robust reputation mechanism, and a distributed polling algorithm by which resource requestors can assess the reliability of a resource offered by a participant before initiating the download.
Mixminion: design of a type III anonymous remailer protocol
TLDR
Mixminion works in a real-world Internet environment, requires little synchronization or coordination between nodes, and protects against known anonymity-breaking attacks as well as or better than other systems with similar design parameters.
A review of routing protocols for mobile ad hoc networks
Trust in multi-agent systems
TLDR
The state of the art of trust in multi-agent systems is surveyed and an account of the main directions along which research efforts are being focused is provided and the areas that require further research are outlined.
Routing Protocols for Mobile Ad-hoc Networks : Current Development and Evaluation
TLDR
This paper examines the routing protocols and their newest improvements for Mobile Ad-hoc NETwork, discussing the metrics used to evaluate these protocols and highlighting the essential problems in the evaluation process itself.
Trust in Multiagent Systems
Trust is a fundamental concern in large-scale open distributed systems. It lies at the core of all interactions between the entities that have to operate in such uncertain and constantly changing
...
...