10.5555/1025132.1026417acmconferencesArticle/Chapter ViewAbstractPublication PageswiConference Proceedings
ARTICLE

A Multi-Agent System's Approach to Communication Security in the Web

ABSTRACT

This paper presents the Split and Merge method, an approach to provide secure communication over the Internet using software agents. Instead of relying exclusively on the traditional approaches of ciphering the message at the source and then sending it over a communication channel, the Split and Merge method focuses on denying access to the message itself. This is achieved by splitting the message in parts and sending them to the destination through different routes, in an ad-hoc network of agents. The method is detailed in the paper and the current implementation using multi agent systems is presented. The solutions found to deal with error detection and correction (loss of message fragments, message integrity and node misbehavior) are then discussed and further research directions are presented.

References

  1. {1} Singh, S., The Code Book - The Secret History of Codes and Code Breaking. Popular Science. 1999, London: Fourth Estate.Google ScholarGoogle Scholar
  2. {2} R.L. Rivest, A.S. and L.M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems". Communications of the ACM, 1978. 2(21): p. 120-126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. {3} Webopedia, "Moore's law". 1998, http://www.webopedia. com/TERM/M/Moores_Law.html.Google ScholarGoogle Scholar
  4. {4} Mann, C.C., "The End of Moore's Law?" 2000, Technology Review, http://technologyreview.com/articles/mann0500.asp.Google ScholarGoogle Scholar
  5. {5} NCIX, Counterintelligence News & Developments, Volume 2, June 1998 - "Hidden in Plain Sight-Steganography". 1998, Office of the National Counterintelligence Executive.Google ScholarGoogle Scholar
  6. {6} Judge, J.C., "Steganography: Past, Present, Future". 2001, SANS - SysAdmin, Audit, Network, Security - http://www.sans.org/rr/steg/steganography4.php.Google ScholarGoogle Scholar
  7. {7} Reiter, M.K. and A.D. Rubin, "Crowds: Anonymity for Web Transactions". 1997, DIMACS: New Jersey, USA. p. 21.Google ScholarGoogle Scholar
  8. {8} Goldschlag, D., M. Reed, and P. Syverson, "Onion Routing for Anonymous and Private Internet Connections". Communications of the ACM, 1999. 42(2). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. {9} Bosselaers, A., "Comparative performance of hash functions", http://www.esat.kuleuven.ac.be/~bosselae/fast.Google ScholarGoogle Scholar
  10. {10} Barreto, P., "The Hashing Function Lounge". 2000, http:// planeta.terra.com.br/informatica/paulobarreto/hflounge.html.Google ScholarGoogle Scholar
  11. {11} Gambetta, D., "Can We Trust Trust?", in Trust: Making and Breaking Cooperative Relations, electronic edition, D. Gambetta, Editor. 2000, Department of Sociology, University of Oxford, http://www.sociology.ox.ac.uk/papers/gambetta213- 237.pdf. Oxford. p. 213-237.Google ScholarGoogle Scholar
  12. {12} Granovetter, M., "Economic Action and Social Structure: The Problem of Embeddedness". American Journal of Sociology, 1985. 91(November): p. 481-510.Google ScholarGoogle Scholar
  13. {13} Willmott, S., et al., "Agentcities Network Architecture Recommendation". 2002, Agentcities Task Force.Google ScholarGoogle Scholar
  14. {14} Bellifemine, F., A. Poggi, and G. Rimassa. "JADE - A FIPA-compliant agent framework". in 4th International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agents. 1999. London, UK.Google ScholarGoogle Scholar
  15. {15} FIPA00061, "FIPA ACL Message Structure Specification"., in Foundation for Intelligent Physical Agents. 2000.Google ScholarGoogle Scholar

Index Terms

(auto-classified)
  1. A Multi-Agent System's Approach to Communication Security in the Web

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Article Metrics

        • Downloads (Last 12 months)4
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!