TY - GEN
T1 - Secure, customizable, many-to-one communication
AU - Calvert, Kenneth L.
AU - Griffioen, James
AU - Mullins, Billy
AU - Poutievski, Leon
AU - Sehgal, Amit
N1 - Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2007
Y1 - 2007
N2 - Concast is a customizable many-to-one network-layer communication service. Although programmable services like concast can improve the efficiency of group applications, accompanying security concerns must be addressed before they are likely to be deployed. The problem of securing such services is interesting because conventional end-to-end security mechanisms are not applicable when messages are processed inside the network, and also because of the potential for interaction among the various policies involved. In this paper we describe our implementation of a secure concast service, which leverages existing network-level security mechanisms (IPsec) to provide secure distribution of program code (merge specifications) as well as authentication of participating nodes. We describe the various policies supported, how they interact, and how our approach provides security against various attacks.
AB - Concast is a customizable many-to-one network-layer communication service. Although programmable services like concast can improve the efficiency of group applications, accompanying security concerns must be addressed before they are likely to be deployed. The problem of securing such services is interesting because conventional end-to-end security mechanisms are not applicable when messages are processed inside the network, and also because of the potential for interaction among the various policies involved. In this paper we describe our implementation of a secure concast service, which leverages existing network-level security mechanisms (IPsec) to provide secure distribution of program code (merge specifications) as well as authentication of participating nodes. We describe the various policies supported, how they interact, and how our approach provides security against various attacks.
UR - http://www.scopus.com/inward/record.url?scp=38049165270&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=38049165270&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-71500-9_3
DO - 10.1007/978-3-540-71500-9_3
M3 - Conference contribution
AN - SCOPUS:38049165270
SN - 9783540714996
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 35
EP - 53
BT - Active Networks - IFIP TC6, 6th International Working Conference, IWAN 2004 Revised Papers
A2 - Minden, Gary J.
A2 - Calvert, Kenneth L.
A2 - Solarski, Marcin
A2 - Yamamoto, Miki
T2 - 6th Annual International Working Conference on Active Networks. IWAN 2004
Y2 - 27 October 2004 through 29 October 2004
ER -