Secure, customizable, many-to-one communication

Kenneth L. Calvert, James Griffioen, Billy Mullins, Leon Poutievski, Amit Sehgal

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review


Concast is a customizable many-to-one network-layer communication service. Although programmable services like concast can improve the efficiency of group applications, accompanying security concerns must be addressed before they are likely to be deployed. The problem of securing such services is interesting because conventional end-to-end security mechanisms are not applicable when messages are processed inside the network, and also because of the potential for interaction among the various policies involved. In this paper we describe our implementation of a secure concast service, which leverages existing network-level security mechanisms (IPsec) to provide secure distribution of program code (merge specifications) as well as authentication of participating nodes. We describe the various policies supported, how they interact, and how our approach provides security against various attacks.

Original languageEnglish
Title of host publicationActive Networks - IFIP TC6, 6th International Working Conference, IWAN 2004 Revised Papers
EditorsGary J. Minden, Kenneth L. Calvert, Marcin Solarski, Miki Yamamoto
Number of pages19
StatePublished - 2007
Event6th Annual International Working Conference on Active Networks. IWAN 2004 - Lawrence, KS, United States
Duration: Oct 27 2004Oct 29 2004

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3912 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference6th Annual International Working Conference on Active Networks. IWAN 2004
Country/TerritoryUnited States
CityLawrence, KS

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Secure, customizable, many-to-one communication'. Together they form a unique fingerprint.

Cite this