eHIP: early update for Host Identity Protocol
Mobility '09 Proceedings of the 6th International Conference on Mobile Technology, Application & Systems
Poster abstract: a secure P2P SIP system with SPAM prevention
ACM SIGMOBILE Mobile Computing and Communications Review
Secure and efficient IPv4/IPv6 handovers using host-based identifier-locator Split
SoftCOM'09 Proceedings of the 17th international conference on Software, Telecommunications and Computer Networks
Performance of host identity protocol on symbian OS
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Mobile virtual private networking
FIS'2009 Proceedings of the Second Future internet conference on Future internet
UEF: ubiquity evaluation framework
WWIC'11 Proceedings of the 9th IFIP TC 6 international conference on Wired/wireless internet communications
Multihoming Management for Future Networks
Mobile Networks and Applications
Distributed information service architecture for overlapping multiaccess networks
Multimedia Tools and Applications
Review: A survey of identity and handoff management approaches for the future Internet
Computer Communications
Realization of Mobile Femtocells: Operational and Protocol Requirements
Wireless Personal Communications: An International Journal
Performance analysis of Virtual Mobility Domain scheme vs. IPv6 mobility protocols
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it. - Jari Arkko, Internet Area Director, IETF One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HIP) is being developed by the Internet Engineering Task Force (IETF) as an integrated solution to these problems. The book presents a well-structured, readable and compact overview of the core protocol with relevant extensions to the Internet architecture and infrastructure. The covered topics include the Bound End-to-End Tunnel Mode for IPsec, Overlay Routable Cryptographic Hash Identifiers, extensions to the Domain Name System, IPv4 and IPv6 interoperability, integration with SIP, and support for legacy applications. Unique features of the book: All-in-one source for HIP specifications Complete coverage of HIP architecture and protocols Base exchange, mobility and multihoming extensions Practical snapshots of protocol operation IP security on lightweight devices Traversal of middleboxes, such as NATs and firewalls Name resolution infrastructure Micromobility, multicast, privacy extensions Chapter on applications, including HIP pilot deployment in a Boeing factory HOWTO for HIP on Linux (HIPL) implementation An important compliment to the official IETF specifications, this book will be a valuable reference for practicing engineers in equipment manufacturing companies and telecom operators, as well as network managers, network engineers, network operators and telecom engineers. Advanced students and academics, IT managers, professionals and operating system specialists will also find this book of interest.