Always best (dis-)connected: challenges to interconnect highly heterogeneous networks
WWIC'11 Proceedings of the 9th IFIP TC 6 international conference on Wired/wireless internet communications
An integrated wireless communication architecture for maritime sector
MACOM'11 Proceedings of the 4th international conference on Multiple access communications
Serval: an end-host stack for service-centric networking
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Lowering the barriers to large-scale mobile crowdsensing
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications
Adoption barriers of network layer protocols: The case of host identity protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
Realization of Mobile Femtocells: Operational and Protocol Requirements
Wireless Personal Communications: An International Journal
Suitability analysis of existing and new authentication methods for future 3GPP Evolved Packet Core
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Survey on Mobility and Multihoming in Future Internet
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
The Host Identity Protocol (HIP) is an inter-networking architecture and an associated set of protocols, developed at the IETF since 1999 and reaching their first stable version in 2007. HIP enhances the original Internet architecture by adding a name space used between the IP layer and the transport protocols. This new name space consists of cryptographic identifiers, thereby implementing the so-called identifier/locator split. In the new architecture, the new identifiers are used in naming application level end-points (sockets), replacing the prior identification role of IP addresses in applications, sockets, TCP connections, and UDP-based send and receive system calls. IPv4 and IPv6 addresses are still used, but only as names for topological locations in the network. HIP can be deployed such that no changes are needed in applications or routers. Almost all pre-compiled legacy applications continue to work, without modifications, for communicating with both HIP-enabled and non-HIP-enabled peer hosts. The architectural enhancement implemented by HIP has profound consequences. A number of the previously hard networking problems become suddenly much easier. Mobility, multi-homing, and baseline end-to-end security integrate neatly into the new architecture. The use of cryptographic identifiers allows enhanced accountability, thereby providing a base for easier build up of trust. With privacy enhancements, HIP allows good location anonymity, assuring strong identity only towards relevant trusted parties. Finally, the HIP protocols have been carefully designed to take middle boxes into account, providing for overlay networks and enterprise deployment concerns. This article provides an in-depth look at HIP, discussing its architecture, design, benefits, potential drawbacks, and ongoing work.