End-to-end arguments in system design
ACM Transactions on Computer Systems (TOCS)
Network Services Investment Guide: Maximizing ROI in Uncertain Times (Networking Council)
Network Services Investment Guide: Maximizing ROI in Uncertain Times (Networking Council)
The Real Options Approach to Standardization
HICSS '01 Proceedings of the 34th Annual Hawaii International Conference on System Sciences ( HICSS-34)-Volume 5 - Volume 5
Protocol enhancements for intermittently connected hosts
ACM SIGCOMM Computer Communication Review
Applying a cryptographic namespace to applications
DIN '05 Proceedings of the 1st ACM workshop on Dynamic interconnection of networks
Why the Internet only just works
BT Technology Journal
Modeling the adoption of new network architectures
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Dynamics of competition between incumbent and emerging network technologies
Proceedings of the 3rd international workshop on Economics of networked systems
On dominant characteristics of residential broadband internet traffic
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
Host identity protocol for Linux
Linux Journal
Secure and efficient IPv4/IPv6 handovers using host-based identifier-locator Split
SoftCOM'09 Proceedings of the 17th international conference on Software, Telecommunications and Computer Networks
Beyond HIP: The End to Hacking As We Know It
Beyond HIP: The End to Hacking As We Know It
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
A longitudinal view of HTTP traffic
PAM'10 Proceedings of the 11th international conference on Passive and active measurement
The evolution of layered protocol stacks leads to an hourglass-shaped architecture
Proceedings of the ACM SIGCOMM 2011 conference
IEEE Communications Surveys & Tutorials
Host mobility for IP networks: a comparison
IEEE Network: The Magazine of Global Internetworking
Enterprise Network Packet Filtering for Mobile Cryptographic Identities
International Journal of Handheld Computing Research
Techno-economic feasibility analysis of Internet protocols: Framework and tools
Computer Standards & Interfaces
Hi-index | 0.00 |
With increasing societal dependence on the Internet and new application areas emerging, the need for securing communications and identifying communication partners is expected to increase. However, the original Internet architecture is lacking these functionalities, and most of the protocols proposed to fix these issues have not been widely deployed. Often one of the reasons for such failure is that protocol designers have insufficient understanding of the potential adopters' economic incentives so one may end up designing protocols based on false or inaccurate assumptions. In this paper, we analyze the Host Identity Protocol (HIP) from this viewpoint. Based on 19 expert interviews, we identify six main reasons why HIP has not been widely deployed yet. Most importantly, (1) the demand for the functionalities of HIP has been low. Where demand would have existed, substitute solutions have been favored because (2) they were earlier on the market, (3) they have relative advantage due to some design choices of HIP, (4) HIP lacks early adopter benefits necessitating costly coordination among multiple stakeholders in public deployment scenarios, and (5) people have misconceptions about the deployability of HIP. Additionally, (6) the research-mindedness of HIP developers has lead to strategic mistakes and non-optimal design choices from the perspective of deployment. We also suggest strategies that HIP developers could take to foster the adoption of HIP. Besides providing value to HIP developers, the results propose some new adoption barriers and deployment strategies that could be taken into account when designing new protocols. Finally, the article also provides a template that could be followed when studying the feasibility of other protocols.