Details

Host Identity Protocol (HIP)


Host Identity Protocol (HIP)

Towards the Secure Mobile Internet
Wiley Series on Communications Networking & Distributed Systems, Band 21 1. Aufl.

von: Andrei Gurtov

88,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 15.09.2008
ISBN/EAN: 9780470772904
Sprache: englisch
Anzahl Seiten: 332

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” -</b> Jari Arkko, <i>Internet Area Director, IETF</i>  <p>One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HIP) is being developed by the Internet Engineering Task Force (IETF) as an integrated solution to these problems. The book presents a well-structured, readable and compact overview of the core protocol with relevant extensions to the Internet architecture and infrastructure. The covered topics include the Bound End-to-End Tunnel Mode for IPsec, Overlay Routable Cryptographic Hash Identifiers, extensions to the Domain Name System, IPv4 and IPv6 interoperability, integration with SIP, and support for legacy applications.</p> <p><i>Unique features of the book:</i></p> <ul type="disc"> <li>All-in-one source for HIP specifications</li> <li>Complete coverage of HIP architecture and protocols</li> <li>Base exchange, mobility and multihoming extensions</li> <li>Practical snapshots of protocol operation</li> <li>IP security on lightweight devices</li> <li>Traversal of middleboxes, such as NATs and firewalls</li> <li>Name resolution infrastructure</li> <li>Micromobility, multicast, privacy extensions</li> <li>Chapter on applications, including HIP pilot deployment in a Boeing factory</li> <li>HOWTO for HIP on Linux (HIPL) implementation  </li> </ul> <p>An important compliment to the official IETF specifications, this book will be a valuable reference for practicing engineers in equipment manufacturing companies and telecom operators, as well as network managers, network engineers, network operators and telecom engineers. Advanced students and academics, IT managers, professionals and operating system specialists will also find this book of interest.</p>
About the Author. <p>Foreword. <i>(Jari Arkko)</i></p> <p>Foreword. <i>(David Hutchison)</i></p> <p>Preface.</p> <p>Acknowledgments.</p> <p>Abbreviations.</p> <p><b>Part I Introduction.</b></p> <p>Chapter 1: Overview.</p> <p>1.1 Identifierâ??locatorsplit.</p> <p>1.2 HIPin the Internetarchitecture.</p> <p>1.3 BriefhistoryofHIP.</p> <p>1.4 Organization of the book.</p> <p>Chapter 2: Introduction to network security.</p> <p>2.1 Goalsof cryptographicprotocols.</p> <p>2.2 Basics andterminology.</p> <p>2.3 Attacktypes.</p> <p>2.4 Defensemechanisms.</p> <p>2.5 Securityprotocols.</p> <p>2.6 Weakauthenticationtechniques.</p> <p>2.7 SecureDNS.</p> <p><b>Part II The Host Identity Protocol.</b></p> <p>Chapter 3: Architectural overview.</p> <p>3.1 Internet namespaces.</p> <p>3.2 Methods of identifying a host.</p> <p>3.3 OverlayRoutableCryptographicHashIdentifiers.</p> <p>Chapter 4: Baseprotocol.</p> <p>4.1 Base exchange.</p> <p>4.2 OtherHIPcontrolpackets.</p> <p>4.3 IPsec encapsulation.</p> <p>Chapter 5: Main extensions.</p> <p>5.1 Mobility and multihoming.</p> <p>5.2 Rendezvous server.</p> <p>5.3 DNSextensions.</p> <p>5.4 Registrationprotocol.</p> <p>Chapter 6: Advanced extensions.</p> <p>6.1 Opportunistic mode.</p> <p>6.2 Piggybacking transport headers to base exchange.</p> <p>6.3 HIPservicediscovery.</p> <p>6.4 Simultaneous multiaccess.</p> <p>6.5 DisseminatingHITswitha presenceservice.</p> <p>6.6 Multicast.</p> <p>Chapter 7: Performance measurements.</p> <p>7.1 HIPonNokia InternetTablet.</p> <p>7.2 Experimental results.</p> <p>7.3 Summary.</p> <p>Chapter 8: Lightweight HIP.</p> <p>8.1 Security functionality of HIP.</p> <p>8.2 HIPhigh-levelgoals.</p> <p>8.3 LHIPdesign.</p> <p>8.4 LHIPperformance.</p> <p>8.5 Discussion.</p> <p><b>Part III Infrastructure Support.</b></p> <p>Chapter 9: Middlebox traversal.</p> <p>9.1 Requirements for traversinglegacymiddleboxes.</p> <p>9.2 LegacyNATtraversal.</p> <p>9.3 Requirements forHIP-awaremiddleboxes.</p> <p>9.4 HIP-awarefirewall.</p> <p>Chapter 10: Name resolution.</p> <p>10.1 Problemstatementofnaming.</p> <p>10.2 DistributedHashTables.</p> <p>10.3 HIPinterface toOpenDHT.</p> <p>10.4 Overviewofoverlaynetworks.</p> <p>10.5 Host Identity Indirection Infrastructure.</p> <p>10.5.1 Separatingcontrol,data, andnaming.</p> <p>10.5.2 Thedata plane.</p> <p>10.5.3 Thecontrolplane.</p> <p>10.5.4 Discussionof theHi3design.</p> <p>Chapter 11: Micromobility.</p> <p>11.1 Local rendezvousservers.</p> <p>11.2 Secure micromobility.</p> <p>11.3 Network mobility.</p> <p>Chapter 12: Communication privacy.</p> <p>12.1 SPINAT.</p> <p>12.2 BLIND.</p> <p>12.3 Anonymousidentifiers.</p> <p><b>Part IV Applications.</b></p> <p>Chapter 13: Possible HIP applications.</p> <p>13.1 VirtualPrivateNetworking.</p> <p>13.2 P2PInternetSharingArchitecture.</p> <p>13.3 InteroperatingIPv4andIPv6.</p> <p>13.4 SecureMobileArchitecture.</p> <p>13.5 Liveapplicationmigration.</p> <p>13.6 NetworkoperatorviewpointonHIP.</p> <p>Chapter 14: Application interface.</p> <p>14.1 UsinglegacyapplicationswithHIP.</p> <p>14.2 API fornativeHIPapplications.</p> <p>Chapter 15: Integrating HIP with other protocols.</p> <p>15.1 GeneralizedHIP.</p> <p>15.2 The use of Session Initiation Protocol.</p> <p>15.3 EncapsulatingHIPdatausingSRTP.</p> <p>15.4 ReplacingHIPbase exchangewithIKEv2.</p> <p>15.5 MobileIPandHIP.</p> <p>15.6 HIPproxyfor legacyhosts.</p> <p>Installing and using HIP.</p> <p>Bibliography.</p> <p>Index.</p>
"I recommend this book to all software writers and engineers who are working in the context of mobile IP, IPv6, and the future internet. Graduate and advanced undergraduate students who are interested in discovering a practical and challenging application of identity management models and cryptographic protocols will also benefit from this book." (<i>Computing Reviews</i>, May 5, 2009)
<p><strong>Andrei Gurtov</strong> is a senior research scientist leading the Networking Research group at the Helsinki Institute for Information Technology focusing on the Host Identity Protocol and next generation Internet architecture. He received his M.Sc and Ph.D. degrees in Computer Science from the University of Helsinki, Finland. He co-chairs the IRTF research group on HIP and teaches as an adjunct professor at Telecommunications and Multimedia Laboratory of the Helsinki University of Technology.

Diese Produkte könnten Sie auch interessieren:

Fiber Optic Sensors
Fiber Optic Sensors
von: Eric Udd, William B. Spillman
PDF ebook
130,99 €
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection
von: Shilpa Mahajan, Mehak Khurana, Vania Vieira Estrela
EPUB ebook
96,99 €
Digital Signal Processing
Digital Signal Processing
von: Maurice Bellanger
EPUB ebook
122,99 €