rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780470772904

Host Identity Protocol (Hip): Towards the Secure Mobile Internet

by
  • ISBN13:

    9780470772904

  • ISBN10:

    0470772905

  • Format: eBook
  • Copyright: 2008-11-01
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $115.00
We're Sorry.
No Options Available at This Time.

Summary

"Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it." - Jari Arkko, Internet Area Director, IETFOne of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HIP) is being developed by the Internet Engineering Task Force (IETF) as an integrated solution to these problems. The book presents a well-structured, readable and compact overview of the core protocol with relevant extensions to the Internet architecture and infrastructure. The covered topics include the Bound End-to-End Tunnel Mode for IPsec, Overlay Routable Cryptographic Hash Identifiers, extensions to the Domain Name System, IPv4 and IPv6 interoperability, integration with SIP, and support for legacy applications.Unique features of the book: All-in-one source for HIP specifications Complete coverage of HIP architecture and protocols Base exchange, mobility and multihoming extensions Practical snapshots of protocol operation IP security on lightweight devices Traversal of middleboxes, such as NATs and firewalls Name resolution infrastructure Micromobility, multicast, privacy extensions Chapter on applications, including HIP pilot deployment in a Boeing factory HOWTO for HIP on Linux (HIPL) implementationAn important compliment to the official IETF specifications, this book will be a valuable reference for practicing engineers in equipment manufacturing companies and telecom operators, as well as network managers, network engineers, network operators and telecom engineers. Advanced students and academics, IT managers, professionals and operating system specialists will also find this book of interest.

Table of Contents

About the Author
Foreword
Foreword
Preface
Acknowledgments
Abbreviations
Introduction.
Overview
Identifiera??locatorsplit
HIPin the Internetarchitecture
BriefhistoryofHIP
Organization of the book
Introduction to network security
Goalsof cryptographicprotocols
Basics andterminology
Attacktypes
Defensemechanisms
Securityprotocols
Weakauthenticationtechniques
SecureDNS
The Host Identity Protocol.
Architectural overview
Internet namespaces
Methods of identifying a host
OverlayRoutableCryptographicHashIdentifiers
Baseprotocol
Base exchange
OtherHIPcontrolpackets
IPsec encapsulation
Main extensions
Mobility and multihoming
Rendezvous server
DNSextensions
Registrationprotocol
Advanced extensions
Opportunistic mode
Piggybacking transport headers to base exchange
HIPservicediscovery
Simultaneous multiaccess
DisseminatingHITswitha presenceservice
Multicast
Performance measurements
HIPonNokia InternetTablet
Experimental results
Summary
Lightweight HIP
Security functionality of HIP
HIPhigh-levelgoals
LHIPdesign
LHIPperformance
Discussion
Infrastructure Support.
Middlebox traversal
Requirements for traversinglegacymiddleboxes
LegacyNATtraversal
Requirements forHIP-awaremiddleboxes
HIP-awarefirewall
Name resolution
Problemstatementofnaming
DistributedHashTables
HIPinterface toOpenDHT
Overviewofoverlaynetworks
Host Identity Indirection Infrastructure
Separatingcontrol,data, andnaming
Thedata plane
Thecontrolplane
Discussionof theHi3design
Micromobility
Local rendezvousservers
Secure micromobility
Network mobility
Communication privacy
Spinat
BLIND
Anonymousidentifiers
Applications.
Possible HIP applications
VirtualPrivateNetworking
P2PInternetSharingArchitecture
InteroperatingIPv4andIPv6
SecureMobileArchitecture
Liveapplicationmigration
NetworkoperatorviewpointonHIP
Application interface
UsinglegacyapplicationswithHIP
API fornativeHIPapplications
Integrating HIP with other protocols
GeneralizedHIP
The use of Session Initiation Protocol
EncapsulatingHIPdatausingSRTP
ReplacingHIPbase exchangewithIKEv2
MobileIPandHIP
HIPproxyfor legacyhosts
Installing and using HIP
Bibliography
Index
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program