Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Host Identity Protocol (HIP): Towards the Secure Mobile Internet [Repost]

Posted By: ChrisRedfield
Host Identity Protocol (HIP): Towards the Secure Mobile Internet [Repost]

Andrei Gurtov - Host Identity Protocol (HIP): Towards the Secure Mobile Internet
Published: 2008-07-28 | ISBN: 0470997907 | PDF | 332 pages | 2.62 MB


One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HIP) is being developed by the Internet Engineering Task Force (IETF) as an integrated solution to these problems. The book presents a well-structured, readable and compact overview of the core protocol with relevant extensions to the Internet architecture and infrastructure. The covered topics include the Bound End-to-End Tunnel Mode for IPsec, Overlay Routable Cryptographic Hash Identifiers, extensions to the Domain Name System, IPv4 and IPv6 interoperability, integration with SIP, and support for legacy applications.
Unique features of the book:
All-in-one source for HIP specifications
Complete coverage of HIP architecture and protocols
Base exchange, mobility and multihoming extensions
Practical snapshots of protocol operation
IP security on lightweight devices
Traversal of middleboxes, such as NATs and firewalls
Name resolution infrastructure
Micromobility, multicast, privacy extensions
Chapter on applications, including HIP pilot deployment in a Boeing factory
HOWTO for HIP on Linux (HIPL) implementation
An important compliment to the official IETF specifications, this book will be a valuable reference for practicing engineers in equipment manufacturing companies and telecom operators, as well as network managers, network engineers, network operators and telecom engineers. Advanced students and academics, IT managers, professionals and operating system specialists will also find this book of interest.

No Other Mirrors, Please!

>>> Look for similar eBooks HERE <<<