HOST IDENTITY PROTOCOL PROXY

Patrik Salmela, Jan Melén

2005

Abstract

The Host Identity Protocol (HIP) is one of the more recent designs that challenge the current Internet architecture. The main features of HIP are security and the identifier-locator split, which solves the problem of overloading the IP address with two separate tasks. This paper studies the possibility of providing HIP services to legacy hosts via a HIP proxy. Making a host HIP enabled requires that the IP-stack of the host is updated to support HIP. From a network administrator's perspective this can be a large obstacle. However, by providing HIP from a centralized point, a HIP proxy, the transition to begin using HIP can be made smoother. This and other arguments for a HIP proxy will be presented in this paper along with an analysis of a prototype HIP proxy and its performance.

References

  1. Kent (1), Atkins, 1998. Security Architecture for the Internet Protocol. RFC 2401
  2. Moskowitz (1), Nikander, 2004. Host Identity Protocol Architecture. Internet-draft, draft-moskowitz-hip-arch06 (work in progress).
  3. Braden, Clark, Shenker, Wroclawski, 2000. Developing a Next-Generation Internet Architecture.
  4. Crowcroft, Hand, Mortier, Roscoe, Warfield, 2003. Plutarch: An Argument for Network Pluralism.
  5. Crawford, Mankin, Narten, Stewart, Zhang, 1999. Separating Identifiers and Locators in Addresses: An Analysis of the GSE Proposal for IPv6. Internet-draft.
  6. Clark, Braden, Falk, Pingali, 2003. FARA: Reorganizing the Addressing Architecture.
  7. Eriksson, Faloutsos, Krishnamurthy, 2003. PeerNet: Pushing Peer-to-Peer Down the Stack.
  8. Stoica, Adkins, Ratnasamy, Shenker, Surana, Zhuang, 2002. Internet Indirection Infrastructure.
  9. Nikander, Arkko, Ohlman, 2004. Host Identity Indirection Infrastructure (Hi3).
  10. Moskowitz (2), Nikander, Jokela, Henderson, 2004. Host Identity Protocol. Internet-draft, draft-ietf-hip-base-00 (work in progress).
  11. Rescorla, 1999. Diffie-Hellman Key Agreement Method. RFC 2631.
  12. Krawczyk, Bellare, Canetti, 1997. HMAC: KeyedHashing for Message Authentication. RFC 2104.
  13. Kent (2), Atkins, 1998. IP Encapsulating Security Payload (ESP). RFC 2406.
Download


Paper Citation


in Harvard Style

Salmela P. and Melén J. (2005). HOST IDENTITY PROTOCOL PROXY . In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE, ISBN 972-8865-32-5, pages 222-230. DOI: 10.5220/0001409002220230


in Bibtex Style

@conference{icete05,
author={Patrik Salmela and Jan Melén},
title={HOST IDENTITY PROTOCOL PROXY},
booktitle={Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,},
year={2005},
pages={222-230},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001409002220230},
isbn={972-8865-32-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,
TI - HOST IDENTITY PROTOCOL PROXY
SN - 972-8865-32-5
AU - Salmela P.
AU - Melén J.
PY - 2005
SP - 222
EP - 230
DO - 10.5220/0001409002220230