Host Identity Protocol (HIP) : Towards the Secure Mobile Internet

ISBN
9780470997901
$128.00
Author Gurtov, Andrei
Format Trade Cloth
Details
  • 9.9" x 6.9" x 1.0"
  • Active Record
  • Individual Title
  • 2008
  • 332
  • Yes
  • 12
  • TK5103.4885.G87 2008
?Within the set of many identifier-locator separationdesigns for the Internet, HIP has progressed further than anythingelse we have so far. It is time to see what HIP can do in largerscale in the real world. In order to make that happen, the worldneeds a HIP book, and now we have it.? - Jari Arkko, Internet Area Director, IETF One of the challenges facing the current Internet architectureis the incorporation of mobile and multi-homed terminals (hosts),and an overall lack of protection against Denial-of-Service attacksand identity spoofing. The Host Identity Protocol (HIP) is beingdeveloped by the Internet Engineering Task Force (IETF) as anintegrated solution to these problems. The book presents awell-structured, readable and compact overview of the core protocolwith relevant extensions to the Internet architecture andinfrastructure. The covered topics include the Bound End-to-EndTunnel Mode for IPsec, Overlay Routable Cryptographic HashIdentifiers, extensions to the Domain Name System, IPv4 and IPv6interoperability, integration with SIP, and support for legacyapplications. Unique features of the book: All-in-one source for HIP specifications Complete coverage of HIP architecture and protocols Base exchange, mobility and multihoming extensions Practical snapshots of protocol operation IP security on lightweight devices Traversal of middleboxes, such as NATs and firewalls Name resolution infrastructure Micromobility, multicast, privacy extensions Chapter on applications, including HIP pilot deployment in aBoeing factory HOWTO for HIP on Linux (HIPL) implementation An important compliment to the official IETF specifications,this book will be a valuable reference for practicing engineers inequipment manufacturing companies and telecom operators, as well asnetwork managers, network engineers, network operators and telecomengineers. Advanced students and academics, IT managers,professionals and operating system specialists will also find thisbook of interest.