메뉴 건너뛰기




Volumn 31, Issue 10, 2008, Pages 2457-2467

Hi3: An efficient and secure networking architecture for mobile hosts

Author keywords

Denial of service; Mobility; Multihoming; Performance; Security

Indexed keywords

INTERNET; MEASUREMENT THEORY; NETWORK PROTOCOLS; NETWORK SECURITY;

EID: 44549084308     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2008.03.014     Document Type: Article
Times cited : (16)

References (35)
  • 1
    • 44549087754 scopus 로고    scopus 로고
    • D. Adkins, K. Lakshminarayanan, A. Perrig, I. Stoica, Towards a more functional and secure network infrastructure, Technical Report UCB/CSD-03-1242, University of California at Berkeley, 2003.
    • D. Adkins, K. Lakshminarayanan, A. Perrig, I. Stoica, Towards a more functional and secure network infrastructure, Technical Report UCB/CSD-03-1242, University of California at Berkeley, 2003.
  • 2
    • 21844450653 scopus 로고    scopus 로고
    • H. Balakrishnan, K. Lakshminarayanan, S. Ratnasamy, S. Shenker, I. Stoica, M. Walfish, A layered naming architecture for the Internet, in: Proceedings of the ACM SIGCOMM'04, August, 2004, pp. 343-352.
    • H. Balakrishnan, K. Lakshminarayanan, S. Ratnasamy, S. Shenker, I. Stoica, M. Walfish, A layered naming architecture for the Internet, in: Proceedings of the ACM SIGCOMM'04, August, 2004, pp. 343-352.
  • 3
    • 44549084789 scopus 로고    scopus 로고
    • C. Candolin, P. Nikander, IPv6 source addresses considered harmful, in: Proceedings of the Sixth Nordic Workshop on Secure IT Systems, November, 2001.
    • C. Candolin, P. Nikander, IPv6 source addresses considered harmful, in: Proceedings of the Sixth Nordic Workshop on Secure IT Systems, November, 2001.
  • 5
    • 44549087057 scopus 로고    scopus 로고
    • D. Crocker, Multiple Address service for transport (MAST): an extended proposal: draft-crocker-mast-01.txt, September, 2003, Work in progress, Expired in February, 2004.
    • D. Crocker, Multiple Address service for transport (MAST): an extended proposal: draft-crocker-mast-01.txt, September, 2003, Work in progress, Expired in February, 2004.
  • 6
    • 44549087809 scopus 로고    scopus 로고
    • J. Eriksson, M. Faloutsos, S. Krishnamurthy, PeerNet: pushing peer-to-peer down the stack, in: Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS'03), Springer-Verlag, Berkeley, CA, USA, February, 2003.
    • J. Eriksson, M. Faloutsos, S. Krishnamurthy, PeerNet: pushing peer-to-peer down the stack, in: Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS'03), Springer-Verlag, Berkeley, CA, USA, February, 2003.
  • 7
    • 44549085692 scopus 로고    scopus 로고
    • P. Francis, IPNL: a NAT-extended Internet architecture, in: Proceedings of the ACM SIGCOMM'01, San Diego, CA, USA, August, 2001.
    • P. Francis, IPNL: a NAT-extended Internet architecture, in: Proceedings of the ACM SIGCOMM'01, San Diego, CA, USA, August, 2001.
  • 8
    • 44549084144 scopus 로고    scopus 로고
    • A. Gurtov, D. Korzun, P. Nikander, Hi3: an efficient and secure networking architecture for mobile hosts, Technical Report TR-2005-2, HIIT, June, 2005.
    • A. Gurtov, D. Korzun, P. Nikander, Hi3: an efficient and secure networking architecture for mobile hosts, Technical Report TR-2005-2, HIIT, June, 2005.
  • 9
    • 84907687250 scopus 로고    scopus 로고
    • T.R. Henderson, J.M. Ahrenholz, J.H. Kim, Experience with the Host Identity Protocol for secure host mobility and multihoming, in: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC'03), March, 2003.
    • T.R. Henderson, J.M. Ahrenholz, J.H. Kim, Experience with the Host Identity Protocol for secure host mobility and multihoming, in: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC'03), March, 2003.
  • 10
    • 44549085590 scopus 로고    scopus 로고
    • M. Ishiyama, M. Kunishi, F. Teraoka, An analysis of mobility handling in LIN6, in: Proceedings of the International Symposium on Wireless Personal Multimedia Communications (WPMC'01), August, 2001.
    • M. Ishiyama, M. Kunishi, F. Teraoka, An analysis of mobility handling in LIN6, in: Proceedings of the International Symposium on Wireless Personal Multimedia Communications (WPMC'01), August, 2001.
  • 11
    • 44549083780 scopus 로고    scopus 로고
    • P. Jokela, P. Nikander, J. Melen, J. Ylitalo, J. Wall, Host Identity Protocol: achieving IPv4-IPv6 handovers without tunneling, in: Proceedings of the Evolute workshop 2003: "Beyond 3G Evolution of Systems and Services", November, 2003.
    • P. Jokela, P. Nikander, J. Melen, J. Ylitalo, J. Wall, Host Identity Protocol: achieving IPv4-IPv6 handovers without tunneling, in: Proceedings of the Evolute workshop 2003: "Beyond 3G Evolution of Systems and Services", November, 2003.
  • 12
    • 33750926061 scopus 로고    scopus 로고
    • M. Komu, S. Tarkoma, J. Kangasharju, A. Gurtov, Applying a cryptographic namespace to applications, in: Proceedings of the first ACM Workshop on Dynamic Interconnection of Networks (DIN 2005), ACM Press, Cologne, Germany, September, 2005.
    • M. Komu, S. Tarkoma, J. Kangasharju, A. Gurtov, Applying a cryptographic namespace to applications, in: Proceedings of the first ACM Workshop on Dynamic Interconnection of Networks (DIN 2005), ACM Press, Cologne, Germany, September, 2005.
  • 13
    • 33750349061 scopus 로고    scopus 로고
    • On scalability properties of the Hi3 control plane
    • Korzun D., and Gurtov A. On scalability properties of the Hi3 control plane. Computer Communications 29 17 (2006) 3591-3601
    • (2006) Computer Communications , vol.29 , Issue.17 , pp. 3591-3601
    • Korzun, D.1    Gurtov, A.2
  • 14
    • 44549083833 scopus 로고    scopus 로고
    • J. Laganier, L. Eggert, Host Identity Protocol (HIP) rendezvous extension: draft-ietf-hip-rvs-05, June, 2006, Work in progress, Expires in December, 2006.
    • J. Laganier, L. Eggert, Host Identity Protocol (HIP) rendezvous extension: draft-ietf-hip-rvs-05, June, 2006, Work in progress, Expires in December, 2006.
  • 15
    • 44549083384 scopus 로고    scopus 로고
    • J. Laganier, T. Koponen, L. Eggert, Host Identity Protocol (HIP) registration extension: draft-koponen-hip-registration-02, June 2006, Work in progress.
    • J. Laganier, T. Koponen, L. Eggert, Host Identity Protocol (HIP) registration extension: draft-koponen-hip-registration-02, June 2006, Work in progress.
  • 16
    • 44549086367 scopus 로고    scopus 로고
    • K. Lakshminarayanan, D. Adkins, A. Perrig, I. Stoica, On securing forwarding infrastructures: protecting the data plane from an untrusted control plane, 2005, unpublished manuscript.
    • K. Lakshminarayanan, D. Adkins, A. Perrig, I. Stoica, On securing forwarding infrastructures: protecting the data plane from an untrusted control plane, 2005, unpublished manuscript.
  • 17
    • 23944488798 scopus 로고    scopus 로고
    • J. Li, J. Stribling, T.M. Gil, R. Morris, M.F. Kaashoek, Comparing the performance of distributed hash tables under churn, in: Proceedings of the Third International Workshop on Peer-to-Peer Systems, 2004, pp. 87-99.
    • J. Li, J. Stribling, T.M. Gil, R. Morris, M.F. Kaashoek, Comparing the performance of distributed hash tables under churn, in: Proceedings of the Third International Workshop on Peer-to-Peer Systems, 2004, pp. 87-99.
  • 18
    • 44549086563 scopus 로고    scopus 로고
    • D. Liben-Nowell, H. Balakrishnan, D. Karger, Observations on the dynamic evolution of peer-to-peer networks, in: Proceedings of the First Workshop on P2P Systems and Technologies, Cambridge, MA, March, 2002.
    • D. Liben-Nowell, H. Balakrishnan, D. Karger, Observations on the dynamic evolution of peer-to-peer networks, in: Proceedings of the First Workshop on P2P Systems and Technologies, Cambridge, MA, March, 2002.
  • 19
    • 44549083085 scopus 로고    scopus 로고
    • R. Moskowitz, P. Nikander, Host Identity Protocol architecture, RFC 4423, IETF, May, 2006.
    • R. Moskowitz, P. Nikander, Host Identity Protocol architecture, RFC 4423, IETF, May, 2006.
  • 20
    • 44549087787 scopus 로고    scopus 로고
    • R. Moskowitz, P. Nikander, P. Jokela, T.R. Henderson, Host Identity Protocol: draft-ietf-hip-base-10, October, 2007, Work in progress, Expires in May, 2008.
    • R. Moskowitz, P. Nikander, P. Jokela, T.R. Henderson, Host Identity Protocol: draft-ietf-hip-base-10, October, 2007, Work in progress, Expires in May, 2008.
  • 21
    • 44549085219 scopus 로고    scopus 로고
    • P. Nikander, J. Arkko, Delegation of signalling rights, in Proceedings of the 10th International Workshop on Security Protocols, Springer, Cambridge, UK, April, 2002, pp. 203-212.
    • P. Nikander, J. Arkko, Delegation of signalling rights, in Proceedings of the 10th International Workshop on Security Protocols, Springer, Cambridge, UK, April, 2002, pp. 203-212.
  • 22
    • 44549087184 scopus 로고    scopus 로고
    • P. Nikander, J. Arkko, T. Henderson, End-host mobility and multi-homing with host identity protocol: draft-ietf-hip-mm-05, March, 2007, Work in progress, Expires September, 2007.
    • P. Nikander, J. Arkko, T. Henderson, End-host mobility and multi-homing with host identity protocol: draft-ietf-hip-mm-05, March, 2007, Work in progress, Expires September, 2007.
  • 23
    • 44549088020 scopus 로고    scopus 로고
    • P. Nikander, J. Arkko, B. Ohlman, Host identity indirection infrastructure (hi3), in: The Second Swedish National Computer Networking Workshop, November, 2004.
    • P. Nikander, J. Arkko, B. Ohlman, Host identity indirection infrastructure (hi3), in: The Second Swedish National Computer Networking Workshop, November, 2004.
  • 24
    • 44549086435 scopus 로고    scopus 로고
    • P. Nikander, H. Tschofenig, X. Fu, T. Henderson, J. Laganier, Preferred alternatives for tunnelling HIP (PATH): draft-nikander-hip-path-01.txt, Work in progress, March, 2006.
    • P. Nikander, H. Tschofenig, X. Fu, T. Henderson, J. Laganier, Preferred alternatives for tunnelling HIP (PATH): draft-nikander-hip-path-01.txt, Work in progress, March, 2006.
  • 25
    • 44549083963 scopus 로고    scopus 로고
    • P. Nikander, J. Ylitalo, J. Wall, Integrating security, mobility, and multi-homing in a HIP way, in: Proceedings of the Network and Distributed Systems Security Symposium (NDSS'03), San Diego, CA, USA, Internet Society, February, 2003.
    • P. Nikander, J. Ylitalo, J. Wall, Integrating security, mobility, and multi-homing in a HIP way, in: Proceedings of the Network and Distributed Systems Security Symposium (NDSS'03), San Diego, CA, USA, Internet Society, February, 2003.
  • 26
    • 44549087056 scopus 로고    scopus 로고
    • J. Postel, S. Crocker, A possible protocol plateau. RFC 48, April, 1970.
    • J. Postel, S. Crocker, A possible protocol plateau. RFC 48, April, 1970.
  • 27
    • 44549083498 scopus 로고    scopus 로고
    • J. Rosenberg, J. Weinberger, C. Huitema, R. Mahy, STUN: simple traversal of user datagram protocol (UDP) through network address translators (NATs), RFC 3489, IETF, March, 2003.
    • J. Rosenberg, J. Weinberger, C. Huitema, R. Mahy, STUN: simple traversal of user datagram protocol (UDP) through network address translators (NATs), RFC 3489, IETF, March, 2003.
  • 28
    • 33744901134 scopus 로고    scopus 로고
    • I. Stoica, D. Adkins, S. Zhuang, S. Shenker, S. Surana, Internet indirection infrastructure, in: Proceedings of the ACM SIGCOMM'02, Pittsburgh, PA, USA, August, 2002, pp. 73-88.
    • I. Stoica, D. Adkins, S. Zhuang, S. Shenker, S. Surana, Internet indirection infrastructure, in: Proceedings of the ACM SIGCOMM'02, Pittsburgh, PA, USA, August, 2002, pp. 73-88.
  • 29
    • 44549088406 scopus 로고    scopus 로고
    • I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, Chord: a scalable peer-to-peer lookup service for Internet applications, in: Proceedings of the ACM SIGCOMM'01, San Diego, CA, USA, August, 2001.
    • I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, Chord: a scalable peer-to-peer lookup service for Internet applications, in: Proceedings of the ACM SIGCOMM'01, San Diego, CA, USA, August, 2001.
  • 30
    • 44549085759 scopus 로고    scopus 로고
    • H. Tschofenig, M. Shanmugam, Traversing HIP-aware NATs and Firewalls: problem statement and requirements: draft-tschofenig-hiprg-hip-natfw-traversal-04, March, 2006.
    • H. Tschofenig, M. Shanmugam, Traversing HIP-aware NATs and Firewalls: problem statement and requirements: draft-tschofenig-hiprg-hip-natfw-traversal-04, March, 2006.
  • 31
    • 44549083779 scopus 로고    scopus 로고
    • M. Walfish, H. Balakrishnan, The location/identity split is useful for middleboxes, too, in: Proceedings of the Workshop on HIP and Related Architectures, November, 2004.
    • M. Walfish, H. Balakrishnan, The location/identity split is useful for middleboxes, too, in: Proceedings of the Workshop on HIP and Related Architectures, November, 2004.
  • 32
    • 84871284967 scopus 로고    scopus 로고
    • M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, S. Shenker, Middleboxes no longer considered harmful, in: Proceedings of the 7th USENIX Symposium on Operating System Design and Implementation (OSDI 2004), ACM Press, San Fransisco, CA, USA, December, 2004.
    • M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, S. Shenker, Middleboxes no longer considered harmful, in: Proceedings of the 7th USENIX Symposium on Operating System Design and Implementation (OSDI 2004), ACM Press, San Fransisco, CA, USA, December, 2004.
  • 33
    • 35048904232 scopus 로고    scopus 로고
    • J. Ylitalo, J. Melen, P. Nikander, V. Torvinen, Re-thinking security in IP based micro-mobility, in: Proceedings of 7th Information Security Conference (ISC04), September, 2004.
    • J. Ylitalo, J. Melen, P. Nikander, V. Torvinen, Re-thinking security in IP based micro-mobility, in: Proceedings of 7th Information Security Conference (ISC04), September, 2004.
  • 34
    • 44549088854 scopus 로고    scopus 로고
    • J. Ylitalo, P. Nikander, BLIND: a complete identity protection framework for end-points, in: Proceedings of the Twelfth International Workshop on Security Protocols, April, 2004.
    • J. Ylitalo, P. Nikander, BLIND: a complete identity protection framework for end-points, in: Proceedings of the Twelfth International Workshop on Security Protocols, April, 2004.
  • 35
    • 44549083011 scopus 로고    scopus 로고
    • J. Ylitalo, P. Nikander, A new name space for end-points: implementing secure mobility and multi-homing across the two versions of IP, in: Proceedings of the fifth European Wireless Conference, Mobile and Wireless Systems beyond 3G (EW2004), February, 2004, pp. 435-441.
    • J. Ylitalo, P. Nikander, A new name space for end-points: implementing secure mobility and multi-homing across the two versions of IP, in: Proceedings of the fifth European Wireless Conference, Mobile and Wireless Systems beyond 3G (EW2004), February, 2004, pp. 435-441.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.