Hi3: An efficient and secure networking architecture for mobile hosts

نویسندگان

  • Andrei V. Gurtov
  • Dmitry G. Korzun
  • Andrey Lukyanenko
  • Pekka Nikander
چکیده

The Host Identity Indirection Infrastructure (Hi3) is a networking architecture for mobile hosts, derived from the Internet Indirection Infrastructure (i3) and the Host Identity Protocol (HIP). Hi3 has efficient support for secure mobility and multihoming, which both are crucial for future Internet applications. In this paper, we describe and analyze Hi3 in detail. Compared to existing solutions, Hi3 achieves better resilience, scalability and security. Both our analysis and early measurements support the notion that Hi3 preserves the best of both approaches while improving performance compared to i3 and enhancing flexibility and security compared to HIP.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On scalability properties of the Hi3 control plane

The Host Identity Indirection Infrastructure (Hi3) is a general-purpose networking architecture, derived from the Internet Indirection Infrastructure (i3) and the Host Identity Protocol (HIP).Hi3 combines efficient and secure end-to-end data plane transmission of HIP with robustness and resilience of i3. The architecture is well-suited for mobile hosts given the support for simultaneous host mo...

متن کامل

On Supporting Multicast an

Recently, much effort was applied to enable secure multihoming and mobility for Internet hosts. The Host Identity Indirection Infrastructure (Hi3) is a proposal that combines benefits of Secure-i3 and the Host Identity Protocol (HIP). In this paper, we extend the Hi3 architecture to enable multicast traffic and describe the delegation mechanism in detail. A prototype implementation and prelimin...

متن کامل

An Architecture for Secure Wireless Networking*

As wireless networks are rapidly deployed, the security of wireless environments will be mandatory. Considering the inherent security limitations of Ad Hoc networks, we propose a new architecture: Hierarchical Hybrid networks for secure wireless networking. In such a network, wireless nodes are organized into groups. We present a secure communication scheme to defend against link attacks. Secur...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

An Enhanced MSS-based checkpointing Scheme for Mobile Computing Environment

Mobile computing systems are made up of different components among which Mobile Support Stations (MSSs) play a key role. This paper proposes an efficient MSS-based non-blocking coordinated checkpointing scheme for mobile computing environment. In the scheme suggested nearly all aspects of checkpointing and their related overheads are forwarded to the MSSs and as a result the workload of Mobile ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Communications

دوره 31  شماره 

صفحات  -

تاریخ انتشار 2008