DocumentCode
1952953
Title
The Host Identity Protocol (HIP): Bringing mobility, multi- homing, and baseline security together
Author
Nikander, Pekka
Author_Institution
Ericsson Research, Finland
fYear
2007
fDate
17-21 Sept. 2007
Firstpage
518
Lastpage
519
Abstract
The Host Identity Protocol (HIP) is an experimental architecture and protocol, being developed at the IETF since 1999 and reaching its first stable version in 2007. It enhances the original Internet architecture by injecting a new thin layer between the IP layer and the transport protocols. This new layer introduces a new name space consisting of cryptographic identifiers, thereby implementing the so-called identifier / locator split. In the new architecture, the new identifiers are used for naming application level end-points, thereby taking the prior identification role of IP addresses in applications, sockets, TCP connections, and UDP send and receive system calls. IPv4 and IPv6 addresses are still used, but only as names for topological locations in the network. At the same time, due to the backwards compatibility mode, no changes are needed in applications. The architectural enhancement implemented by HIP has profound consequences. A number of the previously hard problems become suddenly much easier. Mobility, multi-homing, and baseline end-to-end security integrate neatly into the architecture. The use of cryptographic identifiers allows enhanced accountability, thereby providing a base for easier build up of trust. With some privacy enhancements, HIP allows good location anonymity, assuring strong identity only towards relevant trusted parties. Finally, the HIP protocol has been carefully designed to take middle boxes into account, providing for overlay networks and thereby helping to reduce the currently prevalent problems with bad traffic and routing scalability. This tutorial provides an in-depth look at HIP, discussing its architecture, design, benefits, and potential drawbacks. In the first part of the tutorial, the architecture and design of HIP is discussed in an interactive but lecture-like manner. In the second part of the tutorial the protocol will be demonstrated in practise. The audience is assumed to have good knowledge about the current Internet- architecture and the structure of the TCP/IP stack. However, no knowledge of HIP or the related problems are assumed.
Keywords
Cryptographic protocols; Cryptography; Hip; Internet; Privacy; Routing protocols; Security; Sockets; TCPIP; Transport protocols;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on
Conference_Location
Nice, France
Print_ISBN
978-1-4244-0974-7
Electronic_ISBN
978-1-4244-0975-4
Type
conf
DOI
10.1109/SECCOM.2007.4550376
Filename
4550376
Link To Document