Buy Host Identity Protocol (HIP) Book by Andrei Gurtov
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Science, Technology & Agriculture > Electronics and communications engineering > Communications engineering / telecommunications > Host Identity Protocol (HIP): Towards the Secure Mobile Internet(21 Wiley Series on Communications Networking & Distributed Systems)
Host Identity Protocol (HIP): Towards the Secure Mobile Internet(21 Wiley Series on Communications Networking & Distributed Systems)

Host Identity Protocol (HIP): Towards the Secure Mobile Internet(21 Wiley Series on Communications Networking & Distributed Systems)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area Director, IETF 

One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HIP) is being developed by the Internet Engineering Task Force (IETF) as an integrated solution to these problems. The book presents a well-structured, readable and compact overview of the core protocol with relevant extensions to the Internet architecture and infrastructure. The covered topics include the Bound End-to-End Tunnel Mode for IPsec, Overlay Routable Cryptographic Hash Identifiers, extensions to the Domain Name System, IPv4 and IPv6 interoperability, integration with SIP, and support for legacy applications.

Unique features of the book:

  • All-in-one source for HIP specifications
  • Complete coverage of HIP architecture and protocols
  • Base exchange, mobility and multihoming extensions
  • Practical snapshots of protocol operation
  • IP security on lightweight devices
  • Traversal of middleboxes, such as NATs and firewalls
  • Name resolution infrastructure
  • Micromobility, multicast, privacy extensions
  • Chapter on applications, including HIP pilot deployment in a Boeing factory
  • HOWTO for HIP on Linux (HIPL) implementation  

An important compliment to the official IETF specifications, this book will be a valuable reference for practicing engineers in equipment manufacturing companies and telecom operators, as well as network managers, network engineers, network operators and telecom engineers. Advanced students and academics, IT managers, professionals and operating system specialists will also find this book of interest.



Table of Contents:
About the Author.

Foreword. (Jari Arkko)

Foreword. (David Hutchison)

Preface.

Acknowledgments.

Abbreviations.

Part I Introduction.

Chapter 1: Overview.

1.1 Identifierâ??locatorsplit.

1.2 HIPin the Internetarchitecture.

1.3 BriefhistoryofHIP.

1.4 Organization of the book.

Chapter 2: Introduction to network security.

2.1 Goalsof cryptographicprotocols.

2.2 Basics andterminology.

2.3 Attacktypes.

2.4 Defensemechanisms.

2.5 Securityprotocols.

2.6 Weakauthenticationtechniques.

2.7 SecureDNS.

Part II The Host Identity Protocol.

Chapter 3: Architectural overview.

3.1 Internet namespaces.

3.2 Methods of identifying a host.

3.3 OverlayRoutableCryptographicHashIdentifiers.

Chapter 4: Baseprotocol.

4.1 Base exchange.

4.2 OtherHIPcontrolpackets.

4.3 IPsec encapsulation.

Chapter 5: Main extensions.

5.1 Mobility and multihoming.

5.2 Rendezvous server.

5.3 DNSextensions.

5.4 Registrationprotocol.

Chapter 6: Advanced extensions.

6.1 Opportunistic mode.

6.2 Piggybacking transport headers to base exchange.

6.3 HIPservicediscovery.

6.4 Simultaneous multiaccess.

6.5 DisseminatingHITswitha presenceservice.

6.6 Multicast.

Chapter 7: Performance measurements.

7.1 HIPonNokia InternetTablet.

7.2 Experimental results.

7.3 Summary.

Chapter 8: Lightweight HIP.

8.1 Security functionality of HIP.

8.2 HIPhigh-levelgoals.

8.3 LHIPdesign.

8.4 LHIPperformance.

8.5 Discussion.

Part III Infrastructure Support.

Chapter 9: Middlebox traversal.

9.1 Requirements for traversinglegacymiddleboxes.

9.2 LegacyNATtraversal.

9.3 Requirements forHIP-awaremiddleboxes.

9.4 HIP-awarefirewall.

Chapter 10: Name resolution.

10.1 Problemstatementofnaming.

10.2 DistributedHashTables.

10.3 HIPinterface toOpenDHT.

10.4 Overviewofoverlaynetworks.

10.5 Host Identity Indirection Infrastructure.

10.5.1 Separatingcontrol,data, andnaming.

10.5.2 Thedata plane.

10.5.3 Thecontrolplane.

10.5.4 Discussionof theHi3design.

Chapter 11: Micromobility.

11.1 Local rendezvousservers.

11.2 Secure micromobility.

11.3 Network mobility.

Chapter 12: Communication privacy.

12.1 SPINAT.

12.2 BLIND.

12.3 Anonymousidentifiers.

Part IV Applications.

Chapter 13: Possible HIP applications.

13.1 VirtualPrivateNetworking.

13.2 P2PInternetSharingArchitecture.

13.3 InteroperatingIPv4andIPv6.

13.4 SecureMobileArchitecture.

13.5 Liveapplicationmigration.

13.6 NetworkoperatorviewpointonHIP.

Chapter 14: Application interface.

14.1 UsinglegacyapplicationswithHIP.

14.2 API fornativeHIPapplications.

Chapter 15: Integrating HIP with other protocols.

15.1 GeneralizedHIP.

15.2 The use of Session Initiation Protocol.

15.3 EncapsulatingHIPdatausingSRTP.

15.4 ReplacingHIPbase exchangewithIKEv2.

15.5 MobileIPandHIP.

15.6 HIPproxyfor legacyhosts.

Installing and using HIP.

Bibliography.

Index.



About the Author :

Andrei Gurtov is a senior research scientist leading the Networking Research group at the Helsinki Institute for Information Technology focusing on the Host Identity Protocol and next generation Internet architecture. He received his M.Sc and Ph.D. degrees in Computer Science from the University of Helsinki, Finland. He co-chairs the IRTF research group on HIP and teaches as an adjunct professor at Telecommunications and Multimedia Laboratory of the Helsinki University of Technology.



Review :
"I recommend this book to all software writers and engineers who are working in the context of mobile IP, IPv6, and the future internet. Graduate and advanced undergraduate students who are interested in discovering a practical and challenging application of identity management models and cryptographic protocols will also benefit from this book." (Computing Reviews, May 5, 2009)


Best Sellers


Product Details
  • ISBN-13: 9780470772904
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Language: English
  • Series Title: 21 Wiley Series on Communications Networking & Distributed Systems
  • ISBN-10: 0470772905
  • Publisher Date: 15 Sep 2008
  • Binding: Digital (delivered electronically)
  • No of Pages: 332
  • Sub Title: Towards the Secure Mobile Internet


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Host Identity Protocol (HIP): Towards the Secure Mobile Internet(21 Wiley Series on Communications Networking & Distributed Systems)
John Wiley & Sons Inc -
Host Identity Protocol (HIP): Towards the Secure Mobile Internet(21 Wiley Series on Communications Networking & Distributed Systems)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Host Identity Protocol (HIP): Towards the Secure Mobile Internet(21 Wiley Series on Communications Networking & Distributed Systems)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!