Host Identity Protocol (HIP) : Towards the Secure Mobile Internet - Andrei Gurtov

Host Identity Protocol (HIP)

Towards the Secure Mobile Internet

By: Andrei Gurtov

Hardcover | 20 June 2008 | Edition Number 1

At a Glance

Hardcover


$216.75

or 4 interest-free payments of $54.19 with

 or 

Aims to ship in 10 to 15 business days

<b>&#8220;Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.&#8221; -</b> Jari Arkko, <i>Internet Area Director, IETF</i>&#160; <p> One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HIP) is being developed by the Internet Engineering Task Force (IETF) as an integrated solution to these problems. The book presents a well-structured, readable and compact overview of the core protocol with relevant extensions to the Internet architecture and infrastructure. The covered topics include the Bound End-to-End Tunnel Mode for IPsec, Overlay Routable Cryptographic Hash Identifiers, extensions to the Domain Name System, IPv4 and IPv6 interoperability, integration with SIP, and support for legacy applications. <p> <i>Unique features of the book:</i> <ul type="disc"> <li>All-in-one source for HIP specifications <li>Complete coverage of HIP architecture and protocols <li>Base exchange, mobility and multihoming extensions <li>Practical snapshots of protocol operation <li>IP security on lightweight devices <li>Traversal of middleboxes, such as NATs and firewalls <li>Name resolution infrastructure <li>Micromobility, multicast, privacy extensions <li>Chapter on applications, including HIP pilot deployment in a Boeing factory <li>HOWTO for HIP on Linux (HIPL) implementation &#160; </ul> <p> An important compliment to the official IETF specifications, this book will be a valuable reference for practicing engineers in equipment manufacturing companies and telecom operators, as well as network managers, network engineers, network operators and telecom engineers. Advanced students and academics, IT managers, professionals and operating system specialists will also find this book of interest.
Industry Reviews
"I recommend this book to all software writers and engineers who are working in the context of mobile IP, IPv6, and the future internet. Graduate and advanced undergraduate students who are interested in discovering a practical and challenging application of identity management models and cryptographic protocols will also benefit from this book." (Computing Reviews, May 5, 2009)

More in Electronics & Communications Engineering

Engineering Drawing + Sketchbook : 8th Edition - A. W. Boundy

RRP $114.95

$108.75

Electrical Wiring Practice : 9th Edition - Keith Pethebridge

Not Supplied By Publisher

RRP $164.95

$151.25

Ethics in Human-like Robots - Kamil Mamak
Digital SLR Cameras and Photography For Dummies : 5th Edition - David D. Busch
CTS Certified Technology Specialist Exam Guide, Third Edition - NA AVIXA Inc.
Hooked : How to Build Habit-Forming Products - Nir Eyal