search query: @instructor Lindqvist, Janne / total: 16
reference: 12 / 16
Author: | Zhou, Bing |
Title: | Opportunistic Security of Host Identity Protocol |
Publication type: | Master's thesis |
Publication year: | 2006 |
Pages: | 8 + 48 s. + liitt. 25 s. Language: eng |
Department/School: | Tietotekniikan osasto |
Main subject: | Tietokoneverkot (T-110) |
Supervisor: | Ylä-Jääski, Antti |
Instructor: | Lindqvist, Janne |
OEVS: | Electronic archive copy is available via Aalto Thesis Database.
Instructions Reading digital theses in the closed network of the Aalto University Harald Herlin Learning CentreIn the closed network of Learning Centre you can read digital and digitized theses not available in the open network. The Learning Centre contact details and opening hours: https://learningcentre.aalto.fi/en/harald-herlin-learning-centre/ You can read theses on the Learning Centre customer computers, which are available on all floors.
Logging on to the customer computers
Opening a thesis
Reading the thesis
Printing the thesis
|
Location: | P1 Ark Aalto | Archive |
Keywords: | HI HIP HIPL HIT HIP security |
Abstract (eng): | Host Identity Protocol (HIP) is a proposal to decouple the host identifier from locator in the Internet protocol stack. HIP securely provides mobility and multi-homing. HIP introduces the Host Identity name space, which is consisted of Host Identifiers (HIs). Host Identity Tag (HIT) is a 128-bit hashed encoding from HI and it is used to represent the Host Identity. The goal of this thesis was to design and implement the HIP opportunistic mode to enhance the functionality of HIP for Linux (HIPL). The opportunistic mode provides the opportunity to use HIP when the Responder's HIT is not prior known to the Initiator. New data structure and database are introduced to handle the HIT request. In addition, the modifications of libinet6 resolver library are carried out in order to support the opportunistic mode. The modifications are performed by wrapping several socket API functions. The implementation is tested and verified against the evaluation criteria, and it fulfils the functional requirements. The opportunistic mode con-figuration mechanism is provided, and the configuration can be executed during source code compilation and application runtime. Handling the consecutive opportunistic mode base exchange is implemented by introducing a database to store the received Responder's HITs. Finally, the further study and development on opportunistic mode are outlined. |
ED: | 2006-09-12 |
INSSI record number: 32373
+ add basket
INSSI