|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910830105703321 |
|
|
Autore |
Gurtov Andrei |
|
|
Titolo |
Host Identity Protocol (HIP) : towards the secure mobile Internet / / Andrei Gurtov |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Chichester, U.K. : , : Wiley, , 2008 |
|
[Piscataqay, New Jersey] : , : IEEE Xplore, , [2008] |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-281-84107-2 |
9786611841072 |
0-470-77289-1 |
0-470-77290-5 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (323 p.) |
|
|
|
|
|
|
Collana |
|
Wiley series on communications networking & distributed systems |
Wiley series in communications networking & distributed systems |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Wireless Internet - Security measures |
Host Identity Protocol (Computer network protocol) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Foreword / Jari Arkko -- Foreword / David Hutchison -- Introduction to network security -- Architectural overview -- Base protocol -- Main extensions -- Advanced extensions -- Performance measurements -- Lightweight HIP -- Infrastructure support -- Middlebox traversal -- Name resolution -- Micromobility -- Communication privacy -- Possible HIP applications -- Application interface -- Integrating HIP with other protocols -- Installing and using HIP. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
"Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it." - Jari Arkko, Internet Area Director, IETF One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HI |
|
|
|
|
|
|
|