Traversing Middleboxes with the Host Identity Protocol

نویسندگان

  • Hannes Tschofenig
  • Andrei V. Gurtov
  • Jukka Ylitalo
  • Aarthi Nagarajan
  • Murugaraj Shanmugam
چکیده

The limited flexibility of the Internet to support mobility has motivated many researchers to look for alternative architectures. One such effort that combines security and multihoming together is the Host Identity Protocol (HIP). HIP is a signaling protocol that adds a new protocol layer to the Internet stack between the transport and the network layer. HIP establishes IPsec associations to protect subsequent data traffic. Though the security associations are established solely between the communicating end hosts, HIP also aims to interwork with middleboxes such as NATs and firewalls. This paper investigates this interworking aspect and proposes a solution for secure middlebox traversal.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Working Group Nat and Firewall Traversal Issues of Host Identity Protocol (hip) Communication Status of This Memo

The Host Identity Protocol (HIP) changes the way in which two Internet hosts communicate. One key advantage over other schemes is that HIP does not require modifications to the traditional networklayer functionality of the Internet, i.e., its routers. In the current Internet, however, many devices other than routers modify the traditional network-layer behavior of the Internet. These "middlebox...

متن کامل

Middlebox Traversal of HIP Communication

The Host Identity Protocol (HIP) fundamentally changes the way two hosts in the Internet communicate. One key advantage over other schemes is that HIP does not require any modifications to the traditional network-layer functionality of the Internet, i.e., its routers. HIP deployment should therefore be transparent. In the current Internet, however, many devices other than routers may affect the...

متن کامل

An Overlay Internetworking Architecture for Ambient Networks

Several different internetworking architectures are being discussed within the Ambient Networks (AN) project. This paper describes the Overlay architecture. Its name is derived from the use of an overlay control plane that allows for internetworking between different network technologies, as well as for control of functionality that is today found in different and sometimes proprietary middlebo...

متن کامل

Rfc 3234

This document is intended as part of an IETF discussion about "middleboxes" defined as any intermediary box performing functions apart from normal, standard functions of an IP router on the data path between a source host and destination host. This document establishes a catalogue or taxonomy of middleboxes, cites previous and current IETF work concerning middleboxes, and attempts to identify s...

متن کامل

Detecting Cellular Middleboxes Using Passive Measurement Techniques

The Transmission Control Protocol (TCP) follows the endto-end principle – when a client establishes a connection with a server, the connection is only shared by two physical machines, the client and the server. In current cellular networks, a myriad of middleboxes disregard the end-to-end principle to enable network operators to deploy services such as content caching, compression, and protocol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005