About the Author |
Foreword / Jari Arkko |
Preface / David Hutchison |
Acknowledgments |
Abbreviations |
Introduction / Part I: |
Overview / Chapter 1: |
Identifiera locatorsplit / 1.1: |
HIPin the Internet architecture / 1.2: |
Brief history of HIP / 1.3: |
Organization of the book / 1.4: |
Introduction to network security / Chapter 2: |
Goals of cryptographic protocols / 2.1: |
Basics and terminology / 2.2: |
Attacktypes / 2.3: |
Defense mechanisms / 2.4: |
Security protocols / 2.5: |
Weak authentication techniques / 2.6: |
Secure DNS / 2.7: |
The Host Identity Protocol / Part II: |
Architectural overview / Chapter 3: |
Internet namespaces / 3.1: |
Methods of identifying a host / 3.2: |
Over lay Routable Cryp to graphic Has Identifiers / 3.3: |
Baseprotocol / Chapter 4: |
Base exchange / 4.1: |
Other HIP control packets / 4.2: |
IPsec encapsulation / 4.3: |
Main extensions / Chapter 5: |
Mobility and multihoming / 5.1: |
Rendezvous server / 5.2: |
DNS extensions / 5.3: |
Registration protocol / 5.4: |
Advanced extensions / Chapter 6: |
Opportunistic mode / 6.1: |
Piggy backing transport headers to base exchange / 6.2: |
HIP service discovery / 6.3: |
Simultaneous multiaccess / 6.4: |
Disseminating HITs with a presence service / 6.5: |
Multicast / 6.6: |
Performance measurements / Chapter 7: |
HIP on Nokia Internet Tablet / 7.1: |
Experimental results / 7.2: |
Summary / 7.3: |
Lightweight HIP / Chapter 8: |
Security functionality of HIP / 8.1: |
HIP high-levelgoals / 8.2: |
LHIP design / 8.3: |
LHIP performance / 8.4: |
Discussion / 8.5: |
Infrastructure Support / Part III: |
Middlebox traversal / Chapter 9: |
Requirements for traversing legacy middle boxes / 9.1: |
Legacy NAT traversal / 9.2: |
Requirements for HIP-aware middleboxes / 9.3: |
HIP-aware firewall / 9.4: |
Name resolution / Chapter 10: |
Problem statement of naming / 10.1: |
Distributed Hash Tables / 10.2: |
HIP interface to Open DHT / 10.3: |
Overview of over lay networks / 10.4: |
Host Identity Indirection Infrastructure / 10.5: |
Separating control,data, andnaming / 10.5.1: |
Thedata plane / 10.5.2: |
The control plane / 10.5.3: |
Discussion of the Hi3 design / 10.5.4: |
Micromobility / Chapter 11: |
Local rendezvousservers / 11.1: |
Secure micromobility / 11.2: |
Network mobility / 11.3: |
Communication privacy / Chapter 12: |
SPINAT / 12.1: |
BLIND / 12.2: |
Anonymousidentifiers / 12.3: |
Applications / Part IV: |
Possible HIP applications / Chapter 13: |
Virtual Private Networking / 13.1: |
P2P Internet Sharing Architecture / 13.2: |
Inter operating IPv 4 and IPv 6 / 13.3: |
Secure Mobile Architecture / 13.4: |
Live application migration / 13.5: |
Network operator view point on HIP / 13.6: |
Application interface / Chapter 14: |
Using legacy applications with HIP / 14.1: |
API fornative HIP applications / 14.2: |
Integrating HIP with other protocols / Chapter 15: |
Generalized HIP / 15.1: |
The use of Session Initiation Protocol / 15.2: |
Encapsulating HIP data using SRTP / 15.3: |
Replacing HIP base exchange with IKEv2 / 15.4: |
Mobile IP and HIP / 15.5: |
HIP proxy for legacy hosts / 15.6: |
Installing and using HIP |
Bibliography |
Index |
About the Author |
Foreword / Jari Arkko |
Preface / David Hutchison |