scholarly journals Gut microbiomes of sympatric Amazonian wood‐eating catfishes (Loricariidae) reflect host identity and little role in wood digestion

2020 ◽  
Vol 10 (14) ◽  
pp. 7117-7128
Author(s):  
Mark McCauley ◽  
Donovan P. German ◽  
Nathan K. Lujan ◽  
Colin R. Jackson
Keyword(s):  
Author(s):  
László Bokor ◽  
Zoltán Faigl ◽  
Sándor Imre

This paper is committed to give an overview of the Host Identity Protocol (HIP), to introduce the basic ideas and the main paradigms behind it, and to make an exhaustive survey of mobility management schemes in the Host Identity Layer. The authors' goal is to show how HIP emerges from the list of potential alternatives with its wild range of possible usability, complex feature set and power to create a novel framework for future Mobile Internet architectures. In order to achieve this, the authors also perform an extensive simulation evaluation of four selected mobility solutions in the Host Identity Layer: the standard HIP mobility/multihoming (RFC5206), a micromobility solution (µHIP), a network mobility management scheme (HIP-NEMO) and a proactive, cross-layer optimized, distributed proposal designed for flat architectures (UFA-HIP).


2010 ◽  
Vol 1 (1) ◽  
pp. 79-94 ◽  
Author(s):  
Janne Lindqvist ◽  
Essi Vehmersalo ◽  
Miika Komu ◽  
Jukka Manner

Firewalls are an essential component of the Internet and enterprise network security policy enforcement today. The configurations of enterprise firewalls are typically rather static. Even if client’s IP addresses can be dynamically added to the packet filtering rules, the services allowed through the firewall are commonly still fixed. In this paper, we present a transparent firewall configuration solution based on mobile cryptographic identifiers of Host Identity Protocol (HIP). HIP allows a client to protect the data transfer with IPsec ESP, and supports dynamic address changes for mobile clients. The HIP-based firewall learns the identity of a client when it communicates with the server over HIP. The firewall configures the necessary rules based on HIP control messages passing through the firewall. The solution is secure and flexible, and introduces only minimal latency to the initial HIP connection establishment.


Author(s):  
Hannes Tschofenig ◽  
Andrei Gurtov ◽  
Jukka Ylitalo ◽  
Aarthi Nagarajan ◽  
Murugaraj Shanmugam

Author(s):  
Suneth Namal ◽  
Andrei Gurtov

This chapter discusses security and mobility aspects of femtocell networks, given protocol level descriptions in the subsections. The connectivity between FAP and core network has a high risk of being compromised. The chapter discusses how Host Identity Protocol (HIP) can be adapted in femtocell technology to improve security and mobility issues. This chapter presents several enhancements to the femtocell technology such as strong authentication, service registration, identity verification, and node multihoming. In addition, Encapsulating Security Payload (ESP) is used to provide confidentiality, data origin authentication, connectionless integrity, anti-replay service, and limited traffic flow confidentiality. Furthermore, enhanced mobility support by means of locator/identity separation and node multihoming is discussed in the scope of 3GPP femtocells.


2019 ◽  
Vol 107 (4) ◽  
pp. 1876-1889 ◽  
Author(s):  
Eric A. Griffin ◽  
Joshua G. Harrison ◽  
Steven W. Kembel ◽  
Alyssa A. Carrell ◽  
S. Joseph Wright ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document