scholarly journals Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks

2009 ◽  
Vol 2009 ◽  
pp. 1-6
Author(s):  
Maher Ben Jemaa ◽  
Nahla Abid ◽  
Maryline Laurent-Maknavicius ◽  
Hakima Chaouchi

The role of Internet Protocol (IP) is becoming more and more problematic especially with the new requirements of mobility and multihoming. Host Identity protocol (HIP) defines a new protocol between the network and transport layers in order to provide a better management to those requirements. The protocol defines a new namespace based on cryptographic identifiers which enable the IP address roles dissociation. Those new identifiers identify hosts rather than IP addresses. Because HIP is a quite recent protocol, we propose to present an experimental evaluation of its basic characteristics.

2015 ◽  
Vol 7 (3) ◽  
pp. 1-23 ◽  
Author(s):  
Benjamin Edelman ◽  
Michael Schwarz

We consider market rules for transferring IP addresses, numeric identifiers required by all computers connected to the Internet. Transfers usefully move resources from lowest- to highest-valuation networks, but transfers tend to cause socially costly growth in the Internet's routing table. We propose a market rule that avoids excessive trading and comes close to achieving social efficiency. We argue that this rule is feasible despite the limited powers of central authorities. We also offer a framework for reasoning about future prices of IP addresses, then explore the role of rentals in sharing information about the value of IP address and assuring allocative efficiency. (JEL D47, D82, D85, L86)


Author(s):  
Amir K.C ◽  
Harri Forsgren ◽  
Kaj Grahn ◽  
Timo Karvi ◽  
Göran Pulkkis

Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP connection, messages are signed with private keys and verified with public keys. Even if this system is quite secure, there is some vulnerability concerning the authenticity of public keys. The authors examine some possibilities to derive trust in public parameters. These are DNSSEC and public key certificates (PKI). Especially, the authors examine how to implement certificate handling and what is the time complexity of using and verifying certificates in the HIP Base Exchange. It turned out that certificates delayed the HIP Base Exchange only some milliseconds compared to the case where certificates are not used. In the latter part of our article the authors analyze four proposed HIP multicast models and how they could use certificates. There are differences in the models how many times the Base Exchange is performed and to what extent existing HIP specification standards must be modified.


2018 ◽  
Author(s):  
Juan Sebastian Mejia Vallejo ◽  
Daniel Lazkani Feferman ◽  
Christian Esteve Rothenberg

A short-term solution for the depletion of Internet Protocol (IP) addresses and scaling problems in network routing is the reuse of IP address by placing Network Address Translators (NAT) at the borders of stub domains. In this article, we propose an implementation of NAT using Programming ProtocolIndependent Packet Processors (P4) language, taking advantage of its features such as target-agnostic dataplane programmability. Through the MACSAD framework, we generate a software switch that achieves high performance with the support of different hardware (H/W) and Software (S/W) platforms. The main contributions of this paper relate to the performance evaluation results of the NAT implementation using P4 language with MACSAD compiler.


2020 ◽  
Vol 10 (6) ◽  
pp. 2144
Author(s):  
Chan Haeng Lee ◽  
Ji Su Park

In upcoming smart urban environments, various things can be interconnected, and the Internet of Things (IoT) can be used to construct a safer and more convenient urban environment. Things in the IoT need an addressing system that can uniquely identify each one; internet protocol (IP) addresses can be used for this purpose. The IP address the two roles of an identifier and a locator. However, this binding has problems related to mobility and multihoming, and it is hard to deploy on a legacy IP system because of some limitations of sensor devices. To solve the problem, we propose a design for software-defined networking (SDN)-based identifier–locator separation architecture on IoT networks. In the proposed scheme, Internet Protocol version 6(IPv6)-based addresses are used for the identifiers and locators. The network is partitioned into a host identity domain for local routing and an IP domain for global routing. The host identity domain operates as an overlaid network over the IP domain, and it makes the unrouteable identifiers routable with a distributed hash table (DHT)-based routing strategy. For the evaluation of the proposed scheme, a packet forwarding cost and signaling cost model is calculated, and the results show that the proposed scheme is conjugable to an IoT network environment.


2018 ◽  
Vol 10 (2) ◽  
pp. 74-94 ◽  
Author(s):  
Jonathan McKeague ◽  
Kevin Curran

The Internet is built atop the Internet Protocol (IP) which has at its heart a unique identifier known as an IP address. Knowing the location of an IP address can be very useful in many situations such as for banks to know if a connection is in progress from online fraud hotspots. IP addresses can be spoofed allowing hackers to bypass geographical IP restrictions and thus render some category of fraud prevention useless. Anonymous proxies (AP) which act as intermediate relays which disguise the source IP addresses can play a large role in cybercrime. There is a need to ascertain whether an incoming IP connection is an original source matched IP address, or one being routed through an anonymising proxy. This article concentrates on various methods used by anonymising proxies, the characteristics of the anonymous proxies and the potential mechanisms available to detect if a proxy is in use.


Author(s):  
Do Van Tien

Dynamic Host Configuration Protocol (DHCP) allows the automatic networking configuration of computers and devices (clients) in Internet Protocol (IP) networks. It is used by clients to request an IP address and obtain configuration parameters (netmask, router IP address, Domain Name Server –DNS– address etc.) for IP networking from a DHCP server. For this purpose, a pool of IP addresses is administered and maintained in a DHCP server. In order to reuse an IP address that is no longer needed by the client to which it was assigned, a lease time parameter is applied. That is, each client leases an IP address from the chosen DHCP server for a limited period of time.


2007 ◽  
pp. 80-92
Author(s):  
A. Kireev

The paper studies the problem of raiders activity on the market for corporate control. This activity is considered as a product of coercive entrepreneurship evolution. Their similarities and sharp distinctions are shown. The article presents the classification of raiders activity, discribes its basic characteristics and tendencies, defines the role of government in the process of its transformation.


2013 ◽  
pp. 98-110
Author(s):  
M. Likhachev

Behavioral models are considered in the paper as the link between the description of the institutional structure of the economic system and the formation of macro-aggregates, reflecting the results of its operations. The degree of homogeneity of the private sector’s economic environment and complementary goals of private entities and government regulation are noted as basic characteristics of behavioral models. The author examines the differences in the estimates of these characteristics as one of the most important factors underpinning the architecture of modern macroeconomic models and their practical implications.


Author(s):  
Irene Spagna

This chapter analyzes the growth of OTC derivatives before the global financial crisis of 2008 and the role of credit default swaps, in particular, in the near collapse of the global economy. It begins by exploring the basic characteristics of derivatives used as risk management instruments by investors to hedge against or exploit the volatility of asset prices. The analysis further reveals that the pre-crisis period was characterized by a broad-based consensus favoring deregulated markets and globally designed private rules. While not always unanimously supported, permissive public regulatory choices were often encouraged by interest group lobbying, the market-friendly views of many domestic authorities, and concerns about regulatory uncertainty and international competitiveness.


Sign in / Sign up

Export Citation Format

Share Document