Opportunistic Security of Host Identity Protocol
No Thumbnail Available
URL
Journal Title
Journal ISSN
Volume Title
Helsinki University of Technology |
Diplomityö
Checking the digitized thesis and permission for publishing
Instructions for the author
Instructions for the author
Authors
Date
2006
Department
Major/Subject
Tietokoneverkot
Mcode
T-110
Degree programme
Language
en
Pages
8 + 48 s. + liitt. 25 s.
Series
Abstract
Host Identity Protocol (HIP) is a proposal to decouple the host identifier from locator in the Internet protocol stack. HIP securely provides mobility and multi-homing. HIP introduces the Host Identity name space, which is consisted of Host Identifiers (HIs). Host Identity Tag (HIT) is a 128-bit hashed encoding from HI and it is used to represent the Host Identity. The goal of this thesis was to design and implement the HIP opportunistic mode to enhance the functionality of HIP for Linux (HIPL). The opportunistic mode provides the opportunity to use HIP when the Responder's HIT is not prior known to the Initiator. New data structure and database are introduced to handle the HIT request. In addition, the modifications of libinet6 resolver library are carried out in order to support the opportunistic mode. The modifications are performed by wrapping several socket API functions. The implementation is tested and verified against the evaluation criteria, and it fulfils the functional requirements. The opportunistic mode con-figuration mechanism is provided, and the configuration can be executed during source code compilation and application runtime. Handling the consecutive opportunistic mode base exchange is implemented by introducing a database to store the received Responder's HITs. Finally, the further study and development on opportunistic mode are outlined.Description
Supervisor
Ylä-Jääski, AnttiThesis advisor
Lindqvist, JanneKeywords
HI, HIP, HIPL, HIT, HIP security