By Topic

Applying host identity protocol to tactical networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Sarela, M. ; Theor. Comput. Sci. Dept., Helsinki Univ. of Technol., Espoo, Finland ; Nikander, P.

We describe the current status of the host identity protocol and discuss how it could be applied to tactical networks, including mobile ad hoc networks. The host identity protocol (HIP) is a protocol proposal at the IETF for separating the end-point identifier and locator nature of IP addresses. It introduces a new name space, consisting of public cryptographic keys, and uses these keys to identify hosts. All applications deal with the public keys instead of IP addresses; with a backward compatibility layer, most current applications continue to work unchanged. A new layer in the kernel dynamically maps the public keys in outgoing packets into IP addresses, and vice versa for incoming packets.

Published in:

Military Communications Conference, 2004. MILCOM 2004. 2004 IEEE  (Volume:2 )

Date of Conference:

31 Oct.-3 Nov. 2004