2013
DOI: 10.1587/transinf.e96.d.226
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of Security for HIMALIS Architecture of Future Networks

Abstract: SUMMARYFor flexibility in supporting mobility and multihoming in edge networks and scalability of the backbone routing system, future Internet is expected to be based on the concept of ID/locator split. Heterogeneity Inclusion and Mobility Adaptation through Locator ID Separation (HIMALIS) has been designed as a generic future network architecture based on ID/locator split concept. It can natively support mobility, multihoming, scalable backbone routing and heterogeneous protocols in the network layer of the n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…In the current HIMALIS implementation, we have implemented the name registries by extending the bind version 9.8.2, they support a DNS-like hierarchical directory service. After the host obtains the destination host ID, locators, and public key, it initiates the signaling process to securely establish a session in the identity layer, also referred to as an ID session, in a secure manner [7]. Then, a session manager process generated by the signaling process maintains the hostname, ID, locator, and session key in the ID-to-locator mapping table.…”
Section: Himalis Network Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…In the current HIMALIS implementation, we have implemented the name registries by extending the bind version 9.8.2, they support a DNS-like hierarchical directory service. After the host obtains the destination host ID, locators, and public key, it initiates the signaling process to securely establish a session in the identity layer, also referred to as an ID session, in a secure manner [7]. Then, a session manager process generated by the signaling process maintains the hostname, ID, locator, and session key in the ID-to-locator mapping table.…”
Section: Himalis Network Architecturementioning
confidence: 99%
“…In HIMALIS communication, to establish an identity-layer supporting secure data path between hosts, the host sends a session initiation request to the destination host. In the session initiation process, the destination host first verifies the existence of the source host by using name resolution process and then exchanges a session key to protect communication (see [7] for more detail). For every packet to send, the TUN/TAP module obtains multiple locators from the ID-to-LocList mapping table corresponding to the destination host ID and provides them to the router module.…”
Section: Loclist Mapping Tablementioning
confidence: 99%
“…The HIMALIS which natively supports mobility, multi-homing, scalable backbone routing, and security of the data and control plane, is a representative generic architecture for the ID/locator split concept [7]. In the HIMALIS architecture, each host possesses its hostname and identifier (ID), and obtains its local locator (LLoc) and global locator (GLoc) from its edge network [7].…”
Section: Himalis Architecturementioning
confidence: 99%
“…In the HIMALIS architecture, each host possesses its hostname and identifier (ID), and obtains its local locator (LLoc) and global locator (GLoc) from its edge network [7]. (The HIMALIS architecture allows each host to maintain multiple hostnames and IDs.…”
Section: Himalis Architecturementioning
confidence: 99%
See 1 more Smart Citation