期刊名称:International Journal of Innovative Research in Science, Engineering and Technology
印刷版ISSN:2347-6710
电子版ISSN:2319-8753
出版年度:2015
期号:NCET
页码:64
出版社:S&S Publications
摘要:Host Identity Protocol is Internetworking architecture and an associated set of protocols, developed atthe IETF since 1999 and reaching their first stable version in 2007. HIP enhances the original Internet architecture byadding a name space used between the IP layer and the transport protocols. This new name space consists ofcryptographic identifiers, thereby implementing the so-called identifier / locator split. In the new architecture, the newidentifiers are used in naming application level end-points (sockets), replacing the prior identification role of IPaddresses in applications, sockets, TCP connections, and UDP-based send and receive system calls. IPv4 and IPv6addresses are still used, but only as names for topological locations in the network. HIP can be deployed such that nochanges are needed in applications or routers. Almost all pre-compiled legacy applications continue to work, withoutmodifications, for communicating with both HIP-enabled and non-HIP-enabled peer hosts. The architecturalenhancement implemented by HIP has Profound consequences. A number of the previously hard networking problemsbecome suddenly much easier. Mobility, multihoming, and baseline end-to-end security integrate neatly into the newarchitecture. The use of cryptographic identifiers allows enhanced accountability, thereby providing a base for easierbuild up of trust. With privacy enhancements, HIP allows good location anonymity, assuring strong identity onlytowards relevant trusted parties. Finally, the HIP protocols have been carefully designed to take middle boxes intoaccount, providing for overlay networks and enterprise deployment concerns. This article provides an in-depth look atHIP, discussing its architecture, design, benefits, potential drawbacks, and ongoing work.