skip to main content
10.1145/1186699.1186716acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

HIP location privacy framework

Published:01 December 2006Publication History

ABSTRACT

Privacy and security are key aspects in future network architectures. The Host Identity Protocol (HIP) is a new proposal which decouples identifiers from locators and may eventually replace conventional addressing and network transport. In this document we propose an architecture that provides location privacy, based on HIP. We further validate our work by implementation and support the feasibility of our protocol by experimentation.

References

  1. R. Moskowitz, "Host Identity Protocol." Internet Draft (Work in Progress), July 2006.Google ScholarGoogle Scholar
  2. R. Moskowitz, "Host Identity Protocol Architecture." RFC 4423 (Proposed Standard), may 2006.Google ScholarGoogle Scholar
  3. D. Clark et al., "Fara: reorganizing addressing architecture," 2003.Google ScholarGoogle Scholar
  4. W. Haddad, "Privacy for Mobile and Multi-homed Nodes: MoMiPriv Problem Statement." Internet Draft (Work in Progress), February 2005.Google ScholarGoogle Scholar
  5. W. Haddad, "Privacy for Mobile and Multi-homed Nodes: Formalizing the Threat Model." Internet Draft (Work in Progress), February 2005.Google ScholarGoogle Scholar
  6. D. Johnson, C. Perkins, and J. Arkko, "Mobility Support in IPv6." RFC 3775 (Proposed Standard), June 2004.Google ScholarGoogle Scholar
  7. T. Okagawa et al., "Ip packet routing mechanism based on mobility management in a ip based network," 8th International Conference on Intelligence in next generation networks, 2003.Google ScholarGoogle Scholar
  8. S. Schmidt et al., "Turfnet: An Architecture for dynamically composable networks," Proceedings in 1st IFIP TC6 WG6.6 Workshop on Autonomic Communication (WAC 2004), 2004.Google ScholarGoogle Scholar
  9. I. Stoica et al., "Internet indirection infrastructure," Proceedings in ACM SIGCOMM Conference (SIGCOMM'02), pp. 73--88, August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Ylitalo and P. Nikander, "Blind: A complete identity protection framework for end-points," Security Protocols, Twelfth International Workshop, 2004.Google ScholarGoogle Scholar
  11. R. Dingledine et al., "TOR: The second-generation onion router," Proceedings of 13th USENIX Security Symposyum, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. H. Soliman et al., "Hierarchical Mobile IPv6 Mobility Management (HMIPv6)." RFC 4140 (Proposed Standard), June 2004.Google ScholarGoogle Scholar
  13. P. Jokela, R. Moskowitz, and P. Nikander, "Using ESP transport format with HIP." Internet Draft (Work in Progress), June 2006.Google ScholarGoogle Scholar
  14. P. Nikander et al., "End-Host Mobility and Multi-Homing with Host Identity Protocol." Internet Draft (Work in Progress), June 2006.Google ScholarGoogle Scholar
  15. J. Laganier and L. Eggert, "Host Identity Protocol (HIP) Rendezvous Extensions." Internet Draft (Work in Progress), June 2006.Google ScholarGoogle Scholar
  16. M. Liebsch and L. Eggert, "Host Identity Protocol (HIP) Rendezvous Mechanisms." Internet Draft (Work in Progress), July 2004.Google ScholarGoogle Scholar
  17. A. Matos, J. Santos, J. Girao, M. Liebsch, and R. Aguiar, "Host Identity Protocol Location Privacy Extensions." Internet Draft (Work in Progress), March 2006.Google ScholarGoogle Scholar
  18. T. Koponen and L. Eggert, "Host Identity Protocol (HIP) Registration Extension." Internet Draft (Work in Progress), June 2006.Google ScholarGoogle Scholar
  19. T. Narten et al., "Neighbor Discovery for IP Version 6 (IPv6)." RFC 2461, December 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. "Infrastructure for hip, http://infrahip.hiit.fi/., Helsinki Instititute for Information Technology."Google ScholarGoogle Scholar

Index Terms

  1. HIP location privacy framework

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            MobiArch '06: Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture
            December 2006
            92 pages
            ISBN:1595935665
            DOI:10.1145/1186699

            Copyright © 2006 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 December 2006

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate47of92submissions,51%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader