I. Ahmad, M. Liyanage, M. Ylianttila and A. Gurtov, "Analysis of deployment challenges of Host Identity Protocol," 2017 European Conference on Networks and Communications (EuCNC), Oulu, 2017, pp. 1-6. doi: 10.1109/EuCNC.2017.7980675
Analysis of deployment challenges of Host Identity Protocol
|Author:||Ahmad, Ijaz1; Liyanage, Madhusanka1; Ylianttila, Mika1;|
1Centre for Wireless Communications (CWC), University of Oulu, Finland
2Department of Computer and Information Science, Linköping University, SE-581 83 Linköping, Sweden
|Online Access:||PDF Full Text (PDF, 3.2 MB)|
|Persistent link:|| http://urn.fi/urn:nbn:fi-fe2018073133162
Institute of Electrical and Electronics Engineers,
|Publish Date:|| 2018-07-31
Host Identity Protocol (HIP), a novel internetworking technology proposes separation of the identity-location roles of the Internet Protocol (IP). HIP has been successful from the technological perspectives for network security and mobility, however, it has very limited deployment. In this paper we assess HIP to find the reasons behind its limited deployment and highlight the challenges faced by HIP for its commercial use. We propose technological development and outline deployment strategies for the wide use of HIP. Furthermore, this paper investigates the use of HIP in Software Defined Networks (SDN) to evaluate its performance in new disruptive networking technologies. In a nutshell, this paper presents revealing challenges for the deployment of innovative networking protocols and a way ahead for successful and large scale deployment.
|Pages:||1 - 6|
2017 European Conference on Networks and Communications (EuCNC), 12-15 June 2017, Oulu, Finland : 5G - European Roadmap, Global Impact
European Conference on Networks and Communications
|Type of Publication:||
A4 Article in conference proceedings
|Field of Science:||
213 Electronic, automation and communications engineering, electronics
This work was supported by TEKES Finland and Academy of Finland under projects: The Naked Approach, Towards Digital Paradise and SecureConnect. Andrei Gurtov was supported by the Center for Industrial Information Technology (CENIIT).
© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.