Results 1 -
4 of
4
SPINAT: Integrating IPsec into overlay routing
- in Proc. of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm ’05
, 2005
"... This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Helsinki University of Technology's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish t ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
(Show Context)
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Helsinki University of Technology's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
Mobile Networks: Naming vs. Tunnelling
"... Abstract—Using data of passenger numbers and train schedules from the London Underground metropolitan railway system, we compare a Tunnelling-based to a Naming-based approach for supporting mobile networks. We show that, in terms of packet overhead, a naming based approach may have similar performan ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—Using data of passenger numbers and train schedules from the London Underground metropolitan railway system, we compare a Tunnelling-based to a Naming-based approach for supporting mobile networks. We show that, in terms of packet overhead, a naming based approach may have similar performance overhead to a tunnelling approach, and so may offer a viable alternative, whilst also offering other benefits. I.
Hi³: An efficient and secure networking architecture for mobile hosts
, 2005
"... The Host Identity Indirection Infrastructure (Hi³) is a networking architecture for mobile hosts, derived from the Internet Indirection Infrastructure (i³) and the Host Identity Protocol (HIP). Hi³3 has efficient support for secure mobility and multihoming, which both are crucial for future Internet ..."
Abstract
- Add to MetaCart
The Host Identity Indirection Infrastructure (Hi³) is a networking architecture for mobile hosts, derived from the Internet Indirection Infrastructure (i³) and the Host Identity Protocol (HIP). Hi³3 has efficient support for secure mobility and multihoming, which both are crucial for future Internet applications. In this paper, we describe and analyze Hi³ in detail. Compared to Mobile IP, Hi³ achieves better resilience, scalability and security. Considering all capabilities Hi³ provides, its implementation is much simpler than a corresponding implementation based on existing or proposed IETF standards. Both our analysis and early measurements support the notion that Hi³ performance is on the same level with Mobile IP.
LAYER 2 SECURITY INTER-LAYERING IN NETWORKS Approved by:
, 2006
"... To my wonderful parents and my beloved family. ACKNOWLEDGEMENTS Completing this Ph.D. has been an exciting long journey, and it would not have been possible without the help and encouragement of many people. First and foremost, I would like to thank my advisor Professor Henry L. Owen for his continu ..."
Abstract
- Add to MetaCart
To my wonderful parents and my beloved family. ACKNOWLEDGEMENTS Completing this Ph.D. has been an exciting long journey, and it would not have been possible without the help and encouragement of many people. First and foremost, I would like to thank my advisor Professor Henry L. Owen for his continuous support and guidance throughout my studies. Professor Owen has been an awesome mentor-he truly enjoys advising. I admire his passion in teaching and conducting research. I really appreciate that he has given me a lot of freedom in my research. It has been my privilege and honor to be associated with Professor Owen and I will be forever grateful for his constant encouragement and wisdom. I would also like to thank the members of my committee, Professor John A. Copeland, Dr. Randal T. Abler, Professor Mustaque Ahamad, and Professor Yorai Wardi, for serving on my proposal and dissertation committees. Furthermore, I have benefited immensely from my interactions with Joachim Sokol, Hans-Peter Huth, and Joachim Grimminger at Siemens AG, in Munich. My thesis topic and several ideas contained in this thesis are the outcomes of our interac-tions with Siemens on the TATI project. I am very grateful to the Siemens AG team for supporting and funding this research as well. I will always appreciate the friendship of my past and present officemates and