{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T10:09:54Z","timestamp":1672308594669},"reference-count":35,"publisher":"Elsevier BV","issue":"10","license":[{"start":{"date-parts":[[2008,6,1]],"date-time":"2008-06-01T00:00:00Z","timestamp":1212278400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1016\/j.comcom.2008.03.014","type":"journal-article","created":{"date-parts":[[2008,4,2]],"date-time":"2008-04-02T16:32:21Z","timestamp":1207153941000},"page":"2457-2467","source":"Crossref","is-referenced-by-count":18,"title":["Hi3: An efficient and secure networking architecture for mobile hosts"],"prefix":"10.1016","volume":"31","author":[{"given":"Andrei","family":"Gurtov","sequence":"first","affiliation":[]},{"given":"Dmitry","family":"Korzun","sequence":"additional","affiliation":[]},{"given":"Andrey","family":"Lukyanenko","sequence":"additional","affiliation":[]},{"given":"Pekka","family":"Nikander","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2008.03.014_bib1","unstructured":"D. Adkins, K. Lakshminarayanan, A. Perrig, I. Stoica, Towards a more functional and secure network infrastructure, Technical Report UCB\/CSD-03-1242, University of California at Berkeley, 2003."},{"key":"10.1016\/j.comcom.2008.03.014_bib2","doi-asserted-by":"crossref","unstructured":"H. Balakrishnan, K. Lakshminarayanan, S. Ratnasamy, S. Shenker, I. Stoica, M. Walfish, A layered naming architecture for the Internet, in: Proceedings of the ACM SIGCOMM\u201904, August, 2004, pp. 343\u2013352.","DOI":"10.1145\/1015467.1015505"},{"key":"10.1016\/j.comcom.2008.03.014_bib3","unstructured":"C. Candolin, P. Nikander, IPv6 source addresses considered harmful, in: Proceedings of the Sixth Nordic Workshop on Secure IT Systems, November, 2001."},{"issue":"4","key":"10.1016\/j.comcom.2008.03.014_bib4","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1145\/972426.944770","article-title":"FARA: reorganizing the addressing architecture","volume":"33","author":"Clark","year":"2003","journal-title":"ACM Computer Communication Review"},{"key":"10.1016\/j.comcom.2008.03.014_bib5","unstructured":"D. Crocker, Multiple Address service for transport (MAST): an extended proposal: draft-crocker-mast-01.txt, September, 2003, Work in progress, Expired in February, 2004."},{"key":"10.1016\/j.comcom.2008.03.014_bib6","doi-asserted-by":"crossref","unstructured":"J. Eriksson, M. Faloutsos, S. Krishnamurthy, PeerNet: pushing peer-to-peer down the stack, in: Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS\u201903), Springer-Verlag, Berkeley, CA, USA, February, 2003.","DOI":"10.1007\/978-3-540-45172-3_25"},{"key":"10.1016\/j.comcom.2008.03.014_bib7","doi-asserted-by":"crossref","unstructured":"P. Francis, IPNL: a NAT-extended Internet architecture, in: Proceedings of the ACM SIGCOMM\u201901, San Diego, CA, USA, August, 2001.","DOI":"10.1145\/964723.383065"},{"key":"10.1016\/j.comcom.2008.03.014_bib8","unstructured":"A. Gurtov, D. Korzun, P. Nikander, Hi3: an efficient and secure networking architecture for mobile hosts, Technical Report TR-2005-2, HIIT, June, 2005."},{"key":"10.1016\/j.comcom.2008.03.014_bib9","unstructured":"T.R. Henderson, J.M. Ahrenholz, J.H. Kim, Experience with the Host Identity Protocol for secure host mobility and multihoming, in: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC\u201903), March, 2003."},{"key":"10.1016\/j.comcom.2008.03.014_bib10","unstructured":"M. Ishiyama, M. Kunishi, F. Teraoka, An analysis of mobility handling in LIN6, in: Proceedings of the International Symposium on Wireless Personal Multimedia Communications (WPMC\u201901), August, 2001."},{"key":"10.1016\/j.comcom.2008.03.014_bib11","unstructured":"P. Jokela, P. Nikander, J. Melen, J. Ylitalo, J. Wall, Host Identity Protocol: achieving IPv4\u2013IPv6 handovers without tunneling, in: Proceedings of the Evolute workshop 2003: \u201cBeyond 3G Evolution of Systems and Services\u201d, November, 2003."},{"key":"10.1016\/j.comcom.2008.03.014_bib12","doi-asserted-by":"crossref","unstructured":"M. Komu, S. Tarkoma, J. Kangasharju, A. Gurtov, Applying a cryptographic namespace to applications, in: Proceedings of the first ACM Workshop on Dynamic Interconnection of Networks (DIN 2005), ACM Press, Cologne, Germany, September, 2005.","DOI":"10.1145\/1080776.1080786"},{"issue":"17","key":"10.1016\/j.comcom.2008.03.014_bib13","doi-asserted-by":"crossref","first-page":"3591","DOI":"10.1016\/j.comcom.2006.05.014","article-title":"On scalability properties of the Hi3 control plane","volume":"29","author":"Korzun","year":"2006","journal-title":"Computer Communications"},{"key":"10.1016\/j.comcom.2008.03.014_bib14","unstructured":"J. Laganier, L. Eggert, Host Identity Protocol (HIP) rendezvous extension: draft-ietf-hip-rvs-05, June, 2006, Work in progress, Expires in December, 2006."},{"key":"10.1016\/j.comcom.2008.03.014_bib15","unstructured":"J. Laganier, T. Koponen, L. Eggert, Host Identity Protocol (HIP) registration extension: draft-koponen-hip-registration-02, June 2006, Work in progress."},{"key":"10.1016\/j.comcom.2008.03.014_bib16","unstructured":"K. Lakshminarayanan, D. Adkins, A. Perrig, I. Stoica, On securing forwarding infrastructures: protecting the data plane from an untrusted control plane, 2005, unpublished manuscript."},{"key":"10.1016\/j.comcom.2008.03.014_bib17","doi-asserted-by":"crossref","unstructured":"J. Li, J. Stribling, T.M. Gil, R. Morris, M.F. Kaashoek, Comparing the performance of distributed hash tables under churn, in: Proceedings of the Third International Workshop on Peer-to-Peer Systems, 2004, pp. 87\u201399.","DOI":"10.1007\/978-3-540-30183-7_9"},{"key":"10.1016\/j.comcom.2008.03.014_bib18","doi-asserted-by":"crossref","unstructured":"D. Liben-Nowell, H. Balakrishnan, D. Karger, Observations on the dynamic evolution of peer-to-peer networks, in: Proceedings of the First Workshop on P2P Systems and Technologies, Cambridge, MA, March, 2002.","DOI":"10.1007\/3-540-45748-8_2"},{"key":"10.1016\/j.comcom.2008.03.014_bib19","doi-asserted-by":"crossref","unstructured":"R. Moskowitz, P. Nikander, Host Identity Protocol architecture, RFC 4423, IETF, May, 2006.","DOI":"10.17487\/rfc4423"},{"key":"10.1016\/j.comcom.2008.03.014_bib20","doi-asserted-by":"crossref","unstructured":"R. Moskowitz, P. Nikander, P. Jokela, T.R. Henderson, Host Identity Protocol: draft-ietf-hip-base-10, October, 2007, Work in progress, Expires in May, 2008.","DOI":"10.17487\/rfc5201"},{"key":"10.1016\/j.comcom.2008.03.014_bib21","doi-asserted-by":"crossref","unstructured":"P. Nikander, J. Arkko, Delegation of signalling rights, in Proceedings of the 10th International Workshop on Security Protocols, Springer, Cambridge, UK, April, 2002, pp. 203\u2013212.","DOI":"10.1007\/978-3-540-39871-4_17"},{"key":"10.1016\/j.comcom.2008.03.014_bib22","doi-asserted-by":"crossref","unstructured":"P. Nikander, J. Arkko, T. Henderson, End-host mobility and multi-homing with host identity protocol: draft-ietf-hip-mm-05, March, 2007, Work in progress, Expires September, 2007.","DOI":"10.17487\/rfc5206"},{"key":"10.1016\/j.comcom.2008.03.014_bib23","unstructured":"P. Nikander, J. Arkko, B. Ohlman, Host identity indirection infrastructure (hi3), in: The Second Swedish National Computer Networking Workshop, November, 2004."},{"key":"10.1016\/j.comcom.2008.03.014_bib24","unstructured":"P. Nikander, H. Tschofenig, X. Fu, T. Henderson, J. Laganier, Preferred alternatives for tunnelling HIP (PATH): draft-nikander-hip-path-01.txt, Work in progress, March, 2006."},{"key":"10.1016\/j.comcom.2008.03.014_bib25","unstructured":"P. Nikander, J. Ylitalo, J. Wall, Integrating security, mobility, and multi-homing in a HIP way, in: Proceedings of the Network and Distributed Systems Security Symposium (NDSS\u201903), San Diego, CA, USA, Internet Society, February, 2003."},{"key":"10.1016\/j.comcom.2008.03.014_bib26","doi-asserted-by":"crossref","unstructured":"J. Postel, S. Crocker, A possible protocol plateau. RFC 48, April, 1970.","DOI":"10.17487\/rfc0048"},{"key":"10.1016\/j.comcom.2008.03.014_bib27","doi-asserted-by":"crossref","unstructured":"J. Rosenberg, J. Weinberger, C. Huitema, R. Mahy, STUN: simple traversal of user datagram protocol (UDP) through network address translators (NATs), RFC 3489, IETF, March, 2003.","DOI":"10.17487\/rfc3489"},{"key":"10.1016\/j.comcom.2008.03.014_bib28","doi-asserted-by":"crossref","unstructured":"I. Stoica, D. Adkins, S. Zhuang, S. Shenker, S. Surana, Internet indirection infrastructure, in: Proceedings of the ACM SIGCOMM\u201902, Pittsburgh, PA, USA, August, 2002, pp. 73\u201388.","DOI":"10.1145\/633030.633033"},{"key":"10.1016\/j.comcom.2008.03.014_bib29","doi-asserted-by":"crossref","unstructured":"I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, Chord: a scalable peer-to-peer lookup service for Internet applications, in: Proceedings of the ACM SIGCOMM\u201901, San Diego, CA, USA, August, 2001.","DOI":"10.1145\/383059.383071"},{"key":"10.1016\/j.comcom.2008.03.014_bib30","unstructured":"H. Tschofenig, M. Shanmugam, Traversing HIP-aware NATs and Firewalls: problem statement and requirements: draft-tschofenig-hiprg-hip-natfw-traversal-04, March, 2006."},{"key":"10.1016\/j.comcom.2008.03.014_bib31","unstructured":"M. Walfish, H. Balakrishnan, The location\/identity split is useful for middleboxes, too, in: Proceedings of the Workshop on HIP and Related Architectures, November, 2004."},{"key":"10.1016\/j.comcom.2008.03.014_bib32","unstructured":"M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, S. Shenker, Middleboxes no longer considered harmful, in: Proceedings of the 7th USENIX Symposium on Operating System Design and Implementation (OSDI 2004), ACM Press, San Fransisco, CA, USA, December, 2004."},{"key":"10.1016\/j.comcom.2008.03.014_bib33","doi-asserted-by":"crossref","unstructured":"J. Ylitalo, J. Melen, P. Nikander, V. Torvinen, Re-thinking security in IP based micro-mobility, in: Proceedings of 7th Information Security Conference (ISC04), September, 2004.","DOI":"10.1007\/978-3-540-30144-8_27"},{"key":"10.1016\/j.comcom.2008.03.014_bib34","unstructured":"J. Ylitalo, P. Nikander, BLIND: a complete identity protection framework for end-points, in: Proceedings of the Twelfth International Workshop on Security Protocols, April, 2004."},{"key":"10.1016\/j.comcom.2008.03.014_bib35","unstructured":"J. Ylitalo, P. Nikander, A new name space for end-points: implementing secure mobility and multi-homing across the two versions of IP, in: Proceedings of the fifth European Wireless Conference, Mobile and Wireless Systems beyond 3G (EW2004), February, 2004, pp. 435\u2013441."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366408001667?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366408001667?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T02:13:55Z","timestamp":1630980835000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366408001667"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":35,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2008,6]]}},"alternative-id":["S0140366408001667"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2008.03.014","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2008,6]]}}}