Presentation 2012-03-09
Integrated Security Approach for ID/Locator Split-based Network
Ved P. KAFLE, Ruidong LI, Daisuke INOUE, Hiroaki HARAI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) The HIMALIS (Heterogeneity Inclusion and Mobility Adaptation through Locator ID Separation) architecture is based on ID/locator split in order to provide better scalability and flexibility in the mobile and multihoming environments. It requires storing, updating and retrieving ID/locator mapping data frequently, for which built-in security functions are essential. To address this purpose, this report presents an integrated security approach for storing, updating and retrieving hostnames to IDs and locators mapping data in two-layered name registries: domain name registries and host name registries. This architecture then utilizes the mapping data for network access security, communication sessions security, and mobility functions security.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) New generation network / ID/locator separation / HIMALIS / network security
Paper # IN2011-198
Date of Issue

Conference Information
Committee IN
Conference Date 2012/3/1(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Networks (IN)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Integrated Security Approach for ID/Locator Split-based Network
Sub Title (in English)
Keyword(1) New generation network
Keyword(2) ID/locator separation
Keyword(3) HIMALIS
Keyword(4) network security
1st Author's Name Ved P. KAFLE
1st Author's Affiliation Network Architecture Lab, Photonic Network Research Institut, National Institute of Information and Communications Technology (NICT)()
2nd Author's Name Ruidong LI
2nd Author's Affiliation Network Architecture Lab, Photonic Network Research Institut, National Institute of Information and Communications Technology (NICT)
3rd Author's Name Daisuke INOUE
3rd Author's Affiliation Cyber Security Lab, Network Security Research Institute, National Institute of Information and Communications Technology (NICT)
4th Author's Name Hiroaki HARAI
4th Author's Affiliation Network Architecture Lab, Photonic Network Research Institut, National Institute of Information and Communications Technology (NICT)
Date 2012-03-09
Paper # IN2011-198
Volume (vol) vol.111
Number (no) 469
Page pp.pp.-
#Pages 6
Date of Issue