Presentation | 2012-03-09 Integrated Security Approach for ID/Locator Split-based Network Ved P. KAFLE, Ruidong LI, Daisuke INOUE, Hiroaki HARAI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | The HIMALIS (Heterogeneity Inclusion and Mobility Adaptation through Locator ID Separation) architecture is based on ID/locator split in order to provide better scalability and flexibility in the mobile and multihoming environments. It requires storing, updating and retrieving ID/locator mapping data frequently, for which built-in security functions are essential. To address this purpose, this report presents an integrated security approach for storing, updating and retrieving hostnames to IDs and locators mapping data in two-layered name registries: domain name registries and host name registries. This architecture then utilizes the mapping data for network access security, communication sessions security, and mobility functions security. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | New generation network / ID/locator separation / HIMALIS / network security |
Paper # | IN2011-198 |
Date of Issue |
Conference Information | |
Committee | IN |
---|---|
Conference Date | 2012/3/1(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Networks (IN) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Integrated Security Approach for ID/Locator Split-based Network |
Sub Title (in English) | |
Keyword(1) | New generation network |
Keyword(2) | ID/locator separation |
Keyword(3) | HIMALIS |
Keyword(4) | network security |
1st Author's Name | Ved P. KAFLE |
1st Author's Affiliation | Network Architecture Lab, Photonic Network Research Institut, National Institute of Information and Communications Technology (NICT)() |
2nd Author's Name | Ruidong LI |
2nd Author's Affiliation | Network Architecture Lab, Photonic Network Research Institut, National Institute of Information and Communications Technology (NICT) |
3rd Author's Name | Daisuke INOUE |
3rd Author's Affiliation | Cyber Security Lab, Network Security Research Institute, National Institute of Information and Communications Technology (NICT) |
4th Author's Name | Hiroaki HARAI |
4th Author's Affiliation | Network Architecture Lab, Photonic Network Research Institut, National Institute of Information and Communications Technology (NICT) |
Date | 2012-03-09 |
Paper # | IN2011-198 |
Volume (vol) | vol.111 |
Number (no) | 469 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |