Font Size: a A A

Host Identity Protocol Hip Achieve - Security Module

Posted on:2006-08-19Degree:MasterType:Thesis
Country:ChinaCandidate:X LiuFull Text:PDF
GTID:2208360152998615Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
In the current network the IP address represents the location of the computer,which could be used to routing and in the same time it is the identity of the host.It is the dule function of the IP address that induces a problem how to provide security for the mobile host.In order to cover the deficiency of the IP address,IETF design a new protocol HIP which introduce a new naming space HI to represent the identity of the host, and the IP address is only used for routing.And in order to make the HIP compatable with the current IPV6 network, HIT the hash result of the HI has been introduced.The design of the HIP distinguish the identity of the host from the location information,and makes the security of the mobile host possible. Firstly this thesis analyzed the current technology of the Mobile IP, and described the advantage of the HIP. This thesis focusd on how to make the HIP and IPSec work together. After the completion of the HIP exchange, ESP could be used to protect the communicatin from attacks and all this process is transparent to users, which is to say users are not aware of the exsition of the ESP. Then this thesis described the HIP exchange briefly, and introduced the architecture of the HIP system. After that this thesis described how to implement the HIP security module in the Linux operation system. Last this thesis analyzed the result of the experiments.
Keywords/Search Tags:HIP, Security association, IPSec, ESP
PDF Full Text Request
Related items