Global Information Lookup Global Information

Host Identity Protocol information


The Host Identity Protocol (HIP) is a host identification technology for use on Internet Protocol (IP) networks, such as the Internet. The Internet has two main name spaces, IP addresses and the Domain Name System. HIP separates the end-point identifier and locator roles of IP addresses. It introduces a Host Identity (HI) name space, based on a public key security infrastructure.

The Host Identity Protocol provides secure methods for IP multihoming and mobile computing.

In networks that implement the Host Identity Protocol, all occurrences of IP addresses in applications are eliminated and replaced with cryptographic host identifiers. The cryptographic keys are typically, but not necessarily, self-generated.

The effect of eliminating IP addresses in application and transport layers is a decoupling of the transport layer from the internetworking layer (Internet Layer) in TCP/IP.[1]

HIP was specified in the IETF HIP working group. An Internet Research Task Force (IRTF) HIP research group looks at the broader impacts of HIP.

The working group is chartered to produce Requests for Comments on the "Experimental" track, but it is understood that their quality and security properties should match the standards track requirements. The main purpose for producing Experimental documents instead of standards track ones are the unknown effects that the mechanisms may have on applications and on the Internet in the large.

  1. ^ RFC 4423, Host Identity Protocol (HIP) Architecture, Section 4.1

and 23 Related for: Host Identity Protocol information

Request time (Page generated in 0.8188 seconds.)

Host Identity Protocol

Last Update:

The Host Identity Protocol (HIP) is a host identification technology for use on Internet Protocol (IP) networks, such as the Internet. The Internet has...

Word Count : 486

List of IP protocol numbers

Last Update:

This is a list of the IP protocol numbers found in the field Protocol of the IPv4 header and the Next Header field of the IPv6 header. It is an identifier...

Word Count : 120

IPv6 packet

Last Update:

Heer; P. Jokela; T. Henderson (April 2015). R. Moskowitz (ed.). Host Identity Protocol Version 2 (HIPv2). Internet Engineering Task Force (IETF). doi:10...

Word Count : 3002

Dynamic Host Configuration Protocol

Last Update:

The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP...

Word Count : 4932

Authentication protocol

Last Update:

Host Identity Protocol (HIP) LAN Manager NTLM, also known as NT LAN Manager OpenID protocol Password-authenticated key agreement protocols Protocol for...

Word Count : 1184

Multihoming

Last Update:

Locator/Identifier Separation Protocol (LISP) Internet portal Dual-homed Host Identity Protocol (HIP) Identifier/Locator Network Protocol (ILNP) Load balancing...

Word Count : 1405

SRV record

Last Update:

communications protocols:[clarification needed] APT CalDAV and CardDAV Ceph DANE DNS Service Discovery (DNS-SD) Factorio Host Identity Protocol Kerberos LDAP...

Word Count : 1477

List of DNS record types

Last Update:

type of computer/OS a host uses), or others return data used in experimental features. The "type" field is also used in the protocol for various operations...

Word Count : 667

Reverse Address Resolution Protocol

Last Update:

been rendered obsolete by the Bootstrap Protocol (BOOTP) and the modern Dynamic Host Configuration Protocol (DHCP), which both support a much greater...

Word Count : 302

HTTPS

Last Update:

Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over...

Word Count : 4373

Link Layer Discovery Protocol

Last Update:

Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol used by network devices for advertising their identity, capabilities, and neighbors...

Word Count : 710

Lightweight Directory Access Protocol

Last Update:

Lightweight Directory Access Protocol (LDAP /ˈɛldæp/) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining...

Word Count : 4669

Mobile IP

Last Update:

with a care-of address. GPRS Tunnelling Protocol Host Identity Protocol (HIP) Identifier-Locator Network Protocol (ILNP) Mobility management Proxy Mobile...

Word Count : 1562

Secure Mobile Architecture

Last Update:

opengroup.org/bookstore/catalog/k021.htm Host Identity Protocol book: https://www.amazon.com/Host-Identity-Protocol-HIP-Communications/dp/0470997907/ref=sr_1_1...

Word Count : 592

Transmission Control Protocol

Last Update:

The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation...

Word Count : 12302

WHOIS

Last Update:

WHOIS (pronounced as the phrase "who is") is a query and response protocol that is used for querying databases that store an Internet resource's registered...

Word Count : 5308

Ident protocol

Last Update:

The Ident Protocol (Identification Protocol, Ident), specified in RFC 1413, is an Internet protocol that helps identify the user of a particular TCP connection...

Word Count : 1011

Dissociative identity disorder

Last Update:

Dissociative identity disorder (DID), previously known as multiple personality disorder, is one of multiple dissociative disorders in the DSM-5, DSM-5-TR...

Word Count : 16645

Simple Network Management Protocol

Last Update:

Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks...

Word Count : 5033

OpenID

Last Update:

depending on its requirements). The OpenID protocol does not rely on a central authority to authenticate a user's identity. Moreover, neither services nor the...

Word Count : 6037

Secure Shell

Last Update:

The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable...

Word Count : 4271

Proxy Mobile IPv6

Last Update:

Mobile IP, without any modifications to the host's TCP/IP Protocol stack. With PMIP the host can change its point-of-attachment to the Internet without...

Word Count : 1715

OSI model

Last Update:

layers of protocols operating in the local host. At each level N, two entities at the communicating devices (layer N peers) exchange protocol data units...

Word Count : 5416

PDF Search Engine © AllGlobal.net