{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:10:00Z","timestamp":1654107000868},"reference-count":77,"publisher":"Elsevier BV","issue":"10","content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1016\/j.comnet.2012.11.024","type":"journal-article","created":{"date-parts":[[2013,3,18]],"date-time":"2013-03-18T16:36:54Z","timestamp":1363624614000},"page":"2218-2232","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":10,"title":["Adoption barriers of network layer protocols: The case of host identity protocol"],"prefix":"10.1016","volume":"57","author":[{"given":"Tapio","family":"Lev\u00e4","sequence":"first","affiliation":[]},{"given":"Miika","family":"Komu","sequence":"additional","affiliation":[]},{"given":"Ari","family":"Ker\u00e4nen","sequence":"additional","affiliation":[]},{"given":"Sakari","family":"Luukkainen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.comnet.2012.11.024_b0005","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10550-006-0084-z","article-title":"Why the Internet only just works","volume":"24","author":"Handley","year":"2006","journal-title":"BT Technology Journal"},{"key":"10.1016\/j.comnet.2012.11.024_b0010","doi-asserted-by":"crossref","unstructured":"D. Meyer, L. Zhang, K. Fall, Report from the IAB Workshop on Routing and Addressing, RFC 4984 (Informational), 2007.","DOI":"10.17487\/rfc4984"},{"key":"10.1016\/j.comnet.2012.11.024_b0015","doi-asserted-by":"crossref","unstructured":"T. Li, Design Goals for Scalable Internet Routing, RFC 6227 (Informational), 2011.","DOI":"10.17487\/rfc6227"},{"key":"10.1016\/j.comnet.2012.11.024_b0020","doi-asserted-by":"crossref","unstructured":"R. Moskowitz, P. Nikander, P. Jokela, T. Henderson, Host Identity Protocol, RFC 5201 (Experimental), Updated by RFC 6253, 2008.","DOI":"10.17487\/rfc5201"},{"key":"10.1016\/j.comnet.2012.11.024_b0025","doi-asserted-by":"crossref","unstructured":"M. Komu, T. Henderson, H. Tschofenig, J. Melen, A. Ker\u00e4nen, Basic Host Identity Protocol (HIP) Extensions for Traversal of Network Address Translators, RFC 5770 (Experimental), 2010.","DOI":"10.17487\/rfc5770"},{"key":"10.1016\/j.comnet.2012.11.024_b0030","unstructured":"D. Thaler, A Comparison of IP Mobility-Related Protocols, IETF, Expired Internet Draft, 2006."},{"issue":"6","key":"10.1016\/j.comnet.2012.11.024_b0035","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MNET.2003.1248657","article-title":"Host mobility for IP networks: a comparison","volume":"17","author":"Henderson","year":"2003","journal-title":"IEEE Network Magazine"},{"key":"10.1016\/j.comnet.2012.11.024_b0040","series-title":"Proceedings of the Fourth European Conference on Software Architecture: Companion Volume, ECSA \u201910","first-page":"213","article-title":"Risk analysis of host identity protocol: using risk identification method based on value chain dynamics toolkit","author":"S\u00e4\u00e4skilahti","year":"2010"},{"key":"10.1016\/j.comnet.2012.11.024_b0045","doi-asserted-by":"crossref","unstructured":"T. Henderson, A. Gurtov, The Host Identity Protocol (HIP) Experiment Report, RFC 6538 (Informational), 2012.","DOI":"10.17487\/rfc6538"},{"issue":"3","key":"10.1016\/j.comnet.2012.11.024_b0050","first-page":"424","article-title":"Network externalities, competition, and compatibility","volume":"75","author":"Katz","year":"1985","journal-title":"The American Economic Review"},{"issue":"3","key":"10.1016\/j.comnet.2012.11.024_b0055","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1111\/j.1365-2575.2004.00170.x","article-title":"A model of Internet standards adoption: the case of IPv6","volume":"14","author":"Hovav","year":"2004","journal-title":"Information Systems Journal"},{"key":"10.1016\/j.comnet.2012.11.024_b0060","series-title":"Diffusion of Innovations","author":"Rogers","year":"2003"},{"issue":"3","key":"10.1016\/j.comnet.2012.11.024_b0065","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","article-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology","volume":"13","author":"Davis","year":"1989","journal-title":"MIS Quarterly"},{"issue":"3","key":"10.1016\/j.comnet.2012.11.024_b0070","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: toward a unified view","volume":"27","author":"Venkatesh","year":"2003","journal-title":"MIS Quarterly"},{"issue":"1","key":"10.1016\/j.comnet.2012.11.024_b0075","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/3117053","article-title":"Strategic maneuvering and mass-market dynamics: the triumph of VHS over beta","volume":"66","author":"Cusumano","year":"1992","journal-title":"The Business History Review"},{"key":"10.1016\/j.comnet.2012.11.024_b0080","doi-asserted-by":"crossref","unstructured":"D. Thaler, B. Aboba, What Makes For a Successful Protocol? RFC 5218 (Informational), 2008.","DOI":"10.17487\/rfc5218"},{"key":"10.1016\/j.comnet.2012.11.024_b0085","doi-asserted-by":"crossref","unstructured":"B. Carpenter, Architectural Principles of the Internet, RFC 1958 (Informational), updated by RFC 3439, 1996.","DOI":"10.17487\/rfc1958"},{"key":"10.1016\/j.comnet.2012.11.024_b0090","doi-asserted-by":"crossref","unstructured":"R. Bush, D. Meyer, Some Internet Architectural Guidelines and Philosophy, RFC 3439 (Informational), 2002.","DOI":"10.17487\/rfc3439"},{"key":"10.1016\/j.comnet.2012.11.024_b0095","unstructured":"IETF, IETF OUTCOMES \u2013 Successes and Failures, 2012. ."},{"key":"10.1016\/j.comnet.2012.11.024_b0100","series-title":"SMARTNET","first-page":"225","article-title":"Value creation for multimedia services on broadband networks","author":"Luukkainen","year":"1994"},{"key":"10.1016\/j.comnet.2012.11.024_b0105","series-title":"Network service investment guide: maximizing ROI in uncertain times","author":"Gaynor","year":"2003"},{"key":"10.1016\/j.comnet.2012.11.024_b0110","unstructured":"M. Gaynor, S. Bradner, The real options approach to standardization, in: System Sciences, 2001. Proceedings of the 34th Annual Hawaii International Conference on, IEEE, ISBN 0769509819, 2001, pp. 1\u201310."},{"issue":"1","key":"10.1016\/j.comnet.2012.11.024_b0115","doi-asserted-by":"crossref","first-page":"70","DOI":"10.2307\/2555589","article-title":"Standardization, compatibility, and innovation","volume":"16","author":"Farrell","year":"1985","journal-title":"The RAND Journal of Economics"},{"issue":"4","key":"10.1016\/j.comnet.2012.11.024_b0120","doi-asserted-by":"crossref","first-page":"822","DOI":"10.1086\/261409","article-title":"Technology adoption in the presence of network externalities","volume":"94","author":"Katz","year":"1986","journal-title":"The Journal of Political Economy"},{"issue":"7","key":"10.1016\/j.comnet.2012.11.024_b0125","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MSPEC.2006.1653003","article-title":"Metcalfe\u2019s law is wrong \u2013 communications networks increase in value as they add members-but by how much?","volume":"43","author":"Briscoe","year":"2006","journal-title":"IEEE Spectrum"},{"issue":"3","key":"10.1016\/j.comnet.2012.11.024_b0130","doi-asserted-by":"crossref","first-page":"155","DOI":"10.2307\/2295952","article-title":"The economic implications of learning by doing","volume":"29","author":"Arrow","year":"1962","journal-title":"The Review of Economic Studies"},{"key":"10.1016\/j.comnet.2012.11.024_b0135","series-title":"Inside the Black Box: Technology and Economics","author":"Rosenberg","year":"1982"},{"key":"10.1016\/j.comnet.2012.11.024_b0140","doi-asserted-by":"crossref","unstructured":"D. Joseph, N. Shetty, J. Chuang, I. Stoica, Modeling the adoption of new network architectures, in: Proceedings of the 2007 ACM CoNEXT Conference on \u2013 CoNEXT \u201907, 2007.","DOI":"10.1145\/1364654.1364661"},{"key":"10.1016\/j.comnet.2012.11.024_b0145","series-title":"Proceedings of the 3rd International Workshop on Economics of Networked Systems","first-page":"49","article-title":"Dynamics of competition between incumbent and emerging network technologies","author":"Jin","year":"2008"},{"key":"10.1016\/j.comnet.2012.11.024_b0150","series-title":"Towards the Future Internet","first-page":"11","article-title":"Modeling the economics of Loc\/ID split for the future Internet","author":"Iannone","year":"2010"},{"key":"10.1016\/j.comnet.2012.11.024_b0155","unstructured":"A. Ozment, S. Schechter, Bootstrapping the adoption of internet security protocols, in: Proc. Fifth Workshop on the Economics of Information Security, 2003, pp. 1\u201319."},{"key":"10.1016\/j.comnet.2012.11.024_b0160","unstructured":"E. Bohlin, S. Lindmark, Incentives to invest in next generation networks, in: 14th European Regional ITS Conference, 48, Helsinki, 2003, pp. 1\u201319."},{"issue":"394","key":"10.1016\/j.comnet.2012.11.024_b0165","doi-asserted-by":"crossref","first-page":"116","DOI":"10.2307\/2234208","article-title":"Competing technologies, increasing returns, and lock-in by historical events","volume":"99","author":"Arthur","year":"1989","journal-title":"The Economic Journal"},{"key":"10.1016\/j.comnet.2012.11.024_b0170","unstructured":"M. Bottermann, IPv6 Deployment Survey, 2009. ."},{"key":"10.1016\/j.comnet.2012.11.024_b0175","unstructured":"M. Bottermann, IPv6 Deployment Survey, 2010. ."},{"key":"10.1016\/j.comnet.2012.11.024_b0180","unstructured":"M. Bottermann, IPv6 Deployment Survey, 2011. ."},{"key":"10.1016\/j.comnet.2012.11.024_b0185","first-page":"121","article-title":"Evolving core capabilities of the internet","volume":"3","author":"Marcus","year":"2004","journal-title":"Journal on Telecommunications and High Technology Law"},{"issue":"4","key":"10.1016\/j.comnet.2012.11.024_b0190","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1145\/357401.357402","article-title":"End-to-end arguments in system design","volume":"2","author":"Saltzer","year":"1984","journal-title":"ACM Transactions on Computer Systems"},{"key":"10.1016\/j.comnet.2012.11.024_b0195","unstructured":"C. Sandvig, Communication Infrastructure and Innovation: The Internet as End-to-End Network that Isn\u2019t, 2002."},{"key":"10.1016\/j.comnet.2012.11.024_b0200","series-title":"SIGCOMM","first-page":"206","article-title":"The evolution of layered protocol stacks leads to an hourglass-shaped architecture","author":"Akhshabi","year":"2011"},{"issue":"2","key":"10.1016\/j.comnet.2012.11.024_b0205","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1109\/SURV.2010.021110.00070","article-title":"Host Identity Protocol (HIP): connectivity, mobility, multi-homing, security, and privacy over IPv4 and IPv6 networks","volume":"12","author":"Nikander","year":"2010","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"10.1016\/j.comnet.2012.11.024_b0210","doi-asserted-by":"crossref","unstructured":"P. Jokela, R. Moskowitz, P. Nikander, Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP), RFC 5202 (Experimental), 2008.","DOI":"10.17487\/rfc5202"},{"key":"10.1016\/j.comnet.2012.11.024_b0215","series-title":"Proceedings of the 17th International Conference on Software, Telecommunications and Computer Networks, SoftCOM\u201909","first-page":"111","article-title":"Secure and efficient IPv4\/IPv6 handovers using host-based identifier-locator Split","author":"Varjonen","year":"2009"},{"key":"10.1016\/j.comnet.2012.11.024_b0220","doi-asserted-by":"crossref","unstructured":"P. Nikander, T. Henderson, C. Vogt, J. Arkko, End-Host Mobility and Multihoming with the Host Identity Protocol, RFC 5206 (Experimental), 2008.","DOI":"10.17487\/rfc5206"},{"key":"10.1016\/j.comnet.2012.11.024_b0225","doi-asserted-by":"crossref","unstructured":"N. Williams, On the Use of Channel Bindings to Secure Channels, RFC 5056 (Proposed Standard), 2007.","DOI":"10.17487\/rfc5056"},{"key":"10.1016\/j.comnet.2012.11.024_b0230","doi-asserted-by":"crossref","unstructured":"P. Nikander, J. Laganier, F. Dupont, An IPv6 Prefix for Overlay Routable Cryptographic Hash Identifiers (ORCHID), RFC 4843 (Experimental), 2007.","DOI":"10.17487\/rfc4843"},{"key":"10.1016\/j.comnet.2012.11.024_b0235","unstructured":"A. Pathak, M. Komu, A. Gurtov, Host Identity Protocol for Linux, Linux Journal, no. 187, November 2009."},{"key":"10.1016\/j.comnet.2012.11.024_b0240","series-title":"Beyond HIP: The End to Hacking As We Know It","author":"Paine","year":"2009"},{"key":"10.1016\/j.comnet.2012.11.024_b0245","unstructured":"T. Henderson, S. Venema, D. Mattes, HIP-based Virtual Private LAN Service (HIPLS), An Expired Internet Draft, 2011."},{"key":"10.1016\/j.comnet.2012.11.024_b0250","doi-asserted-by":"crossref","unstructured":"C. Perkins, IP Mobility Support for IPv4, Revised, RFC 5944 (Proposed Standard), 2010.","DOI":"10.17487\/rfc5944"},{"key":"10.1016\/j.comnet.2012.11.024_b0255","doi-asserted-by":"crossref","unstructured":"C. Perkins, D. Johnson, J. Arkko, Mobility Support in IPv6, RFC 6275 (Proposed Standard), 2011.","DOI":"10.17487\/rfc6275"},{"key":"10.1016\/j.comnet.2012.11.024_b0260","doi-asserted-by":"crossref","unstructured":"H. Soliman, Mobile IPv6 Support for Dual Stack Hosts and Routers, RFC 5555 (Proposed Standard), 2009.","DOI":"10.17487\/rfc5555"},{"key":"10.1016\/j.comnet.2012.11.024_b0265","unstructured":"J. Ylitalo, Secure Mobility at Multiple Granularity Levels over Heterogeneous Datacom Networks, iSBN: 978-951-22-9530-2, 2008."},{"key":"10.1016\/j.comnet.2012.11.024_b0270","doi-asserted-by":"crossref","unstructured":"C. Kaufman, Internet Key Exchange (IKEv2) Protocol, RFC 4306 (Proposed Standard), Obsoleted by RFC 5996, Updated by RFC 5282, 2005.","DOI":"10.17487\/rfc4306"},{"key":"10.1016\/j.comnet.2012.11.024_b0275","doi-asserted-by":"crossref","unstructured":"P. Eronen, IKEv2 Mobility and Multihoming Protocol (MOBIKE), RFC 4555 (Proposed Standard), 2006.","DOI":"10.17487\/rfc4555"},{"key":"10.1016\/j.comnet.2012.11.024_b0280","unstructured":"T. Dierks, E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2, RFC 5246 (Proposed Standard), Updated by RFCs 5746, 5878, 6176, 2008."},{"key":"10.1016\/j.comnet.2012.11.024_b0285","doi-asserted-by":"crossref","unstructured":"E. Rescorla, N. Modadugu, Datagram Transport Layer Security, RFC 4347 (Proposed Standard), Obsoleted by RFC 6347, Updated by RFC 5746, 2006.","DOI":"10.17487\/rfc4347"},{"key":"10.1016\/j.comnet.2012.11.024_b0290","doi-asserted-by":"crossref","unstructured":"M. Komu, M. Bagnulo, K. Slavov, S. Sugimoto, Sockets Application Program Interface (API) for Multihoming Shim, RFC 6316 (Informational), 2011.","DOI":"10.17487\/rfc6316"},{"key":"10.1016\/j.comnet.2012.11.024_b0295","doi-asserted-by":"crossref","unstructured":"M. Komu, T. Henderson, Basic Socket Interface Extensions for the Host Identity Protocol (HIP), RFC 6317 (Experimental), 2011..","DOI":"10.17487\/rfc6317"},{"key":"10.1016\/j.comnet.2012.11.024_b0300","doi-asserted-by":"crossref","unstructured":"P. Nikander, J. Laganier, Host Identity Protocol (HIP) Domain Name System (DNS) Extensions, RFC 5205 (Experimental), 2008.","DOI":"10.17487\/rfc5205"},{"key":"10.1016\/j.comnet.2012.11.024_b0305","doi-asserted-by":"crossref","unstructured":"J. Lindqvist, E. Vehmersalo, J. Manner, M. Komu, Enterprise network packet filtering for mobile cryptographic identities, Journal of Handheld Computing Research (IJHCR), IGI Global (IGI), 701 E. Chocolate Avenue, Hershey, PA 17033, USA, 79\u201394, 2009.","DOI":"10.4018\/jhcr.2010090905"},{"key":"10.1016\/j.comnet.2012.11.024_b0310","unstructured":"P. Salmela, J. Mel\u00e9n, Host identity protocol proxy, in: ICETE, 2005, pp. 222\u2013230."},{"key":"10.1016\/j.comnet.2012.11.024_b0315","unstructured":"D. Zhang, X. Xu, J. Yao, Z. Cao, Investigation in HIP Proxies, Work in Progress, Internet Draft, 2011."},{"key":"10.1016\/j.comnet.2012.11.024_b0320","series-title":"Real World Research \u2013 A Resource for Social Scientists and Practitioner-Researchers","author":"Robson","year":"2002"},{"key":"10.1016\/j.comnet.2012.11.024_b0325","series-title":"Case Study Research: Design and Methods","author":"Yin","year":"2003"},{"key":"10.1016\/j.comnet.2012.11.024_b0330","series-title":"Doing Qualitative Research","author":"Silverman","year":"2004"},{"key":"10.1016\/j.comnet.2012.11.024_b0335","series-title":"Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference, IMC \u201909","first-page":"90","article-title":"On dominant characteristics of residential broadband internet traffic","author":"Maier","year":"2009"},{"key":"10.1016\/j.comnet.2012.11.024_b0340","series-title":"Proceedings of the 11th International Conference on Passive and Active Measurement, PAM\u201910","first-page":"222","article-title":"A longitudinal view of HTTP traffic","author":"Callahan","year":"2010"},{"key":"10.1016\/j.comnet.2012.11.024_b0345","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1070873.1070875","article-title":"Protocol enhancements for intermittently connected hosts","volume":"35","author":"Sch\u00fctz","year":"2005","journal-title":"ACM Computer Communications Review"},{"key":"10.1016\/j.comnet.2012.11.024_b0350","doi-asserted-by":"crossref","unstructured":"D. Harkins, D. Carrel, The Internet Key Exchange (IKE), RFC 2409 (Proposed Standard), Obsoleted by RFC 4306, Updated by RFC 4109, 1998.","DOI":"10.17487\/rfc2409"},{"key":"10.1016\/j.comnet.2012.11.024_b0355","unstructured":"C. Perkins, IP Mobility Support, RFC 2002 (Proposed Standard), Obsoleted by RFC 3220, Updated by RFC 2290, 1996."},{"key":"10.1016\/j.comnet.2012.11.024_b0360","unstructured":"T. Dierks, C. Allen, The TLS Protocol Version 1.0, RFC 2246 (Proposed Standard), Obsoleted by RFC 4346, Updated by RFCs 3546, 5746, 6176, 1999."},{"key":"10.1016\/j.comnet.2012.11.024_b0365","doi-asserted-by":"crossref","unstructured":"T. Henderson, P. Nikander, M. Komu, Using the Host Identity Protocol with Legacy Applications, RFC 5338 (Experimental), 2008.","DOI":"10.17487\/rfc5338"},{"key":"10.1016\/j.comnet.2012.11.024_b0370","series-title":"DIN \u201905: Proceedings of the 1st ACM Workshop on Dynamic Interconnection of Networks","first-page":"23","article-title":"Applying a cryptographic namespace to applications","author":"Komu","year":"2005"},{"key":"10.1016\/j.comnet.2012.11.024_b0375","unstructured":"T. Dietz, M. Brunner, N. Papadoglou, V. Raptis, K. Kypris, Issues of HIP in an Operators Networks, IETF, Expired Internet Draft, 2006."},{"key":"10.1016\/j.comnet.2012.11.024_b0380","doi-asserted-by":"crossref","unstructured":"S. Cheshire, Z. Zhu, R. Wakikawa, L. Zhang, Understanding Apple\u2019s Back to My Mac (BTMM) Service, RFC 6281 (Informational), 2011.","DOI":"10.17487\/rfc6281"},{"key":"10.1016\/j.comnet.2012.11.024_b0385","unstructured":"X. Gu, Host Identity Protocol Version 2.5, Master\u2019s thesis, Aalto University, 2012."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128613000480?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128613000480?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T03:03:26Z","timestamp":1562814206000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128613000480"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":77,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2013,7]]}},"alternative-id":["S1389128613000480"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.comnet.2012.11.024","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":["Computer Networks and Communications"],"published":{"date-parts":[[2013,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Adoption barriers of network layer protocols: The case of host identity protocol","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2012.11.024","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2013 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}