{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:01:11Z","timestamp":1761663671097,"version":"3.40.4"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/eucnc.2017.7980675","type":"proceedings-article","created":{"date-parts":[[2017,7,17]],"date-time":"2017-07-17T20:46:05Z","timestamp":1500324365000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Analysis of deployment challenges of Host Identity Protocol"],"prefix":"10.1109","author":[{"given":"Ijaz","family":"Ahmad","sequence":"first","affiliation":[{"name":"Centre for Wireless Communications (CWC), University of Oulu, Finland"}]},{"given":"Madhusanka","family":"Liyanage","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications (CWC), University of Oulu, Finland"}]},{"given":"Mika","family":"Ylianttila","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications (CWC), University of Oulu, Finland"}]},{"given":"Andrei","family":"Gurtov","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, Link&#x00F6;ping University, SE-581 83, Sweden"}]}],"member":"263","reference":[{"year":"2005","author":"tirumala","article-title":"Iperf: The TCP\/UDP bandwidth measurement tool","key":"ref30"},{"year":"2009","author":"chandrasekaran","journal-title":"Mobile Ip Issues Challenges and Solutions","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1504\/IJSSCI.2008.017590"},{"year":"0","author":"journals","article-title":"Host Identity Protocol for Linux","key":"ref12"},{"year":"0","journal-title":"OpenHIP","article-title":"Host Identity Protocol for Windows","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/MASS.2010.5663902"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ICC.2009.5199332"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/1366919.1366925"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/WOCN.2007.4284140"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1155\/2011\/437868"},{"year":"0","journal-title":"Portable Tofino","article-title":"Security For SCADA and Industrial Process Control System","key":"ref19"},{"year":"2009","journal-title":"Pox Openflow Controller","key":"ref28"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/1355734.1355746"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1016\/j.comnet.2017.01.007"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/SURV.2010.021110.00070"},{"key":"ref6","article-title":"Securing Virtual Private LAN Service by Efficient Key Management","author":"liyanage","year":"2013","journal-title":"Security and Communication Networks"},{"year":"0","journal-title":"The OpenHIP Project","key":"ref29"},{"key":"ref5","article-title":"HIP-based Virtual Private LAN Service (HIPLS)","author":"henderson","year":"2014","journal-title":"Internet Draft IETF"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/EIT.2012.6220739"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/NGMAST.2008.18"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1002\/9780470772898"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/1217835.1217824"},{"year":"2012","author":"moskowitz","article-title":"Host Identity Protocol Architecture","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/j.istr.2007.04.003"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1002\/9781118900253","author":"liyanage","year":"2015","journal-title":"Software Defined Mobile Networks (SDMN) Beyond LTE Network Architecture"},{"year":"0","journal-title":"Tampered Networks products","key":"ref21"},{"key":"ref24","article-title":"Opportunities and Challenges of Software-Defined Mobile Networks in Network Security Perspective","author":"liyanage","year":"2015","journal-title":"IEEE Security and Privacy Magazine"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/COMST.2015.2474118"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/NGMAST.2015.43"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/SDN4FNS.2013.6702540"}],"event":{"name":"2017 European Conference on Networks and Communications (EuCNC)","start":{"date-parts":[[2017,6,12]]},"location":"Oulu, Finland","end":{"date-parts":[[2017,6,15]]}},"container-title":["2017 European Conference on Networks and Communications (EuCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7972783\/7980636\/07980675.pdf?arnumber=7980675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T17:54:22Z","timestamp":1744394062000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7980675\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/eucnc.2017.7980675","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}