{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T18:40:22Z","timestamp":1689100822344},"reference-count":62,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,1,1]]},"abstract":"<p>This paper is committed to give an overview of the Host Identity Protocol (HIP), to introduce the basic ideas and the main paradigms behind it, and to make an exhaustive survey of mobility management schemes in the Host Identity Layer. The authors' goal is to show how HIP emerges from the list of potential alternatives with its wild range of possible usability, complex feature set and power to create a novel framework for future Mobile Internet architectures. In order to achieve this, the authors also perform an extensive simulation evaluation of four selected mobility solutions in the Host Identity Layer: the standard HIP mobility\/multihoming (RFC5206), a micromobility solution (\u00b5HIP), a network mobility management scheme (HIP-NEMO) and a proactive, cross-layer optimized, distributed proposal designed for flat architectures (UFA-HIP).<\/p>","DOI":"10.4018\/ijwnbt.2014010103","type":"journal-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T16:36:16Z","timestamp":1396370176000},"page":"34-59","source":"Crossref","is-referenced-by-count":5,"title":["Survey and Evaluation of Advanced Mobility Management Schemes in the Host Identity Layer"],"prefix":"10.4018","volume":"3","author":[{"given":"L\u00e1szl\u00f3","family":"Bokor","sequence":"first","affiliation":[{"name":"Inter-University Centre for Telecommunications and Informatics (ETIK), Debrecen, Hungary"}]},{"given":"Zolt\u00e1n","family":"Faigl","sequence":"additional","affiliation":[{"name":"Department of Networked Systems and Services (HIT), Budapest University of Technology and Economics (BME), Budapest, Hungary"}]},{"given":"S\u00e1ndor","family":"Imre","sequence":"additional","affiliation":[{"name":"Department of Networked Systems and Services (HIT), Budapest University of Technology and Economics (BME), Budapest, Hungary"}]}],"member":"2432","reference":[{"key":"ijwnbt.2014010103-0","doi-asserted-by":"crossref","unstructured":"Aydin, Z. G., Chaouchi, H., & Zaim, A. H. (2009). eHIP: Early update for host identity protocol. In Proceedings of the 6th International Conference on Mobile Technology, Application & Systems, Nice, France.","DOI":"10.1145\/1710035.1710090"},{"key":"ijwnbt.2014010103-1","doi-asserted-by":"crossref","unstructured":"Bokor, L., Faigl, Z., & Imre, S. (2010). A delegation-based HIP signaling scheme for the ultra flat architecture. In Proceedings of the 2nd IWSCN, Karlstad, Sweden (pp. 9\u201316).","DOI":"10.1109\/IWSCN.2010.5498001"},{"key":"ijwnbt.2014010103-2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20898-0_3"},{"key":"ijwnbt.2014010103-3","unstructured":"Bokor, L., Nov\u00e1czki, S., & Imre, S. (2007). A complete HIP based framework for secure micromobility. In Proceedings of the 5th @WAS International Conference on Advances in Mobile Computing and Multimedia (MoMM2007), Jakarta, Indonesia (pp. 111-122)."},{"key":"ijwnbt.2014010103-4","doi-asserted-by":"crossref","unstructured":"Bokor, L., Nov\u00e1czki, S., Zeke, L. T., & Jeney, G. (2009). Design and evaluation of host identity protocol (HIP) simulation framework for INET\/OMNeT++. In Proceedings of the 12-th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM 2009), Tenerife, Canary Islands, Spain (pp. 124-133).","DOI":"10.1145\/1641804.1641827"},{"key":"ijwnbt.2014010103-5","doi-asserted-by":"crossref","unstructured":"Bokor, L., Zeke, L. T., Nov\u00e1czki, S., & Jeney, G. (2009). Protocol design and analysis of a HIP-based per-application mobility management platform. In Proceedings of the 7-th ACM International Symposium on Mobility Management and Wireless Access (MobiWAC 2009), Tenerife, Canary Islands, Spain (pp. 7-16).","DOI":"10.1145\/1641776.1641779"},{"key":"ijwnbt.2014010103-6","unstructured":"Bryan, D., Matthews, P., Shim, E., Willis, D., & Dawkins, S. (2008, July 7). Concepts and terminology for peer to peer SIP. IETF Internet Draft. draft-ietf-p2psip-concepts-02."},{"key":"ijwnbt.2014010103-7","doi-asserted-by":"crossref","unstructured":"Camarillo, G., Mas, I., & Nikander, P. (2008). A framework to combine the session initiation protocol and the host identity protocol. In Proceedings of the Wireless Communications and Networking Conference (WCNC 2008. IEEE), Las Vegas, NV.","DOI":"10.1109\/WCNC.2008.533"},{"key":"ijwnbt.2014010103-8","unstructured":"Cisco. (2013, February). Cisco visual networking index: Global mobile data traffic forecast update 2012-2017. Retrieved September 20, 2013, from http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns341\/ns525\/ns537\/ns705\/ns827\/white_paper_c11-520862.pdf"},{"key":"ijwnbt.2014010103-9","unstructured":"Cooper, E., Johnston, A., & Matthews, P. (2007, December). A distributed transport function in P2PSIP using HIP for multi-hop overlay routing. IETF Internet Draft. draft-matthews-p2psip-hip-hop-00."},{"key":"ijwnbt.2014010103-10","unstructured":"Dietz, T., Brunner, M., Papadoglou, N., Raptis, V., & Kypris, K. (2005). Issues of HIP in an operators networks. draft-dietz-hip-operator-issues-00."},{"key":"ijwnbt.2014010103-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.02.005"},{"key":"ijwnbt.2014010103-12","doi-asserted-by":"crossref","unstructured":"Faigl, Z., Bokor, L., Neves, P., Pereira, P., Daoud, K., & Herbelin, P. (2010). Evaluation and comparison of signalling protocol alternatives for the ultra flat architecture. In Proceedings of the 5th International Conference on Systems and Networks Communications (ICSNC), Nice, France (pp. 1-9).","DOI":"10.1109\/ICSNC.2010.58"},{"key":"ijwnbt.2014010103-13","doi-asserted-by":"crossref","unstructured":"Fekete, G. (2009). Policy based flow management with the host identity protocol for multihomed hosts. In Proceedings of the First International Conference on Emerging Network Intelligence, Sliema, Malta.","DOI":"10.1109\/EMERGING.2009.14"},{"key":"ijwnbt.2014010103-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.03.014"},{"key":"ijwnbt.2014010103-15","unstructured":"Hautakorpi, J., Camarillo, G., & Koskela, J. (2007, November). Utilizing HIP (Host Identity Protocol) for P2PSIP (Peerto- peer Session Initiation Protocol). IETF Internet Draft. draft-hautakorpi-p2psip-with-hip-01."},{"key":"ijwnbt.2014010103-16","doi-asserted-by":"crossref","unstructured":"Heikkinen, S. (2008). Security and accounting enhancements for roaming in IMS. In Proceedings of the 6th International Conference on Wired\/Wireless Internet Communications (WWIC 2008). Lecture Notes in Computer Science 5031 (pp. 127-138). Tampere, Finland: Springer.","DOI":"10.1007\/978-3-540-68807-5_11"},{"key":"ijwnbt.2014010103-17","unstructured":"Henderson, T. (2004). Can SIP use HIP. Retrieved April 15, 2010, from HIP Workshop, 61st IETF meeting: http:\/\/hiprg.piuha.net\/workshop\/"},{"key":"ijwnbt.2014010103-18","doi-asserted-by":"crossref","unstructured":"Herborn, S., Haslett, L., Boreli, R., & Seneviratne, A. (2006). HarMoNy - HIP mobile networks. In Proceedings of the 63rd IEEE Vehicular Technology Conference, VTC.","DOI":"10.1109\/VETECS.2006.1682949"},{"key":"ijwnbt.2014010103-19","unstructured":"Herborn, S., Huber, A., Boreli, R., & Seneviratne, A. (2007). A scheme for host identity delegation. In proceedings of the IEEE\/Create-Net\/ICST International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE), Bangalore, India."},{"key":"ijwnbt.2014010103-20","doi-asserted-by":"crossref","unstructured":"Hobaya, F., Gay, V., & Robert, E. (2009). Host identity protocol extension supporting simultaneous end-host mobility. In Proceedings of the Fifth International Conference on Wireless and Mobile Communications (ICWMC '09), Cannes\/La Bocca, France (pp. 261-266).","DOI":"10.1109\/ICWMC.2009.50"},{"key":"ijwnbt.2014010103-21","doi-asserted-by":"crossref","unstructured":"Iapichino, G., & Bonnet, C. (2009). Host identity protocol and proxy mobile IPv6: A secure global and localized mobility management scheme for multihomed mobile nodes. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM'09), Honolulu, Hawaii (pp. 1-6).","DOI":"10.1109\/GLOCOM.2009.5426039"},{"key":"ijwnbt.2014010103-22","doi-asserted-by":"crossref","unstructured":"Iapichino, G., Bonnet, C., Herrero, O. d., Baudoin, C., & Buret, I. (2009). Combining mobility and heterogeneous networking for emergency management: A PMIPv6 and HIP-based approach. In Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, Leipzig, Germany (pp. 603-607).","DOI":"10.1145\/1582379.1582510"},{"key":"ijwnbt.2014010103-23","unstructured":"INET\/OMNeT++. (2013). The INET Framework for OMNeT++. Retrieved September 20, 2013, from http:\/\/inet.omnetpp.org\/"},{"key":"ijwnbt.2014010103-24","unstructured":"Jokela, P., Melen, J., & Ylitalo, J. (2006, June). HIP service discovery. IETF Internet Draft. draft-jokela-hip-service-discovery-00"},{"key":"ijwnbt.2014010103-25","doi-asserted-by":"crossref","unstructured":"Jokela, P., Moskowitz, R., & Nikander, P. (2008, April). Using the encapsulating security payload (ESP) transport format with the host identity protocol (HIP). RFC 5202.","DOI":"10.17487\/rfc5202"},{"key":"ijwnbt.2014010103-26","doi-asserted-by":"crossref","unstructured":"Kov\u00e1csh\u00e1zi, Z., & Vida, R. (2007). Host identity specific multicast. International Conference on Networking and Services (ICNS '07), Athen, Greece.","DOI":"10.1109\/ICNS.2007.66"},{"key":"ijwnbt.2014010103-27","doi-asserted-by":"crossref","unstructured":"Laganier, J., & Eggert, L. (2008). Host identity protocol (HIP) rendezvous extension. RFC 5204.","DOI":"10.17487\/rfc5204"},{"key":"ijwnbt.2014010103-28","doi-asserted-by":"crossref","unstructured":"Laganier, J., Koponen, T., & Eggert, L. (2008). Host identity protocol (HIP) registration extension. RFC 5203.","DOI":"10.17487\/rfc5203"},{"key":"ijwnbt.2014010103-29","unstructured":"Li, Y., Chen, W., Su, L., Jin, D., & Zeng, L. (2009). Mobility management architecture based on integrated HIP and SIP protocols. In Proceedings of the International Conference on Telecommunications (ICT '09), Marrakech, Morocco (pp. 243-247)."},{"key":"ijwnbt.2014010103-30","doi-asserted-by":"crossref","unstructured":"Maekawa, K., & Okabe, Y. (2009). An enhanced location privacy framework with mobility using host identity protocol. In Proceedings of the Ninth Annual International Symposium on Applications and the Internet (SAINT '09), Bellevue, WA (pp. 23-29).","DOI":"10.1109\/SAINT.2009.13"},{"key":"ijwnbt.2014010103-31","unstructured":"Matos, A., Santos, J., Girao, J., Liebsch, M., & Aguiar, R. (2006, March). Host identity protocol location privacy extensions. IETF Internet Draft. draft-matoship-privacy-extensions-01."},{"key":"ijwnbt.2014010103-32","doi-asserted-by":"crossref","unstructured":"Matos, A., Santos, J., Sargento, S., Aguiar, R., Girao, J., & Liebsch, M. (2006). HIP location privacy framework. In Proceedings of the Fiirst ACM\/IEEE International Workshop on Mobility in the Evolving Internet Architecture (pp. 57\u201362). New York, NY: ACM Press.","DOI":"10.1145\/1186699.1186716"},{"key":"ijwnbt.2014010103-33","unstructured":"Melen, J., Ylitalo, J., Salmela, P., & Henderson, T. (2009, May 26). Host identity protocol-based mobile router (HIPMR). IETF Internet Draft. draft-melen-hip-mr-02."},{"key":"ijwnbt.2014010103-34","doi-asserted-by":"crossref","unstructured":"Moskowitz, R., & Nikander, P. (2006, May). Host identity protocol (HIP) architecture. IETF RFC 4423.","DOI":"10.17487\/rfc4423"},{"key":"ijwnbt.2014010103-35","doi-asserted-by":"crossref","unstructured":"Moskowitz, R., Nikander, P., Jokela, P., & Henderson, T. (2008, April). Host identity protocol. RFC 5201.","DOI":"10.17487\/rfc5201"},{"key":"ijwnbt.2014010103-36","doi-asserted-by":"crossref","unstructured":"Muslam, M., Chan, H., & Ventura, N. (2009). HIP based micro-mobility management optimization. In Proceedings of the Fifth International Conference on Wireless and Mobile Communications (ICWMC '09), Cannes, La Bocca (pp. 291\u2013295).","DOI":"10.1109\/ICWMC.2009.55"},{"key":"ijwnbt.2014010103-37","doi-asserted-by":"crossref","unstructured":"Nikander, P., & Arkko, J. (2004). Delegation of signaling rights. LNCS 2845, (pp. 203-214). Security Protocols 2002.","DOI":"10.1007\/978-3-540-39871-4_17"},{"key":"ijwnbt.2014010103-38","doi-asserted-by":"crossref","unstructured":"Nikander, P., Henderson, T., Vogt, C., & Arkko, J. (2008). End-host mobility and multihoming with the host identity protocol. RFC 5206.","DOI":"10.17487\/rfc5206"},{"key":"ijwnbt.2014010103-39","doi-asserted-by":"crossref","unstructured":"Nikander, P., & Laganier, J. (2008, April). Host identity protocol domain name system extension. RFC 5205.","DOI":"10.17487\/rfc5205"},{"key":"ijwnbt.2014010103-40","doi-asserted-by":"crossref","unstructured":"Nov\u00e1czki, S., Bokor, L., & Imre, S. (2006). Micromobility support in HIP: Survey and extension of host identity protocol. In Proceedings of the MELECON 2006 (Vol. 1, pp. 651-654). M\u00e1laga, Spain.","DOI":"10.1109\/MELCON.2006.1653184"},{"key":"ijwnbt.2014010103-41","doi-asserted-by":"crossref","unstructured":"Nov\u00e1czki, S., Bokor, L., & Imre, S. (2007). A HIP based network mobility protocol. In Proceedings of the SAINTWONEMO 2007, Hiroshima, Japan (pp. 48-52).","DOI":"10.1109\/SAINT-W.2007.8"},{"issue":"1","key":"ijwnbt.2014010103-42","doi-asserted-by":"crossref","first-page":"10","DOI":"10.4304\/jnw.3.1.10-24","article-title":"Design and Evaluation of a Novel HIP-Based Network Mobility Protocol.","volume":"3","author":"S.Nov\u00e1czki","year":"2008","journal-title":"Journal of Networks"},{"key":"ijwnbt.2014010103-43","unstructured":"Pierrel, S., Jokela, P., & Melen, J. (2006, June 19). Simultaneous Multi-Access extension to the Host Identity Protocol. IETF Internet-Draft. draft-pierrel-hip-sima-00."},{"key":"ijwnbt.2014010103-44","unstructured":"Pierrel, S., Jokela, P., Melen, J., & Slavov, K. (2007). A Policy System for Simultaneous Multiaccess with Host Identity Protocol. IEEE ACNM2007. Munich, Germany."},{"key":"ijwnbt.2014010103-45","doi-asserted-by":"crossref","unstructured":"Rothenberg, C. E., Wong, W., Verdi, F. L., & Magalhae, M. F. (2008). SIP over an Identifier\/Locator Splitted Next Generation Internet Architecture. 10th IEEE International Conference on Advanced Communication Technology (ICACT08). Republic of Korea.","DOI":"10.1109\/ICACT.2008.4493839"},{"key":"ijwnbt.2014010103-46","doi-asserted-by":"crossref","unstructured":"So, J., & Wang, J. (2008). Micro-HIP a HIP-based micro-mobility solution. In Proceedings of the IEEE International Conference on Communications Workshops (ICC Workshops '08.), Beijing, China (pp. 430-435).","DOI":"10.1109\/ICCW.2008.87"},{"key":"ijwnbt.2014010103-47","unstructured":"So, J. Y., & Wang, J. (2006). HIP based mobility management for UMTS\/WLAN integrated networks. In Proceedings of the Australian Telecommunication Networks and Applications Conference."},{"key":"ijwnbt.2014010103-48","doi-asserted-by":"crossref","unstructured":"Varga, A., & Hornig, R. (2008). An overview of the OMNeT++ simulation environment. In Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops (SIMUTools2008). Marseille, France.","DOI":"10.4108\/ICST.SIMUTOOLS2008.3027"},{"key":"ijwnbt.2014010103-49","doi-asserted-by":"crossref","unstructured":"Varjonen, S., Komu, M., & Gurtov, A. (2009). Secure and efficient IPv4\/IPv6 handovers using host-based identifier-locator split. In Proceedings of the 17th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2009) (pp. 111-115). Split-Hvar-Korcula.","DOI":"10.24138\/jcomss.v6i1.193"},{"issue":"1","key":"ijwnbt.2014010103-50","doi-asserted-by":"crossref","DOI":"10.24138\/jcomss.v6i1.193","article-title":"Secure and efficient IPv4\/v6 handovers using host-based identifier-location split.","volume":"6","author":"S.Varjonen","year":"2010","journal-title":"Journal of Communications Software and Systems"},{"key":"ijwnbt.2014010103-51","unstructured":"Wagner, S. (2006, December 1). Implementation and evaluation of the interaction between host identity protocol and session initiation protocol. Masterarbeit im Studiengang \u201cAngewandte Informatik."},{"key":"ijwnbt.2014010103-52","doi-asserted-by":"crossref","unstructured":"Yang, S., Qin, Y., Luo, H., & Zhang, H. (2008). P-HIP: Paging extensions for host identity protocol. In Proceedings of the IEEE Communications Workshops (ICC Workshops '08), Beijing, Chaina.","DOI":"10.1109\/ICCW.2008.86"},{"key":"ijwnbt.2014010103-53","doi-asserted-by":"crossref","unstructured":"Yang, S., Qin, Y., & Yang, D. (2007). Dynamic hierarchical location management scheme for host identity protocol. Lecture Notes in Computer Science, Mobile Ad-Hoc and Sensor Networks, 4864\/2007 as proceedings of MSN 2007.","DOI":"10.1007\/978-3-540-77024-4_19"},{"key":"ijwnbt.2014010103-54","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-009-9164-y"},{"key":"ijwnbt.2014010103-55","unstructured":"Y.ipv6split, I.-T. (2009, March 5). Framework of ID\/LOC separation in IPv6-based NGN. ITU-T Draft Recommendation."},{"key":"ijwnbt.2014010103-56","unstructured":"Y.ipsplit, I.-T. (2009, Feb. 6). General requirements for ID\/locator separation in NGN. ITU-T Draft Recommendation."},{"key":"ijwnbt.2014010103-57","doi-asserted-by":"crossref","unstructured":"Ylitalo, J. (2005). Re-thinking security in network mobility. In Proceedings of the NDSS Wireless and Security Workshop, San Diego, CA.","DOI":"10.1007\/978-3-540-30144-8_27"},{"key":"ijwnbt.2014010103-58","doi-asserted-by":"crossref","unstructured":"Ylitalo, J., Mel\u00e9, J., P. S., & Petander, H. (2008, May 20). An experimental evaluation of a HIP based network mobility scheme. WWIC 2008, LNCS, 5031\/2008, 139\u2013151.","DOI":"10.1007\/978-3-540-68807-5_12"},{"key":"ijwnbt.2014010103-59","doi-asserted-by":"crossref","unstructured":"Ylitalo, J., Mel\u00e9n, J., Nikander, P., & al., e. (2004). Re-thinking security in IP-based micro-mobility. In Proceedings of the 7th Information Security Conference (ICS'04), Palo Alto, CA (pp. 318-329).","DOI":"10.1007\/978-3-540-30144-8_27"},{"key":"ijwnbt.2014010103-60","doi-asserted-by":"crossref","unstructured":"Ylitalo, J., Mel\u00e9n, J., Nikander, P., & Torvinen, V. (2004, September 21). Re-thinking security in IP based micro-mobility. Lecture Notes in Computer Science, 3225\/2004, 318-329.","DOI":"10.1007\/978-3-540-30144-8_27"},{"key":"ijwnbt.2014010103-61","first-page":"3957","article-title":"BLIND: A complete identity protection framework for end-points.","author":"J.Ylitalo","year":"2006","journal-title":"Lecture Notes in Computer Science"}],"container-title":["International Journal of Wireless Networks and Broadband Technologies"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=104629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T18:26:19Z","timestamp":1689099979000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijwnbt.2014010103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,1,1]]},"references-count":62,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijwnbt.2014010103","relation":{},"ISSN":["2155-6261","2155-627X"],"issn-type":[{"value":"2155-6261","type":"print"},{"value":"2155-627X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1,1]]}}}