This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2024-07-03
Creation time: 21-35-12
--- Number of references
9
techreport
2015-draft-moskowitz-hip-dex-04
HIP Diet EXchange (DEX)
2015
7
20
draft-moskowitz-hip-dex-04
This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-04
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
techreport
2015-draft-moskowitz-hip-dex-03
HIP Diet EXchange (DEX)
2015
6
19
draft-moskowitz-hip-dex-03
This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-03
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
techreport
2014-draft-moskowitz-hip-dex-02
HIP Diet EXchange (DEX)
2014
12
19
draft-moskowitz-hip-dex-02
This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-02
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
techreport
2014-draft-moskowitz-hip-dex-01
HIP Diet EXchange (DEX)
2014
3
4
draft-moskowitz-hip-dex-01
This document specifies the Host Identity Protocol Diet EXchange (HIP
DEX), a variant of the HIP Base EXchange (HIP BEX) [rfc5201-bis].
The HIP DEX protocol design aims at reducing the overhead of the
employed cryptographic primitives by omitting public-key signatures
and hash functions. In doing so, the main goal is to still deliver
similar security properties to HIP BEX.
The HIP DEX protocol is primarily targeted at computation or memory-constrained sensor devices. Like HIP BEX, it is expected to be used
together with another suitable security protocol such as the
Encapsulated Security Payload (ESP) [rfc5202-bis] for the protection
of upper layer protocols. HIP DEX can also be used as a keying
mechanism for a MAC layer security protocol as is supported by IEEE
802.15.4 [IEEE.802-15-4.2011].
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-01
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
techreport
rfc5201-bis-04
<prt>Host Identity Protocol Version 2</prt>
2011
1
1
draft-ietf-hip-rfc5201-bis-04.txt
<prt>expires: July 24, 2011 (work in progress)</prt>
mobile_access
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-04
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-04
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
Thomas R.Henderson
TobiasHeer
techreport
rfc5201-bis-03
<prt>Host Identity Protocol Version 2</prt>
2010
10
1
draft-ietf-hip-rfc5201-bis-03.txt
<prt>expires: April 26, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
techreport
rfc5201-bis-01
<prt>Host Identity Protocol Version 2</prt>
2010
9
1
draft-ietf-hip-rfc5201-bis-01.txt
<prt>expires: March 7, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
techreport
moskowitz-rfc5201-bis-02
<prt>Host Identity Protocol Version 2</prt>
2010
7
1
draft-moskowitz-hip-rfc5201-bis-02.txt
<prt>expires: January 2, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
techreport
rfc5201-bis-02
<prt>Host Identity Protocol Version 2</prt>
2010
7
1
draft-ietf-hip-rfc5201-bis-02.txt
<prt>expires: March 7, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer