Reference Hub1
Enterprise Network Packet Filtering for Mobile Cryptographic Identities

Enterprise Network Packet Filtering for Mobile Cryptographic Identities

Janne Lindqvist, Essi Vehmersalo, Miika Komu, Jukka Manner
Copyright: © 2010 |Volume: 1 |Issue: 1 |Pages: 16
ISSN: 1947-9158|EISSN: 1947-9166|ISSN: 1947-9158|EISBN13: 9781616929855|EISSN: 1947-9166|DOI: 10.4018/jhcr.2010090905
Cite Article Cite Article

MLA

Lindqvist, Janne, et al. "Enterprise Network Packet Filtering for Mobile Cryptographic Identities." IJHCR vol.1, no.1 2010: pp.79-94. http://doi.org/10.4018/jhcr.2010090905

APA

Lindqvist, J., Vehmersalo, E., Komu, M., & Manner, J. (2010). Enterprise Network Packet Filtering for Mobile Cryptographic Identities. International Journal of Handheld Computing Research (IJHCR), 1(1), 79-94. http://doi.org/10.4018/jhcr.2010090905

Chicago

Lindqvist, Janne, et al. "Enterprise Network Packet Filtering for Mobile Cryptographic Identities," International Journal of Handheld Computing Research (IJHCR) 1, no.1: 79-94. http://doi.org/10.4018/jhcr.2010090905

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Firewalls are an essential component of the Internet and enterprise network security policy enforcement today. The configurations of enterprise firewalls are typically rather static. Even if client’s IP addresses can be dynamically added to the packet filtering rules, the services allowed through the firewall are commonly still fixed. In this paper, we present a transparent firewall configuration solution based on mobile cryptographic identifiers of Host Identity Protocol (HIP). HIP allows a client to protect the data transfer with IPsec ESP, and supports dynamic address changes for mobile clients. The HIP-based firewall learns the identity of a client when it communicates with the server over HIP. The firewall configures the necessary rules based on HIP control messages passing through the firewall. The solution is secure and flexible, and introduces only minimal latency to the initial HIP connection establishment.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.