scispace - formally typeset
Search or ask a question
Author

R. Housley

Bio: R. Housley is an academic researcher. The author has contributed to research in topics: Payload (computing) & Initialization vector. The author has an hindex of 1, co-authored 1 publications receiving 232 citations.

Papers
More filters
01 Jan 2004
TL;DR: This document describes the use of Advanced Encryption Standard (AES) Counter Mode, with an explicit initialization vector, as an IPsec Encapsulating Security Payload (ESP) confidentiality mechanism.
Abstract: This document describes the use of Advanced Encryption Standard (AES) Counter Mode, with an explicit initialization vector, as an IPsec Encapsulating Security Payload (ESP) confidentiality mechanism.

233 citations


Cited by
More filters
Book
21 Dec 2009
TL;DR: 6LoWPAN: The Wireless Embedded Internet is an invaluable reference for professionals working in fields such as telecommunications, control, and embedded systems, and Advanced students and teachers in electrical engineering, information technology and computer science will also find this book useful.
Abstract: "It is stunningly thorough and takes readers meticulously through the design, conguration and operation of IPv6-based, low-power, potentially mobile radio-based networking" Vint Cerf, Vice President and Chief Internet Evangelist, Google This book provides a complete overview of IPv6 over Low Power Wireless Area Network (6LoWPAN) technology In this book, the authors provide an overview of the 6LoWPAN family of standards, architecture, and related wireless and Internet technology Starting with an overview of the IPv6 Internet of Things, readers are offered an insight into how these technologies fit together into a complete architecture The 6LoWPAN format and related standards are then covered in detail In addition, the authors discuss the building and operation of 6LoWPAN networks, including bootstrapping, routing, security, Internet ingration, mobility and application protocols Furthermore, implementation aspects of 6LoWPAN are covered Key Features: Demonstrates how the 6LoWPAN standard makes the latest Internet protocols available to even the most minimal embedded devices over low-rate wireless networks Provides an overview of the 6LoWPAN standard, architecture and related wireless and Internet technology, and explains the 6LoWPAN protocol format in detail Details operational topics such as bootstrapping, routing, security, Internet integration, mobility and application protocols Written by expert authors with vast experience in the field (industrial and academic) Includes an accompanying website containing tutorial slides, course material and open-source code with examples (http://6lowpannet ) 6LoWPAN: The Wireless Embedded Internet is an invaluable reference for professionals working in fields such as telecommunications, control, and embedded systems Advanced students and teachers in electrical engineering, information technology and computer science will also find this book useful

689 citations

Book
01 Jan 2010
TL;DR: Interconnecting Smart Objects with IP is the first book that takes a holistic approach to the revolutionary area of IP-based smart objects, offering an in-depth examination of relevant IP protocols to build large scale smart object networks in support of a myriad of new services.
Abstract: Smart object technology, sometimes called the Internet of Things, is having a profound impact on our day-to-day lives. Interconnecting Smart Objects with IP is the first book that takes a holistic approach to the revolutionary area of IP-based smart objects. Smart objects are the intersection of networked embedded systems, wireless sensor networks, ubiquitous and pervasive computing, mobile telephony and telemetry, and mobile computer networking. This book consists of three parts, Part I focuses on the architecture of smart objects networking, Part II covers the hardware, software, and protocols for smart objects, and Part III provides case studies on how and where smart objects are being used today and in the future. The book covers the fundamentals of IP communication for smart objects, IPv6, and web services, as well as several newly specified low-power IP standards such as the IETF 6LoWPAN adaptation layer and the RPL routing protocol. This book contains essential information not only for the technical reader but also for policy makers and decision makers in the area of smart objects both for private IP networks and the Internet. Shows in detail how connecting smart objects impacts our lives with practical implementation examples and case studies Provides an in depth understanding of the technological and architectural aspects underlying smart objects technology Offers an in-depth examination of relevant IP protocols to build large scale smart object networks in support of a myriad of new services Table of Contents Part I: The Architecture Chapter 1: What are Smart objects? Chapter 2: The IP protocol architecture Chapter 3: Why IP for smart objects? Chapter 4: IPv6 for Smart Object Networks and The Internet of Things Chapter 5: Routing Chapter 6: Transport Protocols Chapter 7: Service Discovery Chapter 8: Security for Smart Objects Chapter 9: Web services For Smart Objects Chapter 10: Connectivity models for smart object networks Part II: The Technology Chapter 11: What is a Smart Object? Chapter 12: Low power link layer for smart objects networks Chapter 13: uIP A Lightweight IP Stack Chapter 14: Standardization Chapter 15: IPv6 for Smart Object Networks - A Technology Refresher Chapter 16: The 6LoWPAN Adaptation Layer Chapter 17: RPL Routing in Smart Object Networks Chapter 18: The IPSO Alliance Chapter 19: Non IP Technology Part III: The Applications Chapter 20: Smart Grid Chapter 21: Industrial Automation Chapter 22: Smart Cities and Urban Networks Chapter 23: Home Automation Chapter 24: Building Automation Chapter 25: Structural Health Monitoring Chapter 26: Container Tracking

429 citations

Patent
31 Jul 2012
TL;DR: In this article, a general packet radio service (GPRS) tunnel protocol (GTP) is implemented in a packet core (PC) of a third generation (3G) network having a split architecture where a control plane of the PC of the 3G network is in a cloud computing system, the cloud system including a controller, the controller to execute a plurality of control plane modules, the control plane to communicate with the data plane of a PC through a control-plane protocol.
Abstract: A method for implementing a general packet radio service (GPRS) tunnel protocol (GTP) in a packet core (PC) of a third generation (3G) network having a split architecture where a control plane of the PC of the 3G network is in a cloud computing system, the cloud computing system including a controller, the controller to execute a plurality of control plane modules, the control plane to communicate with the data plane of the PC through a control plane protocol, the data plane implemented in a plurality of network elements of the 3G network by configuring switches implementing a data plane of the SGSN and GGSN and intermediate switches to establish a first and second GTP tunnel endpoint.

386 citations

Patent
13 Sep 2012
TL;DR: A secure domain name service for a computer network is disclosed that includes a portal connected to the Internet, and a domain name database that stores secure computer network addresses for the computer network as discussed by the authors.
Abstract: A secure domain name service for a computer network is disclosed that includes a portal connected to a computer network, such as the Internet, and a domain name database connected to the computer network through the portal. The portal authenticates a query for a secure computer network address, and the domain name database stores secure computer network addresses for the computer network. Each secure computer network address is based on a non-standard top-level domain name, such as .scom, .sorg, .snet, .snet, .sedu, .smil and .sint.

294 citations

Patent
16 Aug 2007
TL;DR: In this article, a technique for establishing a secure communication link between a first computer and a second computer over a computer network has been described, where one or more data values that vary according to a pseudo-random sequence are inserted into each data packet.
Abstract: A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a secure communication mode of communication is enabled at a first computer without a user entering any cryptographic information for establishing the secure communication mode of communication. Then, a secure communication link is established between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication. The secure communication link is a virtual private network communication link over the computer network in which one or more data values that vary according to a pseudo-random sequence are inserted into each data packet.

270 citations