[Hipsec] Paper: Adoption barriers of HIP

Levä Tapio <tapio.leva@aalto.fi> Fri, 12 April 2013 10:39 UTC

Return-Path: <tapio.leva@aalto.fi>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 72A0821F8B13 for <hipsec@ietfa.amsl.com>; Fri, 12 Apr 2013 03:39:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.299
X-Spam-Level:
X-Spam-Status: No, score=-2.299 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MIME_8BIT_HEADER=0.3]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bDybBluOsvEH for <hipsec@ietfa.amsl.com>; Fri, 12 Apr 2013 03:39:05 -0700 (PDT)
Received: from mx06.aalto.fi (mx06.aalto.fi [130.233.222.105]) by ietfa.amsl.com (Postfix) with ESMTP id 1F60E21F8A91 for <hipsec@ietf.org>; Fri, 12 Apr 2013 03:39:05 -0700 (PDT)
Received: from mx06.aalto.fi (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id D9F958030D for <hipsec@ietf.org>; Fri, 12 Apr 2013 13:39:03 +0300 (EEST)
Received: from EXHUB03.org.aalto.fi (exhub03.org.aalto.fi [130.233.222.116]) by mx06.aalto.fi (Postfix) with ESMTP id CFDE680309 for <hipsec@ietf.org>; Fri, 12 Apr 2013 13:39:03 +0300 (EEST)
Received: from EXMDB03.org.aalto.fi ([169.254.3.137]) by EXHUB03.org.aalto.fi ([130.233.222.116]) with mapi id 14.02.0318.001; Fri, 12 Apr 2013 13:39:03 +0300
From: Levä Tapio <tapio.leva@aalto.fi>
To: "hipsec@ietf.org" <hipsec@ietf.org>
Thread-Topic: Paper: Adoption barriers of HIP
Thread-Index: AQHON2nzd1gdO9ZU6kiq/U5UtMnG9w==
Date: Fri, 12 Apr 2013 10:39:03 +0000
Message-ID: <914E4AF9EA753942BBF6770F26EB86D4DE0ABD7C@EXMDB03.org.aalto.fi>
Accept-Language: fi-FI, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [130.233.154.111]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <52CE63AD03B1AD4E82F6197B02E36A25@aalto.fi>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [Hipsec] Paper: Adoption barriers of HIP
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Apr 2013 10:39:06 -0000

Hi all,

I would like to inform you about a paper titled as "Adoption barriers of
network layer protocols: The case of host identity protocol" that was
recently published in the Elsevier Computer Networks journal. The paper
was authored by Tapio Levä, Miika Komu, Ari Keränen and Sakari Luukkainen
and many people in the HIP (and the IETF) community were interviewed for
the paper in the summer of 2011.

Moreover, we gave presentations on the topic in multiple HIPRG meetings:
- IETF80: http://www.ietf.org/proceedings/80/slides/HIPRG-6.pdf
- IETF81: http://www.ietf.org/proceedings/81/slides/HIPRG-5.pdf
- IETF82: http://www.ietf.org/proceedings/82/slides/HIPRG-5.pdf

The paper is available online on
http://dx.doi.org/10.1016/j.comnet.2012.11.024. In case you do not have
access to the journal but are interested reading the paper, please contact
me by email.


Abstract of the paper:
With increasing societal dependence on the Internet and new application
areas emerging, the need for securing communications and identifying
communication partners is expected to increase. However, the original
Internet architecture is lacking these functionalities, and most of the
protocols proposed to fix these issues have not been widely deployed.
Often one of the reasons for such failure is that protocol designers have
insufficient understanding of the potential adopters¹ economic incentives
so one may end up designing protocols based on false or inaccurate
assumptions. In this paper, we analyze the Host Identity Protocol (HIP)
from this viewpoint. Based on 19 expert interviews, we identify six main
reasons why HIP has not been widely deployed yet. Most importantly, (1)
the demand for the functionalities of HIP has been low. Where demand would
have existed, substitute solutions have been favored because (2) they were
earlier on the market, (3) they have relative advantage due to some design
choices of HIP, (4) HIP lacks early adopter benefits necessitating costly
coordination among multiple stakeholders in public deployment scenarios,
and (5) people have misconceptions about the deployability of HIP.
Additionally, (6) the research-mindedness of HIP developers has lead to
strategic mistakes and non-optimal design choices from the perspective of
deployment. We also suggest strategies that HIP developers could take to
foster the adoption of HIP. Besides providing value to HIP developers, the
results propose some new adoption barriers and deployment strategies that
could be taken into account when designing new protocols. Finally, the
article also provides a template that could be followed when studying the
feasibility of other protocols.



Best regards,

-- 
Tapio Levä
Doctoral student
Network Economics Research Group
Department of Communications and Networking
Aalto University
tapio.leva@aalto.fi
+358-50-5710073
http://www.leva.fi/