Patrik Salmela
Ericsson
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Patrik Salmela.
wired wireless internet communications | 2008
Jukka Ylitalo; Jan Melén; Patrik Salmela; Henrik Petander
In this paper, the authors present and evaluate a network mobility scheme based on Host Identity Protocol (HIP). The cryptographic host identifiers are combined with an authorization mechanism and used for delegating the mobility management signalling rights between nodes in the architecture. While the delegation of the signalling rights scheme itself is a known concept, the trust model presented in this paper differs from the MIPv6 NEMO solution. In the presented approach, the mobile routers are authorized to send location updates directly to peer hosts on behalf of the mobile hosts without opening the solution for re-direction attacks. This is the first time the characteristics of the new scheme is measured in the HIP moving network context using a real implementation. The trust model makes it possible to support route optimization and minimize over-the-air signalling and renumbering events in the moving network. The measurements also reveal new kinds of anomalies in the protocol implementation and design when data integrity and confidentiality protection are integrated into signalling aggregation. The authors propose solutions for these anomalies.
international workshop on security | 2005
Jukka Ylitalo; Patrik Salmela; Hannes Tschofenig
Tackling the major Internet security, scalability and mobility problems without essentially changing the existing Internet architecture has turned out to be a very challenging task. The overlay routing approaches fortunately seem to offer a sound way to mitigate most of these issues. Basically, they decouple the end-point identifiers from locators by defining a new namespace. Overlay routing is based on the dynamic binding, at middle-boxes, between the two namespaces. The approach is very close to Network Address Translation (NAT) principles. Therefore, the IPsec NAT traversal related problems apply also to overlay architectures. In this paper, we integrate IPsec into the overlay routing using Security Parameter Index (SPI) multiplexed NAT (SPINAT). Our approach reduces tunneling overhead and supports asymmetric communication paths. We believe that the SPINAT will be a key component in securing overlay routing infrastructures, like in the Internet Indirection Infrastructure (i^3).
world of wireless mobile and multimedia networks | 2008
Pekka Pääkkönen; Patrik Salmela; Ramón Agüero; Johnny Choque
Ambient Networks concentrates on the co-operation of heterogeneous networks over multiple domains and accesses. One of the main goals of the project is the integration of developed concepts for validation purposes. This paper presents a performance analysis on the integration of mobility triggering and Host Identity Protocol (HIP) based mobility on the Ambient Networks/FreeBSD platform. The scalability of triggering and handover latency has been focused on in terms of different mobility triggers and access technologies. The results enable identification of the largest delay components, which have been analyzed.
international conference on software, telecommunications and computer networks | 2007
P. Paakkonen; Patrik Salmela; Ramón Agüero; Johnny Choque
Ambient networks (AN) project focuses on the convergence of heterogeneous networks over different domains. The aim (among others) is to facilitate co-operation, mobility support and multi-access between networks and terminals. One of the most important goals is to integrate the different AN-concepts together for validation. This paper presents an integrated prototype as proof-of-concepts, which can be used for demonstration purposes. In particular the prototype has integrated host identity protocol (HlP)-based mobility, HIP network mobility, simultaneous multi-access (SIMA) policies, generic link layer (GLL), mobility triggering (TRG) and basic composition concepts within the Ambient Control Space framework.
international conference on e-business and telecommunication networks | 2005
Patrik Salmela; Jan Melén
The Host Identity Protocol (HIP) is one of the more recent designs that challenge the current Internet architecture. The main features of HIP are security and the identifier-locator split, which solves the problem of overloading the IP address with two separate tasks. This paper studies the possibility of providing HIP services to legacy hosts via a HIP proxy. Making a host HIP enabled requires that the IP-stack of the host is updated to support HIP. From a network administrator’s perspective this can be a large obstacle. However, by providing HIP from a centralized point, a HIP proxy, the transition to begin using HIP can be made smoother. This and other arguments for a HIP proxy will be presented in this paper along with an analysis of a prototype HIP proxy and its performance.
ieee acm international symposium cluster cloud and grid computing | 2017
Alireza Ranjbar; Miika Komu; Patrik Salmela; Tuomas Aura
Cloud virtualization technology is shifting towards light-weight containers, which provide isolated environments for running cloud-based services. The emerging trends such as container-based micro-service architectures and hybrid cloud deployments result in increased traffic volumes between the micro-services, mobility of the communication endpoints, and some of the communication taking place over untrusted networks. Yet, the services are typically designed with the assumption of scalable, persistent and secure connectivity. In this paper, we present the SynAPTIC architecture, which enables secure and persistent connectivity between mobile containers, especially in the hybrid cloud and in multi-tenant cloud networks. The solution is based on the standardized Host Identity Protocol (HIP) that tenants can deploy on top of existing cloud infrastructure independently of their cloud provider. Optional cloud-provider extensions based on Software-Defined Networking (SDN) further optimize the networking architecture. Our qualitative and quantitative evaluation shows that SynAPTIC performs better than some of the existing solutions.
network operations and management symposium | 2016
Alireza Ranjbar; Miika Komu; Patrik Salmela; Tuomas Aura
End-to-end encryption is becoming the norm for many applications and services. While this improves privacy of individuals and organizations, the phenomenon also raises new kinds of challenges. For instance, with the increase of devices using encryption, the volumes of outdated, exploitable encryption software also increases. This may create some distrust amongst the users against security unless its quality is enforced in some ways. Unfortunately, deploying new mechanisms at the end-points of the communication is challenging due to the sheer volume of devices, and modifying the existing services may not be feasible either. Hence, we propose a novel method for improving the quality of the secure sessions in a centralized way based on the SDN architecture. Instead of inspecting the encrypted traffic, our approach enhances the quality of secure sessions by analyzing the plaintext handshake messages exchanged between a client and server. We exploit the fact that many of todays security protocols negotiate the security parameters such as the protocol version, encryption algorithms or certificates in plaintext in a protocol handshake before establishing a secure session. By verifying the negotiated information in the handshake, our solution can improve the security level of SSL/TLS sessions. While the approach can be extended to many other protocols, we focus on the SSL/TLS protocol in this paper because of its wide-spread use. We present our implementation for the OpenDaylight controller and evaluate its overhead to SSL/TLS session establishment in terms of latency.
Archive | 2008
Patrik Salmela
Archive | 2009
Patrik Salmela; Vesa Lehtovirta
Archive | 2004
Petri Jokela; Pekka Nikander; Patrik Salmela; Jari Arkko; Jukka Ylitalo