Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Patrik Salmela is active.

Publication


Featured researches published by Patrik Salmela.


wired wireless internet communications | 2008

An experimental evaluation of a HIP based network mobility scheme

Jukka Ylitalo; Jan Melén; Patrik Salmela; Henrik Petander

In this paper, the authors present and evaluate a network mobility scheme based on Host Identity Protocol (HIP). The cryptographic host identifiers are combined with an authorization mechanism and used for delegating the mobility management signalling rights between nodes in the architecture. While the delegation of the signalling rights scheme itself is a known concept, the trust model presented in this paper differs from the MIPv6 NEMO solution. In the presented approach, the mobile routers are authorized to send location updates directly to peer hosts on behalf of the mobile hosts without opening the solution for re-direction attacks. This is the first time the characteristics of the new scheme is measured in the HIP moving network context using a real implementation. The trust model makes it possible to support route optimization and minimize over-the-air signalling and renumbering events in the moving network. The measurements also reveal new kinds of anomalies in the protocol implementation and design when data integrity and confidentiality protection are integrated into signalling aggregation. The authors propose solutions for these anomalies.


international workshop on security | 2005

SPINAT: Integrating IPsec into Overlay Routing

Jukka Ylitalo; Patrik Salmela; Hannes Tschofenig

Tackling the major Internet security, scalability and mobility problems without essentially changing the existing Internet architecture has turned out to be a very challenging task. The overlay routing approaches fortunately seem to offer a sound way to mitigate most of these issues. Basically, they decouple the end-point identifiers from locators by defining a new namespace. Overlay routing is based on the dynamic binding, at middle-boxes, between the two namespaces. The approach is very close to Network Address Translation (NAT) principles. Therefore, the IPsec NAT traversal related problems apply also to overlay architectures. In this paper, we integrate IPsec into the overlay routing using Security Parameter Index (SPI) multiplexed NAT (SPINAT). Our approach reduces tunneling overhead and supports asymmetric communication paths. We believe that the SPINAT will be a key component in securing overlay routing infrastructures, like in the Internet Indirection Infrastructure (i^3).


world of wireless mobile and multimedia networks | 2008

Performance analysis of HIP-based mobility and triggering

Pekka Pääkkönen; Patrik Salmela; Ramón Agüero; Johnny Choque

Ambient Networks concentrates on the co-operation of heterogeneous networks over multiple domains and accesses. One of the main goals of the project is the integration of developed concepts for validation purposes. This paper presents a performance analysis on the integration of mobility triggering and Host Identity Protocol (HIP) based mobility on the Ambient Networks/FreeBSD platform. The scalability of triggering and handover latency has been focused on in terms of different mobility triggers and access technologies. The results enable identification of the largest delay components, which have been analyzed.


international conference on software, telecommunications and computer networks | 2007

An integrated Ambient Networks prototype

P. Paakkonen; Patrik Salmela; Ramón Agüero; Johnny Choque

Ambient networks (AN) project focuses on the convergence of heterogeneous networks over different domains. The aim (among others) is to facilitate co-operation, mobility support and multi-access between networks and terminals. One of the most important goals is to integrate the different AN-concepts together for validation. This paper presents an integrated prototype as proof-of-concepts, which can be used for demonstration purposes. In particular the prototype has integrated host identity protocol (HlP)-based mobility, HIP network mobility, simultaneous multi-access (SIMA) policies, generic link layer (GLL), mobility triggering (TRG) and basic composition concepts within the Ambient Control Space framework.


international conference on e-business and telecommunication networks | 2005

Host Identity Protocol Proxy

Patrik Salmela; Jan Melén

The Host Identity Protocol (HIP) is one of the more recent designs that challenge the current Internet architecture. The main features of HIP are security and the identifier-locator split, which solves the problem of overloading the IP address with two separate tasks. This paper studies the possibility of providing HIP services to legacy hosts via a HIP proxy. Making a host HIP enabled requires that the IP-stack of the host is updated to support HIP. From a network administrator’s perspective this can be a large obstacle. However, by providing HIP from a centralized point, a HIP proxy, the transition to begin using HIP can be made smoother. This and other arguments for a HIP proxy will be presented in this paper along with an analysis of a prototype HIP proxy and its performance.


ieee acm international symposium cluster cloud and grid computing | 2017

SynAPTIC: Secure And Persistent connecTIvity for Containers

Alireza Ranjbar; Miika Komu; Patrik Salmela; Tuomas Aura

Cloud virtualization technology is shifting towards light-weight containers, which provide isolated environments for running cloud-based services. The emerging trends such as container-based micro-service architectures and hybrid cloud deployments result in increased traffic volumes between the micro-services, mobility of the communication endpoints, and some of the communication taking place over untrusted networks. Yet, the services are typically designed with the assumption of scalable, persistent and secure connectivity. In this paper, we present the SynAPTIC architecture, which enables secure and persistent connectivity between mobile containers, especially in the hybrid cloud and in multi-tenant cloud networks. The solution is based on the standardized Host Identity Protocol (HIP) that tenants can deploy on top of existing cloud infrastructure independently of their cloud provider. Optional cloud-provider extensions based on Software-Defined Networking (SDN) further optimize the networking architecture. Our qualitative and quantitative evaluation shows that SynAPTIC performs better than some of the existing solutions.


network operations and management symposium | 2016

An SDN-based approach to enhance the end-to-end security: SSL/TLS case study

Alireza Ranjbar; Miika Komu; Patrik Salmela; Tuomas Aura

End-to-end encryption is becoming the norm for many applications and services. While this improves privacy of individuals and organizations, the phenomenon also raises new kinds of challenges. For instance, with the increase of devices using encryption, the volumes of outdated, exploitable encryption software also increases. This may create some distrust amongst the users against security unless its quality is enforced in some ways. Unfortunately, deploying new mechanisms at the end-points of the communication is challenging due to the sheer volume of devices, and modifying the existing services may not be feasible either. Hence, we propose a novel method for improving the quality of the secure sessions in a centralized way based on the SDN architecture. Instead of inspecting the encrypted traffic, our approach enhances the quality of secure sessions by analyzing the plaintext handshake messages exchanged between a client and server. We exploit the fact that many of todays security protocols negotiate the security parameters such as the protocol version, encryption algorithms or certificates in plaintext in a protocol handshake before establishing a secure session. By verifying the negotiated information in the handshake, our solution can improve the security level of SSL/TLS sessions. While the approach can be extended to many other protocols, we focus on the SSL/TLS protocol in this paper because of its wide-spread use. We present our implementation for the OpenDaylight controller and evaluate its overhead to SSL/TLS session establishment in terms of latency.


Archive | 2008

Methods and apparatus for wireless device registration

Patrik Salmela


Archive | 2009

Method and apparatus for managing subscription credentials in a wireless communication device

Patrik Salmela; Vesa Lehtovirta


Archive | 2004

IDENTIFICATION METHOD AND APPARATUS FOR ESTABLISING HOST IDENTITY PROTOCOL (HIP) CONNECTIONS BETWEEN LEGACY AND HIP NODES

Petri Jokela; Pekka Nikander; Patrik Salmela; Jari Arkko; Jukka Ylitalo

Collaboration


Dive into the Patrik Salmela's collaboration.

Researchain Logo
Decentralizing Knowledge