Publications
My researcher id is J-6433-2012.
See also my profile in google scholar.
Research
Internetworking seminar: Host Identity Payload in Home Networks (pdf)
An Implementation of HIP for Linux, Proceedings of the Linux Symposium, 2003
Master's Thesis: Application Programming Interfaces for the Host Identity Protocol [pdf] [latex/tgz]
Mitigation of Unsolicited Traffic Across Domains with Host Identities and Puzzles, Miika Komu, Sasu Tarkoma and Andrey Lukyanenko, Nordsec 2010, ISBN: 978-3-642-27936-2
S. Varjonen, M. Komu, A. Gurtov, Secure and Efficient IPv4/IPv6 Handovers Using Host-Based Identifier-Location Split, Proceedings of the 17th international conference on Software, Telecommunications and Computer Networks, 2009
Nikander; Pekka; Gurtov; Andrei; Hlinovsky; Jan (eds); Ylikerälä, Markus; Särelä, Mikko; Ylitalo, Jukka; Zhou, Wenpeng; Yang, Zhirong; Koponen, Teemu; Salmela, Patrik; Camarillo, Gonzalo; Grenman, Thomas; Al-Mohammed, Mousa; Pohan, Henry L. E.; Komu, Miika; Wall, Jorma; Hautakorpi, Jani; Ylitalo, Katri Identifier/Locator Split and DHTs, Proceedings of the Research Seminar on Telecommunications Software, Fall 2004.
Janne Lindqvist and Miika Komu, Cure for Spam over Internet Telephony, 4th IEEE Consumer Communications and Networking Conference - IEEE CCNC 2007, Las Vegas, USA, 11-13 January 2007.
Lindqvist, Janne; Vehmersalo, Essi; Komu, Miika; Manner, Jukka, Enterprise Network Packet Filtering for Mobile Cryptographic Identities. Usenix 2007 Annual Technical Conference, Santa Clara, CA, June 20, 2007.
Janne Lindqvist, Essi Vehmersalo, Jukka Manner and Miika Komu, Enterprise Network Packet Filtering for Mobile Cryptographic Identities, International Journal of Handheld Computing Research, 1(1), 79-94, January-March 2010 79
Miika Komu and Janne Lindqvist, Leap-of-Faith Security is Enough for IP Mobility, 6th Annual IEEE Consumer Communications & Networking Conference IEEE CCNC 2009, Las Vegas, Nevada, January 2009
Tobias Heer, Rene Hummen, Miika Komu, Stefan Götz and Klaus Wehre, End-host Authentication and Authorization for Middleboxes based on a Cryptographic Namespace, to be published in ICC2009 Communication and Information Systems Security Symposium
Kristiina Karvonen, Miika Komu and Andrei Gurtov, Usable Security Management with Host Identity Protocol, published in The 7th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-2009)
Sasu Tarkoma, Ramya Balu, Jaakko Kangasharju, Miika Komu, Mika Kousa, Tancred Lindholm, Mikko Mäkelä, Marko Saaresto, Kristian Slavov, and Kimmo Raatikainen. State of the Art in Enablers for Applications in Future Mobile Wireless Internet, HIIT Publication 2004-2, Technical Report, September 2004
S. Varjonen, M. Komu, A. Gurtov, Secure and Efficient IPv4/IPv6 Handovers Using Host-Based Identifier-Location Split, ISSN 18456421, Journal of Communications Software and Systems, 6(1), 2010.
Applicability Analysis of Grid Security Mechanisms on Cloud, ISBN: 978-1-4577-1635-5 Rasib Hassan Khan, Miika Komu and Tuomas Aura, CSC 2011
Yang Deng, Zhonghong Ou, Miika Komu, Vilen Looga, Antti Ylä-Jääski, Anatomy of the Connecting Architecture of Internet of Things, submitted to IEEE CCIS2012 in September 2012
Miika Komu, Samu Varjonen, Sasu Tarkoma and Andrei Gurtov: Sockets and Beyond: Assessing the Source Code of Network Applications, YTP 2012 poster, ISSN: 1458-4786
Miika Komu, Samu Varjonen, Sasu Tarkoma and Andrei Gurtov: Sockets and Beyond: Assessing the Source Code of Network Applications, Ottawa Linux Symposium + extra materials
M. Komu, M. Sethi, R. Mallavarapu, H. Oirola, R. Khan, and S. Tarkoma. Secure Networking for Virtual Machines in the Cloud, 2012 International Conference on Cluster Computing, DOI 10.1109/ClusterW.2012.29, IEEE, sep 2012.
A. K. Tapio Levä, Miika Komu and S. Luukkainen. Adoption Barriers of Network-layer Protocols: the Case of Host Identity Protocol. Mar. 2013. Elsevier COMNET Journal, ISSN: 1389-1286.
A Consolidated Namespace for Network Applications, Developers, Administrators and Users, Miika Komu, Dissertation, Dec 2012, ISBN: 978-952-60-4904-5 (printed), ISBN: 978-952-60-4905-2 (electronic). See full draft with publications or final version without the publications.
Ilaghi M., Levä T., Komu M. (2014). Techno-economic Feasibility Analysis of Constrained Application Protocol. Accepted to 2014 IEEE World Forum on Internet of Things (WF-IoT), March 6-8, Seoul, Korea.
Dung Vu Ba Tien, Miika Komu, Matti Siekkinen, Antti Ylä-Jääski. H-box: Interconnecting Devices Across Local Networks. To appear in the 39th IEEE Conference on Local Computer Networks (LCN) in September 2014.
Roberto Morabito, Jimmy Kjällman and Miika Komu Hypervisors vs. Lightweight Virtualization: a Performance Comparison, accepted in IEEE International Conference on Cloud Engineering (IC2E 2015), 9-13 March, in Tempe, Arizona.
DII-HEP - A Secure Scientific Cloud, Lirim Osmani, Salman Toor, Miika Komu, Matti J. Kortelainen, Tomas Lindén, John White, Rasib Khan, Paula Eerola, Sasu Tarkoma, an abstract in 16th International workshop on Advanced Computing and Analysis Techniques in physics research (ACAT), September 2014
Tapio Levä, Mahya Ilaghi, Vilen Looga, Miika Komu, Nicklas Beijar, and Oleksiy Mazhelis: Adoption of Constrained Application Protocol: A Techno-Economic Perspective, accepted in the proceedings of International Journal of Innovation in the Digital Economy (IJIDE), 2015
L. Osmani, S.Toor, M. Komu, M. Kortelainen, T. Linden, J. White, R. Khan, P. Eerola, S. Tarkoma, The DII-HEP OpenStack based CMS Data Analysis for secure cloud resources, 21st International Conference on Computing in High Energy and Nuclear Physics, 13-17 Apr 2015, Okinawa Institute of Science and Technology, Okinawa (Japan)
M. Komu, M. Sethi, N. Beijar: A Survey of Identifier-Locator Split Addressing Architectures, accepted in Computer Science Review (Elsevier), 2015
L. Osmani, S. Tarkoma, P. Eerola, M. Komu, M. J. Kortelainen, O. Kraemer, T. Lindén, S. Toor and J. White, An overview of the DII-HEP OpenStack based CMS data analysis, in Journal of Physics, 2015, Conference Series, Issue 1, Volume 608, ISSN 1742-6596
Lirim Osmani, Salman Toor, Miika Komu, Matti J. Kortelainen, Tomas Lindén, John White, Rasib Khan, Paula Eerola, Sasu Tarkoma, "Secure Cloud Connectivity for Scientific Applications", accepted to special issue on Cloud Services Meet Big Data of the IEEE Transactions on Services Computing, 2015
Oscar Novo, Nicklas Beijar, Mert Ocak, Jimmy Kjällman, Miika Komu, Tero Kauppinen, Capillary Networks – Bridging the Cellular and IoT Worlds, WF-IoT 2015
Alireza Ranjbar, Miika Komu, Patrik Salmela, Tuomas Aura: "An SDN-Based Approach to Enhance the End-to-End Security: SSL/TLS Case Study", accepted to IEEE/IFIP Network Operations and Management Symposium (NOMS 2016)
Miika Komu, Roberto Morabito, Tero Kauppinen, Jimmy Kjällman, Yong Yao: "Power Consumption in Remote Gaming: an Empirical Evaluation", accepted in IEEE Global Internet symposium 2016
Jimmy Kjällman, Miika Komu, Tero Kauppinen: "Power Aware Media Delivery Platform Based on Containers", ICIN 2016
Alireza Ranjbar, Miika Komu, Patrik Salmela, Tuomas Aura, SynAPTIC: Secure And Persistent connecTIvity for Containers, accepted as as a short paper in 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID 2017)
Tenager Mekonnen, Miika Komu, Roberto Morabito, Tero Kauppinen, Erkki Harjula, Timo Koskela, Mika Ylianttila: "Energy Consumption Analysis of Edge Orchestrated Virtualized Wireless multimedia Sensor Networks", 10.1109/ACCESS.2017.2783447, IEEE access, December 2017
Popescu et al, Greening Video Distribution Networks: Energy-Efficient Internet Video Delivery, ebook, March 2018, ISBN 978-3-319-71718-0
Reijonen et al., Regression Training using Model Parallelism in a Distributed Cloud, 17th IEEE International Conference on Pervasive Intelligence and Computing, Aug 2019
Reijonen et al., Benchmarking Q-Learning Methods for Intelligent Network Orchestration in the Edge, 2020 2nd 6G Wireless Summit (6G SUMMIT), March 2020
L. Osmani, T. Kauppinen, M. Komu and S. Tarkoma, "Multi-Cloud Connectivity for Kubernetes in 5G Networks," in IEEE Communications Magazine, vol. 59, no. 10, pp. 42-47, October 2021, doi: 10.1109/MCOM.110.2100124.
Antti Kolehmainen, Miika Komu, Sepehr Javid, Jimmy Kjällman, Tero Kauppinen, Fayezeh Ghavimi, Bilhanan Silverajan, "Benchmarking of Emulated Wireless Edge Cloud Connectivity for Maritime Environments", IEEE 8th World Forum on Internet of Things, 26 October–11 November 2022, Yokohama, Japan
Blog article: Enhancing service mobility in the 5G edge cloud and beyond, Miika Komu and Tero Kauppinen, 6.11.2022
Sepehr Javid, Miika Komu and Jimmy Kjällman: "QoS-Aware Congestion Control using SRv6", accepted to 2023 IEEE Conference on Standards for Communications and Networking (CSCN)
Technical
Standardization
RFC4423-bis: Host Identity Protocol Architecture, R. Moskowitz, M. Komu, Feb 2019
End-Host Authentication for HIP Middleboxes, Tobias Heer, Klaus Wehrle, Miika Komu, July 2008
RFC 9063, Host Identity Protocol Architecture , R. Moskowitz, Ed., M. Komu, Informational, IETF, July 2021, DOI: 10.17487/RFC9063
RFC 9028, Native NAT Traversal Mode for the Host Identity Protocol, A. Keränen, J. Melén, M. Komu, Ed., Experimental, IETF, July 2021, 10.17487/RFC9028
Presentations
A number of presentations at the IETF (no link)