Network layer protocols with Byzantine robustness.
Radia Perlman, 1988.

It was suggested to me that current proposals for secure routing protocols are suffering from folks not having actually read Perlman's 1988 thesis.

This page is intended to make the thesis easy to find, read, and print.

Abstract

The Network Layer of a network architecture is a distributed protocol that facilitates packet delivery across multiple hops. One of its chief functions is the calculation of routes throughout the network. Traditional Network Layer protocols have addressed robustness in the face of simple failures, i.e. nodes or links becoming inoperative. This thesis examines Network Layer protocol designs that are robust in the presence of Byzantine failures, i.e., nodes that through malice or malfunction exhibit arbitrary behavior such as corrupting, forging, or delaying routing protocol messages.

Printing

LCS provides PDF and PS files, with 300dpi scanned page images.

MIT-LCS-TR-429 -- pdf (11MB) , ps (39MB).

Reading it online

Thumbnails: 1-24, 25-48, 49-72, 73-96, 97-120, 121.

Pages: 1 2 3 4 5 -- 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 -- 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 -- 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 -- 113 114 115 116 117 118 119 120 121

Title page
Acknowledgments
Contents, more
1 Introduction
  1.1 Overview
  1.2 Byzantine Generals Problem
  1.3 Public Key Cryptography
  1.4 OSI Reference Model
  1.5 Network Layer Protocols
  1.6 Levels of Robustness
  1.7 Our Model of Network Layer
  1.8 Motivation
  1.9 Current Network Robustness Designs
  1.10 Overview of Approach
2 Robust Flooding
  2.1 Overview
  2.2 A Robust Flooding Design
  2.3 Costs of This Design
  2.4 Motivations Behind the Above Design
  2.5 Fault Detection
  2.6 Variants
3 Robust Link State Routing
  3.1 Overview
  3.2 A Robust Link State Design
  3.3 Neighbor Discovery
  3.4 Packet Forwarding
  3.5 Find a Route
  3.6 Design Choices
  3.7 Hierarchical Networks
  3.8 Route Setup Variant of Source Routing
4 Conclusions
  4.1 Results
  4.2 Basic Tools
  4.3 Further Application of These Ideas
  4.4 Future Research

Cite

Perlman's 1988 MIT Ph.D. Thesis is the same as technical report MIT/LCS/TR-429.

Perlman, Radia Joy.
Network layer protocols with Byzantine robustness / Radia Perlman.
121 leaves : ill. ; 28 cm.
Cambridge, Mass. : Laboratory for Computer Science, Massachusetts Institute of Technology, 1988.
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1988.
Supervised by Dave Clark.

From MIT's Barton catalog.


Mitchell N Charity <mncharity@vendian.org>
Notes:
  The difficulty of finding the thesis stemmed in part from an imperfect
  robots.txt file having dropped the LCS publications database off google.
  LCS is currently distracted by a reorg, so here are two work-around links
  to restore indexing...
   all MIT LCS TR's
   all MIT LCS TM's
   ... which didn't help.
  So here's a mirror.
   TR's
   TM's

Doables:

History:
 2003-Sep-29  Still not indexed.  Trying again with a mirror.
 2003-Jul-22  Added links to get LCS Pubs indexed again.
 2003-Jul-08  Created.