IPv8 documentation


This book is made to explain the protocol behind the IPv8 application and protocol. This protocol aims to fulfill a few key goals, namely:

  • Unordered and connection oriented, but reliable transmission
  • Message authenticity
  • Message encryption
  • Low hop count
  • Protection against falsified node ID's
  • Self repairing in case of node failure
  • Almost guaranteed message delivery
  • Protection against malicious nodes
  • Offline message delivery
  • Route locality
  • Low redundant messages being send out
  • Rate limiting/flood protection for (D)DOS protection