“…This paper extends Atwood's [3] design, and proposes a methodology for ensuring the authentication and authorization of a peer router, and conveying the necessary policy information to do so. The methodology includes a set of interactions that meet most of the security and operational requirements specified in [4,1].…”