{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:10:13Z","timestamp":1772118613360,"version":"3.50.1"},"reference-count":26,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T00:00:00Z","timestamp":1755129600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Internet Technology Letters"],"published-print":{"date-parts":[[2025,9]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>\n                    The invisible internet project (I2P) is a decentralized peer\u2010to\u2010peer anonymity network that protects users' privacy by routing traffic through encrypted tunnels across volunteer\u2010run routers (nodes). Its distributed nature raises critical questions about structural resilience; specifically, how well it can withstand random (stochastic) failures and targeted (adversarial) attacks. This study models I2P's overlay using three representative network graphs or topologies: random graph (RG), scale\u2010free (SF), and a theoretical modeling of I2P's network, herein referred to as\n                    <jats:italic>I2P Prime<\/jats:italic>\n                    (I2P\u2032), all experimented with 50\u2009000 nodes (peers) each to reflect the real\u2010world conditions of the I2P network. Under random failures, all models exhibit high tolerance, maintaining a large connected component (LCC) even after 50% node removal, with I2P\u2032 demonstrating the most graceful degradation in network efficiency. However, targeted attacks based on degree or betweenness centrality reveal substantial vulnerabilities. The SF network model of I2P collapsed rapidly, often below 30% node removal due to its hub\u2010centric design. In contrast, I2P\u2032 exhibits stronger fault tolerance, requiring nearly 50% of critical nodes to be removed before global connectivity fails. These findings highlight the structural advantages of I2P\u2032, which strikes a balance between distributed connectivity and high resilience against both random failures and targeted attacks. For developers, enhanced adaptive peer selection and dynamic routing mechanisms could enhance robustness without undermining anonymity. For policymakers, our results highlight how targeted interventions might fragment illicit activity with minimal collateral impact. This work provides actionable insights into designing resilient anonymity networks that preserve privacy under stochastic and adversarial attacks.\n                  <\/jats:p>","DOI":"10.1002\/itl2.70119","type":"journal-article","created":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T22:54:52Z","timestamp":1755212092000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Resilience of the Invisible Internet Project: A Computational Analysis"],"prefix":"10.1002","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5466-947X","authenticated-orcid":false,"given":"Siddique Abubakr","family":"Muntaka","sequence":"first","affiliation":[{"name":"School of Information Technology University of Cincinnati  Cincinnati Ohio USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3482-9154","authenticated-orcid":false,"given":"Jacques","family":"Bou Abdo","sequence":"additional","affiliation":[{"name":"School of Information Technology University of Cincinnati  Cincinnati Ohio USA"}]}],"member":"311","published-online":{"date-parts":[[2025,8,14]]},"reference":[{"key":"e_1_2_1_8_2_1","first-page":"359","volume-title":"International Conference on Complex Networks and Their Applications","author":"Bou Abdo J.","year":"2023"},{"key":"e_1_2_1_8_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592456"},{"key":"e_1_2_1_8_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAECCS56710.2023.10104742"},{"key":"e_1_2_1_8_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-39828-5_6"},{"key":"e_1_2_1_8_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101244"},{"key":"e_1_2_1_8_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09691-4_4"},{"key":"e_1_2_1_8_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3350006"},{"key":"e_1_2_1_8_9_1","first-page":"1","volume-title":"2023 International Conference on Computer Science and Emerging Technologies (CSET)","author":"Maalavika S.","year":"2023"},{"key":"e_1_2_1_8_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN48652.2020.1570613461"},{"key":"e_1_2_1_8_11_1","doi-asserted-by":"publisher","DOI":"10.1038\/35019019"},{"key":"e_1_2_1_8_12_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0503-60"},{"key":"e_1_2_1_8_13_1","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms3412"},{"key":"e_1_2_1_8_14_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature16948"},{"key":"e_1_2_1_8_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119836759.ch7"},{"key":"e_1_2_1_8_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2013.6566517"},{"key":"e_1_2_1_8_17_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2025-0029"},{"key":"e_1_2_1_8_18_1","first-page":"1","article-title":"Invisible Internet Project (I2P)","author":"De Boer T.","year":"2019","journal-title":"System and Network Engineering"},{"key":"e_1_2_1_8_19_1","unstructured":"A.Gaarder \u201cRouting for a Dark Net Overlay Network\u201d(master's thesis NTNU 2023)."},{"key":"e_1_2_1_8_20_1","first-page":"1","volume-title":"Large\u2010Scale Discovery and Empirical Analysis for I2P Eepsites","author":"Gao Y.","year":"2017"},{"key":"e_1_2_1_8_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108158"},{"key":"e_1_2_1_8_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278565"},{"key":"e_1_2_1_8_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00440-020-00997-4"},{"key":"e_1_2_1_8_24_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-08746-5"},{"key":"e_1_2_1_8_25_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.07668"},{"key":"e_1_2_1_8_26_1","doi-asserted-by":"publisher","DOI":"10.24191\/jcrinn.v10i1.488"},{"key":"e_1_2_1_8_27_1","doi-asserted-by":"crossref","unstructured":"S. A.Muntaka J. B.Abdo K.Akanbi et al. \u201cMapping the Invisible Internet: Framework and Dataset \u201darXiv preprint arXiv:2506.18159 (2025).","DOI":"10.1016\/j.dib.2025.112175"}],"container-title":["Internet Technology Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/itl2.70119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T18:25:42Z","timestamp":1761071142000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/itl2.70119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,14]]},"references-count":26,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["10.1002\/itl2.70119"],"URL":"https:\/\/doi.org\/10.1002\/itl2.70119","archive":["Portico"],"relation":{"has-review":[{"id-type":"doi","id":"10.1002\/ITL2.70119\/v2\/decision1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.70119\/v1\/decision1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.70119\/v2\/response1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.70119\/v1\/review2","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.70119\/v1\/review1","asserted-by":"object"}]},"ISSN":["2476-1508","2476-1508"],"issn-type":[{"value":"2476-1508","type":"print"},{"value":"2476-1508","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,14]]},"assertion":[{"value":"2025-06-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70119"}}