{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T03:32:37Z","timestamp":1775705557684,"version":"3.50.1"},"reference-count":152,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T00:00:00Z","timestamp":1748649600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T00:00:00Z","timestamp":1748649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>In a technological landscape marked by the accelerated expansion of the Internet of Things (IoT), securing edge communications is becoming essential for ensuring trust, confidentiality and data integrity. The constant evolution of cyber attacks, combined with the resource limitations of IoT devices, requires the development of effective, adaptable and scalable security solutions. This paper provides a comprehensive review of recent advances and persistent challenges in securing edge communications in the IoT, with a focus on lightweight cryptographic algorithms (ASCON, PRESENT, SIMON, SPECK) and on authentication mechanisms adapted to resource-constrained devices. The trade-offs between performance and security are emphasized, besides the need for IoT-specific Anonymous Overlay Networks(AONs) and Anonymous Routing Protocols(ARPs) capable of providing protection against traffic analysis and user anonymity. The study includes a detailed classification of 18 ARPs protocols, along with a presentation of the metrics used in evaluation. It also exposes MQTT-SN protocol vulnerabilities and proposes the development of standardized security frameworks with built-in encryption and authentication for scalable IoT deployments. The main finding of the study highlights the need for further research in developing tailored security solutions for IoT devices, as well as enhancing the security of the MQTT-SN protocol.<\/jats:p>","DOI":"10.1007\/s10207-025-01071-7","type":"journal-article","created":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T08:14:17Z","timestamp":1748679257000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Securing IoT edge: a survey on lightweight cryptography, anonymous routing and communication protocol enhancements"],"prefix":"10.1007","volume":"24","author":[{"given":"Bianca","family":"Gu\u0219i\u021b\u0103","sequence":"first","affiliation":[]},{"given":"Alin A.","family":"Anton","sequence":"additional","affiliation":[]},{"given":"Cristina S.","family":"St\u00e2ngaciu","sequence":"additional","affiliation":[]},{"given":"Daniela","family":"St\u0103nescu","sequence":"additional","affiliation":[]},{"given":"Lucian I.","family":"G\u0103in\u0103","sequence":"additional","affiliation":[]},{"given":"Mihai V.","family":"Micea","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,31]]},"reference":[{"key":"1071_CR1","doi-asserted-by":"publisher","unstructured":"Ehiagwina, F., Iromini, N., Olatinwo, I., Raheem, K., Mustapha, K.: 1, 19 (2022). https:\/\/doi.org\/10.55708\/js0101003","DOI":"10.55708\/js0101003"},{"key":"1071_CR2","doi-asserted-by":"publisher","first-page":"84","DOI":"10.6025\/dspaial\/2022\/1\/2\/84-92","volume":"1","author":"H Hasan","year":"2022","unstructured":"Hasan, H., Ali, G.: Digital Signal Processing and Artificial Intelligence for Automatic. Learning 1, 84 (2022). https:\/\/doi.org\/10.6025\/dspaial\/2022\/1\/2\/84-92","journal-title":"Learning"},{"key":"1071_CR3","doi-asserted-by":"publisher","unstructured":"Al-Shatari, M., Hussin, F.A., Aziz, A.A., Eisa, T.A.E., Tran, X.T., Dalam, M.E.E.: Applied Sciences 13(18), 10345 (2023). https:\/\/doi.org\/10.3390\/app131810345https:\/\/www.mdpi.com\/2076-3417\/13\/18\/10345. Number: 18 Publisher: Multidisciplinary Digital Publishing Institute","DOI":"10.3390\/app131810345"},{"key":"1071_CR4","doi-asserted-by":"publisher","unstructured":"Backes, M., Hamerlik, M., Linari, A., Maffei, M., Tryfonopoulos, C., Weikum, G.: in On the Move to Meaningful Internet Systems: OTM 2009, ed. by R.\u00a0Meersman, T.\u00a0Dillon, P.\u00a0Herrero (Springer, Berlin, Heidelberg, ), pp. 147\u2013164 (2009). https:\/\/doi.org\/10.1007\/978-3-642-05148-7_12","DOI":"10.1007\/978-3-642-05148-7_12"},{"key":"1071_CR5","doi-asserted-by":"publisher","unstructured":"Schlegel, R., Wong, D.S.: Anonymous overlay network supporting authenticated routing. Information Sci. 210, 99 (2012). https:\/\/doi.org\/10.1016\/j.ins.2012.04.042https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025512003374","DOI":"10.1016\/j.ins.2012.04.042"},{"key":"1071_CR6","doi-asserted-by":"publisher","unstructured":"Syverson, P.: Onion routing for resistance to traffic analysis. in Proceedings DARPA Information Survivability Conference and Exposition, 2 108\u2013110 (2003). https:\/\/doi.org\/10.1109\/DISCEX.2003.1194938. https:\/\/ieeexplore.ieee.org\/document\/1194938","DOI":"10.1109\/DISCEX.2003.1194938"},{"issue":"3","key":"1071_CR7","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1002\/sec.539","volume":"9","author":"J Ren","year":"2016","unstructured":"Ren, J., Li, Y., Jiang, T., Li, T.: Anonymous communication in overlay networks. Sec. Commun. Netw. 9(3), 229 (2016). https:\/\/doi.org\/10.1002\/sec.539","journal-title":"Sec. Commun. Netw."},{"key":"1071_CR8","doi-asserted-by":"publisher","unstructured":"Yang, Y., Zhu, S.: Anonymous Routing in Encyclopedia of Cryptography and Security, ed. by H.C.A. van Tilborg, S.\u00a0Jajodia (Springer US, Boston, MA, ), 39\u201340 (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_628","DOI":"10.1007\/978-1-4419-5906-5_628"},{"key":"1071_CR9","doi-asserted-by":"publisher","unstructured":"Dutta, N., Jadav, N., Tanwar, S., Sarma, H.K.D., Pricop, E.: in Cyber Security: Issues and Current Trends, ed. by N.\u00a0Dutta, N.\u00a0Jadav, S.\u00a0Tanwar, H.K.D. Sarma, E.\u00a0Pricop, Studies in Computational Intelligence (Springer, Singapore, ), 37\u201355 (2022). https:\/\/doi.org\/10.1007\/978-981-16-6597-4_3","DOI":"10.1007\/978-981-16-6597-4_3"},{"key":"1071_CR10","doi-asserted-by":"publisher","unstructured":"Yin, H., He, Y.: I2P Anonymous Traffic Detection and Identification .in 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS) , 157\u2013162 (2019). https:\/\/doi.org\/10.1109\/ICACCS.2019.8728517. ISSN: 2575-7288","DOI":"10.1109\/ICACCS.2019.8728517"},{"key":"1071_CR11","doi-asserted-by":"publisher","unstructured":"Rold\u00e1n-G\u00f3mez, J., Carrillo-Mond\u00e9jar, J., Castelo\u00a0G\u00f3mez, J.M., Ruiz-Villafranca, S.: Security Analysis of the MQTT-SN Protocol for the Internet of Things. Applied Sciences 12(21), 10991 (2022). https:\/\/doi.org\/10.3390\/app122110991. https:\/\/www.mdpi.com\/2076-3417\/12\/21\/10991. Number: 21 Publisher: Multidisciplinary Digital Publishing Institute","DOI":"10.3390\/app122110991"},{"key":"1071_CR12","doi-asserted-by":"publisher","unstructured":"Li, F., Wang, Y., Ju, H., Wang, Y., Wang, Z., Zhou, H.: FarpScusn: Fully Anonymous Routing Protocol with Self-Healing Capability in Unstable Sensor Networks. Sensors 20(22), 6683 (2020). https:\/\/doi.org\/10.3390\/s20226683.https:\/\/www.mdpi.com\/1424-8220\/20\/22\/6683. Number: 22 Publisher: Multidisciplinary Digital Publishing Institute","DOI":"10.3390\/s20226683."},{"key":"1071_CR13","doi-asserted-by":"publisher","unstructured":"S\u00f6nmez\u00a0Turan, M., McKay, K., Chang, D., Kang, J., Kelsey, J.: Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions. Tech. Rep. NIST Special Publication (SP) 800-232 (Draft), National Institute of Standards and Technology (2024). https:\/\/doi.org\/10.6028\/NIST.SP.800-232.ipd. https:\/\/csrc.nist.gov\/pubs\/sp\/800\/232\/ipd","DOI":"10.6028\/NIST.SP.800-232.ipd"},{"key":"1071_CR14","unstructured":"Edwar\u00a0Jacinto, G., Holman\u00a0Montie, A., Fernando\u00a0Mart\u00ednez, S.: Implementation of the cryptographic algorithm Present in different microcontroller type embedded software platforms. International Journal of Applied Engineering Research 12, 8092 (2017). http:\/\/www.ripublication.com"},{"issue":"11","key":"1071_CR15","doi-asserted-by":"publisher","first-page":"17067","DOI":"10.1007\/s11042-020-09625-8","volume":"80","author":"L Sleem","year":"2021","unstructured":"Sleem, L., Couturier, R.: Speck-R: An ultra light-weight cryptographic scheme for Internet of Things. Multimed Tools Appl 80(11), 17067 (2021). https:\/\/doi.org\/10.1007\/s11042-020-09625-8","journal-title":"Multimed Tools Appl"},{"key":"1071_CR16","unstructured":"NIST (2023). https:\/\/www.nist.gov\/news-events\/news\/2023\/02\/nist-selects-lightweight-cryptography-algorithms-protect-small-devices. Last Modified: 2025-02-03T17:30-05:00"},{"key":"1071_CR17","doi-asserted-by":"publisher","unstructured":"Zhuang, Y., Li, G.: A lightweight PUF-based authentication protocol (2024). https:\/\/doi.org\/10.48550\/arXiv.2405.13146. ArXiv: 2405.13146 [cs]","DOI":"10.48550\/arXiv.2405.13146"},{"key":"1071_CR18","doi-asserted-by":"publisher","unstructured":"Sadio, O., Ngom, I., Lishou, C.: Lightweight Security Scheme for MQTT\/MQTT-SN Protocol. in 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS) , 119\u2013123 (2019). https:\/\/doi.org\/10.1109\/IOTSMS48152.2019.8939177. https:\/\/ieeexplore.ieee.org\/abstract\/document\/8939177casa_token=jGqyFUZBThcAAAAA:yBQktYDBCalLJDpC6wrouiYzb7lm2ziQ3VyFQchvsvzhfIvSYNcULyTUBKugkFPs98hLHRRIaQ","DOI":"10.1109\/IOTSMS48152.2019.8939177"},{"key":"1071_CR19","doi-asserted-by":"crossref","unstructured":"Al-Shareeda, M.A., Manickam, S., Mohammed, B.A., Al-Mekhlafi, Z.G., Qtaish, A., Alzahrani, A.J., Alshammari, G., Sallam, A.A., Almekhlafi, K.: CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks. Sensors 22(13), 5026 (2022). https:\/\/www.mdpi.com\/1424-8220\/22\/13\/5026. Number: 13 Publisher: Multidisciplinary Digital Publishing Institute","DOI":"10.3390\/s22135026"},{"key":"1071_CR20","doi-asserted-by":"publisher","unstructured":"Almazroi, A.A., Aldhahri, E.A., Al-Shareeda, M.A., Manickam, S.: ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing. PLOS ONE 18(6), e0287291 (2023). https:\/\/doi.org\/10.1371\/journal.pone.0287291.https:\/\/journals.plos.org\/plosone\/article?id=10.1371\/journal.pone.0287291. Publisher: Public Library of Science","DOI":"10.1371\/journal.pone.0287291."},{"key":"1071_CR21","doi-asserted-by":"publisher","unstructured":"Al-Shareeda, M.A., Gaber, T., Alqarni, M.A., Alkinani, M.H., Almazroey, A.A., Almazroi, A.A.: Chebyshev Polynomial Based Emergency Conditions with Authentication Scheme for 5G-Assisted Vehicular Fog Computing. IEEE Transactions on Dependable and Secure Computing pp. 1\u201318 (2025). https:\/\/doi.org\/10.1109\/TDSC.2025.3553868. https:\/\/ieeexplore.ieee.org\/abstract\/document\/10937769","DOI":"10.1109\/TDSC.2025.3553868"},{"key":"1071_CR22","doi-asserted-by":"publisher","unstructured":"Ghaleb Al-Mekhlafi, Z., Anwar\u00a0Lashari, S., Al-Shareeda, M.A., Abdulkarem\u00a0Mohammed, B., Alayba, A.M., Shamsan\u00a0Saleh, A.M., Al-Reshidi, H.A., Almekhlafi, K.: CLA-FC5G: A Certificateless Authentication Scheme Using Fog Computing for 5G-Assisted Vehicular Networks. IEEE Access 12, 141514 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3466914. https:\/\/ieeexplore.ieee.org\/abstract\/document\/10689598","DOI":"10.1109\/ACCESS.2024.3466914"},{"key":"1071_CR23","doi-asserted-by":"publisher","unstructured":"Almazroi, A.A., Alqarni, M.A., Al-Shareeda, M.A., Alkinani, M.H., Almazroey, A.A., Gaber, T.: FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network.(2024). https:\/\/doi.org\/10.1016\/j.iot.2024.101096https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2542660524000386","DOI":"10.1016\/j.iot.2024.101096"},{"key":"1071_CR24","doi-asserted-by":"publisher","unstructured":"Al-Janabi, H.D.K., Lashari, S.A., Khalil, A., Al-Shareeda, M.A., Alsadhan, A.A., Almaiah, M.A., Alkhdour, T.: D-BlockAuth: An Authentication Scheme-Based Dual Blockchain for 5G-Assisted Vehicular Fog Computing. IEEE Access 12, 99321 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3428830.https:\/\/ieeexplore.ieee.org\/abstract\/document\/10599247","DOI":"10.1109\/ACCESS.2024.3428830."},{"key":"1071_CR25","doi-asserted-by":"publisher","unstructured":"Al-shareeda, M.A., Anbar, M., Alazzawi, M.A., Manickam, S., Hasbullah, I.H.: Security schemes based on conditional privacy-preserving vehicular ad hoc networks. Indonesian Journal of Electrical Engineering and Computer Science 21(1), 479 (2021). https:\/\/doi.org\/10.11591\/ijeecs.v21.i1.pp479-488. http:\/\/ijeecs.iaescore.com\/index.php\/IJEECS\/article\/view\/22229","DOI":"10.11591\/ijeecs.v21.i1.pp479-488"},{"key":"1071_CR26","doi-asserted-by":"publisher","unstructured":"Al-Shareeda, M.A., Anbar, M., Manickam, S., Khalil, A., Hasbullah, I.H.: Security schemes based on conditional privacy-preserving vehicular ad hoc networks. IEEE Access 9, 121522 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3109264.https:\/\/ieeexplore.ieee.org\/document\/9526558","DOI":"10.1109\/ACCESS.2021.3109264."},{"key":"1071_CR27","doi-asserted-by":"publisher","unstructured":"Abbood, A.A., AL-Shammri, F.K., Alzamili, Z.M., Al-Shareeda, M.A., Almaiah, M.A., AlAli, R.: Investigating Quantum-Resilient Security Mechanisms for Flying Ad-Hoc Networks (FANETs). Journal of Robotics and Control (JRC) 6(1), 456 (2024). https:\/\/doi.org\/10.18196\/jrc.v6i1.25351. https:\/\/journal.umy.ac.id\/index.php\/jrc\/article\/view\/25351. Number: 1","DOI":"10.18196\/jrc.v6i1.25351"},{"key":"1071_CR28","unstructured":"Clark, D., Lehr, B., Bauer, S., Faratin, P., Sami, R., Wroclawski, J.: Overlay Networks and the Future of the Internet (63) (2006)"},{"key":"1071_CR29","unstructured":"Nergiz, M.E.: Anonymization-based privacy protection. Theses and Dissertations Available from ProQuest, Purdue University pp. 1\u2013239 (2008). https:\/\/docs.lib.purdue.edu\/dissertations\/AAI3373206"},{"key":"1071_CR30","doi-asserted-by":"publisher","unstructured":"Puri, V., Kaur, P., Sachdeva, S.: Data Anonymization for Privacy Protection in Fog-Enhanced Smart Homes. in 2020 6th International Conference on Signal Processing and Communication (ICSC) , 201\u2013205 (2020). https:\/\/doi.org\/10.1109\/ICSC48311.2020.9182761. ISSN: 2643-444X","DOI":"10.1109\/ICSC48311.2020.9182761"},{"key":"1071_CR31","doi-asserted-by":"publisher","unstructured":"Melloni, A., Stam, M., Ytrehus, O.: On Evaluating Anonymity of Onion Routing. in Selected Areas in Cryptography, ed. by R.\u00a0AlTawy, A.\u00a0Hulsing (Springer International Publishing, Cham,) 3\u201324 (2022). https:\/\/doi.org\/10.1007\/978-3-030-99277-4_1","DOI":"10.1007\/978-3-030-99277-4_1"},{"issue":"4","key":"1071_CR32","doi-asserted-by":"publisher","first-page":"2296","DOI":"10.1109\/COMST.2015.2453434.","volume":"17","author":"E Erdin","year":"2015","unstructured":"Erdin, E., Zachor, C., Gunes, M.H.: How to Find Hidden Users: A Survey of Attacks on Anonymity Networks. IEEE Communications Surveys & Tutorials 17(4), 2296 (2015). https:\/\/doi.org\/10.1109\/COMST.2015.2453434. (Conference Name: IEEE Communications Surveys & Tutorials)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1071_CR33","doi-asserted-by":"publisher","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. in Designing Privacy Enhancing Technologies, vol. 2009, ed. by G.\u00a0Goos, J.\u00a0Hartmanis, J.\u00a0van Leeuwen, H.\u00a0Federrath (Springer Berlin Heidelberg, Berlin, Heidelberg, ) 46\u201366 (2001). https:\/\/doi.org\/10.1007\/3-540-44702-4_4. http:\/\/link.springer.com\/10.1007\/3-540-44702-4_4. Series Title: Lecture Notes in Computer Science","DOI":"10.1007\/3-540-44702-4_4"},{"key":"1071_CR34","doi-asserted-by":"publisher","unstructured":"Khalaj\u00a0Monfared, S., Shokrollahi, S.: DARVAN: A fully decentralized anonymous and reliable routing for VANets. Computer Networks 223, 109561 (2023). https:\/\/doi.org\/10.1016\/j.comnet.2023.109561. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128623000063","DOI":"10.1016\/j.comnet.2023.109561"},{"key":"1071_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07649-9","author":"PM Chanal","year":"2020","unstructured":"Chanal, P.M., Kakkasageri, M.: Security and Privacy in IoT: A Survey. Wirel. Pers. Commun. (2020). https:\/\/doi.org\/10.1007\/s11277-020-07649-9","journal-title":"Wirel. Pers. Commun."},{"key":"1071_CR36","doi-asserted-by":"publisher","unstructured":"To\u0161ic, A., Vi\u010di\u010d, J.: Spatial Path Selection and Network Topology Optimisation in P2P Anonymous Routing Protocols. J. Web Engineering pp. 97\u2013118 (2022). https:\/\/doi.org\/10.13052\/jwe1540-9589.2115. https:\/\/journals.riverpublishers.com\/index.php\/JWE\/","DOI":"10.13052\/jwe1540-9589.2115"},{"key":"1071_CR37","doi-asserted-by":"publisher","unstructured":"Kawakami*, T.: A Structured Overlay Network Scheme Based on Multiple Different Time Intervals. Journal of Information Processing Systems 16(6), 1447. https:\/\/doi.org\/10.3745\/JIPS.04.0198. http:\/\/jips-k.org\/full-text\/492","DOI":"10.3745\/JIPS.04.0198"},{"key":"1071_CR38","doi-asserted-by":"publisher","unstructured":"Naghizadeh, A., Berenjian, S., Razeghi, B., Shahanggar, S., Pour, N.R.: Preserving receiver\u2019s anonymity for circular structured P2P networks. in 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC) , 71\u201376 (2015). https:\/\/doi.org\/10.1109\/CCNC.2015.7157949. ISSN: 2331-9860","DOI":"10.1109\/CCNC.2015.7157949"},{"key":"1071_CR39","doi-asserted-by":"publisher","unstructured":"Malatras, A.: State-of-the-art survey on P2P overlay networks in pervasive computing environments. Journal of Network and Computer Applications 55, 1 (2015). https:\/\/doi.org\/10.1016\/j.jnca.2015.04.014.https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804515000879","DOI":"10.1016\/j.jnca.2015.04.014."},{"key":"1071_CR40","unstructured":"Trifa, Z., Khemakhem, M.: Taxonomy of Structured P2P Overlay Networks Security Attacks, vol.\u00a06 . Journal Abbreviation: World Academy of Science, Engineering and Technology 4 Publication Title: World Academy of Science, Engineering and Technology 4 (2012)"},{"key":"1071_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICTSA52017.2021.9406524","volume":"2021","author":"Y Fazea","year":"2021","unstructured":"Fazea, Y., Attarbash, Z.S., Mohammed, F., Abdullahi, I.: International Conference of Technology. Sci. Administration (ICTSA) 2021, 1\u20137 (2021). https:\/\/doi.org\/10.1109\/ICTSA52017.2021.9406524","journal-title":"Sci. Administration (ICTSA)"},{"issue":"4","key":"1071_CR42","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1007\/s11390-008-9162-7","volume":"23","author":"RY Xiao","year":"2008","unstructured":"Xiao, R.Y.: Survey on Anonymity in Unstructured Peer-to-Peer Systems. J. Comput. Sci. Technol. 23(4), 660 (2008). https:\/\/doi.org\/10.1007\/s11390-008-9162-7","journal-title":"J. Comput. Sci. Technol."},{"key":"1071_CR43","unstructured":"Schlegel, R., Wong, D.S.: Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing (2009). https:\/\/eprint.iacr.org\/2009\/294. Report Number: 294"},{"key":"1071_CR44","doi-asserted-by":"publisher","unstructured":"Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev. 36(SI), 299 (2003). https:\/\/doi.org\/10.1145\/844128.844156. https:\/\/dl.acm.org\/doi\/10.1145\/844128.844156","DOI":"10.1145\/844128.844156"},{"key":"1071_CR45","doi-asserted-by":"publisher","unstructured":"Choi, H., Shin, J., Seo, J.T.: Artifacts Analysis and Utilization of Decentralized Web Service ZeroNet for Digital Forensics. Security and Communication Networks 2022, e9418051 (2022). https:\/\/doi.org\/10.1155\/2022\/9418051.https:\/\/www.hindawi.com\/journals\/scn\/2022\/9418051\/. Publisher: Hindawi","DOI":"10.1155\/2022\/9418051."},{"key":"1071_CR46","doi-asserted-by":"publisher","unstructured":"Hua, Y., Miller, K., Bertozzi, A.L., Qian, C., Wang, B.: Efficient and Reliable Overlay Networks for Decentralized Federated Learning. SIAM J. Appl. Math. 82(4), 1558 (2022). https:\/\/doi.org\/10.1137\/21M1465081. https:\/\/epubs.siam.org\/doi\/abs\/10.1137\/21M1465081. Publisher: Society for Industrial and Applied Mathematics","DOI":"10.1137\/21M1465081"},{"key":"1071_CR47","doi-asserted-by":"publisher","unstructured":"Hiller, J., Pennekamp, J., Dahlmanns, M., Henze, M., Panchenko, A., Wehrle, K.: Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments.in 2019 IEEE 27th International Conference on Network Protocols (ICNP) , 1\u201312 (2019). https:\/\/doi.org\/10.1109\/ICNP.2019.8888033. ISSN: 2643-3303","DOI":"10.1109\/ICNP.2019.8888033"},{"key":"1071_CR48","doi-asserted-by":"publisher","unstructured":"Kavallieratos, G., Chowdhury, N., Katsikas, S., Gkioulos, V., Wolthusen, S.: Threat Analysis for Smart Homes. Future Internet 11(10), 207 (2019). https:\/\/doi.org\/10.3390\/fi11100207.https:\/\/www.mdpi.com\/1999-5903\/11\/10\/207. Number: 10 Publisher: Multidisciplinary Digital Publishing Institute","DOI":"10.3390\/fi11100207."},{"key":"1071_CR49","doi-asserted-by":"publisher","unstructured":"Vovk, O., Piho, G., Ross, P.: Anonymization Methods of Structured Health Care Data: A Literature Review. in Model and Data Engineering, ed. by C.\u00a0Attiogb\u00e9, S.\u00a0Ben\u00a0Yahia (Springer International Publishing, Cham, ), Lecture Notes in Computer Science, 175\u2013189 (2021). https:\/\/doi.org\/10.1007\/978-3-030-78428-7_14","DOI":"10.1007\/978-3-030-78428-7_14"},{"issue":"4","key":"1071_CR50","doi-asserted-by":"publisher","first-page":"2489","DOI":"10.1109\/COMST.2020.3011208.","volume":"22","author":"K Tange","year":"2020","unstructured":"Tange, K., De Donno, M., Fafoutis, X., Dragoni, N.: A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities. IEEE Communications Surveys & Tutorials 22(4), 2489 (2020). https:\/\/doi.org\/10.1109\/COMST.2020.3011208. (Conference Name: IEEE Communications Surveys & Tutorials)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1071_CR51","doi-asserted-by":"publisher","unstructured":"Dakhnovich, A., Moskvin, D., Zegzhda, D.: A Necessary Condition for Industrial Internet of Things Sustainability. in Mobile Internet Security, ed. by I.\u00a0You, H.\u00a0Kim, T.Y. Youn, F.\u00a0Palmieri, I.\u00a0Kotenko (Springer Nature, Singapore, ), Communications in Computer and Information Science, 79\u201389 (2022). https:\/\/doi.org\/10.1007\/978-981-16-9576-6_7","DOI":"10.1007\/978-981-16-9576-6_7"},{"key":"1071_CR52","doi-asserted-by":"publisher","unstructured":"Dakhnovich, A.D., Moskvin, D.A., Zegzhda, D.P.: Using Security-through-Obscurity Principle in an Industrial Internet of Things. Aut. Control Comp. Sci. 55(8), 1061 (2021). https:\/\/doi.org\/10.3103\/S0146411621080083.https:\/\/link.springer.com\/10.3103\/S0146411621080083","DOI":"10.3103\/S0146411621080083."},{"key":"1071_CR53","doi-asserted-by":"publisher","unstructured":"Dakhnovich, A.D., Moskvin, D.A., Zegzhda, D.P.: An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things. Aut. Control Comp. Sci. 53(8), 948 (2019). https:\/\/doi.org\/10.3103\/S0146411619080078.http:\/\/link.springer.com\/10.3103\/S0146411619080078","DOI":"10.3103\/S0146411619080078."},{"key":"1071_CR54","doi-asserted-by":"publisher","unstructured":"Bornholdt, H., R\u00f6bert, K., Kisters, P.: Accessing Smart City Services in Untrustworthy Environments via Decentralized Privacy-Preserving Overlay Networks. in 2021 IEEE International Conference on Service-Oriented System Engineering (SOSE) 144\u2013149 (2021). https:\/\/doi.org\/10.1109\/SOSE52839.2021.00021. ISSN: 2642-6587","DOI":"10.1109\/SOSE52839.2021.00021"},{"key":"1071_CR55","doi-asserted-by":"publisher","unstructured":"Grimm, D., Stang, M., Sax, E.: Context-Aware Security for Vehicles and Fleets: A Survey. IEEE Access 9, 101809 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3097146.https:\/\/ieeexplore.ieee.org\/document\/9483907. Conference Name: IEEE Access","DOI":"10.1109\/ACCESS.2021.3097146."},{"key":"1071_CR56","doi-asserted-by":"publisher","unstructured":"Oktian, Y.E., Witanto, E.N., Lee, S.G.: A Conceptual Architecture in Decentralizing Computing, Storage, and Networking Aspect of IoT Infrastructure. IoT 2(2), 205 (2021). https:\/\/doi.org\/10.3390\/iot2020011.https:\/\/www.mdpi.com\/2624-831X\/2\/2\/11. Number: 2 Publisher: Multidisciplinary Digital Publishing Institute","DOI":"10.3390\/iot2020011."},{"key":"1071_CR57","doi-asserted-by":"publisher","unstructured":"Balaji, B.S., Raja, P.V., Nayyar, A., Sanjeevikumar, P., Pandiyan, S.: Enhancement of Security and Handling the Inconspicuousness in IoT Using a Simple Size Extensible Blockchain. Energies 13(7), 1795 (2020). https:\/\/doi.org\/10.3390\/en13071795.https:\/\/www.mdpi.com\/1996-1073\/13\/7\/1795. Number: 7 Publisher: Multidisciplinary Digital Publishing Institute","DOI":"10.3390\/en13071795."},{"key":"1071_CR58","doi-asserted-by":"publisher","unstructured":"Torky, M., Hassanein, A.E.: Integrating blockchain and the internet of things in precision agriculture: Analysis, opportunities, and challenges. Computers and Electronics in Agriculture 178, 105476 (2020). https:\/\/doi.org\/10.1016\/j.compag.2020.105476.https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0168169919324329","DOI":"10.1016\/j.compag.2020.105476."},{"key":"1071_CR59","unstructured":"Tanbir, M.: A Survey on Blockchain and IoT Based Implementations for Supply Chain Management. Ph.D. thesis, University of Zurich Department of Informatics (IFI), Zurich, Switzerland (2018). https:\/\/files.ifi.uzh.ch\/CSG\/staff\/Rafati\/Tanbir_IS.pdf"},{"key":"1071_CR60","doi-asserted-by":"publisher","unstructured":"Deconinck, G., Labeeuw, W., Vandael, S., Beitollahi, H., De\u00a0Craemer, K., Duan, R., Qui, Z., Ramaswamy, P.C., Vande\u00a0Meerssche, B., Vervenne, I., Belmans, R.: Communication overlays and agents for dependable smart power grids. in 2010 5th International Conference on Critical Infrastructure (CRIS) , 1\u20137 (2010). https:\/\/doi.org\/10.1109\/CRIS.2010.5617536","DOI":"10.1109\/CRIS.2010.5617536"},{"key":"1071_CR61","doi-asserted-by":"publisher","unstructured":"Srivastava, G., Crichigno, J., Dhar, S.: A Light and Secure Healthcare Blockchain for IoT Medical Devices. in 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE) , 1\u20135 (2019). https:\/\/doi.org\/10.1109\/CCECE.2019.8861593. ISSN: 2576-7046","DOI":"10.1109\/CCECE.2019.8861593"},{"key":"1071_CR62","doi-asserted-by":"publisher","unstructured":"El Mougy, A., Sameh, S.: in. International Symposium on Networks. Computers and Communications (ISNCC) 2018, 1\u20136 (2018). https:\/\/doi.org\/10.1109\/ISNCC.2018.8530968.https:\/\/ieeexplore.ieee.org\/abstract\/document\/8530968?casa_token=6u0dOLV5BV0AAAAA:aRyE0kKh_cVZiF5d6YsG6VyKfjaFKvSS3CWGhDcb-KkgKjxLS1LBPBUhpGqr_-kYMsIa3NGo2A","DOI":"10.1109\/ISNCC.2018.8530968."},{"key":"1071_CR63","unstructured":"Shirazi, F., Simeonovski, M., Asghar, M.R., Backes, M., Diaz, C.: A Survey on Routing in Anonymous Communication Protocols (2016). ArXiv:1608.05538 [cs]"},{"issue":"3","key":"1071_CR64","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1007\/s11277-020-07108-5","volume":"112","author":"CC Sobin","year":"2020","unstructured":"Sobin, C.C.: A Survey on Architecture, Protocols and Challenges in IoT. Wireless Pers. Commun. 112(3), 1383 (2020). https:\/\/doi.org\/10.1007\/s11277-020-07108-5","journal-title":"Wireless Pers. Commun."},{"key":"1071_CR65","doi-asserted-by":"publisher","DOI":"10.1145\/3520440.","author":"C D\u00f6pmann","year":"2022","unstructured":"D\u00f6pmann, C., Fiedler, F., Lucia, S., Tschorsch, F., Trans, A.C.M.: Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges. Internet Technol. (2022). https:\/\/doi.org\/10.1145\/3520440. (Just Accepted)","journal-title":"Internet Technol."},{"key":"1071_CR66","doi-asserted-by":"publisher","unstructured":"Edman, M., Yener, B.: On anonymity in an electronic society: A survey of anonymous communication systems. ACM Comput. Surv. 42 (2009). https:\/\/doi.org\/10.1145\/1592451.1592456http:\/\/doi.acm.org\/10.1145\/1592451.1592456","DOI":"10.1145\/1592451.1592456"},{"issue":"2","key":"1071_CR67","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1109\/SURV.2011.042011.00080.","volume":"14","author":"D Kelly","year":"2012","unstructured":"Kelly, D., Raines, R., Baldwin, R., Grimaila, M., Mullins, B.: Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics. IEEE Communications Surveys & Tutorials 14(2), 579 (2012). https:\/\/doi.org\/10.1109\/SURV.2011.042011.00080. (Conference Name: IEEE Communications Surveys & Tutorials)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1071_CR68","unstructured":"Danezis, G., Diaz, C.: A Survey of Anonymous Communication Channels. https:\/\/www.freehaven.net\/anonbib\/cache\/DD08Survey.pdf"},{"issue":"2","key":"1071_CR69","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MSEC.2021.3050245.","volume":"19","author":"M Simioni","year":"2021","unstructured":"Simioni, M.: Investigative Techniques for the De-Anonymization of Hidden Services. IEEE Security & Privacy 19(2), 60 (2021). https:\/\/doi.org\/10.1109\/MSEC.2021.3050245. (Conference Name: IEEE Security & Privacy)","journal-title":"IEEE Security & Privacy"},{"issue":"5","key":"1071_CR70","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/s42979-020-00315-8","volume":"1","author":"N Masinde","year":"2020","unstructured":"Masinde, N., Graffi, K.: Peer-to-Peer-Based Social Networks: A Comprehensive Survey. SN COMPUT. SCI. 1(5), 299 (2020). https:\/\/doi.org\/10.1007\/s42979-020-00315-8","journal-title":"SN COMPUT. SCI."},{"key":"1071_CR71","doi-asserted-by":"publisher","unstructured":"McLachlan, J., Tran, A., Hopper, N., Kim, Y.: Scalable onion routing with torsk. in Proceedings of the 16th ACM conference on Computer and communications security (Association for Computing Machinery, New York, NY, USA,) CCS \u201909, 590\u2013599 (2009). https:\/\/doi.org\/10.1145\/1653662.1653733","DOI":"10.1145\/1653662.1653733"},{"key":"1071_CR72","doi-asserted-by":"publisher","unstructured":"Chen, C., Asoni, D.E., Perrig, A., Barrera, D., Danezis, G., Troncoso, C.: TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer. in 2018 IEEE European Symposium on Security and Privacy (EuroS &P) , 137\u2013152 (2018). https:\/\/doi.org\/10.1109\/EuroSP.2018.00018","DOI":"10.1109\/EuroSP.2018.00018"},{"key":"1071_CR73","doi-asserted-by":"publisher","unstructured":"Chen, C., Asoni, D.E., Barrera, D., Danezis, G., Perrig, A.: HORNET: High-speed Onion Routing at the Network Layer (2016). https:\/\/doi.org\/10.48550\/arXiv.1507.05724. ArXiv:1507.05724 [cs]","DOI":"10.48550\/arXiv.1507.05724"},{"key":"1071_CR74","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/WoWMoM51794.2021.00041","volume":"2021","author":"F Buccafurri","year":"2021","unstructured":"Buccafurri, F., Angelis, V.D., Francesca Idone, M., Labrini, C.: IEEE 22nd International Symposium on a World of Wireless. Mobile and Multimedia Networks (WoWMoM) 2021, 231\u2013235 (2021). https:\/\/doi.org\/10.1109\/WoWMoM51794.2021.00041","journal-title":"Mobile and Multimedia Networks (WoWMoM)"},{"key":"1071_CR75","doi-asserted-by":"publisher","first-page":"33628","DOI":"10.1109\/ACCESS.2022.3161547.","volume":"10","author":"J Saleem","year":"2022","unstructured":"Saleem, J., Islam, R., Kabir, M.A.: The Anonymity of the Dark Web: A Survey. IEEE Access 10, 33628 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3161547. (Conference Name: IEEE Access)","journal-title":"IEEE Access"},{"issue":"1","key":"1071_CR76","doi-asserted-by":"publisher","first-page":"45","DOI":"10.3103\/S0146411622010072","volume":"56","author":"Mehdi Merouane","year":"2022","unstructured":"Merouane, Mehdi: An Approach for Detecting Anonymized Traffic: Orbot as Case Study. Aut. Control Comp. Sci. 56(1), 45 (2022). https:\/\/doi.org\/10.3103\/S0146411622010072","journal-title":"Aut. Control Comp. Sci."},{"key":"1071_CR77","doi-asserted-by":"publisher","unstructured":"Park, H., Yang, J., Park, J., Kang, S.G., Choi, J.K.: A Survey on Peer-to-Peer Overlay Network Schemes. in 2008 10th International Conference on Advanced Communication Technology, 2 986\u2013988 (2008). https:\/\/doi.org\/10.1109\/ICACT.2008.4493931. ISSN: 1738-9445","DOI":"10.1109\/ICACT.2008.4493931"},{"key":"1071_CR78","doi-asserted-by":"publisher","unstructured":"Bennett, K., Grothoff, C.: gap \u201c Practical Anonymous Networking. in Privacy Enhancing Technologies, ed. by R.\u00a0Dingledine (Springer, Berlin, Heidelberg,) Lecture Notes in Computer Science, 141\u2013160 (2003). https:\/\/doi.org\/10.1007\/978-3-540-40956-4_10","DOI":"10.1007\/978-3-540-40956-4_10"},{"key":"1071_CR79","doi-asserted-by":"publisher","unstructured":"Murayama, K., Lennerfors, T.T., Murata, K.: Winny and the Pirate Bay: A comparative analysis of P2P software usage in Japan and Sweden from a socio-cultural perspective. The International Review of Information Ethics 13, 20 (2010). https:\/\/doi.org\/10.29173\/irie295. https:\/\/informationethics.ca\/index.php\/irie\/article\/view\/295","DOI":"10.29173\/irie295"},{"key":"1071_CR80","unstructured":"Zhang, J., Su, J., Wu, D.: Poster: A Novel P2P-over-Zeronet Anonymous Communication Platform"},{"issue":"3","key":"1071_CR81","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1007\/s12083-019-00839-8","volume":"13","author":"AR Naik","year":"2020","unstructured":"Naik, A.R., Keshavamurthy, B.N.: Next level peer-to-peer overlay networks under high churns: a survey. Peer-to-Peer Netw. Appl. 13(3), 905 (2020). https:\/\/doi.org\/10.1007\/s12083-019-00839-8","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"1071_CR82","unstructured":"Fromknecht, C.M.: LOKI : a lease-oriented key infrastructure with instant updates and seizure-resistance. Thesis, Massachusetts Institute of Technology (2017). https:\/\/dspace.mit.edu\/handle\/1721.1\/112914. Accepted: 2017-12-20T18:17:09Z Journal Abbreviation: Lease-oriented key infrastructure with instant updates and seizure-resistance"},{"key":"1071_CR83","unstructured":"Djari, A., Amoussou-Guenou, Y., Anceaume, E., Tucci\u00a0Piergiovanni, S., Pozzo, A.D.: Yggdrasil: Secure State Sharding of Transactions and Smart Contracts that Self-adapts to Transaction Load (2022). https:\/\/hal.science\/hal-03793291. Working paper or preprint"},{"key":"1071_CR84","doi-asserted-by":"publisher","unstructured":"Kothari, K., Palwankar, T., Dubey, A., Parate, P.: Tor vs Yggdrasil: A Comparative Study of Two Different Communication System. in 2022 International Conference on Inventive Computation Technologies (ICICT) 452\u2013456 (2022). https:\/\/doi.org\/10.1109\/ICICT54344.2022.9850965. ISSN: 2767-7788","DOI":"10.1109\/ICICT54344.2022.9850965"},{"key":"1071_CR85","doi-asserted-by":"publisher","unstructured":"Bracamonte, V., Pape, S., Loebner, S.: All apps do this: Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content. PoPETs 2022(3), 57 (2022). https:\/\/doi.org\/10.56553\/popets-2022-0062. https:\/\/petsymposium.org\/popets\/2022\/popets-2022-0062.php","DOI":"10.56553\/popets-2022-0062"},{"key":"1071_CR86","doi-asserted-by":"publisher","unstructured":"Montieri, A., Ciuonzo, D., Aceto, G., Pescap\u00e9, A.: Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark. in 2017 29th International Teletraffic Congress (ITC 29), 1 81\u201389 (2017). https:\/\/doi.org\/10.23919\/ITC.2017.8064342","DOI":"10.23919\/ITC.2017.8064342"},{"key":"1071_CR87","doi-asserted-by":"publisher","unstructured":"Harborth, D., Pape, S., Rannenberg, K.: Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym. Proceedings on Privacy Enhancing Technologies 2020(2), 111 (2020). https:\/\/doi.org\/10.2478\/popets-2020-0020.https:\/\/petsymposium.org\/popets\/2020\/popets-2020-0020.php","DOI":"10.2478\/popets-2020-0020."},{"key":"1071_CR88","doi-asserted-by":"publisher","unstructured":"Ji, Q., Rao, Z., Chen, M., Luo, J.: Security Analysis of Shadowsocks(R) Protocol. Security and Communication Networks 2022, e4862571 (2022). https:\/\/doi.org\/10.1155\/2022\/4862571.https:\/\/www.hindawi.com\/journals\/scn\/2022\/4862571\/. Publisher: Hindawi","DOI":"10.1155\/2022\/4862571."},{"key":"1071_CR89","doi-asserted-by":"publisher","unstructured":"He, X., Cao, J., Wang, S., Sun, K., Xu, L., Li, Q.: Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks. in IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 1689\u20131698 (2022). https:\/\/doi.org\/10.1109\/INFOCOM48880.2022.9796882. ISSN: 2641-9874","DOI":"10.1109\/INFOCOM48880.2022.9796882"},{"key":"1071_CR90","doi-asserted-by":"publisher","unstructured":"Yunfan, T., Xiang, Z.: A Survey of Privacy Infrastructures and Their Vulnerabilities (2018). https:\/\/doi.org\/10.48550\/arXiv.1812.06226. ArXiv:1812.06226 [cs]","DOI":"10.48550\/arXiv.1812.06226"},{"key":"1071_CR91","doi-asserted-by":"publisher","unstructured":"Ding, J., Balasingham, I., Bouvry, P.: Management of Overlay Networks: A Survey. in 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies 249\u2013255 (2009). https:\/\/doi.org\/10.1109\/UBICOMM.2009.49","DOI":"10.1109\/UBICOMM.2009.49"},{"issue":"8","key":"1071_CR92","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3547331","volume":"55","author":"M Lyu","year":"2023","unstructured":"Lyu, M., Gharakheili, H.H., Sivaraman, V.: A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques. ACM Comput. Surv. 55(8), 1 (2023). https:\/\/doi.org\/10.1145\/3547331. ArXiv:2201.00900 [cs]","journal-title":"ACM Comput. Surv."},{"key":"1071_CR93","doi-asserted-by":"publisher","unstructured":"Popescu, B.: Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System (Transcript of Discussion). in Security Protocols, ed. by B.\u00a0Christianson, B.\u00a0Crispo, J.A. Malcolm, M.\u00a0Roe (Springer, Berlin, Heidelberg,) Lecture Notes in Computer Science, 221\u2013230 (2006). https:\/\/doi.org\/10.1007\/11861386_25","DOI":"10.1007\/11861386_25"},{"key":"1071_CR94","unstructured":"Matejka, P.: Security in Peer-to-Peer Networks. Ph.D. thesis, Charles University, Prague (2004). https:\/\/turtle-p2p.sourceforge.net\/thesis2.pdf"},{"key":"1071_CR95","doi-asserted-by":"publisher","unstructured":"Pumo, A.L.: Overview of the Netsukuku network (2007). https:\/\/doi.org\/10.48550\/arXiv.0705.0815. ArXiv:0705.0815 [cs]","DOI":"10.48550\/arXiv.0705.0815"},{"key":"1071_CR96","unstructured":"Netsukuku - P2P mesh routing. http:\/\/netsukuku.freaknet.org\/"},{"key":"1071_CR97","unstructured":"Schomburg, J.: Anonymity Techniques \u201c Usability Tests of Major Anonymity Networks (TU Dresden, Germany, 2009), 49\u201358, (2009). http:\/\/www.inf.tuaLSdresden.de\/"},{"key":"1071_CR98","doi-asserted-by":"publisher","unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: design of a type III anonymous remailer protocol. in 2003 Symposium on Security and Privacy, 2003. 2\u201315 (2003). https:\/\/doi.org\/10.1109\/SECPRI.2003.1199323. ISSN: 1081-6011","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"1071_CR99","doi-asserted-by":"publisher","unstructured":"Hosseini\u00a0Shirvani, M., Akbarifar, A.: A Comparative Study on Anonymizing Networks: TOR I2P and Riffle Networks Comparison. J. Electr. Comput. Eng. Innovations (Online First) (2021). https:\/\/doi.org\/10.22061\/jecei.2021.8027.466","DOI":"10.22061\/jecei.2021.8027.466"},{"key":"1071_CR100","unstructured":"D\u00edaz, C., Halpin, H., Kiayias, A.: https:\/\/api.semanticscholar.org\/CorpusID:233218535 (2021)"},{"key":"1071_CR101","unstructured":"Nym | Our Mission. https:\/\/nymtech.net\/"},{"key":"1071_CR102","unstructured":"Rioux, C., Bowden, K.: The Internals of Veilid, a New Distributed Application Framework. https:\/\/veilid.com\/Launch-Slides-Veilid.pdf"},{"key":"1071_CR103","unstructured":"C.O.T.D. COW. Framework Overview \u00b7 Veilid. https:\/\/veilid.com\/docs\/overview\/"},{"key":"1071_CR104","doi-asserted-by":"publisher","unstructured":"Madani, S., Khalil, I.: Garbled Routing (GR): A generic framework towards unification of anonymous communication systems. Journal of Network and Computer Applications 44, 183 (2014). https:\/\/doi.org\/10.1016\/j.jnca.2014.05.005.https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804514001246","DOI":"10.1016\/j.jnca.2014.05.005."},{"key":"1071_CR105","doi-asserted-by":"publisher","unstructured":"Madani, S., Khalil, I.: Garbled Routing (GR): Towards Unification of Anonymous Networks. in 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications , 50\u201357 (2013). https:\/\/doi.org\/10.1109\/TrustCom.2013.10. ISSN: 2324-9013","DOI":"10.1109\/TrustCom.2013.10"},{"key":"1071_CR106","doi-asserted-by":"publisher","unstructured":"Wahal, M., Choudhury, T.: Hydra \u201cAnonymous network routing mechanism. in 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS) , 230\u2013235 (2017). https:\/\/doi.org\/10.1109\/ICTUS.2017.8286011","DOI":"10.1109\/ICTUS.2017.8286011"},{"key":"1071_CR107","unstructured":"Rouse, M.: What Does Darknet Mean?. Techopedia (2016). https:\/\/www.techopedia.com\/definition\/2395\/darknet"},{"key":"1071_CR108","doi-asserted-by":"publisher","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router:. Tech. rep., Defense Technical Information Center, Fort Belvoir, VA (2004). https:\/\/doi.org\/10.21236\/ADA465464. http:\/\/www.dtic.mil\/docs\/citations\/ADA465464","DOI":"10.21236\/ADA465464"},{"key":"1071_CR109","doi-asserted-by":"publisher","unstructured":"Hoang, N.P., Kintis, P., Antonakakis, M., Polychronakis, M.: An Empirical Study of the I2P Anonymity Network and its Censorship Resistance. in Proceedings of the Internet Measurement Conference 2018 (ACM, Boston MA USA,) 379\u2013392 (2018). https:\/\/doi.org\/10.1145\/3278532.3278565. https:\/\/dl.acm.org\/doi\/10.1145\/3278532.3278565","DOI":"10.1145\/3278532.3278565"},{"key":"1071_CR110","doi-asserted-by":"publisher","unstructured":"Diab, T., Gilg, M., Drouhin, F., Lorenz, P.: Anonymizing Communication in VANets by Applying I2P Mechanisms. in 2019 IEEE Global Communications Conference (GLOBECOM) , 1\u20136 (2019). https:\/\/doi.org\/10.1109\/GLOBECOM38437.2019.9013225. ISSN: 2576-6813","DOI":"10.1109\/GLOBECOM38437.2019.9013225"},{"key":"1071_CR111","unstructured":"hyphanet\/simulator-simsalabim (2023). https:\/\/github.com\/hyphanet\/simulator-simsalabim. Original-date: 2009-04-25T15:46:14Z"},{"key":"1071_CR112","doi-asserted-by":"publisher","unstructured":"Buccafurri, F., Angelis, V.D., Lazzaro, S.: An Anonymous Overlay Routing Protocol for Uplink-Intensive Applications (2022). https:\/\/doi.org\/10.48550\/arXiv.2208.14920. ArXiv:2208.14920 [cs]","DOI":"10.48550\/arXiv.2208.14920"},{"key":"1071_CR113","doi-asserted-by":"publisher","unstructured":"Gupta, R., Jadav, N.K., Nair, A., Tanwar, S., Shahinzadeh, H.: Blockchain and AI-based Secure Onion Routing Framework for Data Dissemination in IoT Environment Underlying 6G Networks. in 2022 Sixth International Conference on Smart Cities, Internet of Things and Applications (SCIoT) , 1\u20136 (2022). https:\/\/doi.org\/10.1109\/SCIoT56583.2022.9953671. https:\/\/ieeexplore.ieee.org\/document\/9953671","DOI":"10.1109\/SCIoT56583.2022.9953671"},{"key":"1071_CR114","doi-asserted-by":"publisher","unstructured":"Karunanayake, I., Ahmed, N., Malaney, R., Islam, R., Jha, S.: De-anonymisation attacks on Tor: A Survey. IEEE Commun. Surv. Tutorials 23(4), 2324 (2021). https:\/\/doi.org\/10.1109\/COMST.2021.3093615. ArXiv:2009.13018 [cs]","DOI":"10.1109\/COMST.2021.3093615"},{"issue":"1","key":"1071_CR115","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/COMST.2014.2345420.","volume":"17","author":"J Petit","year":"2015","unstructured":"Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym Schemes in Vehicular Networks: A Survey. IEEE Communications Surveys & Tutorials 17(1), 228 (2015). https:\/\/doi.org\/10.1109\/COMST.2014.2345420. (Conference Name: IEEE Communications Surveys & Tutorials)","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"4","key":"1071_CR116","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/COMST.2006.283819.","volume":"8","author":"X Yang","year":"2006","unstructured":"Yang, X., Vare, J., Owens, T.J.: A survey of handover algorithms in DVB-H. IEEE Communications Surveys & Tutorials 8(4), 16 (2006). https:\/\/doi.org\/10.1109\/COMST.2006.283819. (Conference Name: IEEE Communications Surveys & Tutorials)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1071_CR117","doi-asserted-by":"publisher","unstructured":"Tzezana, R.: Scenarios for crime and terrorist attacks using the internet of things. European Journal of Futures Research 1(4), 1 (2016). https:\/\/doi.org\/10.1007\/s40309-016-0107-z.https:\/\/www.infona.pl\/\/resource\/bwmeta1.element.springer-doi-10_1007-S40309-016-0107-Z","DOI":"10.1007\/s40309-016-0107-z."},{"key":"1071_CR118","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Ma, Q., Bo, L., Cheng, Z.: A New Anonymous Communication Model Based on Peer-to-Peer Network. in 2012 International Conference on Computer Science and Service System, pp. 797\u2013799 (2012). https:\/\/doi.org\/10.1109\/CSSS.2012.204","DOI":"10.1109\/CSSS.2012.204"},{"issue":"2","key":"1071_CR119","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/COMST.2005.1610546.","volume":"7","author":"EK Lua","year":"2005","unstructured":"Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., Lim, S.: A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys & Tutorials 7(2), 72 (2005). https:\/\/doi.org\/10.1109\/COMST.2005.1610546. (Conference Name: IEEE Communications Surveys & Tutorials)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1071_CR120","doi-asserted-by":"publisher","unstructured":"Chowdhury, N.M.M.K., Boutaba, R.: A survey of network virtualization. Computer Networks 54(5), 862 (2010). https:\/\/doi.org\/10.1016\/j.comnet.2009.10.017.https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128609003387","DOI":"10.1016\/j.comnet.2009.10.017."},{"key":"1071_CR121","doi-asserted-by":"publisher","unstructured":"Buccafurri, F., De Angelis, V., Idone, M.F., Labrini, C.: Anonymous Short Communications over Social Networks. in Security and Privacy in Communication Networks, ed. by J.\u00a0Garcia-Alfaro, S.\u00a0Li, R.\u00a0Poovendran, H.\u00a0Debar, M.\u00a0Yung (Springer International Publishing, Cham, ), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 43\u201363 (2021). https:\/\/doi.org\/10.1007\/978-3-030-90022-9_3","DOI":"10.1007\/978-3-030-90022-9_3"},{"key":"1071_CR122","doi-asserted-by":"publisher","unstructured":"Rafiq, A., Mehmood, A., Song, W.C.: Intent-Based Slicing between Containers in SDN Overlay Network. Journal of Communications pp. 237\u2013244 (2020). https:\/\/doi.org\/10.12720\/jcm.15.3.237-244","DOI":"10.12720\/jcm.15.3.237-244"},{"key":"1071_CR123","doi-asserted-by":"publisher","unstructured":"Toure, M., Guidedi, K., Gandon, F., Lo, M., Gueret, C.: MoRAI: Geographic and Semantic Overlay Network for Linked Data Access with Intermittent Internet Connectivity. in 2020 IEEE\/WIC\/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT) , 457\u2013462 (2020). https:\/\/doi.org\/10.1109\/WIIAT50758.2020.00068","DOI":"10.1109\/WIIAT50758.2020.00068"},{"key":"1071_CR124","doi-asserted-by":"publisher","unstructured":"Gal\u00e1n-Jim\u00e9nez, J., Gazo-Cervero, A.: Overview and Challenges of Overlay Networks: A Survey. International Journal of Computer Science and Engineering Survey 2, 19 (2011). https:\/\/doi.org\/10.5121\/ijcses.2011.2102","DOI":"10.5121\/ijcses.2011.2102"},{"key":"1071_CR125","unstructured":"Wang, C., Li, B.: (2004)"},{"key":"1071_CR126","doi-asserted-by":"publisher","unstructured":"Panchenko, A., Mitseva, A., Knabe, S.: WhisperChord: Scalable and Secure Node Discovery for Overlay Networks. in 2021 IEEE 46th Conference on Local Computer Networks (LCN) , 170\u2013177 (2021). https:\/\/doi.org\/10.1109\/LCN52139.2021.9525008. ISSN: 0742-1303","DOI":"10.1109\/LCN52139.2021.9525008"},{"key":"1071_CR127","doi-asserted-by":"publisher","unstructured":"Hogan, K., Servan-Schreiber, S., Newman, Z., Weintraub, B., Nita-Rotaru, C., Devadas, S.: ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing. in 2022 IEEE Symposium on Security and Privacy (SP) , 1933\u20131952 (2022). https:\/\/doi.org\/10.1109\/SP46214.2022.9833619. ISSN: 2375-1207","DOI":"10.1109\/SP46214.2022.9833619"},{"key":"1071_CR128","doi-asserted-by":"publisher","unstructured":"Shirazi, F., Andreeva, E., Kohlweiss, M., Diaz, C.: Multiparty Routing: Secure Routing for Mixnets (2017). https:\/\/doi.org\/10.48550\/arXiv.1708.03387. ArXiv:1708.03387 [cs]","DOI":"10.48550\/arXiv.1708.03387"},{"key":"1071_CR129","doi-asserted-by":"publisher","unstructured":"Buccafurri, F., De Angelis, V., Idone, M.F., Labrini, C.: Extending Routes in Tor to Achieve Recipient Anonymity against the Global Adversary. in 2021 International Conference on Cyberworlds (CW) , 238\u2013245 (2021). https:\/\/doi.org\/10.1109\/CW52790.2021.00048. ISSN: 2642-3596","DOI":"10.1109\/CW52790.2021.00048"},{"key":"1071_CR130","doi-asserted-by":"publisher","unstructured":"Shi, Z., Graffi, K., Starobinski, D., Matyunin, N.: Threat Modeling Tools: A Taxonomy. IEEE Secur. Privacy. 20(4), 29 (2022). https:\/\/doi.org\/10.1109\/MSEC.2021.3125229.https:\/\/ieeexplore.ieee.org\/document\/9632622\/","DOI":"10.1109\/MSEC.2021.3125229."},{"key":"1071_CR131","doi-asserted-by":"publisher","unstructured":"Paolone, G., Iachetti, D., Paesani, R., Pilotti, F., Marinelli, M., Di Felice, P.: A Holistic Overview of the Internet of Things Ecosystem. IoT 3(4), 398 (2022). https:\/\/doi.org\/10.3390\/iot3040022.https:\/\/www.mdpi.com\/2624-831X\/3\/4\/22. Number: 4 Publisher: Multidisciplinary Digital Publishing Institute","DOI":"10.3390\/iot3040022."},{"key":"1071_CR132","doi-asserted-by":"publisher","unstructured":"Khan, S.M., Hamlen, K.W.: AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing. in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications , 170\u2013176 (2012). https:\/\/doi.org\/10.1109\/TrustCom.2012.94. ISSN: 2324-9013","DOI":"10.1109\/TrustCom.2012.94"},{"issue":"4","key":"1071_CR133","doi-asserted-by":"publisher","first-page":"74:1","DOI":"10.1145\/3397190","volume":"53","author":"M Feldmann","year":"2020","unstructured":"Feldmann, M., Scheideler, C., Schmid, S.: Survey on Algorithms for Self-stabilizing Overlay Networks. ACM Comput. Surv. 53(4), 74:1 (2020). https:\/\/doi.org\/10.1145\/3397190","journal-title":"ACM Comput. Surv."},{"key":"1071_CR134","doi-asserted-by":"publisher","unstructured":"Byrenheid, M., Roos, S., Strufe, T.: Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings. in 23rd International Conference on Distributed Computing and Networking (Association for Computing Machinery, New York, NY, USA, 2022), ICDCN , 107\u2013116 (2022). https:\/\/doi.org\/10.1145\/3491003.3491020","DOI":"10.1145\/3491003.3491020"},{"key":"1071_CR135","doi-asserted-by":"publisher","unstructured":"Freedman, M.J., Morris, R.: Tarzan: a peer-to-peer anonymizing network layer. in Proceedings of the 9th ACM conference on Computer and communications security (Association for Computing Machinery, New York, NY, USA, ), CCS \u201902, 193\u2013206 (2002). https:\/\/doi.org\/10.1145\/586110.586137","DOI":"10.1145\/586110.586137"},{"key":"1071_CR136","unstructured":"Moreira\u00a0da Silva, P., Dias, J., Ricardo1, M.: Survey on Privacy Solutions at the Network Layer: Terminology, Fundamentals and Classification. https:\/\/paginas.fe.up.pt\/~prodei\/dsie11\/images\/pdfs\/s6-4.pdf"},{"key":"1071_CR137","doi-asserted-by":"publisher","unstructured":"Andersen, D., Balakrishnan, H., Kaashoek, F., Morris, R.: Resilient overlay networks. in Proceedings of the eighteenth ACM symposium on Operating systems principles (Association for Computing Machinery, New York, NY, USA, ), SOSP \u201901, pp. 131\u2013145 (2001). https:\/\/doi.org\/10.1145\/502034.502048","DOI":"10.1145\/502034.502048"},{"key":"1071_CR138","doi-asserted-by":"publisher","unstructured":"Baumgart, I., Heep, B., Krause, S.: OverSim: A Flexible Overlay Network Simulation Framework. in 2007 IEEE Global Internet Symposium , pp. 79\u201384 (2007). https:\/\/doi.org\/10.1109\/GI.2007.4301435","DOI":"10.1109\/GI.2007.4301435"},{"key":"1071_CR139","doi-asserted-by":"crossref","unstructured":"Elgazzar, K., Khalil, H., Alghamdi, T., Badr, A., Abdelkader, G., Elewah, A., Buyya, R.: Revisiting the internet of things: New trends, opportunities and grand challenges. Frontiers in the Internet of Things 1 (2022). https:\/\/www.frontiersin.org\/articles\/10.3389\/friot.2022.1073780","DOI":"10.3389\/friot.2022.1073780"},{"key":"1071_CR140","doi-asserted-by":"publisher","unstructured":"Hussein, N., Nhlabatsi, A.: Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control. IoT 3(4), 450 (2022). https:\/\/doi.org\/10.3390\/iot3040024.https:\/\/www.mdpi.com\/2624-831X\/3\/4\/24. Number: 4 Publisher: Multidisciplinary Digital Publishing Institute","DOI":"10.3390\/iot3040024."},{"key":"1071_CR141","doi-asserted-by":"publisher","unstructured":"Qiu, H., Ji, T., Zhao, S., Chen, X., Qi, J., Cui, H., Wang, S.: A Geography-Based P2P Overlay Network for Fast and Robust Blockchain Systems. IEEE Transactions on Services Computing pp. 1\u201314 (2022). https:\/\/doi.org\/10.1109\/TSC.2022.3189667. Conference Name: IEEE Transactions on Services Computing","DOI":"10.1109\/TSC.2022.3189667"},{"key":"1071_CR142","doi-asserted-by":"publisher","unstructured":"Surati, S., Jinwala, D.C., Garg, S.: A survey of simulators for P2P overlay networks with a case study of the P2P tree overlay using an event-driven simulator. Engineering Science and Technology, an International Journal 20(2), 705 (2017). https:\/\/doi.org\/10.1016\/j.jestch.2016.12.010. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2215098616306012","DOI":"10.1016\/j.jestch.2016.12.010"},{"issue":"5","key":"1071_CR143","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1109\/TIFS.2017.2656458","volume":"12","author":"R Bagai","year":"2017","unstructured":"Bagai, R., Malik, N., Jadliwala, M.: Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks. IEEE Trans. Inf. Forensics Secur. 12(5), 1156 (2017). https:\/\/doi.org\/10.1109\/TIFS.2017.2656458. (Conference Name: IEEE Transactions on Information Forensics and Security)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1071_CR144","doi-asserted-by":"publisher","unstructured":"Jianbo, Z., Yang, J.r., Hu, R.m., Zhong, J.b.: A Service-Oriented Framework of Distributed QoS Measurement Based on Multi-Agent for Overlay Network. in 2009 International Conference on Communication Software and Networks , pp. 158\u2013162 (2009). https:\/\/doi.org\/10.1109\/ICCSN.2009.15","DOI":"10.1109\/ICCSN.2009.15"},{"key":"1071_CR145","doi-asserted-by":"publisher","unstructured":"Liu, Y., Wang, Z., Yang, J., Pan, L., He, L., Lin, J., Song, G., Li, C.: Both Efficient and Accurate: A Large-scale One-way Delay Measurement Scheme. in GLOBECOM 2022 - 2022 IEEE Global Communications Conference , pp. 395\u2013400 (2022). https:\/\/doi.org\/10.1109\/GLOBECOM48099.2022.10001552","DOI":"10.1109\/GLOBECOM48099.2022.10001552"},{"issue":"3","key":"1071_CR146","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/JIOT.2021.3088641.","volume":"9","author":"X Ding","year":"2022","unstructured":"Ding, X., Wang, X., Xie, Y., Li, F.: A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things. IEEE Internet Things J. 9(3), 1818 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3088641. (Conference Name: IEEE Internet of Things Journal)","journal-title":"IEEE Internet Things J."},{"key":"1071_CR147","unstructured":"McGinthy, J.M.: Solutions for Internet of Things Security Challenges: Trust & Authentication. Faculty of the Virginia Polytechnic Institute and State University, Blacksburg, Virginia Dissertation Thessis, 175 (2019)"},{"key":"1071_CR148","unstructured":"Snader, R., Borisov, N.: A Tune-up for Tor: Improving Security and Performance in the Tor Network. Department of Computer Science University of Illinois at Urbana\u2013Champaign"},{"key":"1071_CR149","doi-asserted-by":"publisher","unstructured":"Quincozes, V.E., Quincozes, S.E., Kazienko, J.F., Gama, S., Cheikhrouhou, O., Koubaa, A.: A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT). Int. J. Inf. Secur. 23(3), 1975 (2024). https:\/\/doi.org\/10.1007\/s10207-024-00828-w","DOI":"10.1007\/s10207-024-00828-w"},{"key":"1071_CR150","doi-asserted-by":"publisher","unstructured":"Ebrahimpour, E., Babaie, S.: Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review. Int. J. Inf. Secur. 23(3), 1583 (2024). https:\/\/doi.org\/10.1007\/s10207-023-00806-8","DOI":"10.1007\/s10207-023-00806-8"},{"key":"1071_CR151","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-19278-6","author":"AK Vishwakarma","year":"2024","unstructured":"Vishwakarma, A.K., Chaurasia, S., Kumar, K., Singh, Y.N., Chaurasia, R.: Internet of things technology, research, and challenges: a survey. Multimed Tools Appl (2024). https:\/\/doi.org\/10.1007\/s11042-024-19278-6","journal-title":"Multimed Tools Appl"},{"key":"1071_CR152","doi-asserted-by":"publisher","unstructured":"Rekeraho, A., Cotfas, D.T., Cotfas, P.A., B\u0103lan, T.C., Tuyishime, E., Acheampong, R.: Cybersecurity challenges in IoT-based smart renewable energy. Int. J. Inf. Secur. 23(1), 101 (2024). https:\/\/doi.org\/10.1007\/s10207-023-00732-9","DOI":"10.1007\/s10207-023-00732-9"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01071-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01071-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01071-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:11:43Z","timestamp":1750500703000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01071-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,31]]},"references-count":152,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1071"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01071-7","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,31]]},"assertion":[{"value":"31 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"149"}}