{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:24:03Z","timestamp":1761402243092,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T00:00:00Z","timestamp":1656720000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T00:00:00Z","timestamp":1656720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s10922-022-09668-2","type":"journal-article","created":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T12:25:27Z","timestamp":1656764727000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Inter-Domain Prefix and Route Validation Using Fast and Scalable DAG Based Distributed Ledger for Secure BGP Routing"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9870-3721","authenticated-orcid":false,"given":"Prashanth","family":"Podili","sequence":"first","affiliation":[]},{"given":"Sumanth Reddy","family":"Cherupally","sequence":"additional","affiliation":[]},{"given":"Srinivas","family":"Boga","sequence":"additional","affiliation":[]},{"given":"Kotaro","family":"Kataoka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,2]]},"reference":[{"key":"9668_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106584","volume":"83","author":"Di Chen","year":"2020","unstructured":"Chen, Di., et al.: ISRchain: achieving efficient interdomain secure routing with blockchain. Comput. Electr. Eng. 83, 106584 (2020). https:\/\/doi.org\/10.1016\/j.compeleceng.2020.106584","journal-title":"Comput. Electr. Eng."},{"issue":"4","key":"9668_CR2","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/1851275.1851195","volume":"40","author":"Sharon Goldberg","year":"2010","unstructured":"Goldberg, Sharon, et al.: How secure are secure interdomain routing protocols. ACM SIGCOMM Comp. Commun. Rev. 40(4), 87\u201398 (2010). https:\/\/doi.org\/10.1145\/1851275.1851195","journal-title":"ACM SIGCOMM Comp. Commun. Rev."},{"key":"9668_CR3","doi-asserted-by":"publisher","unstructured":"Adiseshu, H., Lakshman, T. V.: The internet blockchain: A distributed, tamper-resistant transaction framework for the internet. Proceedings of the 15th ACM workshop on hot topics in networks. 2016. https:\/\/doi.org\/10.1145\/3005745.3005771","DOI":"10.1145\/3005745.3005771"},{"issue":"2","key":"9668_CR4","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1109\/TNSM.2020.3015557","volume":"18","author":"G He","year":"2020","unstructured":"He, G., et al.: ROAchain: securing route origin authorization with blockchain for inter-domain routing. IEEE Trans. Netw Serv. Manag. 18(2), 1690\u20131705 (2020). https:\/\/doi.org\/10.1109\/TNSM.2020.3015557","journal-title":"IEEE Trans. Netw Serv. Manag."},{"key":"9668_CR5","unstructured":"Austein, R., et al. RFC 8205-BGPsec protocol specification. (2017)"},{"key":"9668_CR6","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1007\/s10922-020-09559-4","volume":"28","author":"B Rodrigues","year":"2020","unstructured":"Rodrigues, B., Scheid, E., Killer, C., et al.: Blockchain signaling system (BloSS): cooperative signaling of distributed denial-of-service attacks. J. Netw. Syst. Manage. 28, 953\u2013989 (2020). https:\/\/doi.org\/10.1007\/s10922-020-09559-4","journal-title":"J. Netw. Syst. Manage."},{"key":"9668_CR7","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1007\/s10922-020-09532-1","volume":"28","author":"A Kaci","year":"2020","unstructured":"Kaci, A., Rachedi, A.: Toward a machine learning and software defined network approaches to manage miners\u2019 reputation in blockchain. J. Netw. Syst. Manage. 28, 478\u2013501 (2020). https:\/\/doi.org\/10.1007\/s10922-020-09532-1","journal-title":"J. Netw. Syst. Manage."},{"key":"9668_CR8","unstructured":"de la Rocha G\u00f3mez-Arevalillo, A., Papadimitratos, P.: Blockchain-based public key infrastructure for inter-domain secure routing. International workshop on open problems in network security (iNetSec). (2017)"},{"issue":"4","key":"9668_CR9","doi-asserted-by":"publisher","first-page":"1459","DOI":"10.1109\/TEM.2019.2924737","volume":"67","author":"A Stefano","year":"2019","unstructured":"Stefano, A., et al.: A distributed autonomous organization for internet address management. IEEE Trans. Eng. Manag. 67(4), 1459\u20131475 (2019). https:\/\/doi.org\/10.1109\/TEM.2019.2924737","journal-title":"IEEE Trans. Eng. Manag."},{"issue":"9","key":"9668_CR10","doi-asserted-by":"publisher","first-page":"408","DOI":"10.3390\/sym10090408","volume":"10","author":"Xing Qianqian","year":"2018","unstructured":"Qianqian, Xing, Wang, Baosheng, Wang, Xiaofeng: Bgpcoin: blockchain-based internet number resource authority and bgp security solution. Symmetry 10(9), 408 (2018). https:\/\/doi.org\/10.3390\/sym10090408","journal-title":"Symmetry"},{"key":"9668_CR11","doi-asserted-by":"publisher","first-page":"166896","DOI":"10.1109\/ACCESS.2019.2954096","volume":"7","author":"Paillisse Jordi","year":"2019","unstructured":"Jordi, Paillisse, et al.: Decentralized trust in the inter-domain routing infrastructure. IEEE Access 7, 166896\u2013166905 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2954096","journal-title":"IEEE Access"},{"key":"9668_CR12","doi-asserted-by":"publisher","unstructured":"Muhammad, S., et al. RouteChain: towards blockchain-based secure and efficient BGP routing. 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, (2019). https:\/\/doi.org\/10.1109\/BLOC.2019.8751229","DOI":"10.1109\/BLOC.2019.8751229"},{"key":"9668_CR13","doi-asserted-by":"publisher","unstructured":"Ilias, S., Kotronis, V.: Validating IP prefixes and AS-paths with blockchains. arXiv preprint arXiv:1906.03172 (2019). https:\/\/doi.org\/10.48550\/arXiv.1906.03172","DOI":"10.48550\/arXiv.1906.03172"},{"key":"9668_CR14","unstructured":"BGP Instability Report, https:\/\/bgp.potaroo.net\/, Accessed March 2022"},{"issue":"4","key":"9668_CR15","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1016\/j.dcan.2019.12.001","volume":"6","author":"Cao Bin","year":"2020","unstructured":"Bin, Cao, et al.: Performance analysis and comparison of PoW, PoS and DAG based blockchains. Digit. Commun. Netw. 6(4), 480\u2013485 (2020). https:\/\/doi.org\/10.1016\/j.dcan.2019.12.001","journal-title":"Digit. Commun. Netw."},{"key":"9668_CR16","unstructured":"Serguei, P.: The tangle. White paper 1.3 (2018)"},{"key":"9668_CR17","unstructured":"Anton, C.: Byteball: a decentralized system for storage and transfer of value. (2016). https:\/\/byteball.org\/Byteball.pdf"},{"key":"9668_CR18","doi-asserted-by":"publisher","unstructured":"Cherupally, S.R., et al. Lightweight and Scalable DAG based distributed ledger for verifying IoT data integrity. 2021 International Conference on Information Networking (ICOIN). IEEE, (2021). https:\/\/doi.org\/10.1109\/ICOIN50884.2021.9334000","DOI":"10.1109\/ICOIN50884.2021.9334000"},{"key":"9668_CR19","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.comcom.2017.07.012","volume":"111","author":"Livadariu Ioana","year":"2017","unstructured":"Ioana, Livadariu, Elmokashfi, Ahmed, Dhamdhere, Amogh: n IPv4 transfer markets: analyzing reported transfers and inferring transfers in the wild. Comput. Commun. 111, 105\u2013119 (2017). https:\/\/doi.org\/10.1016\/j.comcom.2017.07.012","journal-title":"Comput. Commun."},{"key":"9668_CR20","doi-asserted-by":"publisher","unstructured":"Qin, W., et al.: SoK: diving into DAG-based blockchain systems. arXiv preprint arXiv:2012.06128 (2020). https:\/\/doi.org\/10.48550\/arXiv.2012.06128","DOI":"10.48550\/arXiv.2012.06128"},{"key":"9668_CR21","doi-asserted-by":"publisher","unstructured":"Wu, Y., Wang, R., Xu, X.: A certificate pin BGP protocol: CP-BGP, in 2020 5th International Conference on Computer and Communication Systems (ICCCS), pp. 162-166. (2020). https:\/\/doi.org\/10.1109\/ICCCS49078.2020.9118593","DOI":"10.1109\/ICCCS49078.2020.9118593"},{"key":"9668_CR22","doi-asserted-by":"publisher","unstructured":"Zeng, M., Li, H., Lai, J., Huang, X.: A BGP Hijacking Detection Method based on Multi-dimensional Historical Data Analysis. In: 2021 International Conference on Computer Communication and Artificial Intelligence (CCAI), pp. 141-145. (2021). https:\/\/doi.org\/10.1109\/CCAI50917.2021.9447530","DOI":"10.1109\/CCAI50917.2021.9447530"},{"issue":"6","key":"9668_CR23","doi-asserted-by":"publisher","first-page":"2471","DOI":"10.1109\/TNET.2018.2869798","volume":"26","author":"P Sermpezis","year":"2018","unstructured":"Sermpezis, P., et al.: ARTEMIS: neutralizing BGP hijacking within a minute. IEEE\/ACM Trans. Netw. 26(6), 2471\u20132486 (2018). https:\/\/doi.org\/10.1109\/TNET.2018.2869798","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"9668_CR24","doi-asserted-by":"publisher","first-page":"132384","DOI":"10.1109\/ACCESS.2019.2941006","volume":"7","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Li, D., Zhao, B.: A prefix hijacking detection model based on the immune network theory. IEEE Access 7, 132384\u2013132394 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2941006","journal-title":"IEEE Access"},{"key":"9668_CR25","doi-asserted-by":"publisher","unstructured":"Alshamrani, H., Ghita, B., Lancaster, D.: Detecting IP prefix hijacking using data reduction-based and Binary Search Algorithm. In: 2015 Internet Technologies and Applications (ITA), pp. 78-84. (2015). https:\/\/doi.org\/10.1109\/ITechA.2015.7317374","DOI":"10.1109\/ITechA.2015.7317374"},{"key":"9668_CR26","unstructured":"Huston G.: BGP in 2018-BGP churn. (2021). https:\/\/blog.apnic.net\/2021\/01\/06\/bgp-in-2020-bgp-update-churn\/"},{"issue":"6","key":"9668_CR27","doi-asserted-by":"publisher","first-page":"4134","DOI":"10.1109\/TII.2019.2931157","volume":"16","author":"Cui Laizhong","year":"2019","unstructured":"Laizhong, Cui, et al.: An efficient and compacted DAG-based blockchain protocol for industrial Internet of Things. IEEE Trans. Indus. Inform. 16(6), 4134\u20134145 (2019). https:\/\/doi.org\/10.1109\/TII.2019.2931157","journal-title":"IEEE Trans. Indus. Inform."},{"key":"9668_CR28","doi-asserted-by":"publisher","unstructured":"Caixiang, F.: Towards a scalable DAG-based distributed ledger for smart communities. et al.: IEEE 5th World Forum on Internet of Things (WF-IoT). IEEE 2019 (2019). https:\/\/doi.org\/10.1109\/WF-IoT.2019.8767342","DOI":"10.1109\/WF-IoT.2019.8767342"},{"key":"9668_CR29","unstructured":"Joseph, P., Dryja, T.: The bitcoin lightning network: Scalable off-chain instant payments. (2016)"},{"key":"9668_CR30","unstructured":"IPRV simulation source code. https:\/\/github.com\/prashanthpvn\/IPRV. Accessed March 2022"},{"key":"9668_CR31","unstructured":"IPRV docker source code.https:\/\/github.com\/sumanthcherupally\/FSD2L. Accessed March 2022"},{"key":"9668_CR32","unstructured":"CAIDA Route-Veiws datasets. https:\/\/www.caida.org\/catalog\/datasets\/routeviews-prefix2as\/. Accessed April 2022"},{"key":"9668_CR33","unstructured":"CAIDA AS-Relationships datasets.https:\/\/publicdata.caida.org\/datasets\/as-relationships\/ Accessed April 2022"},{"key":"9668_CR34","doi-asserted-by":"publisher","unstructured":"Patrick, K., et al.: Generating synthetic internet-and ip-topologies using the stochastic-block-model. 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, (2017). https:\/\/doi.org\/10.23919\/INM.2017.7987411","DOI":"10.23919\/INM.2017.7987411"},{"key":"9668_CR35","unstructured":"CIDR-Report. https:\/\/www.cidr-report.org\/as2.0\/. Accessed March 2022"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-022-09668-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-022-09668-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-022-09668-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T04:10:24Z","timestamp":1664511024000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-022-09668-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,2]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["9668"],"URL":"https:\/\/doi.org\/10.1007\/s10922-022-09668-2","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2022,7,2]]},"assertion":[{"value":"30 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author delcares that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"55"}}