{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:50:12Z","timestamp":1764240612418,"version":"3.46.0"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T00:00:00Z","timestamp":1764201600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T00:00:00Z","timestamp":1764201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"ASIGE Research Unit","award":["IDB\/00408\/2020"],"award-info":[{"award-number":["IDB\/00408\/2020"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"DOI":"10.1007\/s41109-025-00740-9","type":"journal-article","created":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:36:35Z","timestamp":1764239795000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Heterogeneity- and homophily-induced vulnerability of a P2P network formation model: the Mana based auto-peering protocol"],"prefix":"10.1007","volume":"10","author":[{"given":"Yu","family":"Gao","sequence":"first","affiliation":[]},{"given":"Carlo","family":"Campajola","sequence":"additional","affiliation":[]},{"given":"Nicol\u00f2","family":"Vallarano","sequence":"additional","affiliation":[]},{"given":"Andreia Sofia","family":"Teixeira","sequence":"additional","affiliation":[]},{"given":"Claudio J.","family":"Tessone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,27]]},"reference":[{"issue":"1","key":"740_CR1","first-page":"32","volume":"11","author":"S Lawrence","year":"2000","unstructured":"Lawrence S, Giles CL (2000) Accessibility of information on the web. Intell 11(1):32\u201339","journal-title":"Intell"},{"key":"740_CR2","doi-asserted-by":"crossref","unstructured":"Oram A (2001) Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O\u2019Reilly Media, Inc.","DOI":"10.1145\/375348.377427"},{"issue":"4","key":"740_CR3","doi-asserted-by":"publisher","first-page":"046119","DOI":"10.1103\/PhysRevE.64.046119","volume":"64","author":"RF Cancho","year":"2001","unstructured":"Cancho RF, Janssen C, Sol\u00e9 RV (2001) Topology of technology graphs: small world patterns in electronic circuits. Phys Rev E 64(4):046119","journal-title":"Phys Rev E"},{"issue":"18","key":"740_CR4","doi-asserted-by":"publisher","first-page":"3866","DOI":"10.1016\/j.comnet.2012.08.009","volume":"56","author":"J Heidemann","year":"2012","unstructured":"Heidemann J, Klier M, Probst F (2012) Online social networks: a survey of a global phenomenon. Comput Netw 56(18):3866\u20133878","journal-title":"Comput Netw"},{"issue":"5","key":"740_CR5","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/s42979-020-00315-8","volume":"1","author":"N Masinde","year":"2020","unstructured":"Masinde N, Graffi K (2020) Peer-to-peer-based social networks: a comprehensive survey. SN Comput Sci 1(5):299","journal-title":"SN Comput Sci"},{"key":"740_CR6","unstructured":"Tanenbaum AS (2007) Distributed Systems Principles and Paradigms"},{"issue":"4","key":"740_CR7","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/1041680.1041681","volume":"36","author":"S Androutsellis-Theotokis","year":"2004","unstructured":"Androutsellis-Theotokis S, Spinellis D (2004) A survey of peer-to-peer content distribution technologies. ACM Comput Surv (CSUR) 36(4):335\u2013371","journal-title":"ACM Comput Surv (CSUR)"},{"key":"740_CR8","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized business review, 21260"},{"key":"740_CR9","doi-asserted-by":"crossref","unstructured":"El\u00a0Ioini N, Pahl C (2018) A review of distributed ledger technologies. In: On the Move to Meaningful Internet Systems. OTM 2018 Conferences: Confederated International Conferences: CoopIS, C &TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part II, pp. 277\u2013288 Springer","DOI":"10.1007\/978-3-030-02671-4_16"},{"key":"740_CR10","doi-asserted-by":"crossref","unstructured":"Kraner B, Vallarano N, Schwarz-Schilling C, Tessone CJ (2023) Agent-based modelling of ethereum consensus. In: 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1\u20138. IEEE","DOI":"10.1109\/ICBC56567.2023.10174948"},{"issue":"2014","key":"740_CR11","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1\u201332","journal-title":"Ethereum Project Yellow Paper"},{"key":"740_CR12","unstructured":"Miller A, Litton J, Pachulski A, Gupta N, Levin D, Spring N, Bhattacharjee B et al (2015) Discovering bitcoin\u2019s public topology and influential nodes"},{"key":"740_CR13","doi-asserted-by":"crossref","unstructured":"Deshpande V, Badis H, George L (2018) Btcmap: Mapping bitcoin peer-to-peer network topology. In: 2018 IFIP\/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), pp. 1\u20136. IEEE","DOI":"10.23919\/PEMWN.2018.8548904"},{"key":"740_CR14","first-page":"91","volume":"2018","author":"SK Kim","year":"2018","unstructured":"Kim SK, Ma Z, Murali S, Mason J, Miller A, Bailey M (2018) Measuring ethereum network peers. Proc Internet Meas Conf 2018:91\u2013104","journal-title":"Proc Internet Meas Conf"},{"key":"740_CR15","doi-asserted-by":"crossref","unstructured":"Imtiaz MA, Starobinski D, Trachtenberg A, Younis N (2019) Churn in the bitcoin network: Characterization and impact. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 431\u2013439. IEEE","DOI":"10.1109\/BLOC.2019.8751297"},{"key":"740_CR16","unstructured":"Heilman E, Kendler A, Zohar A, Goldberg S (2015) Eclipse attacks on bitcoin\u2019s peer-to-peer network. In: 24th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 15), pp. 129\u2013144"},{"key":"740_CR17","doi-asserted-by":"crossref","unstructured":"Nayak K, Kumar S, Miller A, Shi E (2016) Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In: 2016 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 305\u2013320. IEEE","DOI":"10.1109\/EuroSP.2016.32"},{"key":"740_CR18","doi-asserted-by":"crossref","unstructured":"Apostolaki M, Zohar A, Vanbever L (2017) Hijacking bitcoin: Routing attacks on cryptocurrencies. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 375\u2013392. IEEE","DOI":"10.1109\/SP.2017.29"},{"key":"740_CR19","doi-asserted-by":"crossref","unstructured":"Tran M, Choi I, Moon GJ, Vu AV, Kang MS (2020) A stealthier partitioning attack against bitcoin peer-to-peer network. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 894\u2013909. IEEE","DOI":"10.1109\/SP40000.2020.00027"},{"key":"740_CR20","doi-asserted-by":"crossref","unstructured":"M\u00fcller S, Capossele A, Ku\u015bmierz B, Lin V, Moog H, Penzkofer A, Saa O, Sanders W, Welz W (2021) Salt-based autopeering for dlt-networks. In: 2021 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), pp. 165\u2013169. IEEE","DOI":"10.1109\/BRAINS52497.2021.9569778"},{"key":"740_CR21","doi-asserted-by":"crossref","unstructured":"Moubarak J, Filiol E,Chamoun M (2018) On blockchain security and relevant attacks. In: 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM), pp. 1\u20136. IEEE","DOI":"10.1109\/MENACOMM.2018.8371010"},{"key":"740_CR22","doi-asserted-by":"crossref","unstructured":"Dobson I, Carreras BA, Lynch VE, Newman DE (2007) Complex systems analysis of series of blackouts: Cascading failure, critical points, and self-organization. Chaos Interdiscipl J Nonlinear Sci 17(2)","DOI":"10.1063\/1.2737822"},{"key":"740_CR23","doi-asserted-by":"crossref","unstructured":"Arianos S, Bompard E, Carbone A, Xue F (2009) Power grid vulnerability: a complex network approach. Chaos Interdiscip J Nonlinear Sci 19(1)","DOI":"10.1063\/1.3077229"},{"key":"740_CR24","doi-asserted-by":"crossref","unstructured":"Epstein JM (2012) Generative Social Science: Studies in Agent-based Computational Modeling. Princeton University Press","DOI":"10.1515\/9781400842872"},{"key":"740_CR25","doi-asserted-by":"crossref","unstructured":"Hines P, Cotilla-Sanchez E, Blumsack S (2010) Do topological models provide good information about electricity infrastructure vulnerability? Chaos Interdiscipl J Nonlinear Sci 20(3)","DOI":"10.1063\/1.3489887"},{"key":"740_CR26","unstructured":"Newman M (2018) Networks. Oxford university press"},{"issue":"6684","key":"740_CR27","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts DJ, Strogatz SH (1998) Collective dynamics of \u2018small-world\u2019networks. Nature 393(6684):440\u2013442","journal-title":"Nature"},{"issue":"1","key":"740_CR28","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1038\/nphys2160","volume":"8","author":"A Vespignani","year":"2012","unstructured":"Vespignani A (2012) Modelling dynamical processes in complex socio-technical systems. Nat Phys 8(1):32\u201339","journal-title":"Nat Phys"},{"issue":"32","key":"740_CR29","doi-asserted-by":"publisher","first-page":"11157","DOI":"10.1073\/pnas.0501226102","volume":"102","author":"DJ Watts","year":"2005","unstructured":"Watts DJ, Muhamad R, Medina DC, Dodds PS (2005) Multiscale, resurgent epidemics in a hierarchical metapopulation model. Proc Natl Acad Sci 102(32):11157\u201311162","journal-title":"Proc Natl Acad Sci"},{"key":"740_CR30","doi-asserted-by":"crossref","unstructured":"Singh A, Ngan T-W, Druschel P, Wallach DS et al (2006) Eclipse attacks on overlay networks: Threats and defenses","DOI":"10.1109\/INFOCOM.2006.231"},{"issue":"20","key":"740_CR31","doi-asserted-by":"publisher","first-page":"9372","DOI":"10.3390\/app11209372","volume":"11","author":"D Khan","year":"2021","unstructured":"Khan D, Jung LT, Hashmani MA (2021) Systematic literature review of challenges in blockchain scalability. Appl Sci 11(20):9372","journal-title":"Appl Sci"},{"key":"740_CR32","unstructured":"Popov S (2018) The tangle. White paper 1(3)"},{"key":"740_CR33","unstructured":"Popov S, Moog H, Camargo D, Capossele A, Dimitrov V, Gal A, Greve A, Kusmierz B, Mueller S, Penzkofer A et al (2020) The coordicide. Accessed Jan, 1\u201330"},{"key":"740_CR34","doi-asserted-by":"crossref","unstructured":"Douceur JR (2002) The sybil attack. In: International Workshop on Peer-to-peer Systems, pp. 251\u2013260 Springer","DOI":"10.1007\/3-540-45748-8_24"},{"key":"740_CR35","doi-asserted-by":"crossref","unstructured":"Cheng A, Friedman E (2005) Sybilproof reputation mechanisms. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-peer Systems, pp. 128\u2013132","DOI":"10.1145\/1080192.1080202"},{"issue":"20","key":"740_CR36","doi-asserted-by":"publisher","first-page":"208701","DOI":"10.1103\/PhysRevLett.89.208701","volume":"89","author":"ME Newman","year":"2002","unstructured":"Newman ME (2002) Assortative mixing in networks. Phys Rev Lett 89(20):208701","journal-title":"Phys Rev Lett"},{"issue":"2","key":"740_CR37","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1086\/599247","volume":"115","author":"G Kossinets","year":"2009","unstructured":"Kossinets G, Watts DJ (2009) Origins of homophily in an evolving social network. Am J Sociol 115(2):405\u2013450","journal-title":"Am J Sociol"},{"issue":"2","key":"740_CR38","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1177\/0049124111404820","volume":"40","author":"CR Shalizi","year":"2011","unstructured":"Shalizi CR, Thomas AC (2011) Homophily and contagion are generically confounded in observational social network studies. Sociol Methods Res 40(2):211\u2013239","journal-title":"Sociol Methods Res"},{"issue":"1","key":"740_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41109-023-00556-5","volume":"8","author":"R Hasheminezhad","year":"2023","unstructured":"Hasheminezhad R, Brandes U (2023) Robustness of preferential-attachment graphs. Appl Netw Sci 8(1):1\u201319","journal-title":"Appl Netw Sci"},{"issue":"3","key":"740_CR40","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1086\/338954","volume":"107","author":"J Moody","year":"2001","unstructured":"Moody J (2001) Race, school integration, and friendship segregation in America. Am J Sociol 107(3):679\u2013716","journal-title":"Am J Sociol"},{"issue":"2","key":"740_CR41","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1073\/pnas.98.2.404","volume":"98","author":"ME Newman","year":"2001","unstructured":"Newman ME (2001) The structure of scientific collaboration networks. Proc Natl Acad Sci 98(2):404\u2013409","journal-title":"Proc Natl Acad Sci"},{"issue":"2","key":"740_CR42","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1086\/210318","volume":"105","author":"DJ Watts","year":"1999","unstructured":"Watts DJ (1999) Networks, dynamics, and the small-world phenomenon. Am J Sociol 105(2):493\u2013527","journal-title":"Am J Sociol"},{"key":"740_CR43","unstructured":"Campajola C, Cristodaro R, De\u00a0Collibus FM, Yan T, Vallarano N, Tessone CJ (2022) The evolution of centralisation on cryptocurrency platforms. arXiv preprint arXiv:2206.05081"},{"key":"740_CR44","doi-asserted-by":"publisher","DOI":"10.3386\/w29396","volume-title":"Blockchain analysis of the bitcoin market","author":"I Makarov","year":"2021","unstructured":"Makarov I, Schoar A (2021) Blockchain analysis of the bitcoin market. Technical report, National Bureau of Economic Research"},{"key":"740_CR45","doi-asserted-by":"crossref","unstructured":"Chohan UW (2022) Cryptocurrencies and inequality. In: Cryptofinance: A New Currency for a New Economy, pp. 49\u201362. World Scientific","DOI":"10.1142\/9789811239670_0003"},{"key":"740_CR46","doi-asserted-by":"publisher","first-page":"38","DOI":"10.3389\/fbloc.2021.730122","volume":"4","author":"AR Sai","year":"2021","unstructured":"Sai AR, Buckley J, Gear A (2021) Characterizing wealth inequality in cryptocurrencies. Front Blockchain 4:38","journal-title":"Front Blockchain"},{"key":"740_CR47","unstructured":"Zipf GK (2016) Human Behavior and the principle of least effort: an Introduction to Human Ecology. Ravenio Books"},{"key":"740_CR48","doi-asserted-by":"crossref","unstructured":"Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry, 35\u201341","DOI":"10.2307\/3033543"},{"issue":"12","key":"740_CR49","doi-asserted-by":"publisher","first-page":"7821","DOI":"10.1073\/pnas.122653799","volume":"99","author":"M Girvan","year":"2002","unstructured":"Girvan M, Newman ME (2002) Community structure in social and biological networks. Proc Natl Acad Sci 99(12):7821\u20137826","journal-title":"Proc Natl Acad Sci"},{"issue":"2","key":"740_CR50","doi-asserted-by":"publisher","first-page":"298","DOI":"10.21136\/CMJ.1973.101168","volume":"23","author":"M Fiedler","year":"1973","unstructured":"Fiedler M (1973) Algebraic connectivity of graphs. Czechoslov Math J 23(2):298\u2013305","journal-title":"Czechoslov Math J"},{"issue":"2","key":"740_CR51","doi-asserted-by":"publisher","first-page":"027105","DOI":"10.1103\/PhysRevE.75.027105","volume":"75","author":"J Saram\u00e4ki","year":"2007","unstructured":"Saram\u00e4ki J, Kivel\u00e4 M, Onnela J-P, Kaski K, Kertesz J (2007) Generalizations of the clustering coefficient to weighted complex networks. Phys Rev E 75(2):027105","journal-title":"Phys Rev E"},{"issue":"1","key":"740_CR52","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-016-0001-8","volume":"6","author":"Z Yang","year":"2016","unstructured":"Yang Z, Algesheimer R, Tessone CJ (2016) A comparative analysis of community detection algorithms on artificial networks. Sci Rep 6(1):1\u201318","journal-title":"Sci Rep"},{"issue":"2","key":"740_CR53","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1002\/j.1538-7305.1970.tb01770.x","volume":"49","author":"BW Kernighan","year":"1970","unstructured":"Kernighan BW, Lin S (1970) An efficient heuristic procedure for partitioning graphs. Bell System Tech J 49(2):291\u2013307","journal-title":"Bell System Tech J"},{"key":"740_CR54","doi-asserted-by":"crossref","unstructured":"Kusmierz B, Overko R (2022)How centralized is decentralized? comparison of wealth distribution in coins and tokens. In: 2022 IEEE International Conference on Omni-layer Intelligent Systems (COINS), pp. 1\u20136. IEEE","DOI":"10.1109\/COINS54846.2022.9854972"}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00740-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41109-025-00740-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00740-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:36:49Z","timestamp":1764239809000},"score":1,"resource":{"primary":{"URL":"https:\/\/appliednetsci.springeropen.com\/articles\/10.1007\/s41109-025-00740-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,27]]},"references-count":54,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["740"],"URL":"https:\/\/doi.org\/10.1007\/s41109-025-00740-9","relation":{},"ISSN":["2364-8228"],"issn-type":[{"value":"2364-8228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,27]]},"assertion":[{"value":"31 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"62"}}