{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T09:07:48Z","timestamp":1772442468407,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["22K11999"],"award-info":[{"award-number":["22K11999"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"name":"The Telecommunications Advancement Foundation"},{"name":"ROIS NII Open Collaborative Research 2025","award":["252FA-23625"],"award-info":[{"award-number":["252FA-23625"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"DOI":"10.1007\/s41109-025-00745-4","type":"journal-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T15:48:09Z","timestamp":1763135289000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Social dilemma in internet routing security adoption and its resolution possibility through altruism, bounded rationality"],"prefix":"10.1007","volume":"10","author":[{"given":"Keisuke","family":"Ishibashi","sequence":"first","affiliation":[]},{"given":"Tatsuya","family":"Oryu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,14]]},"reference":[{"key":"745_CR1","doi-asserted-by":"crossref","unstructured":"Lepinski M, Kent S (2012) An infrastructure to support secure internet routing: RFC 6480, Internet engineering task force,","DOI":"10.17487\/rfc6480"},{"key":"745_CR2","unstructured":"The roadmap to enhancing internet routing security: September 2024 https:\/\/www.ntia.gov\/blog\/2024\/roadmap-enhancing-internet-routing-security"},{"key":"745_CR3","unstructured":"NIST RPKI monitor (2026). https:\/\/rpki-monitor.antd.nist.gov\/"},{"key":"745_CR4","doi-asserted-by":"crossref","unstructured":"Chung T et al (2019) RPKI is coming of age: a longitudinal study of RPKI deployment and invalid route origins. In: Internet measurement conference","DOI":"10.1145\/3355369.3355596"},{"key":"745_CR5","unstructured":"Hlavacek T et al (2023) Keep your friends close, but your Routeservers closer: insights into RPKI validation in the internet. In: 32nd USENIX security symposium"},{"key":"745_CR6","unstructured":"NTT improves security of the internet with RPKI origin validation deployment, Mar. 2020. https:\/\/www.gin.ntt.net\/ntt-improves-security-of-the-internet-with-rpki-origin-validation-deployment\/"},{"key":"745_CR7","volume-title":"Game theory and behavior","author":"J Carpenter","year":"2022","unstructured":"Carpenter J, Robbett A (2022) Game theory and behavior. The MIT Press, Cambridge"},{"issue":"6","key":"745_CR8","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/90.974527","volume":"9","author":"G Lixing","year":"2001","unstructured":"Lixing G (2001) On inferring autonomous system relationships in the internet. IEEE\/ACM Trans Netw 9(6):733\u2013745","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"4","key":"745_CR9","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/2377677.2377702","volume":"42","author":"M W\u00e4hlisch","year":"2012","unstructured":"W\u00e4hlisch M, Maennel O, Schmidt TC (2012) Towards detecting BGP route hijacking using the RPKI. SIGCOMM Comput Commun Rev 42(4):103\u2013104","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"745_CR10","doi-asserted-by":"crossref","unstructured":"Testart C, Wolff J, Gouda D, Fontugne R (2024) Identifying current barriers in RPKI adoption. In: TPRC 2024 the research conference on communications, information & internet policy","DOI":"10.2139\/ssrn.4948317"},{"key":"745_CR11","doi-asserted-by":"crossref","unstructured":"Ben D, Cecilia T, Romain F, Gautam A, Snoeren C, Claffy KC (2022) Mind your MANRS: measuring the MANRS ecosystem. In: Proc. of the 22nd ACM internet measurement conference. pp 716\u2013729","DOI":"10.1145\/3517745.3561419"},{"key":"745_CR12","unstructured":"Software for complex network (2025). https:\/\/networkx.org\/documentation\/stable\/index.html"},{"issue":"8","key":"745_CR13","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/JSAC.2010.101003","volume":"28","author":"A Elmokashfi","year":"2010","unstructured":"Elmokashfi A, Kvalbein A, Dovrolis C (2010) On the scalability of BGP: the role of topology growth. IEEE J Sel Areas Commun 28(8):1250\u20131261","journal-title":"IEEE J Sel Areas Commun"},{"key":"745_CR14","first-page":"1709","volume":"28","author":"Z Haifeng","year":"2014","unstructured":"Haifeng Z, Liansheng T, Fei G, Sammy C (2014) Traffic matrix estimation: advanced-tomogravity method based on a precise gravity model. Int J Commun Syst 28:1709\u20131728","journal-title":"Int J Commun Syst"},{"key":"745_CR15","doi-asserted-by":"crossref","unstructured":"Wahlisch M, Schmidt R, Schmidt TC, Maennel O, Uhlig S, Tyson G (2015) RiPKI: the tragic story of RPKI deployment in the web ecosystem. In: ACM HotNets","DOI":"10.1145\/2834050.2834102"},{"key":"745_CR16","doi-asserted-by":"crossref","unstructured":"Gilad Y, Cohen A, Herzberg A, Schapira M, Haya Shulman H (2017) Are we there yet? Network and distributed system security (NDSS) symposium Feb, on RPKI\u2019s deployment and security","DOI":"10.14722\/ndss.2017.23123"},{"key":"745_CR17","doi-asserted-by":"crossref","unstructured":"Li W, Lin Z, Ashiq MI, Aben E, Fontugne R, Phokeer A, Chung T (2023) RoVista: measuring and analyzing the route origin validation (ROV) in RPKI. IMC\u201923. Montreal, Canada","DOI":"10.1145\/3618257.3624806"},{"key":"745_CR18","doi-asserted-by":"crossref","unstructured":"Ando M, Okada M, Kanaoka A (2017) Simulation study of BGP origin validation effect against mis-origination with internet topology. In: 2017 12th Asia joint conference on information security (AsiaJCIS)","DOI":"10.1109\/AsiaJCIS.2017.17"},{"key":"745_CR19","doi-asserted-by":"crossref","unstructured":"Gilad Y, Hlavacek T, Herzberg A, Schapira M (2018) Perfect is the enemy of good: setting realistic goals for BGP security. In: Proceedings of the 17th ACM workshop on hot topics in networks. pp 57\u201363","DOI":"10.1145\/3286062.3286071"},{"key":"745_CR20","doi-asserted-by":"crossref","unstructured":"Lear E (2014) Report from the IAB workshop on internet technology adoption and transition (ITAT), RFC 7305","DOI":"10.17487\/rfc7305"},{"key":"745_CR21","doi-asserted-by":"publisher","first-page":"5170","DOI":"10.1109\/TDSC.2024.3371644","volume":"21","author":"M Zeng","year":"2024","unstructured":"Zeng M, Huang X, Zhang P, Li D, Xie K (2024) Improving prefix hijacking defense of RPKI from an evolutionary game perspective. IEEE Trans Dependable Secure Comput 21:5170\u20135184","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"745_CR22","unstructured":"Oryu T, Ishibashi K (2021) Simulation evaluation of RPKI deployment based on cost-benefit analysis. In: 2021 international conference on emerging technologies for communications (ICETC 2021)"}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00745-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41109-025-00745-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00745-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T08:33:26Z","timestamp":1772440406000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41109-025-00745-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":22,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["745"],"URL":"https:\/\/doi.org\/10.1007\/s41109-025-00745-4","relation":{},"ISSN":["2364-8228"],"issn-type":[{"value":"2364-8228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,14]]},"assertion":[{"value":"31 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2026","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The numbering of in-text citations was incorrect in the original publication. The article has been updated to rectify the errors.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publication"}},{"value":"The authors declare no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"58"}}