{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:38:24Z","timestamp":1740181104773,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T00:00:00Z","timestamp":1604361600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T00:00:00Z","timestamp":1604361600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100008628","name":"Ministry of Electronics and Information technology","doi-asserted-by":"publisher","award":["12(7)\/2015-ESD"],"award-info":[{"award-number":["12(7)\/2015-ESD"]}],"id":[{"id":"10.13039\/501100008628","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["CCF Trans. Pervasive Comp. Interact."],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s42486-020-00047-x","type":"journal-article","created":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T15:03:10Z","timestamp":1604415790000},"page":"13-24","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["PJ-Sec: secure node joining in mobile P2P networks"],"prefix":"10.1007","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6937-3564","authenticated-orcid":false,"given":"Sumit Kumar","family":"Tetarave","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,3]]},"reference":[{"key":"47_CR1","doi-asserted-by":"crossref","unstructured":"Aiello, L.M., Milanesio, M., Ruffo, G., Schifanella, R.: Tempering kademlia with a robust identity based system. In: Peer-to-Peer Computing, 2008. P2P\u201908. Eighth International Conference on. pp. 30\u201339. IEEE (2008)","DOI":"10.1109\/P2P.2008.40"},{"issue":"4","key":"47_CR2","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/s12083-010-0099-6","volume":"4","author":"LM Aiello","year":"2011","unstructured":"Aiello, L.M., Milanesio, M., Ruffo, G., Schifanella, R.: An identity-based approach to secure p2p applications with likir. Peer-to-Peer Netw. Appl. 4(4), 420\u2013438 (2011)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"47_CR3","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, P.H., H\u00e9am, P.C., Kouchnarenko, O., Mantovani, J., et\u00a0al.: The avispa tool for the automated validation of internet security protocols and applications. In: International Conference on Computer aided Verification. Springer, pp. 281\u2013285 (2005)","DOI":"10.1007\/11513988_27"},{"issue":"1","key":"47_CR4","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.comnet.2011.09.015","volume":"56","author":"A Avramidis","year":"2012","unstructured":"Avramidis, A., Kotzanikolaou, P., Douligeris, C., Burmester, M.: Chord-pki: a distributed trust infrastructure based on p2p networks. Comput. Netw. 56(1), 378\u2013398 (2012)","journal-title":"Comput. Netw."},{"key":"47_CR5","first-page":"120","volume":"20","author":"PN Brown","year":"2018","unstructured":"Brown, P.N., Borowski, H., Marden, J.R.: Security against impersonation attacks in distributed systems. IEEE Trans. Control Netw. Syst. 20, 120 (2018)","journal-title":"IEEE Trans. Control Netw. Syst."},{"issue":"12","key":"47_CR6","doi-asserted-by":"publisher","first-page":"1803","DOI":"10.1109\/TPDS.2008.249","volume":"20","author":"KR Butler","year":"2009","unstructured":"Butler, K.R., Ryu, S., Traynor, P., McDaniel, P.D.: Leveraging identity-based cryptography for node id assignment in structured p2p systems. IEEE Trans. Parallel Distrib. Syst. 20(12), 1803\u20131815 (2009)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"SI","key":"47_CR7","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1145\/844128.844156","volume":"36","author":"M Castro","year":"2002","unstructured":"Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev 36(SI), 299\u2013314 (2002). https:\/\/doi.org\/10.1145\/844128.844156","journal-title":"SIGOPS Oper. Syst. Rev"},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"Caubet, J., Esparza, O., Alins, J., Mata-D\u00edaz, J., Soriano, M.: Securing identity assignment using implicit certificates in p2p overlays. In: IFIP International Conference on Trust Management. Springer, pp. 151\u2013165 (2013)","DOI":"10.1007\/978-3-642-38323-6_11"},{"issue":"12","key":"47_CR9","doi-asserted-by":"publisher","first-page":"2743","DOI":"10.1002\/sec.956","volume":"7","author":"J Caubet","year":"2014","unstructured":"Caubet, J., Esparza, O., Mu\u00f1oz, J.L., Alins, J., Mata-D\u00edaz, J.: Riappa: a robust identity assignment protocol for p2p overlays. Secur. Commun. Netw. 7(12), 2743\u20132760 (2014)","journal-title":"Secur. Commun. Netw."},{"issue":"11","key":"47_CR10","doi-asserted-by":"publisher","first-page":"2569","DOI":"10.1016\/j.comnet.2012.03.026","volume":"56","author":"WL da Costa Cordeiro","year":"2012","unstructured":"da Costa Cordeiro, W.L., Santos, F.R., Mauch, G.H., Barcelos, M.P., Gaspary, L.P.: Identity management based on adaptive puzzles to protect p2p systems from sybil attacks. Comput. Netw. 56(11), 2569\u20132589 (2012)","journal-title":"Comput. Netw."},{"key":"47_CR11","doi-asserted-by":"crossref","unstructured":"Dinger, J., Hartenstein, H.: Defending the sybil attack in p2p networks: Taxonomy, challenges, and a proposal for self-registration. In: First International Conference on Availability, Reliability and Security (ARES\u201906). IEEE, p. 8 (2006)","DOI":"10.1109\/ARES.2006.45"},{"issue":"2","key":"47_CR12","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"47_CR13","doi-asserted-by":"crossref","unstructured":"Douceur, J.R.: The sybil attack. In: International Workshop on Peer-to-Peer Systems. Springer, pp. 251\u2013260 (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"issue":"4","key":"47_CR14","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1007\/s00500-015-1821-3","volume":"21","author":"H Fang","year":"2017","unstructured":"Fang, H., Xu, L., Huang, X.: Self-adaptive trust management based on game theory in fuzzy large-scale networks. Soft. Comput. 21(4), 907\u2013921 (2017)","journal-title":"Soft. Comput."},{"key":"47_CR15","doi-asserted-by":"crossref","unstructured":"Khan, R., Hasan, R.: Midep: Multiparty identity establishment protocol for decentralized collaborative services. In: 2015 IEEE International Conference on Services Computing. IEEE, pp. 546\u2013553 (2015)","DOI":"10.1109\/SCC.2015.80"},{"key":"47_CR16","first-page":"1","volume":"20","author":"Y Lee","year":"2018","unstructured":"Lee, Y., Cho, J.: Rfid-based sensing system for context information management using p2p network architecture. Peer-to-Peer Netw. Appl. 20, 1\u20139 (2018)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"Maymounkov, P., Mazieres, D.: Kademlia: A peer-to-peer information system based on the xor metric. In: International Workshop on Peer-to-Peer Systems. Springer, pp. 53\u201365 (2002)","DOI":"10.1007\/3-540-45748-8_5"},{"issue":"1","key":"47_CR18","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TDSC.2016.2530720","volume":"15","author":"X Meng","year":"2018","unstructured":"Meng, X., Liu, D.: Getrust: a guarantee-based trust model in chord-based p2p networks. IEEE Trans. Depend. Secur. Comput. 15(1), 54\u201368 (2018)","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"key":"47_CR19","doi-asserted-by":"crossref","unstructured":"Mogensen, P., Na, W., Kov\u00e1cs, I.Z., Frederiksen, F., Pokhariyal, A., Pedersen, K.I., Kolding, T., Hugl, K., Kuusela, M.: Lte capacity compared to the shannon bound. In: Vehicular Technology Conference, 2007. VTC2007-Spring. IEEE 65th . IEEE, pp. 1234\u20131238 (2007)","DOI":"10.1109\/VETECS.2007.260"},{"key":"47_CR20","doi-asserted-by":"crossref","unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A scalable content-addressable network, vol.\u00a031. ACM (2001)","DOI":"10.1145\/964723.383072"},{"key":"47_CR21","doi-asserted-by":"crossref","unstructured":"Rowaihy, H., Enck, W., McDaniel, P., La\u00a0Porta, T.: Limiting sybil attacks in structured p2p networks. In: INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, pp 2596\u20132600 (2007)","DOI":"10.1109\/INFCOM.2007.328"},{"key":"47_CR22","doi-asserted-by":"crossref","unstructured":"Rowstron, A., Druschel, P.: Pastry-scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: Proceedings of IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware), pp. 329\u2013350 (2001)","DOI":"10.1007\/3-540-45518-3_18"},{"key":"47_CR23","unstructured":"Shi, L., Yu, S., Lou, W., Hou, Y.T.: Sybilshield: An agent-aided social network-based sybil defense among multiple communities. In: INFOCOM, 2013 Proceedings IEEE, pp. 1034\u20131042 (2013)"},{"key":"47_CR24","unstructured":"Srivatsa, M., Liu, L.: Vulnerabilities and security threats in structured overlay networks: a quantitative analysis. In: 20th Annual Computer Security Applications Conference (ACSAC \u201904) (2004)"},{"issue":"1","key":"47_CR25","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TNET.2002.808407","volume":"11","author":"I Stoica","year":"2003","unstructured":"Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord\u2014a scalable peer-to-peer lookup service for internet applications. IEEE\/ACM Trans. Netw. 11(1), 17\u201332 (2003)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"47_CR26","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1016\/j.procs.2014.05.544","volume":"32","author":"Z Trifa","year":"2014","unstructured":"Trifa, Z., Khemakhem, M.: Sybil nodes as a mitigation strategy against sybil attack. Proced. Comput. Sci. 32, 1135\u20131140 (2014)","journal-title":"Proced. Comput. Sci."},{"key":"47_CR27","unstructured":"Tutorial, H.: A beginner\u2019s guide to modelling and analysing internet security protocols (2005). [AH-03] (2009)"},{"issue":"1","key":"47_CR28","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1166\/jctn.2018.7075","volume":"15","author":"SS Vinayagam","year":"2018","unstructured":"Vinayagam, S.S., Parthasarathy, V.: A secure restricted identity-based proxy re-encryption based routing scheme for sybil attack detection in peer-to-peer networks. J. Comput. Theor. Nanosci. 15(1), 210\u2013221 (2018)","journal-title":"J. Comput. Theor. Nanosci."},{"key":"47_CR29","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/3-540-36532-X_4","volume-title":"Software Security-Theories and Systems","author":"DS Wallach","year":"2003","unstructured":"Wallach, D.S.: A survey of peer-to-peer security issues. Software Security-Theories and Systems, pp. 42\u201357. Springer, Berlin (2003)"},{"key":"47_CR30","unstructured":"Yang, B.B., Garcia-Molina, H.: Designing a super-peer network. In: Proceedings 19th International Conference on Data Engineering (Cat. No. 03CH37405). IEEE, pp. 49\u201360 (2003)"},{"issue":"2","key":"47_CR31","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s12083-011-0109-3","volume":"5","author":"M Zulhasnine","year":"2012","unstructured":"Zulhasnine, M., Huang, C., Srinivasan, A.: Towards an effective integration of cellular users to the structured peer-to-peer network. Peer-to-Peer Netw. Appl. 5(2), 178\u2013192 (2012)","journal-title":"Peer-to-Peer Netw. Appl."}],"container-title":["CCF Transactions on Pervasive Computing and Interaction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42486-020-00047-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42486-020-00047-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42486-020-00047-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,13]],"date-time":"2021-03-13T09:12:59Z","timestamp":1615626779000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42486-020-00047-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,3]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["47"],"URL":"https:\/\/doi.org\/10.1007\/s42486-020-00047-x","relation":{},"ISSN":["2524-521X","2524-5228"],"issn-type":[{"type":"print","value":"2524-521X"},{"type":"electronic","value":"2524-5228"}],"subject":[],"published":{"date-parts":[[2020,11,3]]},"assertion":[{"value":"26 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}