{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T12:37:16Z","timestamp":1770813436618,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001451","name":"A*STAR under its RIE2020 Advanced Manufacturing and Engineering (AME) Programmtic Programme","doi-asserted-by":"publisher","award":["A19E3b0099"],"award-info":[{"award-number":["A19E3b0099"]}],"id":[{"id":"10.13039\/501100001451","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Education, Singapore, under its MOE AcRF Tier 2 grant","award":["MOE2018-T2-1-111"],"award-info":[{"award-number":["MOE2018-T2-1-111"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/tnsm.2021.3069502","type":"journal-article","created":{"date-parts":[[2021,3,30]],"date-time":"2021-03-30T20:23:58Z","timestamp":1617135838000},"page":"1659-1672","source":"Crossref","is-referenced-by-count":42,"title":["Decentralized and Lightweight Approach to Detect Eclipse Attacks on Proof of Work Blockchains"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6891-9174","authenticated-orcid":false,"given":"Bithin","family":"Alangot","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Reijsbergen","sequence":"additional","affiliation":[]},{"given":"Sarad","family":"Venugopalan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0871-3729","authenticated-orcid":false,"given":"Pawel","family":"Szalachowski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4524-707X","authenticated-orcid":false,"given":"Kiat Seng","family":"Yeo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_27"},{"key":"ref38","year":"2020","journal-title":"A Blockchain Framework for Building Decentralized VPN Applications"},{"key":"ref33","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref32","first-page":"236","article-title":"Low-resource eclipse attacks on Ethereum&#x2019;s peer-to-peer network","volume":"2018","author":"marcus","year":"2018","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref31","article-title":"FlyClient: Super light client for cryptocurrencies","author":"luu","year":"2020"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345649"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3025622"},{"key":"ref36","year":"2020","journal-title":"Sentinel Network Statistics"},{"key":"ref35","author":"nordberg","year":"2017","journal-title":"Gossiping in CT"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"ref10","author":"al-bassam","year":"2018","journal-title":"Fraud Proofs Maximising Light Client Security and Scaling Blockchains with Dishonest Majorities"},{"key":"ref40","first-page":"101","article-title":"Towards more reliable Bitcoin timestamps","author":"szalachowski","year":"2018","journal-title":"Proc IEEE CVCBT"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2992698"},{"key":"ref12","author":"apostolaki","year":"2018","journal-title":"SABRE protecting bitcoin against routing attacks"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.29"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.101030"},{"key":"ref16","year":"2020","journal-title":"Myth There Is No Incentive to Run Nodes So the Network Relies on Altruism"},{"key":"ref17","author":"caffyn","year":"2015","journal-title":"Chainalysis CEO Denies Sybil Attack on Bitcoin Network"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346853"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958355"},{"key":"ref28","article-title":"Non-interactive proofs of proof-of-work","author":"kiayias","year":"2017"},{"key":"ref4","year":"2019","journal-title":"Electrum SPV Client Checkpoint"},{"key":"ref27","first-page":"129","article-title":"Eclipse attacks on Bitcoin&#x2019;s peer-to-peer network","author":"heilman","year":"2015","journal-title":"Proc Usenix Security Symp"},{"key":"ref3","year":"2019","journal-title":"Bitcoinj Checkpoint"},{"key":"ref6","year":"2019","journal-title":"Protocol Documentation Block Headers&#x2014;Bitcoin Wiki"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6962"},{"key":"ref5","year":"2019","journal-title":"Bitcoin Transaction&#x2014;Bitcoin Wiki"},{"key":"ref8","year":"2019","journal-title":"How Many Confirmations Is Enough"},{"key":"ref7","year":"2019","journal-title":"Bitcoin developer reference"},{"key":"ref2","year":"2019","journal-title":"Opentimestamp"},{"key":"ref9","year":"2019","journal-title":"Flask Web Framework"},{"key":"ref1","year":"2018","journal-title":"Bitcoinj security model"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101604"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"ref45","article-title":"Ethereum eclipse attacks","author":"w\u00fcst","year":"2016"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2018.00012"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21741-3_1"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00027"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.19"},{"key":"ref23","first-page":"45","article-title":"Bitcoin-NG: A scalable blockchain protocol","author":"eyal","year":"2016","journal-title":"Proc 13th USENIX Symp Netw Syst Design Implement (NSDI)"},{"key":"ref44","author":"wang","year":"2018","journal-title":"A survey on consensus mechanisms and mining management in blockchain networks (figure 3)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3015557"},{"key":"ref43","author":"voell","year":"2020","journal-title":"Bitcoin node count falls to 3-year low despite price surge"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813655"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9450206\/09390354.pdf?arnumber=9390354","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:40Z","timestamp":1652194360000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9390354\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":46,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2021.3069502","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6]]}}}