{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:21:05Z","timestamp":1774023665052,"version":"3.50.1"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100020639","name":"Bayerische Staatsministerium f\u00fcr Wirtschaft, Landesentwicklung und Energie","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100020639","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Federal Ministry of Education and Research of Germany"},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["MA 6529\/4-1"],"award-info":[{"award-number":["MA 6529\/4-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["KE 1863\/10-1"],"award-info":[{"award-number":["KE 1863\/10-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1109\/tr.2024.3434560","type":"journal-article","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T17:24:07Z","timestamp":1723569847000},"page":"2927-2941","source":"Crossref","is-referenced-by-count":11,"title":["Network Sovereignty: A Novel Metric and Its Application on Network Design"],"prefix":"10.1109","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0199-7204","authenticated-orcid":false,"given":"Shakthivelu","family":"Janardhanan","sequence":"first","affiliation":[{"name":"Chair of Communication Networks, University Bundeswehr M&#x00FC;nchen (UniBW), Neubiberg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5617-9391","authenticated-orcid":false,"given":"Maria","family":"Samonaki","sequence":"additional","affiliation":[{"name":"Chair of Communication Networks, University Bundeswehr M&#x00FC;nchen (UniBW), Neubiberg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0083-5860","authenticated-orcid":false,"given":"Poul Einar","family":"Heegaard","sequence":"additional","affiliation":[{"name":"Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Trondheim, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4358-8038","authenticated-orcid":false,"given":"Wolfgang","family":"Kellerer","sequence":"additional","affiliation":[{"name":"Chair of Communication Networks, University Bundeswehr M&#x00FC;nchen (UniBW), Neubiberg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2348-2714","authenticated-orcid":false,"given":"Carmen","family":"Mas-Machuca","sequence":"additional","affiliation":[{"name":"Chair of Communication Networks, University Bundeswehr M&#x00FC;nchen (UniBW), Neubiberg, Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/batteries4010003"},{"key":"ref2","article-title":"What is Log4j and Why did the Government of Canada turn everything off?","author":"Rudolph","year":"2022","journal-title":"Can. Global Affairs Inst."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(18)30005-9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref5","article-title":"Technology sovereignty: From demand to concept [Technologiesouvernitt: Von der Forderung zum Konzept]","author":"Edler","year":"2020"},{"key":"ref6","article-title":"Sovereignty in information technology","author":"Weber","year":"2018"},{"key":"ref7","volume-title":"Les Six Livres de la Rpublique","volume":"6","author":"Bodin","year":"1986"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/08109028308628930"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720982012"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14361\/9783839457603-003"},{"key":"ref11","article-title":"Digital Sovereignty: Europe at a Crossroads","author":"Reding","year":"2016","journal-title":"Eur. Investment Bank Inst."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-020-00423-6"},{"key":"ref13","article-title":"Europe\u2019s Quest for Technology Sovereignty: Opportunities and Pitfalls","volume-title":"The European Centre for International Political Economy, Brussels, Belgium","author":"Bauer","year":"2020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5040\/9798881810733.ch-006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/ajs4.141"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5334\/dsj-2019-031"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2430275"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.3940508","article-title":"Data sovereignty and trade agreements: Three digital kingdoms","author":"Gao","year":"2021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICoICT.2015.7231469"},{"key":"ref20","first-page":"1","article-title":"An internet with BRICS characteristics: Data sovereignty and the Balkanisation of the Internet","volume-title":"Proc. 4th USENIX Workshop Free Open Commun. Internet","author":"Polatin-Reuben","year":"2014"},{"key":"ref21","article-title":"Data nationalism","volume":"64","author":"Chander","year":"2014","journal-title":"Emory LJ"},{"key":"ref22","first-page":"1","article-title":"A delimitation of data sovereignty from digital and technological sovereignty","volume-title":"Proc. ECIS Res. Papers","author":"Hellmeier","year":"2023"},{"key":"ref23","article-title":"Network availability, redundancy, resilience, diversity: What\u2019s the difference?","author":"Bhardwaj"},{"key":"ref24","article-title":"How to avoid common network diversity disasters","author":"Birman","year":"2020"},{"key":"ref25","article-title":"Network redundancy & network diversity. What\u2019s the difference?","year":"2019"},{"key":"ref26","article-title":"The value of network diversity"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON.2019.8840527"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1364\/OFC.2019.Th1I.2","article-title":"Open design for multi-vendor optical networks","volume-title":"Proc. Opt. Fiber Commun. Conf.","author":"Auge","year":"2019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/BMSB53066.2021.9547167"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2327754"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CQR59928.2023.10317075"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN53993.2022.9758037"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSRS56243.2022.10067479"},{"key":"ref34","article-title":"Here are all the major US tech companies blocked behind China\u2019s Great Firewall","author":"Leskin","year":"2019","journal-title":"Bus. Insider"},{"key":"ref35","article-title":"US telcos ordered to rip and replace Huawei components","year":"2020"},{"key":"ref36","article-title":"Huawei 5G kit must be removed from U.K. by 2027","author":"Kelion","year":"2020"},{"key":"ref37","article-title":"El Gobierno lanza la convocatoria del 5G rural con clusula antichina [The Government launches the call for rural 5G with anti-Chinese clause]","volume-title":"Telecommunicaciones, Economia","author":"Masdeu","year":"2023"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.11644\/KIEP.EAER.2020.24.4.384"},{"key":"ref39","article-title":"TSMC suspends work for chinese chip startup amid US curbs","author":"Wu","year":"2022"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/DSA59317.2023.00102"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891282"},{"key":"ref42","article-title":"Asia semiconductor sector (Sector Review)","author":"Abrams","year":"2013","journal-title":"Asia Pac. Equity Res."},{"key":"ref43","first-page":"1","article-title":"Investment recommendation- Taiwan Semiconductor Manufacturing Company Ltd. (TSMC)","volume-title":"Proc. Investment Bank. Asset Manage. - FINC356","author":"Wang","year":"2021"},{"key":"ref44","first-page":"1","article-title":"OpenROADM for disaggregated optical networks: Challenges, requirements and evaluation","volume-title":"Proc. 24th ITG-Symp. Photon. Netw.","author":"Karunakaran"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-008-0060-3"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-015-1532-3"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/907109"},{"key":"ref48","first-page":"1","article-title":"SDN\/NFV orchestration of multi-technology and multi-domain networks in cloud\/fog architectures for 5G services","volume-title":"Proc. 21st OptoElectron. Commun. Conf. Held Jointly With Int. Conf. Photon. Switching","author":"Vilalta","year":"2016"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701329"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC50174.2021.9569271"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3085"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278855"},{"issue":"7","key":"ref53","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1364\/JOCN.6.000619","article-title":"Survivable inter-domain routing based on topology aggregation with intra-domain disjointness information in multi-domain optical networks","volume":"6","author":"Gao","year":"2014","journal-title":"IEEE J. Opt. Commun. Netw."},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2011.6133779"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.10.000C39"},{"key":"ref56","article-title":"Gurobi optimizer reference manual"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1002\/net.20371"},{"key":"ref59","article-title":"Centrality measures in complex networks: A survey","author":"Saxena","year":"2020"},{"key":"ref60","article-title":"Digital sovereignty for Europe","author":"Madiega","year":"2020","journal-title":"EPRS: Eur. Parliamentary Res. Serv."},{"key":"ref61","article-title":"The Gulf has a 5G conundrum and open RAN is the key to its tech sovereignty","author":"Soliman","year":"2022"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3394332.3402823"},{"key":"ref63","article-title":"Interrogating India\u2019s quest for data sovereignty","author":"Joshi","year":"2020"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/24\/11023008\/10634534.pdf?arnumber=10634534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T17:56:20Z","timestamp":1749059780000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10634534\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":63,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2024.3434560","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]}}}