{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T02:43:33Z","timestamp":1747190613170,"version":"3.40.5"},"reference-count":30,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T00:00:00Z","timestamp":1613692800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,2,19]]},"abstract":"<jats:p>Network topology is one of the major factors in defining the behavior of a network. In the present scenario, the demand for network security has increased due to an increase in the possibility of attacks by malicious users. In this paper, a blockchain-based system is suggested for securely discovering and storing networks. Techniques such as cloud-based storage systems are not efficient and are lacking in trust, privacy, security, and data control. The blockchain-based technique suggested in this paper is capable of resolving these challenges. Experiments were performed using Mininet, Cisco Packet Tracer, and Ethereum blockchain with the network inference algorithm. This algorithm is capable of inferring the network topology even when only partial information regarding the network is available. The results obtained clearly show that the network is resistant to malicious users and various external attacks, making the network robust.<\/jats:p>","DOI":"10.1155\/2021\/6694281","type":"journal-article","created":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T20:23:27Z","timestamp":1613852607000},"page":"1-7","source":"Crossref","is-referenced-by-count":6,"title":["Blockchain-Based Automated System for Identification and Storage of Networks"],"prefix":"10.1155","volume":"2021","author":[{"given":"Deepak","family":"Prashar","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Lovely Professional University, Phagwara, India"}]},{"given":"Nishant","family":"Jha","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Lovely Professional University, Phagwara, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9929-3744","authenticated-orcid":true,"given":"Muhammad","family":"Shafiq","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, GuangZhou University, Guangzhou, China"}]},{"given":"Nazir","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Department of Information System Community College, King Khalid University, Muhayel, Saudi Arabia"}]},{"given":"Mamoon","family":"Rashid","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Lovely Professional University, Phagwara, India"}]},{"given":"Shoeib","family":"Amin Banday","sequence":"additional","affiliation":[{"name":"Department of Electronics & Communication Engineering, Islamic University of Science & Technology, Awantipora, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8373-2781","authenticated-orcid":true,"given":"Habib Ullah","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Accounting and Information Systems, College of Business and Economics, Doha, Qatar University, Qatar"}]}],"member":"311","reference":[{"article-title":"Network device discovery","year":"2013","author":"D. Knertser","key":"1"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.14201\/ADCAIJ201652101108","article-title":"Discovering the network topology: an efficient approach for SDN","author":"L. Ochoa-Aday","year":"2016"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2263-3"},{"volume-title":"Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2017\u20132022","year":"2019","author":"Cisco","key":"4"},{"first-page":"149","article-title":"Improved algorithms for network topology discovery","author":"B. Donnet","key":"5"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.12.038"},{"key":"7","article-title":"Topology control in fog computing enabled IoT networks for smart cities","volume":"176","author":"K. S. Desikan","year":"2020","journal-title":"Computer Networks"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03018-x"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3002255"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MWENT47943.2020.9067418"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.12.014"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899653"},{"issue":"1","key":"13","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1109\/COMST.2016.2597193","article-title":"Topology discovery in software-defined networks: threats, taxonomy, and state-of-the-art","volume":"19","author":"S. Khan","year":"2016","journal-title":"IEEE Communications Surveys & Tutorials"},{"article-title":"sOFTDP: secure and efficient topology discovery protocol for SDN","year":"2017","author":"A. Azzouni","key":"14"},{"first-page":"1","article-title":"BTCmap: mapping bitcoin peer-to-peer network topology","author":"V. Deshpande","key":"15"},{"first-page":"550","article-title":"TxProbe: discovering bitcoin\u2019s network topology using orphan transactions","author":"S. Delgado-Segura","key":"16"},{"first-page":"1333","article-title":"Intelligent resource discovery in inter-cloud using blockchain","author":"M. Sharma","key":"17"},{"first-page":"605","article-title":"Automatic discovery mechanism of blockchain nodes based on the kademlia algorithm","author":"L. Zheng","key":"18"},{"first-page":"141","article-title":"Visualising bitcoin\u2019s dynamic P2P network topology and performance","author":"M. Essaid","key":"19"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1016\/j.comcom.2020.01.023","article-title":"Blockchain envisioned UAV networks: challenges, solutions, and comparisons","volume":"151","author":"P. Mehta","year":"2020","journal-title":"Computer Communications"},{"key":"22","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/978-981-15-3376-1_3","article-title":"Industrial applications of blockchain to IoT data","volume-title":"Blockchain and Crypt Currency","author":"S. Pu","year":"2020"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8864301"},{"key":"24","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/978-981-15-8711-5_13","article-title":"Use of blockchain and internet of things for securing data in healthcare systems","volume-title":"Multimedia Security","author":"A. Banotra","year":"2021"},{"key":"25","article-title":"A survey on recent optimal techniques for securing unmanned aerial vehicles applications","author":"F. Syed","year":"2020","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102656"},{"article-title":"Sia: simple decentralized storage","year":"2014","author":"D. Vorick","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/icitst.2015.7412073"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/CONECCT50063.2020.9198337"},{"issue":"3","key":"30","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1109\/TNSM.2015.2451032","article-title":"Network topology inference with partial information","volume":"12","author":"B. Holbert","year":"2015","journal-title":"IEEE Transactions on Network and Service Management"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6694281.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6694281.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6694281.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T20:23:35Z","timestamp":1613852615000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/6694281\/"}},"subtitle":[],"editor":[{"given":"Omar","family":"Cheikhrouhou","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,2,19]]},"references-count":30,"alternative-id":["6694281","6694281"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6694281","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,2,19]]}}}