{"id":"https://openalex.org/W4413382885","doi":"https://doi.org/10.1002/itl2.70119","title":"Resilience of the Invisible Internet Project: A Computational Analysis","display_name":"Resilience of the Invisible Internet Project: A Computational Analysis","publication_year":2025,"publication_date":"2025-08-14","ids":{"openalex":"https://openalex.org/W4413382885","doi":"https://doi.org/10.1002/itl2.70119"},"language":"en","primary_location":{"id":"doi:10.1002/itl2.70119","is_oa":true,"landing_page_url":"https://doi.org/10.1002/itl2.70119","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/itl2.70119","source":{"id":"https://openalex.org/S4210238311","display_name":"Internet Technology Letters","issn_l":"2476-1508","issn":["2476-1508"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Technology Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/itl2.70119","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5098977286","display_name":"Siddique Abubakr Muntaka","orcid":"https://orcid.org/0000-0001-5466-947X"},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Siddique Abubakr Muntaka","raw_affiliation_strings":["School of Information Technology University of Cincinnati  Cincinnati Ohio USA","School of Information Technology, University of Cincinnati, Cincinnati, Ohio, USA"],"affiliations":[{"raw_affiliation_string":"School of Information Technology University of Cincinnati  Cincinnati Ohio USA","institution_ids":["https://openalex.org/I63135867"]},{"raw_affiliation_string":"School of Information Technology, University of Cincinnati, Cincinnati, Ohio, USA","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003086292","display_name":"Jacques Bou Abdo","orcid":"https://orcid.org/0000-0002-3482-9154"},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jacques Bou Abdo","raw_affiliation_strings":["School of Information Technology University of Cincinnati  Cincinnati Ohio USA","School of Information Technology, University of Cincinnati, Cincinnati, Ohio, USA"],"affiliations":[{"raw_affiliation_string":"School of Information Technology University of Cincinnati  Cincinnati Ohio USA","institution_ids":["https://openalex.org/I63135867"]},{"raw_affiliation_string":"School of Information Technology, University of Cincinnati, Cincinnati, Ohio, USA","institution_ids":["https://openalex.org/I63135867"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5098977286"],"corresponding_institution_ids":["https://openalex.org/I63135867"],"apc_list":{"value":2630,"currency":"USD","value_usd":2630},"apc_paid":null,"fwci":4.9698,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.95273987,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"8","issue":"5","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.7715383768081665},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.573390543460846},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4478415846824646},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19505566358566284},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.05500718951225281}],"concepts":[{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.7715383768081665},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.573390543460846},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4478415846824646},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19505566358566284},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.05500718951225281},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/itl2.70119","is_oa":true,"landing_page_url":"https://doi.org/10.1002/itl2.70119","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/itl2.70119","source":{"id":"https://openalex.org/S4210238311","display_name":"Internet Technology Letters","issn_l":"2476-1508","issn":["2476-1508"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Technology Letters","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1002/itl2.70119","is_oa":true,"landing_page_url":"https://doi.org/10.1002/itl2.70119","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/itl2.70119","source":{"id":"https://openalex.org/S4210238311","display_name":"Internet Technology Letters","issn_l":"2476-1508","issn":["2476-1508"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Technology Letters","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4413382885.pdf","grobid_xml":"https://content.openalex.org/works/W4413382885.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1995885288","https://openalex.org/W2018501646","https://openalex.org/W2018934112","https://openalex.org/W2065769502","https://openalex.org/W2162668316","https://openalex.org/W2277170616","https://openalex.org/W2752134297","https://openalex.org/W2784007581","https://openalex.org/W2891940245","https://openalex.org/W2900929689","https://openalex.org/W3025815155","https://openalex.org/W3088419579","https://openalex.org/W3103967557","https://openalex.org/W3161251889","https://openalex.org/W4225149342","https://openalex.org/W4313402218","https://openalex.org/W4366818302","https://openalex.org/W4385775056","https://openalex.org/W4389961175","https://openalex.org/W4390591018","https://openalex.org/W4399898105","https://openalex.org/W4404213243","https://openalex.org/W4408937708","https://openalex.org/W4410112848"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"ABSTRACT":[0],"The":[1,137],"invisible":[2],"internet":[3],"project":[4],"(I2P)":[5],"is":[6],"a":[7,66,105,185],"decentralized":[8],"peer\u2010to\u2010peer":[9],"anonymity":[10,240],"network":[11,56,123,139],"that":[12,242],"protects":[13],"users'":[14],"privacy":[15,244],"by":[16],"routing":[17,208],"traffic":[18],"through":[19],"encrypted":[20],"tunnels":[21],"across":[22],"volunteer\u2010run":[23],"routers":[24],"(nodes).":[25],"Its":[26],"distributed":[27,188],"nature":[28],"raises":[29],"critical":[30,166],"questions":[31],"about":[32],"structural":[33,179],"resilience;":[34],"specifically,":[35],"how":[36,221],"well":[37],"it":[38],"can":[39],"withstand":[40],"random":[41,60,97,195],"(stochastic)":[42],"failures":[43,196],"and":[44,65,190,197,206,247],"targeted":[45,126,198,222],"(adversarial)":[46],"attacks.":[47,199,249],"This":[48,232],"study":[49],"models":[50,100],"I2P's":[51,70],"overlay":[52],"using":[53],"three":[54],"representative":[55],"graphs":[57],"or":[58,131],"topologies:":[59],"graph":[61],"(RG),":[62],"scale\u2010free":[63],"(SF),":[64],"theoretical":[67],"modeling":[68],"of":[69,92,141,165,181],"network,":[71],"herein":[72],"referred":[73],"to":[74,87,151,168],"as":[75],"I2P":[76,94,142],"Prime":[77],"(I2P\u2032),":[78],"all":[79,99],"experimented":[80],"with":[81,115,228],"50":[82],"000":[83],"nodes":[84,167],"(peers)":[85],"each":[86],"reflect":[88],"the":[89,93,118,178],"real\u2010world":[90],"conditions":[91],"network.":[95],"Under":[96],"failures,":[98],"exhibit":[101],"high":[102,191],"tolerance,":[103,161],"maintaining":[104],"large":[106],"connected":[107],"component":[108],"(LCC)":[109],"even":[110],"after":[111],"50%":[112,164],"node":[113,148],"removal,":[114],"I2P\u2032":[116,157],"demonstrating":[117],"most":[119],"graceful":[120],"degradation":[121],"in":[122],"efficiency.":[124],"However,":[125],"attacks":[127],"based":[128],"on":[129],"degree":[130],"betweenness":[132],"centrality":[133],"reveal":[134],"substantial":[135],"vulnerabilities.":[136],"SF":[138],"model":[140],"collapsed":[143],"rapidly,":[144],"often":[145],"below":[146],"30%":[147],"removal":[149],"due":[150],"its":[152],"hub\u2010centric":[153],"design.":[154],"In":[155],"contrast,":[156],"exhibits":[158],"stronger":[159],"fault":[160],"requiring":[162],"nearly":[163],"be":[169],"removed":[170],"before":[171],"global":[172],"connectivity":[173,189],"fails.":[174],"These":[175],"findings":[176],"highlight":[177,220],"advantages":[180],"I2P\u2032,":[182],"which":[183],"strikes":[184],"balance":[186],"between":[187],"resilience":[192],"against":[193],"both":[194],"For":[200,216],"developers,":[201],"enhanced":[202],"adaptive":[203],"peer":[204],"selection":[205],"dynamic":[207],"mechanisms":[209],"could":[210],"enhance":[211],"robustness":[212],"without":[213],"undermining":[214],"anonymity.":[215],"policymakers,":[217],"our":[218],"results":[219],"interventions":[223],"might":[224],"fragment":[225],"illicit":[226],"activity":[227],"minimal":[229],"collateral":[230],"impact.":[231],"work":[233],"provides":[234],"actionable":[235],"insights":[236],"into":[237],"designing":[238],"resilient":[239],"networks":[241],"preserve":[243],"under":[245],"stochastic":[246],"adversarial":[248]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
