{"id":"https://openalex.org/W4416736246","doi":"https://doi.org/10.1007/s41109-025-00740-9","title":"Heterogeneity- and homophily-induced vulnerability of a P2P network formation model: the Mana based auto-peering protocol","display_name":"Heterogeneity- and homophily-induced vulnerability of a P2P network formation model: the Mana based auto-peering protocol","publication_year":2025,"publication_date":"2025-11-27","ids":{"openalex":"https://openalex.org/W4416736246","doi":"https://doi.org/10.1007/s41109-025-00740-9"},"language":"en","primary_location":{"id":"doi:10.1007/s41109-025-00740-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s41109-025-00740-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s41109-025-00740-9.pdf","source":{"id":"https://openalex.org/S3035517252","display_name":"Applied Network Science","issn_l":"2364-8228","issn":["2364-8228"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Network Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s41109-025-00740-9.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046032266","display_name":"Yu Gao","orcid":"https://orcid.org/0000-0002-4615-3614"},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Yu Gao","raw_affiliation_strings":["Department of Informatics, University of Z\u00fcrich, Z\u00fcrich, Switzerland"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Z\u00fcrich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I202697423"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035257828","display_name":"Carlo Campajola","orcid":"https://orcid.org/0000-0003-1545-522X"},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]},{"id":"https://openalex.org/I4210111868","display_name":"Zurich University of Teacher Education","ror":"https://ror.org/01awgk221","country_code":"CH","type":"education","lineage":["https://openalex.org/I4210111868"]},{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["CH","GB"],"is_corresponding":false,"raw_author_name":"Carlo Campajola","raw_affiliation_strings":["DLT Science Foundation, London, UK","Institute of Finance and Technology, University College London, London, UK","UZH Blockchain Center, University of Z\u00fcrich, Z\u00fcrich, Switzerland"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"DLT Science Foundation, London, UK","institution_ids":[]},{"raw_affiliation_string":"Institute of Finance and Technology, University College London, London, UK","institution_ids":["https://openalex.org/I45129253"]},{"raw_affiliation_string":"UZH Blockchain Center, University of Z\u00fcrich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I4210111868","https://openalex.org/I202697423"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013584271","display_name":"Nicol\u00f2 Vallarano","orcid":"https://orcid.org/0000-0002-9018-9411"},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]},{"id":"https://openalex.org/I4210111868","display_name":"Zurich University of Teacher Education","ror":"https://ror.org/01awgk221","country_code":"CH","type":"education","lineage":["https://openalex.org/I4210111868"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Nicol\u00f2 Vallarano","raw_affiliation_strings":["Department of Informatics, University of Z\u00fcrich, Z\u00fcrich, Switzerland","UZH Blockchain Center, University of Z\u00fcrich, Z\u00fcrich, Switzerland"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Z\u00fcrich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I202697423"]},{"raw_affiliation_string":"UZH Blockchain Center, University of Z\u00fcrich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I4210111868","https://openalex.org/I202697423"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026558834","display_name":"Andreia Sofia Teixeira","orcid":"https://orcid.org/0000-0002-2758-1891"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]},{"id":"https://openalex.org/I141596103","display_name":"University of Lisbon","ror":"https://ror.org/01c27hj86","country_code":"PT","type":"education","lineage":["https://openalex.org/I141596103"]}],"countries":["PT","US"],"is_corresponding":false,"raw_author_name":"Andreia Sofia Teixeira","raw_affiliation_strings":["BRAN Lab, Network Science Institute, Northeastern University London, London, United Kingdom","LASIGE, Departamento de Inform\u00e1tica, Faculdade de Ciencias, Universidade de Lisboa, Lisbon, Portugal"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"BRAN Lab, Network Science Institute, Northeastern University London, London, United Kingdom","institution_ids":["https://openalex.org/I12912129"]},{"raw_affiliation_string":"LASIGE, Departamento de Inform\u00e1tica, Faculdade de Ciencias, Universidade de Lisboa, Lisbon, Portugal","institution_ids":["https://openalex.org/I141596103"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020270223","display_name":"Claudio J. Tessone","orcid":"https://orcid.org/0000-0001-7733-6221"},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]},{"id":"https://openalex.org/I4210111868","display_name":"Zurich University of Teacher Education","ror":"https://ror.org/01awgk221","country_code":"CH","type":"education","lineage":["https://openalex.org/I4210111868"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Claudio J. Tessone","raw_affiliation_strings":["Department of Informatics, University of Z\u00fcrich, Z\u00fcrich, Switzerland","UZH Blockchain Center, University of Z\u00fcrich, Z\u00fcrich, Switzerland"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Z\u00fcrich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I202697423"]},{"raw_affiliation_string":"UZH Blockchain Center, University of Z\u00fcrich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I4210111868","https://openalex.org/I202697423"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5046032266"],"corresponding_institution_ids":["https://openalex.org/I202697423"],"apc_list":{"value":790,"currency":"GBP","value_usd":969},"apc_paid":{"value":790,"currency":"GBP","value_usd":969},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39473721,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.2513999938964844,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.2513999938964844,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.2295999974012375,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.07490000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.597599983215332},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5357000231742859},{"id":"https://openalex.org/keywords/eclipse","display_name":"Eclipse","score":0.5015000104904175},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.49399998784065247},{"id":"https://openalex.org/keywords/poisson-distribution","display_name":"Poisson distribution","score":0.4684999883174896},{"id":"https://openalex.org/keywords/network-formation","display_name":"Network formation","score":0.43320000171661377},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.41359999775886536},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.3659000098705292}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7269999980926514},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.597599983215332},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5357000231742859},{"id":"https://openalex.org/C2778505590","wikidata":"https://www.wikidata.org/wiki/Q141022","display_name":"Eclipse","level":2,"score":0.5015000104904175},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.49399998784065247},{"id":"https://openalex.org/C100906024","wikidata":"https://www.wikidata.org/wiki/Q205692","display_name":"Poisson distribution","level":2,"score":0.4684999883174896},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4465999901294708},{"id":"https://openalex.org/C68416499","wikidata":"https://www.wikidata.org/wiki/Q7001033","display_name":"Network formation","level":2,"score":0.43320000171661377},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.41359999775886536},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3840999901294708},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.3659000098705292},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35109999775886536},{"id":"https://openalex.org/C123757187","wikidata":"https://www.wikidata.org/wiki/Q9195957","display_name":"Network dynamics","level":2,"score":0.34279999136924744},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.34220001101493835},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3158999979496002},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.31360000371932983},{"id":"https://openalex.org/C104122410","wikidata":"https://www.wikidata.org/wiki/Q1416406","display_name":"Network model","level":2,"score":0.3028999865055084},{"id":"https://openalex.org/C47458327","wikidata":"https://www.wikidata.org/wiki/Q910404","display_name":"Random graph","level":3,"score":0.30059999227523804},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.28619998693466187},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.27630001306533813},{"id":"https://openalex.org/C139940560","wikidata":"https://www.wikidata.org/wiki/Q290036","display_name":"Network simulation","level":2,"score":0.27480000257492065},{"id":"https://openalex.org/C32946077","wikidata":"https://www.wikidata.org/wiki/Q618079","display_name":"Network analysis","level":2,"score":0.273499995470047},{"id":"https://openalex.org/C101142422","wikidata":"https://www.wikidata.org/wiki/Q17101727","display_name":"Interdependent networks","level":3,"score":0.27129998803138733},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.26669999957084656},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2630999982357025},{"id":"https://openalex.org/C137753397","wikidata":"https://www.wikidata.org/wiki/Q2434424","display_name":"Network science","level":3,"score":0.26170000433921814},{"id":"https://openalex.org/C34947359","wikidata":"https://www.wikidata.org/wiki/Q665189","display_name":"Complex network","level":2,"score":0.25049999356269836}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s41109-025-00740-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s41109-025-00740-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s41109-025-00740-9.pdf","source":{"id":"https://openalex.org/S3035517252","display_name":"Applied Network Science","issn_l":"2364-8228","issn":["2364-8228"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Network Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:763e2b494bba459e90219bdc83f33758","is_oa":true,"landing_page_url":"https://doaj.org/article/763e2b494bba459e90219bdc83f33758","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Applied Network Science, Vol 10, Iss 1, Pp 1-19 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s41109-025-00740-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s41109-025-00740-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s41109-025-00740-9.pdf","source":{"id":"https://openalex.org/S3035517252","display_name":"Applied Network Science","issn_l":"2364-8228","issn":["2364-8228"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Network Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416736246.pdf","grobid_xml":"https://content.openalex.org/works/W4416736246.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W567313566","https://openalex.org/W1520914943","https://openalex.org/W1587744656","https://openalex.org/W1971421925","https://openalex.org/W1971937094","https://openalex.org/W1985952539","https://openalex.org/W2002470750","https://openalex.org/W2004824191","https://openalex.org/W2040956707","https://openalex.org/W2063539292","https://openalex.org/W2075915611","https://openalex.org/W2076376395","https://openalex.org/W2083638266","https://openalex.org/W2106253517","https://openalex.org/W2110519146","https://openalex.org/W2112090702","https://openalex.org/W2125315567","https://openalex.org/W2128672542","https://openalex.org/W2145523428","https://openalex.org/W2149084727","https://openalex.org/W2157085604","https://openalex.org/W2160279333","https://openalex.org/W2161335593","https://openalex.org/W2161455936","https://openalex.org/W2295506186","https://openalex.org/W2549976854","https://openalex.org/W2611050176","https://openalex.org/W2807447378","https://openalex.org/W2897842237","https://openalex.org/W2903101775","https://openalex.org/W2954193225","https://openalex.org/W3015486462","https://openalex.org/W3085000493","https://openalex.org/W3206079648","https://openalex.org/W3209850123","https://openalex.org/W3210447464","https://openalex.org/W4200500220","https://openalex.org/W4206911672","https://openalex.org/W4243851127","https://openalex.org/W4293253258","https://openalex.org/W4380632214","https://openalex.org/W4384026610"],"related_works":[],"abstract_inverted_index":{"IOTA":[0,25,35,57,134],"is":[1,33,42],"a":[2,9,74,92,96,106],"distributed":[3],"ledger":[4],"technology":[5],"that":[6,99],"relies":[7],"on":[8],"peer-to-peer":[10],"(P2P)":[11],"network":[12,54,76,82,136],"for":[13],"communications.":[14],"Recently":[15],"an":[16,34,100,128,139],"auto-peering":[17,58,71,135],"algorithm":[18,59,72],"was":[19],"proposed":[20],"to":[21,28,43,65,84,104],"build":[22],"connections":[23],"among":[24],"peers":[26],"according":[27],"their":[29],"\u201cMana\"":[30],"endowment,":[31],"which":[32],"internal":[36],"reputation":[37],"system.":[38],"This":[39],"paper\u2019s":[40],"goal":[41],"detect":[44],"potential":[45,97,117],"vulnerabilities":[46],"and":[47,79,116,150],"evaluate":[48],"the":[49,52,89,110,121,124,131],"resilience":[50],"of":[51,88,109,114,130,133,142],"P2P":[53],"generated":[55],"using":[56],"against":[60],"eclipse":[61,105],"attacks.":[62],"In":[63],"order":[64],"do":[66],"so,":[67],"we":[68,94,126],"interpret":[69],"IOTA\u2019s":[70],"as":[73,138],"random":[75,144],"formation":[77],"model":[78],"employ":[80],"different":[81],"metrics":[83],"identify":[85],"cost-efficient":[86],"partitions":[87],"network.":[90],"As":[91],"result,":[93],"present":[95],"strategy":[98],"attacker":[101],"can":[102],"use":[103],"significant":[107],"part":[108],"network,":[111],"providing":[112],"estimates":[113],"costs":[115],"damage":[118],"caused":[119],"by":[120],"attack.":[122],"On":[123],"side,":[125],"provide":[127],"analysis":[129],"properties":[132],"ensemble,":[137],"interesting":[140],"class":[141],"homophile":[143],"networks":[145],"in":[146],"between":[147],"1D":[148],"lattices":[149],"regular":[151],"Poisson":[152],"graphs.":[153]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-11-28T00:00:00"}
