{"id":"https://openalex.org/W3048823116","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162879","title":"InBlock4: Blockchain-based Route Origin Validation","display_name":"InBlock4: Blockchain-based Route Origin Validation","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3048823116","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162879","mag":"3048823116"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps50562.2020.9162879","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162879","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050198391","display_name":"Stefano Angieri","orcid":"https://orcid.org/0000-0001-8005-0638"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Stefano Angieri","raw_affiliation_strings":["UC3M"],"affiliations":[{"raw_affiliation_string":"UC3M","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055022091","display_name":"Marcelo Bagnulo","orcid":"https://orcid.org/0000-0003-0815-4613"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Marcelo Bagnulo","raw_affiliation_strings":["UC3M"],"affiliations":[{"raw_affiliation_string":"UC3M","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040189882","display_name":"Alberto Garc\u00eda-Mart\u00ednez","orcid":"https://orcid.org/0000-0002-6877-3486"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alberto Garcia-Martinez","raw_affiliation_strings":["UC3M"],"affiliations":[{"raw_affiliation_string":"UC3M","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035456549","display_name":"Bingyang Liu","orcid":"https://orcid.org/0000-0002-4572-4956"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bingyang Liu","raw_affiliation_strings":["Huawei"],"affiliations":[{"raw_affiliation_string":"Huawei","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101650900","display_name":"Xinpeng Wei","orcid":"https://orcid.org/0000-0002-0140-7844"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"XinPeng Wei","raw_affiliation_strings":["Huawei"],"affiliations":[{"raw_affiliation_string":"Huawei","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5050198391"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3084,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.60767397,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"291","last_page":"296"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9325376749038696},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7772379517555237},{"id":"https://openalex.org/keywords/hierarchy","display_name":"Hierarchy","score":0.5079832673072815},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3557657301425934},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29215848445892334}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9325376749038696},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7772379517555237},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.5079832673072815},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3557657301425934},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29215848445892334},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps50562.2020.9162879","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162879","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2010896385","https://openalex.org/W2152794473","https://openalex.org/W2186693638","https://openalex.org/W2287088142","https://openalex.org/W2525730961","https://openalex.org/W2546603560","https://openalex.org/W2593560650","https://openalex.org/W2774802253","https://openalex.org/W2885270365","https://openalex.org/W2969122767","https://openalex.org/W6686748917"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047"],"abstract_inverted_index":{"In":[0,69],"this":[1],"paper,":[2,71],"we":[3,72,83],"present":[4,74],"InBlock4,":[5],"a":[6,30,75],"blockchain-based":[7],"alternative":[8,23],"to":[9,26],"RPKI":[10,59],"for":[11,18,80],"the":[12,41,55,58,70],"provision":[13],"of":[14,78],"Route":[15],"Origin":[16],"validation":[17],"BGP.":[19],"InBlock4":[20,44,50,79],"embeds":[21],"an":[22],"trust":[24],"model":[25],"protect":[27],"entities":[28,39],"obtaining":[29],"resource":[31],"allocations":[32],"from":[33,37],"errors":[34],"and":[35,60,82],"abuses":[36],"other":[38],"in":[40,57],"allocation":[42],"hierarchy.":[43],"is":[45],"compatible":[46],"with":[47,64],"BGPsec.":[48],"Moreover,":[49],"can":[51,62],"be":[52],"bootstrapped":[53],"using":[54],"information":[56],"it":[61],"coexists":[63],"RPKI-based":[65],"route":[66],"origin":[67],"validation.":[68],"also":[73],"working":[76],"implementation":[77],"Ethereum":[81],"quantify":[84],"its":[85],"performance.":[86]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
