{"id":"https://openalex.org/W4415914589","doi":"https://doi.org/10.58346/jisis.2025.i3.033","title":"Comparative Study of Next-Generation Internet Protocols: RINA vs. IP","display_name":"Comparative Study of Next-Generation Internet Protocols: RINA vs. IP","publication_year":2025,"publication_date":"2025-08-30","ids":{"openalex":"https://openalex.org/W4415914589","doi":"https://doi.org/10.58346/jisis.2025.i3.033"},"language":null,"primary_location":{"id":"doi:10.58346/jisis.2025.i3.033","is_oa":true,"landing_page_url":"https://doi.org/10.58346/jisis.2025.i3.033","pdf_url":"https://doi.org/10.58346/jisis.2025.i3.033","source":{"id":"https://openalex.org/S2739103833","display_name":"Journal of Internet Services and Information Security","issn_l":"2182-2069","issn":["2182-2069","2182-2077"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310319527","host_organization_name":"Innovative Information Science & Technology Research Group (ISYOU)","host_organization_lineage":["https://openalex.org/P4310319527"],"host_organization_lineage_names":["Innovative Information Science & Technology Research Group (ISYOU)"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Internet Services and Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.58346/jisis.2025.i3.033","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112578425","display_name":"Satya Ranjan Das","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Dr. Satya Ranjan Das","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110494902","display_name":"Syed Arfath Ahmed","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dr. Syed Siraj Ahmed","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113086218","display_name":"E. R. Aruna","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"E.R. Aruna","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120265428","display_name":"Dr.V.N. Trupti","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dr.V.N. Trupti","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089203197","display_name":"Rahul Bhatt","orcid":"https://orcid.org/0009-0004-0486-9413"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rahul Bhatt","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5062833219","display_name":"Dikshit Sharma","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dikshit Sharma","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5112578425"],"corresponding_institution_ids":[],"apc_list":{"value":550,"currency":"USD","value_usd":550},"apc_paid":{"value":550,"currency":"USD","value_usd":550},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.34349237,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"3","first_page":"480","last_page":"494"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.7802000045776367,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.7802000045776367,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.08630000054836273,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.018699999898672104,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.7534999847412109},{"id":"https://openalex.org/keywords/reserved-ip-addresses","display_name":"Reserved IP addresses","score":0.6686999797821045},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.5630999803543091},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5029000043869019},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.4943000078201294},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4927999973297119},{"id":"https://openalex.org/keywords/internet-protocol-suite","display_name":"Internet protocol suite","score":0.44510000944137573},{"id":"https://openalex.org/keywords/ip-forwarding","display_name":"IP forwarding","score":0.4230000078678131},{"id":"https://openalex.org/keywords/internet-layer","display_name":"Internet layer","score":0.41839998960494995}],"concepts":[{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.7534999847412109},{"id":"https://openalex.org/C137641188","wikidata":"https://www.wikidata.org/wiki/Q17148053","display_name":"Reserved IP addresses","level":5,"score":0.6686999797821045},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6525999903678894},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5691999793052673},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.5630999803543091},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5029000043869019},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.4943000078201294},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4927999973297119},{"id":"https://openalex.org/C65567647","wikidata":"https://www.wikidata.org/wiki/Q81414","display_name":"Internet protocol suite","level":3,"score":0.44510000944137573},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4293999969959259},{"id":"https://openalex.org/C174809319","wikidata":"https://www.wikidata.org/wiki/Q5973191","display_name":"IP forwarding","level":5,"score":0.4230000078678131},{"id":"https://openalex.org/C146739243","wikidata":"https://www.wikidata.org/wiki/Q2910948","display_name":"Internet layer","level":4,"score":0.41839998960494995},{"id":"https://openalex.org/C201980515","wikidata":"https://www.wikidata.org/wiki/Q13219707","display_name":"IP address management","level":4,"score":0.40610000491142273},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.38659998774528503},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.37299999594688416},{"id":"https://openalex.org/C110994511","wikidata":"https://www.wikidata.org/wiki/Q661020","display_name":"Next-generation network","level":3,"score":0.3650999963283539},{"id":"https://openalex.org/C63882131","wikidata":"https://www.wikidata.org/wiki/Q17122954","display_name":"Strengths and weaknesses","level":2,"score":0.36230000853538513},{"id":"https://openalex.org/C2779478453","wikidata":"https://www.wikidata.org/wiki/Q6889748","display_name":"Modularity (biology)","level":2,"score":0.3402000069618225},{"id":"https://openalex.org/C2986707884","wikidata":"https://www.wikidata.org/wiki/Q11371","display_name":"Internet service provider","level":3,"score":0.3382999897003174},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.33250001072883606},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.33250001072883606},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.29840001463890076},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.29750001430511475},{"id":"https://openalex.org/C130881749","wikidata":"https://www.wikidata.org/wiki/Q586894","display_name":"Security association","level":5,"score":0.2831999957561493},{"id":"https://openalex.org/C113707754","wikidata":"https://www.wikidata.org/wiki/Q581558","display_name":"NAT traversal","level":5,"score":0.28290000557899475},{"id":"https://openalex.org/C35026560","wikidata":"https://www.wikidata.org/wiki/Q8767","display_name":"Domain Name System","level":3,"score":0.2563000023365021},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.25519999861717224}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.58346/jisis.2025.i3.033","is_oa":true,"landing_page_url":"https://doi.org/10.58346/jisis.2025.i3.033","pdf_url":"https://doi.org/10.58346/jisis.2025.i3.033","source":{"id":"https://openalex.org/S2739103833","display_name":"Journal of Internet Services and Information Security","issn_l":"2182-2069","issn":["2182-2069","2182-2077"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310319527","host_organization_name":"Innovative Information Science & Technology Research Group (ISYOU)","host_organization_lineage":["https://openalex.org/P4310319527"],"host_organization_lineage_names":["Innovative Information Science & Technology Research Group (ISYOU)"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Internet Services and Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.58346/jisis.2025.i3.033","is_oa":true,"landing_page_url":"https://doi.org/10.58346/jisis.2025.i3.033","pdf_url":"https://doi.org/10.58346/jisis.2025.i3.033","source":{"id":"https://openalex.org/S2739103833","display_name":"Journal of Internet Services and Information Security","issn_l":"2182-2069","issn":["2182-2069","2182-2077"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310319527","host_organization_name":"Innovative Information Science & Technology Research Group (ISYOU)","host_organization_lineage":["https://openalex.org/P4310319527"],"host_organization_lineage_names":["Innovative Information Science & Technology Research Group (ISYOU)"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Internet Services and Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415914589.pdf","grobid_xml":"https://content.openalex.org/works/W4415914589.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0],"study":[1,56,97],"contrasts":[2],"the":[3,11,16,64,68,72,96,150],"recursive":[4,65],"architecture":[5,45,66],"of":[6,22,35,54,67,85,93,127,168],"an":[7,44,60],"internetwork":[8,69],"(RINA)":[9,70],"with":[10],"traditional":[12,73],"Internet":[13,74],"protocol,":[14],"highlighting":[15],"modular,":[17],"scalable,":[18],"and":[19,33,71,83,90,103,110,124,144,160],"secure":[20],"nature":[21],"RINA,":[23],"as":[24,40,105,140],"opposed":[25],"to":[26,29,58,99,114],"IP's":[27],"incapacity":[28],"handle":[30,115],"mobility,":[31],"congestion,":[32],"quality":[34,84],"service.":[36],"Rina":[37,128,156],"is":[38,57,153],"considered":[39],"a":[41,106,119],"candidate":[42],"for":[43],"that":[46,155],"can":[47],"guide":[48],"future":[49],"internet":[50,108],"designs.":[51],"The":[52],"objective":[53],"this":[55],"offer":[59],"in-depth":[61],"comparison":[62],"between":[63],"Protocol":[75],"(IP),":[76],"covering":[77],"architectural":[78],"designs,":[79],"implementation,":[80],"scalability,":[81,141],"security,":[82,161],"service":[86],"(QoS).":[87],"Through":[88],"theoretical":[89],"simulation-based":[91],"evaluations":[92],"both":[94],"protocols,":[95],"aims":[98],"investigate":[100],"Rina's":[101],"strengths":[102],"weaknesses":[104],"next-generation":[107],"protocol":[109],"its":[111],"software":[112],"potential":[113],"IP":[116,130,170],"difficulties":[117],"in":[118,131],"modern":[120],"network":[121,133],"environment.":[122],"Simulation-,":[123],"theory-based":[125],"evaluation":[126],"versus":[129],"diverse":[132],"scenarios":[134],"ensues.":[135],"Main":[136],"performance":[137],"metrics":[138],"such":[139],"QoS,":[142],"mobility":[143],"security":[145],"management":[146],"are":[147],"evaluated.":[148],"From":[149],"evaluation,":[151],"it":[152],"learned":[154],"excels":[157],"at":[158],"modularity":[159],"yet":[162],"suffers":[163],"from":[164],"being":[165],"interoperable,":[166],"because":[167],"existing":[169],"infrastructure":[171],"implementation.":[172]},"counts_by_year":[],"updated_date":"2026-03-09T07:00:12.390032","created_date":"2025-11-05T00:00:00"}
