{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T17:55:34Z","timestamp":1774374934017,"version":"3.50.1"},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Pervasive and Mobile Computing"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1016\/j.pmcj.2021.101412","type":"journal-article","created":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T23:18:15Z","timestamp":1620688695000},"page":"101412","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":10,"special_numbering":"C","title":["TOTP Moving Target Defense for sensitive network services"],"prefix":"10.1016","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4566-0198","authenticated-orcid":false,"given":"Vitor A.","family":"Cunha","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7484-1027","authenticated-orcid":false,"given":"Daniel","family":"Corujo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5029-6191","authenticated-orcid":false,"given":"Joao P.","family":"Barraca","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0107-6253","authenticated-orcid":false,"given":"Rui L.","family":"Aguiar","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.pmcj.2021.101412_b1","doi-asserted-by":"crossref","first-page":"58018","DOI":"10.1109\/ACCESS.2020.2980902","article-title":"An edge-based framework for enhanced road safety of connected cars","volume":"8","author":"Malinverno","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.pmcj.2021.101412_b2","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107150","article-title":"Collision avoidance in 5G using MEC and NFV: The vulnerable road user safety use case","volume":"172","author":"Barmpounakis","year":"2020","journal-title":"Comput. Netw."},{"key":"10.1016\/j.pmcj.2021.101412_b3","series-title":"2019 IEEE Conference on Standards for Communications and Networking (CSCN)","first-page":"1","article-title":"The use of 5G non-public networks to support industry 4.0 scenarios","author":"Ordonez-Lucena","year":"2019"},{"key":"10.1016\/j.pmcj.2021.101412_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107274","article-title":"On the integration of NFV and MEC technologies: architecture analysis and benefits for edge robotics","volume":"175","author":"Antevski","year":"2020","journal-title":"Comput. Netw."},{"issue":"4","key":"10.1016\/j.pmcj.2021.101412_b5","doi-asserted-by":"crossref","first-page":"1334","DOI":"10.1109\/TNSM.2018.2874524","article-title":"Cost and availability aware resource allocation and virtual function placement for CDNaaS provision","volume":"15","author":"Yala","year":"2018","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.pmcj.2021.101412_b6","series-title":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications","first-page":"2499","article-title":"Intelligent video caching at network edge: A multi-agent deep reinforcement learning approach","author":"Wang","year":"2020"},{"key":"10.1016\/j.pmcj.2021.101412_b7","series-title":"Smart Grid: Integrating Renewable, Distributed and Efficient Energy","author":"Sioshansi","year":"2011"},{"key":"10.1016\/j.pmcj.2021.101412_b8","series-title":"Threat Landscape for 5G Networks: Updated Threat Assessment for the Fifth Generation of Mobile Networks (5G)","year":"2020"},{"issue":"5","key":"10.1016\/j.pmcj.2021.101412_b9","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MCOM.2017.1600935","article-title":"Network slicing for 5G with SDN\/NFV: concepts, architectures, and challenges","volume":"55","author":"Ordonez-Lucena","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.pmcj.2021.101412_b10","doi-asserted-by":"crossref","first-page":"99999","DOI":"10.1109\/ACCESS.2020.2997702","article-title":"5G network slicing: A security overview","volume":"8","author":"Olimid","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.pmcj.2021.101412_b11","series-title":"2010 39th International Conference on Parallel Processing Workshops","first-page":"275","article-title":"The characteristics of cloud computing","author":"Gong","year":"2010"},{"key":"10.1016\/j.pmcj.2021.101412_b12","unstructured":"E.M. Hutchins, M.J. Cloppert, R.M. Amin, Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains, in: Proceedings of the 6th International Conference on Information Warfare and Security, 2011, pp. 113\u2013125."},{"key":"10.1016\/j.pmcj.2021.101412_b13","series-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)","first-page":"319","article-title":"\u201cYou\u2019ve got your nice list of bugs, now what?\u201d vulnerability discovery and management processes in the wild","author":"Alomar","year":"2020"},{"key":"10.1016\/j.pmcj.2021.101412_b14","series-title":"Cybersecurity game-change research & development recommendations","year":"2010"},{"key":"10.1016\/j.pmcj.2021.101412_b15","series-title":"2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC)","first-page":"821","article-title":"Overview on moving target network defense","author":"Zhou","year":"2018"},{"key":"10.1016\/j.pmcj.2021.101412_b16","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1016\/j.future.2018.11.045","article-title":"A moving target defense and network forensics framework for ISP networks using SDN and NFV","volume":"94","author":"Aydeger","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"issue":"5","key":"10.1016\/j.pmcj.2021.101412_b17","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1631\/FITEE.1601548","article-title":"A keyed-hashing based self-synchronization mechanism for port address hopping communication","volume":"18","author":"Luo","year":"2017","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"10.1016\/j.pmcj.2021.101412_b18","series-title":"Proceedings of the Eighth European Workshop on System Security - EuroSec \u201915","first-page":"1","article-title":"Two-factor authentication: is the world ready?","author":"Petsas","year":"2015"},{"key":"10.1016\/j.pmcj.2021.101412_b19","series-title":"HOTP: An HMAC-Based One-Time Password Algorithm","author":"M\u2019Raihi","year":"2005"},{"key":"10.1016\/j.pmcj.2021.101412_b20","series-title":"TOTP: Time-Based One-Time Password Algorithm","author":"M\u2019Raihi","year":"2011"},{"key":"10.1016\/j.pmcj.2021.101412_b21","doi-asserted-by":"crossref","DOI":"10.1002\/itl2.190","article-title":"Moving target defense to set network slicing security as a KPI","author":"Cunha","year":"2020","journal-title":"Internet Technol. Lett."},{"key":"10.1016\/j.pmcj.2021.101412_b22","series-title":"Network Functions Virtualisation (NFV); Architectural Framework, Vol. 1","year":"2014"},{"key":"10.1016\/j.pmcj.2021.101412_b23","series-title":"Network Functions Virtualisation (NFV); Management and Orchestration","year":"2014"},{"key":"10.1016\/j.pmcj.2021.101412_b24","series-title":"Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX\u201901, Vol. 1","first-page":"176","article-title":"Dynamic approaches to thwart adversary intelligence gathering","author":"Kewley","year":"2001"},{"key":"10.1016\/j.pmcj.2021.101412_b25","series-title":"International Workshop on Fast Software Encryption","first-page":"86","article-title":"The RC5 encryption algorithm","author":"Rivest","year":"1994"},{"key":"10.1016\/j.pmcj.2021.101412_b26","series-title":"Proceedings of the First Workshop on Hot Topics in Software Defined Networks - HotSDN \u201912","first-page":"127","article-title":"Openflow random host mutation","author":"Jafarian","year":"2012"},{"key":"10.1016\/j.pmcj.2021.101412_b27","series-title":"Proceedings of the IFIP International Conference on Communications and Multimedia Security - CMS 2006","first-page":"12","article-title":"TAO: Protecting against hitlist worms using transparent address obfuscation","author":"Antonatos","year":"2006"},{"key":"10.1016\/j.pmcj.2021.101412_b28","series-title":"2015 International Conference on Information and Communications Technologies (ICT 2015)","article-title":"TPAH: a universal and multi-platform deployable port and address hopping mechanism","author":"Luo","year":"2015"},{"issue":"3","key":"10.1016\/j.pmcj.2021.101412_b29","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1587\/transinf.2016EDP7304","article-title":"RPAH: A moving target network defense mechanism naturally resists reconnaissances and attacks","volume":"E100.D","author":"Luo","year":"2017","journal-title":"IEICE Trans. Inf. Syst."},{"key":"10.1016\/j.pmcj.2021.101412_b30","series-title":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","article-title":"DESIR: Decoy-enhanced seamless IP randomization","author":"Sun","year":"2016"},{"key":"10.1016\/j.pmcj.2021.101412_b31","series-title":"Moving Target Defense","first-page":"153","article-title":"Toward network configuration randomization for moving target defense","author":"Al-Shaer","year":"2011"},{"key":"10.1016\/j.pmcj.2021.101412_b32","series-title":"Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014","article-title":"SDN-based solutions for moving target defense network protection","author":"Kampanakis","year":"2014"},{"key":"10.1016\/j.pmcj.2021.101412_b33","doi-asserted-by":"crossref","DOI":"10.1155\/2017\/3659167","article-title":"CHAOS: An SDN-based moving target defense system","volume":"2017","author":"Shi","year":"2017","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.pmcj.2021.101412_b34","article-title":"SDN-based double hopping communication against sniffer attack","author":"Zhao","year":"2016","journal-title":"Math. Probl. Eng."},{"key":"10.1016\/j.pmcj.2021.101412_b35","series-title":"2013 IEEE Symposium on Security and Privacy","first-page":"48","article-title":"SoK: Eternal war in memory","author":"Szekeres","year":"2013"},{"key":"10.1016\/j.pmcj.2021.101412_b36","unstructured":"CVE-2017-0144, Available from MITRE, CVE-ID CVE-2017-0144. 2017. URL http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2017-0144."},{"key":"10.1016\/j.pmcj.2021.101412_b37","series-title":"Applied Cryptography and Network Security","first-page":"119","article-title":"BLAKE2: Simpler, smaller, fast as MD5","author":"Aumasson","year":"2013"},{"issue":"3","key":"10.1016\/j.pmcj.2021.101412_b38","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1109\/TNS.2004.829368","article-title":"GPS time synchronization in school-network cosmic ray detectors","volume":"51","author":"Berns","year":"2004","journal-title":"IEEE Trans. Nucl. Sci."},{"key":"10.1016\/j.pmcj.2021.101412_b39","series-title":"Request for Comments","article-title":"Network Time Protocol Version 4: Protocol and Algorithms Specification","author":"Martin","year":"2010"},{"key":"10.1016\/j.pmcj.2021.101412_b40","series-title":"IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems","year":"2020"},{"key":"10.1016\/j.pmcj.2021.101412_b41","series-title":"On Lempel-Ziv Complexity of Sequences","first-page":"180","author":"Do\u011fanaksoy","year":"2006"}],"container-title":["Pervasive and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574119221000663?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574119221000663?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T02:44:26Z","timestamp":1761619466000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1574119221000663"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":41,"alternative-id":["S1574119221000663"],"URL":"https:\/\/doi.org\/10.1016\/j.pmcj.2021.101412","relation":{},"ISSN":["1574-1192"],"issn-type":[{"value":"1574-1192","type":"print"}],"subject":[],"published":{"date-parts":[[2021,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"TOTP Moving Target Defense for sensitive network services","name":"articletitle","label":"Article Title"},{"value":"Pervasive and Mobile Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.pmcj.2021.101412","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"101412"}}