Abstract
Blockchains, in general, and cryptocurrencies such as Bitcoin, in particular, are realized using distributed systems and hence critically rely on the performance and security of the interconnecting network. The requirements on these networks and their usage, however, can differ significantly from traditional communication networks, with implications on all layers of the protocol stack. This article is motivated by these differences and, in particular, by the observation that many fundamental design aspects of these networks are not well-understood today. To support the networking community to contribute to this emerging application domain, we present a structured overview of the field, from topology and neighbor discovery, over block and transaction propagation, to sharding and off-chain networks, also reviewing existing empirical results from different measurement studies. In particular, for each of these domains, we provide the context, highlighting differences and commonalities with traditional networks, review the state-of-the-art, and identify open research challenges. Our article can hence also be seen as a call-to-arms to improve the foundation on top of which blockchains are built.
- Wuille. [n.d.]. Bitcoin Improvement Proposals Compact Block Relay. Retrieved from https://github.com/bitcoin/bips/blob/master/bip-0152.mediawiki.Google Scholar
- Wagih. [n.d.]. Outsourcing Route Computation With Trampoline Payments. Retrieved from https://bitcointechweekly.com/front/outsourcing-route-computation-with-trampoline-payments/.Google Scholar
- Gavin Andresen. 2015. Weak Block Thoughts. Retrieved from https://github.com/ethereum/devp2p/blob/master/caps/eth.md.Google Scholar
- Maria Apostolaki, Gian Marti, Jan Müller, and Laurent Vanbever. 2018. SABRE: Protecting bitcoin against routing attacks. Retrieved from https://arXiv:1808.06254.Google Scholar
- Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking bitcoin: Routing attacks on cryptocurrencies. In Proceedings of the IEEE Symposium on Security and Privacy (SP’17). IEEE, 375--392.Google ScholarCross Ref
- Georgia Avarikioti, Eleftherios Kokoris Kogias, and Roger Wattenhofer. 2019. Brick: Asynchronous state channels. Retrieved from https://arXiv:1905.11360.Google Scholar
- Moshe Babaioff, Shahar Dobzinski, Sigal Oren, and Aviv Zohar. 2012. On bitcoin and red balloons. In Proceedings of the 13th ACM Conference on Electronic Commerce. 56--73.Google ScholarDigital Library
- Adam Back, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Timón, and Pieter Wuille. 2014. Enabling blockchain innovations with pegged sidechains. Retrieved from http://www.opensciencereview.com/papers/123/enablingblockchain-innovations-with-pegged-sidechains.Google Scholar
- Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, and George Danezis. 2017. Consensus in the age of blockchains. Retrieved from https://arXiv:1711.03936.Google Scholar
- Soumaya Basu, Ittay Eyal, and Emin Gun Sirer. 2016. Falcon: Relay Network for Bitcoin Blocks. Retrieved from https://www.falcon-net.org/.Google Scholar
- Sami Ben Mariem, Pedro Casas, and Benoît Donnet. 2018. Vivisecting blockchain P2P networks: Unveiling the bitcoin IP network. In Proceedings of the ACM CoNEXT Student Workshop.Google Scholar
- Alex Biryukov, Dmitry Khovratovich, and Ivan Pustogarov. 2014. Deanonymisation of clients in Bitcoin P2P network. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 15--29.Google ScholarDigital Library
- Bitcoin. 2019. P2P Guide. Retrieved from https://bitcoin.org/en/p2p-network-guide.Google Scholar
- BlueMatt. 2016. FIBRE. Retrieved from http://bitcoinfibre.org/public-network.html.Google Scholar
- Shaileshh Bojja Venkatakrishnan, Giulia Fanti, and Pramod Viswanath. 2017. Dandelion: Redesigning the bitcoin network for anonymity. Proc. ACM Measure. Anal. Comput. Syst. 1, 1 (2017), 22.Google Scholar
- Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, and Edward W. Felten. 2015. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In Proceedings of the IEEE Symposium on Security and Privacy (SP’15). IEEE, 104--121.Google Scholar
- Edward Bortnikov, Maxim Gurevich, Idit Keidar, Gabriel Kliot, and Alexander Shraer. 2009. Brahms: Byzantine resilient random membership sampling. Comput. Netw. 53, 13 (2009), 2340--2359.Google ScholarDigital Library
- Vitalik Buterin. 2016. Ethereum 2.0 mauve paper. In Proceedings of the Ethereum Developer Conference, Vol. 2.Google Scholar
- Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, and Paulo Veríssimo. 2019. Exploring the Monero peer-to-peer network. IACR Cryptol. ePrint Arch. 2019 (2019), 411.Google Scholar
- Cardano. 2019. P2P Topology. Retrieved from https://cardanodocs.com/cardano/topology/.Google Scholar
- Nakul Chawla, Hans Walter Behrens, Darren Tapp, Dragan Boscovic, and K. Selçuk Candan. 2019. Velocity: Scalability improvements in block propagation through rateless erasure coding. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency (ICBC’19). IEEE, 447--454.Google Scholar
- Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer et al. 2016. On scaling decentralized blockchains. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 106--125.Google ScholarCross Ref
- Hung Dang, Tien Tuan Anh Dinh, Dumitrel Loghin, Ee-Chien Chang, Qian Lin, and Beng Chin Ooi. 2019. Towards scaling blockchain systems via sharding. In Proceedings of the International Conference on Management of Data. 123--140.Google ScholarDigital Library
- Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Proceedings of the IEEE P2P Conference. IEEE, 1--10.Google ScholarCross Ref
- Sergi Delgado-Segura, Surya Bakshi, Cristina Pérez-Solà, James Litton, Andrew Pachulski, Andrew Miller, and Bobby Bhattacharjee. 2018. TxProbe: Discovering bitcoin’s network topology using orphan transactions. Retrieved from https://arXiv:1812.00942.Google Scholar
- Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, and Joan Borrell. 2018. Cryptocurrency networks: A new p2p paradigm. Mobile Info. Syst. 2018 (2018).Google Scholar
- G. Di Stasi, S. Avallone, R. Canonico, and G. Ventre. 2018. Routing payments on the lightning network. In Proceedings of the IEEE Blockchain Conference. 1161--1170.Google Scholar
- Joan Antoni Donet, Cristina Pérez-Sola, and Jordi Herrera-Joancomartí. 2014. The bitcoin P2P network. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 87--102.Google ScholarCross Ref
- Maya Dotan, Yvonne-Anne Pignolet, Saar Tochner, Stefan Schmid, and Aviv Zohar. 2020. Cryptocurrency networking: Context, state-of-the-art, challenges. In Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES’20).Google ScholarDigital Library
- Fabio A. Drucker and Lisa K. Fleischer. 2012. Simpler sybil-proof mechanisms for multi-level marketing. In Proceedings of the 13th ACM Conference on Electronic Commerce. 441--458.Google Scholar
- Kirill Dyagilev, Shie Mannor, and Elad Yom-Tov. 2010. Generative models for rapid information propagation. In Proceedings of the 1st Workshop on Social Media Analytics. 35--43.Google ScholarDigital Library
- Stefan Dziembowski, Lisa Eckey, Sebastian Faust, and Daniel Malinowski. 2017. PERUN: Virtual payment channels over cryptographic currencies. IACR Cryptol. ePrint Arch. 2017 (2017), 635.Google Scholar
- Parinya Ekparinya, Vincent Gramoli, and Guillaume Jourjon. 2018. Impact of man-in-the-middle attacks on ethereum. In Proceedings of the IEEE 37th Symposium on Reliable Distributed Systems (SRDS’18). IEEE, 11--20.Google ScholarCross Ref
- Oğuzhan Ersoy, Zhijie Ren, Zekeriya Erkin, and Reginald L. Lagendijk. 2018. Transaction propagation on permissionless blockchains: Incentive and routing mechanisms. In Proceedings of the Crypto Valley Conference on Blockchain Technology (CVCBT’18). IEEE, 20--30.Google Scholar
- Ethereum. 2020. Ethereum Wire Protocol. Retrieved from https://github.com/ethereum/devp2p/blob/master/caps/eth.md.Google Scholar
- Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert Van Renesse. 2016. Bitcoin-ng: A scalable blockchain protocol. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI’16). 45--59.Google Scholar
- Ittay Eyal and Emin Gün Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In Proceedings of the International Conference on Financial Cryptography and Data Security.Google ScholarCross Ref
- Ittay Eyal and Emin Gün Sirer. 2018. Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61, 7 (2018), 95--102.Google ScholarDigital Library
- Giulia Fanti, Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, and Pramod Viswanath. 2018. Dandelion++: Lightweight cryptocurrency networking with formal anonymity guarantees. Proc. ACM Measure. Anal. Comput. Syst. 2, 2 (2018), 29.Google ScholarDigital Library
- Sebastian Feld, Mirco Schönfeld, and Martin Werner. 2014. Analyzing the deployment of bitcoin’s P2P network under an AS-level perspective. Procedia Comput. Sci. 32 (2014), 1121--1126.Google ScholarCross Ref
- Ryan Fugger. 2004. Money as IOUs in social trust networks & a proposal for a decentralized currency network protocol. Hypertext Document. Retrieved from http://ripple.sourceforge.net.Google Scholar
- Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert Van Renesse, and Emin Gün Sirer. 2018. Decentralization in bitcoin and ethereum networks. Retrieved from https://arXiv:1801.03998.Google Scholar
- Adem Efe Gencer, Robbert van Renesse, and Emin Gün Sirer. 2016. Service-oriented sharding with aspen. Retrieved from https://arXiv:1611.06816.Google Scholar
- Arthur Gervais, Srdjan Capkun, Ghassan O. Karame, and Damian Gruber. 2014. On the privacy provisions of bloom filters in lightweight bitcoin clients. In Proceedings of the 30th Annual Computer Security Applications Conference. 326--335.Google ScholarDigital Library
- Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security.Google ScholarDigital Library
- David Goldschlag, Michael Reed, and Paul Syverson. 1999. Onion Routing for Anonymous and Private Internet Connections. Technical Report. Naval Research Lab, Center for High Assurance Computing Systems, Washington, D.C.Google Scholar
- Michael T. Goodrich and Michael Mitzenmacher. 2011. Invertible bloom lookup tables. In Allerton. IEEE.Google ScholarDigital Library
- Matthias Grundmann, Till Neudecker, and Hannes Hartenstein. 2018. Exploiting transaction accumulation and double spends for topology inference in bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 113--126.Google Scholar
- Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, and Arthur Gervais. 2019. SoK: Off the chain transactions. IACR Cryptol. ePrint Arch. 2019 (2019), 360.Google Scholar
- Rachid Guerraoui, Florian Huc, and Anne-Marie Kermarrec. 2013. Highly dynamic distributed computing with byzantine failures. In Proceedings of the ACM Symposium on Principles of Distributed Computing. 176--183.Google ScholarDigital Library
- Bernhard Haeupler. 2016. Analyzing network coding (gossip) made easy. J. ACM 63, 3 (2016), 1--22.Google ScholarDigital Library
- Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on bitcoin’s peer-to-peer network. In Proceedings of the 24th USENIX Security Symposium.Google ScholarDigital Library
- Philipp Hoenisch and Ingo Weber. 2018. Aodv–based routing for payment channel networks. In Proceedings of the International Conference on Blockchain. Springer, 107--124.Google ScholarCross Ref
- Muhammad Anas Imtiaz, David Starobinski, Ari Trachtenberg, and Nabeel Younis. 2019. Churn in the bitcoin network: Characterization and impact. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency (ICBC’19). IEEE, 431--439.Google ScholarCross Ref
- Bitcoin Inc. 2015. Stratum Mining Protocol. Retrieved from https://en.bitcoin.it/wiki/Stratum_mining_protocol.Google Scholar
- Bitcoin Inc. 2018. Network. Retrieved from https://en.bitcoin.it/wiki/Network.Google Scholar
- Mercy O. Jaiyeola, Kyle Patron, Jared Saia, Maxwell Young, and Qian M. Zhou. 2018. Tiny groups tackle Byzantine adversaries. In Proceedings of the IEEE International Parallel and Distributed Processing Symposium (IPDPS’18). IEEE, 1030--1039.Google Scholar
- Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, and Tyler Moore. 2014. Game-theoretic analysis of DDoS attacks against Bitcoin mining pools. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 72--86.Google ScholarCross Ref
- Ghassan O. Karame, Elli Androulaki, and Srdjan Capkun. 2012. Double-spending fast payments in bitcoin. In Proceedings of the ACM Conference on Computer and Communications Security.Google ScholarDigital Library
- Sunny Katkuri. 2018. A survey of data transfer and storage techniques in prevalent cryptocurrencies and suggested improvements. Retrieved from https://arXiv:1808.03380.Google Scholar
- Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Proceedings of the Annual International Cryptology Conference. Springer, 357--388.Google ScholarCross Ref
- Seoung Kyun Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller, and Michael Bailey. 2018. Measuring Ethereum network peers. In Proceedings of the Internet Measurement Conference. 91--104.Google ScholarDigital Library
- Uri Klarman, Soumya Basu, Aleksandar Kuzmanovic, and Emin Gün Sirer. 2018. bloxroute: A scalable trustless blockchain distribution network whitepaper. IEEE Internet Things J. (2018).Google Scholar
- Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing bitcoin security and performance with strong consistency via collective signing. In Proceedings of the 25th USENIX Security Symposium (USENIX Security’16). 279--296.Google Scholar
- Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, and Prateek Saxena. 2016. A secure sharding protocol for open blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 17--30.Google ScholarDigital Library
- Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena. 2017. Smartpool: Practical decentralized pooled mining. In Proceedings of the 26th USENIX Security Symposium.Google Scholar
- Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, and Matteo Maffei. 2017. SilentWhispers: Enforcing security and privacy in credit networks. In Proceedings of the Network and Distributed System Security Symposium.Google ScholarCross Ref
- Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, and Matteo Maffei. 2019. Anonymous multi-hop locks for blockchain scalability and interoperability. In Proceedings of the Network and Distributed System Security Symposium (NDSS’19).Google ScholarCross Ref
- Alex Manuskin, Michael Mirkin, and Ittay Eyal. 2020. Ostraka: Secure blockchain scaling by node sharding. In Proceedings of the IEEE European Symposium on Security and Privacy Workshops (EuroS&PW’20). IEEE, 397--406.Google ScholarCross Ref
- Stefano Martinazzi and Andrea Flori. 2020. The evolving topology of the Lightning Network: Centralization, efficiency, robustness, synchronization, and anonymity. PLoS ONE 15, 1 (2020), e0225966.Google ScholarCross Ref
- Petar Maymounkov and David Mazieres. 2002. Kademlia: A peer-to-peer information system based on the xor metric. In Proceedings of the International Workshop on Peer-to-Peer Systems. Springer, 53--65.Google ScholarCross Ref
- Patrick McCorry, Surya Bakshi, Iddo Bentov, Sarah Meiklejohn, and Andrew Miller. 2019. Pisa: Arbitration outsourcing for state channels. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies. 16--30.Google ScholarDigital Library
- Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, and Jonathan Katz. 2014. Permacoin: Repurposing bitcoin work for data preservation. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 475--490.Google ScholarDigital Library
- Andrew Miller, James Litton, Andrew Pachulski, Neal Gupta, Dave Levin, Neil Spring, and Bobby Bhattacharjee. 2015. Discovering bitcoin’s public topology and influential nodes. https://www.cs.umd.edu/projects/coinscope/coinscope.pdf.Google Scholar
- Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, and Ari Juels. 2020. BDoS: Blockchain denial-of-service. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 601--619.Google ScholarDigital Library
- A. Mizrahi and O. Rottenstreich. 2020. State sharding with space-aware representations. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency (ICBC’20). 1--9. DOI:https://doi.org/10.1109/ICBC48266.2020.9169402Google ScholarCross Ref
- Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. 2016. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P’16). IEEE, 305--320.Google ScholarCross Ref
- Bitcoin Relay Network. 2017. high-speed block-relay system for miners. Retrieved from http://www.bitcoinrelaynetwork.org/.Google Scholar
- Till Neudecker. [n.d.]. Characterization of the bitcoin peer-to-peer network (2015--2018). https://dsn.kastel.kit.edu/bitcoin/publications/bitcoin_network_characterization.pdf.Google Scholar
- Till Neudecker and Hannes Hartenstein. 2017. Could network information facilitate address clustering in Bitcoin? In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 155--169.Google ScholarCross Ref
- Till Neudecker and Hannes Hartenstein. 2018. Network layer aspects of permissionless blockchains. IEEE Commun. Surveys Tutor. 21, 1 (2018), 838--857.Google ScholarCross Ref
- Till Neudecker and Hannes Hartenstein. 2019. Short paper: An empirical analysis of blockchain forks in bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 84--92.Google ScholarDigital Library
- Thanh Son Lam Nguyen, Guillaume Jourjon, Maria Potop-Butucaru, and Kim Thai. 2019. Impact of network delays on hyperledger fabric. Retrieved from https://arXiv:1903.08856.Google Scholar
- Kai Otsuki, Yusuke Aoki, Ryohei Banno, and Kazuyuki Shudo. 2019. Effects of a simple relay network on the bitcoin network. In Proceedings of the Asian Internet Engineering Conference. 41--46.Google ScholarDigital Library
- A. Pinar Ozisik, Gavin Andresen, Brian N. Levine, Darren Tapp, George Bissias, and Sunny Katkuri. 2019. Graphene: Efficient interactive set reconciliation applied to blockchain propagation. In Proceedings of the ACM Special Interest Group on Data Communication. 303--317.Google ScholarDigital Library
- Sunoo Park, Krzysztof Pietrzak, Albert Kwon, Joël Alwen, Georg Fuchsbauer, and Peter Gazi. 2018. Spacemint: A cryptocurrency based on proofs of space. In Proceedings of the Conference on Financial Cryptography and Data Security.Google ScholarDigital Library
- Charles E. Perkins et al. 2001. Ad Hoc Networking. Vol. 1. Addison-Wesley Reading.Google Scholar
- Slush Pool. 2019. Stratum Mining Protocol. Retrieved from https://slushpool.com/help/stratum-protocol/.Google Scholar
- Joseph Poon and Thaddeus Dryja. 2016. The bitcoin lightning network: Scalable off-chain instant payments. https://www.bitcoinlightning.com/wp-content/uploads/2018/03/lightning-network-paper.pdf.Google Scholar
- Pavel Prihodko, Slava Zhigulin, Mykola Sahno, Aleksei Ostrovskiy, and Olaoluwa Osuntokun. 2016. Flare: An approach to routing in lightning network. White Paper (2016).Google Scholar
- Raiden Homepage. 2019. The Raiden Network. Retrieved from https://raiden.network/.Google Scholar
- Ruben Recabarren and Bogdan Carbunar. 2017. Hardening stratum, the bitcoin pool mining protocol. Proc. Privacy Enhanc. Technol. 2017, 3 (2017), 57--74.Google ScholarCross Ref
- Ripple. 2019. Overlay. Retrieved from https://github.com/ripple/rippled/tree/develop/src/ripple/overlay.Google Scholar
- Ronald L. Rivest. 1997. Electronic lottery tickets as micropayments. In Proceedings of the International Conference on Financial Cryptography. Springer, 307--314.Google ScholarCross Ref
- Elias Rohrer, Julian Malliaris, and Florian Tschorsch. 2019. Discharged payment channels: Quantifying the lightning network’s resilience to topology-based attacks. Retrieved from https://arXiv:1904.10253.Google Scholar
- Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, and Ian Goldberg. 2017. Settling payments fast and private: Efficient decentralized routing for path-based transactions. Retrieved from https://arXiv:1709.05748.Google Scholar
- Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal selfish mining strategies in bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security.Google Scholar
- István András Seres, László Gulyás, Dániel A. Nagy, and Péter Burcsi. 2020. Topological analysis of bitcoin’s lightning network. In Mathematical Research for Blockchain Economy. Springer, 1--12.Google Scholar
- Vibhaalakshmi Sivaraman, Shaileshh Bojja Venkatakrishnan, Mohammad Alizadeh, Giulia Fanti, and Pramod Viswanath. 2018. Routing cryptocurrency with the spider network. Retrieved from https://arXiv:1809.05088.Google Scholar
- Weizhao Tang, Weina Wang, Giulia Fanti, and Sewoong Oh. 2019. Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks. Retrieved from https://arXiv:1909.02717.Google Scholar
- Saar Tochner and Stefan Schmid. 2020. On search friction of route discovery in offchain networks. Retrieved from https://arXiv:2005.14676.Google Scholar
- Saar Tochner, Stefan Schmid, and Aviv Zohar. 2019. Hijacking routes in payment channel networks: A predictability tradeoff. Retrieved from https://arXiv:1909.06890.Google Scholar
- Saar Tochner and Aviv Zohar. 2018. How to pick your friends-a game theoretic approach to p2p overlay construction. Retrieved from https://arXiv:1810.05447.Google Scholar
- Muoi Tran, Inho Choi, Gi Jun Moon, Anh V. Vu, and Min Suk Kang. 2020. A stealthier partitioning attack against bitcoin peer-to-peer network. In IEEE Symposium on Security and Privacy (SP).Google ScholarCross Ref
- Carmela Troncoso, Marios Isaakidis, George Danezis, and Harry Halpin. 2017. Systematizing decentralization and privacy: Lessons from 15 years of research and deployments. Proc. Privacy Enhanc. Technol. 2017, 4 (2017), 404--426.Google ScholarCross Ref
- Peter Tschipper. 2016. BUIP010: Xtreme thinblocks. Retrieved from https://bitco.in/forum/threads/buip010-passed-xtreme-thinblocks.Google Scholar
- Stefan Schmid Utz Nisslmueller, Klaus-Tycho Foerster and Christian Decker. 2020. Toward active and passive confidentiality attacks on cryptocurrency off-chain networks. In Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP’20).Google ScholarCross Ref
- Marie Vasek, Micah Thornton, and Tyler Moore. 2014. Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 57--71.Google ScholarCross Ref
- Aleksandar Vorkapic. 2018. Secure Blockchain Network Communication using SCION. https://www.diva-portal.org/smash/get/diva2:1268555/FULLTEXT01.pdf.Google Scholar
- Canhui Wang, Xiaowen Chu, and Qin Yang. 2019. Measurement and analysis of the bitcoin networks: A view from mining pools. Retrieved from https://arXiv:1902.07549.Google Scholar
- Gang Wang, Zhijie Jerry Shi, Mark Nixon, and Song Han. 2019. Sok: Sharding on blockchain. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies. 41--61.Google ScholarDigital Library
- Karl Wüst and Arthur Gervais. 2016. Ethereum Eclipse Attacks. Technical Report. ETH Zurich.Google Scholar
- Beverly Yang and Hector Garcia-Molina. 2003. PPay: Micropayments for peer-to-peer systems. In Proceedings of the 10th ACM Conference on Computer and Communications Security. 300--310.Google ScholarDigital Library
- Maxwell Young, Aniket Kate, Ian Goldberg, and Martin Karsten. 2013. Towards practical communication in Byzantine-resistant DHTs. IEEE/ACM Trans. Netw. 21, 1 (2013), 190--203.Google ScholarDigital Library
- Mahdi Zamani, Mahnush Movahedi, and Mariana Raykova. 2018. Rapidchain: Scaling blockchain via full sharding. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 931--948.Google ScholarDigital Library
- Alexei Zamyatin, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl, and William J. Knottenbelt. 2018. Flux: Revisiting near blocks for proof-of-work blockchains. IACR Cryptol. ePrint Arch. 2018 (2018), 415.Google Scholar
Index Terms
- Survey on Blockchain Networking: Context, State-of-the-Art, Challenges
Recommendations
Digital blockchain networks appear to be following Metcalfes Law
Public ledger systems provide us a wealth of information for their network analysis.Network effects on the growth of some of the networks was confirmed.A new network model presented here modeled the networks well as did Metcalfes law.The networks value ...
Private and Secure Mixing in Credit Networks
IECC '19: Proceedings of the 1st International Electronics Communication ConferenceIn this paper, we propose a system for mixing transactions in payment networks such as credit networks. Credit networks like Ripple and Stellar are increasingly popular, and can facilitate crosscurrency transactions in a fraction of the time it would ...
A Survey of Blockchain Applications in Different Domains
ICBTA '18: Proceedings of the 2018 International Conference on Blockchain Technology and ApplicationBlockchains have received much attention recently since they provide decentralized approaches to the creation and management of value. Many banks, Internet companies, car manufacturers, and even governments worldwide have incorporated or started ...
Comments