skip to main content
10.1145/3407023.3407043acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

SOK: cryptocurrency networking context, state-of-the-art, challenges

Published:25 August 2020Publication History

ABSTRACT

Cryptocurrencies such as Bitcoin are realized using distributed systems and hence critically rely on the performance and security of the interconnecting network. The requirements on these networks and their usage, however can differ significantly from traditional communication networks, with implications on all layers of the protocol stack. This paper is motivated by these differences, and in particular by the observation that many fundamental design aspects of these networks are not well-understood today. In order to support the networking community to contribute to this emerging application domain, we present a structured overview of the field, from topology and neighbor discovery to block and transaction propagation. In particular, we provide the context, highlighting differences and commonalities with traditional networks, review the state-of-the-art, and identify open research challenges. Our paper can hence also be seen as a call-to-arms to improve the foundation on top of which cryptocurrencies are built.

References

  1. [n.d.]. Bitcoin Improvement Proposals Compact Block Relay. https://github.com/bitcoin/bips/blob/master/bip-0152.mediawiki. Accessed: 2019-09-23.Google ScholarGoogle Scholar
  2. Gavin Andresen. 2015. Weak Block Thoughts. https://github.com/ethereum/devp2p/blob/master/caps/eth.mdGoogle ScholarGoogle Scholar
  3. Maria Apostolaki, Gian Marti, Jan Müller, and Laurent Vanbever. 2018. SABRE: Protecting Bitcoin against Routing Attacks. arXiv preprint arXiv:1808.06254 (2018).Google ScholarGoogle Scholar
  4. Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking bitcoin: Routing attacks on cryptocurrencies. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 375--392.Google ScholarGoogle ScholarCross RefCross Ref
  5. Moshe Babaioff, Shahar Dobzinski, Sigal Oren, and Aviv Zohar. 2012. On bitcoin and red balloons. In Proceedings of the 13th ACM conference on electronic commerce. 56--73.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Soumaya Basu, Ittay Eyal, and Emin Gun Sirer. 2016. Falcon: Relay Network for Bitcoin Blocks. https://www.falcon-net.org/Google ScholarGoogle Scholar
  7. Sami Ben Mariem, Pedro Casas, and Benoît Donnet. 2018. Vivisecting Blockchain P2P Networks: Unveiling the Bitcoin IP Network. In ACM CoNEXT Student Workshop.Google ScholarGoogle Scholar
  8. Alex Biryukov, Dmitry Khovratovich, and Ivan Pustogarov. 2014. Deanonymisation of clients in Bitcoin P2P network. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 15--29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Bitcoin. 2019. P2P Guide. https://bitcoin.org/en/p2p-network-guideGoogle ScholarGoogle Scholar
  10. BlueMatt. 2016. FIBRE. http://bitcoinfibre.org/public-network.htmlGoogle ScholarGoogle Scholar
  11. Shaileshh Bojja Venkatakrishnan, Giulia Fanti, and Pramod Viswanath. 2017. Dandelion: Redesigning the bitcoin network for anonymity. Proceedings of the ACM on Measurement and Analysis of Computing Systems 1, 1 (2017), 22.Google ScholarGoogle Scholar
  12. Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A Kroll, and Edward W Felten. 2015. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In Proc. IEEE Symposium on Security and Privacy (SP). IEEE, 104--121.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Edward Bortnikov, Maxim Gurevich, Idit Keidar, Gabriel Kliot, and Alexander Shraer. 2009. Brahms: Byzantine resilient random membership sampling. Computer Networks 53, 13 (2009), 2340--2359.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, and Paulo Veríssimo. 2019. Exploring the Monero Peer-to-Peer Network. IACR Cryptology ePrint Archive 2019 (2019), 411.Google ScholarGoogle Scholar
  15. Cardano. 2019. P2P Topology. https://cardanodocs.com/cardano/topology/Google ScholarGoogle Scholar
  16. Nakul Chawla, Hans Walter Behrens, Darren Tapp, Dragan Boscovic, and K Selçuk Candan. 2019. Velocity: Scalability improvements in block propagation through rateless erasure coding. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 447--454.Google ScholarGoogle ScholarCross RefCross Ref
  17. Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Proc. IEEE P2P Conference. IEEE, 1--10.Google ScholarGoogle ScholarCross RefCross Ref
  18. Sergi Delgado-Segura, Surya Bakshi, Cristina Pérez-Solà, James Litton, Andrew Pachulski, Andrew Miller, and Bobby Bhattacharjee. 2018. TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions. arXiv preprint arXiv:1812.00942 (2018).Google ScholarGoogle Scholar
  19. Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, and Joan Borrell. 2018. Cryptocurrency networks: A new p2p paradigm. Mobile Information Systems 2018 (2018).Google ScholarGoogle Scholar
  20. Joan Antoni Donet, Cristina Pérez-Sola, and Jordi Herrera-Joancomartí. 2014. The bitcoin P2P network. In International Conference on Financial Cryptography and Data Security. Springer, 87--102.Google ScholarGoogle ScholarCross RefCross Ref
  21. Fabio A Drucker and Lisa K Fleischer. 2012. Simpler sybil-proof mechanisms for multi-level marketing. In Proceedings of the 13th ACM conference on Electronic commerce. 441--458.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Kirill Dyagilev, Shie Mannor, and Elad Yom-Tov. 2010. Generative models for rapid information propagation. In Proceedings of the First Workshop on Social Media Analytics. 35--43.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Parinya Ekparinya, Vincent Gramoli, and Guillaume Jourjon. 2018. Impact of man-in-the-middle attacks on ethereum. In 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS). IEEE, 11--20.Google ScholarGoogle ScholarCross RefCross Ref
  24. Oğuzhan Ersoy, Zhijie Ren, Zekeriya Erkin, and Reginald L Lagendijk. 2018. Transaction propagation on permissionless blockchains: incentive and routing mechanisms. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, 20--30.Google ScholarGoogle ScholarCross RefCross Ref
  25. Ethereum. 2020. Ethereum Wire Protocol. https://github.com/ethereum/devp2p/blob/master/caps/eth.mdGoogle ScholarGoogle Scholar
  26. Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert Van Renesse. 2016. Bitcoin-ng: A scalable blockchain protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI). 45--59.Google ScholarGoogle Scholar
  27. Ittay Eyal and Emin Gün Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In International conference on financial cryptography and data security.Google ScholarGoogle ScholarCross RefCross Ref
  28. Ittay Eyal and Emin Gün Sirer. 2018. Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61, 7 (2018), 95--102.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Giulia Fanti, Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, and Pramod Viswanath. 2018. Dandelion++: Lightweight cryptocurrency networking with formal anonymity guarantees. Proceedings of the ACM on Measurement and Analysis of Computing Systems 2, 2 (2018), 29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Ryan Fugger. 2004. Money as IOUs in social trust networks & a proposal for a decentralized currency network protocol. Hypertext document. Available electronically at http://ripple.sourceforge.net 106 (2004).Google ScholarGoogle Scholar
  31. Arthur Gervais, Srdjan Capkun, Ghassan O Karame, and Damian Gruber. 2014. On the privacy provisions of bloom filters in lightweight bitcoin clients. In Proceedings of the 30th Annual Computer Security Applications Conference. 326--335.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Arthur Gervais, Ghassan O Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In Proc. of the 2016 ACM SIGSAC conference on computer and communications security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. David Goldschlag, Michael Reed, and Paul Syverson. 1999. Onion routing for anonymous and private internet connections. Technical Report. NAVAL RESEARCH LAB WASHINGTON DC CENTER FOR HIGH ASSURANCE COMPUTING SYSTEMS ....Google ScholarGoogle Scholar
  34. Michael T Goodrich and Michael Mitzenmacher. 2011. Invertible bloom lookup tables. In Allerton. IEEE.Google ScholarGoogle Scholar
  35. Matthias Grundmann, Till Neudecker, and Hannes Hartenstein. 2018. Exploiting transaction accumulation and double spends for topology inference in bitcoin. In International Conference on Financial Cryptography and Data Security. Springer, 113--126.Google ScholarGoogle Scholar
  36. Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, and Arthur Gervais. 2019. SoK: Off The Chain Transactions. IACR Cryptology ePrint Archive 2019 (2019), 360.Google ScholarGoogle Scholar
  37. Rachid Guerraoui, Florian Huc, and Anne-Marie Kermarrec. 2013. Highly dynamic distributed computing with byzantine failures. In Proceedings of the 2013 ACM symposium on Principles of distributed computing. 176--183.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Bernhard Haeupler. 2016. Analyzing network coding (gossip) made easy. Journal of the ACM (JACM) 63, 3 (2016), 1--22.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on bitcoin's peer-to-peer network. In 24th {USENIX} Security Symposium.Google ScholarGoogle Scholar
  40. Muhammad Anas Imtiaz, David Starobinski, Ari Trachtenberg, and Nabeel Younis. 2019. Churn in the Bitcoin Network: Characterization and Impact. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 431--439.Google ScholarGoogle Scholar
  41. Bitcoin Inc. 2015. Stratum Mining Protocol. https://en.bitcoin.it/wiki/Stratum_mining_protocolGoogle ScholarGoogle Scholar
  42. Bitcoin Inc. 2018. Network. https://en.bitcoin.it/wiki/NetworkGoogle ScholarGoogle Scholar
  43. Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, and Tyler Moore. 2014. Game-theoretic analysis of DDoS attacks against Bitcoin mining pools. In International Conference on Financial Cryptography and Data Security. Springer, 72--86.Google ScholarGoogle ScholarCross RefCross Ref
  44. Ghassan O. Karame, Elli Androulaki, and Srdjan Capkun. 2012. Double-spending Fast Payments in Bitcoin. In Proceedings of the 2012 ACM Conference on Computer and Communications Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Sunny Katkuri. 2018. A survey of data transfer and storage techniques in prevalent cryptocurrencies and suggested improvements. arXiv preprint arXiv:1808.03380 (2018).Google ScholarGoogle Scholar
  46. Seoung Kyun Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller, and Michael Bailey. 2018. Measuring Ethereum network peers. In Proceedings of the Internet Measurement Conference 2018. 91--104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Uri Klarman, Soumya Basu, Aleksandar Kuzmanovic, and Emin Gün Sirer. 2018. bloxroute: A scalable trustless blockchain distribution network whitepaper. IEEE Internet of Things Journal (2018).Google ScholarGoogle Scholar
  48. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena. 2017. Smartpool: Practical decentralized pooled mining. In 26th {USENIX} Security Symposium.Google ScholarGoogle Scholar
  49. Petar Maymounkov and David Mazieres. 2002. Kademlia: A peer-to-peer information system based on the xor metric. In International Workshop on Peer-to-Peer Systems. Springer, 53--65.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Andrew Miller, James Litton, Andrew Pachulski, Neal Gupta, Dave Levin, Neil Spring, and Bobby Bhattacharjee. 2015. Discovering bitcoin's public topology and influential nodes. (2015).Google ScholarGoogle Scholar
  51. Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. 2016. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 305--320.Google ScholarGoogle ScholarCross RefCross Ref
  52. Bitcoin Relay Network. 2017. high-speed block-relay system for miners. http://www.bitcoinrelaynetwork.org/Google ScholarGoogle Scholar
  53. Till Neudecker. [n.d.]. Characterization of the Bitcoin Peer-to-Peer Network (2015-2018). ([n. d.]).Google ScholarGoogle Scholar
  54. Till Neudecker and Hannes Hartenstein. 2017. Could network information facilitate address clustering in Bitcoin?. In International conference on financial cryptography and data security. Springer, 155--169.Google ScholarGoogle ScholarCross RefCross Ref
  55. Till Neudecker and Hannes Hartenstein. 2018. Network layer aspects of permissionless blockchains. IEEE Communications Surveys & Tutorials 21, 1 (2018), 838--857.Google ScholarGoogle ScholarCross RefCross Ref
  56. Thanh Son Lam Nguyen, Guillaume Jourjon, Maria Potop-Butucaru, and Kim Thai. 2019. Impact of network delays on Hyperledger Fabric. arXiv preprint arXiv:1903.08856 (2019).Google ScholarGoogle Scholar
  57. Kai Otsuki, Yusuke Aoki, Ryohei Banno, and Kazuyuki Shudo. 2019. Effects of a Simple Relay Network on the Bitcoin Network. In Proceedings of the Asian Internet Engineering Conference. 41--46.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. A Pinar Ozisik, Gavin Andresen, Brian N Levine, Darren Tapp, George Bissias, and Sunny Katkuri. 2019. Graphene: efficient interactive set reconciliation applied to blockchain propagation. In Proceedings of the ACM Special Interest Group on Data Communication. 303--317.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Slush Pool. 2019. Stratum Mining Protocol. https://slushpool.com/help/stratum-protocol/Google ScholarGoogle Scholar
  60. Ruben Recabarren and Bogdan Carbunar. 2017. Hardening stratum, the bitcoin pool mining protocol. Proceedings on Privacy Enhancing Technologies 2017, 3 (2017), 57--74.Google ScholarGoogle ScholarCross RefCross Ref
  61. Ripple. 2019. Overlay. https://github.com/ripple/rippled/tree/develop/src/ripple/overlayGoogle ScholarGoogle Scholar
  62. Ronald L Rivest. 1997. Electronic lottery tickets as micropayments. In International Conference on Financial Cryptography. Springer, 307--314.Google ScholarGoogle ScholarCross RefCross Ref
  63. Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security.Google ScholarGoogle Scholar
  64. Saar Tochner and Aviv Zohar. 2018. How to pick your friends-a game theoretic approach to p2p overlay construction. arXiv preprint arXiv:1810.05447 (2018).Google ScholarGoogle Scholar
  65. Muoi Tran, Inho Choi, Gi Jun Moon, Anh V Vu, and Min Suk Kang. 2020. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network. (2020).Google ScholarGoogle Scholar
  66. Carmela Troncoso, Marios Isaakidis, George Danezis, and Harry Halpin. 2017. Systematizing decentralization and privacy: Lessons from 15 years of research and deployments. Proceedings on Privacy Enhancing Technologies 2017, 4 (2017), 404--426.Google ScholarGoogle ScholarCross RefCross Ref
  67. Peter Tschipper. 2016. BUIP010: Xtreme Thinblocks. In Bitcoin Forum (1 January 2016). https://bitco.in/forum/threads/buip010-passed-xtreme-thinblocks, Vol. 774.Google ScholarGoogle Scholar
  68. Marie Vasek, Micah Thornton, and Tyler Moore. 2014. Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In International conference on financial cryptography and data security. Springer, 57--71.Google ScholarGoogle ScholarCross RefCross Ref
  69. Aleksandar Vorkapic. 2018. Secure Blockchain Network Communication using SCION.Google ScholarGoogle Scholar
  70. Canhui Wang, Xiaowen Chu, and Qin Yang. 2019. Measurement and analysis of the bitcoin networks: A view from mining pools. arXiv preprint arXiv:1902.07549 (2019).Google ScholarGoogle Scholar
  71. Karl Wüst and Arthur Gervais. 2016. Ethereum eclipse attacks. Technical Report. ETH Zurich.Google ScholarGoogle Scholar
  72. Beverly Yang and Hector Garcia-Molina. 2003. PPay: micropayments for peer-to-peer systems. In Proceedings of the 10th ACM conference on Computer and communications security. 300--310.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Maxwell Young, Aniket Kate, Ian Goldberg, and Martin Karsten. 2013. Towards practical communication in Byzantine-resistant DHTs. IEEE/ACM Transactions on Networking (ToN) 21, 1 (2013), 190--203.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Alexei Zamyatin, Nicholas Stifter, Philipp Schindler, Edgar R Weippl, and William J Knottenbelt. 2018. Flux: Revisiting Near Blocks for Proof-of-Work Blockchains. IACR Cryptology ePrint Archive 2018 (2018), 415.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and Security
    August 2020
    1073 pages
    ISBN:9781450388337
    DOI:10.1145/3407023
    • Program Chairs:
    • Melanie Volkamer,
    • Christian Wressnegger

    Copyright © 2020 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 25 August 2020

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate228of451submissions,51%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader