ABSTRACT
Cryptocurrencies such as Bitcoin are realized using distributed systems and hence critically rely on the performance and security of the interconnecting network. The requirements on these networks and their usage, however can differ significantly from traditional communication networks, with implications on all layers of the protocol stack. This paper is motivated by these differences, and in particular by the observation that many fundamental design aspects of these networks are not well-understood today. In order to support the networking community to contribute to this emerging application domain, we present a structured overview of the field, from topology and neighbor discovery to block and transaction propagation. In particular, we provide the context, highlighting differences and commonalities with traditional networks, review the state-of-the-art, and identify open research challenges. Our paper can hence also be seen as a call-to-arms to improve the foundation on top of which cryptocurrencies are built.
- [n.d.]. Bitcoin Improvement Proposals Compact Block Relay. https://github.com/bitcoin/bips/blob/master/bip-0152.mediawiki. Accessed: 2019-09-23.Google Scholar
- Gavin Andresen. 2015. Weak Block Thoughts. https://github.com/ethereum/devp2p/blob/master/caps/eth.mdGoogle Scholar
- Maria Apostolaki, Gian Marti, Jan Müller, and Laurent Vanbever. 2018. SABRE: Protecting Bitcoin against Routing Attacks. arXiv preprint arXiv:1808.06254 (2018).Google Scholar
- Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking bitcoin: Routing attacks on cryptocurrencies. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 375--392.Google ScholarCross Ref
- Moshe Babaioff, Shahar Dobzinski, Sigal Oren, and Aviv Zohar. 2012. On bitcoin and red balloons. In Proceedings of the 13th ACM conference on electronic commerce. 56--73.Google ScholarDigital Library
- Soumaya Basu, Ittay Eyal, and Emin Gun Sirer. 2016. Falcon: Relay Network for Bitcoin Blocks. https://www.falcon-net.org/Google Scholar
- Sami Ben Mariem, Pedro Casas, and Benoît Donnet. 2018. Vivisecting Blockchain P2P Networks: Unveiling the Bitcoin IP Network. In ACM CoNEXT Student Workshop.Google Scholar
- Alex Biryukov, Dmitry Khovratovich, and Ivan Pustogarov. 2014. Deanonymisation of clients in Bitcoin P2P network. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 15--29.Google ScholarDigital Library
- Bitcoin. 2019. P2P Guide. https://bitcoin.org/en/p2p-network-guideGoogle Scholar
- BlueMatt. 2016. FIBRE. http://bitcoinfibre.org/public-network.htmlGoogle Scholar
- Shaileshh Bojja Venkatakrishnan, Giulia Fanti, and Pramod Viswanath. 2017. Dandelion: Redesigning the bitcoin network for anonymity. Proceedings of the ACM on Measurement and Analysis of Computing Systems 1, 1 (2017), 22.Google Scholar
- Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A Kroll, and Edward W Felten. 2015. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In Proc. IEEE Symposium on Security and Privacy (SP). IEEE, 104--121.Google ScholarDigital Library
- Edward Bortnikov, Maxim Gurevich, Idit Keidar, Gabriel Kliot, and Alexander Shraer. 2009. Brahms: Byzantine resilient random membership sampling. Computer Networks 53, 13 (2009), 2340--2359.Google ScholarDigital Library
- Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, and Paulo Veríssimo. 2019. Exploring the Monero Peer-to-Peer Network. IACR Cryptology ePrint Archive 2019 (2019), 411.Google Scholar
- Cardano. 2019. P2P Topology. https://cardanodocs.com/cardano/topology/Google Scholar
- Nakul Chawla, Hans Walter Behrens, Darren Tapp, Dragan Boscovic, and K Selçuk Candan. 2019. Velocity: Scalability improvements in block propagation through rateless erasure coding. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 447--454.Google ScholarCross Ref
- Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Proc. IEEE P2P Conference. IEEE, 1--10.Google ScholarCross Ref
- Sergi Delgado-Segura, Surya Bakshi, Cristina Pérez-Solà, James Litton, Andrew Pachulski, Andrew Miller, and Bobby Bhattacharjee. 2018. TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions. arXiv preprint arXiv:1812.00942 (2018).Google Scholar
- Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, and Joan Borrell. 2018. Cryptocurrency networks: A new p2p paradigm. Mobile Information Systems 2018 (2018).Google Scholar
- Joan Antoni Donet, Cristina Pérez-Sola, and Jordi Herrera-Joancomartí. 2014. The bitcoin P2P network. In International Conference on Financial Cryptography and Data Security. Springer, 87--102.Google ScholarCross Ref
- Fabio A Drucker and Lisa K Fleischer. 2012. Simpler sybil-proof mechanisms for multi-level marketing. In Proceedings of the 13th ACM conference on Electronic commerce. 441--458.Google ScholarDigital Library
- Kirill Dyagilev, Shie Mannor, and Elad Yom-Tov. 2010. Generative models for rapid information propagation. In Proceedings of the First Workshop on Social Media Analytics. 35--43.Google ScholarDigital Library
- Parinya Ekparinya, Vincent Gramoli, and Guillaume Jourjon. 2018. Impact of man-in-the-middle attacks on ethereum. In 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS). IEEE, 11--20.Google ScholarCross Ref
- Oğuzhan Ersoy, Zhijie Ren, Zekeriya Erkin, and Reginald L Lagendijk. 2018. Transaction propagation on permissionless blockchains: incentive and routing mechanisms. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, 20--30.Google ScholarCross Ref
- Ethereum. 2020. Ethereum Wire Protocol. https://github.com/ethereum/devp2p/blob/master/caps/eth.mdGoogle Scholar
- Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert Van Renesse. 2016. Bitcoin-ng: A scalable blockchain protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI). 45--59.Google Scholar
- Ittay Eyal and Emin Gün Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In International conference on financial cryptography and data security.Google ScholarCross Ref
- Ittay Eyal and Emin Gün Sirer. 2018. Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61, 7 (2018), 95--102.Google ScholarDigital Library
- Giulia Fanti, Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, and Pramod Viswanath. 2018. Dandelion++: Lightweight cryptocurrency networking with formal anonymity guarantees. Proceedings of the ACM on Measurement and Analysis of Computing Systems 2, 2 (2018), 29.Google ScholarDigital Library
- Ryan Fugger. 2004. Money as IOUs in social trust networks & a proposal for a decentralized currency network protocol. Hypertext document. Available electronically at http://ripple.sourceforge.net 106 (2004).Google Scholar
- Arthur Gervais, Srdjan Capkun, Ghassan O Karame, and Damian Gruber. 2014. On the privacy provisions of bloom filters in lightweight bitcoin clients. In Proceedings of the 30th Annual Computer Security Applications Conference. 326--335.Google ScholarDigital Library
- Arthur Gervais, Ghassan O Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In Proc. of the 2016 ACM SIGSAC conference on computer and communications security.Google ScholarDigital Library
- David Goldschlag, Michael Reed, and Paul Syverson. 1999. Onion routing for anonymous and private internet connections. Technical Report. NAVAL RESEARCH LAB WASHINGTON DC CENTER FOR HIGH ASSURANCE COMPUTING SYSTEMS ....Google Scholar
- Michael T Goodrich and Michael Mitzenmacher. 2011. Invertible bloom lookup tables. In Allerton. IEEE.Google Scholar
- Matthias Grundmann, Till Neudecker, and Hannes Hartenstein. 2018. Exploiting transaction accumulation and double spends for topology inference in bitcoin. In International Conference on Financial Cryptography and Data Security. Springer, 113--126.Google Scholar
- Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, and Arthur Gervais. 2019. SoK: Off The Chain Transactions. IACR Cryptology ePrint Archive 2019 (2019), 360.Google Scholar
- Rachid Guerraoui, Florian Huc, and Anne-Marie Kermarrec. 2013. Highly dynamic distributed computing with byzantine failures. In Proceedings of the 2013 ACM symposium on Principles of distributed computing. 176--183.Google ScholarDigital Library
- Bernhard Haeupler. 2016. Analyzing network coding (gossip) made easy. Journal of the ACM (JACM) 63, 3 (2016), 1--22.Google ScholarDigital Library
- Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on bitcoin's peer-to-peer network. In 24th {USENIX} Security Symposium.Google Scholar
- Muhammad Anas Imtiaz, David Starobinski, Ari Trachtenberg, and Nabeel Younis. 2019. Churn in the Bitcoin Network: Characterization and Impact. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 431--439.Google Scholar
- Bitcoin Inc. 2015. Stratum Mining Protocol. https://en.bitcoin.it/wiki/Stratum_mining_protocolGoogle Scholar
- Bitcoin Inc. 2018. Network. https://en.bitcoin.it/wiki/NetworkGoogle Scholar
- Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, and Tyler Moore. 2014. Game-theoretic analysis of DDoS attacks against Bitcoin mining pools. In International Conference on Financial Cryptography and Data Security. Springer, 72--86.Google ScholarCross Ref
- Ghassan O. Karame, Elli Androulaki, and Srdjan Capkun. 2012. Double-spending Fast Payments in Bitcoin. In Proceedings of the 2012 ACM Conference on Computer and Communications Security.Google ScholarDigital Library
- Sunny Katkuri. 2018. A survey of data transfer and storage techniques in prevalent cryptocurrencies and suggested improvements. arXiv preprint arXiv:1808.03380 (2018).Google Scholar
- Seoung Kyun Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller, and Michael Bailey. 2018. Measuring Ethereum network peers. In Proceedings of the Internet Measurement Conference 2018. 91--104.Google ScholarDigital Library
- Uri Klarman, Soumya Basu, Aleksandar Kuzmanovic, and Emin Gün Sirer. 2018. bloxroute: A scalable trustless blockchain distribution network whitepaper. IEEE Internet of Things Journal (2018).Google Scholar
- Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena. 2017. Smartpool: Practical decentralized pooled mining. In 26th {USENIX} Security Symposium.Google Scholar
- Petar Maymounkov and David Mazieres. 2002. Kademlia: A peer-to-peer information system based on the xor metric. In International Workshop on Peer-to-Peer Systems. Springer, 53--65.Google ScholarDigital Library
- Andrew Miller, James Litton, Andrew Pachulski, Neal Gupta, Dave Levin, Neil Spring, and Bobby Bhattacharjee. 2015. Discovering bitcoin's public topology and influential nodes. (2015).Google Scholar
- Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. 2016. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 305--320.Google ScholarCross Ref
- Bitcoin Relay Network. 2017. high-speed block-relay system for miners. http://www.bitcoinrelaynetwork.org/Google Scholar
- Till Neudecker. [n.d.]. Characterization of the Bitcoin Peer-to-Peer Network (2015-2018). ([n. d.]).Google Scholar
- Till Neudecker and Hannes Hartenstein. 2017. Could network information facilitate address clustering in Bitcoin?. In International conference on financial cryptography and data security. Springer, 155--169.Google ScholarCross Ref
- Till Neudecker and Hannes Hartenstein. 2018. Network layer aspects of permissionless blockchains. IEEE Communications Surveys & Tutorials 21, 1 (2018), 838--857.Google ScholarCross Ref
- Thanh Son Lam Nguyen, Guillaume Jourjon, Maria Potop-Butucaru, and Kim Thai. 2019. Impact of network delays on Hyperledger Fabric. arXiv preprint arXiv:1903.08856 (2019).Google Scholar
- Kai Otsuki, Yusuke Aoki, Ryohei Banno, and Kazuyuki Shudo. 2019. Effects of a Simple Relay Network on the Bitcoin Network. In Proceedings of the Asian Internet Engineering Conference. 41--46.Google ScholarDigital Library
- A Pinar Ozisik, Gavin Andresen, Brian N Levine, Darren Tapp, George Bissias, and Sunny Katkuri. 2019. Graphene: efficient interactive set reconciliation applied to blockchain propagation. In Proceedings of the ACM Special Interest Group on Data Communication. 303--317.Google ScholarDigital Library
- Slush Pool. 2019. Stratum Mining Protocol. https://slushpool.com/help/stratum-protocol/Google Scholar
- Ruben Recabarren and Bogdan Carbunar. 2017. Hardening stratum, the bitcoin pool mining protocol. Proceedings on Privacy Enhancing Technologies 2017, 3 (2017), 57--74.Google ScholarCross Ref
- Ripple. 2019. Overlay. https://github.com/ripple/rippled/tree/develop/src/ripple/overlayGoogle Scholar
- Ronald L Rivest. 1997. Electronic lottery tickets as micropayments. In International Conference on Financial Cryptography. Springer, 307--314.Google ScholarCross Ref
- Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security.Google Scholar
- Saar Tochner and Aviv Zohar. 2018. How to pick your friends-a game theoretic approach to p2p overlay construction. arXiv preprint arXiv:1810.05447 (2018).Google Scholar
- Muoi Tran, Inho Choi, Gi Jun Moon, Anh V Vu, and Min Suk Kang. 2020. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network. (2020).Google Scholar
- Carmela Troncoso, Marios Isaakidis, George Danezis, and Harry Halpin. 2017. Systematizing decentralization and privacy: Lessons from 15 years of research and deployments. Proceedings on Privacy Enhancing Technologies 2017, 4 (2017), 404--426.Google ScholarCross Ref
- Peter Tschipper. 2016. BUIP010: Xtreme Thinblocks. In Bitcoin Forum (1 January 2016). https://bitco.in/forum/threads/buip010-passed-xtreme-thinblocks, Vol. 774.Google Scholar
- Marie Vasek, Micah Thornton, and Tyler Moore. 2014. Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In International conference on financial cryptography and data security. Springer, 57--71.Google ScholarCross Ref
- Aleksandar Vorkapic. 2018. Secure Blockchain Network Communication using SCION.Google Scholar
- Canhui Wang, Xiaowen Chu, and Qin Yang. 2019. Measurement and analysis of the bitcoin networks: A view from mining pools. arXiv preprint arXiv:1902.07549 (2019).Google Scholar
- Karl Wüst and Arthur Gervais. 2016. Ethereum eclipse attacks. Technical Report. ETH Zurich.Google Scholar
- Beverly Yang and Hector Garcia-Molina. 2003. PPay: micropayments for peer-to-peer systems. In Proceedings of the 10th ACM conference on Computer and communications security. 300--310.Google ScholarDigital Library
- Maxwell Young, Aniket Kate, Ian Goldberg, and Martin Karsten. 2013. Towards practical communication in Byzantine-resistant DHTs. IEEE/ACM Transactions on Networking (ToN) 21, 1 (2013), 190--203.Google ScholarDigital Library
- Alexei Zamyatin, Nicholas Stifter, Philipp Schindler, Edgar R Weippl, and William J Knottenbelt. 2018. Flux: Revisiting Near Blocks for Proof-of-Work Blockchains. IACR Cryptology ePrint Archive 2018 (2018), 415.Google Scholar
Recommendations
SoK: Sharding on Blockchain
AFT '19: Proceedings of the 1st ACM Conference on Advances in Financial TechnologiesBlockchain is a distributed and decentralized ledger for recording transactions. It is maintained and shared among the participating nodes by utilizing cryptographic primitives. A consensus protocol ensures that all nodes agree on a unique order in ...
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
SP '15: Proceedings of the 2015 IEEE Symposium on Security and PrivacyBit coin has emerged as the most successful cryptographic currency in history. Within two years of its quiet launch in 2009, Bit coin grew to comprise billions of dollars of economic value despite only cursory analysis of the system's design. Since then ...
SoK: Money Laundering in Cryptocurrencies
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and SecurityMoney laundering using cryptocurrencies has become increasingly prevalent, and global and national regulatory authorities have announced plans to implement stringent anti-money laundering regulations. In this paper, we examine current anti-money ...
Comments