skip to main content
research-article

Survey on Blockchain Networking: Context, State-of-the-Art, Challenges

Published:25 May 2021Publication History
Skip Abstract Section

Abstract

Blockchains, in general, and cryptocurrencies such as Bitcoin, in particular, are realized using distributed systems and hence critically rely on the performance and security of the interconnecting network. The requirements on these networks and their usage, however, can differ significantly from traditional communication networks, with implications on all layers of the protocol stack. This article is motivated by these differences and, in particular, by the observation that many fundamental design aspects of these networks are not well-understood today. To support the networking community to contribute to this emerging application domain, we present a structured overview of the field, from topology and neighbor discovery, over block and transaction propagation, to sharding and off-chain networks, also reviewing existing empirical results from different measurement studies. In particular, for each of these domains, we provide the context, highlighting differences and commonalities with traditional networks, review the state-of-the-art, and identify open research challenges. Our article can hence also be seen as a call-to-arms to improve the foundation on top of which blockchains are built.

References

  1. Wuille. [n.d.]. Bitcoin Improvement Proposals Compact Block Relay. Retrieved from https://github.com/bitcoin/bips/blob/master/bip-0152.mediawiki.Google ScholarGoogle Scholar
  2. Wagih. [n.d.]. Outsourcing Route Computation With Trampoline Payments. Retrieved from https://bitcointechweekly.com/front/outsourcing-route-computation-with-trampoline-payments/.Google ScholarGoogle Scholar
  3. Gavin Andresen. 2015. Weak Block Thoughts. Retrieved from https://github.com/ethereum/devp2p/blob/master/caps/eth.md.Google ScholarGoogle Scholar
  4. Maria Apostolaki, Gian Marti, Jan Müller, and Laurent Vanbever. 2018. SABRE: Protecting bitcoin against routing attacks. Retrieved from https://arXiv:1808.06254.Google ScholarGoogle Scholar
  5. Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking bitcoin: Routing attacks on cryptocurrencies. In Proceedings of the IEEE Symposium on Security and Privacy (SP’17). IEEE, 375--392.Google ScholarGoogle ScholarCross RefCross Ref
  6. Georgia Avarikioti, Eleftherios Kokoris Kogias, and Roger Wattenhofer. 2019. Brick: Asynchronous state channels. Retrieved from https://arXiv:1905.11360.Google ScholarGoogle Scholar
  7. Moshe Babaioff, Shahar Dobzinski, Sigal Oren, and Aviv Zohar. 2012. On bitcoin and red balloons. In Proceedings of the 13th ACM Conference on Electronic Commerce. 56--73.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Adam Back, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Timón, and Pieter Wuille. 2014. Enabling blockchain innovations with pegged sidechains. Retrieved from http://www.opensciencereview.com/papers/123/enablingblockchain-innovations-with-pegged-sidechains.Google ScholarGoogle Scholar
  9. Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, and George Danezis. 2017. Consensus in the age of blockchains. Retrieved from https://arXiv:1711.03936.Google ScholarGoogle Scholar
  10. Soumaya Basu, Ittay Eyal, and Emin Gun Sirer. 2016. Falcon: Relay Network for Bitcoin Blocks. Retrieved from https://www.falcon-net.org/.Google ScholarGoogle Scholar
  11. Sami Ben Mariem, Pedro Casas, and Benoît Donnet. 2018. Vivisecting blockchain P2P networks: Unveiling the bitcoin IP network. In Proceedings of the ACM CoNEXT Student Workshop.Google ScholarGoogle Scholar
  12. Alex Biryukov, Dmitry Khovratovich, and Ivan Pustogarov. 2014. Deanonymisation of clients in Bitcoin P2P network. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 15--29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Bitcoin. 2019. P2P Guide. Retrieved from https://bitcoin.org/en/p2p-network-guide.Google ScholarGoogle Scholar
  14. BlueMatt. 2016. FIBRE. Retrieved from http://bitcoinfibre.org/public-network.html.Google ScholarGoogle Scholar
  15. Shaileshh Bojja Venkatakrishnan, Giulia Fanti, and Pramod Viswanath. 2017. Dandelion: Redesigning the bitcoin network for anonymity. Proc. ACM Measure. Anal. Comput. Syst. 1, 1 (2017), 22.Google ScholarGoogle Scholar
  16. Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, and Edward W. Felten. 2015. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In Proceedings of the IEEE Symposium on Security and Privacy (SP’15). IEEE, 104--121.Google ScholarGoogle Scholar
  17. Edward Bortnikov, Maxim Gurevich, Idit Keidar, Gabriel Kliot, and Alexander Shraer. 2009. Brahms: Byzantine resilient random membership sampling. Comput. Netw. 53, 13 (2009), 2340--2359.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Vitalik Buterin. 2016. Ethereum 2.0 mauve paper. In Proceedings of the Ethereum Developer Conference, Vol. 2.Google ScholarGoogle Scholar
  19. Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, and Paulo Veríssimo. 2019. Exploring the Monero peer-to-peer network. IACR Cryptol. ePrint Arch. 2019 (2019), 411.Google ScholarGoogle Scholar
  20. Cardano. 2019. P2P Topology. Retrieved from https://cardanodocs.com/cardano/topology/.Google ScholarGoogle Scholar
  21. Nakul Chawla, Hans Walter Behrens, Darren Tapp, Dragan Boscovic, and K. Selçuk Candan. 2019. Velocity: Scalability improvements in block propagation through rateless erasure coding. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency (ICBC’19). IEEE, 447--454.Google ScholarGoogle Scholar
  22. Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer et al. 2016. On scaling decentralized blockchains. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 106--125.Google ScholarGoogle ScholarCross RefCross Ref
  23. Hung Dang, Tien Tuan Anh Dinh, Dumitrel Loghin, Ee-Chien Chang, Qian Lin, and Beng Chin Ooi. 2019. Towards scaling blockchain systems via sharding. In Proceedings of the International Conference on Management of Data. 123--140.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Proceedings of the IEEE P2P Conference. IEEE, 1--10.Google ScholarGoogle ScholarCross RefCross Ref
  25. Sergi Delgado-Segura, Surya Bakshi, Cristina Pérez-Solà, James Litton, Andrew Pachulski, Andrew Miller, and Bobby Bhattacharjee. 2018. TxProbe: Discovering bitcoin’s network topology using orphan transactions. Retrieved from https://arXiv:1812.00942.Google ScholarGoogle Scholar
  26. Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, and Joan Borrell. 2018. Cryptocurrency networks: A new p2p paradigm. Mobile Info. Syst. 2018 (2018).Google ScholarGoogle Scholar
  27. G. Di Stasi, S. Avallone, R. Canonico, and G. Ventre. 2018. Routing payments on the lightning network. In Proceedings of the IEEE Blockchain Conference. 1161--1170.Google ScholarGoogle Scholar
  28. Joan Antoni Donet, Cristina Pérez-Sola, and Jordi Herrera-Joancomartí. 2014. The bitcoin P2P network. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 87--102.Google ScholarGoogle ScholarCross RefCross Ref
  29. Maya Dotan, Yvonne-Anne Pignolet, Saar Tochner, Stefan Schmid, and Aviv Zohar. 2020. Cryptocurrency networking: Context, state-of-the-art, challenges. In Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES’20).Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Fabio A. Drucker and Lisa K. Fleischer. 2012. Simpler sybil-proof mechanisms for multi-level marketing. In Proceedings of the 13th ACM Conference on Electronic Commerce. 441--458.Google ScholarGoogle Scholar
  31. Kirill Dyagilev, Shie Mannor, and Elad Yom-Tov. 2010. Generative models for rapid information propagation. In Proceedings of the 1st Workshop on Social Media Analytics. 35--43.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Stefan Dziembowski, Lisa Eckey, Sebastian Faust, and Daniel Malinowski. 2017. PERUN: Virtual payment channels over cryptographic currencies. IACR Cryptol. ePrint Arch. 2017 (2017), 635.Google ScholarGoogle Scholar
  33. Parinya Ekparinya, Vincent Gramoli, and Guillaume Jourjon. 2018. Impact of man-in-the-middle attacks on ethereum. In Proceedings of the IEEE 37th Symposium on Reliable Distributed Systems (SRDS’18). IEEE, 11--20.Google ScholarGoogle ScholarCross RefCross Ref
  34. Oğuzhan Ersoy, Zhijie Ren, Zekeriya Erkin, and Reginald L. Lagendijk. 2018. Transaction propagation on permissionless blockchains: Incentive and routing mechanisms. In Proceedings of the Crypto Valley Conference on Blockchain Technology (CVCBT’18). IEEE, 20--30.Google ScholarGoogle Scholar
  35. Ethereum. 2020. Ethereum Wire Protocol. Retrieved from https://github.com/ethereum/devp2p/blob/master/caps/eth.md.Google ScholarGoogle Scholar
  36. Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert Van Renesse. 2016. Bitcoin-ng: A scalable blockchain protocol. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI’16). 45--59.Google ScholarGoogle Scholar
  37. Ittay Eyal and Emin Gün Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In Proceedings of the International Conference on Financial Cryptography and Data Security.Google ScholarGoogle ScholarCross RefCross Ref
  38. Ittay Eyal and Emin Gün Sirer. 2018. Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61, 7 (2018), 95--102.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Giulia Fanti, Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, and Pramod Viswanath. 2018. Dandelion++: Lightweight cryptocurrency networking with formal anonymity guarantees. Proc. ACM Measure. Anal. Comput. Syst. 2, 2 (2018), 29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Sebastian Feld, Mirco Schönfeld, and Martin Werner. 2014. Analyzing the deployment of bitcoin’s P2P network under an AS-level perspective. Procedia Comput. Sci. 32 (2014), 1121--1126.Google ScholarGoogle ScholarCross RefCross Ref
  41. Ryan Fugger. 2004. Money as IOUs in social trust networks & a proposal for a decentralized currency network protocol. Hypertext Document. Retrieved from http://ripple.sourceforge.net.Google ScholarGoogle Scholar
  42. Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert Van Renesse, and Emin Gün Sirer. 2018. Decentralization in bitcoin and ethereum networks. Retrieved from https://arXiv:1801.03998.Google ScholarGoogle Scholar
  43. Adem Efe Gencer, Robbert van Renesse, and Emin Gün Sirer. 2016. Service-oriented sharding with aspen. Retrieved from https://arXiv:1611.06816.Google ScholarGoogle Scholar
  44. Arthur Gervais, Srdjan Capkun, Ghassan O. Karame, and Damian Gruber. 2014. On the privacy provisions of bloom filters in lightweight bitcoin clients. In Proceedings of the 30th Annual Computer Security Applications Conference. 326--335.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. David Goldschlag, Michael Reed, and Paul Syverson. 1999. Onion Routing for Anonymous and Private Internet Connections. Technical Report. Naval Research Lab, Center for High Assurance Computing Systems, Washington, D.C.Google ScholarGoogle Scholar
  47. Michael T. Goodrich and Michael Mitzenmacher. 2011. Invertible bloom lookup tables. In Allerton. IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Matthias Grundmann, Till Neudecker, and Hannes Hartenstein. 2018. Exploiting transaction accumulation and double spends for topology inference in bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 113--126.Google ScholarGoogle Scholar
  49. Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, and Arthur Gervais. 2019. SoK: Off the chain transactions. IACR Cryptol. ePrint Arch. 2019 (2019), 360.Google ScholarGoogle Scholar
  50. Rachid Guerraoui, Florian Huc, and Anne-Marie Kermarrec. 2013. Highly dynamic distributed computing with byzantine failures. In Proceedings of the ACM Symposium on Principles of Distributed Computing. 176--183.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Bernhard Haeupler. 2016. Analyzing network coding (gossip) made easy. J. ACM 63, 3 (2016), 1--22.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on bitcoin’s peer-to-peer network. In Proceedings of the 24th USENIX Security Symposium.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Philipp Hoenisch and Ingo Weber. 2018. Aodv–based routing for payment channel networks. In Proceedings of the International Conference on Blockchain. Springer, 107--124.Google ScholarGoogle ScholarCross RefCross Ref
  54. Muhammad Anas Imtiaz, David Starobinski, Ari Trachtenberg, and Nabeel Younis. 2019. Churn in the bitcoin network: Characterization and impact. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency (ICBC’19). IEEE, 431--439.Google ScholarGoogle ScholarCross RefCross Ref
  55. Bitcoin Inc. 2015. Stratum Mining Protocol. Retrieved from https://en.bitcoin.it/wiki/Stratum_mining_protocol.Google ScholarGoogle Scholar
  56. Bitcoin Inc. 2018. Network. Retrieved from https://en.bitcoin.it/wiki/Network.Google ScholarGoogle Scholar
  57. Mercy O. Jaiyeola, Kyle Patron, Jared Saia, Maxwell Young, and Qian M. Zhou. 2018. Tiny groups tackle Byzantine adversaries. In Proceedings of the IEEE International Parallel and Distributed Processing Symposium (IPDPS’18). IEEE, 1030--1039.Google ScholarGoogle Scholar
  58. Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, and Tyler Moore. 2014. Game-theoretic analysis of DDoS attacks against Bitcoin mining pools. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 72--86.Google ScholarGoogle ScholarCross RefCross Ref
  59. Ghassan O. Karame, Elli Androulaki, and Srdjan Capkun. 2012. Double-spending fast payments in bitcoin. In Proceedings of the ACM Conference on Computer and Communications Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Sunny Katkuri. 2018. A survey of data transfer and storage techniques in prevalent cryptocurrencies and suggested improvements. Retrieved from https://arXiv:1808.03380.Google ScholarGoogle Scholar
  61. Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Proceedings of the Annual International Cryptology Conference. Springer, 357--388.Google ScholarGoogle ScholarCross RefCross Ref
  62. Seoung Kyun Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller, and Michael Bailey. 2018. Measuring Ethereum network peers. In Proceedings of the Internet Measurement Conference. 91--104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Uri Klarman, Soumya Basu, Aleksandar Kuzmanovic, and Emin Gün Sirer. 2018. bloxroute: A scalable trustless blockchain distribution network whitepaper. IEEE Internet Things J. (2018).Google ScholarGoogle Scholar
  64. Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing bitcoin security and performance with strong consistency via collective signing. In Proceedings of the 25th USENIX Security Symposium (USENIX Security’16). 279--296.Google ScholarGoogle Scholar
  65. Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, and Prateek Saxena. 2016. A secure sharding protocol for open blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 17--30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena. 2017. Smartpool: Practical decentralized pooled mining. In Proceedings of the 26th USENIX Security Symposium.Google ScholarGoogle Scholar
  67. Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, and Matteo Maffei. 2017. SilentWhispers: Enforcing security and privacy in credit networks. In Proceedings of the Network and Distributed System Security Symposium.Google ScholarGoogle ScholarCross RefCross Ref
  68. Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, and Matteo Maffei. 2019. Anonymous multi-hop locks for blockchain scalability and interoperability. In Proceedings of the Network and Distributed System Security Symposium (NDSS’19).Google ScholarGoogle ScholarCross RefCross Ref
  69. Alex Manuskin, Michael Mirkin, and Ittay Eyal. 2020. Ostraka: Secure blockchain scaling by node sharding. In Proceedings of the IEEE European Symposium on Security and Privacy Workshops (EuroS&PW’20). IEEE, 397--406.Google ScholarGoogle ScholarCross RefCross Ref
  70. Stefano Martinazzi and Andrea Flori. 2020. The evolving topology of the Lightning Network: Centralization, efficiency, robustness, synchronization, and anonymity. PLoS ONE 15, 1 (2020), e0225966.Google ScholarGoogle ScholarCross RefCross Ref
  71. Petar Maymounkov and David Mazieres. 2002. Kademlia: A peer-to-peer information system based on the xor metric. In Proceedings of the International Workshop on Peer-to-Peer Systems. Springer, 53--65.Google ScholarGoogle ScholarCross RefCross Ref
  72. Patrick McCorry, Surya Bakshi, Iddo Bentov, Sarah Meiklejohn, and Andrew Miller. 2019. Pisa: Arbitration outsourcing for state channels. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies. 16--30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, and Jonathan Katz. 2014. Permacoin: Repurposing bitcoin work for data preservation. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 475--490.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Andrew Miller, James Litton, Andrew Pachulski, Neal Gupta, Dave Levin, Neil Spring, and Bobby Bhattacharjee. 2015. Discovering bitcoin’s public topology and influential nodes. https://www.cs.umd.edu/projects/coinscope/coinscope.pdf.Google ScholarGoogle Scholar
  75. Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, and Ari Juels. 2020. BDoS: Blockchain denial-of-service. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 601--619.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. A. Mizrahi and O. Rottenstreich. 2020. State sharding with space-aware representations. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency (ICBC’20). 1--9. DOI:https://doi.org/10.1109/ICBC48266.2020.9169402Google ScholarGoogle ScholarCross RefCross Ref
  77. Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. 2016. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P’16). IEEE, 305--320.Google ScholarGoogle ScholarCross RefCross Ref
  78. Bitcoin Relay Network. 2017. high-speed block-relay system for miners. Retrieved from http://www.bitcoinrelaynetwork.org/.Google ScholarGoogle Scholar
  79. Till Neudecker. [n.d.]. Characterization of the bitcoin peer-to-peer network (2015--2018). https://dsn.kastel.kit.edu/bitcoin/publications/bitcoin_network_characterization.pdf.Google ScholarGoogle Scholar
  80. Till Neudecker and Hannes Hartenstein. 2017. Could network information facilitate address clustering in Bitcoin? In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 155--169.Google ScholarGoogle ScholarCross RefCross Ref
  81. Till Neudecker and Hannes Hartenstein. 2018. Network layer aspects of permissionless blockchains. IEEE Commun. Surveys Tutor. 21, 1 (2018), 838--857.Google ScholarGoogle ScholarCross RefCross Ref
  82. Till Neudecker and Hannes Hartenstein. 2019. Short paper: An empirical analysis of blockchain forks in bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 84--92.Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Thanh Son Lam Nguyen, Guillaume Jourjon, Maria Potop-Butucaru, and Kim Thai. 2019. Impact of network delays on hyperledger fabric. Retrieved from https://arXiv:1903.08856.Google ScholarGoogle Scholar
  84. Kai Otsuki, Yusuke Aoki, Ryohei Banno, and Kazuyuki Shudo. 2019. Effects of a simple relay network on the bitcoin network. In Proceedings of the Asian Internet Engineering Conference. 41--46.Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. A. Pinar Ozisik, Gavin Andresen, Brian N. Levine, Darren Tapp, George Bissias, and Sunny Katkuri. 2019. Graphene: Efficient interactive set reconciliation applied to blockchain propagation. In Proceedings of the ACM Special Interest Group on Data Communication. 303--317.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Sunoo Park, Krzysztof Pietrzak, Albert Kwon, Joël Alwen, Georg Fuchsbauer, and Peter Gazi. 2018. Spacemint: A cryptocurrency based on proofs of space. In Proceedings of the Conference on Financial Cryptography and Data Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Charles E. Perkins et al. 2001. Ad Hoc Networking. Vol. 1. Addison-Wesley Reading.Google ScholarGoogle Scholar
  88. Slush Pool. 2019. Stratum Mining Protocol. Retrieved from https://slushpool.com/help/stratum-protocol/.Google ScholarGoogle Scholar
  89. Joseph Poon and Thaddeus Dryja. 2016. The bitcoin lightning network: Scalable off-chain instant payments. https://www.bitcoinlightning.com/wp-content/uploads/2018/03/lightning-network-paper.pdf.Google ScholarGoogle Scholar
  90. Pavel Prihodko, Slava Zhigulin, Mykola Sahno, Aleksei Ostrovskiy, and Olaoluwa Osuntokun. 2016. Flare: An approach to routing in lightning network. White Paper (2016).Google ScholarGoogle Scholar
  91. Raiden Homepage. 2019. The Raiden Network. Retrieved from https://raiden.network/.Google ScholarGoogle Scholar
  92. Ruben Recabarren and Bogdan Carbunar. 2017. Hardening stratum, the bitcoin pool mining protocol. Proc. Privacy Enhanc. Technol. 2017, 3 (2017), 57--74.Google ScholarGoogle ScholarCross RefCross Ref
  93. Ripple. 2019. Overlay. Retrieved from https://github.com/ripple/rippled/tree/develop/src/ripple/overlay.Google ScholarGoogle Scholar
  94. Ronald L. Rivest. 1997. Electronic lottery tickets as micropayments. In Proceedings of the International Conference on Financial Cryptography. Springer, 307--314.Google ScholarGoogle ScholarCross RefCross Ref
  95. Elias Rohrer, Julian Malliaris, and Florian Tschorsch. 2019. Discharged payment channels: Quantifying the lightning network’s resilience to topology-based attacks. Retrieved from https://arXiv:1904.10253.Google ScholarGoogle Scholar
  96. Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, and Ian Goldberg. 2017. Settling payments fast and private: Efficient decentralized routing for path-based transactions. Retrieved from https://arXiv:1709.05748.Google ScholarGoogle Scholar
  97. Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal selfish mining strategies in bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security.Google ScholarGoogle Scholar
  98. István András Seres, László Gulyás, Dániel A. Nagy, and Péter Burcsi. 2020. Topological analysis of bitcoin’s lightning network. In Mathematical Research for Blockchain Economy. Springer, 1--12.Google ScholarGoogle Scholar
  99. Vibhaalakshmi Sivaraman, Shaileshh Bojja Venkatakrishnan, Mohammad Alizadeh, Giulia Fanti, and Pramod Viswanath. 2018. Routing cryptocurrency with the spider network. Retrieved from https://arXiv:1809.05088.Google ScholarGoogle Scholar
  100. Weizhao Tang, Weina Wang, Giulia Fanti, and Sewoong Oh. 2019. Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks. Retrieved from https://arXiv:1909.02717.Google ScholarGoogle Scholar
  101. Saar Tochner and Stefan Schmid. 2020. On search friction of route discovery in offchain networks. Retrieved from https://arXiv:2005.14676.Google ScholarGoogle Scholar
  102. Saar Tochner, Stefan Schmid, and Aviv Zohar. 2019. Hijacking routes in payment channel networks: A predictability tradeoff. Retrieved from https://arXiv:1909.06890.Google ScholarGoogle Scholar
  103. Saar Tochner and Aviv Zohar. 2018. How to pick your friends-a game theoretic approach to p2p overlay construction. Retrieved from https://arXiv:1810.05447.Google ScholarGoogle Scholar
  104. Muoi Tran, Inho Choi, Gi Jun Moon, Anh V. Vu, and Min Suk Kang. 2020. A stealthier partitioning attack against bitcoin peer-to-peer network. In IEEE Symposium on Security and Privacy (SP).Google ScholarGoogle ScholarCross RefCross Ref
  105. Carmela Troncoso, Marios Isaakidis, George Danezis, and Harry Halpin. 2017. Systematizing decentralization and privacy: Lessons from 15 years of research and deployments. Proc. Privacy Enhanc. Technol. 2017, 4 (2017), 404--426.Google ScholarGoogle ScholarCross RefCross Ref
  106. Peter Tschipper. 2016. BUIP010: Xtreme thinblocks. Retrieved from https://bitco.in/forum/threads/buip010-passed-xtreme-thinblocks.Google ScholarGoogle Scholar
  107. Stefan Schmid Utz Nisslmueller, Klaus-Tycho Foerster and Christian Decker. 2020. Toward active and passive confidentiality attacks on cryptocurrency off-chain networks. In Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP’20).Google ScholarGoogle ScholarCross RefCross Ref
  108. Marie Vasek, Micah Thornton, and Tyler Moore. 2014. Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 57--71.Google ScholarGoogle ScholarCross RefCross Ref
  109. Aleksandar Vorkapic. 2018. Secure Blockchain Network Communication using SCION. https://www.diva-portal.org/smash/get/diva2:1268555/FULLTEXT01.pdf.Google ScholarGoogle Scholar
  110. Canhui Wang, Xiaowen Chu, and Qin Yang. 2019. Measurement and analysis of the bitcoin networks: A view from mining pools. Retrieved from https://arXiv:1902.07549.Google ScholarGoogle Scholar
  111. Gang Wang, Zhijie Jerry Shi, Mark Nixon, and Song Han. 2019. Sok: Sharding on blockchain. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies. 41--61.Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. Karl Wüst and Arthur Gervais. 2016. Ethereum Eclipse Attacks. Technical Report. ETH Zurich.Google ScholarGoogle Scholar
  113. Beverly Yang and Hector Garcia-Molina. 2003. PPay: Micropayments for peer-to-peer systems. In Proceedings of the 10th ACM Conference on Computer and Communications Security. 300--310.Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. Maxwell Young, Aniket Kate, Ian Goldberg, and Martin Karsten. 2013. Towards practical communication in Byzantine-resistant DHTs. IEEE/ACM Trans. Netw. 21, 1 (2013), 190--203.Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. Mahdi Zamani, Mahnush Movahedi, and Mariana Raykova. 2018. Rapidchain: Scaling blockchain via full sharding. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 931--948.Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. Alexei Zamyatin, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl, and William J. Knottenbelt. 2018. Flux: Revisiting near blocks for proof-of-work blockchains. IACR Cryptol. ePrint Arch. 2018 (2018), 415.Google ScholarGoogle Scholar

Index Terms

  1. Survey on Blockchain Networking: Context, State-of-the-Art, Challenges

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Computing Surveys
            ACM Computing Surveys  Volume 54, Issue 5
            June 2022
            719 pages
            ISSN:0360-0300
            EISSN:1557-7341
            DOI:10.1145/3467690
            Issue’s Table of Contents

            Copyright © 2021 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 25 May 2021
            • Accepted: 1 February 2021
            • Revised: 1 January 2021
            • Received: 1 August 2020
            Published in csur Volume 54, Issue 5

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format