Skip to main content
Top

2022 | OriginalPaper | Chapter

Blockchain Peer-to-Peer Network: Performance and Security

Authors : Phuc D. Thai, Minh Doan, Wei Liu, Tianming Liu, Sheng Li, Hong-sheng Zhou, Thang N. Dinh

Published in: Handbook on Blockchain

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mistrusting nodes in a blockchain can reach consensus without the need of a trusted central entity. Instead, the nodes reach consensus through exchanging information on a peer-to-peer (P2P) network, without pre-established identities. Serving as the foundation of the blockchain, the P2P network plays critical roles in all performance and security aspects of the blockchain system. While P2P networks had been previously examined for many applications domains, including the file sharing systems, there is relatively less understanding on blockchain P2P networks that differs substantially from traditional P2P systems. In this chapter, we will cover different aspects of blockchain P2P networks from topology, peer discovery, known attacks, and defenses to improvement proposals to increase the throughput and reduce the latency in blockchain. Finally, we investigate theoretical limit on the throughput of blockchain systems in which nodes have heterogeneous capacities. We provide insights and discussion on how to construct a network to achieve the maximum theoretical limit in throughput.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
2
In Ethereum, the invite messages are equivalent to the NewBlockHashes or NewPooledTransactionHashes messages.
 
3
According to Bitcoin historical data [39], at the time of this writing (April 2021), the average block size is 1.08 MB and the average transaction size is 459 B.
 
Literature
1.
go back to reference Swan, M.: Blockchain: blueprint for a new economy. O’Reilly Media, Inc. (2015) Swan, M.: Blockchain: blueprint for a new economy. O’Reilly Media, Inc. (2015)
2.
go back to reference Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008) Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
4.
go back to reference Chen, Y., Bellavitis, C.: Blockchain disruption and decentralized finance: the rise of decentralized business models. J. Bus. Ventur. Insights 13, e00151 (2020)CrossRef Chen, Y., Bellavitis, C.: Blockchain disruption and decentralized finance: the rise of decentralized business models. J. Bus. Ventur. Insights 13, e00151 (2020)CrossRef
5.
go back to reference Dinh, T.N., Thai, M.T.: Ai and blockchain: a disruptive integration. Computer 51(9), 48–53 (2018)CrossRef Dinh, T.N., Thai, M.T.: Ai and blockchain: a disruptive integration. Computer 51(9), 48–53 (2018)CrossRef
6.
go back to reference Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)CrossRef Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)CrossRef
7.
go back to reference Huckle, S., Bhattacharya, R., White, M., Beloff, N.: Internet of things, blockchain and shared economy applications. Proc. Comput. Sci. 98, 461–466 (2016)CrossRef Huckle, S., Bhattacharya, R., White, M., Beloff, N.: Internet of things, blockchain and shared economy applications. Proc. Comput. Sci. 98, 461–466 (2016)CrossRef
8.
go back to reference Yue, X., Wang, H., Jin, D., Li, M., Jiang, W.: Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40(10), 218 (2016)CrossRef Yue, X., Wang, H., Jin, D., Li, M., Jiang, W.: Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40(10), 218 (2016)CrossRef
9.
go back to reference Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: using blockchain for medical data access and permission management. In: International Conference on Open and Big Data (OBD), pp. 25–30. IEEE (2016) Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: using blockchain for medical data access and permission management. In: International Conference on Open and Big Data (OBD), pp. 25–30. IEEE (2016)
10.
go back to reference Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: 2013 IEEE Thirteenth International Conference on Peer-to-Peer Computing (P2P), pp. 1–10. IEEE (2013) Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: 2013 IEEE Thirteenth International Conference on Peer-to-Peer Computing (P2P), pp. 1–10. IEEE (2013)
11.
go back to reference Klarman, U., Basu, S., Kuzmanovic, A., Sirer, E.G.: Bloxroute: a scalable trustless blockchain distribution network whitepaper. IEEE Internet of Things J. (2018) Klarman, U., Basu, S., Kuzmanovic, A., Sirer, E.G.: Bloxroute: a scalable trustless blockchain distribution network whitepaper. IEEE Internet of Things J. (2018)
12.
go back to reference Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3–16 (2016) Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3–16 (2016)
13.
go back to reference Kumar, R., Ross, K.W.: Peer-assisted file distribution: the minimum distribution time. In: 1st IEEE Workshop on Hot Topics in Web Systems and Technologies: HOTWEB’06, vol. 2006, pp. 1–11. IEEE (2006) Kumar, R., Ross, K.W.: Peer-assisted file distribution: the minimum distribution time. In: 1st IEEE Workshop on Hot Topics in Web Systems and Technologies: HOTWEB’06, vol. 2006, pp. 1–11. IEEE (2006)
14.
go back to reference Castro, M., Druschel, P., Kermarrec, A.-M., Nandi, A., Rowstron, A., Singh, A.: Splitstream: high-bandwidth multicast in cooperative environments. ACM SIGOPS Oper. Syst. Rev. 37(5), 298–313 (2003)CrossRef Castro, M., Druschel, P., Kermarrec, A.-M., Nandi, A., Rowstron, A., Singh, A.: Splitstream: high-bandwidth multicast in cooperative environments. ACM SIGOPS Oper. Syst. Rev. 37(5), 298–313 (2003)CrossRef
15.
go back to reference Liu, S., Chen, M., Sengupta, S., Chiang, M., Li, J., Chou, P.A.: P2p streaming capacity under node degree bound. In: 2010 IEEE 30th International Conference on Distributed Computing Systems, pp. 587–598. IEEE (2010) Liu, S., Chen, M., Sengupta, S., Chiang, M., Li, J., Chou, P.A.: P2p streaming capacity under node degree bound. In: 2010 IEEE 30th International Conference on Distributed Computing Systems, pp. 587–598. IEEE (2010)
16.
go back to reference Maymounkov, P., Mazieres, D.: Kademlia: a peer-to-peer information system based on the xor metric. In: International Workshop on Peer-to-Peer Systems, pp. 53–65. Springer (2002) Maymounkov, P., Mazieres, D.: Kademlia: a peer-to-peer information system based on the xor metric. In: International Workshop on Peer-to-Peer Systems, pp. 53–65. Springer (2002)
17.
go back to reference Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing, pp. 329–350. Springer (2001) Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing, pp. 329–350. Springer (2001)
18.
go back to reference Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Comput. Commun. Rev. 31(4), 149–160 (2001)CrossRef Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Comput. Commun. Rev. 31(4), 149–160 (2001)CrossRef
22.
go back to reference Essaid, M., Park, S., Ju, H.-T.: Bitcoin’s dynamic peer-to-peer topology. Int. J. Netw. Manag. 30(5), e2106 (2020)CrossRef Essaid, M., Park, S., Ju, H.-T.: Bitcoin’s dynamic peer-to-peer topology. Int. J. Netw. Manag. 30(5), e2106 (2020)CrossRef
23.
go back to reference Mariem, S.B., Casas, P., Romiti, M., Donnet, B., Stütz, R., Haslhofer, B.: All that glitters is not bitcoin–unveiling the centralized nature of the btc (ip) network. In NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, pp. 1–9. IEEE (2020) Mariem, S.B., Casas, P., Romiti, M., Donnet, B., Stütz, R., Haslhofer, B.: All that glitters is not bitcoin–unveiling the centralized nature of the btc (ip) network. In NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, pp. 1–9. IEEE (2020)
24.
go back to reference Gao, Y., Shi, J., Wang, X., Tan, Q., Zhao, C., Yin, Z.: Topology measurement and analysis on ethereum p2p network. In: IEEE Symposium on Computers and Communications (ISCC), vol. 2019, pp. 1–7. IEEE (2019) Gao, Y., Shi, J., Wang, X., Tan, Q., Zhao, C., Yin, Z.: Topology measurement and analysis on ethereum p2p network. In: IEEE Symposium on Computers and Communications (ISCC), vol. 2019, pp. 1–7. IEEE (2019)
25.
go back to reference Kim, S.K., Ma, Z., Murali, S., Mason, J., Miller, A., Bailey, M.: Measuring ethereum network peers. In: Proceedings of the Internet Measurement Conference, vol. 2018, pp. 91–104 (2018) Kim, S.K., Ma, Z., Murali, S., Mason, J., Miller, A., Bailey, M.: Measuring ethereum network peers. In: Proceedings of the Internet Measurement Conference, vol. 2018, pp. 91–104 (2018)
27.
go back to reference Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: 24th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 15), pp. 129–144 (2015) Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: 24th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 15), pp. 129–144 (2015)
28.
go back to reference Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In: IEEE European Symposium on Security and Privacy (EuroS &P), vol. 2016, pp. 305–320. IEEE (2016) Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In: IEEE European Symposium on Security and Privacy (EuroS &P), vol. 2016, pp. 305–320. IEEE (2016)
29.
go back to reference Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: International Conference on Financial Cryptography and Data Security, pp. 436–454. Springer (2014) Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: International Conference on Financial Cryptography and Data Security, pp. 436–454. Springer (2014)
30.
go back to reference Wüst, K., Gervais, A.: Ethereum eclipse attacks. Technical Report, ETH Zurich (2016) Wüst, K., Gervais, A.: Ethereum eclipse attacks. Technical Report, ETH Zurich (2016)
31.
go back to reference Marcus, Y., Heilman, E., Goldberg, S.: Low-resource eclipse attacks on ethereum’s peer-to-peer network. IACR Cryptol. ePrint Arch. 2018, 236 (2018) Marcus, Y., Heilman, E., Goldberg, S.: Low-resource eclipse attacks on ethereum’s peer-to-peer network. IACR Cryptol. ePrint Arch. 2018, 236 (2018)
32.
go back to reference Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: IEEE Symposium on Security and Privacy (SP), vol. 2017, pp. 375–392. IEEE (2017) Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: IEEE Symposium on Security and Privacy (SP), vol. 2017, pp. 375–392. IEEE (2017)
33.
34.
go back to reference Ekparinya, P., Gramoli, V., Jourjon, G.: Impact of man-in-the-middle attacks on ethereum. In: IEEE 37th Symposium on Reliable Distributed Systems (SRDS), vol. 2018, pp. 11–20. IEEE (2018) Ekparinya, P., Gramoli, V., Jourjon, G.: Impact of man-in-the-middle attacks on ethereum. In: IEEE 37th Symposium on Reliable Distributed Systems (SRDS), vol. 2018, pp. 11–20. IEEE (2018)
35.
go back to reference Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin p2p network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 15–29 (2014) Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin p2p network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 15–29 (2014)
36.
go back to reference Neudecker, T., Hartenstein, H.: Could network information facilitate address clustering in bitcoin? In: International Conference on Financial Cryptography and Data Security, pp. 155–169. Springer (2017) Neudecker, T., Hartenstein, H.: Could network information facilitate address clustering in bitcoin? In: International Conference on Financial Cryptography and Data Security, pp. 155–169. Springer (2017)
37.
go back to reference Bojja Venkatakrishnan, S., Fanti, G., Viswanath, P.: Dandelion: redesigning the bitcoin network for anonymity. In: Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol. 1, no. 1, p. 22 (2017) Bojja Venkatakrishnan, S., Fanti, G., Viswanath, P.: Dandelion: redesigning the bitcoin network for anonymity. In: Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol. 1, no. 1, p. 22 (2017)
38.
go back to reference Fanti, G., Venkatakrishnan, S.B., Bakshi, S., Denby, B., Bhargava, S., Miller, A., Viswanath, P.: Dandelion++ lightweight cryptocurrency networking with formal anonymity guarantees. Proc. ACM Meas. Anal. Comput. Syst. 2(2), 1–35 (2018)CrossRef Fanti, G., Venkatakrishnan, S.B., Bakshi, S., Denby, B., Bhargava, S., Miller, A., Viswanath, P.: Dandelion++ lightweight cryptocurrency networking with formal anonymity guarantees. Proc. ACM Meas. Anal. Comput. Syst. 2(2), 1–35 (2018)CrossRef
40.
go back to reference Naumenko, G., Maxwell, G., Wuille, P., Fedorova, S., Beschastnikh, I.: Bandwidth-efficient transaction relay for bitcoin (2019). arXiv:1905.10518 Naumenko, G., Maxwell, G., Wuille, P., Fedorova, S., Beschastnikh, I.: Bandwidth-efficient transaction relay for bitcoin (2019). arXiv:​1905.​10518
41.
go back to reference Pass, R., Seeman, L., Shelat, A.: Analysis of the blockchain protocol in asynchronous networks. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 643–673. Springer (2017) Pass, R., Seeman, L., Shelat, A.: Analysis of the blockchain protocol in asynchronous networks. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 643–673. Springer (2017)
42.
go back to reference Nagayama, R., Banno, R., Shudo, K.: Identifying impacts of protocol and internet development on the bitcoin network. In: IEEE Symposium on Computers and Communications (ISCC), vol. 2020, pp. 1–6. IEEE (2020) Nagayama, R., Banno, R., Shudo, K.: Identifying impacts of protocol and internet development on the bitcoin network. In: IEEE Symposium on Computers and Communications (ISCC), vol. 2020, pp. 1–6. IEEE (2020)
43.
Metadata
Title
Blockchain Peer-to-Peer Network: Performance and Security
Authors
Phuc D. Thai
Minh Doan
Wei Liu
Tianming Liu
Sheng Li
Hong-sheng Zhou
Thang N. Dinh
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-031-07535-3_2

Premium Partner