Skip to main content
Top

2022 | OriginalPaper | Chapter

Greedy Networking in Cryptocurrency Blockchain

Authors : Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou, Sang-Yoon Chang

Published in: ICT Systems Security and Privacy Protection

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Proof of work (PoW) is a widely adopted distributed consensus protocol which enables cryptocurrency transaction processing without a trusted third party. The miners are financially incentivized to participate in the PoW consensus protocol, and PoW relies on the underlying peer-to-peer (P2P) networking for receiving and transmitting the transactions and the up-to-date blocks (which are the inputs for the PoW consensus protocol). We study the rational miner strategy but control an orthogonal parameter from those in the previous blockchain research, which has studied the control of the mining power or the timing of the block submissions (e.g., selfish mining or block withholding). More specifically, we study greedy networking, in which a miner node increases its connectivity beyond the default protocol to expedite the deliveries of blocks and transactions for an unfair mining advantage. While greedy networking has been actively studied in the general P2P networking, it has not been systematically studied in cryptocurrency and blockchain despite the alleged real-world instances by the Bitcoin community. We build an analytical framework for greedy networking and study how the networking control impacts the cryptocurrency application to quantify the benefits and costs of the networking control. To demonstrate the use of our framework, we implement a greedy networking prototype based on an active Bitcoin node connected to the Mainnet while simulating different miner capabilities by varying the computing backend of the miner. In contrast to the previous belief in blockchain and cryptocurrency, we discover that the optimal number of connections is bounded (limiting the greedy behavior) and depends on the hash computing capability of the miner.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
For larger values of x, we modify/etc./security/limits.conf to increase the file limit. For our experiments, x is composed of outbound connections only. More concretely, we disable the random inbound connections and control the number of outbound connections for our experimental measurements.
 
Literature
4.
go back to reference Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 375–392. IEEE (2017) Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 375–392. IEEE (2017)
8.
go back to reference Chang, S.Y., Wuthier, S.: Dynamic power control for rational cryptocurrency mining. In: Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, pp. 47–52 (2020) Chang, S.Y., Wuthier, S.: Dynamic power control for rational cryptocurrency mining. In: Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, pp. 47–52 (2020)
10.
go back to reference Drucker, F.A., Fleischer, L.K.: Simpler sybil-proof mechanisms for multi-level marketing. In: Proceedings of the 13th ACM conference on Electronic commerce, pp. 441–458 (2012) Drucker, F.A., Fleischer, L.K.: Simpler sybil-proof mechanisms for multi-level marketing. In: Proceedings of the 13th ACM conference on Electronic commerce, pp. 441–458 (2012)
11.
go back to reference Ersoy, O., Ren, Z., Erkin, Z., Lagendijk, R.L.: Transaction propagation on permissionless blockchains: incentive and routing mechanisms. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 20–30. IEEE (2018) Ersoy, O., Ren, Z., Erkin, Z., Lagendijk, R.L.: Transaction propagation on permissionless blockchains: incentive and routing mechanisms. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 20–30. IEEE (2018)
14.
go back to reference Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: 24th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 15), pp. 129–144 (2015) Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: 24th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 15), pp. 129–144 (2015)
15.
go back to reference Hong, H.J.,et al.: Robust p2p connectivity estimation for permissionless bitcoin network. In: 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS), pp. 1–6. IEEE (2021) Hong, H.J.,et al.: Robust p2p connectivity estimation for permissionless bitcoin network. In: 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS), pp. 1–6. IEEE (2021)
16.
go back to reference Kleinberg, J., Raghavan, P.: Query incentive networks. In: 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS’05), pp. 132–141. IEEE (2005) Kleinberg, J., Raghavan, P.: Query incentive networks. In: 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS’05), pp. 132–141. IEEE (2005)
17.
go back to reference Kwon, Y., Kim, D., Son, Y., Vasserman, E., Kim, Y.: Be selfish and avoid dilemmas: fork after withholding (faw) attacks on bitcoin. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 195–209 (2017) Kwon, Y., Kim, D., Son, Y., Vasserman, E., Kim, Y.: Be selfish and avoid dilemmas: fork after withholding (faw) attacks on bitcoin. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 195–209 (2017)
18.
go back to reference Li, C., Yu, B., Sycara, K.: An incentive mechanism for message relaying in unstructured peer-to-peer systems. Electron. Commer. Res. Appl. 8(6), 315–326 (2009)CrossRef Li, C., Yu, B., Sycara, K.: An incentive mechanism for message relaying in unstructured peer-to-peer systems. Electron. Commer. Res. Appl. 8(6), 315–326 (2009)CrossRef
19.
go back to reference Nakamoto, S.: Bitcoin: A Peer-to-peer Electronic Cash System. Tech. rep, Manubot (2019) Nakamoto, S.: Bitcoin: A Peer-to-peer Electronic Cash System. Tech. rep, Manubot (2019)
28.
go back to reference Zhang, H., Feng, C., Wang, X.: A greedy-based approach of fast transaction broadcasting in bitcoin networks. In: Proceedings of the ACM Turing Celebration Conference-China, pp. 1–5 (2019) Zhang, H., Feng, C., Wang, X.: A greedy-based approach of fast transaction broadcasting in bitcoin networks. In: Proceedings of the ACM Turing Celebration Conference-China, pp. 1–5 (2019)
Metadata
Title
Greedy Networking in Cryptocurrency Blockchain
Authors
Simeon Wuthier
Pranav Chandramouli
Xiaobo Zhou
Sang-Yoon Chang
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-031-06975-8_20

Premium Partner