Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Survey on Blockchain Networking: Context, State-of-the-Art, Challenges

Published: 25 May 2021 Publication History

Abstract

Blockchains, in general, and cryptocurrencies such as Bitcoin, in particular, are realized using distributed systems and hence critically rely on the performance and security of the interconnecting network. The requirements on these networks and their usage, however, can differ significantly from traditional communication networks, with implications on all layers of the protocol stack. This article is motivated by these differences and, in particular, by the observation that many fundamental design aspects of these networks are not well-understood today. To support the networking community to contribute to this emerging application domain, we present a structured overview of the field, from topology and neighbor discovery, over block and transaction propagation, to sharding and off-chain networks, also reviewing existing empirical results from different measurement studies. In particular, for each of these domains, we provide the context, highlighting differences and commonalities with traditional networks, review the state-of-the-art, and identify open research challenges. Our article can hence also be seen as a call-to-arms to improve the foundation on top of which blockchains are built.

References

[1]
Wuille. [n.d.]. Bitcoin Improvement Proposals Compact Block Relay. Retrieved from https://github.com/bitcoin/bips/blob/master/bip-0152.mediawiki.
[2]
Wagih. [n.d.]. Outsourcing Route Computation With Trampoline Payments. Retrieved from https://bitcointechweekly.com/front/outsourcing-route-computation-with-trampoline-payments/.
[3]
Gavin Andresen. 2015. Weak Block Thoughts. Retrieved from https://github.com/ethereum/devp2p/blob/master/caps/eth.md.
[4]
Maria Apostolaki, Gian Marti, Jan Müller, and Laurent Vanbever. 2018. SABRE: Protecting bitcoin against routing attacks. Retrieved from https://arXiv:1808.06254.
[5]
Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking bitcoin: Routing attacks on cryptocurrencies. In Proceedings of the IEEE Symposium on Security and Privacy (SP’17). IEEE, 375--392.
[6]
Georgia Avarikioti, Eleftherios Kokoris Kogias, and Roger Wattenhofer. 2019. Brick: Asynchronous state channels. Retrieved from https://arXiv:1905.11360.
[7]
Moshe Babaioff, Shahar Dobzinski, Sigal Oren, and Aviv Zohar. 2012. On bitcoin and red balloons. In Proceedings of the 13th ACM Conference on Electronic Commerce. 56--73.
[8]
Adam Back, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Timón, and Pieter Wuille. 2014. Enabling blockchain innovations with pegged sidechains. Retrieved from http://www.opensciencereview.com/papers/123/enablingblockchain-innovations-with-pegged-sidechains.
[9]
Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, and George Danezis. 2017. Consensus in the age of blockchains. Retrieved from https://arXiv:1711.03936.
[10]
Soumaya Basu, Ittay Eyal, and Emin Gun Sirer. 2016. Falcon: Relay Network for Bitcoin Blocks. Retrieved from https://www.falcon-net.org/.
[11]
Sami Ben Mariem, Pedro Casas, and Benoît Donnet. 2018. Vivisecting blockchain P2P networks: Unveiling the bitcoin IP network. In Proceedings of the ACM CoNEXT Student Workshop.
[12]
Alex Biryukov, Dmitry Khovratovich, and Ivan Pustogarov. 2014. Deanonymisation of clients in Bitcoin P2P network. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 15--29.
[13]
Bitcoin. 2019. P2P Guide. Retrieved from https://bitcoin.org/en/p2p-network-guide.
[14]
BlueMatt. 2016. FIBRE. Retrieved from http://bitcoinfibre.org/public-network.html.
[15]
Shaileshh Bojja Venkatakrishnan, Giulia Fanti, and Pramod Viswanath. 2017. Dandelion: Redesigning the bitcoin network for anonymity. Proc. ACM Measure. Anal. Comput. Syst. 1, 1 (2017), 22.
[16]
Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, and Edward W. Felten. 2015. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In Proceedings of the IEEE Symposium on Security and Privacy (SP’15). IEEE, 104--121.
[17]
Edward Bortnikov, Maxim Gurevich, Idit Keidar, Gabriel Kliot, and Alexander Shraer. 2009. Brahms: Byzantine resilient random membership sampling. Comput. Netw. 53, 13 (2009), 2340--2359.
[18]
Vitalik Buterin. 2016. Ethereum 2.0 mauve paper. In Proceedings of the Ethereum Developer Conference, Vol. 2.
[19]
Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, and Paulo Veríssimo. 2019. Exploring the Monero peer-to-peer network. IACR Cryptol. ePrint Arch. 2019 (2019), 411.
[20]
Cardano. 2019. P2P Topology. Retrieved from https://cardanodocs.com/cardano/topology/.
[21]
Nakul Chawla, Hans Walter Behrens, Darren Tapp, Dragan Boscovic, and K. Selçuk Candan. 2019. Velocity: Scalability improvements in block propagation through rateless erasure coding. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency (ICBC’19). IEEE, 447--454.
[22]
Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer et al. 2016. On scaling decentralized blockchains. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 106--125.
[23]
Hung Dang, Tien Tuan Anh Dinh, Dumitrel Loghin, Ee-Chien Chang, Qian Lin, and Beng Chin Ooi. 2019. Towards scaling blockchain systems via sharding. In Proceedings of the International Conference on Management of Data. 123--140.
[24]
Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Proceedings of the IEEE P2P Conference. IEEE, 1--10.
[25]
Sergi Delgado-Segura, Surya Bakshi, Cristina Pérez-Solà, James Litton, Andrew Pachulski, Andrew Miller, and Bobby Bhattacharjee. 2018. TxProbe: Discovering bitcoin’s network topology using orphan transactions. Retrieved from https://arXiv:1812.00942.
[26]
Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, and Joan Borrell. 2018. Cryptocurrency networks: A new p2p paradigm. Mobile Info. Syst. 2018 (2018).
[27]
G. Di Stasi, S. Avallone, R. Canonico, and G. Ventre. 2018. Routing payments on the lightning network. In Proceedings of the IEEE Blockchain Conference. 1161--1170.
[28]
Joan Antoni Donet, Cristina Pérez-Sola, and Jordi Herrera-Joancomartí. 2014. The bitcoin P2P network. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 87--102.
[29]
Maya Dotan, Yvonne-Anne Pignolet, Saar Tochner, Stefan Schmid, and Aviv Zohar. 2020. Cryptocurrency networking: Context, state-of-the-art, challenges. In Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES’20).
[30]
Fabio A. Drucker and Lisa K. Fleischer. 2012. Simpler sybil-proof mechanisms for multi-level marketing. In Proceedings of the 13th ACM Conference on Electronic Commerce. 441--458.
[31]
Kirill Dyagilev, Shie Mannor, and Elad Yom-Tov. 2010. Generative models for rapid information propagation. In Proceedings of the 1st Workshop on Social Media Analytics. 35--43.
[32]
Stefan Dziembowski, Lisa Eckey, Sebastian Faust, and Daniel Malinowski. 2017. PERUN: Virtual payment channels over cryptographic currencies. IACR Cryptol. ePrint Arch. 2017 (2017), 635.
[33]
Parinya Ekparinya, Vincent Gramoli, and Guillaume Jourjon. 2018. Impact of man-in-the-middle attacks on ethereum. In Proceedings of the IEEE 37th Symposium on Reliable Distributed Systems (SRDS’18). IEEE, 11--20.
[34]
Oğuzhan Ersoy, Zhijie Ren, Zekeriya Erkin, and Reginald L. Lagendijk. 2018. Transaction propagation on permissionless blockchains: Incentive and routing mechanisms. In Proceedings of the Crypto Valley Conference on Blockchain Technology (CVCBT’18). IEEE, 20--30.
[35]
Ethereum. 2020. Ethereum Wire Protocol. Retrieved from https://github.com/ethereum/devp2p/blob/master/caps/eth.md.
[36]
Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert Van Renesse. 2016. Bitcoin-ng: A scalable blockchain protocol. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI’16). 45--59.
[37]
Ittay Eyal and Emin Gün Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In Proceedings of the International Conference on Financial Cryptography and Data Security.
[38]
Ittay Eyal and Emin Gün Sirer. 2018. Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61, 7 (2018), 95--102.
[39]
Giulia Fanti, Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, and Pramod Viswanath. 2018. Dandelion++: Lightweight cryptocurrency networking with formal anonymity guarantees. Proc. ACM Measure. Anal. Comput. Syst. 2, 2 (2018), 29.
[40]
Sebastian Feld, Mirco Schönfeld, and Martin Werner. 2014. Analyzing the deployment of bitcoin’s P2P network under an AS-level perspective. Procedia Comput. Sci. 32 (2014), 1121--1126.
[41]
Ryan Fugger. 2004. Money as IOUs in social trust networks & a proposal for a decentralized currency network protocol. Hypertext Document. Retrieved from http://ripple.sourceforge.net.
[42]
Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert Van Renesse, and Emin Gün Sirer. 2018. Decentralization in bitcoin and ethereum networks. Retrieved from https://arXiv:1801.03998.
[43]
Adem Efe Gencer, Robbert van Renesse, and Emin Gün Sirer. 2016. Service-oriented sharding with aspen. Retrieved from https://arXiv:1611.06816.
[44]
Arthur Gervais, Srdjan Capkun, Ghassan O. Karame, and Damian Gruber. 2014. On the privacy provisions of bloom filters in lightweight bitcoin clients. In Proceedings of the 30th Annual Computer Security Applications Conference. 326--335.
[45]
Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security.
[46]
David Goldschlag, Michael Reed, and Paul Syverson. 1999. Onion Routing for Anonymous and Private Internet Connections. Technical Report. Naval Research Lab, Center for High Assurance Computing Systems, Washington, D.C.
[47]
Michael T. Goodrich and Michael Mitzenmacher. 2011. Invertible bloom lookup tables. In Allerton. IEEE.
[48]
Matthias Grundmann, Till Neudecker, and Hannes Hartenstein. 2018. Exploiting transaction accumulation and double spends for topology inference in bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 113--126.
[49]
Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, and Arthur Gervais. 2019. SoK: Off the chain transactions. IACR Cryptol. ePrint Arch. 2019 (2019), 360.
[50]
Rachid Guerraoui, Florian Huc, and Anne-Marie Kermarrec. 2013. Highly dynamic distributed computing with byzantine failures. In Proceedings of the ACM Symposium on Principles of Distributed Computing. 176--183.
[51]
Bernhard Haeupler. 2016. Analyzing network coding (gossip) made easy. J. ACM 63, 3 (2016), 1--22.
[52]
Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on bitcoin’s peer-to-peer network. In Proceedings of the 24th USENIX Security Symposium.
[53]
Philipp Hoenisch and Ingo Weber. 2018. Aodv–based routing for payment channel networks. In Proceedings of the International Conference on Blockchain. Springer, 107--124.
[54]
Muhammad Anas Imtiaz, David Starobinski, Ari Trachtenberg, and Nabeel Younis. 2019. Churn in the bitcoin network: Characterization and impact. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency (ICBC’19). IEEE, 431--439.
[55]
Bitcoin Inc. 2015. Stratum Mining Protocol. Retrieved from https://en.bitcoin.it/wiki/Stratum_mining_protocol.
[56]
Bitcoin Inc. 2018. Network. Retrieved from https://en.bitcoin.it/wiki/Network.
[57]
Mercy O. Jaiyeola, Kyle Patron, Jared Saia, Maxwell Young, and Qian M. Zhou. 2018. Tiny groups tackle Byzantine adversaries. In Proceedings of the IEEE International Parallel and Distributed Processing Symposium (IPDPS’18). IEEE, 1030--1039.
[58]
Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, and Tyler Moore. 2014. Game-theoretic analysis of DDoS attacks against Bitcoin mining pools. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 72--86.
[59]
Ghassan O. Karame, Elli Androulaki, and Srdjan Capkun. 2012. Double-spending fast payments in bitcoin. In Proceedings of the ACM Conference on Computer and Communications Security.
[60]
Sunny Katkuri. 2018. A survey of data transfer and storage techniques in prevalent cryptocurrencies and suggested improvements. Retrieved from https://arXiv:1808.03380.
[61]
Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Proceedings of the Annual International Cryptology Conference. Springer, 357--388.
[62]
Seoung Kyun Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller, and Michael Bailey. 2018. Measuring Ethereum network peers. In Proceedings of the Internet Measurement Conference. 91--104.
[63]
Uri Klarman, Soumya Basu, Aleksandar Kuzmanovic, and Emin Gün Sirer. 2018. bloxroute: A scalable trustless blockchain distribution network whitepaper. IEEE Internet Things J. (2018).
[64]
Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing bitcoin security and performance with strong consistency via collective signing. In Proceedings of the 25th USENIX Security Symposium (USENIX Security’16). 279--296.
[65]
Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, and Prateek Saxena. 2016. A secure sharding protocol for open blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 17--30.
[66]
Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena. 2017. Smartpool: Practical decentralized pooled mining. In Proceedings of the 26th USENIX Security Symposium.
[67]
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, and Matteo Maffei. 2017. SilentWhispers: Enforcing security and privacy in credit networks. In Proceedings of the Network and Distributed System Security Symposium.
[68]
Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, and Matteo Maffei. 2019. Anonymous multi-hop locks for blockchain scalability and interoperability. In Proceedings of the Network and Distributed System Security Symposium (NDSS’19).
[69]
Alex Manuskin, Michael Mirkin, and Ittay Eyal. 2020. Ostraka: Secure blockchain scaling by node sharding. In Proceedings of the IEEE European Symposium on Security and Privacy Workshops (EuroS&PW’20). IEEE, 397--406.
[70]
Stefano Martinazzi and Andrea Flori. 2020. The evolving topology of the Lightning Network: Centralization, efficiency, robustness, synchronization, and anonymity. PLoS ONE 15, 1 (2020), e0225966.
[71]
Petar Maymounkov and David Mazieres. 2002. Kademlia: A peer-to-peer information system based on the xor metric. In Proceedings of the International Workshop on Peer-to-Peer Systems. Springer, 53--65.
[72]
Patrick McCorry, Surya Bakshi, Iddo Bentov, Sarah Meiklejohn, and Andrew Miller. 2019. Pisa: Arbitration outsourcing for state channels. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies. 16--30.
[73]
Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, and Jonathan Katz. 2014. Permacoin: Repurposing bitcoin work for data preservation. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 475--490.
[74]
Andrew Miller, James Litton, Andrew Pachulski, Neal Gupta, Dave Levin, Neil Spring, and Bobby Bhattacharjee. 2015. Discovering bitcoin’s public topology and influential nodes. https://www.cs.umd.edu/projects/coinscope/coinscope.pdf.
[75]
Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, and Ari Juels. 2020. BDoS: Blockchain denial-of-service. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 601--619.
[76]
A. Mizrahi and O. Rottenstreich. 2020. State sharding with space-aware representations. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency (ICBC’20). 1--9.
[77]
Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. 2016. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P’16). IEEE, 305--320.
[78]
Bitcoin Relay Network. 2017. high-speed block-relay system for miners. Retrieved from http://www.bitcoinrelaynetwork.org/.
[79]
Till Neudecker. [n.d.]. Characterization of the bitcoin peer-to-peer network (2015--2018). https://dsn.kastel.kit.edu/bitcoin/publications/bitcoin_network_characterization.pdf.
[80]
Till Neudecker and Hannes Hartenstein. 2017. Could network information facilitate address clustering in Bitcoin? In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 155--169.
[81]
Till Neudecker and Hannes Hartenstein. 2018. Network layer aspects of permissionless blockchains. IEEE Commun. Surveys Tutor. 21, 1 (2018), 838--857.
[82]
Till Neudecker and Hannes Hartenstein. 2019. Short paper: An empirical analysis of blockchain forks in bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 84--92.
[83]
Thanh Son Lam Nguyen, Guillaume Jourjon, Maria Potop-Butucaru, and Kim Thai. 2019. Impact of network delays on hyperledger fabric. Retrieved from https://arXiv:1903.08856.
[84]
Kai Otsuki, Yusuke Aoki, Ryohei Banno, and Kazuyuki Shudo. 2019. Effects of a simple relay network on the bitcoin network. In Proceedings of the Asian Internet Engineering Conference. 41--46.
[85]
A. Pinar Ozisik, Gavin Andresen, Brian N. Levine, Darren Tapp, George Bissias, and Sunny Katkuri. 2019. Graphene: Efficient interactive set reconciliation applied to blockchain propagation. In Proceedings of the ACM Special Interest Group on Data Communication. 303--317.
[86]
Sunoo Park, Krzysztof Pietrzak, Albert Kwon, Joël Alwen, Georg Fuchsbauer, and Peter Gazi. 2018. Spacemint: A cryptocurrency based on proofs of space. In Proceedings of the Conference on Financial Cryptography and Data Security.
[87]
Charles E. Perkins et al. 2001. Ad Hoc Networking. Vol. 1. Addison-Wesley Reading.
[88]
Slush Pool. 2019. Stratum Mining Protocol. Retrieved from https://slushpool.com/help/stratum-protocol/.
[89]
Joseph Poon and Thaddeus Dryja. 2016. The bitcoin lightning network: Scalable off-chain instant payments. https://www.bitcoinlightning.com/wp-content/uploads/2018/03/lightning-network-paper.pdf.
[90]
Pavel Prihodko, Slava Zhigulin, Mykola Sahno, Aleksei Ostrovskiy, and Olaoluwa Osuntokun. 2016. Flare: An approach to routing in lightning network. White Paper (2016).
[91]
Raiden Homepage. 2019. The Raiden Network. Retrieved from https://raiden.network/.
[92]
Ruben Recabarren and Bogdan Carbunar. 2017. Hardening stratum, the bitcoin pool mining protocol. Proc. Privacy Enhanc. Technol. 2017, 3 (2017), 57--74.
[93]
Ripple. 2019. Overlay. Retrieved from https://github.com/ripple/rippled/tree/develop/src/ripple/overlay.
[94]
Ronald L. Rivest. 1997. Electronic lottery tickets as micropayments. In Proceedings of the International Conference on Financial Cryptography. Springer, 307--314.
[95]
Elias Rohrer, Julian Malliaris, and Florian Tschorsch. 2019. Discharged payment channels: Quantifying the lightning network’s resilience to topology-based attacks. Retrieved from https://arXiv:1904.10253.
[96]
Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, and Ian Goldberg. 2017. Settling payments fast and private: Efficient decentralized routing for path-based transactions. Retrieved from https://arXiv:1709.05748.
[97]
Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal selfish mining strategies in bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security.
[98]
István András Seres, László Gulyás, Dániel A. Nagy, and Péter Burcsi. 2020. Topological analysis of bitcoin’s lightning network. In Mathematical Research for Blockchain Economy. Springer, 1--12.
[99]
Vibhaalakshmi Sivaraman, Shaileshh Bojja Venkatakrishnan, Mohammad Alizadeh, Giulia Fanti, and Pramod Viswanath. 2018. Routing cryptocurrency with the spider network. Retrieved from https://arXiv:1809.05088.
[100]
Weizhao Tang, Weina Wang, Giulia Fanti, and Sewoong Oh. 2019. Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks. Retrieved from https://arXiv:1909.02717.
[101]
Saar Tochner and Stefan Schmid. 2020. On search friction of route discovery in offchain networks. Retrieved from https://arXiv:2005.14676.
[102]
Saar Tochner, Stefan Schmid, and Aviv Zohar. 2019. Hijacking routes in payment channel networks: A predictability tradeoff. Retrieved from https://arXiv:1909.06890.
[103]
Saar Tochner and Aviv Zohar. 2018. How to pick your friends-a game theoretic approach to p2p overlay construction. Retrieved from https://arXiv:1810.05447.
[104]
Muoi Tran, Inho Choi, Gi Jun Moon, Anh V. Vu, and Min Suk Kang. 2020. A stealthier partitioning attack against bitcoin peer-to-peer network. In IEEE Symposium on Security and Privacy (SP).
[105]
Carmela Troncoso, Marios Isaakidis, George Danezis, and Harry Halpin. 2017. Systematizing decentralization and privacy: Lessons from 15 years of research and deployments. Proc. Privacy Enhanc. Technol. 2017, 4 (2017), 404--426.
[106]
Peter Tschipper. 2016. BUIP010: Xtreme thinblocks. Retrieved from https://bitco.in/forum/threads/buip010-passed-xtreme-thinblocks.
[107]
Stefan Schmid Utz Nisslmueller, Klaus-Tycho Foerster and Christian Decker. 2020. Toward active and passive confidentiality attacks on cryptocurrency off-chain networks. In Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP’20).
[108]
Marie Vasek, Micah Thornton, and Tyler Moore. 2014. Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 57--71.
[109]
Aleksandar Vorkapic. 2018. Secure Blockchain Network Communication using SCION. https://www.diva-portal.org/smash/get/diva2:1268555/FULLTEXT01.pdf.
[110]
Canhui Wang, Xiaowen Chu, and Qin Yang. 2019. Measurement and analysis of the bitcoin networks: A view from mining pools. Retrieved from https://arXiv:1902.07549.
[111]
Gang Wang, Zhijie Jerry Shi, Mark Nixon, and Song Han. 2019. Sok: Sharding on blockchain. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies. 41--61.
[112]
Karl Wüst and Arthur Gervais. 2016. Ethereum Eclipse Attacks. Technical Report. ETH Zurich.
[113]
Beverly Yang and Hector Garcia-Molina. 2003. PPay: Micropayments for peer-to-peer systems. In Proceedings of the 10th ACM Conference on Computer and Communications Security. 300--310.
[114]
Maxwell Young, Aniket Kate, Ian Goldberg, and Martin Karsten. 2013. Towards practical communication in Byzantine-resistant DHTs. IEEE/ACM Trans. Netw. 21, 1 (2013), 190--203.
[115]
Mahdi Zamani, Mahnush Movahedi, and Mariana Raykova. 2018. Rapidchain: Scaling blockchain via full sharding. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 931--948.
[116]
Alexei Zamyatin, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl, and William J. Knottenbelt. 2018. Flux: Revisiting near blocks for proof-of-work blockchains. IACR Cryptol. ePrint Arch. 2018 (2018), 415.

Cited By

View all
  • (2024)Maintenance Operations on Cloud, Edge, and IoT Environments: Taxonomy, Survey, and Research ChallengesACM Computing Surveys10.1145/365909756:10(1-38)Online publication date: 22-Jun-2024
  • (2024)Assessing Routing Algorithms for Payment Channel NetworksDistributed Ledger Technologies: Research and Practice10.1145/36435663:1(1-27)Online publication date: 18-Mar-2024
  • (2024)Scaling Byzantine Fault-Tolerant Consensus With Optimized Shading SchemeIEEE Transactions on Industrial Informatics10.1109/TII.2023.330399020:3(3401-3412)Online publication date: Mar-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 54, Issue 5
June 2022
719 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/3467690
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 May 2021
Accepted: 01 February 2021
Revised: 01 January 2021
Received: 01 August 2020
Published in CSUR Volume 54, Issue 5

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Blockchains
  2. distributed computing
  3. payment networks

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)245
  • Downloads (Last 6 weeks)20
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Maintenance Operations on Cloud, Edge, and IoT Environments: Taxonomy, Survey, and Research ChallengesACM Computing Surveys10.1145/365909756:10(1-38)Online publication date: 22-Jun-2024
  • (2024)Assessing Routing Algorithms for Payment Channel NetworksDistributed Ledger Technologies: Research and Practice10.1145/36435663:1(1-27)Online publication date: 18-Mar-2024
  • (2024)Scaling Byzantine Fault-Tolerant Consensus With Optimized Shading SchemeIEEE Transactions on Industrial Informatics10.1109/TII.2023.330399020:3(3401-3412)Online publication date: Mar-2024
  • (2024)The Analysis of Financial Network Transaction Risk Control Based on Blockchain and Edge Computing TechnologyIEEE Transactions on Engineering Management10.1109/TEM.2024.336483271(5669-5690)Online publication date: 2024
  • (2024)Blockchain-Enabled Intelligent IoT Protocol for High-Performance and Secured Big Financial Data TransactionIEEE Transactions on Computational Social Systems10.1109/TCSS.2023.326859211:2(1667-1674)Online publication date: Apr-2024
  • (2024)Sharon: Secure and Efficient Cross-shard Transaction Processing via Shard RotationIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621394(2418-2427)Online publication date: 20-May-2024
  • (2024)A Keyless Authentication Based on Zero-Knowledge Proof with SDN Link Information to Secure Permissionless P2P NetworkingICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622724(133-139)Online publication date: 9-Jun-2024
  • (2024)A centrality analysis of the Lightning NetworkTelecommunications Policy10.1016/j.telpol.2023.10269648:2Online publication date: 25-Jun-2024
  • (2024)DFier: A directed vulnerability verifier for Ethereum smart contractsJournal of Network and Computer Applications10.1016/j.jnca.2024.103984(103984)Online publication date: Jul-2024
  • (2024)A storage mechanism of data access record on consortium chain based on master-slave blocksHeliyon10.1016/j.heliyon.2024.e3208810:11(e32088)Online publication date: Jun-2024
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media