Characterization of the Bitcoin Peer-to-Peer Network (2015-2018)

Based on measurements performed between 2015 and 2018 we provide a characterization of the Bitcoin P2P network. The characterization enables the parametrization and validation of simulation models and the assessment of the reliability of real-world experiments. Furthermore, the network characterization provides insights into the behavior of peers and their operators. For instance, we provide evidence that Sybil events happened in the past in the Bitcoin P2P network. Additionally, our measurements show that the performance and anonymity of transaction and block propagation has been improved by implementation and protocol changes.

[1]  Liang Wang,et al.  Towards Better Understanding of Bitcoin Unreachable Peers , 2017, ArXiv.

[2]  Maxwell Young,et al.  Proof of Work Without All the Work , 2018, ICDCN.

[3]  Iddo Bentov,et al.  Sprites and State Channels: Payment Networks that Go Faster Than Lightning , 2017, Financial Cryptography.

[4]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[5]  Konrad Jünemann,et al.  Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems , 2015 .

[6]  Till Neudecker Bitcoin Cash (BCH) Sybil Nodes on the Bitcoin Peer-to-Peer Network , 2018 .

[7]  Christian Huitema,et al.  Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs) , 2006, RFC.

[8]  Laurent Vanbever,et al.  Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[9]  Leslie Daigle,et al.  WHOIS Protocol Specification , 2004, RFC.

[10]  Brian E. Carpenter,et al.  Connection of IPv6 Domains via IPv4 Clouds , 2001, RFC.

[11]  Till Neudecker,et al.  Security and Anonymity Aspects of the Network Layer of Permissionless Blockchains , 2019 .

[12]  Christos H. Papadimitriou,et al.  Free-riding and whitewashing in peer-to-peer systems , 2004, IEEE Journal on Selected Areas in Communications.

[13]  Hannes Hartenstein,et al.  Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).

[14]  Tony Bates,et al.  Guidelines for creation, selection, and registration of an Autonomous System (AS) , 1996, RFC.