Survey on Blockchain Networking

Blockchains, in general, and cryptocurrencies such as Bitcoin, in particular, are realized using distributed systems and hence critically rely on the performance and security of the interconnecting network. The requirements on these networks and their usage, however, can differ significantly from traditional communication networks, with implications on all layers of the protocol stack. This article is motivated by these differences and, in particular, by the observation that many fundamental design aspects of these networks are not well-understood today. To support the networking community to contribute to this emerging application domain, we present a structured overview of the field, from topology and neighbor discovery, over block and transaction propagation, to sharding and off-chain networks, also reviewing existing empirical results from different measurement studies. In particular, for each of these domains, we provide the context, highlighting differences and commonalities with traditional networks, review the state-of-the-art, and identify open research challenges. Our article can hence also be seen as a call-to-arms to improve the foundation on top of which blockchains are built.

[1]  Ian Goldberg,et al.  Towards Practical Communication in Byzantine-Resistant DHTs , 2013, IEEE/ACM Transactions on Networking.

[2]  Tyler Moore,et al.  Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.

[3]  K. Selçuk Candan,et al.  Velocity: Scalability Improvements in Block Propagation Through Rateless Erasure Coding , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[4]  George Danezis,et al.  Consensus in the Age of Blockchains , 2017, ArXiv.

[5]  Mariana Raykova,et al.  RapidChain: Scaling Blockchain via Full Sharding , 2018, CCS.

[6]  Ori Rottenstreich,et al.  State Sharding with Space-aware Representations , 2020, 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[7]  Laurent Vanbever,et al.  Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[8]  Sunny Katkuri,et al.  A survey of data transfer and storage techniques in prevalent cryptocurrencies and suggested improvements , 2018, ArXiv.

[9]  Edgar R. Weippl,et al.  Flux: Revisiting Near Blocks for Proof-of-Work Blockchains , 2018, IACR Cryptol. ePrint Arch..

[10]  Paul Syverson,et al.  Onion Routing for Anonymous and Private Internet Connections , 1999 .

[11]  Gavin Andresen,et al.  Graphene: efficient interactive set reconciliation applied to blockchain propagation , 2019, SIGCOMM.

[12]  Guillermo Navarro-Arribas,et al.  Cryptocurrency Networks: A New P2P Paradigm , 2018, Mob. Inf. Syst..

[13]  Stefan Dziembowski,et al.  PERUN: Virtual Payment Channels over Cryptographic Currencies , 2017, IACR Cryptol. ePrint Arch..

[14]  Andrew Miller,et al.  Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees , 2018, SIGMETRICS.

[15]  Michael T. Goodrich,et al.  Invertible bloom lookup tables , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[16]  Vincent Gramoli,et al.  Impact of Man-In-The-Middle Attacks on Ethereum , 2018, 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS).

[17]  Hannes Hartenstein,et al.  Network Layer Aspects of Permissionless Blockchains , 2019, IEEE Communications Surveys & Tutorials.

[18]  Giulio Malavolta,et al.  Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability , 2019, NDSS.

[19]  Pieter Wuille,et al.  Enabling Blockchain Innovations with Pegged Sidechains , 2014 .

[20]  Laurent Vanbever,et al.  SABRE: Protecting Bitcoin against Routing Attacks , 2018, NDSS.

[21]  Anne-Marie Kermarrec,et al.  Highly dynamic distributed computing with byzantine failures , 2013, PODC '13.

[22]  Florian Tschorsch,et al.  Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based Attacks , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[23]  Elaine Shi,et al.  Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.

[24]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[25]  Stefan Schmid,et al.  Survey on Cryptocurrency Networking: Context, State-of-the-Art, Challenges , 2020, ArXiv.

[26]  Ian Goldberg,et al.  Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions , 2017, NDSS.

[27]  Ethan Heilman,et al.  Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.

[28]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[29]  David Starobinski,et al.  Churn in the Bitcoin Network: Characterization and Impact , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[30]  Bogdan Carbunar,et al.  Hardening Stratum, the Bitcoin Pool Mining Protocol , 2017, Proc. Priv. Enhancing Technol..

[31]  Emin Gün Sirer,et al.  Decentralization in Bitcoin and Ethereum Networks , 2018, Financial Cryptography.

[32]  Ronald L. Rivest,et al.  Electronic Lottery Tickets as Micropayments , 1997, Financial Cryptography.

[33]  Benoit Donnet,et al.  Vivisecting Blockchain P2P Networks: Unveiling the Bitcoin IP Network , 2018 .

[34]  Hannes Hartenstein,et al.  Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin , 2018, Financial Cryptography Workshops.

[35]  E. Sirer,et al.  bloXroute: A Scalable Trustless Blockchain Distribution Network WHITEPAPER , 2018 .

[36]  Andrew Miller,et al.  Pisa: Arbitration Outsourcing for State Channels , 2019, IACR Cryptol. ePrint Arch..

[37]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[38]  Stefan Schmid,et al.  Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks , 2020, ICISSP.

[39]  Cristina Pérez-Solà,et al.  TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions , 2018, Financial Cryptography.

[40]  Prateek Saxena,et al.  A Secure Sharding Protocol For Open Blockchains , 2016, CCS.

[41]  Tong Cao,et al.  Exploring the Monero Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..

[42]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[43]  Carmela Troncoso,et al.  Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments , 2017, Proc. Priv. Enhancing Technol..

[44]  Stefan Schmid,et al.  On Search Friction of Route Discovery in Offchain Networks , 2020, 2020 IEEE International Conference on Blockchain (Blockchain).

[45]  Emin Gün Sirer,et al.  Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.

[46]  Ghassan O. Karame,et al.  Double-spending fast payments in bitcoin , 2012, CCS.

[47]  László Gulyás,et al.  Topological Analysis of Bitcoin's Lightning Network , 2019, MARBLE.

[48]  Stefano Martinazzi,et al.  The evolving topology of the Lightning Network: Centralization, efficiency, robustness, synchronization, and anonymity , 2020, PloS one.

[49]  Hector Garcia-Molina,et al.  PPay: micropayments for peer-to-peer systems , 2003, CCS '03.

[50]  Ingo Weber,et al.  AODV-Based Routing for Payment Channel Networks , 2018, ICBC.

[51]  Hannes Hartenstein,et al.  Could Network Information Facilitate Address Clustering in Bitcoin? , 2017, Financial Cryptography Workshops.

[52]  Bryan Ford,et al.  Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.

[53]  Bernhard Haeupler,et al.  Analyzing Network Coding (Gossip) Made Easy , 2010, J. ACM.

[54]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[55]  Yusuke Aoki,et al.  Effects of a Simple Relay Network on the Bitcoin Network , 2019, AINTEC '19.

[56]  Aviv Zohar,et al.  How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction , 2018, AFT.

[57]  Qian M. Zhou,et al.  Tiny Groups Tackle Byzantine Adversaries , 2017, 2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS).

[58]  Hannes Hartenstein,et al.  Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin , 2019, Financial Cryptography.

[59]  Lisa Fleischer,et al.  Simple sybil-proof mechanisms for multi-level marketing , 2012, INFOCOM Workshops.

[60]  Jason Teutsch,et al.  SmartPool: Practical Decentralized Pooled Mining , 2017, USENIX Security Symposium.

[61]  Pavel Prihodko,et al.  Flare : An Approach to Routing in Lightning Network White Paper , 2016 .

[62]  Pramod Viswanath,et al.  Dandelion: Redesigning the Bitcoin Network for Anonymity , 2017, Proc. ACM Meas. Anal. Comput. Syst..

[63]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[64]  Stefano Avallone,et al.  Routing Payments on the Lightning Network , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[65]  Andrew Miller,et al.  Discovering Bitcoin ’ s Public Topology and Influential Nodes , 2015 .

[66]  Moshe Babaioff,et al.  On Bitcoin and red balloons , 2011, SECO.

[67]  Idit Keidar,et al.  Brahms: byzantine resilient random membership sampling , 2008, PODC '08.

[68]  Stefan Schmid,et al.  Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff , 2019, ArXiv.

[69]  Sebastian Feld,et al.  Analyzing the Deployment of Bitcoin's P2P Network under an AS-level Perspective , 2014, ANT/SEIT.

[70]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[71]  Giulia Fanti,et al.  Privacy-Utility Tradeoffs in Routing Cryptocurrency over Payment Channel Networks , 2020, SIGMETRICS.

[72]  Shie Mannor,et al.  Generative models for rapid information propagation , 2010, SOMA '10.

[73]  Ghassan O. Karame,et al.  On the privacy provisions of Bloom filters in lightweight bitcoin clients , 2014, IACR Cryptol. ePrint Arch..

[74]  Min Suk Kang,et al.  A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network , 2019, 2020 IEEE Symposium on Security and Privacy (SP).

[75]  Alex Biryukov,et al.  Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.

[76]  Cristina Pérez-Solà,et al.  The Bitcoin P2P Network , 2014, Financial Cryptography Workshops.

[77]  Ee-Chien Chang,et al.  Towards Scaling Blockchain Systems via Sharding , 2018, SIGMOD Conference.

[78]  Kartik Nayak,et al.  Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[79]  Tyler Moore,et al.  Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.

[80]  Zekeriya Erkin,et al.  Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms , 2017, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).

[81]  Maria Gradinariu Potop-Butucaru,et al.  Impact of network delays on Hyperledger Fabric , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[82]  Georg Fuchsbauer,et al.  SpaceMint: A Cryptocurrency Based on Proofs of Space , 2018, ERCIM News.

[83]  Pedro Moreno-Sanchez,et al.  SoK: Off The Chain Transactions , 2019, IACR Cryptol. ePrint Arch..

[84]  Andrew Miller,et al.  Measuring Ethereum Network Peers , 2018, Internet Measurement Conference.

[85]  Ittay Eyal,et al.  Ostraka: Secure Blockchain Scaling by Node Sharding , 2019, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).