Efficient topology control of blockchain peer to peer network based on SDN paradigm

Blockchain allows to securely store, using cryptography functions, validated transactions and other data across its peer to peer (P2P) network. This P2P network is generated and maintained by the participating peers in a distributed manner through peer discovery, neighbor selection and managing inbound/outbound connections. As these tasks require extra consumption of network bandwidth, energy, memory and CPU usage, resource-limited devices may not support inherent blockchain applications. Further, changes in the topology control functions or reconfiguration should be considered by all peers to fully benefit from the new performance, which can take time. The aim of this paper is to build a blockchain network in a manner that greatly reduce topology control overhead while guaranteeing the properties such as high flexibility, fast reconfigurability, connectivity, small diameter and clustering. For this, we propose to use the Software-Defined Networking (SDN) paradigm to manage the blockchain P2P network. This way, the topology control tasks are moved off the peers to a secure overlay layer composed of multiple servers having synchronized databases. This new layer is responsible for building and managing the topological structure of the P2P network layer based on random r -out digraphs. Next, we mathematically discuss r -out digraphs generation using binomial distribution and preferential attachment models. Then, and in order to reduce the number of connections per peer, we establish lower and minimum upper bounds on outbound and inbound connections respectively that still guarantee the P2P network feasibility and connectivity. Further, we investigate topological properties of blockchain P2P network such as connectivity, diameter and clustering. Finally, we provide extensive simulation and numerical results to verify the efficiency of our approach and illustrate the effects of centralized topology control on network performance.

[1]  Hubert Ritzdorf,et al.  Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..

[2]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[3]  Salil S. Kanhere,et al.  Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[4]  Zibin Zheng,et al.  Blockchain for Internet of Things: A Survey , 2019, IEEE Internet of Things Journal.

[5]  Yonggang Wen,et al.  A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks , 2018, IEEE Access.

[6]  Jiaqi Yan,et al.  Overview of business innovations and research opportunities in blockchain and introduction to the special issue , 2016, Financial Innovation.

[7]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[8]  Laurent Lefèvre,et al.  A survey on techniques for improving the energy efficiency of large-scale distributed systems , 2014, ACM Comput. Surv..

[9]  Aleksandr Ometov,et al.  An Overview on Blockchain for Smartphones: State-of-the-Art, Consensus, Implementation, Challenges and Future Trends , 2020, IEEE Access.

[10]  Fernando M. V. Ramos,et al.  Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.

[11]  Mudhakar Srivatsa,et al.  Large Scaling Unstructured Peer-to-Peer Networks with Heterogeneity-Aware Topology and Routing , 2006, IEEE Transactions on Parallel and Distributed Systems.

[12]  Yingjie Wang,et al.  A Survey on Privacy Protection of Blockchain: The Technology and Application , 2020, IEEE Access.

[13]  Nancy A. Lynch,et al.  Consensus in the presence of partial synchrony , 1988, JACM.

[14]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[15]  Sooyong Park,et al.  Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.

[16]  Aggelos Kiayias,et al.  Proof-of-Burn , 2020, IACR Cryptol. ePrint Arch..

[17]  Alan M. Frieze,et al.  The diameter of randomly perturbed digraphs and some applications , 2007, International Workshop and International Workshop on Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques.

[18]  Nancy A. Lynch,et al.  Impossibility of distributed consensus with one faulty process , 1985, JACM.

[19]  Jorge Bernal Bernabe,et al.  Privacy-Preserving Solutions for Blockchain: Review and Challenges , 2019, IEEE Access.

[20]  Ying Zhao,et al.  EdgeChain: An Edge-IoT Framework and Prototype Based on Blockchain and Smart Contracts , 2018, IEEE Internet of Things Journal.

[21]  Lin Chen,et al.  On Security Analysis of Proof-of-Elapsed-Time (PoET) , 2017, SSS.

[22]  Alexandru Lavric,et al.  Long Range SigFox Communication Protocol Scalability Analysis Under Large-Scale, High-Density Conditions , 2019, IEEE Access.

[23]  Alex Biryukov,et al.  Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.

[24]  Hakim Badis,et al.  PulSec: Secure Element based framework for sensors anomaly detection in Industry 4.0 , 2019 .