AToM: Active topology monitoring for the bitcoin peer-to-peer network

被引:0
|
作者
Federico Franzoni
Xavier Salleras
Vanesa Daza
机构
[1] Universitat Pompeu Fabra,
关键词
Bitcoin; P2P Network; P2P Topology; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Over the past decade, the Bitcoin P2P network protocol has become a reference model for all modern cryptocurrencies. While nodes in this network are known, the connections among them are kept hidden, as it is commonly believed that this helps protect from deanonymization and low-level attacks. However, adversaries can bypass this limitation by inferring connections through side channels. At the same time, the lack of topology information hinders the analysis of the network, which is essential to improve efficiency and security. In this paper, we thoroughly review network-level attacks and empirically show that topology obfuscation is not an effective countermeasure. We then argue that the benefits of an open topology potentially outweigh its risks, and propose a protocol to reliably infer and monitor connections among reachable nodes of the Bitcoin network. We formally analyze our protocol and experimentally evaluate its accuracy in both trusted and untrusted settings. Results show our system has a low impact on the network, and has precision and recall are over 90% with up to 20% of malicious nodes in the network.
引用
收藏
页码:408 / 425
页数:17
相关论文
共 50 条
  • [21] Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-to-Peer Network
    Sallal, Muntadher
    Owenson, Gareth
    Adda, Mo
    2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (IEEE ICBC), 2020,
  • [22] Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer Network
    Fadhil, Muntadher
    Owen, Gareth
    Adda, Mo
    2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, : 2411 - 2416
  • [23] Security and Performance Evaluation of Master Node Protocol in the Bitcoin Peer-to-Peer Network
    Sallal, Muntadher
    Owenson, Gareth
    Adda, Mo
    2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 980 - 985
  • [24] Monitoring Social Centrality for Peer-To-Peer Network Protection
    Kas, Miray
    Carley, L. Richard
    Carley, Kathleen M.
    IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (12) : 155 - 161
  • [25] ZeroLender: Trustless Peer-to-Peer Bitcoin Lending Platform
    Xie, Yi
    Holmes, Joshua
    Dagher, Gaby G.
    PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020, 2020, : 247 - 258
  • [26] Analyzing Preferential Attachment in Peer-to-Peer BITCOIN Networks
    Aw, Ee Hong
    Gera, Ralucca
    Hicks, Kenneth
    Koeppen, Nicholas
    Teska, Christopher
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2018, : 1242 - 1249
  • [27] Concepts and Types of Peer-to-Peer Network Topology for Live Video Streaming
    AlTuhafi, Ammar Waysi
    Ramadass, Sureswaran
    Chong, Yung-Wey
    2013 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2013,
  • [28] WIND: A Scalable and Lightweight Network Topology Service for Peer-to-Peer Applications
    Liu, Hongqiang
    Xiong, Yongqiang
    Bao, Congxiao
    Li, Xing
    Shen, Guobin
    Li, Dan
    PROCEEDINGS OF THE 2010 IEEE-IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2010, : 797 - 800
  • [29] Analysis of Large-Scale Hybrid Peer-to-Peer Network Topology
    Xie, Chao
    Pan, Yi
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [30] Three-Tier Delaunay Network as a Topology for Peer-to-Peer Overlay
    Fujita, Satoshi
    JOURNAL OF INTERCONNECTION NETWORKS, 2019, 19 (04)