• Corpus ID: 233168845

A First Look into the Structural Properties and Resilience of Blockchain Overlays

@article{Paphitis2021AFL,
  title={A First Look into the Structural Properties and Resilience of Blockchain Overlays},
  author={Aristodemos Paphitis and Nicolas Kourtellis and Michael Sirivianos},
  journal={ArXiv},
  year={2021},
  volume={abs/2104.03044}
}
Blockchain (BC) systems are highly distributed peer-to-peer networks that offer an alternative to centralized services and promise robustness to coordinated attacks. However, the resilience and overall security of a BC system rests heavily on the structural properties of its underlying peer-to-peer overlay. Despite their success, BC overlay networksโ€™ critical design aspects, connectivity properties and network-layer inter-dependencies are still poorly understood. In this work, we set out toโ€ฆย 
2 Citations
Topology Analysis of the XRP Network
TLDR
The graph-theoretic properties of the XRP Network topology and its temporal characteristics are examined, revealing a small group of nodes that act as a networking backbone and have strong implications for the resilience and safety of theXRP Ledger.
TopoShot: uncovering Ethereum's network topology leveraging replacement transactions
TLDR
TopoShot is presented, a new method uniquely repurposing Ethereum's transaction replacement/eviction policies for topology measurement and results on testnets show interesting graph-theoretic properties, such as all testnets exhibit graph modularity significantly lower than random graphs, implying resilience to network partitions.

References

SHOWING 1-10 OF 70 REFERENCES
Network Layer Aspects of Permissionless Blockchains
TLDR
It is shown that while most design decisions imply certain tradeoffs, there is a lack of models that analyze and formalize these tradeoffs and such models could aid the design of the network layer of permissionless blockchains.
Measuring Ethereum Network Peers
Ethereum, the second-largest cryptocurrency valued at a peak of $138 billion in 2018, is a decentralized, Turing-complete computing platform. Although the stability and security of Ethereum---andโ€ฆ
BTCmap: Mapping Bitcoin Peer-to-Peer Network Topology
  • Varun Deshpande, H. Badis, L. George
  • Computer Science, Mathematics
    2018 IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN)
  • 2018
TLDR
A fast and efficient framework named BTCmap to discover and map the Bitcoin network topology and presents a Bitcoin topology snapshot captured on June 14, 2018, 15:53 CEST and shows that this snapshot is connected.
Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network
TLDR
It is argued that these eclipse-attack vulnerabilities result from Ethereumโ€™s adoption of the Kademlia peer-to-peer protocol, and countermeasures are presented that both harden the network against eclipse attacks and cause it to behave differently from the traditional Kadmlia protocol.
Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network
  • Till Neudecker, Philipp Andelfinger, H. Hartenstein
  • Computer Science
    2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)
  • 2016
TLDR
This paper presents a timing analysis method that targets flooding P2P networks, and proves the possibility of inferring network links of actively participating peers with substantial precision, recall, potentially enabling attacks on the network.
Exploring the Attack Surface of Blockchain: A Comprehensive Survey
TLDR
This paper systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains, and outlines several attacks, including selfish mining, the 51% attack, DNS attacks, distributed denial-of-service (DDoS) attacks, consensus delay, orphaned and stale blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks.
Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic
TLDR
It is shown that Bitcoin is vulnerable to spatial, temporal, spatio-temporal, and logical partitioning attacks with an increased attack feasibility due to network dynamics.
Understanding churn in peer-to-peer networks
TLDR
The understanding of churn is advanced by improving accuracy, comparing different P2P file sharingdistribution systems, and exploring new aspects of churn.
Eclipse Attacks on Bitcoin's Peer-to-Peer Network
TLDR
This work takes a detailed look at bitcoin's peer-to-peer network, and quantifies the resources involved in the attack via probabilistic analysis, Monte Carlo simulations, measurements and experiments with live bitcoin nodes.
SOK: cryptocurrency networking context, state-of-the-art, challenges
TLDR
This paper provides the context, highlighting differences and commonalities with traditional networks, review the state-of-the-art, and identify open research challenges, and presents a structured overview of the field from topology and neighbor discovery to block and transaction propagation.
...
...