Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0140

The Dilemma of Parameterizing Propagation Time in Blockchain P2P Network  

Rahmadika, Sandi (Interdisciplinary Program of Information Security, Graduate School, Pukyong National University)
Noh, Siwan (Interdisciplinary Program of Information Security, Graduate School, Pukyong National University)
Lee, Kyeongmo (Interdisciplinary Program of Information Security, Graduate School, Pukyong National University)
Kweka, Bruno Joachim (Interdisciplinary Program of Information Security, Graduate School, Pukyong National University)
Rhee, Kyung-Hyune (Dept. of IT Convergence and Application Engineering, Pukyong National University)
Publication Information
Journal of Information Processing Systems / v.16, no.3, 2020 , pp. 699-717 More about this Journal
Abstract
Propagation time on permissionless blockchain plays a significant role in terms of stability and performance in the decentralized systems. A large number of activities are disseminated to the whole nodes in the decentralized peer-to-peer network, thus causing propagation delay. The stability of the system is our concern in the first place. The propagation delay opens up opportunities for attackers to apply their protocol. Either by accelerating or decelerating the propagation time directly without proper calculation, it brings numerous negative impacts to the entire blockchain system. In this paper, we thoroughly review and elaborate on several parameters related to the propagation time in such a system. We describe our findings in terms of data communication, transaction propagation, and the possibility of an interference attack that caused an extra propagation time. Furthermore, we present the influence of block size, consensus, and blockchain scalability, including the relation of parameters. In the last session, we remark several points associated with the propagation time and use cases to avoid dilemmas in the light of the experiments and literary works.
Keywords
Blockchain; Block Size; Decentralized System; Peer-to-Peer Network; Transaction Propagation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 X. Liu, W. Wang, D. Niyato, N. Zhao, and P. Wang, "Evolutionary game for mining pool selection in blockchain networks," IEEE Wireless Communications Letters, vol. 7, no. 5, pp. 760-763, 2018.   DOI
2 A. Kiayias and G. Panagiotakos, "Speed-security tradeoffs in blockchain protocols," IACR Cryptology ePrint Archive, vol. 2015, article no. 1019, 2015.
3 Z. Xiong, S. Feng, D. Niyato, P. Wang, and Z. Han, "Optimal pricing-based edge computing resource management in mobile blockchain," 2017 [Online]. Available: https://arxiv.org/abs/1711.01049.
4 R. Schollmeier, "A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications," in Proceedings of the 1st International Conference on Peer-to-Peer Computing, Linkoping, Sweden, 2001, pp. 101-102.
5 M. Hearn, "Bitcoinj: a Java implementation of a bitcoin client," 2013 [Online]. Available: https://bitcoinj.github.io/.
6 S. Wei, S. Li, P. Liu, and M. Liu, "BAVP: blockchain-based access verification protocol in LEO constellation using IBE keys," Security and Communication Networks, vol. 2018, article no. 7202806, 2018.
7 X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems," IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 365-378, 2009.   DOI
8 H. Yang, H. Kim, and K. Mtonga, "An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system," Peer-to-Peer Networking and Applications, vol. 8, no. 6, pp. 1059-1069, 2015.   DOI
9 M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," in Advances in Cryptology - EUROCRYPT'98. Heidelberg: Springer, 1998, pp. 127-144.
10 R. Canetti and S. Hohenberger, "Chosen-ciphertext secure proxy re-encryption," in Proceedings of the 14th ACM conference on Computer and Communications Security, Alexandria, VA, 2007, pp. 185-194.
11 C. Sur, C. D. Jung, Y. Park, and K. H. Rhee, "Chosen-ciphertext secure certificateless proxy re-encryption," in Communications and Multimedia Security. Heidelberg: Springer, 2010, pp. 214-232.
12 S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer, "Kerberos authentication and authorization system (Project Athena Technical Plan, Section E.2.1)," 1988 [Online]. Available: http://web.mit.edu/Saltzer/www/publications/atp.html.
13 S. Nakamoto, "Bitcoin: a peer-to-peer electronic cash system," 2008 [Online]. Available: https://git.dhimmel.com/bitcoin-whitepaper/.
14 E. K. Kogias, P. Jovanovic, N. Gailly, I. Khoffi, L. Gasser, and B. Ford, "Enhancing bitcoin security and performance with strong consistency via collective signing," in Proceedings of the 25th USENIX Security Symposium, Austin, TX, 2016, pp. 279-296.
15 S. Feld, M. Schonfeld, and M. Werner, "Analyzing the deployment of Bitcoin's P2P network under an ASlevel perspective," Procedia Computer Science, vol. 32, pp. 1121-1126, 2014.   DOI
16 M. Fadhil, G. Owenson, and M. Adda, "A bitcoin model for evaluation of clustering to improve propagation delay in bitcoin network," in Proceedings of 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th International Symposium on Distributed Computing and Applications for Business Engineering (DCABES), Paris, France, 2016, pp. 468-475.
17 A. Ouaddah, A. Abou Elkalam, and A. A. Ouahman, "Towards a novel privacy-preserving access control model based on blockchain technology in IoT," in Europe and MENA Cooperation Advances in Information and Communication Technologies. Cham: Springer, 2017, pp. 523-533.
18 Q. Xia, E. B. Sifah, A. Smahi, S. Amofa, and X. Zhang, "BBDS: blockchain-based data sharing for electronic medical records in cloud environments," Information, vol. 8, article no. 44, 2017.
19 M. Fadhil, G. Owenson, and M. Adda, "Locality based approach to improve propagation delay on the bitcoin peer-to-peer network," in Proceedings of 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal, 2017, pp. 556-559.
20 M. Fadhil, G. Owen, and M. Adda, "Bitcoin network measurements for simulation validation and parameterization," in Proceedings of the 11th International Network Conference - INC2016. Plymouth, UK: University of Plymouth, 2016, pp. 109-114.
21 C. Decker and R. Wattenhofer, "Information propagation in the bitcoin network," in Proceedings of IEEE International Conference on Peer-to-Peer Computing, Trento, Italy, 2013, pp. 1-10.
22 Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, "An overview of blockchain technology: architecture, consensus, and future trends," in Proceedings of 2017 IEEE International Congress on Big Data, Honolulu, HI, 2017, pp. 557-564.
23 C. Decker and R. Wattenhofer, "Bitcoin transaction malleability and MtGox," in Computer Security - ESORICS 2014. Cham: Springer, 2014, pp. 313-326.
24 D. Di Francesco Maesa, P. Mori, and L. Ricci, "Blockchain based access control," in Distributed Applications and Interoperable Systems. Cham: Springer, 2017, pp. 206-220.
25 J. Poon and T. Dryja, "The bitcoin lightning network: scalable off-chain instant payments," 2016 [Online]. Available: https://www.bitcoinlightning.com/wp-content/uploads/2018/03/lightning-network-paper.pdf.
26 G. Gutoski and D. Stebila, "Hierarchical deterministic bitcoin wallets that tolerate key leakage," in Financial Cryptography and Data Security. Heidelberg: Springer, 2015, pp. 497-504.
27 R. Dennis and G. Owen, "Rep on the block: a next generation reputation system based on the Blockchain," in Proceedings of 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK, 2015, pp. 131-138.
28 X. Xu, I. Weber, M. Staples, L. Zhu, J. Bosch, L. Bass, C. Pautasso, and P. Rimba, "A taxonomy of blockchain-based systems for architecture design," in Proceedings of 2017 IEEE International Conference on Software Architecture (ICSA), Gothenburg, Sweden, 2017, pp. 243-252.
29 S. Rahmadika, K. Lee, and K. H. Rhee, "Blockchain-enabled 5G autonomous vehicular networks," in Proceedings of 2019 International Conference on Sustainable Engineering and Creative Computing (ICSECC), Bandung, Indonesia, 2019, pp. 275-280.
30 Y. Sompolinsky and A. Zohar, "Accelerating Bitcoin's transaction processing: fast money grows on trees, not chains," IACR Cryptology ePrint Archive, vol. 2013, article no. 881, 2013.
31 S. Rahmadika and K. H. Rhee, "Blockchain technology for providing an architecture model of decentralized personal health information," International Journal of Engineering Business Management, 2018. https://doi.org/10.1177%2F1847979018790589
32 I. Eyal and E. G. Sirer, "Majority is not enough: Bitcoin mining is vulnerable," in financial Cryptography and Data Security. Heidelberg: Springer, 2014, pp. 436-454.
33 A. Sapirshtein, Y. Sompolinsky, and A. Zohar, "Optimal selfish mining strategies in bitcoin," in Financial Cryptography and Data Security. Heidelberg: Springer, 2016, pp. 515-532.
34 E. Heilman, "One weird trick to stop selfish miners: fresh bitcoins, a solution for the honest miner," in Financial Cryptography and Data Security. Heidelberg: Springer, 2014, pp. 161-162.
35 S. Rahmadika, B. J. Kweka, H. Kim, and K. Rhee, "A scoping review in defend against selfish mining attack in bitcoin," IT Convergence Practice, vol. 6, no. 3, pp. 18-26, 2018.
36 V. Gramoli, "From blockchain consensus back to byzantine consensus," Future Generation Computer Systems, vol.107, pp. 760-769, 2020.   DOI
37 N. Z. Aitzhan and D. Svetinovic, "Security and privacy in decentralized energy trading through multisignatures, blockchain and anonymous messaging streams," IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 5, pp. 840-852, 2016.   DOI
38 H. M. Kim and M. Laskowski, "Toward an ontology-driven blockchain design for supply-chain provenance," Intelligent Systems in Accounting, Finance and Management, vol. 25, no. 1, pp. 18-27, 2018.   DOI
39 S. Rahmadika and K. H. Rhee, "Toward privacy-preserving shared storage in untrusted blockchain P2P networks," Wireless Communications and Mobile Computing, vol. 2019, article no. 6219868, 2019.
40 A. H. Lone and R. N. Mir, "Forensic-chain: Ethereum blockchain based digital forensics chain of custody," Scientific and Practical Cyber Security Journal, vol. 1, no. 2, pp. 21-27, 2018.
41 S. Rahmadika and K. H. Rhee, "Preliminary of selfish mining strategy on the decentralized model of personal health information," in Advanced Multimedia and Ubiquitous Engineering. Singapore: Springer, 2018, pp. 679-685.
42 A. Gervais, H. Ritzdorf, G. O. Karame, and S. Capkun, "Tampering with the delivery of blocks and transactions in bitcoin," in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, 2015, pp. 692-705.
43 A. Gervais, G. O. Karame, K. Wust, V. Glykantzis, H. Ritzdorf, and S. Capkun, "On the security and performance of proof of work blockchains," in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 2016, pp. 3-16.
44 M. Apostolaki, A. Zohar, and L. Vanbever, "Hijacking bitcoin: routing attacks on cryptocurrencies," in Proceedings of 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, 2017, pp. 375-392.
45 R. Khalil and A. Gervais, "Revive: rebalancing off-blockchain payment networks," in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, 2017, pp. 439-453.
46 X. Fu, H. Wang, P. Shi, Y. Fu, and Y. Wang, "Jcledger: a blockchain based distributed ledger for JointCloud computing," in Proceedings of 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), Atlanta, GA, pp. 289-293.
47 X. Ren, P. London, J. Ziani, and A. Wierman, "Datum: managing data purchasing and data placement in a geo-distributed data market," IEEE/ACM Transactions on Networking, vol. 26, no. 2, pp. 893-905, 2018.   DOI
48 M. Milutinovic, W. He, H. Wu, and M. Kanwal, "Proof of luck: an efficient blockchain consensus protocol," in Proceedings of the 1st Workshop on System Software for Trusted Execution, Trento, Italy, 2016, pp. 1-6.
49 K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, et al., "On scaling decentralized blockchains," in Financial Cryptography and Data Security. Heidelberg: Springer, 2016, pp. 106-125.
50 I. Eyal and E. G. Sirer, "Bitcoin-NG: a secure, faster, better blockchain," 2015 [Online]. Available: https://hackingdistributed.com/2015/10/14/bitcoin-ng/.
51 G. Pappalardo, T. Di Matteo, G. Caldarelli, and T. Aste, "Blockchain inefficiency in the bitcoin peers network," EPJ Data Science, vol. 7, article no. 30, 2018.
52 S. Spiekermann and J. Korunovska, "Towards a value theory for personal data," Journal of Information Technology, vol. 32, no. 1, pp. 62-84, 2017.   DOI