DOI QR코드

DOI QR Code

The Dilemma of Parameterizing Propagation Time in Blockchain P2P Network

  • Rahmadika, Sandi (Interdisciplinary Program of Information Security, Graduate School, Pukyong National University) ;
  • Noh, Siwan (Interdisciplinary Program of Information Security, Graduate School, Pukyong National University) ;
  • Lee, Kyeongmo (Interdisciplinary Program of Information Security, Graduate School, Pukyong National University) ;
  • Kweka, Bruno Joachim (Interdisciplinary Program of Information Security, Graduate School, Pukyong National University) ;
  • Rhee, Kyung-Hyune (Dept. of IT Convergence and Application Engineering, Pukyong National University)
  • Received : 2018.12.31
  • Accepted : 2019.07.31
  • Published : 2020.06.30

Abstract

Propagation time on permissionless blockchain plays a significant role in terms of stability and performance in the decentralized systems. A large number of activities are disseminated to the whole nodes in the decentralized peer-to-peer network, thus causing propagation delay. The stability of the system is our concern in the first place. The propagation delay opens up opportunities for attackers to apply their protocol. Either by accelerating or decelerating the propagation time directly without proper calculation, it brings numerous negative impacts to the entire blockchain system. In this paper, we thoroughly review and elaborate on several parameters related to the propagation time in such a system. We describe our findings in terms of data communication, transaction propagation, and the possibility of an interference attack that caused an extra propagation time. Furthermore, we present the influence of block size, consensus, and blockchain scalability, including the relation of parameters. In the last session, we remark several points associated with the propagation time and use cases to avoid dilemmas in the light of the experiments and literary works.

Keywords

References

  1. V. Gramoli, "From blockchain consensus back to byzantine consensus," Future Generation Computer Systems, vol.107, pp. 760-769, 2020. https://doi.org/10.1016/j.future.2017.09.023
  2. N. Z. Aitzhan and D. Svetinovic, "Security and privacy in decentralized energy trading through multisignatures, blockchain and anonymous messaging streams," IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 5, pp. 840-852, 2016. https://doi.org/10.1109/tdsc.2016.2616861
  3. H. M. Kim and M. Laskowski, "Toward an ontology-driven blockchain design for supply-chain provenance," Intelligent Systems in Accounting, Finance and Management, vol. 25, no. 1, pp. 18-27, 2018. https://doi.org/10.1002/isaf.1424
  4. S. Rahmadika and K. H. Rhee, "Toward privacy-preserving shared storage in untrusted blockchain P2P networks," Wireless Communications and Mobile Computing, vol. 2019, article no. 6219868, 2019.
  5. A. H. Lone and R. N. Mir, "Forensic-chain: Ethereum blockchain based digital forensics chain of custody," Scientific and Practical Cyber Security Journal, vol. 1, no. 2, pp. 21-27, 2018.
  6. S. Wei, S. Li, P. Liu, and M. Liu, "BAVP: blockchain-based access verification protocol in LEO constellation using IBE keys," Security and Communication Networks, vol. 2018, article no. 7202806, 2018.
  7. K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, et al., "On scaling decentralized blockchains," in Financial Cryptography and Data Security. Heidelberg: Springer, 2016, pp. 106-125.
  8. I. Eyal and E. G. Sirer, "Bitcoin-NG: a secure, faster, better blockchain," 2015 [Online]. Available: https://hackingdistributed.com/2015/10/14/bitcoin-ng/.
  9. M. Milutinovic, W. He, H. Wu, and M. Kanwal, "Proof of luck: an efficient blockchain consensus protocol," in Proceedings of the 1st Workshop on System Software for Trusted Execution, Trento, Italy, 2016, pp. 1-6.
  10. G. Pappalardo, T. Di Matteo, G. Caldarelli, and T. Aste, "Blockchain inefficiency in the bitcoin peers network," EPJ Data Science, vol. 7, article no. 30, 2018.
  11. X. Liu, W. Wang, D. Niyato, N. Zhao, and P. Wang, "Evolutionary game for mining pool selection in blockchain networks," IEEE Wireless Communications Letters, vol. 7, no. 5, pp. 760-763, 2018. https://doi.org/10.1109/lwc.2018.2820009
  12. A. Kiayias and G. Panagiotakos, "Speed-security tradeoffs in blockchain protocols," IACR Cryptology ePrint Archive, vol. 2015, article no. 1019, 2015.
  13. Z. Xiong, S. Feng, D. Niyato, P. Wang, and Z. Han, "Optimal pricing-based edge computing resource management in mobile blockchain," 2017 [Online]. Available: https://arxiv.org/abs/1711.01049.
  14. R. Schollmeier, "A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications," in Proceedings of the 1st International Conference on Peer-to-Peer Computing, Linkoping, Sweden, 2001, pp. 101-102.
  15. M. Hearn, "Bitcoinj: a Java implementation of a bitcoin client," 2013 [Online]. Available: https://bitcoinj.github.io/.
  16. S. Feld, M. Schonfeld, and M. Werner, "Analyzing the deployment of Bitcoin's P2P network under an ASlevel perspective," Procedia Computer Science, vol. 32, pp. 1121-1126, 2014. https://doi.org/10.1016/j.procs.2014.05.542
  17. M. Fadhil, G. Owenson, and M. Adda, "A bitcoin model for evaluation of clustering to improve propagation delay in bitcoin network," in Proceedings of 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th International Symposium on Distributed Computing and Applications for Business Engineering (DCABES), Paris, France, 2016, pp. 468-475.
  18. M. Fadhil, G. Owenson, and M. Adda, "Locality based approach to improve propagation delay on the bitcoin peer-to-peer network," in Proceedings of 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal, 2017, pp. 556-559.
  19. M. Fadhil, G. Owen, and M. Adda, "Bitcoin network measurements for simulation validation and parameterization," in Proceedings of the 11th International Network Conference - INC2016. Plymouth, UK: University of Plymouth, 2016, pp. 109-114.
  20. E. K. Kogias, P. Jovanovic, N. Gailly, I. Khoffi, L. Gasser, and B. Ford, "Enhancing bitcoin security and performance with strong consistency via collective signing," in Proceedings of the 25th USENIX Security Symposium, Austin, TX, 2016, pp. 279-296.
  21. C. Decker and R. Wattenhofer, "Information propagation in the bitcoin network," in Proceedings of IEEE International Conference on Peer-to-Peer Computing, Trento, Italy, 2013, pp. 1-10.
  22. Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, "An overview of blockchain technology: architecture, consensus, and future trends," in Proceedings of 2017 IEEE International Congress on Big Data, Honolulu, HI, 2017, pp. 557-564.
  23. R. Dennis and G. Owen, "Rep on the block: a next generation reputation system based on the Blockchain," in Proceedings of 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK, 2015, pp. 131-138.
  24. X. Xu, I. Weber, M. Staples, L. Zhu, J. Bosch, L. Bass, C. Pautasso, and P. Rimba, "A taxonomy of blockchain-based systems for architecture design," in Proceedings of 2017 IEEE International Conference on Software Architecture (ICSA), Gothenburg, Sweden, 2017, pp. 243-252.
  25. S. Rahmadika, K. Lee, and K. H. Rhee, "Blockchain-enabled 5G autonomous vehicular networks," in Proceedings of 2019 International Conference on Sustainable Engineering and Creative Computing (ICSECC), Bandung, Indonesia, 2019, pp. 275-280.
  26. Y. Sompolinsky and A. Zohar, "Accelerating Bitcoin's transaction processing: fast money grows on trees, not chains," IACR Cryptology ePrint Archive, vol. 2013, article no. 881, 2013.
  27. C. Decker and R. Wattenhofer, "Bitcoin transaction malleability and MtGox," in Computer Security - ESORICS 2014. Cham: Springer, 2014, pp. 313-326.
  28. S. Rahmadika and K. H. Rhee, "Blockchain technology for providing an architecture model of decentralized personal health information," International Journal of Engineering Business Management, 2018. https://doi.org/10.1177%2F1847979018790589
  29. I. Eyal and E. G. Sirer, "Majority is not enough: Bitcoin mining is vulnerable," in financial Cryptography and Data Security. Heidelberg: Springer, 2014, pp. 436-454.
  30. A. Sapirshtein, Y. Sompolinsky, and A. Zohar, "Optimal selfish mining strategies in bitcoin," in Financial Cryptography and Data Security. Heidelberg: Springer, 2016, pp. 515-532.
  31. E. Heilman, "One weird trick to stop selfish miners: fresh bitcoins, a solution for the honest miner," in Financial Cryptography and Data Security. Heidelberg: Springer, 2014, pp. 161-162.
  32. S. Rahmadika, B. J. Kweka, H. Kim, and K. Rhee, "A scoping review in defend against selfish mining attack in bitcoin," IT Convergence Practice, vol. 6, no. 3, pp. 18-26, 2018.
  33. S. Rahmadika and K. H. Rhee, "Preliminary of selfish mining strategy on the decentralized model of personal health information," in Advanced Multimedia and Ubiquitous Engineering. Singapore: Springer, 2018, pp. 679-685.
  34. A. Gervais, H. Ritzdorf, G. O. Karame, and S. Capkun, "Tampering with the delivery of blocks and transactions in bitcoin," in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, 2015, pp. 692-705.
  35. A. Gervais, G. O. Karame, K. Wust, V. Glykantzis, H. Ritzdorf, and S. Capkun, "On the security and performance of proof of work blockchains," in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 2016, pp. 3-16.
  36. M. Apostolaki, A. Zohar, and L. Vanbever, "Hijacking bitcoin: routing attacks on cryptocurrencies," in Proceedings of 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, 2017, pp. 375-392.
  37. R. Khalil and A. Gervais, "Revive: rebalancing off-blockchain payment networks," in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, 2017, pp. 439-453.
  38. X. Fu, H. Wang, P. Shi, Y. Fu, and Y. Wang, "Jcledger: a blockchain based distributed ledger for JointCloud computing," in Proceedings of 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), Atlanta, GA, pp. 289-293.
  39. X. Ren, P. London, J. Ziani, and A. Wierman, "Datum: managing data purchasing and data placement in a geo-distributed data market," IEEE/ACM Transactions on Networking, vol. 26, no. 2, pp. 893-905, 2018. https://doi.org/10.1109/TNET.2018.2811374
  40. S. Spiekermann and J. Korunovska, "Towards a value theory for personal data," Journal of Information Technology, vol. 32, no. 1, pp. 62-84, 2017. https://doi.org/10.1057/jit.2016.4
  41. X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems," IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 365-378, 2009. https://doi.org/10.1109/JSAC.2009.090502
  42. H. Yang, H. Kim, and K. Mtonga, "An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system," Peer-to-Peer Networking and Applications, vol. 8, no. 6, pp. 1059-1069, 2015. https://doi.org/10.1007/s12083-014-0299-6
  43. M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," in Advances in Cryptology - EUROCRYPT'98. Heidelberg: Springer, 1998, pp. 127-144.
  44. R. Canetti and S. Hohenberger, "Chosen-ciphertext secure proxy re-encryption," in Proceedings of the 14th ACM conference on Computer and Communications Security, Alexandria, VA, 2007, pp. 185-194.
  45. C. Sur, C. D. Jung, Y. Park, and K. H. Rhee, "Chosen-ciphertext secure certificateless proxy re-encryption," in Communications and Multimedia Security. Heidelberg: Springer, 2010, pp. 214-232.
  46. S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer, "Kerberos authentication and authorization system (Project Athena Technical Plan, Section E.2.1)," 1988 [Online]. Available: http://web.mit.edu/Saltzer/www/publications/atp.html.
  47. S. Nakamoto, "Bitcoin: a peer-to-peer electronic cash system," 2008 [Online]. Available: https://git.dhimmel.com/bitcoin-whitepaper/.
  48. A. Ouaddah, A. Abou Elkalam, and A. A. Ouahman, "Towards a novel privacy-preserving access control model based on blockchain technology in IoT," in Europe and MENA Cooperation Advances in Information and Communication Technologies. Cham: Springer, 2017, pp. 523-533.
  49. Q. Xia, E. B. Sifah, A. Smahi, S. Amofa, and X. Zhang, "BBDS: blockchain-based data sharing for electronic medical records in cloud environments," Information, vol. 8, article no. 44, 2017.
  50. D. Di Francesco Maesa, P. Mori, and L. Ricci, "Blockchain based access control," in Distributed Applications and Interoperable Systems. Cham: Springer, 2017, pp. 206-220.
  51. J. Poon and T. Dryja, "The bitcoin lightning network: scalable off-chain instant payments," 2016 [Online]. Available: https://www.bitcoinlightning.com/wp-content/uploads/2018/03/lightning-network-paper.pdf.
  52. G. Gutoski and D. Stebila, "Hierarchical deterministic bitcoin wallets that tolerate key leakage," in Financial Cryptography and Data Security. Heidelberg: Springer, 2015, pp. 497-504.