[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3384943.3409418acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Mining the Characteristics of the Ethereum P2P Network

Published: 06 October 2020 Publication History

Abstract

Ethereum is the typical representative of the second generation of Blockchain technology. To achieve anonymity and decentralization, Ethereum utilizes a structured P2P network for data broadcasting, replication, and synchronization. The Ethereum P2P network topology construction profoundly affects the overall Ethereum system performance and reliability. However, there are few studies on the Ethereum underlying P2P overlay network topology. In this paper, we perform a preliminary investigation on this extensive Ethereum P2P system with a comprehensive measurement method combining active and passive methods. We gather Ethereum nodes information by active method for nodes crawling and verification, and we use the passive network traffic monitoring for routing data gathering. After a period of data collection for more than one month, we get a massive data set that has more than 50 million routing data entries. This data set allows us to gain knowledge on the Ethereum network scale and to derive mathematical characteristics of overlay network structure. By analyzing the data set comprehensively, we find that the Ethereum network exhibits both small-world and scale-free characteristics. There are a few critical nodes that have a significant impact on the robustness and vulnerability of the whole system. The Ethereum network also has a very high concentration in terms of network routing, which is very vulnerable to routing attacks.

References

[1]
[n.d.]. Cryptocurrency Market Capitalizations. https://coinmarketcap.com/. Accessed September 2, 2019.
[2]
[n.d.]. Discovery protocol. https://github.com/ethereum/devp2p/wiki/Discovery- Overview.
[3]
[n.d.]. Ethereum Node Records. https://github.com/ethereum/devp2p/blob/ master/enr.md.
[4]
[n.d.]. Node Discovery Protocol v4. https://github.com/ethereum/devp2p/blob/ master/discv4.md.
[5]
[n.d.]. What is Ether. https://www.ethereum.org/ether.
[6]
[n.d.]. What is Ethereum. https://github.com/ethereum/wiki/wiki/What-is- Ethereum.
[7]
[n.d.]. whisper. https://github.com/ethereum/whisper.
[8]
[n.d.]. www.ethernodes.org. https://www.ethernodes.org/.
[9]
Andra Anoaica and Hugo Levard. 2018. Quantitative Description of Internal Activity on the Ethereum Public Blockchain. In 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018, Paris, France, February 26--28, 2018. 1--5. https://doi.org/10.1109/NTMS.2018.8328741
[10]
Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22--26, 2017. 375--392. https://doi.org/10. 1109/SP.2017.29
[11]
Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli. 2017. A Survey of Attacks on Ethereum Smart Contracts (SoK). In Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22--29, 2017, Proceedings. 164--186. https://doi.org/10.1007/978--3--662--54455--6_8
[12]
Massimo Bartoletti and Livio Pompianu. 2017. An Empirical Analysis of Smart Contracts: Platforms, Applications, and Design Patterns. In Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. 494--509. https://doi.org/10.1007/978--3--319--70278-0_31
[13]
Guido Bertoni, Joan Daemen, Michael Peeters, and Gilles Van Assche. 2011. The Keccak SHA-3 submission. http://keccak.noekeon.org/.
[14]
Gabriele D'Angelo and Stefano Ferretti. 2017. Highly intensive data dissemination in complex networks. J. Parallel Distrib. Comput. 99 (2017), 28--50. https://doi. org/10.1016/j.jpdc.2016.08.004
[15]
Sergi Delgado-Segura, Surya Bakshi, Cristina Pérez-Solà, James Litton, Andrew Pachulski, Andrew Miller, and Bobby Bhattacharjee. 2019. TxProbe: Discovering Bitcoin's network topology using orphan transactions. In International Conference on Financial Cryptography and Data Security. Springer, 550--566.
[16]
Joan Antoni Donet Donet, Cristina Pérez-Solà, and Jordi Herrera-Joancomartí. 2014. The Bitcoin P2P Network. In Financial Cryptography and Data Security - FC 2014Workshops, BITCOIN andWAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers. 87--102. https://doi.org/10.1007/978--3--662--44774--1_7
[17]
Meryam Essaid, Sejin Park, and Hongteak Ju. 2019. Visualising Bitcoin's Dynamic P2P Network Topoogy and Performance. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 141--145.
[18]
Stefano Ferretti. 2013. Gossiping for resource discovering: An analysis based on complex network theory. Future Generation Comp. Syst. 29, 6 (2013), 1631--1644. https://doi.org/10.1016/j.future.2012.06.002
[19]
Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, and Emin Gün Sirer. 2018. Decentralization in Bitcoin and Ethereum Networks. In Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 - March 2, 2018, Revised Selected Papers. 439--457. https://doi.org/10.1007/978--3--662--58387--6_24
[20]
go ethereum. [n.d.]. Official Go implementation of the Ethereum protocol. https: //github.com/ethereum/go-ethereum.
[21]
Everett Hildenbrandt, Manasvi Saxena, Nishant Rodrigues, Xiaoran Zhu, Philip Daian, Dwight Guth, Brandon M. Moore, Daejun Park, Yi Zhang, Andrei Stefanescu, and Grigore Rosu. 2018. KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine. In 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9--12, 2018. 204--217. https: //doi.org/10.1109/CSF.2018.00022
[22]
Yoichi Hirai. 2017. Defining the Ethereum Virtual Machine for Interactive Theorem Provers. In Financial Cryptography and Data Security - FC 2017 International Workshops,WAHC, BITCOIN, VOTING,WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. 520--535. https://doi.org/10.1007/978--3--319--70278-0_33
[23]
Sushant Jain, Ratul Mahajan, and David Wetherall. 2003. A Study of the Performance Potential of DHT-based Overlays. In 4th USENIX Symposium on Internet Technologies and Systems, USITS'03, Seattle, Washington, USA, March 26--28, 2003. http://www.usenix.org/events/usits03/tech/jain.html
[24]
Marco Alberto Javarone and Craig Steven Wright. 2018. From Bitcoin to Bitcoin Cash: a network analysis. In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, CRYBLOCK@MobiSys 2018, Munich, Germany, June 15, 2018. 77--81. https://doi.org/10.1145/3211933.3211947
[25]
Don Johnson, Alfred Menezes, and Scott Vanstone. 2001. The elliptic curve digital signature algorithm (ECDSA). International journal of information security 1, 1 (2001), 36--63.
[26]
Seoung Kyun Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller, and Michael Bailey. 2018. Measuring Ethereum Network Peers. In Proceedings of the Internet Measurement Conference 2018, IMC 2018, Boston, MA, USA, October 31 - November 02, 2018. 91--104. https://dl.acm.org/citation.cfm?id=3278542
[27]
Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, and Aquinas Hobor. 2016. Making Smart Contracts Smarter. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24--28, 2016. 254--269. https://doi.org/10.1145/2976749.2978309
[28]
Petar Maymounkov and David Mazières. 2002. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7--8, 2002, Revised Papers. 53--65. https://doi.org/10.1007/3--540--45748--8_5
[29]
Roberta De Michele, Stefano Ferretti, and Marco Furini. 2019. On helping broadcasters to promote TV-shows through hashtags. Multimedia Tools Appl. 78, 3 (2019), 3279--3296. https://doi.org/10.1007/s11042-018--6510--7
[30]
Andrew Miller, James Litton, Andrew Pachulski, Neal Gupta, Dave Levin, Neil Spring, and Bobby Bhattacharjee. 2015. Discovering bitcoin's public topology and influential nodes. et al (2015).
[31]
Satoshi Nakamoto et al. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).
[32]
Ricardo Neisse, Gary Steri, and Igor Nai Fovino. 2017. A Blockchain-based Approach for Data Accountability and Provenance Tracking. In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017. 14:1--14:10. https://doi.org/10. 1145/3098954.3098958
[33]
Till Neudecker, Philipp Andelfinger, and Hannes Hartenstein. 2016. Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Toulouse, France, July 18--21, 2016. 358--367. https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld. 2016.0070
[34]
White Paper. [n.d.]. A Next-Generation Smart Contract and Decentralized Application Platform. https://github.com/ethereum/wiki/wiki/White-Paper. Accessed September 2, 2019.
[35]
parity ethereum. [n.d.]. The fast, light, and robust EVM and WASM client. https://github.com/paritytech/parity.
[36]
Emanuele Di Pascale, Jasmina McMenamy, Irene Macaluso, and Linda Doyle. 2017. Smart Contract SLAs for Dense Small-Cell-as-a-Service. CoRR abs/1703.04502 (2017). arXiv:1703.04502 http://arxiv.org/abs/1703.04502
[37]
Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi, and Simon Duquennoy. 2017. Towards Blockchain-based Auditable Storage and Sharing of IoT Data. In Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS 2017, Dallas, TX, USA, November 3, 2017. 45--50. https://doi.org/10.1145/3140649.3140656
[38]
Melanie Swan. 2015. Blockchain: Blueprint for a new economy. " O'Reilly Media, Inc.".
[39]
Stanley Wasserman and Katherine Faust. 1994. Social Network Analysis: Methods and Applications. Cambridge University Press. https://doi.org/10.1017/ CBO9780511815478
[40]
Duncan J Watts and Steven H Strogatz. 1998. Collective dynamics of 'smallworld'networks. nature 393, 6684 (1998), 440.
[41]
Qi Zhang, Xi Lu, Meizhu Li, Yong Deng, and Sankaran Mahadevan. 2014. A new structure entropy of complex networks based on Tsallis nonextensive statistical mechanics. CoRR abs/1411.6082 (2014). arXiv:1411.6082 http://arxiv.org/abs/1411.6082
[42]
Mirko Zichichi, Michele Contu, Stefano Ferretti, and Gabriele D'Angelo. 2019. LikeStarter: a Smart-contract based Social DAO for Crowdfunding. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2019, Paris, France, April 29 - May 2, 2019. 313--318. https://doi.org/10.1109/INFCOMW.2019.8845133

Cited By

View all
  • (2024)DEthna: Accurate Ethereum Network Topology Discovery with Marked TransactionsIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621281(1711-1720)Online publication date: 20-May-2024
  • (2024)Modeling the Invisible InternetComplex Networks & Their Applications XII10.1007/978-3-031-53472-0_30(359-370)Online publication date: 21-Feb-2024
  • (2022)Experimentation for Decentralized Resource-based Multi-pool Mining in Ethereum Blockchain2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)10.1109/ICONICS56716.2022.10100550(1-9)Online publication date: 14-Dec-2022
  • Show More Cited By

Index Terms

  1. Mining the Characteristics of the Ethereum P2P Network

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure
    October 2020
    223 pages
    ISBN:9781450376105
    DOI:10.1145/3384943
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 October 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Ethereum
    2. blockchain
    3. complex network theory
    4. measurement
    5. network traffic
    6. peer-to-peer network

    Qualifiers

    • Research-article

    Conference

    ASIA CCS '20
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 44 of 12 submissions, 367%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)26
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)DEthna: Accurate Ethereum Network Topology Discovery with Marked TransactionsIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621281(1711-1720)Online publication date: 20-May-2024
    • (2024)Modeling the Invisible InternetComplex Networks & Their Applications XII10.1007/978-3-031-53472-0_30(359-370)Online publication date: 21-Feb-2024
    • (2022)Experimentation for Decentralized Resource-based Multi-pool Mining in Ethereum Blockchain2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)10.1109/ICONICS56716.2022.10100550(1-9)Online publication date: 14-Dec-2022
    • (2022)Ethereum’s Peer-to-Peer Network Monitoring and Sybil Attack PreventionJournal of Network and Systems Management10.1007/s10922-022-09676-230:4Online publication date: 29-Jul-2022
    • (2022)EthSniffer: A Global Passive Perspective on EthereumBlockchain and Trustworthy Systems10.1007/978-981-16-7993-3_6(70-84)Online publication date: 1-Jan-2022
    • (2021)A Fast Keccak Hardware Design for High Performance Hashing System2021 15th International Conference on Advanced Computing and Applications (ACOMP)10.1109/ACOMP53746.2021.00029(162-168)Online publication date: Nov-2021

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media