An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks

There is an increasing demand for digital crypto-currencies to be more secure and robust to meet the following business requirements: (1) low transaction fees and (2) the privacy of users. Nowadays, Bitcoin is gaining traction and wide adoption. Many well-known businesses have begun accepting bitcoi...

Full description

Bibliographic Details
Main Authors: Muntadher Sallal, Ruairí de Fréin, Ali Malik, Benjamin Aziz
Format: Article
Language:English
Published: Elsevier 2022-09-01
Series:Array
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2590005622000613
_version_ 1828239610883342336
author Muntadher Sallal
Ruairí de Fréin
Ali Malik
Benjamin Aziz
author_facet Muntadher Sallal
Ruairí de Fréin
Ali Malik
Benjamin Aziz
author_sort Muntadher Sallal
collection DOAJ
description There is an increasing demand for digital crypto-currencies to be more secure and robust to meet the following business requirements: (1) low transaction fees and (2) the privacy of users. Nowadays, Bitcoin is gaining traction and wide adoption. Many well-known businesses have begun accepting bitcoins as a means of making financial payments. However, the susceptibility of Bitcoin networks to information propagation delay, increases the vulnerability to attack of the Bitcoin network, and decreases its throughput performance. This paper introduces and critically analyses new network clustering methods, named Locality Based Clustering (LBC), Ping Time Based Approach (PTBC), Super Node Based Clustering (SNBA), and Master Node Based Clustering (MNBC). The proposed methods aim to decrease the chances of performing a successful double spending attack by reducing the information propagation delay of Bitcoin. These methods embody proximity-aware extensions to the standard Bitcoin protocol, where proximity is measured geographically and in terms of latency. We validate our proposed methods through a set of simulation experiments and the findings show how the proposed methods run and their impact in optimising the transaction propagation delay. Furthermore, these new methods are evaluated from the perspective of the Bitcoin network’s resistance to partitioning attacks. Numerical results, which are established via extensive simulation experiments, demonstrate how the extensions run and also their impact in optimising the transaction propagation delay. We draw on these findings to suggest promising future research directions for the optimisation of transaction propagation delays.
first_indexed 2024-04-12T21:25:34Z
format Article
id doaj.art-4b07f14f2d0c43d2abca3ba86a093529
institution Directory Open Access Journal
issn 2590-0056
language English
last_indexed 2024-04-12T21:25:34Z
publishDate 2022-09-01
publisher Elsevier
record_format Article
series Array
spelling doaj.art-4b07f14f2d0c43d2abca3ba86a0935292022-12-22T03:16:10ZengElsevierArray2590-00562022-09-0115100221An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networksMuntadher Sallal0Ruairí de Fréin1Ali Malik2Benjamin Aziz3Department of Computing and Informatics, Bournemouth University, United KingdomSchool of Electrical and Electronic Engineering, Technological University Dublin, IrelandSchool of Electrical and Electronic Engineering, Technological University Dublin, Ireland; Corresponding author.School of Computing, University of Portsmouth, United KingdomThere is an increasing demand for digital crypto-currencies to be more secure and robust to meet the following business requirements: (1) low transaction fees and (2) the privacy of users. Nowadays, Bitcoin is gaining traction and wide adoption. Many well-known businesses have begun accepting bitcoins as a means of making financial payments. However, the susceptibility of Bitcoin networks to information propagation delay, increases the vulnerability to attack of the Bitcoin network, and decreases its throughput performance. This paper introduces and critically analyses new network clustering methods, named Locality Based Clustering (LBC), Ping Time Based Approach (PTBC), Super Node Based Clustering (SNBA), and Master Node Based Clustering (MNBC). The proposed methods aim to decrease the chances of performing a successful double spending attack by reducing the information propagation delay of Bitcoin. These methods embody proximity-aware extensions to the standard Bitcoin protocol, where proximity is measured geographically and in terms of latency. We validate our proposed methods through a set of simulation experiments and the findings show how the proposed methods run and their impact in optimising the transaction propagation delay. Furthermore, these new methods are evaluated from the perspective of the Bitcoin network’s resistance to partitioning attacks. Numerical results, which are established via extensive simulation experiments, demonstrate how the extensions run and also their impact in optimising the transaction propagation delay. We draw on these findings to suggest promising future research directions for the optimisation of transaction propagation delays.http://www.sciencedirect.com/science/article/pii/S2590005622000613BitcoinBlockchainsClusteringInformation propagationSecurityPerformance
spellingShingle Muntadher Sallal
Ruairí de Fréin
Ali Malik
Benjamin Aziz
An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks
Array
Bitcoin
Blockchains
Clustering
Information propagation
Security
Performance
title An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks
title_full An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks
title_fullStr An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks
title_full_unstemmed An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks
title_short An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks
title_sort empirical comparison of the security and performance characteristics of topology formation algorithms for bitcoin networks
topic Bitcoin
Blockchains
Clustering
Information propagation
Security
Performance
url http://www.sciencedirect.com/science/article/pii/S2590005622000613
work_keys_str_mv AT muntadhersallal anempiricalcomparisonofthesecurityandperformancecharacteristicsoftopologyformationalgorithmsforbitcoinnetworks
AT ruairidefrein anempiricalcomparisonofthesecurityandperformancecharacteristicsoftopologyformationalgorithmsforbitcoinnetworks
AT alimalik anempiricalcomparisonofthesecurityandperformancecharacteristicsoftopologyformationalgorithmsforbitcoinnetworks
AT benjaminaziz anempiricalcomparisonofthesecurityandperformancecharacteristicsoftopologyformationalgorithmsforbitcoinnetworks
AT muntadhersallal empiricalcomparisonofthesecurityandperformancecharacteristicsoftopologyformationalgorithmsforbitcoinnetworks
AT ruairidefrein empiricalcomparisonofthesecurityandperformancecharacteristicsoftopologyformationalgorithmsforbitcoinnetworks
AT alimalik empiricalcomparisonofthesecurityandperformancecharacteristicsoftopologyformationalgorithmsforbitcoinnetworks
AT benjaminaziz empiricalcomparisonofthesecurityandperformancecharacteristicsoftopologyformationalgorithmsforbitcoinnetworks