Loading…

Network Layer Aspects of Permissionless Blockchains

Permissionless blockchains reach decentralized consensus without requiring pre-established identities or trusted third parties, thus enabling applications such as cryptocurrencies and smart contracts. Consensus is agreed on data that is generated by the application and transmitted by the system'...

Full description

Saved in:
Bibliographic Details
Published in:IEEE Communications surveys and tutorials 2019, Vol.21 (1), p.838-857
Main Authors: Neudecker, Till, Hartenstein, Hannes
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c454t-c9643a5fc80a89d3336a6db3f800703e498256d8adccfa0dfdef8635372853b23
cites cdi_FETCH-LOGICAL-c454t-c9643a5fc80a89d3336a6db3f800703e498256d8adccfa0dfdef8635372853b23
container_end_page 857
container_issue 1
container_start_page 838
container_title IEEE Communications surveys and tutorials
container_volume 21
creator Neudecker, Till
Hartenstein, Hannes
description Permissionless blockchains reach decentralized consensus without requiring pre-established identities or trusted third parties, thus enabling applications such as cryptocurrencies and smart contracts. Consensus is agreed on data that is generated by the application and transmitted by the system's (peer-to-peer) network layer. While many attacks on the network layer were discussed so far, there is no systematic approach that brings together known attacks, the requirements, and the design space of the network layer. In this paper, we survey attacks on the network layer of permissionless blockchains, and derive five requirements: 1) performance; 2) low cost of participation; 3) anonymity; 4) DoS resistance; and 5) topology hiding. Furthermore, we survey the design space of the network layer and qualitatively show the effect of each design decisions on the fulfillment of the requirements. Finally, we pick two aspects of the design space, in-band peer discovery and relay delay, and demonstrate possible directions of future research by quantitatively analyzing and optimizing simplified scenarios. We show that while most design decisions imply certain tradeoffs, there is a lack of models that analyze and formalize these tradeoffs. Such models could aid the design of the network layer of permissionless blockchains. One reason for the lack of models is the deliberately limited observability of deployed blockchains. We emphasize that simulation based approaches cope with these limitations and are suited for the analysis of the network layer of permissionless blockchains.
doi_str_mv 10.1109/COMST.2018.2852480
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_COMST_2018_2852480</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8456488</ieee_id><sourcerecordid>2186110209</sourcerecordid><originalsourceid>FETCH-LOGICAL-c454t-c9643a5fc80a89d3336a6db3f800703e498256d8adccfa0dfdef8635372853b23</originalsourceid><addsrcrecordid>eNpNkE1LAzEQhoMoWKt_QC8LnnedfO7ssRa_oFrBCt5Cmk1w-5WabJH-e7e2iKeZw_vM8D6EXFIoKIXqZjh-fpsUDCgWDCUTCEekR6XkOZblx_G__ZScpTQDEExU0CP8xbXfIc6zkdm6mA3S2tk2ZcFnry4um5SasFq4lLLbRbBz-2maVTonJ94skrs4zD55v7-bDB_z0fjhaTgY5VZI0ea2UoIb6S2CwarmnCuj6in3CFACd6JCJlWNprbWG6h97TwqLnnZVeBTxvvken93HcPXxqVWz8ImrrqXmlFUXXEGVZdi-5SNIaXovF7HZmniVlPQOzn6V47eydEHOR10tYca59wfgEIqgch_APw1X_Y</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2186110209</pqid></control><display><type>article</type><title>Network Layer Aspects of Permissionless Blockchains</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Neudecker, Till ; Hartenstein, Hannes</creator><creatorcontrib>Neudecker, Till ; Hartenstein, Hannes</creatorcontrib><description>Permissionless blockchains reach decentralized consensus without requiring pre-established identities or trusted third parties, thus enabling applications such as cryptocurrencies and smart contracts. Consensus is agreed on data that is generated by the application and transmitted by the system's (peer-to-peer) network layer. While many attacks on the network layer were discussed so far, there is no systematic approach that brings together known attacks, the requirements, and the design space of the network layer. In this paper, we survey attacks on the network layer of permissionless blockchains, and derive five requirements: 1) performance; 2) low cost of participation; 3) anonymity; 4) DoS resistance; and 5) topology hiding. Furthermore, we survey the design space of the network layer and qualitatively show the effect of each design decisions on the fulfillment of the requirements. Finally, we pick two aspects of the design space, in-band peer discovery and relay delay, and demonstrate possible directions of future research by quantitatively analyzing and optimizing simplified scenarios. We show that while most design decisions imply certain tradeoffs, there is a lack of models that analyze and formalize these tradeoffs. Such models could aid the design of the network layer of permissionless blockchains. One reason for the lack of models is the deliberately limited observability of deployed blockchains. We emphasize that simulation based approaches cope with these limitations and are suited for the analysis of the network layer of permissionless blockchains.</description><identifier>ISSN: 1553-877X</identifier><identifier>EISSN: 1553-877X</identifier><identifier>EISSN: 2373-745X</identifier><identifier>DOI: 10.1109/COMST.2018.2852480</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>anonymity ; Bandwidth ; Bitcoin ; Blockchain ; Computer simulation ; Cybersecurity ; Decisions ; Network security ; Network topology ; Observability (systems) ; Peer-to-peer computing ; peer-to-peer network ; permissionless blockchain ; Resistance ; Social networks ; Software utilities ; Tradeoffs ; Trusted third parties</subject><ispartof>IEEE Communications surveys and tutorials, 2019, Vol.21 (1), p.838-857</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c454t-c9643a5fc80a89d3336a6db3f800703e498256d8adccfa0dfdef8635372853b23</citedby><cites>FETCH-LOGICAL-c454t-c9643a5fc80a89d3336a6db3f800703e498256d8adccfa0dfdef8635372853b23</cites><orcidid>0000-0002-0306-4670 ; 0000-0003-3441-3180</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8456488$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,4010,27900,27901,27902,54771</link.rule.ids></links><search><creatorcontrib>Neudecker, Till</creatorcontrib><creatorcontrib>Hartenstein, Hannes</creatorcontrib><title>Network Layer Aspects of Permissionless Blockchains</title><title>IEEE Communications surveys and tutorials</title><addtitle>COMST</addtitle><description>Permissionless blockchains reach decentralized consensus without requiring pre-established identities or trusted third parties, thus enabling applications such as cryptocurrencies and smart contracts. Consensus is agreed on data that is generated by the application and transmitted by the system's (peer-to-peer) network layer. While many attacks on the network layer were discussed so far, there is no systematic approach that brings together known attacks, the requirements, and the design space of the network layer. In this paper, we survey attacks on the network layer of permissionless blockchains, and derive five requirements: 1) performance; 2) low cost of participation; 3) anonymity; 4) DoS resistance; and 5) topology hiding. Furthermore, we survey the design space of the network layer and qualitatively show the effect of each design decisions on the fulfillment of the requirements. Finally, we pick two aspects of the design space, in-band peer discovery and relay delay, and demonstrate possible directions of future research by quantitatively analyzing and optimizing simplified scenarios. We show that while most design decisions imply certain tradeoffs, there is a lack of models that analyze and formalize these tradeoffs. Such models could aid the design of the network layer of permissionless blockchains. One reason for the lack of models is the deliberately limited observability of deployed blockchains. We emphasize that simulation based approaches cope with these limitations and are suited for the analysis of the network layer of permissionless blockchains.</description><subject>anonymity</subject><subject>Bandwidth</subject><subject>Bitcoin</subject><subject>Blockchain</subject><subject>Computer simulation</subject><subject>Cybersecurity</subject><subject>Decisions</subject><subject>Network security</subject><subject>Network topology</subject><subject>Observability (systems)</subject><subject>Peer-to-peer computing</subject><subject>peer-to-peer network</subject><subject>permissionless blockchain</subject><subject>Resistance</subject><subject>Social networks</subject><subject>Software utilities</subject><subject>Tradeoffs</subject><subject>Trusted third parties</subject><issn>1553-877X</issn><issn>1553-877X</issn><issn>2373-745X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><recordid>eNpNkE1LAzEQhoMoWKt_QC8LnnedfO7ssRa_oFrBCt5Cmk1w-5WabJH-e7e2iKeZw_vM8D6EXFIoKIXqZjh-fpsUDCgWDCUTCEekR6XkOZblx_G__ZScpTQDEExU0CP8xbXfIc6zkdm6mA3S2tk2ZcFnry4um5SasFq4lLLbRbBz-2maVTonJ94skrs4zD55v7-bDB_z0fjhaTgY5VZI0ea2UoIb6S2CwarmnCuj6in3CFACd6JCJlWNprbWG6h97TwqLnnZVeBTxvvken93HcPXxqVWz8ImrrqXmlFUXXEGVZdi-5SNIaXovF7HZmniVlPQOzn6V47eydEHOR10tYca59wfgEIqgch_APw1X_Y</recordid><startdate>2019</startdate><enddate>2019</enddate><creator>Neudecker, Till</creator><creator>Hartenstein, Hannes</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-0306-4670</orcidid><orcidid>https://orcid.org/0000-0003-3441-3180</orcidid></search><sort><creationdate>2019</creationdate><title>Network Layer Aspects of Permissionless Blockchains</title><author>Neudecker, Till ; Hartenstein, Hannes</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c454t-c9643a5fc80a89d3336a6db3f800703e498256d8adccfa0dfdef8635372853b23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>anonymity</topic><topic>Bandwidth</topic><topic>Bitcoin</topic><topic>Blockchain</topic><topic>Computer simulation</topic><topic>Cybersecurity</topic><topic>Decisions</topic><topic>Network security</topic><topic>Network topology</topic><topic>Observability (systems)</topic><topic>Peer-to-peer computing</topic><topic>peer-to-peer network</topic><topic>permissionless blockchain</topic><topic>Resistance</topic><topic>Social networks</topic><topic>Software utilities</topic><topic>Tradeoffs</topic><topic>Trusted third parties</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Neudecker, Till</creatorcontrib><creatorcontrib>Hartenstein, Hannes</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE Communications surveys and tutorials</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Neudecker, Till</au><au>Hartenstein, Hannes</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Network Layer Aspects of Permissionless Blockchains</atitle><jtitle>IEEE Communications surveys and tutorials</jtitle><stitle>COMST</stitle><date>2019</date><risdate>2019</risdate><volume>21</volume><issue>1</issue><spage>838</spage><epage>857</epage><pages>838-857</pages><issn>1553-877X</issn><eissn>1553-877X</eissn><eissn>2373-745X</eissn><abstract>Permissionless blockchains reach decentralized consensus without requiring pre-established identities or trusted third parties, thus enabling applications such as cryptocurrencies and smart contracts. Consensus is agreed on data that is generated by the application and transmitted by the system's (peer-to-peer) network layer. While many attacks on the network layer were discussed so far, there is no systematic approach that brings together known attacks, the requirements, and the design space of the network layer. In this paper, we survey attacks on the network layer of permissionless blockchains, and derive five requirements: 1) performance; 2) low cost of participation; 3) anonymity; 4) DoS resistance; and 5) topology hiding. Furthermore, we survey the design space of the network layer and qualitatively show the effect of each design decisions on the fulfillment of the requirements. Finally, we pick two aspects of the design space, in-band peer discovery and relay delay, and demonstrate possible directions of future research by quantitatively analyzing and optimizing simplified scenarios. We show that while most design decisions imply certain tradeoffs, there is a lack of models that analyze and formalize these tradeoffs. Such models could aid the design of the network layer of permissionless blockchains. One reason for the lack of models is the deliberately limited observability of deployed blockchains. We emphasize that simulation based approaches cope with these limitations and are suited for the analysis of the network layer of permissionless blockchains.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/COMST.2018.2852480</doi><tpages>20</tpages><orcidid>https://orcid.org/0000-0002-0306-4670</orcidid><orcidid>https://orcid.org/0000-0003-3441-3180</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1553-877X
ispartof IEEE Communications surveys and tutorials, 2019, Vol.21 (1), p.838-857
issn 1553-877X
1553-877X
2373-745X
language eng
recordid cdi_crossref_primary_10_1109_COMST_2018_2852480
source IEEE Electronic Library (IEL) Journals
subjects anonymity
Bandwidth
Bitcoin
Blockchain
Computer simulation
Cybersecurity
Decisions
Network security
Network topology
Observability (systems)
Peer-to-peer computing
peer-to-peer network
permissionless blockchain
Resistance
Social networks
Software utilities
Tradeoffs
Trusted third parties
title Network Layer Aspects of Permissionless Blockchains
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T03%3A06%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Network%20Layer%20Aspects%20of%20Permissionless%20Blockchains&rft.jtitle=IEEE%20Communications%20surveys%20and%20tutorials&rft.au=Neudecker,%20Till&rft.date=2019&rft.volume=21&rft.issue=1&rft.spage=838&rft.epage=857&rft.pages=838-857&rft.issn=1553-877X&rft.eissn=1553-877X&rft_id=info:doi/10.1109/COMST.2018.2852480&rft_dat=%3Cproquest_cross%3E2186110209%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c454t-c9643a5fc80a89d3336a6db3f800703e498256d8adccfa0dfdef8635372853b23%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2186110209&rft_id=info:pmid/&rft_ieee_id=8456488&rfr_iscdi=true