Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2018 (2018), Article ID 2159082, 16 pages
https://doi.org/10.1155/2018/2159082
Review Article

Cryptocurrency Networks: A New P2P Paradigm

Department d’Enginyeria de la Informació i les Comunicacions, Universitat Autònoma de Barcelona, 08193 Bellaterra, Catalonia, Spain

Correspondence should be addressed to Cristina Pérez-Solà; tac.bau@zerep.anitsirc

Received 18 May 2017; Accepted 3 December 2017; Published 1 March 2018

Academic Editor: L. J. García Villalba

Copyright © 2018 Sergi Delgado-Segura et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, 2008, https://bitcoin.org/bitcoin.pdf.
  2. A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and Cryptocurrency Technologies, Princeton University Press, Princeton, NJ, USA, 2016.
  3. J. A. D. Donet and J. Herrera-Joancomartí, “Cryptocurrency P2P networks: a comparison analysis,” J. L. Ferrer and M. Payeras, Eds., pp. 423–428, Menorca, Illes Balears, Spain, 2016.
  4. M. Lischke and B. Fabian, “Analyzing the bitcoin network: the first four years,” Future Internet, vol. 8, no. 1, p. 7, 2016. View at Publisher · View at Google Scholar · View at Scopus
  5. J. Herrera-Joancomartí and C. Pérez-Solà, “Privacy in bitcoin transactions: new challenges from blockchain scalability solutions,” in in Modeling Decisions for Artificial Intelligence, pp. 26–44, Springer, Berlin, Germany, 2016. View at Google Scholar
  6. A. Back, Hashcash-A Denial of Service Counter-Measure, 2002.
  7. Bitcoin Core, Bitcoin Core Version 0.12.0 Released, 2016, https://bitcoin.org/en/release/v0.12.0.
  8. Bitcoin Core, Bitcoin Core Version 0.13.0 Released, 2016, https://bitcoin.org/en/release/v0.13.0.
  9. Bitnodes, 2016, https://bitnodes.21.co/.
  10. E. K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, “A survey and comparison of peer-to-peer overlay network schemes,” IEEE Communications Surveys and Tutorials, vol. 7, no. 2, pp. 72–93, 2005. View at Publisher · View at Google Scholar · View at Scopus
  11. P. Kirk, Gnutella Protocol Development, 2011.
  12. C. Decker and R. Wattenhofer, “Information propagation in the bitcoin network,” in Proceedings of the IEEE Internation Conference on Peer-to-Peer Computing (P2P), Trento, Italy, 2013.
  13. E. Heilman, A. Kendler, A. Zohar, and S. Goldberg, “Eclipse attacks on bitcoin’s peer-to-peer network,” in Proceedings of the 24th USENIX Conference on Secrity Symposium (SEC’15), pp. 129–144, USENIX Association, Berkeley, CA, USA, 2015, http://dl.acm.org/citation.cfm?id=2831143.2831152.
  14. D. S. Wallach, “A survey of peer-to-peer security issues,” in in Software Security—Theories and Systems, pp. 42–57, Springer, Berlin, Germany, 2003. View at Google Scholar
  15. S. Bellovin, “Security aspects of Napster and Gnutella,” in Proceedings of the 2001 Usenix Annual Technical Conference, Boston, MA, USA, June 2001.
  16. D. S. Touceda, J. M. Sierra, A. Izquierdo, and H. Schulzrinne, “Survey of attacks and defenses on P2PSIP communications,” IEEE Communications Surveys and Tutorials, vol. 14, no. 3, pp. 750–783, 2012. View at Google Scholar
  17. Bitcoin Core, Blockchain Info Website, https://blockchain.info/.
  18. M. Carlsten, H. Kalodner, S. M. Weinberg, and A. Narayanan, “On the instability of bitcoin without the block reward,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS’16), pp. 154–167, ACM, Vienna, Austria, 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. M. Apostolaki, A. Zohar, and L. Vanbever, “Hijacking bitcoin: routing attacks on cryptocurrencies,” in Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), pp. 375–392, San Jose, CA, USA, 2017. View at Publisher · View at Google Scholar · View at Scopus
  20. K. Suto, H. Nishiyama, N. Kato, T. Nakachi, T. Fujii, and A. Takahara, “THUP: a P2P network robust to churn and DoS attack based on bimodal degree distribution,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 247–256, 2013. View at Publisher · View at Google Scholar · View at Scopus
  21. W. Wang, Y. Xiong, Q. Zhang, and S. Jamin, “Ripple-stream: safeguarding P2P streaming against DoS attacks,” in Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, pp. 1417–1420, Toronto, ON, Canada, July 2006.
  22. M. Brinkmeier, G. Schäfer, and T. Strufe, “Optimally DoS resistant P2P topologies for live multimedia streaming,” IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 6, pp. 831–844, 2009. View at Publisher · View at Google Scholar · View at Scopus
  23. M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, “Secure routing for structured peer-to-peer overlay networks,” SIGOPS Operating Systems Review, vol. 36, pp. 299–314, 2002. View at Publisher · View at Google Scholar · View at Scopus
  24. A. Singh, M. Castro, P. Druschel, and A. Rowstron, “Defending against eclipse attacks on overlay networks,” in Proceedings of the 11th Workshop on ACM SIGOPS European Workshop (EW’11), ACM, Leuven, Belgium, 2004.
  25. N. Borisov and J. Waddle, “Anonymity in structured peer-to-peer networks,” Tech. Rep. UCB/CSD-05–1390, Computer Science Division (EECS), University of California, Oakland, CA, USA, May 2005. View at Google Scholar
  26. P. Koshy, D. Koshy, and P. McDaniel, “An analysis of anonymity in bitcoin using P2P network traffic,” in Financial Cryptography and Data Security, N. Christin and R. Safavi-Naini, Eds., vol. 8437, of Lecture Notes in Computer Science, pp. 469–485, Springer, Berlin, Germany, 2014. View at Publisher · View at Google Scholar · View at Scopus
  27. D. Ron and A. Shamir, “Quantitative analysis of the full bitcoin transaction graph,” in Financial Cryptography and Data Security, A.-R. Sadeghi, Ed., vol. 7859, of Lecture Notes in Computer Science, pp. 6–24, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar · View at Scopus
  28. E. Androulaki, G. Karame, M. Roeschlin, T. Scherer, and S. Capkun, “Evaluating user privacy in bitcoin,” in Financial Cryptography and Data Security, A.-R. Sadeghi, Ed., vol. 7859, of Lecture Notes in Computer Science, pp. 34–51, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar · View at Scopus
  29. M. Ober, S. Katzenbeisser, and K. Hamacher, “Structure and anonymity of the bitcoin transaction graph,” Future Internet, vol. 5, no. 2, pp. 237–250, 2013. View at Publisher · View at Google Scholar
  30. A. Gervais, S. Capkun, G. O. Karame, and D. Gruber, “On the privacy provisions of Bloom filters in lightweight bitcoin clients,” in Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC’14), pp. 326–335, ACM, New Orleans, LA, USA, December 2014.
  31. D. Cerri, A. Ghioni, S. Paraboschi, and S. Tiraboschi, “ID mapping attacks in P2P networks,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’05), vol. 3, pp. 1785–1790, St. Louis, MO, USA, 2005.
  32. E. Sit and R. Morris, “Security considerations for peer-to-peer distributed hash tables,” in First International Workshop on Peer-to-Peer Systems (IPTPS 2002), Cambridge, MA, USA, vol. 2429 of Lecture Notes in Computer Science, pp. 261–269, Springer, Berlin, Germany, 2002.
  33. J. J. Douceur, “The sybil attack,” in Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS), Cambridge, MA, USA, March 2002.
  34. J. Newsome, E. Shi, D. Song, and A. Perrig, “The sybil attack in sensor networks: analysis and defenses,” in Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN’04), pp. 259–268, Berkeley, CA, USA, April 2004.
  35. B. N. Levine, C. Shields, and N. B. Margolin, “A survey of solutions to the sybil attack,” Tech. Rep. 2006-052, University of Massachusetts Amherst, Amherst, MA, USA, October 2006. View at Google Scholar
  36. J. Dinger and O. P. Waldhorst, “Decentralized bootstrapping of P2P systems: a practical view,” in Proceedings of the 8th International IFIP-TC 6 Networking Conference on NETWORKING 2009, pp. 703–715, Springer, Aachen, Germany, May 2009.
  37. C. Cramer, K. Kutzner, and T. Fuhrmann, “Bootstrapping locality-aware P2P networks,” in Proceedings of the 12th IEEE International Conference on Networks, 2004 (ICON’04), vol. 1, pp. 357–361, Singapore, 2004.
  38. H. Tran, M. Hitchens, V. Varadharajan, and P. Watters, “A trust based access control framework for P2P file-sharing systems,” in Proceedings of the 38th Annual Hawaii International Conference on System Sciences, p. 302c, Washington, DC, USA, 2005.
  39. Y. Zhang, X. Li, J. Huai, and Y. Liu, “Access control in peer-to-peer collaborative systems,” in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS’05), pp. 835–840, Columbus, OH, USA, June 2005.
  40. A. Ghodsi, L. O. Alima, and S. Haridi, “Symmetric replication for structured peer-to-peer systems,” in Proceedings of the International Workshops on Databases, Information Systems, and Peer-to-Peer Computing (DBISP2P 2005/2006), pp. 74–85, Springer, Trondheim, Norway, August 2006.
  41. H. Weatherspoon and J. D. Kubiatowicz, “Erasure coding vs. replication: a quantitative comparison,” in Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS 2002), pp. 328–337, Springer, Cambridge, MA, USA, March 2002.
  42. D. Hughes, G. Coulson, and J. Walkerdine, “Free riding on Gnutella revisited: the bell tolls?” IEEE Distributed Systems Online, vol. 6, no. 6, 2005. View at Google Scholar
  43. S. J. Nielson, S. A. Crosby, and D. S. Wallach, “A taxonomy of rational attacks,” in Proceedings of the 4th International Workshop on Peer-to-Peer Systems IV (IPTPS 2005), pp. 36–46, Springer, Ithaca, NY, USA, February 2005.
  44. M. Feldman and J. Chuang, “Overcoming free-riding behavior in peer-to-peer systems,” SIGecom Exchanges, vol. 5, no. 4, pp. 41–50, 2005. View at Publisher · View at Google Scholar
  45. C. Jennings, B. Lowekamp, E. Rescorla, S. Baset, and H. Schulzrinne, Resource Location and Discovery (Reload) Base Protocol, IETF, RFC 6940, January 2014.
  46. D. Goldschlag, M. Reed, and P. Syverson, “Onion routing for anonymous and private internet connections,” Communications of the ACM, vol. 42, no. 2, pp. 39–41, 1999. View at Publisher · View at Google Scholar
  47. I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable,” in Financial Cryptography and Data Security, Lecture Notes in Computer Science, N. Christin and R. Safavi-Naini, Eds., pp. 436–454, Springer, Berlin, Germany, 2014. View at Publisher · View at Google Scholar · View at Scopus
  48. S. Marti, P. Ganesan, and H. Garcia-Molina, “SPROUT: P2P routing with social networks,” in Proceedings of the Current Trends in Database Technology EDBT 2004 Workshops: EDBT 2004 Workshops PhD, DataX, PIM, P2P&DB, and ClustWeb, pp. 425–435, Springer, Heraklion, Crete, Greece, March 2004.
  49. S. Androutsellis-Theotokis and D. Spinellis, “A survey of peer-to-peer content distribution technologies,” ACM Computing Surveys, vol. 36, no. 4, pp. 335–371, 2004. View at Publisher · View at Google Scholar · View at Scopus
  50. W. Zamora, C. T. Calafate, J.-C. Cano, and P. Manzoni, “A survey on smartphone-based crowdsensing solutions,” Mobile Information Systems, vol. 2016, Article ID 9681842, 26 pages, 2016. View at Publisher · View at Google Scholar · View at Scopus
  51. B. Guo, Z. Wang, Z. Yu et al., “Mobile crowd sensing and computing: the review of an emerging human-powered sensing paradigm,” ACM Computing Surveys, vol. 48, no. 1, pp. 1–31, 2015. View at Publisher · View at Google Scholar · View at Scopus
  52. S. Delgado-Segura, C. Tanas, and J. Herrera-Joancomartí, “Reputation and reward: two sides of the same bitcoin,” Sensors, vol. 16, no. 6, p. 776, 2016. View at Publisher · View at Google Scholar · View at Scopus
  53. H. Kalodner, M. Carlsten, P. Ellenbogen, J. Bonneau, and A. Narayanan, “An empirical study of Namecoin and lessons for decentralized namespace design,” in Proceedings of the 14th Workshop on the Economics of Information Security (WEIS’15), Delft, Netherlands, June 2015, http://randomwalker.info/publications/namespaces.pdf.
  54. M. Kitahara, J. Kawamoto, and K. Sakurai, “A method of digital rights management based on bitcoin protocol,” in Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication (ICUIMC’14), pp. 84:1–84:6, ACM, New York, NY, USA, 2014. View at Publisher · View at Google Scholar · View at Scopus