Skip to main content

Bitcoin Network Size Estimation Based on Coupon Collection Model

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11635))

Abstract

Bitcoin was originally proposed in 2009 and exists as a p2p digital currency that can be exchanged for currency in most countries and is uncontrollable. Moreover, the bitcoin network is unstable, so it is imperative to study the security of bitcoin, and estimating its network size is one of the basic and important links. Based on the coupon collector model, this paper uses active measurement to estimate the size of the Bitcoin network. Experiments show that the model can achieve an average coverage of 88%, so the model can be used to estimate the network size. At the end of the paper, the problems and improvement ideas of the model are put forward, and this is the direction and focus of future research.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bitcoin is an innovative payment network and a new kind of money. https://bitcoin.org/en/. Accessed 17 Oct 2018

  2. Bitcoin White Paper: A Peer-to-Peer Electronic Cash System. https://www.8btc.com/wiki/bitcoin-a-peer-to-peer-electronic-cash-system. Accessed 17 Oct 2018

  3. Liu, J.C., Wang, H.Y., Xu, K.: Understanding peer distribution in the gloabal Internet. IEEE Netw. 24(4), 40–44 (2011)

    Google Scholar 

  4. Habeld, T., Lehrieder, F., Hock, D., et al.: Characterization of BitTorent swarms and thire distribution in the Internet. Comput. Netw. 55(5), 1197–1215 (2011)

    Google Scholar 

  5. Cui, Q., McIntosh, S., Sun, H.: Identifying materials of photographic images and photorealistic computer generated graphics based on deep CNNs. CMC Comput. Mater. Continua 55(2), 229–241 (2018)

    Google Scholar 

  6. Xiong, Z., Shen, Q., Wang, Y., Zhu, C.: Paragraph vector representation based on word to vector and CNN learning. CMC Comput. Mater. Continua 55(2), 213–227 (2018)

    Google Scholar 

  7. Tan, Q., Gao, Y., Shi, J., Wang, X., Fang, B., Tian, Z.: Towards a comprehensive insight into the eclipse attacks of tor hidden services. IEEE Internet Things J. (2018). https://doi.org/10.1109/jiot.2018.2846624

    Google Scholar 

  8. Zhang, H., Yi, Y., Wang, J., Cao, N., Duan, Q.: Network security situation awareness framework based on threat intelligence. CMC Comput. Mater. Continua 56(3), 381–399 (2018)

    Google Scholar 

  9. Gao, Y., Tan, Q., Shi, J., et al.: Large-scale discovery and empirical analysis for I2P eepSites. In: IEEE Symposium on Computers and Communications, vol. 1, pp. 444–449 (2017)

    Google Scholar 

  10. Cao, J.: Research about size estimation methods in P2P network. Comput. Eng. Appl. 44(20), 99–101 (2008)

    Google Scholar 

  11. Wang, X., Li, C., Shi, B., et al.: P2P cluster size estimation method based on random sampling process. Nanjing Normal Univ. 37(1), 76–80 (2014)

    Google Scholar 

  12. Yang, Z., Li, L., Ji, Q., et al.: An optimized P2P cluster rapid measurement model. Chin. Comput. Syst. 35(2), 296–302 (2014)

    Google Scholar 

  13. PeterNeal: The generalized coupon collector problem. Appl. Probab. 45(3), 621–629 (2008)

    Google Scholar 

  14. Vasudevan, S., Towsley, D., Goeckel, D., et al.: Neighbor discovery in wireless networks and the coupon collector’s problem. China (2009)

    Google Scholar 

  15. Bitcoin DNS Seed. https://bitcoin.org/en/glossary/dns-seed. Accessed 19 Oct 2018

  16. Bitcoin Source Code. https://github.com/bitcoin/bitcoin. Accessed 19 Oct 2018

  17. Ling, Z., Fu, X., Yu, W., Luo, J., Yang, M.: Extensive analysis and large-scale empirical evaluation of tor bridge discovery. Southeast University, Technical report (2011)

    Google Scholar 

  18. Liu, Q., Xu, P., Yang, H., et al.: Research on measurement of peer-to-peer file sharing system. J. Softw. 17(10), 2131–2140 (2006)

    MATH  Google Scholar 

  19. Li, M., Sun, Y., Jiang, Y., Tian, Z.: Answering the min-cost quality-aware query on multi-sources in sensor-cloud systems. Sensors (2018). https://doi.org/10.3390/s18124486

    Google Scholar 

  20. Han, W., Tian, Z., Huang, Z., Li, S., Jia, Y.: Bidirectional self-adaptive resampling in imbalanced big data learning. Multimed. Tools Appl. (2018). https://doi.org/10.1007/s11042-018-6938-9

  21. Wang, Z., et al.: Automatically traceback RDP-based targeted ransomware attacks. Wirel. Commun. Mob. Comput. (2018). https://doi.org/10.1155/2018/7943586

    Google Scholar 

  22. Tian, Z., Su, S., Shi, W., Yu, X., Du, X., Guizani, M.: A data-driven model for future internet route decision modeling. Future Gener. Comput. Syst. (2019). https://doi.org/10.1016/j.future.2018.12.054

    Google Scholar 

  23. Qiu, J., Chai, Y., Liu, Y., Gu, Z., Li, S., Tian, Z.: Automatic non-taxonomic relation extraction from big data in smart city. IEEE Access 6, 74854–74864 (2018). https://doi.org/10.1109/ACCESS.2018.2881422

    Article  Google Scholar 

  24. Sun, Y., Li, M., Su, S., Tian, Z., Shi, W., Han, M.: Secure data sharing framework via hierarchical greedy embedding in darknets. ACM/Springer Mob. Netw. Appl

    Google Scholar 

  25. Yu, X., Tian, Z., Qiu, J., Jiang, F.: A data leakage prevention method based on the reduction of confidential and context terms for smart mobile devices. Wirel. Commun. Mob. Comput. https://doi.org/10.1155/2018/5823439

    Google Scholar 

  26. Wang, Y., Tian, Z., Zhang, H., Su, S., Shi, W.: A privacy preserving scheme for nearest neighbor query. Sensors 18(8), 2440 (2018). https://doi.org/10.3390/s18082440

    Article  Google Scholar 

  27. Tian, Z., et al.: A real-time correlation of host-level events in cyber range service for smart campus. IEEE Access 6, 35355–35364 (2018). https://doi.org/10.1109/ACCESS.2018.2846590

    Article  Google Scholar 

  28. Chen, J., Tian, Z., Cui, X., Yin, L., Wang, X.: Trust architecture and reputation evaluation for Internet of Things. J. Ambient Intell. Humanized Comput. 2, 1–9 (2018)

    Google Scholar 

  29. Wu, C., Zapevalova, E., Chen, Y., Li, F.: Time optimization of multiple knowledge transfers in the big data environment. CMC Comput. Mater. Continua 54(3), 269–285 (2018)

    Google Scholar 

Download references

Acknowledgment

The authors would like to thank the anonymous reviewers for their helpful comments for improving this paper. This work is supported by the National Natural Science Foundation of China under grant (No. 61572153, No. 61871140, No. 61872100) and the National key research and development plan under Grant No. 2018YFB0803504.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Qingfeng Tan or Hui Lu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tan, R. et al. (2019). Bitcoin Network Size Estimation Based on Coupon Collection Model. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11635. Springer, Cham. https://doi.org/10.1007/978-3-030-24268-8_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24268-8_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24267-1

  • Online ISBN: 978-3-030-24268-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics