Abstract
Bitcoin was originally proposed in 2009 and exists as a p2p digital currency that can be exchanged for currency in most countries and is uncontrollable. Moreover, the bitcoin network is unstable, so it is imperative to study the security of bitcoin, and estimating its network size is one of the basic and important links. Based on the coupon collector model, this paper uses active measurement to estimate the size of the Bitcoin network. Experiments show that the model can achieve an average coverage of 88%, so the model can be used to estimate the network size. At the end of the paper, the problems and improvement ideas of the model are put forward, and this is the direction and focus of future research.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bitcoin is an innovative payment network and a new kind of money. https://bitcoin.org/en/. Accessed 17 Oct 2018
Bitcoin White Paper: A Peer-to-Peer Electronic Cash System. https://www.8btc.com/wiki/bitcoin-a-peer-to-peer-electronic-cash-system. Accessed 17 Oct 2018
Liu, J.C., Wang, H.Y., Xu, K.: Understanding peer distribution in the gloabal Internet. IEEE Netw. 24(4), 40–44 (2011)
Habeld, T., Lehrieder, F., Hock, D., et al.: Characterization of BitTorent swarms and thire distribution in the Internet. Comput. Netw. 55(5), 1197–1215 (2011)
Cui, Q., McIntosh, S., Sun, H.: Identifying materials of photographic images and photorealistic computer generated graphics based on deep CNNs. CMC Comput. Mater. Continua 55(2), 229–241 (2018)
Xiong, Z., Shen, Q., Wang, Y., Zhu, C.: Paragraph vector representation based on word to vector and CNN learning. CMC Comput. Mater. Continua 55(2), 213–227 (2018)
Tan, Q., Gao, Y., Shi, J., Wang, X., Fang, B., Tian, Z.: Towards a comprehensive insight into the eclipse attacks of tor hidden services. IEEE Internet Things J. (2018). https://doi.org/10.1109/jiot.2018.2846624
Zhang, H., Yi, Y., Wang, J., Cao, N., Duan, Q.: Network security situation awareness framework based on threat intelligence. CMC Comput. Mater. Continua 56(3), 381–399 (2018)
Gao, Y., Tan, Q., Shi, J., et al.: Large-scale discovery and empirical analysis for I2P eepSites. In: IEEE Symposium on Computers and Communications, vol. 1, pp. 444–449 (2017)
Cao, J.: Research about size estimation methods in P2P network. Comput. Eng. Appl. 44(20), 99–101 (2008)
Wang, X., Li, C., Shi, B., et al.: P2P cluster size estimation method based on random sampling process. Nanjing Normal Univ. 37(1), 76–80 (2014)
Yang, Z., Li, L., Ji, Q., et al.: An optimized P2P cluster rapid measurement model. Chin. Comput. Syst. 35(2), 296–302 (2014)
PeterNeal: The generalized coupon collector problem. Appl. Probab. 45(3), 621–629 (2008)
Vasudevan, S., Towsley, D., Goeckel, D., et al.: Neighbor discovery in wireless networks and the coupon collector’s problem. China (2009)
Bitcoin DNS Seed. https://bitcoin.org/en/glossary/dns-seed. Accessed 19 Oct 2018
Bitcoin Source Code. https://github.com/bitcoin/bitcoin. Accessed 19 Oct 2018
Ling, Z., Fu, X., Yu, W., Luo, J., Yang, M.: Extensive analysis and large-scale empirical evaluation of tor bridge discovery. Southeast University, Technical report (2011)
Liu, Q., Xu, P., Yang, H., et al.: Research on measurement of peer-to-peer file sharing system. J. Softw. 17(10), 2131–2140 (2006)
Li, M., Sun, Y., Jiang, Y., Tian, Z.: Answering the min-cost quality-aware query on multi-sources in sensor-cloud systems. Sensors (2018). https://doi.org/10.3390/s18124486
Han, W., Tian, Z., Huang, Z., Li, S., Jia, Y.: Bidirectional self-adaptive resampling in imbalanced big data learning. Multimed. Tools Appl. (2018). https://doi.org/10.1007/s11042-018-6938-9
Wang, Z., et al.: Automatically traceback RDP-based targeted ransomware attacks. Wirel. Commun. Mob. Comput. (2018). https://doi.org/10.1155/2018/7943586
Tian, Z., Su, S., Shi, W., Yu, X., Du, X., Guizani, M.: A data-driven model for future internet route decision modeling. Future Gener. Comput. Syst. (2019). https://doi.org/10.1016/j.future.2018.12.054
Qiu, J., Chai, Y., Liu, Y., Gu, Z., Li, S., Tian, Z.: Automatic non-taxonomic relation extraction from big data in smart city. IEEE Access 6, 74854–74864 (2018). https://doi.org/10.1109/ACCESS.2018.2881422
Sun, Y., Li, M., Su, S., Tian, Z., Shi, W., Han, M.: Secure data sharing framework via hierarchical greedy embedding in darknets. ACM/Springer Mob. Netw. Appl
Yu, X., Tian, Z., Qiu, J., Jiang, F.: A data leakage prevention method based on the reduction of confidential and context terms for smart mobile devices. Wirel. Commun. Mob. Comput. https://doi.org/10.1155/2018/5823439
Wang, Y., Tian, Z., Zhang, H., Su, S., Shi, W.: A privacy preserving scheme for nearest neighbor query. Sensors 18(8), 2440 (2018). https://doi.org/10.3390/s18082440
Tian, Z., et al.: A real-time correlation of host-level events in cyber range service for smart campus. IEEE Access 6, 35355–35364 (2018). https://doi.org/10.1109/ACCESS.2018.2846590
Chen, J., Tian, Z., Cui, X., Yin, L., Wang, X.: Trust architecture and reputation evaluation for Internet of Things. J. Ambient Intell. Humanized Comput. 2, 1–9 (2018)
Wu, C., Zapevalova, E., Chen, Y., Li, F.: Time optimization of multiple knowledge transfers in the big data environment. CMC Comput. Mater. Continua 54(3), 269–285 (2018)
Acknowledgment
The authors would like to thank the anonymous reviewers for their helpful comments for improving this paper. This work is supported by the National Natural Science Foundation of China under grant (No. 61572153, No. 61871140, No. 61872100) and the National key research and development plan under Grant No. 2018YFB0803504.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Tan, R. et al. (2019). Bitcoin Network Size Estimation Based on Coupon Collection Model. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11635. Springer, Cham. https://doi.org/10.1007/978-3-030-24268-8_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-24268-8_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24267-1
Online ISBN: 978-3-030-24268-8
eBook Packages: Computer ScienceComputer Science (R0)