Abstract
Recent Bitcoin attacks [15, 17, 18] commonly exploit the phenomenon of so-called weak block synchronization in Bitcoin. The attacks use two independently-operated Bitcoin monitors — i.e., Bitnodes and a system of customized supernodes — to confirm that block propagation in Bitcoin is surprisingly slow. In particular, Bitnodes constantly reports that around 30% of nodes are 3 blocks (or more) behind the blockchain tip and the supernodes show that on average more than 60% of nodes do not receive the latest block even after waiting for 10 min. In this paper, we carefully re-evaluate these controversial claims with our own experiments in the live Bitcoin network and show that block propagation in Bitcoin is, in fact, fast enough (e.g., most peers we monitor receive new blocks in about 4 s) for its safety property. We identify several limitations and bugs of the two monitors, which have led to these inaccurate claims about the Bitcoin block synchronization. We finally ask several open-ended questions regarding the technical and ethical issues around monitoring blockchain networks.
S. Baek and H. Nam—Co-leading authors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bitcoin Lockstep Synchronous (2021). https://anonymous.4open.science/r/56e77487-0470-4e10-b634-b13e939863c0
bloxroute (2021). https://bloxroute.com/
Coin Dance: Bitcoin Nodes Summary (2021). https://coin.dance/nodes
Corallo, M.: BIP 152: Compact Block Relay (2016)
Decker, C., Wattenhofer, R.: Information propagation in the Bitcoin network. In: Proceedings of IEEE P2P (2013)
Delgado-Segura, S., et al.: TxProbe: Discovering Bitcoin’s network topology Using orphan transactions. In: Proceedings of FC (2019)
DSN Bitcoin Monitoring (2021). https://www.dsn.kastel.kit.edu/bitcoin/
FIBRE: Fast Internet Bitcoin Relay Engine (2021). https://bitcoinfibre.org/
Jansen, R., Johnson, A.: Safely measuring Tor. In: Proceedings of ACM CCS (2016)
Kiffer, L., Rajaraman, R., Shelat, A.: A better method to analyze blockchain consistency. In: Proceedings of ACM CCS (2018)
Mani, A., Wilson-Brown, T., Jansen, R., Johnson, A., Sherr, M.: Understanding Tor usage with privacy-preserving measurement. In: Proceedings of ACM IMC (2018)
Miller, A., et al.: Discovering Bitcoin’s Public Topology and Influential Nodes (2015)
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2009)
Neudecker, T., Andelfinger, P., Hartenstein, H.: Timing analysis for inferring the topology of the Bitcoin peer-to-peer network. In: IEEE ATC (2016)
Saad, M., Anwar, A., Ravi, S., Mohaisen, D.: Revisiting nakamoto onsensus in asynchronous networks: a comprehensive analysis of Bitcoin safety and chain quality. In: ACM CCS (2021)
Saad, M., Chen, S., Mohaisen, D.: Root cause analyses for the deteriorating bitcoin network synchronization. In: Proceedings of IEEE ICDCS (2019)
Saad, M., Chen, S., Mohaisen, D.: SyncAttack: double-spending in Bitcoin without mining power. In: ACM CCS (2021)
Saad, M., Cook, V., Nguyen, L., Thai, M.T., Mohaisen, A.: Partitioning attacks on Bitcoin: colliding space, time, and logic. In: Proceedings of IEEE ICDCS (2019)
Yeow, A.: Bitnodes source code (2021). https://github.com/ayeowch/bitnodes
Yeow, A.: Global Bitcoin nodes distribution (2021). https://bitnodes.io/
Acknowledgements
This work was supported by Electronics and Telecommunications Research Institute (ETRI) grant funded by the Korean Government (22ZR1330, Research on Intelligent Cyber Security and Trust Infra).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 International Financial Cryptography Association
About this paper
Cite this paper
Baek, S., Nam, H., Oh, Y., Tran, M., Kang, M.S. (2022). Short Paper: On the Claims of Weak Block Synchronization in Bitcoin. In: Eyal, I., Garay, J. (eds) Financial Cryptography and Data Security. FC 2022. Lecture Notes in Computer Science, vol 13411. Springer, Cham. https://doi.org/10.1007/978-3-031-18283-9_33
Download citation
DOI: https://doi.org/10.1007/978-3-031-18283-9_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-18282-2
Online ISBN: 978-3-031-18283-9
eBook Packages: Computer ScienceComputer Science (R0)