Abstract
In recent years, considerable efforts have been directed toward investigating the large amount of public transaction data in prominent cryptocurrencies. Nevertheless, aside from Bitcoin and Ethereum, little efforts have been made to investigate other cryptocurrencies, even though the market now comprises thousands, with more than 50 exceeding one billion dollars of capitalization, and some of them sporting innovative technical solutions and governance. This is the case for Polkadot, a relatively new blockchain that promises to solve the shortcomings in scalability and interoperability that encumber many existing blockchain-based systems. In particular, Polkadot relies on a novel multi-chain construction that promises to enable interoperability among heterogeneous blockchains.
This paper presents the first study to formally model and investigate user transactions in the Polkadot network. Our contributions are multifolds: After defining proper and pseudo-spam transactions, we built the transaction graph based on data collected from the launch of the network, in May 2020, until July 2022. The dataset consists of roughly 11 million blocks, including 2 million user accounts and 7.6 million transactions. We applied a selected set of graph metrics, such as degree distribution, strongly/weakly connected components, density, and several centrality measures, to the collected data. In addition, we also investigated a few interesting idiosyncratic indicators, such as the accounts’ balance over time and improper transactions. Our results shed light on the topology of the network, which resembles a heavy-tailed power-law distribution, demonstrate that Polkadot is affected by the rich get richer conundrum, and provide other insights into the financial ecosystem of the network. The approach, methodology, and metrics proposed in this work, while being applied to Polkadot, can also be applied to other cryptocurrencies, hence having a high potential impact and the possibility to further research in the cryptocurrency field.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Data sourced from https://coinmarketcap.com/.
- 2.
- 3.
References
Abbas, H., Caprolu, M., Di Pietro, R.: Analysis of polkadot: architecture, internals, and contradictions. In: 2022 IEEE International Conference on Blockchain (Blockchain), pp. 61–70 (2022). https://doi.org/10.1109/Blockchain55522.2022.00042
Ali, I.M., Caprolu, M., Di Pietro, R.: Foundations, properties, and security applications of puzzles: a survey. ACM Comput. Surv. 53(4), 1–38 (2020). https://doi.org/10.1145/3396374
Aysan, A.F., Khan, A.U.I., Topuz, H., Tunali, A.S.: Survival of the fittest: a natural experiment from crypto exchanges. Singapore Econ. Rev. 1–20 (2021)
Caprolu, M., Pontecorvi, M., Signorini, M., Segarra, C., Di Pietro, R.: Analysis and patterns of unknown transactions in bitcoin. In: 2021 IEEE International Conference on Blockchain (Blockchain), pp. 170–179 (2021). https://doi.org/10.1109/Blockchain53845.2021.00031
Chen, T., et al.: Understanding Ethereum via graph analysis. ACM Trans. Internet Technol. (TOIT) 20(2), 1–32 (2020)
Di Battista, G., Di Donato, V., Patrignani, M., Pizzonia, M., Roselli, V., Tamassia, R.: Bitconeview: visualization of flows in the bitcoin transaction graph. In: 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1–8. IEEE (2015)
Di Francesco Maesa, D., Marino, A., Ricci, L.: Data-driven analysis of bitcoin properties: exploiting the users graph. Int. J. Data Sci. Analytics 6(1), 63–80 (2018)
Guo, D., Dong, J., Wang, K.: Graph structure and statistical properties of Ethereum transaction relationships. Inf. Sci. 492, 58–71 (2019)
Harrigan, M., Fretter, C.: The unreasonable effectiveness of address clustering. In: 2016 Intl IEEE Conferences on Ubiquitous Intelligence Computing. Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), pp. 368–373. IEEE, Toulouse, France (July (2016)
Jawaheri, H.A., Sabah, M.A., Boshmaf, Y., Erbad, A.: Deanonymizing tor hidden service users through bitcoin transactions analysis. Comput. Secur. 89, 101684 (2020) https://doi.org/10.1016/j.cose.2019.101684, https://www.sciencedirect.com/science/article/pii/S0167404818309908
Khan, A.: Graph analysis of the Ethereum blockchain data: a survey of datasets, methods, and future work. In: 2022 IEEE International Conference on Blockchain (Blockchain), pp. 250–257 (2022). https://doi.org/10.1109/Blockchain55522.2022.00019
Lee, X.T., Khan, A., Sen Gupta, S., Ong, Y.H., Liu, X.: Measurements, analyses, and insights on the entire Ethereum blockchain network. In: Proceedings of The Web Conference 2020, pp. 155–166 (2020)
Lin, D., Wu, J., Yuan, Q., Zheng, Z.: Modeling and understanding Ethereum transaction records via a complex network approach. IEEE Trans. Circ. Syst. II Express Briefs 67(11), 2737–2741 (2020). https://doi.org/10.1109/TCSII.2020.2968376
Di Francesco Maesa, D., Marino, A., Ricci, L.: An analysis of the Bitcoin users graph: inferring unusual behaviours. In: COMPLEX NETWORKS 2016 2016. SCI, vol. 693, pp. 749–760. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-50901-3_59
Motamed, A.P., Bahrak, B.: Quantitative analysis of cryptocurrencies transaction graph. Appl. Netw. Sci. 4(1), 1–21 (2019)
Neudecker, T., Hartenstein, H.: Could network information facilitate address clustering in bitcoin? In: Brenner, M., et al. (eds.) Financial Cryptography and Data Security, pp. 155–169. Springer International Publishing, Cham (2017)
Piraveenan, M.R.: Topological Analysis of Complex Networks Using Assortativity. University of Sydney (2010)
Polkadot: Polkadot v1.0: Sharding and economic security. https://polkadot.network/blog/polkadot-v1-0-sharding-and-economic-security/. Accessed 10 Oct 2022
Polkadot.js: Polkadot.js phishing known addresses. https://github.com/polkadot-js/phishing/blob/master/known.json. Accessed 10 Oct 2022
Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6–24. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_2
Serena, L., Ferretti, S., D’Angelo, G.: Cryptocurrencies activity as a complex network: analysis of transactions graphs. Peer-to-Peer Netw. Appl. 15(6), 1–15 (2021)
Victor, F.: Address clustering heuristics for Ethereum. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 617–633. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-51280-4_33
Wang, G., Shi, Z.J., Nixon, M., Han, S.: SoK: sharding on blockchain. In: Proceedings of the 1st ACM Conference on Advances in Financial Technologies, pp. 41–61 (2019)
Wood, G.: Polkadot: vision for a heterogeneous multi-chain framework. White Pap. 21, 2327–4662 (2016)
Zhou, S., Mondragón, R.J.: The rich-club phenomenon in the internet topology. IEEE Commun. Lett. 8(3), 180–182 (2004)
Acknowledgments
This publication was partially supported by the Qatar National Research Fund (QNRF), a member of The Qatar Foundation, through the awards [NPRP-S-11-0109-180242] and [NPRP11C-1229-170007]. The information and views set out in this publication are those of the authors and do not necessarily reflect the official opinion of the QNRF.* Dr. Roberto Di Pietro produced part of his contributions while he was at HBKU-CSE.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 International Financial Cryptography Association
About this paper
Cite this paper
Abbas, H., Caprolu, M., Di Pietro, R. (2024). Understanding Polkadot Through Graph Analysis: Transaction Model, Network Properties, and Insights. In: Baldimtsi, F., Cachin, C. (eds) Financial Cryptography and Data Security. FC 2023. Lecture Notes in Computer Science, vol 13951. Springer, Cham. https://doi.org/10.1007/978-3-031-47751-5_15
Download citation
DOI: https://doi.org/10.1007/978-3-031-47751-5_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-47750-8
Online ISBN: 978-3-031-47751-5
eBook Packages: Computer ScienceComputer Science (R0)