Skip to main content

Exploring Miner Evolution in Bitcoin Network

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8995))

Abstract

In recent years, Bitcoin, a peer-to-peer network based crypto digital currency, has attracted a lot of attentions from the media, the academia, and the general public. A user in Bitcoin network can create Bitcoins by packing and verifying new transactions in the network using their computation power. Driven by the price surge of Bitcoin, users are increasingly investing on expensive specialized hardware for Bitcoin mining. To obtain steady payouts, users also pool their computation resources to conduct pool mining. In this paper, we study the evolution of Bitcoin miners by analyzing the complete transaction blockchain. We characterize how the productivity, computation power and transaction activity of miners evolve over time. We also conduct an in-depth study on the largest mining pool F2Pool. We show how it grows over time and how computation power is distributed among its miners. Finally, we build a simple economic model to explain the evolution of Bitcoin miners.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). http://www.bitcoin.org/bitcoin.pdf

  2. bitcoin.org: Frequently asked questions. https://bitcoin.org/en/faq. Accessed 10 September 2014

  3. Coinbase.com. https://www.coinbase.com. Accessed 10 September 2014

  4. Bitstamp.com. https://www.bitstamp.net. Accessed 10 September 2014

  5. F2Pool.com. https://www.f2pool.com. Accessed 10 September 2014

  6. Babaioff, M., Dobzinski, S., Oren, S., Zohar, A.: On Bitcoin and red balloons. In: Proceedings of the 13th ACM Conference on Electronic Commerce, pp. 56–73. ACM (2012)

    Google Scholar 

  7. Decker, C., Wattenhofer, R.: Information propagation in the Bitcoin network. In: 2013 IEEE Thirteenth International Conference on Peer-to-Peer Computing (P2P), pp. 1–10. IEEE (2013)

    Google Scholar 

  8. Ron, D., Shamir, A.: Quantitative analysis of the full Bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6–24. Springer, Heidelberg (2013)

    Google Scholar 

  9. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of Bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127–140. ACM (2013)

    Google Scholar 

  10. Reid, F., Harrigan, M.: An analysis of anonymity in the Bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197–223. Springer, New York (2013)

    Google Scholar 

  11. Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable (2013). arXiv preprint arXiv:1311.0243.

  12. Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In: Proceedings of WEIS, vol. 2013 (2013)

    Google Scholar 

  13. Huang, D.Y., Dharmdasani, H., Meiklejohn, S., Dave, V., Grier, C., McCoy, D., Savage, S., Weaver, N., Snoeren, A.C., Levchenko, K.: Botcoin: monetizing stolen cycles. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2014)

    Google Scholar 

  14. Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H.P., Böhme, R.: Can we afford integrity by proof-of-work? Scenarios inspired by the Bitcoin currency. In: Böhme, R. (ed.) The Economics of Information Security and Privacy, pp. 135–156. Springer, Heidelberg (2013)

    Google Scholar 

  15. Bitcoinwiki: Bitcoin difficulty. https://en.bitcoin.it/wiki/Difficulty. Accessed 10 September 2014

  16. bitcoin.cz: World’s first mining pool celebrates 3rd year with 0% fee. https://mining.bitcoin.cz/news/2013-12-16-pool-celebrates-3rd-anniversary. Accessed 10 September 2014

  17. blockchain.info: an estimation of hashrate distribution amongst the largest mining pools. https://blockchain.info/pools/. Accessed 10 September 2014

  18. statista.com: Felectricity prices in selected countries in 2013 (in u.s. dollar cents per kilowatt hour). http://www.statista.com/statistics/263492/electricity-prices-in-selected-countries/. Accessed 10 September 2014

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luqin Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Wang, L., Liu, Y. (2015). Exploring Miner Evolution in Bitcoin Network. In: Mirkovic, J., Liu, Y. (eds) Passive and Active Measurement. PAM 2015. Lecture Notes in Computer Science(), vol 8995. Springer, Cham. https://doi.org/10.1007/978-3-319-15509-8_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15509-8_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15508-1

  • Online ISBN: 978-3-319-15509-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics