skip to main content
10.1145/3384943.3409418acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Mining the Characteristics of the Ethereum P2P Network

Authors Info & Claims
Published:06 October 2020Publication History

ABSTRACT

Ethereum is the typical representative of the second generation of Blockchain technology. To achieve anonymity and decentralization, Ethereum utilizes a structured P2P network for data broadcasting, replication, and synchronization. The Ethereum P2P network topology construction profoundly affects the overall Ethereum system performance and reliability. However, there are few studies on the Ethereum underlying P2P overlay network topology. In this paper, we perform a preliminary investigation on this extensive Ethereum P2P system with a comprehensive measurement method combining active and passive methods. We gather Ethereum nodes information by active method for nodes crawling and verification, and we use the passive network traffic monitoring for routing data gathering. After a period of data collection for more than one month, we get a massive data set that has more than 50 million routing data entries. This data set allows us to gain knowledge on the Ethereum network scale and to derive mathematical characteristics of overlay network structure. By analyzing the data set comprehensively, we find that the Ethereum network exhibits both small-world and scale-free characteristics. There are a few critical nodes that have a significant impact on the robustness and vulnerability of the whole system. The Ethereum network also has a very high concentration in terms of network routing, which is very vulnerable to routing attacks.

References

  1. [n.d.]. Cryptocurrency Market Capitalizations. https://coinmarketcap.com/. Accessed September 2, 2019.Google ScholarGoogle Scholar
  2. [n.d.]. Discovery protocol. https://github.com/ethereum/devp2p/wiki/Discovery- Overview.Google ScholarGoogle Scholar
  3. [n.d.]. Ethereum Node Records. https://github.com/ethereum/devp2p/blob/ master/enr.md.Google ScholarGoogle Scholar
  4. [n.d.]. Node Discovery Protocol v4. https://github.com/ethereum/devp2p/blob/ master/discv4.md.Google ScholarGoogle Scholar
  5. [n.d.]. What is Ether. https://www.ethereum.org/ether.Google ScholarGoogle Scholar
  6. [n.d.]. What is Ethereum. https://github.com/ethereum/wiki/wiki/What-is- Ethereum.Google ScholarGoogle Scholar
  7. [n.d.]. whisper. https://github.com/ethereum/whisper.Google ScholarGoogle Scholar
  8. [n.d.]. www.ethernodes.org. https://www.ethernodes.org/.Google ScholarGoogle Scholar
  9. Andra Anoaica and Hugo Levard. 2018. Quantitative Description of Internal Activity on the Ethereum Public Blockchain. In 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018, Paris, France, February 26--28, 2018. 1--5. https://doi.org/10.1109/NTMS.2018.8328741Google ScholarGoogle Scholar
  10. Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22--26, 2017. 375--392. https://doi.org/10. 1109/SP.2017.29Google ScholarGoogle Scholar
  11. Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli. 2017. A Survey of Attacks on Ethereum Smart Contracts (SoK). In Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22--29, 2017, Proceedings. 164--186. https://doi.org/10.1007/978--3--662--54455--6_8Google ScholarGoogle Scholar
  12. Massimo Bartoletti and Livio Pompianu. 2017. An Empirical Analysis of Smart Contracts: Platforms, Applications, and Design Patterns. In Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. 494--509. https://doi.org/10.1007/978--3--319--70278-0_31Google ScholarGoogle ScholarCross RefCross Ref
  13. Guido Bertoni, Joan Daemen, Michael Peeters, and Gilles Van Assche. 2011. The Keccak SHA-3 submission. http://keccak.noekeon.org/.Google ScholarGoogle Scholar
  14. Gabriele D'Angelo and Stefano Ferretti. 2017. Highly intensive data dissemination in complex networks. J. Parallel Distrib. Comput. 99 (2017), 28--50. https://doi. org/10.1016/j.jpdc.2016.08.004Google ScholarGoogle ScholarCross RefCross Ref
  15. Sergi Delgado-Segura, Surya Bakshi, Cristina Pérez-Solà, James Litton, Andrew Pachulski, Andrew Miller, and Bobby Bhattacharjee. 2019. TxProbe: Discovering Bitcoin's network topology using orphan transactions. In International Conference on Financial Cryptography and Data Security. Springer, 550--566.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Joan Antoni Donet Donet, Cristina Pérez-Solà, and Jordi Herrera-Joancomartí. 2014. The Bitcoin P2P Network. In Financial Cryptography and Data Security - FC 2014Workshops, BITCOIN andWAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers. 87--102. https://doi.org/10.1007/978--3--662--44774--1_7Google ScholarGoogle Scholar
  17. Meryam Essaid, Sejin Park, and Hongteak Ju. 2019. Visualising Bitcoin's Dynamic P2P Network Topoogy and Performance. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 141--145.Google ScholarGoogle ScholarCross RefCross Ref
  18. Stefano Ferretti. 2013. Gossiping for resource discovering: An analysis based on complex network theory. Future Generation Comp. Syst. 29, 6 (2013), 1631--1644. https://doi.org/10.1016/j.future.2012.06.002Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, and Emin Gün Sirer. 2018. Decentralization in Bitcoin and Ethereum Networks. In Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 - March 2, 2018, Revised Selected Papers. 439--457. https://doi.org/10.1007/978--3--662--58387--6_24Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. go ethereum. [n.d.]. Official Go implementation of the Ethereum protocol. https: //github.com/ethereum/go-ethereum.Google ScholarGoogle Scholar
  21. Everett Hildenbrandt, Manasvi Saxena, Nishant Rodrigues, Xiaoran Zhu, Philip Daian, Dwight Guth, Brandon M. Moore, Daejun Park, Yi Zhang, Andrei Stefanescu, and Grigore Rosu. 2018. KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine. In 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9--12, 2018. 204--217. https: //doi.org/10.1109/CSF.2018.00022Google ScholarGoogle Scholar
  22. Yoichi Hirai. 2017. Defining the Ethereum Virtual Machine for Interactive Theorem Provers. In Financial Cryptography and Data Security - FC 2017 International Workshops,WAHC, BITCOIN, VOTING,WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. 520--535. https://doi.org/10.1007/978--3--319--70278-0_33Google ScholarGoogle Scholar
  23. Sushant Jain, Ratul Mahajan, and David Wetherall. 2003. A Study of the Performance Potential of DHT-based Overlays. In 4th USENIX Symposium on Internet Technologies and Systems, USITS'03, Seattle, Washington, USA, March 26--28, 2003. http://www.usenix.org/events/usits03/tech/jain.htmlGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  24. Marco Alberto Javarone and Craig Steven Wright. 2018. From Bitcoin to Bitcoin Cash: a network analysis. In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, CRYBLOCK@MobiSys 2018, Munich, Germany, June 15, 2018. 77--81. https://doi.org/10.1145/3211933.3211947Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Don Johnson, Alfred Menezes, and Scott Vanstone. 2001. The elliptic curve digital signature algorithm (ECDSA). International journal of information security 1, 1 (2001), 36--63.Google ScholarGoogle Scholar
  26. Seoung Kyun Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller, and Michael Bailey. 2018. Measuring Ethereum Network Peers. In Proceedings of the Internet Measurement Conference 2018, IMC 2018, Boston, MA, USA, October 31 - November 02, 2018. 91--104. https://dl.acm.org/citation.cfm?id=3278542Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, and Aquinas Hobor. 2016. Making Smart Contracts Smarter. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24--28, 2016. 254--269. https://doi.org/10.1145/2976749.2978309Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Petar Maymounkov and David Mazières. 2002. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7--8, 2002, Revised Papers. 53--65. https://doi.org/10.1007/3--540--45748--8_5Google ScholarGoogle Scholar
  29. Roberta De Michele, Stefano Ferretti, and Marco Furini. 2019. On helping broadcasters to promote TV-shows through hashtags. Multimedia Tools Appl. 78, 3 (2019), 3279--3296. https://doi.org/10.1007/s11042-018--6510--7Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Andrew Miller, James Litton, Andrew Pachulski, Neal Gupta, Dave Levin, Neil Spring, and Bobby Bhattacharjee. 2015. Discovering bitcoin's public topology and influential nodes. et al (2015).Google ScholarGoogle Scholar
  31. Satoshi Nakamoto et al. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).Google ScholarGoogle Scholar
  32. Ricardo Neisse, Gary Steri, and Igor Nai Fovino. 2017. A Blockchain-based Approach for Data Accountability and Provenance Tracking. In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017. 14:1--14:10. https://doi.org/10. 1145/3098954.3098958Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Till Neudecker, Philipp Andelfinger, and Hannes Hartenstein. 2016. Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Toulouse, France, July 18--21, 2016. 358--367. https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld. 2016.0070Google ScholarGoogle Scholar
  34. White Paper. [n.d.]. A Next-Generation Smart Contract and Decentralized Application Platform. https://github.com/ethereum/wiki/wiki/White-Paper. Accessed September 2, 2019.Google ScholarGoogle Scholar
  35. parity ethereum. [n.d.]. The fast, light, and robust EVM and WASM client. https://github.com/paritytech/parity.Google ScholarGoogle Scholar
  36. Emanuele Di Pascale, Jasmina McMenamy, Irene Macaluso, and Linda Doyle. 2017. Smart Contract SLAs for Dense Small-Cell-as-a-Service. CoRR abs/1703.04502 (2017). arXiv:1703.04502 http://arxiv.org/abs/1703.04502Google ScholarGoogle Scholar
  37. Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi, and Simon Duquennoy. 2017. Towards Blockchain-based Auditable Storage and Sharing of IoT Data. In Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS 2017, Dallas, TX, USA, November 3, 2017. 45--50. https://doi.org/10.1145/3140649.3140656Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Melanie Swan. 2015. Blockchain: Blueprint for a new economy. " O'Reilly Media, Inc.".Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Stanley Wasserman and Katherine Faust. 1994. Social Network Analysis: Methods and Applications. Cambridge University Press. https://doi.org/10.1017/ CBO9780511815478Google ScholarGoogle Scholar
  40. Duncan J Watts and Steven H Strogatz. 1998. Collective dynamics of 'smallworld'networks. nature 393, 6684 (1998), 440.Google ScholarGoogle Scholar
  41. Qi Zhang, Xi Lu, Meizhu Li, Yong Deng, and Sankaran Mahadevan. 2014. A new structure entropy of complex networks based on Tsallis nonextensive statistical mechanics. CoRR abs/1411.6082 (2014). arXiv:1411.6082 http://arxiv.org/abs/1411.6082Google ScholarGoogle Scholar
  42. Mirko Zichichi, Michele Contu, Stefano Ferretti, and Gabriele D'Angelo. 2019. LikeStarter: a Smart-contract based Social DAO for Crowdfunding. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2019, Paris, France, April 29 - May 2, 2019. 313--318. https://doi.org/10.1109/INFCOMW.2019.8845133Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Mining the Characteristics of the Ethereum P2P Network

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure
      October 2020
      223 pages
      ISBN:9781450376105
      DOI:10.1145/3384943

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 October 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate44of12submissions,367%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader