A survey of data transfer and storage techniques in prevalent cryptocurrencies and suggested improvements

08/10/2018
by   Sunny Katkuri, et al.
0

This thesis focuses on aspects related to the functioning of the gossip networks underlying three relatively popular cryptocurrencies: Ethereum, Nano and IOTA. We look at topics such as automatic discovery of peers when a new node joins the network, bandwidth usage of a node, message passing protocols and storage schemas and optimizations for the shared ledger. We believe this is a topic that is often overlooked in works about blockchains and cryptocurrencies. Vulnerabilities and inefficiencies attain a higher significance than ones in a regular open source project because of the rather direct financial implications of these projects. Barring Bitcoin, a network that has been around for nearly 10 years, no other project has substantial documentation for its operational details other than scattered and sparse pages in the source code repositories. Almost all of the content described here has been extracted by studying the source code of the reference implementations of these projects. We evaluate the use of Invertible Bloom Lookup Tables and the Graphene protocol to decrease block propagation times and bandwidth usage of certain messages. We perform realistic simulations that show significant improvements. We provide a complete implementation of Graphene in Geth, Ethereum's main node software and test this implementation against the main Ethereum blockchain. We also crawled the chosen cryptocurrency networks for publicly visible nodes and provide an Autonomous System-level breakdown of these nodes with the end goal of estimating the ease of performing attacks such as BGP hijacks and their impact. Code written for implementing Graphene in Geth, performing various simulations and for other miscellaneous tasks has been uploaded to Github at https://github.com/sunfinite/masters-thesis.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/30/2022

BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects

Due to the open-source nature of the blockchain ecosystem, it is common ...
research
05/25/2023

An Empirical Study on Workflows and Security Policies in Popular GitHub Repositories

In open-source projects, anyone can contribute, so it is important to ha...
research
05/18/2021

Residual Network and Embedding Usage: New Tricks of Node Classification with Graph Convolutional Networks

Graph Convolutional Networks (GCNs) and subsequent variants have been pr...
research
05/10/2018

EthIR: A Framework for High-Level Analysis of Ethereum Bytecode

Analyzing Ethereum bytecode, rather than the source code from which it w...
research
05/19/2022

Security Analysis of DeFi: Vulnerabilities, Attacks and Advances

Decentralized finance (DeFi) in Ethereum is a financial ecosystem built ...
research
01/26/2021

Ethereum ECCPoW

The error-correction code based proof-of-work (ECCPoW) algorithm is base...
research
07/06/2020

GossipSub: Attack-Resilient Message Propagation in the Filecoin and ETH2.0 Networks

Permissionless blockchain environments necessitate the use of a fast and...

Please sign up or login with your details

Forgot password? Click here to reset