Skip to main content

Bitcoin Node Discovery: Large-Scale Empirical Evaluation of Network Churn

  • Conference paper
  • First Online:
Book cover Artificial Intelligence and Security (ICAIS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11635))

Included in the following conference series:

Abstract

Bitcoin was founded by Nakamoto Satoshi on January 3, 2009, based on a borderless peer-to-peer network, founded with consensus initiative open source software. There are many nodes in the Bitcoin network. By discovering and analyzing these nodes, we can summarize some of the characteristics of Bitcoin and blockchain networks. In this paper, the following work was completed: (1) Explain the communication process and related protocols of Bitcoin nodes. (2) Large-scale discovery of bitcoin nodes. (3) Analyze and summarize the dynamic of the nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. In: Proceedings of the Conference on Social Computing (SocialCom) (2011). (Reid, F., Harrigan, M., Donet, J.A.D.)

    Google Scholar 

  2. https://coinmarketcap.com/zh/currencies/bitcoin/. Accessed 9 Nov 2018

  3. Liping, J.: Bitcoin: theory, practice and effect. Stud. Int. Finance 12, 002 (2013)

    Google Scholar 

  4. Swan, M.: Blueprint for a New Economy, p. 152. O’Reilly Media, Inc., Sebastopol (2015)

    Google Scholar 

  5. Tapscott, D., Tapscott, A.: Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World. Penguin, City of Westminster (2016)

    Google Scholar 

  6. Pazmiño, J.E., da Silva Rodrigues, C.K.: Simply dividing a bitcoin network node may reduce transaction verification time. SIJ Trans. Comput. Netw. Commun. Eng. (CNCE) 3(2), 17–21 (2015)

    Google Scholar 

  7. Antonopoulos, A.M.: Mastering Bitcoin (2014)

    Google Scholar 

  8. Brighten Godfrey, P., Shenker, S., Stoica, I.: Minimizing churn in distributed systems. In: SIGCOMM. ACM (2006)

    Google Scholar 

  9. Winter, P., Ensafi, R.: Identifying and characterizing Sybils in the Tor network. In: USENIX Security Symposium, 12 August (2016)

    Google Scholar 

  10. Li, P., Lei, Y.: Identification method for critical nodes in dynamic Ad hoc network. Appl. Res. Comput. 34(5) (2017)

    Google Scholar 

  11. Chen, L., Liu, P.: Analysis on dynamic evolution of nodes of AS-level topology. J. Beijing Univ. Technol. 44(4) (2018)

    Google Scholar 

  12. https://en.bitcoin.it/wiki/Satoshi_Client_Node_Discovery. Accessed 9 Nov 2018

  13. Orebaugh, A., Ramirez, G., Beale, J.: Wireshark & Ethereal Network Protocol Analyzer Toolkit. Elsevier, Amsterdam (2006)

    Google Scholar 

  14. https://github.com/sipa/bitcoin-seeder. Accessed 9 Nov 2018

  15. https://bitnodes.earn.com/. Accessed 9 Nov 2018

  16. https://en.wikipedia.org/wiki/Bitcoin. Accessed 9 Nov 2018

  17. Li, M., Sun, Y., Jiang, Y., Tian, Z.: Answering the min-cost quality-aware query on multi-sources in sensor-cloud systems. Sensors 18, 4486 (2018)

    Article  Google Scholar 

  18. Han, W., Tian, Z., Huang, Z., Li, S., Jia, Y.: Bidirectional self-adaptive resampling in imbalanced big data learning. Multimedia Tools Appl. (2018). https://doi.org/10.1007/s11042-018-6938-9

  19. Wang, Z., et al.: Automatically traceback RDP-based targeted ransomware attacks. Wirel. Commun. Mobile Comput. (2018). https://doi.org/10.1155/2018/7943586

    Google Scholar 

  20. Tian, Z., Su, S., Shi, W., Yu, X., Du, X., Guizani, M.: A data-driven model for future internet route decision modeling. Future Gener. Comput. Syst. (2018). https://doi.org/10.1016/j.future.2018.12.054

    Article  Google Scholar 

  21. Qiu, J., Chai, Y., Liu, Y., Gu, Z., Li, S., Tian, Z.: Automatic non-taxonomic relation extraction from big data in smart city. IEEE Access 6, 74854–74864 (2018). https://doi.org/10.1109/access.2018.2881422

    Article  Google Scholar 

  22. Sun, Y., Li, M., Su, S., Tian, Z., Shi, W., Han, M.: Secure data sharing framework via hierarchical greedy embedding in darknets. ACM/Springer Mobile Networks and Applications

    Google Scholar 

  23. Yu, X., Tian, Z., Qiu, J., Jiang, F.: A data leakage prevention method based on the reduction of confidential and context terms for smart mobile devices. Wirel. Commun. Mobile Comput. https://doi.org/10.1155/2018/5823439

    Google Scholar 

  24. Wang, Y., Tian, Z., Zhang, H., Su, S., Shi, W.: A privacy preserving scheme for nearest neighbor query. Sensors 18(8), 2440 (2018). https://doi.org/10.3390/s18082440

    Article  Google Scholar 

  25. Tian, Z., et al.: A real-time correlation of host-level events in cyber range service for smart campus. IEEE Access 6, 35355–35364 (2018). https://doi.org/10.1109/access.2018.2846590

    Article  Google Scholar 

  26. Tan, Q., Gao, Y., Shi, J., Wang, X., Fang, B., Tian, Z.: Towards a comprehensive insight into the eclipse attacks of tor hidden services. IEEE IoT J. (2018). https://doi.org/10.1109/jiot.2018.2846624

    Article  Google Scholar 

  27. Chen, J., Tian, Z., Cui, X., Yin, L., Wang, X.: Trust architecture and reputation evaluation for internet of things. J. Ambient Intell. Humaniz. Comput. 2, 1–9 (2018)

    Google Scholar 

  28. Wang, B., Gu, X., Yan, S.: STCS: a practical solar radiation based temperature correlation scheme in meteorological WSN. Int. J. Sens. Netw. 28(1), 22 (2018). https://doi.org/10.1504/ijsnet.2018.10015978

    Article  Google Scholar 

  29. Wang, B., Gu, X., Zhou, A.: E2S2: a code dissemination approach to energy efficiency and status surveillance for wireless sensor networks. J. Internet Technol. 8(4), 877–885 (2017). https://doi.org/10.6138/jit.2017.18.4.20160815

    Article  Google Scholar 

  30. Wang, B., Gu, X., Ma, L., Yan, S.: Temperature error correction based on BP neural network in meteorological WSN. Int. J. Sens. Netw. 23(4), 265–278 (2017). https://doi.org/10.1504/ijsnet.2017.083532

    Article  Google Scholar 

  31. Tan, Q., et al.: Towards a comprehensive insight into the eclipse attacks of Tor hidden services. IEEE IoT J., 1 (2018)

    Google Scholar 

  32. Zhang, H., Yi, Y., Wang, J., Cao, N., Duan, Q.: Network security situation awareness framework based on threat intelligence. In: CMC, vol. 56, no. 3, pp. 381–399 (2018)

    Google Scholar 

  33. Hou, M., Wei, R., Wang, T., Cheng, Y., Qian, B.: Reliable medical recommendation based on privacy-preserving collaborative filtering. In: CMC, vol. 56, no. 1, pp. 137–149 (2018)

    Google Scholar 

Download references

Acknowledgement

This work is supported by the National Natural Science Foundation of China under Grant NO. 61572153, NO. 61702220, and NO. 61702223, China Grants U1636215, and the National Key research and Development Plan (Grant NO. 2018YFB0803504).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangtao Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, Y., Tan, R., Kong, X., Tan, Q., Liu, X. (2019). Bitcoin Node Discovery: Large-Scale Empirical Evaluation of Network Churn. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11635. Springer, Cham. https://doi.org/10.1007/978-3-030-24268-8_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24268-8_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24267-1

  • Online ISBN: 978-3-030-24268-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics