Abstract
Bitcoin was founded by Nakamoto Satoshi on January 3, 2009, based on a borderless peer-to-peer network, founded with consensus initiative open source software. There are many nodes in the Bitcoin network. By discovering and analyzing these nodes, we can summarize some of the characteristics of Bitcoin and blockchain networks. In this paper, the following work was completed: (1) Explain the communication process and related protocols of Bitcoin nodes. (2) Large-scale discovery of bitcoin nodes. (3) Analyze and summarize the dynamic of the nodes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. In: Proceedings of the Conference on Social Computing (SocialCom) (2011). (Reid, F., Harrigan, M., Donet, J.A.D.)
https://coinmarketcap.com/zh/currencies/bitcoin/. Accessed 9 Nov 2018
Liping, J.: Bitcoin: theory, practice and effect. Stud. Int. Finance 12, 002 (2013)
Swan, M.: Blueprint for a New Economy, p. 152. O’Reilly Media, Inc., Sebastopol (2015)
Tapscott, D., Tapscott, A.: Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World. Penguin, City of Westminster (2016)
Pazmiño, J.E., da Silva Rodrigues, C.K.: Simply dividing a bitcoin network node may reduce transaction verification time. SIJ Trans. Comput. Netw. Commun. Eng. (CNCE) 3(2), 17–21 (2015)
Antonopoulos, A.M.: Mastering Bitcoin (2014)
Brighten Godfrey, P., Shenker, S., Stoica, I.: Minimizing churn in distributed systems. In: SIGCOMM. ACM (2006)
Winter, P., Ensafi, R.: Identifying and characterizing Sybils in the Tor network. In: USENIX Security Symposium, 12 August (2016)
Li, P., Lei, Y.: Identification method for critical nodes in dynamic Ad hoc network. Appl. Res. Comput. 34(5) (2017)
Chen, L., Liu, P.: Analysis on dynamic evolution of nodes of AS-level topology. J. Beijing Univ. Technol. 44(4) (2018)
https://en.bitcoin.it/wiki/Satoshi_Client_Node_Discovery. Accessed 9 Nov 2018
Orebaugh, A., Ramirez, G., Beale, J.: Wireshark & Ethereal Network Protocol Analyzer Toolkit. Elsevier, Amsterdam (2006)
https://github.com/sipa/bitcoin-seeder. Accessed 9 Nov 2018
https://bitnodes.earn.com/. Accessed 9 Nov 2018
https://en.wikipedia.org/wiki/Bitcoin. Accessed 9 Nov 2018
Li, M., Sun, Y., Jiang, Y., Tian, Z.: Answering the min-cost quality-aware query on multi-sources in sensor-cloud systems. Sensors 18, 4486 (2018)
Han, W., Tian, Z., Huang, Z., Li, S., Jia, Y.: Bidirectional self-adaptive resampling in imbalanced big data learning. Multimedia Tools Appl. (2018). https://doi.org/10.1007/s11042-018-6938-9
Wang, Z., et al.: Automatically traceback RDP-based targeted ransomware attacks. Wirel. Commun. Mobile Comput. (2018). https://doi.org/10.1155/2018/7943586
Tian, Z., Su, S., Shi, W., Yu, X., Du, X., Guizani, M.: A data-driven model for future internet route decision modeling. Future Gener. Comput. Syst. (2018). https://doi.org/10.1016/j.future.2018.12.054
Qiu, J., Chai, Y., Liu, Y., Gu, Z., Li, S., Tian, Z.: Automatic non-taxonomic relation extraction from big data in smart city. IEEE Access 6, 74854–74864 (2018). https://doi.org/10.1109/access.2018.2881422
Sun, Y., Li, M., Su, S., Tian, Z., Shi, W., Han, M.: Secure data sharing framework via hierarchical greedy embedding in darknets. ACM/Springer Mobile Networks and Applications
Yu, X., Tian, Z., Qiu, J., Jiang, F.: A data leakage prevention method based on the reduction of confidential and context terms for smart mobile devices. Wirel. Commun. Mobile Comput. https://doi.org/10.1155/2018/5823439
Wang, Y., Tian, Z., Zhang, H., Su, S., Shi, W.: A privacy preserving scheme for nearest neighbor query. Sensors 18(8), 2440 (2018). https://doi.org/10.3390/s18082440
Tian, Z., et al.: A real-time correlation of host-level events in cyber range service for smart campus. IEEE Access 6, 35355–35364 (2018). https://doi.org/10.1109/access.2018.2846590
Tan, Q., Gao, Y., Shi, J., Wang, X., Fang, B., Tian, Z.: Towards a comprehensive insight into the eclipse attacks of tor hidden services. IEEE IoT J. (2018). https://doi.org/10.1109/jiot.2018.2846624
Chen, J., Tian, Z., Cui, X., Yin, L., Wang, X.: Trust architecture and reputation evaluation for internet of things. J. Ambient Intell. Humaniz. Comput. 2, 1–9 (2018)
Wang, B., Gu, X., Yan, S.: STCS: a practical solar radiation based temperature correlation scheme in meteorological WSN. Int. J. Sens. Netw. 28(1), 22 (2018). https://doi.org/10.1504/ijsnet.2018.10015978
Wang, B., Gu, X., Zhou, A.: E2S2: a code dissemination approach to energy efficiency and status surveillance for wireless sensor networks. J. Internet Technol. 8(4), 877–885 (2017). https://doi.org/10.6138/jit.2017.18.4.20160815
Wang, B., Gu, X., Ma, L., Yan, S.: Temperature error correction based on BP neural network in meteorological WSN. Int. J. Sens. Netw. 23(4), 265–278 (2017). https://doi.org/10.1504/ijsnet.2017.083532
Tan, Q., et al.: Towards a comprehensive insight into the eclipse attacks of Tor hidden services. IEEE IoT J., 1 (2018)
Zhang, H., Yi, Y., Wang, J., Cao, N., Duan, Q.: Network security situation awareness framework based on threat intelligence. In: CMC, vol. 56, no. 3, pp. 381–399 (2018)
Hou, M., Wei, R., Wang, T., Cheng, Y., Qian, B.: Reliable medical recommendation based on privacy-preserving collaborative filtering. In: CMC, vol. 56, no. 1, pp. 137–149 (2018)
Acknowledgement
This work is supported by the National Natural Science Foundation of China under Grant NO. 61572153, NO. 61702220, and NO. 61702223, China Grants U1636215, and the National Key research and Development Plan (Grant NO. 2018YFB0803504).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, Y., Tan, R., Kong, X., Tan, Q., Liu, X. (2019). Bitcoin Node Discovery: Large-Scale Empirical Evaluation of Network Churn. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11635. Springer, Cham. https://doi.org/10.1007/978-3-030-24268-8_36
Download citation
DOI: https://doi.org/10.1007/978-3-030-24268-8_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24267-1
Online ISBN: 978-3-030-24268-8
eBook Packages: Computer ScienceComputer Science (R0)