Understanding Polkadot Through Graph Analysis: Transaction Model, Network Properties, and Insights

被引:1
|
作者
Abbas, Hanaa [1 ]
Caprolu, Maurantonio [1 ]
Di Pietro, Roberto [2 ]
机构
[1] Hamad Bin Khalifa Univ HBKU, Coll Sci & Engn CSE, Div Informat & Comp Technol ICT, Doha, Qatar
[2] King Abdullah Univ Sci & Technol KAUST, CEMSE Div, RC3 Ctr, Thuwal, Saudi Arabia
关键词
Polkadot; Cryptocurrency; Multi-chain Blockchain; Decentralization; DeFi; Graph Analysis; Network Science;
D O I
10.1007/978-3-031-47751-5_15
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
In recent years, considerable efforts have been directed toward investigating the large amount of public transaction data in prominent cryptocurrencies. Nevertheless, aside from Bitcoin and Ethereum, little efforts have been made to investigate other cryptocurrencies, even though the market now comprises thousands, with more than 50 exceeding one billion dollars of capitalization, and some of them sporting innovative technical solutions and governance. This is the case for Polkadot, a relatively new blockchain that promises to solve the shortcomings in scalability and interoperability that encumber many existing blockchain-based systems. In particular, Polkadot relies on a novel multi-chain construction that promises to enable interoperability among heterogeneous blockchains. This paper presents the first study to formally model and investigate user transactions in the Polkadot network. Our contributions are multifolds: After defining proper and pseudo-spam transactions, we built the transaction graph based on data collected from the launch of the network, in May 2020, until July 2022. The dataset consists of roughly 11 million blocks, including 2 million user accounts and 7.6 million transactions. We applied a selected set of graph metrics, such as degree distribution, strongly/weakly connected components, density, and several centrality measures, to the collected data. In addition, we also investigated a few interesting idiosyncratic indicators, such as the accounts' balance over time and improper transactions. Our results shed light on the topology of the network, which resembles a heavy-tailed power-law distribution, demonstrate that Polkadot is affected by the rich get richer conundrum, and provide other insights into the financial ecosystem of the network. The approach, methodology, and metrics proposed in this work, while being applied to Polkadot, can also be applied to other cryptocurrencies, hence having a high potential impact and the possibility to further research in the cryptocurrency field.
引用
收藏
页码:259 / 275
页数:17
相关论文
共 50 条
  • [11] Understanding Graph Isomorphism Network for rs-fMRI Functional Connectivity Analysis
    Kim, Byung-Hoon
    Ye, Jong Chul
    FRONTIERS IN NEUROSCIENCE, 2020, 14
  • [12] Graph neural network and machine learning analysis of functional neuroimaging for understanding schizophrenia
    Gayathri Sunil
    Smruthi Gowtham
    Anurita Bose
    Samhitha Harish
    Gowri Srinivasa
    BMC Neuroscience, 25
  • [13] Graph neural network and machine learning analysis of functional neuroimaging for understanding schizophrenia
    Sunil, Gayathri
    Gowtham, Smruthi
    Bose, Anurita
    Harish, Samhitha
    Srinivasa, Gowri
    BMC NEUROSCIENCE, 2024, 25 (01)
  • [14] The Study of Development Strategy for Bank Distribution Network through the Analysis of Inter-regional Financial Transaction Network
    Hong, Jae Weon
    Hong, Won Eui
    Kwak, Yoon Sik
    FUTURE GENERATION INFORMATION TECHNOLOGY, PROCEEDINGS, 2009, 5899 : 95 - +
  • [15] Understanding Classrooms through Social Network Analysis: A Primer for Social Network Analysis in Education Research
    Grunspan, Daniel Z.
    Wiggins, Benjamin L.
    Goodreau, StevenM.
    CBE-LIFE SCIENCES EDUCATION, 2014, 13 (02): : 167 - 178
  • [16] Insights into the Ecology and Evolution of Polyploid Plants through Network Analysis
    Gallagher, Joseph P.
    Grover, Corrinne E.
    Hu, Guanjing
    Wendel, Jonathan F.
    MOLECULAR ECOLOGY, 2016, 25 (11) : 2644 - 2660
  • [17] Complex Network Security Analysis based on Attack Graph Model
    Liu, Zhiming
    Li, Sheng
    He, Jin
    Xie, Di
    Deng, Zhantao
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
  • [18] A Hierarchical Graph Learning Model for Brain Network Regression Analysis
    Tang, Haoteng
    Guo, Lei
    Fu, Xiyao
    Qu, Benjamin
    Ajilore, Olusola
    Wang, Yalin
    Thompson, Paul M.
    Huang, Heng
    Leow, Alex D.
    Zhan, Liang
    FRONTIERS IN NEUROSCIENCE, 2022, 16
  • [19] A Graph-Based Model for Transmission Network Vulnerability Analysis
    Yang, Shenhao
    Chen, Weirong
    Zhang, Xuexia
    Liang, Chenguang
    Wang, Haifeng
    Cui, Wei
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 1447 - 1456
  • [20] Network Vulnerability Analysis Using a Constrained Graph Data Model
    Barik, Mridul Sankar
    Mazumdar, Chandan
    Gupta, Amarnath
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 263 - 282