The Dilemma of Parameterizing Propagation Time in Blociamain P2P Network

被引:5
|
作者
Rahmadika, Sandi [1 ]
Noh, Siwan [1 ]
Lee, Kyeongmo [1 ]
Kweka, Bruno Joachim [1 ]
Rhee, Kyung-Hyune [2 ]
机构
[1] Pukyong Natl Univ, Grad Sch, Interdisciplinary Program Infomiat Secur, Busan, South Korea
[2] Pukyong Natl Univ, Dept IT Convergence & Applicat Engn, Busan, South Korea
来源
关键词
Blockchain; Block Size; Decentralized System; Peer-to-Peer Network; Transaction Propagation; BLOCKCHAIN; SCHEME;
D O I
10.3745/JIPS.03.0140
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Propagation time on permissionless blockchain plays a significant role in terms of stability and performance in the decentralized systems. A large number of activities are disseminated to the whole nodes in the decentralized peer-to-peer network, thus causing propagation delay. The stability of the system is our concern in the first place. The propagation delay opens up opportunities for attackers to apply their protocol. Either by accelerating or decelerating the propagation time directly without proper calculation, it brings numerous negative impacts to the entire blockchain system. In this paper, we thoroughly review and elaborate on several parameters related to the propagation time in such a system. We describe our findings in terms of data communication, transaction propagation, and the possibility of an interference attack that caused an extra propagation time. Furthermore, we present the influence of block size, consensus, and blockchain scalability, including the relation of parameters. In the last session, we remark several points associated with the propagation time and use cases to avoid dilemmas in the light of the experiments and literary works.
引用
收藏
页码:699 / 717
页数:19
相关论文
共 50 条
  • [2] Modeling Propagation of Active P2P Worm in Chord Network
    Wang, Xuesong
    Zhu, Jinglin
    Lin, Huaizhong
    Su, Xiaoming
    Jiang, Yuqian
    [J]. FRONTIERS IN COMPUTER EDUCATION, 2012, 133 : 389 - +
  • [3] Belief Propagation during Data Integration in a P2P Network
    Szwed, Piotr
    [J]. ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING ICAISC 2014, PT I, 2014, 8467 : 805 - 816
  • [4] P2P Content-propagation Mechanism tailored by Network Coding
    Wei, Xi
    Long, Dong-Yang
    [J]. 2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 772 - 777
  • [5] P2P Service Performance Analysis of Unstructured P2P Network
    Mao, JunPeng
    Cui, YanLi
    Huang, JianHua
    Zhang, JianBiao
    [J]. 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 50 - +
  • [6] The Bitcoin P2P Network
    Donet Donet, Joan Antoni
    Perez-Sola, Cristina
    Herrera-Joancomarti, Jordi
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014, 2014, 8438 : 87 - 102
  • [7] Analysis of distribution time of multiple files in a P2P network
    Meng, Xiang
    Tsang, Pui-Sze
    Lui, King-Shan
    [J]. COMPUTER NETWORKS, 2013, 57 (15) : 2900 - 2915
  • [8] Model of proactive malicious code propagation and vaccine contradiction in P2P network
    Xu, Xiao-Long
    Yang, Geng
    Xiong, Jing-Yi
    [J]. Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2013, 33 (06): : 605 - 611
  • [9] Your Propagation Model of File-sharing System in P2P Network
    Wu, Yanpeng
    Liu, Hao
    Lei, Juncheng
    [J]. COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1633 - 1636
  • [10] Research of P2P Offline Download based on Hybrid P2P Network
    Lin, Zhengzhong
    Yan, Jianfeng
    Urano, Yoshinori
    [J]. 12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 89 - 92