{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T02:19:24Z","timestamp":1777342764439,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662643303","type":"print"},{"value":"9783662643310","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64331-0_23","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T23:16:12Z","timestamp":1634944572000},"page":"437-456","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Under the Hood of the Ethereum Gossip Protocol"],"prefix":"10.1007","author":[{"given":"Lucianna","family":"Kiffer","sequence":"first","affiliation":[]},{"given":"Asad","family":"Salman","sequence":"additional","affiliation":[]},{"given":"Dave","family":"Levin","sequence":"additional","affiliation":[]},{"given":"Alan","family":"Mislove","sequence":"additional","affiliation":[]},{"given":"Cristina","family":"Nita-Rotaru","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"23_CR1","unstructured":"Ethash. https:\/\/github.com\/ethereum\/wiki\/wiki\/Mining#ethash-dag"},{"key":"23_CR2","unstructured":"Ethereum wire protocol (eth). https:\/\/github.com\/ethereum\/devp2p\/blob\/master\/caps\/eth.md"},{"key":"23_CR3","unstructured":"Measuring ethereum nodes. https:\/\/medium.com\/coinmonks\/measuring-ethereum-nodes-530bfff08e9c"},{"key":"23_CR4","unstructured":"Node discovery protocol. https:\/\/github.com\/ethereum\/devp2p\/blob\/master\/discv4.md"},{"key":"23_CR5","unstructured":"The rlpx transport protocol. https:\/\/github.com\/ethereum\/devp2p\/blob\/master\/rlpx.md"},{"key":"23_CR6","unstructured":"Ethereum market capitalization (2020). https:\/\/coinmarketcap.com\/currencies\/ethereum\/"},{"key":"23_CR7","unstructured":"Ethereum node explorer. ethernodes.org (2020)"},{"key":"23_CR8","unstructured":"Anderson, L., Holz, R., Ponomarev, A., Rimba, P., Weber, I.: New kids on the block: an analysis of modern blockchains. arXiv preprint arXiv:1606.06530 (2016)"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.future.2019.08.014","volume":"102","author":"M Bartoletti","year":"2020","unstructured":"Bartoletti, M., Carta, S., Cimoli, T., Saia, R.: Dissecting Ponzi schemes on ethereum: identification, analysis, and impact. Future Gener. Comput. Syst. 102, 259\u2013277 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"23_CR10","unstructured":"Daian, P., et al.: Flash boys 2.0: frontrunning, transaction reordering, and consensus instability in decentralized exchanges. arXiv preprint arXiv:1904.05234 (2019)"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: IEEE P2P 2013 Proceedings, pp. 1\u201310. IEEE (2013)","DOI":"10.1109\/P2P.2013.6688704"},{"key":"23_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-662-44774-1_7","volume-title":"Financial Cryptography and Data Security","author":"JA Donet Donet","year":"2014","unstructured":"Donet Donet, J.A., P\u00e9rez-Sol\u00e0, C., Herrera-Joancomart\u00ed, J.: The bitcoin P2P network. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 87\u2013102. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44774-1_7"},{"key":"23_CR13","unstructured":"El Ioini, N., Pahl, C., Helmer, S.: A decision framework for blockchain platforms for IoT and edge computing. In: SCITEPRESS (2018)"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Gao, Y., Shi, J., Wang, X., Tan, Q., Zhao, C., Yin, Z.: Topology measurement and analysis on ethereum P2P network. In: 2019 IEEE Symposium on Computers and Communications (ISCC), pp. 1\u20137. IEEE (2019)","DOI":"10.1109\/ISCC47284.2019.8969695"},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/978-3-662-58387-6_24","volume-title":"Financial Cryptography and Data Security","author":"AE Gencer","year":"2018","unstructured":"Gencer, A.E., Basu, S., Eyal, I., van Renesse, R., Sirer, E.G.: Decentralization in bitcoin and ethereum networks. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 439\u2013457. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_24"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3\u201316. ACM (2016)","DOI":"10.1145\/2976749.2978341"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Gervais, A., Ritzdorf, H., Karame, G.O., Capkun, S.: Tampering with the delivery of blocks and transactions in bitcoin. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 692\u2013705 (2015)","DOI":"10.1145\/2810103.2813655"},{"key":"23_CR18","unstructured":"go-ethereum client. https:\/\/github.com\/ethereum\/go-ethereum"},{"key":"23_CR19","unstructured":"Greene, R., Johnstone, M.N.: An investigation into a denial of service attack on an ethereum network. In: Proceedings of the 16th Australian Information Security Management Conference, p. 90 (2018)"},{"key":"23_CR20","unstructured":"E. E. Group. Networking: Dev P2P, RPLx, Discovery, and Eth wire protocol: via zoom: https:\/\/www.youtube.com\/watch?v=hnw59hmk6rk"},{"key":"23_CR21","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin\u2019s peer-to-peer network. In: 24th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 15), pp. 129\u2013144 (2015)"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Henningsen, S., Teunis, D., Florian, M., Scheuermann, B.: Eclipsing ethereum peers with false friends. In: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 300\u2013309. IEEE (2019)","DOI":"10.1109\/EuroSPW.2019.00040"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Holotescu, C., et al.: Understanding blockchain opportunities and challenges. In: Conference Proceedings of<<eLearning and Software for Education (eLSE)>>, vol. 4, pp. 275\u2013283 (2018). \u201cCarol I\u201d National Defence University Publishing House","DOI":"10.12753\/2066-026X-18-253"},{"key":"23_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/978-3-030-36938-5_31","volume-title":"Network and System Security","author":"M Imamura","year":"2019","unstructured":"Imamura, M., Omote, K.: Difficulty of decentralized structure due to rational user behavior on blockchain. In: Liu, J.K., Huang, X. (eds.) NSS 2019. LNCS, vol. 11928, pp. 504\u2013519. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-36938-5_31"},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Imtiaz, M.A., Starobinski, D., Trachtenberg, A., Younis, N.: Churn in the bitcoin network: characterization and impact. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 431\u2013439. IEEE (2019)","DOI":"10.1109\/BLOC.2019.8751297"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Kiffer, L., Levin, D., Mislove, A.: Stick a fork in it: analyzing the ethereum network partition. In: Proceedings of the 16th ACM Workshop on Hot Topics in Networks, pp. 94\u2013100 (2017)","DOI":"10.1145\/3152434.3152449"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Kiffer, L., Levin, D., Mislove, A.: Analyzing ethereum\u2019s contract topology. In: Proceedings of the Internet Measurement Conference, vol. 2018, pp. 494\u2013499 (2018)","DOI":"10.1145\/3278532.3278575"},{"key":"23_CR28","unstructured":"Kiffer, L., Salman, A., Levin, D., Mislove, A., Nita-Rotaru, C.: Under the hood of the ethereum gossip protocol. https:\/\/fc21.ifca.ai\/papers\/203.pdf"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Kim, S.K., Ma, Z., Murali, S., Mason, J., Miller, A., Bailey, M.: Measuring ethereum network peers. In: Proceedings of the Internet Measurement Conference, vol. 2018, pp. 91\u2013104 (2018)","DOI":"10.1145\/3278532.3278542"},{"key":"23_CR30","first-page":"236","volume":"2018","author":"Y Marcus","year":"2018","unstructured":"Marcus, Y., Heilman, E., Goldberg, S.: Low-resource eclipse attacks on ethereum\u2019s peer-to-peer network. IACR Cryptol. ePrint Arch. 2018, 236 (2018)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Mariem, S.B., Casas, P., Romiti, M., Donnet, B., St\u00fctz, R., Haslhofer, B.: All that glitters is not bitcoin-unveiling the centralized nature of the BTC (IP) network. In: NOMS 2020\u20132020 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20139. IEEE (2020)","DOI":"10.1109\/NOMS47738.2020.9110354"},{"key":"23_CR32","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Technical report (2008)"},{"key":"23_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-030-32101-7_8","volume-title":"Financial Cryptography and Data Security","author":"F Victor","year":"2019","unstructured":"Victor, F., L\u00fcders, B.K.: Measuring ethereum-based ERC20 token networks. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 113\u2013129. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32101-7_8"},{"issue":"2014","key":"23_CR34","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Project Yellow Paper"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64331-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,11]],"date-time":"2023-11-11T16:04:28Z","timestamp":1699718668000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64331-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643303","9783662643310"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64331-0_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}