{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T22:18:15Z","timestamp":1771366695265,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T00:00:00Z","timestamp":1634169600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T00:00:00Z","timestamp":1634169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Over the past decade, the Bitcoin P2P network protocol has become a reference model for all modern cryptocurrencies. While nodes in this network are known, the connections among them are kept hidden, as it is commonly believed that this helps protect from deanonymization and low-level attacks. However, adversaries can bypass this limitation by inferring connections through side channels. At the same time, the lack of topology information hinders the analysis of the network, which is essential to improve efficiency and security. In this paper, we thoroughly review network-level attacks and empirically show that topology obfuscation is not an effective countermeasure. We then argue that the benefits of an open topology potentially outweigh its risks, and propose a protocol to reliably infer and monitor connections among reachable nodes of the Bitcoin network. We formally analyze our protocol and experimentally evaluate its accuracy in both trusted and untrusted settings. Results show our system has a low impact on the network, and has precision and recall are over 90% with up to 20% of malicious nodes in the network.<\/jats:p>","DOI":"10.1007\/s12083-021-01201-7","type":"journal-article","created":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T07:15:19Z","timestamp":1634195719000},"page":"408-425","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["AToM: Active topology monitoring for the bitcoin peer-to-peer network"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6697-5431","authenticated-orcid":false,"given":"Federico","family":"Franzoni","sequence":"first","affiliation":[]},{"given":"Xavier","family":"Salleras","sequence":"additional","affiliation":[]},{"given":"Vanesa","family":"Daza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,14]]},"reference":[{"key":"1201_CR1","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"1201_CR2","unstructured":"CoinMarketCap (2020 ) Bitcoin price, charts, market cap and other metrics. Last accessed: 2020-01-16. https:\/\/coinmarketcap.com\/currencies\/bitcoin\/"},{"key":"1201_CR3","doi-asserted-by":"publisher","unstructured":"Conti M, et al. (2018) A survey on security and privacy issues of bitcoin. In: IEEE communications surveys tutorials 20(4)(Fourthquarter). issn: 2373-745X. https:\/\/doi.org\/10.1109\/COMST.2018.2842460, pp 3416\u20133452","DOI":"10.1109\/COMST.2018.2842460"},{"key":"1201_CR4","doi-asserted-by":"crossref","unstructured":"Tapsell J, Akram RN, Markantonakis K (2018) An evaluation of the security of the bitcoin peer-to- peer network. In: arXiv:1805.10259","DOI":"10.1109\/Cybermatics_2018.2018.00195"},{"key":"1201_CR5","doi-asserted-by":"publisher","unstructured":"Reid F, Harrigan M (2013) An analysis of anonymity in the bitcoin system. In: Security and privacy in social networks. isbn: 978-1-4614-4139-7. https:\/\/doi.org\/10.1007\/978-1-4614-4139-7n_10. Springer, New York, pp 197\u2013223","DOI":"10.1007\/978-1-4614-4139-7n_10"},{"key":"1201_CR6","doi-asserted-by":"publisher","unstructured":"Neudecker T, Andelfinger P, Hartenstein H (2015) A simulation model for analysis of attacks on the Bitcoin peer-to-peer network. In: 2015 IFIP\/IEEE international symposium on integrated network management (IM). https:\/\/doi.org\/10.1109\/INM.2015.7140490, pp 1327\u20131332","DOI":"10.1109\/INM.2015.7140490"},{"key":"1201_CR7","unstructured":"Heilman E, et al. (2015) Eclipse attacks on bitcoin\u2019s peer-to-peer network. In: 24th USENIX Security Symposium (USENIX Security 15). Washington, D.C.: USENIX Association. isbn: 978-1-931971-232, pp 129\u2013144"},{"key":"1201_CR8","doi-asserted-by":"publisher","unstructured":"Biryukov A, Khovratovich D, Pustogarov I (2014) Deanonymisation of clients in bitcoin P2P network. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. CCS \u201914. Scottsdale, Arizona, USA. isbn: 978-1-4503-2957-6, https:\/\/doi.org\/10.1145\/2660267.2660379. ACM, pp 15\u201329","DOI":"10.1145\/2660267.2660379"},{"key":"1201_CR9","doi-asserted-by":"crossref","unstructured":"Koshy P, Koshy D, McDaniel P (2014) An analysis of anonymity in bitcoin using P2P network traffic. In: Financial cryptography and data security. isbn: 978-3-662-45472-5. Springer, Berlin, pp 469\u2013485","DOI":"10.1007\/978-3-662-45472-5_30"},{"key":"1201_CR10","unstructured":"Yeow A (2020) Bitnodes - global bitcoin nodes distribution. Last accessed: 2020-01-16. https:\/\/bitnodes.earn.com\/"},{"key":"1201_CR11","unstructured":"Miller A, et al. (2015) Discovering bitcoin\u2019s public topology and in uential nodes"},{"key":"1201_CR12","doi-asserted-by":"publisher","unstructured":"Neudecker T, Andelfinger P, Hartenstein H (2016) Timing analysis for inferring the topology of the bitcoin peer-to-peer network. In: 2016 Intl IEEE conferences on ubiquitous intelligence computing, advanced and trusted computing, scalable computing and communications, cloud and big data computing, internet of people, and smart world congress. https:\/\/doi.org\/10.1109\/UIC-ATCScalCom-CBDCom-IoP-SmartWorld.2016.0070, pp 358\u2013367","DOI":"10.1109\/UIC-ATCScalCom-CBDCom-IoP-SmartWorld.2016.0070"},{"key":"1201_CR13","doi-asserted-by":"crossref","unstructured":"Delgado-Segura S, et al. (2019) TxProbe: Discovering Bitcoin\u2019s Network Topology Using Orphan Transactions. In: Financial cryptography and data security. isbn: 978-3-030-32101-7. Springer International Publishing, Cham, pp 550\u2013566","DOI":"10.1007\/978-3-030-32101-7_32"},{"key":"1201_CR14","doi-asserted-by":"publisher","unstructured":"Neudecker T (2019) Characterization of the bitcoin peer-to-peer network (2015-2018). Tech. rep. 1, Karlsruher Institut f\u00fcr Technologie (KIT). https:\/\/doi.org\/10.5445\/IR\/1000091933","DOI":"10.5445\/IR\/1000091933"},{"key":"1201_CR15","unstructured":"Bitcoin Core Last accessed: 2020-07-02. https:\/\/bitcoincore.org\/"},{"key":"1201_CR16","unstructured":"Bitcoin Wiki (2019) Protocol Documentation. Last accessed: 2019-12-03. https:\/\/en.bitcoin.it\/wiki\/Protocoldocumentation"},{"key":"1201_CR17","doi-asserted-by":"crossref","unstructured":"Delgado-Segura S, et al. (2018) Cryptocurrency networks: A new P2P paradigm. In: Mobile Information Systems 2018","DOI":"10.1155\/2018\/2159082"},{"key":"1201_CR18","unstructured":"Wang L, Pustogarov I (2017) Towards better understanding of bitcoin unreachable peers. In: arXiv:1709.06837"},{"key":"1201_CR19","doi-asserted-by":"crossref","unstructured":"Donet Donet JA, P\u00e9rez-Sol\u00e0 C., Herrera-Joancomart\u00ed J. (2014) The Bitcoin P2P Network. In: R. B\u00e4hme, et al. (eds) Financial cryptography and data security. isbn: 978-3-662-44774-1. Springer, Berlin, pp 87\u2013102","DOI":"10.1007\/978-3-662-44774-1_7"},{"key":"1201_CR20","doi-asserted-by":"publisher","unstructured":"Decker C, Wattenhofer R (2013) Information propagation in the Bitcoin network. In: IEEE P2P 2013 Proceedings. https:\/\/doi.org\/10.1109\/P2P.2013.6688704. http:\/\/ieeexplore.ieee.org\/document\/6688704\/, pp 1\u201310","DOI":"10.1109\/P2P.2013.6688704"},{"key":"1201_CR21","unstructured":"Kiayias A, Panagiotakos G (2015) Speed-Security Tradeoffs in Blockchain Protocols. Cryptology ePrint Archive, Report 2015\/1019. https:\/\/eprint.iacr.org\/2015\/1019"},{"key":"1201_CR22","doi-asserted-by":"publisher","unstructured":"Essaid M, et al. (2018) Network Usage of Bitcoin Full Node. In: 2018 International conference on information and communication technology convergence (ICTC). https:\/\/doi.org\/10.1109\/ICTC.2018.8539723. https:\/\/ieeexplore.ieee.org\/abstract\/document\/8539723, pp 1286\u20131291","DOI":"10.1109\/ICTC.2018.8539723"},{"key":"1201_CR23","doi-asserted-by":"publisher","unstructured":"Zhao J, Lu J (2006) Solving Overlay Mismatching of Unstructured P2P Networks using Physical Locality Information. In: Sixth IEEE International conference on peer-to-peer computing (P2P\u201906). https:\/\/doi.org\/10.1109\/P2P.2006.41. https:\/\/ieeexplore.ieee.org\/abstract\/document\/1698595, pp 75\u201376","DOI":"10.1109\/P2P.2006.41"},{"key":"1201_CR24","doi-asserted-by":"publisher","unstructured":"Liu Y, Xiao L, Ni L (2007) Building a scalable bipartite p2p overlay network. In: IEEE Transactions on parallel and distributed systems 18.9. issn: 2161-9883. https:\/\/doi.org\/10.1109\/TPDS.2007.1059. https:\/\/ieeexplore.ieee.org\/abstract\/document\/4288128, pp 1296\u20131306","DOI":"10.1109\/TPDS.2007.1059"},{"key":"1201_CR25","doi-asserted-by":"publisher","unstructured":"Dotan M, et al. (2020) SOK: Cryptocurrency networking context, state-ofthe-art, challenges. In: Proceedings of the 15th international conference on availability, reliability and security. ARES \u201920. Virtual Event, Ireland: Association for Computing Machinery. isbn: 9781450388337. https:\/\/doi.org\/10.1145\/3407023.3407043","DOI":"10.1145\/3407023.3407043"},{"key":"1201_CR26","doi-asserted-by":"publisher","unstructured":"Deshpande V, Badis H, George L (2018) BTCmap: Mapping bitcoin peer-to-peer network topology. In: 2018 IFIP\/IEEE International conference on performance evaluation and modeling in wired and wireless networks (PEMWN). https:\/\/doi.org\/10.23919\/PEMWN.2018.8548904, pp 1\u20136","DOI":"10.23919\/PEMWN.2018.8548904"},{"key":"1201_CR27","doi-asserted-by":"crossref","unstructured":"Grundmann M, Neudecker T, Hartenstein H (2019) Exploiting transaction accumulation and double spends for topology inference in bitcoin. In: Financial cryptography and data security. isbn: 978-3-662-58820-8. Springer, Berlin, pp 113\u2013126","DOI":"10.1007\/978-3-662-58820-8_9"},{"key":"1201_CR28","doi-asserted-by":"publisher","unstructured":"Karame GO, Androulaki E, Capkun S (2012) Double-spending Fast Payments in Bitcoin. In: Proceedings of the 2012 ACM conference on computer and communications security. CCS \u201912. Raleigh, North Carolina, USA: ACM. isbn: 978-1-4503-1651-4. https:\/\/doi.org\/10.1145\/2382196.2382292, pp 906\u2013917","DOI":"10.1145\/2382196.2382292"},{"key":"1201_CR29","unstructured":"Lei M (2015) Exploiting bitcoin\u2019s topology for double-spend attacks. https:\/\/pub.tik.ee.ethz.ch\/students\/2015-FS\/BA-2015-10.pdf"},{"key":"1201_CR30","doi-asserted-by":"crossref","unstructured":"Eyal I, Sirer EG (2014) Majority is not enough: Bitcoin mining is vulnerable. In: Financial cryptography and data security. isbn: 978-3-662-45472-5. Springer, Berlin, pp 436\u2013454","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"1201_CR31","doi-asserted-by":"crossref","unstructured":"Nayak K, et al. (2016) Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In: 2016 IEEE European symposium on security and privacy (EuroS P), pp 305\u2013320","DOI":"10.1109\/EuroSP.2016.32"},{"key":"1201_CR32","unstructured":"DSN Research Group (2020) Bitcoin network monitor - block propagation. Last accessed: 2020-01-16. https:\/\/dsn.kastel.kit.edu\/bitcoin\/videos.html#blocks"},{"key":"1201_CR33","unstructured":"bitcoinfibre.org (2019) FIBRE - fast internet bitcoin relay engine. Last accessed: 2019-12-06. http:\/\/bitcoinfibre.org\/"},{"key":"1201_CR34","unstructured":"Falcon Project (2016) Falcon - a fast bitcoin backbone. Last accessed: 2019-12-06. https:\/\/falcon-net.org\/"},{"key":"1201_CR35","doi-asserted-by":"crossref","unstructured":"Saad M, et al. (2019) Partitioning attacks on bitcoin: Colliding space, time,and logic. In: 2019 IEEE 39th international conference on distributed computing systems (ICDCS), pp 1175\u20131187","DOI":"10.1109\/ICDCS.2019.00119"},{"key":"1201_CR36","doi-asserted-by":"publisher","unstructured":"Apostolaki M, Zohar A, Vanbever L (2017) Hijacking bitcoin: Routing attacks on cryptocurrencies. In: 2017 IEEE symposium on security and privacy (SP). https:\/\/doi.org\/10.1109\/SP.2017.29, pp 375\u2013392","DOI":"10.1109\/SP.2017.29"},{"key":"1201_CR37","doi-asserted-by":"publisher","unstructured":"Tran M, et al. (2020) A stealthier partitioning attack against bitcoin peer-to-peer network. In: 2020 IEEE Symposium on Security and Privacy (SP). https:\/\/doi.org\/10.1109\/SP40000.2020.00027. IEEE Computer Society, Los Alamitos, pp 515\u2013530","DOI":"10.1109\/SP40000.2020.00027"},{"key":"1201_CR38","unstructured":"Fanti G, Viswanath P (2017) Deanonymization in the bitcoin P2P network. In: Proceedings of the 31st international conference on neural information processing systems. NIPS\u201917. isbn: 9781510860964. Curran Associates Inc., Long Beach, pp 1364\u20131373"},{"key":"1201_CR39","unstructured":"Kaminsky D (2011) Black ops of TCP\/IP. In: Black Hat USA. https:\/\/www.slideshare.net\/dakami\/black-ops-of-tcpip-2011-black-hat-usa-2011https:\/\/www.slideshare.net\/dakami\/black-ops-of-tcpip-2011-black-hat-usa-2011, vol 44"},{"issue":"1","key":"1201_CR40","doi-asserted-by":"publisher","first-page":"22:1","DOI":"10.1145\/3084459","volume":"1","author":"SB Venkatakrishnan","year":"2017","unstructured":"Venkatakrishnan SB, Fanti G, Viswanath P (2017) Dandelion: Redesigning the bitcoin network for anonymity. Proc ACM Meas Anal Comput Syst 1(1):22:1\u201322:34. issn: 2476-1249. https:\/\/doi.org\/10.1145\/3084459","journal-title":"Proc ACM Meas Anal Comput Syst"},{"key":"1201_CR41","doi-asserted-by":"publisher","unstructured":"Fanti G, et al. (2018) Dandelion++: Lightweight cryptocurrency networking with formal anonymity guarantees. In: Proc. ACM Meas Anal Comput Syst 2(2). https:\/\/doi.org\/10.1145\/3224424","DOI":"10.1145\/3224424"},{"key":"1201_CR42","doi-asserted-by":"publisher","unstructured":"Franzoni F, Daza V (2020) Improving bitcoin transaction propagation by leveraging unreachable nodes. In: 2020 IEEE International conference on blockchain (Blockchain). https:\/\/doi.org\/10.1109\/Blockchain50366.2020.00031, pp 196\u2013203","DOI":"10.1109\/Blockchain50366.2020.00031"},{"key":"1201_CR43","doi-asserted-by":"publisher","unstructured":"Xu Z, Min R, Hu Y (2003) HIERAS: a DHT based hierarchical P2P routing algorithm. In: 2003 international conference on parallel processing, 2003. Proceedings. https:\/\/doi.org\/10.1109\/ICPP.2003.1240580, pp 187\u2013194","DOI":"10.1109\/ICPP.2003.1240580"},{"key":"1201_CR44","doi-asserted-by":"publisher","unstructured":"Oliveira LB, Siqueira IG, Loureiro AAF (2005) On the performance of ad hoc routing protocols under a peer-to-peer application. In: Design and Performance of Networks for Super-, Cluster-, and Grid-Computing: Part II. issn: 0743-7315. https:\/\/doi.org\/10.1016\/j.jpdc.2005.05.023. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0743731505001413, vol 65, pp 1337\u20131347","DOI":"10.1016\/j.jpdc.2005.05.023"},{"issue":"7","key":"1201_CR45","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1002\/cpe.1089","volume":"19","author":"H Rostami","year":"2007","unstructured":"Rostami H, Habibi J (2007) Topology awareness of overlay P2P networks. Concurrency and Computation: Practice and Experience 19(7):999\u20131021. https:\/\/doi.org\/10.1002\/cpe.1089. https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/cpe.1089","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"1201_CR46","doi-asserted-by":"publisher","unstructured":"Liu Y, et al. (2004) Location-aware topology matching in P2P systems. https:\/\/doi.org\/10.1109\/INFCOM.2004.1354645, vol 4, pp 2220\u20132230","DOI":"10.1109\/INFCOM.2004.1354645"},{"key":"1201_CR47","unstructured":"Nick J (2015)"},{"key":"1201_CR48","unstructured":"Fanti G, Viswanath P (2017) Anonymity properties of the bitcoin P2P network. arXiv:1703.08761"},{"key":"1201_CR49","doi-asserted-by":"crossref","unstructured":"Grundmann M, Neudecker T, Hartenstein H (2019) Exploiting transaction accumulation and double spends for topology inference in bitcoin. isbn: 978-3-662-58820-8. https:\/\/link.springer.com\/chapter\/10.1007\/978-3-662-58820-8_9. Springer , Berlin, pp 113\u2013126, Financial cryptography and data security","DOI":"10.1007\/978-3-662-58820-8_9"},{"key":"1201_CR50","unstructured":"Statoshi.info (2020) Peers. Last accessed: 2020-01-16. https:\/\/statoshi.info\/dashboard\/db\/peers"},{"key":"1201_CR51","unstructured":"Bitcoin Project (2009) Bitcoin Core. In: Last accessed: 2020-01-16. https:\/\/bitcoin.org\/en\/bitcoin-core\/"},{"key":"1201_CR52","unstructured":"Statoshi.info (2020) P2P Messages. Last accessed: 2020-01-16. https:\/\/statoshi.info\/dashboard\/db\/p2p-messages"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01201-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01201-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01201-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,4]],"date-time":"2022-03-04T14:08:46Z","timestamp":1646402926000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01201-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,14]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["1201"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01201-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,14]]},"assertion":[{"value":"18 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2022","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Springer Nature\u2019s version of this paper was updated due to missing Funding information.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}