{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:16:54Z","timestamp":1773479814071,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T00:00:00Z","timestamp":1609804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,5]]},"DOI":"10.1145\/3427796.3427837","type":"proceedings-article","created":{"date-parts":[[2020,12,25]],"date-time":"2020-12-25T22:25:45Z","timestamp":1608935145000},"page":"126-135","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Node Classification and Geographical Analysis of the Lightning Cryptocurrency Network"],"prefix":"10.1145","author":[{"given":"Philipp","family":"Zabka","sequence":"first","affiliation":[{"name":"University of Vienna, AT"}]},{"given":"Klaus-Tycho","family":"F\u00f6rster","sequence":"additional","affiliation":[{"name":"University of Vienna, AT"}]},{"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[{"name":"University of Vienna Austria, AT"}]},{"given":"Christian","family":"Decker","sequence":"additional","affiliation":[{"name":"Blockstream, CH"}]}],"member":"320","published-online":{"date-parts":[[2021,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"C-Lightning alias. https:\/\/github.com\/ElementsProject\/lightning\/blob\/v0.6rc2\/lightningd\/options.c. [Online","year":"2020","unstructured":"2020. C-Lightning alias. https:\/\/github.com\/ElementsProject\/lightning\/blob\/v0.6rc2\/lightningd\/options.c. [Online ; accessed 16- July - 2020 ]. 2020. C-Lightning alias. https:\/\/github.com\/ElementsProject\/lightning\/blob\/v0.6rc2\/lightningd\/options.c. [Online; accessed 16-July-2020]."},{"key":"e_1_3_2_1_2_1","volume-title":"C-lightning GitHub Repository. https:\/\/github.com\/ElementsProject\/lightning. [Online","year":"2020","unstructured":"2020. C-lightning GitHub Repository. https:\/\/github.com\/ElementsProject\/lightning. [Online ; accessed 15- July - 2020 ]. 2020. C-lightning GitHub Repository. https:\/\/github.com\/ElementsProject\/lightning. [Online; accessed 15-July-2020]."},{"key":"e_1_3_2_1_3_1","volume-title":"Eclair GitHub Repository. https:\/\/github.com\/ACINQ\/eclair. [Online","year":"2020","unstructured":"2020. Eclair GitHub Repository. https:\/\/github.com\/ACINQ\/eclair. [Online ; accessed 15- July - 2020 ]. 2020. Eclair GitHub Repository. https:\/\/github.com\/ACINQ\/eclair. [Online; accessed 15-July-2020]."},{"key":"e_1_3_2_1_4_1","volume-title":"ipinfo. https:https:\/\/ipinfo.io. [Online","year":"2020","unstructured":"2020. ipinfo. https:https:\/\/ipinfo.io. [Online ; accessed 15- July - 2020 ]. 2020. ipinfo. https:https:\/\/ipinfo.io. [Online; accessed 15-July-2020]."},{"key":"e_1_3_2_1_5_1","volume-title":"LND change 144 to 40. https:\/\/github.com\/lightningnetwork\/lnd\/commit\/c302f1ea3a91ccfa382d56851d23f4c73656208c#diff-356ddb2e7efca712327c3b2d94d3afd3. [Online","year":"2020","unstructured":"2020. LND change 144 to 40. https:\/\/github.com\/lightningnetwork\/lnd\/commit\/c302f1ea3a91ccfa382d56851d23f4c73656208c#diff-356ddb2e7efca712327c3b2d94d3afd3. [Online ; accessed 16- July - 2020 ]. 2020. LND change 144 to 40. https:\/\/github.com\/lightningnetwork\/lnd\/commit\/c302f1ea3a91ccfa382d56851d23f4c73656208c#diff-356ddb2e7efca712327c3b2d94d3afd3. [Online; accessed 16-July-2020]."},{"key":"e_1_3_2_1_6_1","volume-title":"LND GitHub Repository. https:\/\/github.com\/lightningnetwork\/lnd. [Online","year":"2020","unstructured":"2020. LND GitHub Repository. https:\/\/github.com\/lightningnetwork\/lnd. [Online ; accessed 15- July - 2020 ]. 2020. LND GitHub Repository. https:\/\/github.com\/lightningnetwork\/lnd. [Online; accessed 15-July-2020]."},{"key":"e_1_3_2_1_7_1","volume-title":"Mastering Bitcoin: Unlocking Digital Crypto-Currencies","author":"Antonopoulos M.","year":"2014","unstructured":"Andreas\u00a0 M. Antonopoulos . 2014 . Mastering Bitcoin: Unlocking Digital Crypto-Currencies ( 1 st ed.). O\u2019Reilly Media, Inc. Andreas\u00a0M. Antonopoulos. 2014. Mastering Bitcoin: Unlocking Digital Crypto-Currencies (1st ed.). O\u2019Reilly Media, Inc.","edition":"1"},{"key":"e_1_3_2_1_8_1","volume-title":"Lightning Network Research","author":"Decker Christian","year":"2020","unstructured":"Christian Decker . 2020. Lightning Network Research ; Topology Datasets. https:\/\/github.com\/lnresearch\/topology. Accessed : 2020 -10-01. Christian Decker. 2020. Lightning Network Research; Topology Datasets. https:\/\/github.com\/lnresearch\/topology. Accessed: 2020-10-01."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407043"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Malavolta et al.2017. SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. In NDSS.  Malavolta et al.2017. SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. In NDSS.","DOI":"10.14722\/ndss.2017.23448"},{"key":"e_1_3_2_1_11_1","unstructured":"Ryan Fugger. 2004. Money as IOUs in social trust networks & a proposal for a decentralized currency network protocol. Hypertext document. Available electronically at http:\/\/ripple.sourceforge.net 106(2004).  Ryan Fugger. 2004. Money as IOUs in social trust networks & a proposal for a decentralized currency network protocol. Hypertext document. Available electronically at http:\/\/ripple.sourceforge.net 106(2004)."},{"key":"e_1_3_2_1_12_1","unstructured":"Lewis Gudgeon Pedro Moreno-Sanchez Stefanie Roos Patrick McCorry and Arthur Gervais. 2019. SoK: Off The Chain Transactions.IACR Cryptology ePrint Archive(2019).  Lewis Gudgeon Pedro Moreno-Sanchez Stefanie Roos Patrick McCorry and Arthur Gervais. 2019. SoK: Off The Chain Transactions.IACR Cryptology ePrint Archive(2019)."},{"key":"e_1_3_2_1_13_1","unstructured":"George Kappos Haaroon Yousaf Ania\u00a0M. Piotrowska Sanket Kanjalkar Sergi Delgado-Segura Andrew Miller and Sarah Meiklejohn. 2020. An Empirical Analysis of Privacy in the Lightning Network. CoRR abs\/2003.12470(2020).  George Kappos Haaroon Yousaf Ania\u00a0M. Piotrowska Sanket Kanjalkar Sergi Delgado-Segura Andrew Miller and Sarah Meiklejohn. 2020. An Empirical Analysis of Privacy in the Lightning Network. CoRR abs\/2003.12470(2020)."},{"key":"e_1_3_2_1_14_1","volume-title":"BOLT 7: P2P Node and Channel Discovery. https:\/\/github.com\/lightningnetwork\/lightning-rfc\/blob\/master\/07-routing-gossip.md. [Online","author":"Network Lightning","year":"2019","unstructured":"Lightning Network . 2019. BOLT 7: P2P Node and Channel Discovery. https:\/\/github.com\/lightningnetwork\/lightning-rfc\/blob\/master\/07-routing-gossip.md. [Online ; accessed 4- December - 2019 ]. Lightning Network. 2019. BOLT 7: P2P Node and Channel Discovery. https:\/\/github.com\/lightningnetwork\/lightning-rfc\/blob\/master\/07-routing-gossip.md. [Online; accessed 4-December-2019]."},{"key":"e_1_3_2_1_15_1","volume-title":"Lightning Network Specifications. https:\/\/github.com\/lightningnetwork\/lightning-rfc\/. [Online","author":"Network Lightning","year":"2020","unstructured":"Lightning Network . 2020. Lightning Network Specifications. https:\/\/github.com\/lightningnetwork\/lightning-rfc\/. [Online ; accessed 01- July - 2020 ]. Lightning Network. 2020. Lightning Network Specifications. https:\/\/github.com\/lightningnetwork\/lightning-rfc\/. [Online; accessed 01-July-2020]."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2361347.2361348"},{"key":"e_1_3_2_1_17_1","volume-title":"Understanding the Demographics of Twitter Users","author":"Mislove Alan","unstructured":"Alan Mislove , Sune Lehmann , Yong-Yeol Ahn , Jukka-Pekka Onnela , and J.\u00a0 Niels Rosenquist . 2011. Understanding the Demographics of Twitter Users . In ICWSM. The AAAI Press . Alan Mislove, Sune Lehmann, Yong-Yeol Ahn, Jukka-Pekka Onnela, and J.\u00a0Niels Rosenquist. 2011. Understanding the Demographics of Twitter Users. In ICWSM. The AAAI Press."},{"key":"e_1_3_2_1_18_1","unstructured":"Ayelet Mizrahi and Aviv Zohar. 2020. Congestion Attacks in Payment Channel Networks. CoRR abs\/2002.06564(2020).  Ayelet Mizrahi and Aviv Zohar. 2020. Congestion Attacks in Payment Channel Networks. CoRR abs\/2002.06564(2020)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Utz Nisslmueller Klaus-Tycho Foerster Stefan Schmid and Christian Decker. 2020. Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks. In ICISSP. SCITEPRESS 7\u201314.  Utz Nisslmueller Klaus-Tycho Foerster Stefan Schmid and Christian Decker. 2020. Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks. In ICISSP. SCITEPRESS 7\u201314.","DOI":"10.5220\/0009429200070014"},{"key":"e_1_3_2_1_20_1","first-page":"1149","article-title":"LockDown: Balance Availability Attack against Lightning Network Channels","volume":"2019","author":"P\u00e9rez-Sol\u00e0 Cristina","year":"2019","unstructured":"Cristina P\u00e9rez-Sol\u00e0 , Alejandro\u00a0Ranchal Pedrosa , Jordi Herrera-Joancomart\u00ed , Guillermo Navarro-Arribas , and Joaqu\u00edn Garc\u00eda-Alfaro . 2019 . LockDown: Balance Availability Attack against Lightning Network Channels . IACR Cryptol. ePrint Arch. 2019 (2019), 1149 . Cristina P\u00e9rez-Sol\u00e0, Alejandro\u00a0Ranchal Pedrosa, Jordi Herrera-Joancomart\u00ed, Guillermo Navarro-Arribas, and Joaqu\u00edn Garc\u00eda-Alfaro. 2019. LockDown: Balance Availability Attack against Lightning Network Channels. IACR Cryptol. ePrint Arch. 2019 (2019), 1149.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_21_1","volume-title":"Raiden Network. https:\/\/raiden.network\/. [Online","author":"Network Raiden","year":"2020","unstructured":"Raiden Network . 2020. Raiden Network. https:\/\/raiden.network\/. [Online ; accessed 02- January - 2020 ]. Raiden Network. 2020. Raiden Network. https:\/\/raiden.network\/. [Online; accessed 02-January-2020]."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00045"},{"key":"e_1_3_2_1_23_1","unstructured":"Stefanie Roos Pedro Moreno-Sanchez Aniket Kate and Ian Goldberg. 2017. Settling payments fast and private: Efficient decentralized routing for path-based transactions. CoRR 1709.05748(2017).  Stefanie Roos Pedro Moreno-Sanchez Aniket Kate and Ian Goldberg. 2017. Settling payments fast and private: Efficient decentralized routing for path-based transactions. CoRR 1709.05748(2017)."},{"key":"e_1_3_2_1_24_1","volume-title":"Distance Matters: Geo-social Metrics for Online Social Networks","author":"Scellato Salvatore","year":"2010","unstructured":"Salvatore Scellato , Cecilia Mascolo , Mirco Musolesi , and Vito Latora . 2010 . Distance Matters: Geo-social Metrics for Online Social Networks . In WOSN. USENIX Association . Salvatore Scellato, Cecilia Mascolo, Mirco Musolesi, and Vito Latora. 2010. Distance Matters: Geo-social Metrics for Online Social Networks. In WOSN. USENIX Association."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Doris Schi\u00f6berg Stefan Schmid Fabian Schneider Steve Uhlig Harald Schi\u00f6berg and Anja Feldmann. 2012. Tracing the birth of an OSN: social graph and profile analysis in Google+. In WebSci. ACM 265\u2013274.  Doris Schi\u00f6berg Stefan Schmid Fabian Schneider Steve Uhlig Harald Schi\u00f6berg and Anja Feldmann. 2012. Tracing the birth of an OSN: social graph and profile analysis in Google+. In WebSci. ACM 265\u2013274.","DOI":"10.1145\/2380718.2380753"},{"key":"e_1_3_2_1_26_1","unstructured":"Istv\u00e1n\u00a0Andr\u00e1s Seres L\u00e1szl\u00f3 Guly\u00e1s D\u00e1niel\u00a0A. Nagy and P\u00e9ter Burcsi. 2019. Topological Analysis of Bitcoin\u2019s Lightning Network. CoRR abs\/1901.04972(2019).  Istv\u00e1n\u00a0Andr\u00e1s Seres L\u00e1szl\u00f3 Guly\u00e1s D\u00e1niel\u00a0A. Nagy and P\u00e9ter Burcsi. 2019. Topological Analysis of Bitcoin\u2019s Lightning Network. CoRR abs\/1901.04972(2019)."},{"key":"e_1_3_2_1_27_1","volume-title":"Mathematical Research for Blockchain Economy","author":"Seres Istv\u00e1n\u00a0Andr\u00e1s","unstructured":"Istv\u00e1n\u00a0Andr\u00e1s Seres , L\u00e1szl\u00f3 Guly\u00e1s , D\u00e1niel\u00a0 A Nagy , and P\u00e9ter Burcsi . 2020. Topological analysis of bitcoin\u2019s lightning network . In Mathematical Research for Blockchain Economy . Springer , 1\u201312. Istv\u00e1n\u00a0Andr\u00e1s Seres, L\u00e1szl\u00f3 Guly\u00e1s, D\u00e1niel\u00a0A Nagy, and P\u00e9ter Burcsi. 2020. Topological analysis of bitcoin\u2019s lightning network. In Mathematical Research for Blockchain Economy. Springer, 1\u201312."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Saar Tochner and Stefan Schmid. 2020. On Search Friction of Route Discovery in Offchain Networks. CoRR abs\/2005.14676(2020).  Saar Tochner and Stefan Schmid. 2020. On Search Friction of Route Discovery in Offchain Networks. CoRR abs\/2005.14676(2020).","DOI":"10.1109\/Blockchain50366.2020.00039"},{"key":"e_1_3_2_1_29_1","unstructured":"Saar Tochner Stefan Schmid and Aviv Zohar. 2019. Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff. CoRR abs\/1909.06890(2019).  Saar Tochner Stefan Schmid and Aviv Zohar. 2019. Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff. CoRR abs\/1909.06890(2019)."}],"event":{"name":"ICDCN '21: International Conference on Distributed Computing and Networking 2021","location":"Nara Japan","acronym":"ICDCN '21"},"container-title":["Proceedings of the 22nd International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427796.3427837","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427796.3427837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:32Z","timestamp":1750197752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427796.3427837"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,5]]},"references-count":29,"alternative-id":["10.1145\/3427796.3427837","10.1145\/3427796"],"URL":"https:\/\/doi.org\/10.1145\/3427796.3427837","relation":{},"subject":[],"published":{"date-parts":[[2021,1,5]]},"assertion":[{"value":"2021-01-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}