Skip to main content

Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11632))

Included in the following conference series:

Abstract

The emergence of the Ethereum platform has led to the unprecedented development of blockchain technology. Ethereum ensures that blockchain technology becomes the core technology of Bitcoin, and users can expand and develop other applications on the Ethereum platform. P2P networks are applied in Ethereum to achieve peer-to-peer communication in transactions, with nodes being equal to each other and without trust. Ethereum is a peer-to-peer distributed network. Inter-node communication does not pass through a trustworthy intermediary, and each node can get the latest data by sending requests to its neighboring nodes. Each node acts as both a server and a service provider. This mode guarantees the data synchronization of all the nodes in Ethereum, so it is very important to study the automatic discovery of nodes. This paper mainly analyzes the automatic discovery mechanism of nodes based on the Kademlia algorithm, including principle of the protocol, the process of communication handshake and the specific algorithm mechanism. At last, we used the Mist wallet to observe the results of automatic discovery of nodes in the Ethereum client’s, and used Python to do a simple experiment for automatic discovery of Ethereum nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ethereum website. https://www.ethereum.org/

  2. Zhang, H., Dai, C., Zhang, C.: Efficient algorithm for building Kademlia topology. Appl. Res. Comput. 26(02), 534–536 (2009)

    Google Scholar 

  3. Ethereum Frontier Guide. https://ethereum.gitbooks.io/frontier-guide. Accessed 01 Nov 2018

  4. Ethereum White Paper. https://github.com/ethereum/wiki/wiki/WhitePaper. Accessed 01 Nov 2018

  5. Yan, H., Liu, W., Zhang, G., Cheng, W.: An efficient query method for KAD networks based on active nodes. Comput. Sci. 41(12), 57–59 (2014)

    Google Scholar 

  6. Jiang, Y., Zhong, X., Guo, Y., et al.: Communication mechanism and algorithm of composite location analysis of emergency communication based on rail. CMC Comput. Mater. Continua 57(2), 321–340 (2018)

    Article  Google Scholar 

  7. Liu, Y., Peng, H., Wang, J.: Verifiable diversity ranking search over encrypted outsourced data. Comput. Mater. Continua 55(1), 037 (2018)

    Article  Google Scholar 

  8. Gao, Z., Xia, S., Zhang, Y., et al.: Real-time visual tracking with compact shape and color feature. Comput. Mater. Continua 55(3), 509–521 (2018)

    Google Scholar 

Download references

Acknowledgement

This research was funded in part by the National Natural Science Foundation of China (61871140, 61872100, 61572153, U1636215), the National Key research and Development Plan (Grant No. 2018YFB0803504).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Lu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zheng, L., Helu, X., Li, M., Lu, H. (2019). Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11632. Springer, Cham. https://doi.org/10.1007/978-3-030-24274-9_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24274-9_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24273-2

  • Online ISBN: 978-3-030-24274-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics