Skip to main content

Under the Hood of the Ethereum Gossip Protocol

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2021)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12675))

Included in the following conference series:

Abstract

Blockchain protocols’ primary security goal is consensus: one version of the global ledger that everyone in the network agrees on. Their proofs of security depend on assumptions on how well their peer-to-peer (P2P) overlay networks operate. Yet, surprisingly, little is understood about what factors influence the P2P network properties. In this work, we extensively study the Ethereum P2P network’s connectivity and its block propagation mechanism. We gather data on the Ethereum network by running the official Ethereum client, geth, modified to run as a “super peer” with many neighbors. We run this client in North America for over seven months, as well as shorter runs with multiple vantages around the world. Our results expose an incredible amount of churn, and a surprisingly small number of peers who are actually useful (that is, who propagate new blocks). We also find that a node’s location has a significant impact on when it hears about blocks, and that the precise behavior of this has changed over time (e.g., nodes in the US have become less likely to hear about new blocks first). Finally, we find prune blocks propagate faster than uncles.

We thank the anonymous reviewers and Arthur Gervais for their helpful comments. This research was supported in part by NSF grants CNS-1816802 and CNS-1900879, a Ripple unrestricted gift, and Facebook Fellowship. We also thank the Ethereum Foundation for a gift of AWS credit used toward the collection of our data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The Ethereum protocol uses their own memory-hard hash function, Ethhash [1].

  2. 2.

    In geth this subset is composed of a square root of their peers who have not heard about the block.

  3. 3.

    Find a median and mean delay of 6.5 and 12.6 s (from 2013).

  4. 4.

    We are unable to avoid forwarding information on all blocks/transactions, as doing so would cause other peers to decide to stop peering with our client.

  5. 5.

    Gencer et al. [15] compared Bitcoin prunes to all blocks mined, but for Ethereum just used uncle counts. They found that at the time Bitcoin had a larger standard deviation in mining fairness than Ethereum.

  6. 6.

    When prunes are first announced to us via a NewBlockHashesMsg, it generally correspond to times we hear about odd blocks that do not follow the mainchain (i.e. the block number is much smaller or larger than the current height).

  7. 7.

    The bomb was delayed with the Muir Glacier hardfork in early January 2020.

  8. 8.

    Mostly Coinbase nodes who appear to be routinely generating a fresh ENODEID.

References

  1. Ethash. https://github.com/ethereum/wiki/wiki/Mining#ethash-dag

  2. Ethereum wire protocol (eth). https://github.com/ethereum/devp2p/blob/master/caps/eth.md

  3. Measuring ethereum nodes. https://medium.com/coinmonks/measuring-ethereum-nodes-530bfff08e9c

  4. Node discovery protocol. https://github.com/ethereum/devp2p/blob/master/discv4.md

  5. The rlpx transport protocol. https://github.com/ethereum/devp2p/blob/master/rlpx.md

  6. Ethereum market capitalization (2020). https://coinmarketcap.com/currencies/ethereum/

  7. Ethereum node explorer. ethernodes.org (2020)

    Google Scholar 

  8. Anderson, L., Holz, R., Ponomarev, A., Rimba, P., Weber, I.: New kids on the block: an analysis of modern blockchains. arXiv preprint arXiv:1606.06530 (2016)

  9. Bartoletti, M., Carta, S., Cimoli, T., Saia, R.: Dissecting Ponzi schemes on ethereum: identification, analysis, and impact. Future Gener. Comput. Syst. 102, 259–277 (2020)

    Article  Google Scholar 

  10. Daian, P., et al.: Flash boys 2.0: frontrunning, transaction reordering, and consensus instability in decentralized exchanges. arXiv preprint arXiv:1904.05234 (2019)

  11. Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: IEEE P2P 2013 Proceedings, pp. 1–10. IEEE (2013)

    Google Scholar 

  12. Donet Donet, J.A., Pérez-Solà, C., Herrera-Joancomartí, J.: The bitcoin P2P network. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 87–102. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44774-1_7

    Chapter  Google Scholar 

  13. El Ioini, N., Pahl, C., Helmer, S.: A decision framework for blockchain platforms for IoT and edge computing. In: SCITEPRESS (2018)

    Google Scholar 

  14. Gao, Y., Shi, J., Wang, X., Tan, Q., Zhao, C., Yin, Z.: Topology measurement and analysis on ethereum P2P network. In: 2019 IEEE Symposium on Computers and Communications (ISCC), pp. 1–7. IEEE (2019)

    Google Scholar 

  15. Gencer, A.E., Basu, S., Eyal, I., van Renesse, R., Sirer, E.G.: Decentralization in bitcoin and ethereum networks. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 439–457. Springer, Heidelberg (2018). https://doi.org/10.1007/978-3-662-58387-6_24

    Chapter  Google Scholar 

  16. Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3–16. ACM (2016)

    Google Scholar 

  17. Gervais, A., Ritzdorf, H., Karame, G.O., Capkun, S.: Tampering with the delivery of blocks and transactions in bitcoin. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 692–705 (2015)

    Google Scholar 

  18. go-ethereum client. https://github.com/ethereum/go-ethereum

  19. Greene, R., Johnstone, M.N.: An investigation into a denial of service attack on an ethereum network. In: Proceedings of the 16th Australian Information Security Management Conference, p. 90 (2018)

    Google Scholar 

  20. E. E. Group. Networking: Dev P2P, RPLx, Discovery, and Eth wire protocol: via zoom: https://www.youtube.com/watch?v=hnw59hmk6rk

  21. Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: 24th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 15), pp. 129–144 (2015)

    Google Scholar 

  22. Henningsen, S., Teunis, D., Florian, M., Scheuermann, B.: Eclipsing ethereum peers with false friends. In: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 300–309. IEEE (2019)

    Google Scholar 

  23. Holotescu, C., et al.: Understanding blockchain opportunities and challenges. In: Conference Proceedings of<<eLearning and Software for Education (eLSE)>>, vol. 4, pp. 275–283 (2018). “Carol I” National Defence University Publishing House

    Google Scholar 

  24. Imamura, M., Omote, K.: Difficulty of decentralized structure due to rational user behavior on blockchain. In: Liu, J.K., Huang, X. (eds.) NSS 2019. LNCS, vol. 11928, pp. 504–519. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-36938-5_31

    Chapter  Google Scholar 

  25. Imtiaz, M.A., Starobinski, D., Trachtenberg, A., Younis, N.: Churn in the bitcoin network: characterization and impact. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 431–439. IEEE (2019)

    Google Scholar 

  26. Kiffer, L., Levin, D., Mislove, A.: Stick a fork in it: analyzing the ethereum network partition. In: Proceedings of the 16th ACM Workshop on Hot Topics in Networks, pp. 94–100 (2017)

    Google Scholar 

  27. Kiffer, L., Levin, D., Mislove, A.: Analyzing ethereum’s contract topology. In: Proceedings of the Internet Measurement Conference, vol. 2018, pp. 494–499 (2018)

    Google Scholar 

  28. Kiffer, L., Salman, A., Levin, D., Mislove, A., Nita-Rotaru, C.: Under the hood of the ethereum gossip protocol. https://fc21.ifca.ai/papers/203.pdf

  29. Kim, S.K., Ma, Z., Murali, S., Mason, J., Miller, A., Bailey, M.: Measuring ethereum network peers. In: Proceedings of the Internet Measurement Conference, vol. 2018, pp. 91–104 (2018)

    Google Scholar 

  30. Marcus, Y., Heilman, E., Goldberg, S.: Low-resource eclipse attacks on ethereum’s peer-to-peer network. IACR Cryptol. ePrint Arch. 2018, 236 (2018)

    Google Scholar 

  31. Mariem, S.B., Casas, P., Romiti, M., Donnet, B., Stütz, R., Haslhofer, B.: All that glitters is not bitcoin-unveiling the centralized nature of the BTC (IP) network. In: NOMS 2020–2020 IEEE/IFIP Network Operations and Management Symposium, pp. 1–9. IEEE (2020)

    Google Scholar 

  32. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Technical report (2008)

    Google Scholar 

  33. Victor, F., Lüders, B.K.: Measuring ethereum-based ERC20 token networks. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 113–129. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-32101-7_8

    Chapter  Google Scholar 

  34. Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014), 1–32 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lucianna Kiffer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 International Financial Cryptography Association

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kiffer, L., Salman, A., Levin, D., Mislove, A., Nita-Rotaru, C. (2021). Under the Hood of the Ethereum Gossip Protocol. In: Borisov, N., Diaz, C. (eds) Financial Cryptography and Data Security. FC 2021. Lecture Notes in Computer Science(), vol 12675. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-64331-0_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-64331-0_23

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-64330-3

  • Online ISBN: 978-3-662-64331-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics