Advertisement

AODV–Based Routing for Payment Channel Networks

  • Philipp Hoenisch
  • Ingo Weber
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10974)

Abstract

Payment Channel Networks such as the Lightning Network (LN), Raiden or COMIT were created to tackle the scalability problems of their underlying blockchains, by moving from expensive and slow on-chain transactions to inexpensive and fast off-chain ones. However, those networks are unregulated and decentralised, comprise point-to-point channels that may be opened or closed without coordination or warning, and fees may change at any time – making routing over these networks a hard problem. In addition, by connecting different blockchains using such off-chain networks, an immense network of channels will evolve which is under continues change. Routing needs to take into account the current network status, availability and distributions of channels’ funding, fees for each node, and exchange rates between different currencies. In this work, we identify requirements for such a routing protocol and adapt the Ad-hoc On-Demand Distance Vector Routing (AODV) protocol to this end by enhancing the messages with information on fees and exchanges rates. This approach allows finding suitable routes through the network, while intermediate nodes can maintain their economic incentives. We simulate different network topologies and evaluate the adapted AODV protocol on 3 different networks of 500, 1,000 and 5,000 nodes.

References

  1. 1.
    Albrightson, B., Garcia-Luna-Aceves, J., Boyle, J.: EIGRP - a fast routing protocol based on distance vectors (1998)Google Scholar
  2. 2.
    Chao, L., Aiqun, H.: Reducing the message overhead of AODV by using link availability prediction. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds.) MSN 2007. LNCS, vol. 4864, pp. 113–122. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-77024-4_12CrossRefGoogle Scholar
  3. 3.
    Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 3rd edn. MIT Press, Cambridge (2009)MATHGoogle Scholar
  4. 4.
    Decker, C., Wattenhofer, R.: A fast and scalable payment network with Bitcoin duplex micropayment channels. In: Pelc, A., Schwarzmann, A.A. (eds.) SSS 2015. LNCS, vol. 9212, pp. 3–18. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-21741-3_1CrossRefGoogle Scholar
  5. 5.
    Fonseca, R., Ratnasamy, S., Zhao, J., Ee, C.T., Culler, D., Shenker, S., Stoica, I.: Beacon vector routing: scalable point-to-point routing in wireless sensornets. In: Proceedings of Symposium on Networked Systems Design and Implementation (2005)Google Scholar
  6. 6.
    Gharehkoolchian, M., Hemmatyar, A.M.A., Izadi, M.: Improving security issues in MANET AODV routing protocol. In: Mitton, N., Kantarci, M.E., Gallais, A., Papavassiliou, S. (eds.) ADHOCNETS 2015. LNICST, vol. 155, pp. 237–250. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-25067-0_19CrossRefGoogle Scholar
  7. 7.
    Haas, Z.J., Pearlman, M.R., Samar, P.: The Zone Routing Protocol (ZRP) for Ad Hoc Networks. IETF Internet Draft (2002)Google Scholar
  8. 8.
    Hosp, J., Hoenisch, T., Kittiwongsunthorn, P.: COMIT - cryptographically-secure off-chain multi-asset instant transaction network (2017). http://www.comit.network/doc/COMIT%20white%20paper%20v1.0.2.pdf
  9. 9.
    Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, T., Korth, H.F. (eds.) Mobile Computing. Springer, Boston (1996).  https://doi.org/10.1007/978-0-585-29603-6_5CrossRefGoogle Scholar
  10. 10.
    Karp, B., Kung, H.T.: GPSR: greedy perimeter stateless routing for wireless networks. In: International Conference on on Mobile Computing and Networking. ACM (2000)Google Scholar
  11. 11.
    Medhi, D.: Network routing: algorithms, protocols, and architectures (2010)Google Scholar
  12. 12.
    Miller, A., Bentov, I., Kumaresan, R., McCorry, P.: Sprites: payment channels that go faster than lightning (2017)Google Scholar
  13. 13.
    Mistry, N., Jinwala, D.C., Zaveri, M., et al.: Improving AODV protocol against blackhole attacks. In: International Multi Conference of Engineers and Computer Scientists (2010)Google Scholar
  14. 14.
    Mitton, N., Fleury, E.: Distributed node location in clustered multi-hop wireless networks. In: Cho, K., Jacquet, P. (eds.) AINTEC 2005. LNCS, vol. 3837, pp. 112–127. Springer, Heidelberg (2005).  https://doi.org/10.1007/11599593_9CrossRefGoogle Scholar
  15. 15.
    Murthy, S., Garcia-Luna-Aceves, J.J.: An efficient routing protocol for wireless networks. Mob. Netw. Appl. 1, 183–197 (1996)CrossRefGoogle Scholar
  16. 16.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf. Accessed 17 Apr 2017
  17. 17.
    Pacia, C.: Lightning network skepticism (2015). https://chrispacia.wordpress.com/2015/12/23/lightning-network-skepticism/. Accessed 22 Mar 2018
  18. 18.
    Pei, G., Gerla, M., Hong, X.: LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility. In: ACM International Symposium on Mobile Ad Hoc Networking and Computing (2000)Google Scholar
  19. 19.
    Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Second IEEE Workshop on Mobile Computing Systems and Applications (1999)Google Scholar
  20. 20.
    Poon, J., Dryja, T.: The Bitcoin lightning network: scalable off-chain instant payments (2015)Google Scholar
  21. 21.
    Prihodko, P., Zhigulin, S., Sahno, M., Ostrovskiy, A., Osuntokun, O.: Flare: an approach to routing in lightning network (2016)Google Scholar
  22. 22.
    Raiden: Raiden network (2016). http://raiden.network/. Accessed 07 Aug 2017
  23. 23.
    Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Sel. Areas Commun. 16, 482–494 (1998)CrossRefGoogle Scholar
  24. 24.
    Ripple: Ripple paths. https://ripple.com/build/paths. Accessed 12 Sept 2017
  25. 25.
    Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: IEEE International Conference on Network Protocols (2002)Google Scholar
  26. 26.
    Song, R., Korba, L., Yee, G.: AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks (2005)Google Scholar
  27. 27.
    Wadbude, D., Richariya, V.: An efficient secure AODV routing protocol in MANET. Int. J. Eng. Innov. Technol. 1, 274–279 (2012)Google Scholar
  28. 28.
    Wang, L., Shu, Y., Dong, M., Zhang, L., Yang, O.W.: Adaptive multipath source routing in ad hoc networks. In: IEEE International Conference on Communications (2001)Google Scholar
  29. 29.
    Watts, D.J., Strogatz, S.H.: Collective dynamics of ‘small-world’ networks. Nature 393, 440–442 (1998)CrossRefGoogle Scholar
  30. 30.
    Zapata, M.G., Asokan, N.: Securing ad hoc routing protocols. In: Proceedings of the 1st ACM workshop on Wireless Security (2002)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Data61, CSIROSydneyAustralia

Personalised recommendations