2019
DOI: 10.48550/arxiv.1904.10253
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(15 citation statements)
references
References 0 publications
0
15
0
Order By: Relevance
“…There are several interesting studies on the topology of transaction networks. In particular, Rohrer et al [85] study the resilience of the Lightning network to topologybased attacks, and in particular, to isolation attacks. The authors argue that the Lightning network can be classified as a small-world and scale free network and show that in order to perform a resource-limited attack, the attacker should employ a highest ranked minimum cut strategy.…”
Section: State Of the Artmentioning
confidence: 99%
“…There are several interesting studies on the topology of transaction networks. In particular, Rohrer et al [85] study the resilience of the Lightning network to topologybased attacks, and in particular, to isolation attacks. The authors argue that the Lightning network can be classified as a small-world and scale free network and show that in order to perform a resource-limited attack, the attacker should employ a highest ranked minimum cut strategy.…”
Section: State Of the Artmentioning
confidence: 99%
“…After the launch of LN, several studies have investigated the graph properties of LN [32,31,22]. They described the topology of LN at an arbitrarily chosen point in time and found that LN exhibits a hub and spoke topology, and its degree distribution can be well approximated with a scale-free distribution [32,31].…”
Section: Related Workmentioning
confidence: 99%
“…After the launch of LN, several studies have investigated the graph properties of LN [32,31,22]. They described the topology of LN at an arbitrarily chosen point in time and found that LN exhibits a hub and spoke topology, and its degree distribution can be well approximated with a scale-free distribution [32,31]. Furthermore, these works assessed the robustness of the network against various types of attack strategies: they showed that LN is susceptible to both node [32,22] and channel [31] removal based attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The BLN has recently raised a lot of interest: Lee et al 1 showed that the BLN is characterised by a scale-free topology; Lin et al 2 and Martinazzi et al 3 analysed the evolution of the BLN topology and found it to have become increasingly centralised at different levels; Seres et al 4 argued that the BLN structure can be ameliorated to improve its security; the authors of 5 and 6 showed that the current BLN can be prone to channel exhaustion or attacks aimed at isolating nodes, thus compromising their reachability, the payment success ratio, etc. Mizrahi et al 7 analysed the robustness of the BLN against three different types of attacks: locking channels, disconnecting pairs of nodes and isolating hubs; although their results indicate that the BLN can be disrupted at a relatively low cost, Conoscenti et al 8 suggested that the BLN is still resilient against the removal of nodes that do not have a significant influence on the probability of success of a payment.…”
Section: Introductionmentioning
confidence: 99%