Kadcast-NG: a Structured Broadcast Protocol for Blockchain Networks Elias Rohrer and Florian Tschorsch

Kadcast-NG: a Structured Broadcast Protocol for Blockchain Networks Elias Rohrer and Florian Tschorsch

1 Kadcast-NG: A Structured Broadcast Protocol for Blockchain Networks Elias Rohrer and Florian Tschorsch Abstract—In order to propagate transactions and blocks, rates, or changes that depart even further from the Nakamoto today’s blockchain systems rely on unstructured peer-to-peer consensus [2, 3, 4]. Furthermore, it has been shown that the overlay networks. In such networks, broadcast is known to be block propagation delay has severe effects on the consistency an inefficient operation in terms of message complexity and overhead. In addition to the impact on the system performance, of blockchain networks, leading to higher rates of stale blocks inefficient or delayed block propagation may have severe conse- and blockchain forks [5]. As this opens opportunities for quences regarding security and fairness of the consensus layer. In fraud [6, 7], alleviating the network-layer deficiencies is not contrast, the Kadcast protocol is a structured peer-to-peer proto- only a matter of performance, but also a pressing issue of col for block and transaction propagation in blockchain networks. fairness and security. While it has been shown that unsolicited Kadcast utilizes the well-known overlay topology of Kademlia to realize an efficient broadcast operation with tunable overhead. block propagation has the largest impact on the stale block We study the security and privacy of the Kadcast protocol based rate [5], it leads to flooding the network with block data, on probabilistic models and analyze its resilience to packet losses which the current networking paradigm cannot handle. The and node failures. Moreover, we evaluate Kadcast’s block delivery emergence of third-party relay networks [8, 9] emphasize the performance, broadcast reliability, efficiency, and security based need for an improved propagation mechanism. We however on advanced network simulations. Lastly, we introduce a QUIC- based prototype implementation of the Kadcast protocol and consider them orthogonal to our work, because they do not show its merits through deployment in a large-scale cloud-based address the inherent shortcomings of blockchain networks. testbed. Kadcast [10] is a new structured broadcast protocol for Index Terms—blockchain, peer-to-peer networks, broadcast blockchain networks based on the Kademlia [11] architecture. Kadcast allows for a more efficient broadcast operation with tunable redundancy and overhead. To this end, it exploits the I. INTRODUCTION structured overlay topology to delegate broadcast responsibil- ITCOIN [1] fundamentally challenged the role of banks ities for subtrees with decreasing height. In this work, we B by enabling decentralized money transfer on the Internet. complement and extend the study of the Kadcast protocol It builds upon a peer-to-peer network to implement an elec- and explore the feasibility of a real-world adoption. We tronic cash system, where nodes can interact directly without propose a number of protocol extensions in order to further intermediaries. Following its genesis in 2008, a high number harden Kadcast in the face of security and privacy threats. In of blockchain networks emerged. In these systems, nodes particular, we show that Kadcast achieves a high degree of may issue transactions by broadcasting them in the overlay reliability and resilience in the face of random and adversarial network. Validator nodes collect and verify transactions and node failures, and provide an analysis of transaction privacy. periodically consolidate them into blocks, which are appended In addition, we developed Kadcast-NG, a QUIC-based [12] to a replicated, immutable ledger—the blockchain. Blocks are prototype implementation of the Kadcast protocol. We use broadcast in the network as well, which gives every node the Kadcast-NG to evaluate the approach in global-scale testbed capability to verify correctness locally. That is, nodes run a hosted by Google Compute Cloud. Our evaluations show distributed agreement protocol to enable state replication. that Kadcast distributes blocks significantly faster than the Broadcast is accordingly the most commonly used net- currently deployed blockchain protocols in both simulated work operation in blockchain networks. However, current scenarios and real-world deployments. Kadcast furthermore implementations are typically based on unstructured overlay increases the efficiency of block propagation, making room to networks, which is not necessarily favorable for this kind introduce additional features such as unsolicited block push. of operation: while being relatively robust, broadcast in un- Our simulation results also indicate that it achieves similar, structured overlays suffers from high message overhead, as often better, security results in terms of the stale block rate. duplicates are introduced to the system. To reduce the load, Our key contributions can be summarized as follows: many networks spread block messages only by gossiping to a (i) We present an efficient broadcast protocol for blockchain subset of neighbors, which in turn might introduce additional networks, which exploits Kademlia’s structured architecture. propagation delays. (ii) We introduce parallelization to improve the reliability That is, the inefficiency of the utilized network protocols and resilience of our algorithm in a completely adjustable is a limiting factor for innovations striving for higher trans- and predictable way. (iii) We discuss attack vectors and action rates, such as increased limits for block sizes, block provide mitigation strategies against Sybil and Eclipse attacks, and analyze the network’s resilience to adversarial nodes The authors are with the Distributed Security Infrastructures Group, Tech- nical University of Berlin. obstructing block delivery or trying to deanonymize transac- E-mail: [email protected] and fl[email protected] tion originators. (iv) We conduct a comprehensive simulation 2 study and evaluate the performance, reliability, efficiency, and while this propagation method indeed covers the shortest path, security of Kadcast in comparison to a vanilla blockchain it actually covers all paths in the network, which potentially protocol, which generalizes the currently prevalent networking introduces a large amount of superfluous messages. Therefore, paradigm. (v) We provide Kadcast-NG, a prototypical imple- this kind of broadcast operation exhibits a high message mentation, and confirm its benefits through comparative real- complexity (O(N · R)), which has been shown to have severe world deployment in a global testbed. consequences on network scalability in the past [16]. The remainder of this paper is structured as follows. First, Therefore, some blockchain networks try to reduce the net we describe primitives of information dissemination currently accruing traffic by introducing alternative messaging patterns, found in the blockchain landscape in Section II. In Section III, such as request-response or compact block [17] propaga- we present the Kadcast protocol and discuss its adjustable tion schemes. However, while such schemes may reduce redundancy. Subsequently, we analyze Kadcast’s security and the network utilization, they also add at least one round- privacy, and discuss various threats and mitigation strategies trip time (RTT) per hop to the message propagation delay. in Section IV. We present our findings from the simulative Such delayed block propagation has been shown before to be evaluation in Section V, and introduce the results of our unfavorable compared to unsolicited block propagation [5], testbed deployment in Section VI. In Section VII, we discuss if the network is capable of handling the increased load. related work, before we conclude the paper in Section VIII. However, in the vanilla case of an unstructured overlay net- work, unsolicited block relay would amount to blindly flooding the network. As a consequence of the ensuing congestion, II. INFORMATION DISSEMINATION blockchain networks would likely face degraded block propa- IN BLOCKCHAIN NETWORKS gation performance and serious issues regarding the consensus The central purpose of blockchain protocols is to keep stability. track of the current state of accounts, which are bound to For more detailed information on the Bitcoin [1] and cryptographic key pairs. To this end, new transactions are Ethereum [18] networking layers, we refer the reader to disseminated in the peer-to-peer network, whereby they reach literature [19]. validator nodes. Elected validators (a.k.a., “round leaders”) collect and verify the transactions, decide on an authoritative III. THE KADCAST PROTOCOL transaction ordering, and finally batch them into blocks, i.e., Kadcast is based on Kademlia [11], a DHT design that updates to the global blockchain state. Depending on the is typically used for efficient lookup procedures. Kadcast, system specifications, leaders may be elected due to some however, makes use of Kademlia’s overlay structure to enable kind of Byzantine fault tolerant consensus mechanism, e.g., an efficient broadcast operation. In the following, we describe Nakamoto-style Proof-of-Work [1], Proof-of-Stake [13], or the overlay construction and the broadcast algorithm as the two PBFT [14]. After their issuance, blocks are broadcast to all main building blocks of our approach. Moreover, we introduce nodes in the network, which verify them and apply the updates means to improve the performance, reliability, and resilience to the local ledger state. While such blockchain protocols of Kadcast. have been proven to be consistent

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    14 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us