Cross-Layer Deanonymization Methods in the Lightning Protocol
نویسندگان
چکیده
Bitcoin (BTC) pseudonyms (layer 1) can effectively be deanonymized using heuristic clustering techniques. However, while performing transactions off-chain 2) in the Lightning Network (LN) seems to enhance privacy, a systematic analysis of anonymity and privacy leakages due interaction between two layers is missing. We present (Please, find full version this paper with appendix at https://arxiv.org/abs/2007.00764 .) heuristics that group BTC addresses, based on their LN, as well LN nodes, shared naming hosting information. also linking link $$45.97$$ % all nodes $$29.61$$ addresses interacting LN. These links allow us attribute information (e.g., aliases, IP addresses) $$21.19$$ contributing deanonymization. Further, these deanonymization results suggest security payments are weaker than commonly believed, users being mercy few five actors control 36 over $$33\%$$ total capacity. Overall, first method for across discuss implications.
منابع مشابه
Cross Layer Security Protocol Using Swarm Intelligence
Security and privacy plays a vital role in wireless applications such as health monitoring, military and biometric identification systems. Due to the limited resource constraints in wireless sensor network, security in protocols is sacrificed or kept minimal. In this paper, a cross layer protocol is designed to detect denial of service attack imposed on the network by malicious nodes. The Denia...
متن کاملCross-layer design optimizations in wireless protocol stacks
The performance of applications on mobile devices is affected by the device constraints of memory, processing power, battery life and the variations in the wireless network. The variations in the wireless network will be compounded in the next generation networks—3G and beyond—when the devices move across heterogeneous networks. To allow interoperability with the Internet, existing standard pro...
متن کاملreflections on taught courses of the iranian ma program in english translation: a mixed-methods study
the issue of curriculum and syllabus evaluation and revision has been in center of attention right from when curriculum came into attention of educational institutions. thus everywhere in the world in educational institutions curricula and syllabi are evaluated and revised based on the goals, the needs, existing content, etc.. in iran any curriculum is designed in a committee of specialists and...
Energy Efficiency Cross Layer Protocol for Wireless Mesh Network
Wireless mesh network (WMN) is a novel emerging technology that will change the world more effectively and efficiently. It is regarded as a highly promising technology being increasingly important in mobile wireless networks of the future generation. In this paper, we consider energy management for wireless mesh networks from a point of view that started recently to attract the attention means ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-662-64322-8_9