2020
DOI: 10.1371/journal.pone.0225966
|View full text |Cite
|
Sign up to set email alerts
|

The evolving topology of the Lightning Network: Centralization, efficiency, robustness, synchronization, and anonymity

Abstract: The Lightning Network (LN) was released on Bitcoin's mainnet in January 2018 as a solution to favor scalability. This work analyses the evolution of the LN during its first year of existence in order to assess its impact over some of the core fundamentals of Bitcoin, such as: node centralization, resilience against attacks and disruptions, anonymity of users, autonomous coordination of its members. Using a network theory approach, we find that the LN represents a centralized configuration with few highly activ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 43 publications
(33 citation statements)
references
References 56 publications
0
33
0
Order By: Relevance
“…In both snapshots it is possible to notice the presence of a few large nodes surrounded by smaller ones indistinguishable from each other. The presence of a few massively endowed nodes highly connected with the rest of the network, composed by a vast majority of relatively poorly endowed nodes, suggests an overall hub and spoke structure of the system, a feature already highlighted by Martinazzi and Flori (2020). Moreover, in Table 1 we show some topological measures collected for the LN at the beginning and at the end of the sample period.…”
Section: Market Efficiencymentioning
confidence: 84%
See 2 more Smart Citations
“…In both snapshots it is possible to notice the presence of a few large nodes surrounded by smaller ones indistinguishable from each other. The presence of a few massively endowed nodes highly connected with the rest of the network, composed by a vast majority of relatively poorly endowed nodes, suggests an overall hub and spoke structure of the system, a feature already highlighted by Martinazzi and Flori (2020). Moreover, in Table 1 we show some topological measures collected for the LN at the beginning and at the end of the sample period.…”
Section: Market Efficiencymentioning
confidence: 84%
“…Finally, following the approach proposed in Martinazzi and Flori (2020), we decide to use as main representation of the LN's configuration its topological efficiency. It depends on key elements of the structure of the network, such as its density and the distribution of the capacity stored in its channels, hence it is a measure capable to aggregate a great deal of relevant information about the functioning of the network.…”
Section: The Lightning Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, recent entries have discussed the possibility of discovering the private channel balances by probing [40,41] and analyzed how much privacy could be retained, if noisy channel balances were to be made public [42]. A number of papers analyzed the graph-theoretic properties of the Lightning Network graph and discussed possible consequences regarding decentralization and routing [39,43,44], as well as graph-based privacy properties [45]. Similarly, Béres et al [46] and Tikhomirov et al [47] empirically analyzed the privacy properties of PCNs with the assistance of model-based traffic simulation.…”
Section: Related Workmentioning
confidence: 99%
“…In the last few decades, a number of studies investigated the response of real networks to link/node removal (LNR) in what is called "network attack analysis" because it simulates the consequences of an attack on the network [1][2][3][4][5][6][7][8]. These studies found application in very different fields of science such as biology [9][10][11], ecology [12][13][14][15], transport and infrastructure science [16][17][18][19][20][21], informatics [22,23], neurology [24], economics [25,26], and social networks [27][28][29][30]. These studies aimed to (i) assess network robustness, a measure that indicates the capacity of the system to maintain its functions after LNR [6,31], and (ii) identify the LNRs that trigger the greatest amount of damage in the systems, thus revealing the links/nodes that act as key players in network functioning [5,31].…”
Section: Introductionmentioning
confidence: 99%