{"id":"https://openalex.org/W4294691696","doi":"https://doi.org/10.1109/access.2022.3204387","title":"SoK: Network-Level Attacks on the Bitcoin P2P Network","display_name":"SoK: Network-Level Attacks on the Bitcoin P2P Network","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4294691696","doi":"https://doi.org/10.1109/access.2022.3204387"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3204387","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3204387","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09877811.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09877811.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051208278","display_name":"Federico Franzoni","orcid":"https://orcid.org/0000-0001-6697-5431"},"institutions":[{"id":"https://openalex.org/I4210146564","display_name":"University of Teacher Education Zug","ror":"https://ror.org/05ghhx264","country_code":"CH","type":"education","lineage":["https://openalex.org/I4210146564"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Federico Franzoni","raw_affiliation_strings":["QPQ, Zug, Switzerland"],"affiliations":[{"raw_affiliation_string":"QPQ, Zug, Switzerland","institution_ids":["https://openalex.org/I4210146564"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045619039","display_name":"Vanesa Daza","orcid":"https://orcid.org/0000-0003-0583-7929"},"institutions":[{"id":"https://openalex.org/I170486558","display_name":"Pompeu Fabra University","ror":"https://ror.org/04n0g0b29","country_code":"ES","type":"education","lineage":["https://openalex.org/I170486558"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Vanesa Daza","raw_affiliation_strings":["Department of Information and Communication Technologies, Pompeu Fabra University, Barcelona, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Technologies, Pompeu Fabra University, Barcelona, Spain","institution_ids":["https://openalex.org/I170486558"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051208278"],"corresponding_institution_ids":["https://openalex.org/I4210146564"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.1828,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.93043925,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"10","issue":null,"first_page":"94924","last_page":"94962"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7860075235366821},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7040355801582336},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6067185401916504},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.60310959815979},{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.5802488923072815},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5534402132034302},{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.49418380856513977},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.4935392141342163},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.47016641497612},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.45156458020210266},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.29045623540878296},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.1258051097393036}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7860075235366821},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7040355801582336},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6067185401916504},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.60310959815979},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.5802488923072815},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5534402132034302},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.49418380856513977},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.4935392141342163},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.47016641497612},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.45156458020210266},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29045623540878296},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.1258051097393036},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2022.3204387","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3204387","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09877811.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:repositori-api.upf.edu:10230/55353","is_oa":true,"landing_page_url":"http://hdl.handle.net/10230/55353","pdf_url":null,"source":{"id":"https://openalex.org/S4306402615","display_name":"Repositori digital de la UPF (Universitat Pompeu Fabra)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I170486558","host_organization_name":"Universitat Pompeu Fabra","host_organization_lineage":["https://openalex.org/I170486558"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:21800a9a9d6d4899b7533857939efe95","is_oa":true,"landing_page_url":"https://doaj.org/article/21800a9a9d6d4899b7533857939efe95","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 94924-94962 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3204387","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3204387","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09877811.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4294691696.pdf","grobid_xml":"https://content.openalex.org/works/W4294691696.grobid-xml"},"referenced_works_count":79,"referenced_works":["https://openalex.org/W154851090","https://openalex.org/W179922057","https://openalex.org/W851575271","https://openalex.org/W1444567531","https://openalex.org/W1520914943","https://openalex.org/W1523833175","https://openalex.org/W1541545136","https://openalex.org/W1593925121","https://openalex.org/W1820692873","https://openalex.org/W1879677957","https://openalex.org/W1937741266","https://openalex.org/W1988699025","https://openalex.org/W1995488889","https://openalex.org/W2057248704","https://openalex.org/W2058897176","https://openalex.org/W2059272164","https://openalex.org/W2084531279","https://openalex.org/W2098000533","https://openalex.org/W2098527270","https://openalex.org/W2127612127","https://openalex.org/W2128672542","https://openalex.org/W2143783692","https://openalex.org/W2145185087","https://openalex.org/W2147790229","https://openalex.org/W2151460988","https://openalex.org/W2261914718","https://openalex.org/W2295506186","https://openalex.org/W2296719434","https://openalex.org/W2513903144","https://openalex.org/W2536325433","https://openalex.org/W2570815113","https://openalex.org/W2576824898","https://openalex.org/W2604235603","https://openalex.org/W2611050176","https://openalex.org/W2624307925","https://openalex.org/W2729396025","https://openalex.org/W2744353112","https://openalex.org/W2753153210","https://openalex.org/W2757837949","https://openalex.org/W2761967597","https://openalex.org/W2770856063","https://openalex.org/W2794461284","https://openalex.org/W2806344107","https://openalex.org/W2886706106","https://openalex.org/W2889004650","https://openalex.org/W2889271520","https://openalex.org/W2890542555","https://openalex.org/W2898116260","https://openalex.org/W2904756156","https://openalex.org/W2940792497","https://openalex.org/W2942377029","https://openalex.org/W2955981725","https://openalex.org/W2964307555","https://openalex.org/W2977921325","https://openalex.org/W2979346785","https://openalex.org/W2982634135","https://openalex.org/W2996914656","https://openalex.org/W3009153228","https://openalex.org/W3013043224","https://openalex.org/W3015486462","https://openalex.org/W3043039544","https://openalex.org/W3126380539","https://openalex.org/W3135480505","https://openalex.org/W3187969532","https://openalex.org/W3206665347","https://openalex.org/W4211068006","https://openalex.org/W4241136731","https://openalex.org/W4241517995","https://openalex.org/W4244183172","https://openalex.org/W4248175462","https://openalex.org/W4251260016","https://openalex.org/W6603819222","https://openalex.org/W6681724330","https://openalex.org/W6735520227","https://openalex.org/W6743909895","https://openalex.org/W6744635636","https://openalex.org/W6757369347","https://openalex.org/W6763986627","https://openalex.org/W6775844573"],"related_works":["https://openalex.org/W2361650029","https://openalex.org/W2158220440","https://openalex.org/W1852121458","https://openalex.org/W2352199719","https://openalex.org/W2360075860","https://openalex.org/W2391477130","https://openalex.org/W2353452694","https://openalex.org/W2369414226","https://openalex.org/W2378762974","https://openalex.org/W2258115363"],"abstract_inverted_index":{"Over":[0],"the":[1,7,25,35,56,77,82,86,89,103,106,129,136,151,156,160,164,189],"last":[2],"decade,":[3],"Bitcoin":[4,57,107,190],"has":[5],"revolutionized":[6],"global":[8],"economic":[9],"and":[10,30,79,101,117,145,162,179,185,193,196],"technological":[11],"landscape,":[12],"inspiring":[13],"a":[14,39,61,115,140,183,199],"new":[15,178],"generation":[16],"of":[17,81,88,95,105,120,150,159,169,188,202],"blockchain-based":[18],"technologies.":[19],"Its":[20],"protocol":[21,59,161],"is":[22,93],"today":[23],"among":[24],"most":[26],"influential":[27],"for":[28,42,198],"cryptocurrencies":[29],"distributed":[31],"networks.":[32],"In":[33,110],"particular,":[34],"P2P":[36,108,191],"layer":[37],"represents":[38],"reference":[40],"point":[41],"all":[43],"permissionless":[44],"blockchains,":[45],"which":[46],"often":[47],"implement":[48],"its":[49,194,203],"solutions":[50],"in":[51,124,135],"their":[52],"network":[53,58,142,192],"layer.":[54],"Unfortunately,":[55],"lacks":[60],"strong":[62],"security":[63,104,204],"model,":[64,144],"leaving":[65],"it":[66],"exposed":[67],"to":[68,98],"several":[69],"threats.":[70],"Attacks":[71],"at":[72],"this":[73,111],"level":[74],"can":[75,175],"affect":[76],"reliability":[78],"trustworthiness":[80],"consensus":[83],"layer,":[84],"mining":[85],"credibility":[87],"whole":[90],"system.":[91],"It":[92],"therefore":[94],"utmost":[96],"importance":[97],"properly":[99],"understand":[100],"address":[102],"protocol.":[109,137],"paper,":[112],"we":[113,154],"give":[114],"comprehensive":[116],"detailed":[118],"overview":[119],"known":[121],"network-level":[122],"attacks":[123],"Bitcoin,":[125],"as":[126,128],"well":[127],"countermeasures":[130],"that":[131],"have":[132,182],"been":[133],"implemented":[134],"We":[138,171],"propose":[139,146],"generic":[141],"adversary":[143],"an":[147],"objective-based":[148],"taxonomy":[149],"attacks.":[152],"Finally,":[153],"identify":[155],"core":[157],"weaknesses":[158],"study":[163],"relationship":[165],"between":[166],"different":[167],"types":[168],"attack.":[170],"believe":[172],"our":[173],"contribution":[174],"help":[176],"both":[177],"experienced":[180],"researchers":[181],"broader":[184],"deeper":[186],"understanding":[187],"threats,":[195],"allow":[197],"better":[200],"modeling":[201],"properties.":[205]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
