ArticlePDF Available

Abstract and Figures

Bitcoin is a cryptocurrency and a decentralized semi-anonymous peer-to-peer payment system in which the transactions are verified by network nodes and recorded in a public massively replicated ledger called the blockchain. Bitcoin is currently considered as one of the most disruptive technologies. Bitcoin represents a paradox of opposing forces. On one hand, it is fundamentally social, allowing people to transact in a peer-to-peer manner to create and exchange value. On the other hand, Bitcoin's core design philosophy and user base contain strong anti-social elements and constraints, emphasizing anonymity, privacy, and subversion of traditional centralized financial systems. We believe that the success of Bitcoin, and the financial ecosystem built around it, will likely rely on achieving an optimal balance between these social and anti-social forces. To elucidate the role of these forces, we analyze the evolution of the entire Bitcoin transaction graph from its inception, and quantify the evolution of its key structural properties. We observe that despite its different nature, the Bitcoin transaction graph exhibits many universal dynamics typical of social networks. However, we also find that Bitcoin deviates in important ways due to anonymity-seeking behavioral patterns of its users. As a result, the network exhibits a two-orders-of-magnitude larger diameter, sparse tree-like communities, and an overwhelming majority of transitional or intermediate accounts with incoming and outgoing edges but zero cumulative balances. These results illuminate the evolutionary dynamics of the most popular cryptocurrency, and provide us with initial understanding of social networks rooted in and driven by anti-social constraints.
Content may be subject to copyright.
1
The Anti-Social System Properties:
Bitcoin Network Data Analysis
Israa Alqassem, Iyad Rahwan and Davor Svetinovic, Senior Member, IEEE
Abstract—Bitcoin is a cryptocurrency and a decentralized
semi-anonymous peer-to-peer payment system in which the
transactions are verified by network nodes and recorded in a
public massively-replicated ledger called the blockchain. Bitcoin
is currently considered as one of the most disruptive technologies.
Bitcoin represents a paradox of opposing forces. On one hand,
it is fundamentally social, allowing people to transact in a
peer-to-peer manner to create and exchange value. On the
other hand, Bitcoin’s core design philosophy and user base
contain strong anti-social elements and constraints, emphasizing
anonymity, privacy and subversion of traditional centralized
financial systems. We believe that the success of Bitcoin, and the
financial ecosystem built around it, will likely rely on achieving
an optimal balance between these social and anti-social forces. To
elucidate the role of these forces, we analyze the evolution of the
entire Bitcoin transaction graph from its inception, and quantify
the evolution of its key structural properties. We observe that
despite its different nature, the Bitcoin transaction graph exhibits
many universal dynamics typical of social networks. However,
we also find that Bitcoin deviates in important ways due to
anonymity-seeking behavioral patterns of its users. As a result,
the network exhibits a two-orders-of-magnitude larger diameter,
sparse tree-like communities, and an overwhelming majority of
transitional or intermediate accounts with incoming and outgoing
edges but zero cumulative balances. These results illuminate the
evolutionary dynamics of the most popular cryptocurrency, and
provide us with initial understanding of social networks rooted
in and driven by anti-social constraints.
Index Terms—Social networks, Bitcoin, Cryptocurrency
I. INT RO DU CTI ON
Bitcoin is a complex socio-cyber-physical system, e.g., [1],
consisting of a decentralized peer-to-peer payment network, a
currency unit, publicly preserved transaction history kept in
a massively-replicated public ledger, i.e., the blockchain, an
algorithm that controls money generation, and an ownership
verification mechanism using public-key cryptography, where
each Bitcoin address consists of a pair of public and private
keys [2]. The process of creating new coins in the system
is called mining. The mining process is computationally
expensive. Any node connected to the Bitcoin network can
participate in Bitcoin mining either as a part of a group of
miners (called mining pool) or individually. In pooled mining,
the generated coins are shared based on each member’s
contributed computational power.
I. Alqassem is with the Department of Computer Science, Purdue Univer-
sity, West Lafayette, IN 47907, USA, Email: ialqasse@purdue.edu.
I. Rahwan is with the MIT Media Lab, Massachusetts Institute of Technol-
ogy, Cambridge, MA 02139, USA, Email: irahwan@mit.edu.
D. Svetinovic is with the Center on Cyber-Physical Systems, Department
of Computer Science, Khalifa University of Science and Technology, Abu
Dhabi, UAE, Email: davor.svetinovic@ku.ac.ae (*Corresponding Author).
Many commentators liken Bitcoin’s present state to the
early days of the Internet, and suggest that its technology will
transcend financial transactions to encompass all kinds of new
social transactions.
The structure and evolution dynamics of various social
networks are well-studied [3], [4], [5], [6], [7], [8]. How-
ever, the Bitcoin transaction graph represents a novel kind
of network that consists of global financial transactions car-
ried out by users hidden behind pseudonyms represented by
public keys (accounts, addresses, or public keys are used
interchangeably to refer to users’ unique identifiers used in
Bitcoin system). These transactions are continually validated
by Bitcoin computational nodes; running on users’ computers
and other specialized mining hardware, added to blocks, and
newly generated blocks appended to the blockchain, which
serves as a key innovation of the Bitcoin network [2].
One of the main driving forces behind the creation of
Bitcoin was to counter the systematic move towards more
transparency (i.e., reduction of privacy) and centralization.
The original cash-based financial system got replaced with
credit cards, audited transactions, automatic reporting to gov-
ernmental entities, etc. As a reaction to such increased lack
of privacy, centralization of control, and extensive monitoring,
there appeared a need to develop a system that re-establishes
and protects the financial privacy. The second driving force
behind the creation of Bitcoin was to develop a currency with
a predictable, algorithm-controlled inflation rate, as opposed
to the unpredictable, human-controlled inflation rate of fiat
currencies.
As such, Bitcoin presents a paradox of social and anti-social
forces. On one hand, Bitcoin’s main function is to facilitate
economic transactions among individuals, which is a highly
social function. Indeed, by eliminating expensive, trustworthy
intermediaries, Bitcoin reduces the cost of transactions, thus
facilitating more open economic transactions, transcending
geographical and social boundaries.
On the other hand, at the core of the Bitcoin design
philosophy are strong anti-social elements. Among Bitcoin’s
user community, there is a strong emphasis on privacy and
anonymity, manifested in the fact that transactions only require
cryptographic public keys in order to take place. Furthermore,
the Bitcoin system embodies greater trust in algorithmic,
rather than human, control of the money supply. In addition,
Bitcoin’s key distinguishing feature is its ability to process
and verify transactions without transaction intermediaries that
hold privileged positions in the network. As such, Bitcoin is
distrustful, and arguably subversive, of centralized financial
institutions or intermediaries that may abuse their power.
2
These seemingly contradictory social and anti-social ele-
ments of Bitcoin are, in fact, the key features behind its dis-
ruptive proliferation. However, we still lack a deep quantitative
understanding of Bitcoin’s adoption, use and growth dynamics.
In order to acquire such understanding, we need to quantify
the way in which Bitcoin’s transaction network evolves over
time, and to characterize the structural properties produced by
the social and anti-social forces and their interactions. This
will pave the way towards more complex analyses and may
facilitate the development of scalable algorithms and online
services that provide real-time insights into the blockchain and
its vulnerabilities.
In this paper, we inspect the Bitcoin transaction network’s
evolution dynamics. Our findings indicate that despite the
distinction in the nature of Bitcoin’s transaction network when
compared to other social networks, the Bitcoin transaction
network follows the common normal evolution patterns, i.e.,
the densification power law and shrinking diameter (although
the diameter shrinks only after the network reaches maturity).
On the other hand, we find that the absolute value of the
transaction graph diameter is extremely large when compared
to the other social networks which can be attributed to the
presence of long chains of transactions. The transaction graph
has less dense communities. Furthermore, the majority of
public keys (>90% of total public keys in the network)
represent transitional or intermediate accounts with incom-
ing and outgoing edges but zero cumulative balances. Most
of the intermediate accounts are generated to complicate
tracing users’ wealth and identities. These observations can
be attributed to the anti-social component of the behavior
among Bitcoin users, i.e., they generate and discard accounts
constantly to preserve and even further protect their anonymity.
II. RELATED WORK
We cover three categories of related work. First, we discuss
the related work that examined the blockchain data either
as a single snapshot or at different time frames for vari-
ous purposes, such as analyzing the level of privacy and
anonymity in Bitcoin. Second, we discuss the related work
which examined the universal characteristics that govern graph
growth over time, from which we borrowed the graph growth
metrics. Third, we discuss the related work that covers various
applications of social network data analytics studies.
A. Blockchain Data Studies
Kondor et al. [9] investigated the evolution of basic charac-
teristics of the blockchain over time. They identified two main
phases of Bitcoin’s life, the initial phase and the trading phase.
The initial phase lasted until fall 2010, during which there was
no real-world value associated with a bitcoin. Then MtGox,
the previously popular Bitcoin exchange, went online and the
Bitcoin trading phase has begun, through which bitcoins have
gained market value. They examined the degree distribution,
degree correlation and clustering coefficients, and wealth
distribution. They showed that preferential attachment was
shaping both the degree of Bitcoin addresses and the wealth
distributions among these addresses which are fundamentally
related in Bitcoin transaction network. In our analysis, we
examine various network characteristics that were not covered
here. We also repeat our analysis on the approximation of
Bitcoin user graph based on a heuristic, that we discuss later,
and was built based on the fact that all input addresses of a
transaction must belong to a single entity that holds the private
keys of these addresses.
Ron et al. [10] examined different statistical properties of
Bitcoin transaction graph and analyzed the graph of the largest
transaction that took place at the time of their analysis, May
13th 2012, where an entity sent 90,000 bitcoins to itself
multiple times. Instead of looking at global network properties
over time such as market price of bitcoins, number of daily
transactions, etc. they examined the typical behavior of Bitcoin
users e.g., the balances kept in their accounts, addresses associ-
ated with the largest balances, the size distribution of Bitcoin
transactions, and the percentage of micropayments. One of
their interesting findings was that the majority of bitcoins were
not circulating in the network. Other findings were: (i) Bitcoin
users tended to move their bitcoins large number of times in
self-loops manner between different accounts, (ii) large sums
of bitcoins were distributed in a binary tree-like structure,
(iii) Approximately 156,722 addresses were associated with
Mt.Gox exchange at the time of their study. Their dataset
contained transaction data up to block 180,000 (3,120,948
addresses). This research did not look into the evolution of the
transaction graph over time, instead they focused on statistical
properties in a single snapshot.
Maesa et al. [11] presented a scalable clustering algorithm
that constructed Bitcoin user graph with less false positives,
thus they reduced the size of the original transaction graph.
Then they analyzed the time evolution of the generated user
graph with a late starting point (January 2013), after the
Bitcoin system has matured and gained significant financial
impact. They examined the nodes richness in terms of their
degree and accumulated balances, and they confirmed the
previous finding [9] that the Bitcoin network is a scale-free
one where the richness is concentrated, and where high-degree
nodes play a vital role for network connectivity and their
constructed graph confirmed small-word phenomenon. They
also showed that the distribution of clusters follow a power-
law model. They inferred some address identities relying on
publically available tag datasets. In our analysis, we look into
different network characteristics in the full Bitcoin transaction
graph before and after the system gained its popularity and
we highlight how the users behavior changes over time to
adapt to the system. We do not examine the in- and out-degree
distributions and the distribution of the wealth in the network
since that were already verified in previous research.
In the next three papers, [12], [13], [14], the authors ana-
lyzed the transaction graph in order to investigate the claimed
anonymity that Bitcoin promised to offer. In doing so, they
matched some Bitcoin addresses to real-world entities while
constructing the Bitcoin transaction graph. Our work, however,
inspects different network characteristics without touching the
anonymity subject. We think Bitcoin supports pseudonymity
not full anonymity and the users of the network are responsible
to manage their addresses, i.e., public keys, in order to protect
3
their privacy.
Fleder et al. [12] analyzed seven-month blockchain data
between March 25th 2013 and October 25th 2013 for the
purpose of examining the anonymity levels in Bitcoin. They
developed a system to link public keys to their real-world
entities by web scraping Bitcoin forum, public social network,
donation sites, and other services where Bitcoin fans publicly
announced their addresses. They also applied the PageRank
algorithm to figure out the most important nodes, i.e., the ones
that received large traffic like SatoshiDICE1). Furthermore,
they de-anonymized a number of Bitcoin users, e.g., they
identified some of Bitcoin forum users: (i) who gambled at
SatoshiDICE, (ii) who were one hop away from Silk Road,2
(iii) who had direct transactions with Wikileaks. In addition to
an address belonged to FBI. This work focused on the level of
anonymity that Bitcoin was supposed to offer and showed that
it is possible to link real-world identities to Bitcoin addresses.
Meiklejohn et al. [13] explored the evolution of Bitcoin
network through tracing the flows of both unspent and in-
circulation bitcoins over time. Their methodology was divided
into two stages. First, they identified public keys of well-
known Bitcoin merchants and services (such as Mt. Gox and
Silk Road) by making direct purchases from them. Addi-
tionally, they extracted self-labeled public keys from Bitcoin
forum. Then, they clustered the users of known public keys
into a graph where the nodes represent known services instead
of merely representing anonymous addresses. They, by no
means, aimed to de-anonymize all Bitcoin network, but rather
they leveraged certain characteristics of Bitcoin protocol (e.g.,
multi-input transactions in which all input addresses belong to
the same entity, and Bitcoin change) to reveal the identities
of certain Bitcoin services, then categorized these services
in order to calculate their overall balances, the percentage
of transactions they involved in, etc. Their dataset contained
blockchain data up to block 231,207 (16,086,073 transactions
and 12,056,684 addresses).
Reid et al. [14] explored the limits of anonymity in Bitcoin
transaction and user networks. They showed that one could
easily figure out the total balance and incoming and outgoing
transaction of Bitcoin public keys and users. As an example
they visualized all WikiLeaks’ payments and degree distri-
bution over time and the number of transactions involving
its public key. As a case study of potential risks to the
anonymity in Bitcoin, they investigated the 25,000 bitcoins
theft reported in June a3th , 2011, and they developed a tool to
trace the stolen bitcoins which was transferred among several
public keys. Their results showed that it is easy for Bitcoin
centralized service providers (such as exchanges and wallet
services) that have details on users’ identities to identify and
track considerable portions of their users. Furthermore, They
suggested some enhancements to Bitcoin protocol to protect
user’s privacy. It is worth pointing out that this research is
1The biggest Bitcoin gambling website.
2An online marketplace uses bitcoins to trade in illegal drugs, firearms and
other goods, operated as a Tor hidden service. It was shut down temporarily
by FBI in October 2013 but it reopened again as Silk Road 2.0 in November
2013.
among the earliest attempts that analyzed Bitcoin network.
Their dataset contained 1,253,054 public keys.
B. Social Network Analysis
Leskovec et al. [15] examined graph time evolution pro-
cess in terms of the average node in- and out-degree and
the effective diameter in nine graphs obtained from four
diverse datasets. These datasets are: (i) ArXiv citation graph
(29,555 papers, 352,807 edges), (ii) U.S. patent citation graph
(3,923,922 patents, 16,522,438 citations), (iii) autonomous
systems graph, this one exhibits addition and deletion of
nodes and edges from November 1997 to January 2000, (iv)
bipartite affiliation graphs (57,381 nodes, 133,170 edges).
These datasets were divided into regularly spaced snapshots in
time. And the results they obtained showed that densification
power laws3and shrinking diameters4are fundamental natural
phenomena in all the graphs they examined. To produce graphs
that capture shrinking diameter, heavy-tailed in- and out-
degree distributions, and densification properties they proposed
the Forest Fire Model. Indeed, shrinking diameter is rather
surprising; as one would expect the graph’s diameter to grow
as the number of nodes increases. Shrinking diameter may be
attributed to two reasons. One reason is the addition of edges,
as in the stylized Erd ¨os-Renyi random graph model where
the diameter of the largest connected component (LCC) starts
quite large and then it decreases as edges are being added
continually. An alternative reason is what happens in real
graphs where the nodes become well-connected to each other
over time even after a graph reaches maturity, i.e., the diameter
continues to decrease in a steady manner when the LCC
contains almost all nodes. From this research we borrowed
the characteristics which define how real graphs evolve over
time. We also compare and contrast the growth patterns of
Bitcoin to the growth patterns observed in this research while
highlighting the novelty of Bitcoin network.
C. Applications
Kong et al. [16] have emphasized the need for social
network and media analysis within the context of the systems
development. They have explored the evolution patterns of
popularity with respect to the burst forms and decays. They
found that predicting the trends of popularity evolution is
beneficial for decision making for various types of systems,
e.g., emergency management, business intelligence, and pub-
lic security. They evaluated their approach using tweets in
SinaWeibo, a Chinese Twitter-like social media platform, with
positive results and improvements.
Liu et al. [17] have demonstrated the importance of the
social network analysis with respect to preserving system
properties such as privacy and anonymity. They emphasized
that the network analysis is even more effective when multiple
network analysis are performed for the identification of the
users. This is putting the context of our focus on the financial
social network in the perspective with respect to the other types
3Number of edges grows super-linearly in the number of nodes.
4Diameter decreases as network grows.
4
of social networks. While their method has shown positive
results, it is unclear how it would perform within the context
of blockchain-based social networks.
Zhang et al. [18] have studied evolutionary game dynamics
of multiagent systems on multiple community networks. Given
the fast evolution of blockchain systems and their potential in-
tegration with the artificial intelligence (AI) systems is opening
even further application areas of the social network analysis
in the context of blockchain systems. The further integration
of the various blockchain systems is expending the analysis
opportunities on multiple social network systems. The ability
of agents to perform this analysis and interpret the data, will
open up a whole another range of application opportunities
for blockchain in complex AI-backed social networks.
Chang et al. [19] have used blockchain network data to
analyze different patterns of transactions occurring in the
Bitcoin network in order to cluster addresses that share the
same ownership. This clustering approach has increased our
ability to trace Bitcoin ownership thus potentially reducing the
privacy of the users.
III. MET HO D A ND RE S ULT S
The temporal information of Bitcoin transactions embedded
in the blockchain enables us to inspect the evolution dynamics
and the key structural properties of this innovative payment
network, where Bitcoin accounts represent the nodes and the
transactions occurring between these accounts correspond to
the edges. We identify 11 time-spaced sequential snapshots of
the blockchain between January 2009 and September 2014.
Six-month interval separates any two consecutive snapshots,
except for the last one which contains the blockchain trans-
actions up to the last block in our dataset. Table I shows our
snapshots statistics.
TABLE I
MAI N CH AR ACTE RI STIC S OF B LOC KC HAIN SNA PS HOTS .
Snapshot
index
Block depth #nodes #edges End date
1 18,650 1,054 1,098 03-Jul-09
2 32,800 2,877 3,630 03-Jan-10
3 64,000 24,404 34,965 03-Jul-10
4 100,800 126,353 259,669 03-Jan-11
5 134,500 1,060,648 2,962,425 03-Jul-11
6 160,400 2,736,480 8,554,243 03-Jan-12
7 187,300 4,662,573 20,875,170 03-Jul-12
8 215,000 8,725,003 50,567,140 03-Jan-13
9 244,600 14,998,319 102,040,630 03-Jul-13
10 278,400 24,882,840 165,402,563 03-Jan-14
11 319,359 46,043,947 398,145,539 06-Sep-14
In Bitcoin there is a special type of transaction without input
addresses, these transactions are called coinbase transactions.
One coinbase transaction is generated per block to send block’s
mining reward and transaction fees (whenever available) to
miners who participated in creating that block. The input
address of all coinbase transactions are mapped to a dummy
source address, then all coinbase transactions are excluded
from the subsequent analysis. Including coinbase transactions
would distort the results as they do not represent actual
transactions occurring between Bitcoin users or services but
merely transactions that generate coins in the system.
Two distinct stages of Bitcoin evolution are identified, i.e.,
the initial stage and the trading stage [9]. The initial stage
continued until the first half of 2010. After that, Bitcoin started
to attract growing number of users and online service providers
such as Mt. Gox exchange which went online in July 2010 and
Slush’s pool; the first mining pool that started in December
2010. Then, Bitcoin was recognized as a cryptocurrency and
a payment system, thus it gained a real purchase value and
its trading stage has begun after the beginning of 2011. While
the period in between represents a transitional stage. During
which, Bitcoin was adapted by more than amateur beginners
but it was still not yet recognized as a payment system neither
as a cryptocurrency. Fig. 1 shows how this intermediate stage
acts as a tipping point in the history of the first decentralized
cryptocurrency. Here we quantify the evolution of Bitcoin
and we show that some network properties differ noticeably
throughout these stages.
A. Bitcoin Accounts
There is no upper bound on the number of accounts a
Bitcoin user may have, nor a limit exists on the number
of transactions’ neighbours, unlike many of social networks
which constrain the maximum allowable number of outgo-
ing/incoming links. Moreover, in Bitcoin it is considered a
good practice to generate different key pairs to receive the
various incoming transactions in an attempt to maintain users’
anonymity by complicating the tracking of addresses’ owners
and their wealth. This results in the emerging of different
nodes types (i.e., Bitcoin account categories) which we cat-
egorize based on incoming transaction, outgoing transaction,
and total balance each account accumulates. These categories
are:
Checking accounts: appeared as source and destination
of one or more transaction and have cumulative balance
greater than zero.
Saving accounts: appeared only as destination of trans-
action(s) with cumulative balance greater than zero.
Intermediate (transitional) accounts: accounts with zero
cumulative balance. These accounts are mostly created by
Bitcoin user or service, e.g., mixing or exchange service,
to transfer money between other accounts. A fraction of
these accounts may belong to users departing the network
and selling all their coins.
As Fig. 1 depicts, during the initial stage, saving accounts
were dominant since bitcoins did not have corresponding
purchase value in fiat money and consequently no merchants
were accepting them in exchange for goods or services. At
that stage, the checking and intermediate accounts represented
accounts owned by the early adopters who were trying or
testing the Bitcoin system. Later on, during the latter stage,
the intermediate accounts formed more than 90% of the total
created accounts. This reveals an expected common behavior
among Bitcoin users, i.e., they generate and discard public
keys constantly to preserve their anonymity which results in a
continually increasing transaction volume in the network. On
5
the other hand, the percentage of saving accounts has relatively
diminished in the trading stage compared with the initial stage.
While the absolute number of newly created checking accounts
went up by several orders of magnitude, from less than 30 in
July 2009 to more than 250K in September 2014. This can be
an indication of more people nowadays considering Bitcoin as
a viable medium of exchange.
Two points can emphasize the aforementioned indication.
First, the growing merchant adoption and the increasing num-
ber of service providers supporting Bitcoin payment directly
or indirectly, (i.e., via conversion services such as Coinbase
and BitPay) have enhanced Bitcoin’s utility. Currently, big
businesses and multinational corporations such as Microsoft,
Dell, and Expedia support Bitcoin payments, moreover users
can buy a wide range of physical goods with bitcoins, different
gift card businesses accept bitcoins, and numerous physical
stores, hotels, restaurants, and charities are welcoming Bitcoin
payments [20]. Second, even though saving accounts have not
faded away, Bitcoin currently can not be viewed as a stable
store of value due to its high volatile price. Roughly speaking,
the average market price around the beginning of July 2013
reached 85 USD, six months later this value jumped to 793
USD, while in March 2015 it was about 270 USD. This
high price fluctuation leaves the user uncertain whether the
bitcoins he has today will worth the same value tomorrow,
hence incentivizes him to invest them in daily transactions
(checking or speculation in Bitcoin) rather than saving them.
Unlike the early adopters who used to keep their coins for the
hope of making more profit for the exact opposite reasons:
(i) due to limited options they had for spending their bitcoins
on, and (ii) the chances were high at that time for bitcoin’s
purchase value to increase day after day.
B. Largest Connected Component (LCC) and its Diameter
The LCC of a graph connects the majority of the graph
nodes. We examine the connectivity of Bitcoin transaction
graph over time by quantifying the percentage of Bitcoin
accounts taking part of its LCC, in addition to the diameter
of this LCC as shown in Fig. 1. In graph theory, the diam-
eter represents an important topological metric that helps in
understanding the size and density of a network. To find the
diameter of a graph (or its LCC), first we find the shortest
paths between each pair of vertices. Then, the path with the
maximum length represents the diameter of the graph, hence
the diameter is the largest shortest path.
Bitcoin addresses are almost fully connected with more than
99.9% of Bitcoin accounts taking part of the LCC by the
end date of the taken last snapshot. Network connectivity, in
the context of the nodes taking part of the LCC, in Bitcoin
scenario is similar to was reported for the LCCs of other social
networks. For example, in May 2011, the LCC of Facebook
had 99.91% of the total registered users [21]. In August 2009,
the LCC of Twitter had 94.8% of twitter profiles [22]. Further,
similar high percentage of nodes connecting to the LCC of
their graphs was observed for arXiv and U.S. patent citation
graphs [4].
There is a significant difference between the absolute value
of the transaction graph’s diameter in the last taken snapshot
ەە
ە
ە
ە
ەەەەەەە
1.0
0.8
0.6
0.4
0.2
0.0
Fraction of total
accounts
ەەەەە
ە
ە
ە
ەەەە
ەە
ە
ە
ەە
ەەە
ە
ە
ە
Checking
Intermediate
Saving
A
B
ە
ە
ە
ە
ەەەەەە ە
0.25
0.00
0.75
0.50
1.00
Relative size
ە ە ەە
ە
ە
ە
ە
ە ە ە
LCC relative size
LCC diameter
5000
4000
3000
2000
1000
0
Diameter
ە
ە
Fig. 1. (A) The evolution of Bitcoin account categories. A growth trend
towards intermediate accounts after the beginning of trading stage (vertical
dashed line). Intermediate accounts have incoming and outgoing transactions
but zero cumulative balances. Bitcoin users generate and discard such accounts
as a general practice to maintain their anonymity and avoid financial tracking.
(B) The evolution of the relative size of the transaction graph’s LCC and
its diameter. More than 99.9% of Bitcoin accounts are taking part of the
LCC as of September 2014. Similar high percentages are reported for nodes
connecting to the LCC in other social networks such as Twitter, Facebook, and
arXiv citation graph. After the beginning of the trading stage (vertical dashed
line), Bitcoin starts attracting growing number of users, therefore the graph’s
diameter expands, its transaction graph becomes sparser and the distances
between nodes increase continually until mid-2012. The expansion in diameter
at the beginning is observed for the earliest Facebook and Google+ datasets.
Later on, the diameter starts decreasing monotonically. The Shrinking diameter
after the network reaches maturity is also one of the observed phenomenon in
social networks, i.e., the diameter continues to decrease even after the LCC
contains almost all nodes since the graph becomes denser. The absolute values
of transaction graph’s diameter are two-orders-of-magnitude larger than what
is reported for social networks such as Facebook and Twitter which can be
attributed to the presence of long chains of transactions.
(>2000) and the reported diameter values in a single snapshot
of other social social networks. For example the diameter of
Facebook is 41, the diameter of Twitter is 18, and the diameter
of Google+ is 22 as reported in [23]. Four possible causes of
this dramatic increase in the diameter of the transaction graph:
Anonymity which acts as an incentive for Bitcoin sup-
porters to create several accounts to transfer their unspent
coins.
Thieves usually exhaust the network by generating enor-
mous number of public keys to transfer and spread the
stolen bitcoins. For instance, in [14] it was reported that
more than 34,100 new addresses were created by the
suspicious of Bitcoin theft which occurred in June 2011.
The change addresses generated by Bitcoin client to
transfer the remainder of the payment back to the payer,
as bitcoins cannot be spent partially (Fig. 2).
Bitcoin mixing services such as Bitcoin Fog and BitLaun-
dry which offer mixing users’ bitcoins with each other
by generating many new accounts. Mixing services are
generally used for Bitcoin laundry to complicate trailing
illegal fund [24].
All of the aforementioned points lead to the presence of
long transaction chains which in turn increases the shortest
6
paths between graph nodes.
A1 A2
A1
A2
C1
Scenario 1
Scenario 2
A1
A2
C1
A3
C2
A1 A2
A3
Scenario 3
Scenario 4
Fig. 2. In Bitcoin the change is not returned to the same address to
protect user’s privacy. Here, we assume that blue circles represent addresses
owned by the same user. In scenarios 1&2, the user who owns address A1
sends a transaction to the user who owns address A2. The second scenario
demonstrates how the change address concept protects user’s privacy because
it is difficult to distinguish the recipient(s) of the payment. In scenarios 3&4,
the user who owns address A1sends another transaction from the change
of previous transaction (partial amount of that change). In scenario 3, there
is no change address so the bitcoins are sent from the same address A1.
In scenario 4, the bitcoins are transferred from the change address C1to
an address A3owned by another user, a new change address C2is created
after this transaction. In this example we try to demonstrate how these change
addresses increase the distance between nodes (here A2and A3).
C. Densification Power Law
103105
Number of nodes
107
1010
108
106
104
102
Number of edges
Edges
0.2 x 1.1952
*
July ’09
Sep ’14
Fig. 3. The transaction graph follows densification power law, i.e., the average
degree increases over time. The densification exponent is 1.1952.
The densification power law, or growth power law is an
empirical observation examined by other researchers when
studying the evolution of real graphs over time [4]. This law
of graph evolution states that the growth of graph’s edges is
super linear in terms of the growth of its nodes. The Bitcoin
transaction graph obeys this power law. In Bitcoin evolution
context, it indicates despite that Bitcoin addresses (i.e., public
and private key pairs) are being created continually, the edges
grow super linearly as a function of the growth of newly
added accounts. In other words, the growth of the network is
attributed to the increase number of transactions, which means
increase adaption and use of the Bitcoin financial system over
time.
The densification power law is represented mathematically,
as follows:
E(t)N(t)αwhere 1< α 2
E(t)and N(t)are the number of graph’s edges and nodes
respectively at each timestamp t. The Bitcoin transaction graph
is becoming denser and its densification fits a power-law
pattern with a slope α= 1.1952, as shown in Fig. 3. The
values of the densification exponents are 1.69 and 1.12 for
arXive and Email networks, respectively. Although Bitcoin
users change their accounts frequently, i.e., new nodes are
being added continually to the transaction graph, still the
growth of the transaction graph’s edges is superlinear as a
function of the growth of its nodes over time, similar to what
was reported for other social networks such as IMDB actors
to movies network and Email network [4].
D. Degree Assortativity
The degree assortativity acts an ingredient of community
structure in a graph [25]. Degree assortativity coefficient mea-
sures whether or not graph’s nodes have tendency to interact
with similar nodes with regard to their in and out degree in
directed graph (or degree in undirected one) [26], [27]. Its
value lies between [1,1], where values close to or equal to 1
is a sign of assortative mixing. 0indicates neutral assortativity.
Negative values reveal the opposite, i.e., “disassortativity”.
Social groups of real world typically have assortative mixing
as ‘birds of a feather flock together”. Whereas there is no rule
for online social networks [28]. For example, Flickr shows
assortative mixing (0.202), while Youtube demonstrates the
opposite (0.033).
To measure degree assortativity in the transaction graph
self-edges are excluded as they are irrespective to how nodes
connect to each other. Table II shows negative assortativity
over time. Since in Bitcoin payment system, transactions occur
at two different levels: (i) internal, i.e., between different
accounts that belong to the same user, and (ii) external,
i.e., between different users in the network. In the internal
transactions users usually transfer their coins from high-
degree checking accounts to low-degree saving accounts. In
the external transactions bitcoins are usually sent from low-
degree addresses to high-degree addresses owned by known
merchants and service providers.
E. Time-evolving Community Structure
Communities are graph modules with internally dense
edges but relatively sparse external connections. We examine
the evolution of statistical properties of transaction graph’s
communities, i.e., hub dominance, scaled link density, and
7
TABLE II
DEG RE E A SSO RTATIV IT Y CO EFFI CI ENT,TH ES E VAL UE S AR E
STATI STIC ALLY SI GNIFI CA NT (T-TES T P -VALU E ¡0.05).
Date Degree assortativity
coefficient
03-Jul-09 -0.239
03-Jan-10 -0.043
03-Jul-10 -0.021
03-Jan-11 -0.034
03-Jul-11 -0.022
03-Jan-12 -0.041
03-Jul-12 -0.04
03-Jan-13 -0.041
03-Jul-13 -0.041
03-Jan-14 -0.027
06-Sep-14 -0.011
community size distribution which are proposed in [29]. Self-
edges cannot be indicative of how communities evolve thus
we discard them to simplify our graph, similar approach is
followed in [30].
Modularity is the first thing to look at when examining
community structure. It is a quality index for measuring the
presence of community structure in a graph by comparing the
edge coverage of a community with the coverage an algorithm
would achieve in a randomized null-model graph [31].
Modularity value depends on the community detection
algorithm used, in addition to how modular a network is. Its
value lies between [0.5,1.0], where higher values indicate
more modular networks, as such transaction graph tends to
be a modular network (Fig. 4). Remarkably, the number of
communities does not grow all the time, e.g., the number of
the total evolving communities declined in six-month period
between January 2011 and July 2011 which indicates that
smaller communities getting merged into larger ones. This
merge in communities coincided with the operation of the
first Bitcoin pooled mining service “Slush’s pool” which
attracted an increasing number of miners as soon as it was
released. The growth of evolving communities, on the other
hand, can be attributed to split in existing communities or/and
new nodes joining the network and establishing new well-
connected clusters.
ە
ە
ەە
ەەەەە
ە
ەە
ە
1.0
0.8
0.6
0.4
0.2
0.0
Modularity
ەە
ە
ەە
ە
ە
ە
ە
2000
1500
1000
500
0
2500
Number of communities
ە
ە
Modularity
Number of communities
Fig. 4. Network’s modularity and the number of evolving communities.
We use a parallel implementation of Louvain method to detect Bitcoin
communities. Based on these relatively high modularity values, the transaction
graph tends to have modular structure.
1) Scaled link density: This property is defined as the
average internal degree5of nodes within a community.
ρ=2t
s(s1) Link density
˜ρ=ρs =2t
s1Scaled link density
Where, tis the number of edges within a community and s
represents the size of that community, i.e., the number of nodes
forming it. Scaled link density reveals community’s nature.
For example, tree-like community has number of edges equals
to the lower limit (ttree =s1), substituting this value
in the second equation above gives us 2, therefore tree-like
communities always have scaled link density value equals to
2. Whereas in a full clique, each node is connected to all other
nodes, i.e., the number of edges in the undirected clique equals
to the upper limit (tclique =s(s1)
2), substituting this value in
the scaled link density equation gives us a value of s, therefore
clique-like communities always have scaled link equals to s.
To examine the dependency of this property on the size
of the community, the median of scaled link densities are
plotted as a function of communities’ sizes over time as
illustrated in Fig. 5. The median values are chosen here
given the skewness in the distribution of scaled link density
values. Bitcoin communities’ scaled link densities lie in the
interval [2,5], closer to the lower limit, which indicate tree-like
structure behind the majority of Bitcoin communities (Fig. 5).
Whereas social networks have denser communities than trees
but sparser than cliques based on the finding of a previous
study [29].
2) Hub-dominance: How dominant are the biggest hubs
within Bitcoin communities? This can be quantified according
to the following formula:
Hub dominance =max(kin)
s1
Where, max(kin)is the maximum degree of a node within
a community. The maximum possible degree is s1when
a central node within a community is connected to all other
nodes in its community, consequently the value of the above
ratio will equal to 1 in such extreme case. For the majority
of social networks this ratio decline with community size
until dominant hubs almost vanished from large communities.
However, in the Email and the web graphs the dominant hubs
existed independent of community size [29]. We also study
this property as a function of community size over time. In the
transaction graph there is a hybrid existence of dominant and
non-dominant hubs. Roughly speaking, smaller communities
(s100) tend to have full- to half-dominant hubs opposite to
larger ones (s > 104) which lack dominant nodes as depicted
in Fig. 6.
3) Distribution of communities’ sizes: The distribution of
communities sizes is an important statistic describing com-
munity structure. After the beginning of the trading stage the
community size distribution almost preserve the same shape.
We run a comparative test that leverages the log likelihood
ratios to compare the fit between various pairs of distributions
and find that the exponentially truncated power law represents
the best fit.
5Internal degree: node’s degree in the subgraph of the community.
8
Median scaled link
Fig. 5. Scaled link density. (A) Tree-like subgraph with scaled link density
equals to 2. (B) Clique-like subgraph with scaled link density equals to the
number of nodes 5. (C) The evolution of median values of scaled link density
in transaction graph as a function of community size s. In spite of community
size, the scaled link density median values are close to the lower limit which
indicates a tree-like structure behind the majority of Bitcoin communities,
which indicates “split or merge” of coins between accounts. The median value
of scaled link density spikes at the end for large communities >104. More
investigation is needed to figure out the nature or causes of these relatively
sparse communities.
F. Inequality as measured by Gini Index
Here we study the distribution of wealth among these
accounts. From economics perspective, Lorenz curve measures
the inequality of the wealth distribution. In Fig. 7 the diagonal
(45) represents the line of perfect equality. The increase in
the area between this diagonal and Lorenz curve indicates the
greater the gap in wealth distribution among Bitcoin accounts
over time. Gini coefficient can be computed from this curve,
Kondor et al. conducted a detailed analysis into the Bitcoin
wealth distribution [9].
IV. DIS CUS SI ON
Bitcoin aims at establishing a global financial network fa-
cilitating transactions among people from all around the world
without the need for expensive, trustworthy intermediaries.
Despite the different purposes of the various social networks
and Bitcoin transaction network, one can observe universal
dynamics such as the densification power law, shrinking
diameter, and modular structure as discussed previously in
the results section, and the power-law degree distribution as
reported in the previous work [9].
Social networks generally exhibit addition and deletion of
nodes and edges over time. However, in Bitcoin, after a trans-
action gets confirmed, all of the addresses encapsulated within
that transaction can never be deleted from the blockchain.
This criterion together with the financial nature of Bitcoin
network stimulate an anonymity-seeking behaviour among
ە ە ە
ە
ە
ە
ە
1.0
0.8
0.6
0.4
0.2
0.0
0HGLDQKXEíGRPLQDQFH
ە
ە
ە
ە
ە
ە
ە
ە
ە
ە
ە
ە
ە
ە
ەەە
s > 10,000
ە ە
ە
ە
ە
s <= 100
100 < s <= 10,000
A B
C
Fig. 6. Hub-dominance. (A) In this subgraph, the yellow node has the
maximum degree, it is connected to 4 out of 5 nodes, therefore the hub-
dominance value equals to 0.8. (B) The circular subgraph lacks of hub
presence. (C) Shows the evolution of median values of hub-dominance
as a function of community size s. The presence of hubs within Bitcoin
communities depends directly on community size, i.e., the hub-dominance
values decline with community size until dominant hubs vanish from large
communities. Similar to what is reported for other social networks. Noticeably,
communities of size >104appeared only after January 2011, after the Bitcoin
gained real market value and consequently started to attract growing number
of users and services. We examine different values of community size (s) and
the same trend holds for all values.
Bitcoin users which in turn leads to the key distinction between
Bitcoin transaction network and other social networks.
Thus, the vulnerable anonymity together and the inability to
erase addresses or transactions from the blockchain threaten
users with potential financial tracking. This is especially the
case if a user converts from a fiat currency to bitcoins from a
traditional financial account. In this scenario, their real identity
is linked to their Bitcoin account [14]. To prevent this identity
linking, the users engage in even further anonymity seeking
behavior. This is done using the features of the Bitcoin’s
core design which is equipped with the necessary capabilities
emphasizing anonymity and privacy, i.e., the concept of change
addresses in addition to user’s ability to generate as many new
addresses as desired.
Further, to improve anonymity, mixing services, which are
called sometimes laundry services, have been developed by
Bitcoin supporters. These services, when implemented prop-
erly, hide any connection between the user’s source address
(the account used to deposit an amount of bitcoins into the
service) and the destination address (the account used to with-
draw bitcoins) [24]. Consequently, Bitcoin users, sometimes
with the aid of mixing services, create various categories of
accounts as discussed previously and minimize the reusability
9
0.0 0.2 0.4 0.6 0.8 1.0
0.8
0.6
0.4
0.2
0.0
1.0 2009
2010
2011
2012
2013
2014
Cumulative share of Bitcoin accounts
from lowest balance to highest
Cumulative share of total bitcoins
Fig. 7. The evolution of Lorenz curve. The x axis is the cumulative share of
Bitcoin accounts from lowest balance to highest. The y axis is the cumulative
share of total bitcoins. The increase in the area between this diagonal and
Lorenz curve indicates the greater the gap in wealth distribution among
Bitcoin accounts. The distribution of wealth in the Bitcoin financial system
has become heterogeneous since 2011, i.e., users who own less than 10% of
addresses almost control the whole wealth. Prior to 2011, the Bitcoin network
was in its trial version where a few enthusiasts and developers (the number
of users by the end of initial stage was less than <8,000) tried the system
and split their coins among many accounts.
of their addresses by splitting or merging their coins in long
transaction chains which result in a huge diameter, different
account categories, and sparse tree-like communities which
distinguish the Bitcoin anti-social network from the other
social networks.
We also examined the same graph properties for an approx-
imation of Bitcoin user graph. In that approximation graph,
a single node represents a group of addresses that belong to
the same user 6. To generate an approximation of Bitcoin user
graph we used a heuristic that was developed and effectively
used in the previous research [10], [13]. This heuristic relies
upon the fact that all input addresses of a transaction must
belong to a single entity that holds the private keys of
these addresses. Quoting Satoshi Nakamoto from the original
Bitcoin white paper [2]: “Some linking is still unavoidable
with multi-input transactions, which necessarily reveal that
their inputs were owned by the same owner.” Establishing
a user graph from a transaction graph can be viewed as a
variation of the Union-Find known graph algorithm [32] as
illustrated in Fig. 9. However, the exact users of Bitcoin
cannot be determined precisely because the Bitcoin protocol
was intentionally designed to maximize user’s anonymity by
minimizing the possibility of linking the different addresses
owned by the same user.
The analysis of the approximation user graph confirmed
our previous findings since we discovered similar properties
in the approximation user graph: same large diameter, con-
6A user can have multiple nodes representing them in that graph, hence
this is just an approximation.
firmation of the densification power law, the disassortative
mixing, in addition to high modularity values (within the
range (0.70,0.92)) which, as stated earlier, reflect the presence
of a community structure. We even found close similarities
between the underlying trends of scaled link density and hub-
dominance median values as shown in Fig. 8. These results
strengthen our reasoning behind the unique nature of the
Bitcoin.
● ● ● ●
● ●
0.0
0.2
0.4
0.6
0.8
1.0
0HGLDQ
KXEíGRPLQDQFH
í
í
í
í
2011
í
2012
í
2012
í
í

í
2014
í
● ● ● ● ● ● ● ●
0HGLDQVFDOHGOLQN
density
2
10
20

40
s <= 100
100 < s <= 10,000
s > 10,000
$
%
C
Fig. 8. (A) Similarly, the scaled link density median values for the ap-
proximation graph indicates a tree-like structure behind the majority of the
approximation user graph communities. The spike shown previously in Fig.
5 vanishes indicating those relatively denser communities where mapped to
a single entity in the approximation graph. (B) Here as well, our finding
indicates that the presence of hubs in our approximation graph depends
directly on community size.
From the systems perspective, it was observed that some of
these anti-social incentives are effecting ritical system prop-
erties such as security and privacy, e.g., [33], [34], [35]. The
anti-social incentives are leading to formation or disintegration
of certain network communities. This in turn is leading to the
improper use or the intentional misuse of the overall system.
These community alteration present serious threats to a subset
of the system properties that we identified: decentralization,
longevity (of the system that’s supposed to evolve over next
hundreds of years), trust, participation incentive, privacy, se-
curity, and usage ethics. As such, our contribution in under-
standing and measuring social network properties that lead to
the identification of the anti-social incentives and properties
represent a contribution with a potentially significant systems
impact in the design of this new generation of cryptocurrency
networks.
Given the recent expansion of the blockchain use as a
system infrastructure to support other kinds of mission critical
systems, such as smart grids, Internet of Things (IoT), au-
tonomous driving vehicles, health records management, assets
trading, etc., e.g., [34], [36], [37], [38], we are shifting from
Bitcoin as a socio-cyber network [1] to full blockchain-based
socio-cyber-physical systems. This integration is putting a
10
Transaction ID Sending Address ID Receiving Address ID
Approx. User
ID
1 A H 1
1 D 1
2 C L ?
2 F M ?
2 H ?
3 D C 1
3 G 1
4 E M 1
4 G 1
Fig. 9. The addresses {A, D }are inputs to the same transaction, on this
account they are owned by the same entity. Address {D}appeared as sending
address in transactions {1,3}then all sending addresses of both transactions
belong to the same user. Moreover, address {G}appears as a common input
address to the transactions {3,4}, which leads us to conclude that a single
entity holds the private keys of {A, D, G, E }and that entity initiated all
the three transaction {1,3,4}. We cannot assign a new user id to the input
addresses of the second transaction until we see the complete list of all
transactions; we might encounter a common address that link them to the
aforementioned user.
combination of additional system properties of safety and trust
as critical with respect to potential anti-social incentives in
these new mission critical systems. To deal with these issues,
we have to develop additional social network measures and
to work on design of community detection technologies. This
will help us support the development of blockchain-enabled
trust infrastructures that can ensure sufficient levels of privacy,
security, safety, trust and overall dependability. This must be
done in the context of planning for systems longevity, i.e.,
these systems are supposed to last hundreds of years, e.g,
Bitcoin’s longevity is critical to assume if it is to be considered
as the financial system infrastructure for these mission critical
socio-cyber-physical systems.
Finally, while this paper covers data from 2009–2014 that
correspond to the initial phase and trading phase identified
in [9], the paper does not cover the period from late 2014
until present that represents the currently ongoing heavy mass
media and heavy financial speculation phase. While this can
be considered as a limitation of this work, we believe that the
data from the ongoing speculation phase is worth studying in
its own light once the speculation phase is over. At the time
of the writing, we were unable to take into account either the
mass media coverage variable or heavy financial speculation
variable neither qualitatively nor quantitatively.
V. CO NCL US ION
In summary, Bitcoin represents a move from relatively
local, transparent social networks created through the use of
traditional fiat currencies to relatively global, semi-anonymous
social networks created through the use of cryptocurrencies,
with Bitcoin being the leading example. If we assume that the
ultimate goal of social networks is to connect globally, one
could argue that the traditional currency networks could be
considered anti-social. The need to control a fiat currency and
to have a certain level of transparency within a local currency
network creates control conflicts among the sovereigns. This
in turn prevents effective, inexpensive expansion of the local
social financial networks evident through expensive financial
conversion protocols and services.
To fight this anti-social component of the local traditional
currency social networks, Bitcoin relies upon a set of its
own anti-social forces as observed in this paper. As we
have seen in our results, the evolutionary dynamics of the
Bitcoin as the most popular cryptocurrency provides us with
the initial understanding of social networks rooted in and
driven by anti-social behaviours. We can conclude that it is
indeed the optimal balance of the social and anti-social forces
that is critical for the success and acceptance of a particular
currency and the corresponding financial social network. And
the enforcement of anti-social behaviours is critical for the
users, even at the expense of adding the additional social
network noise as the results have shown.
As a part of our future research, we will work on the de-
velopment of other cryptocurrency network specific measures
and community detection approaches, and combine them with
our natural language analysis approach [39], [40] and generic
infrastructure models [41] to provide enhanced privacy, secu-
rity, and trust blockchain solution in the smart grid systems
domain. This will be combined with the use of questionable
arbitrary data recorded in the blockchains [34] in order to
tackle the issues of higher-level system usage ethics and trust-
ethical constraints.
REF ERE NC ES
[1] A. Ahmad, M. Babar, S. Din, S. Khalid, M. M. Ullah, A. Paul, A. G.
Reddy, and N. Min-Allah, “Socio-cyber network: The potential of cyber-
physical system to define human behaviors using big data analytics,”
Future Generation Computer Systems, 2018. [Online]. Available:
http://www.sciencedirect.com/science/article/pii/S0167739X17307781
[2] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Con-
sulted, vol. 1, no. 2012, p. 28, 2008.
[3] M. E. Newman, “The structure and function of complex networks,
SIAM review, vol. 45, no. 2, pp. 167–256, 2003.
[4] J. Leskovec, J. Kleinberg, and C. Faloutsos, “Graph evolution: Den-
sification and shrinking diameters,ACM Transactions on Knowledge
Discovery from Data (TKDD), vol. 1, no. 1, p. 2, 2007.
[5] R. Kumar, J. Novak, and A. Tomkins, “Structure and evolution of online
social networks,” in Link mining: models, algorithms, and applications.
Springer, 2010, pp. 337–357.
[6] D. Easley and J. Kleinberg, Networks, crowds, and markets: Reasoning
about a highly connected world. Cambridge University Press, 2010.
[7] A. Z. Jacobs, S. F. Way, J. Ugander, and A. Clauset, “Assembling
thefacebook: Using heterogeneity to understand online social network
assembly,arXiv preprint arXiv:1503.06772, 2015.
[8] A.-L. Barabˆasi, H. Jeong, Z. N ´eda, E. Ravasz, A. Schubert, and
T. Vicsek, “Evolution of the social network of scientific collaborations,”
Physica A: Statistical mechanics and its applications, vol. 311, no. 3,
pp. 590–614, 2002.
[9] D. Kondor, M. P´osfai, I. Csabai, and G. Vattay, “Do the rich get richer?
An empirical analysis of the BitCoin transaction network,PloS one,
vol. 9, no. 2, p. e86197, 2014.
[10] D. Ron and A. Shamir, “Quantitative analysis of the full bitcoin trans-
action graph,” in Financial Cryptography and Data Security. Springer,
2013, pp. 6–24.
[11] D. D. F. Maesa, A. Marino, and L. Ricci, “Uncovering the bitcoin
blockchain: an analysis of the full users graph,” in Data Science and
Advanced Analytics (DSAA), 2016 IEEE International Conference on.
IEEE, 2016, pp. 537–546.
[12] M. Fleder, M. S. Kester, and S. Pillai, “Bitcoin transaction graph
analysis,arXiv preprint arXiv:1502.01657, 2015.
11
[13] S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M.
Voelker, and S. Savage, “A fistful of bitcoins: characterizing payments
among men with no names,” in Proceedings of the 2013 conference on
Internet measurement conference. ACM, 2013, pp. 127–140.
[14] F. Reid and M. Harrigan, An analysis of anonymity in the bitcoin system.
Springer, 2013.
[15] J. Leskovec, J. Kleinberg, and C. Faloutsos, “Graphs over time:
densification laws, shrinking diameters and possible explanations,” in
Proceedings of the eleventh ACM SIGKDD international conference on
Knowledge discovery in data mining. ACM, 2005, pp. 177–187.
[16] Q. Kong, W. Mao, G. Chen, and D. Zeng, “Exploring trends and patterns
of popularity stage evolution in social media,” IEEE Transactions on
Systems, Man, and Cybernetics: Systems, pp. 1–11, 2018.
[17] X. Liu, C. Shen, X. Guan, and Y. Zhou, “We know who you are:
Discovering similar groups across multiple social networks,” IEEE
Transactions on Systems, Man, and Cybernetics: Systems, pp. 1–12,
2018.
[18] J. Zhang, Y. Zhu, and Z. Chen, “Evolutionary game dynamics of mul-
tiagent systems on multiple community networks,IEEE Transactions
on Systems, Man, and Cybernetics: Systems, pp. 1–17, 2018.
[19] T. Chang and D. Svetinovic, “Improving bitcoin ownership identification
using transaction patterns analysis,IEEE Transactions on Systems,
Man, and Cybernetics: Systems, pp. 1–12, 2018.
[20] coindesk.com, “What can you buy with bitcoins?” October
2015 (accessed October 26, 2015). [Online]. Available:
http://goo.gl/Kc6WW5
[21] J. Ugander, B. Karrer, L. Backstrom, and C. Marlow, “The anatomy of
the facebook social graph,arXiv preprint arXiv:1111.4503, 2011.
[22] M. Cha, H. Haddadi, F. Benevenuto, and P. K. Gummadi, “Measuring
user influence in twitter: The million follower fallacy.” ICWSM, vol. 10,
pp. 10–17, 2010.
[23] R. Gonzalez, R. Cuevas, R. Motamedi, R. Rejaie, and A. Cuevas,
“Google+ or google-?: dissecting the evolution of the new osn in its
first year,” in Proceedings of the 22nd international conference on
World Wide Web. International World Wide Web Conferences Steering
Committee, 2013, pp. 483–494.
[24] M. Moser, R. Bohme, and D. Breuker, “An inquiry into money laun-
dering tools in the bitcoin ecosystem,” in eCrime Researchers Summit
(eCRS), 2013. IEEE, 2013, pp. 1–14.
[25] M. Catanzaro, G. Caldarelli, and L. Pietronero, “Assortative model for
social networks,Physical Review E, vol. 70, no. 3, p. 037101, 2004.
[26] M. E. Newman, “Assortative mixing in networks,” Physical review
letters, vol. 89, no. 20, p. 208701, 2002.
[27] ——, “Mixing patterns in networks,Physical Review E, vol. 67, no. 2,
p. 026126, 2003.
[28] H.-B. Hu and X.-F. Wang, “Disassortative mixing in online social
networks,EPL (Europhysics Letters), vol. 86, no. 1, p. 18003, 2009.
[29] A. Lancichinetti, M. Kivel¨a, J. Saram¨aki, and S. Fortunato, “Character-
izing the community structure of complex networks,” PloS one, vol. 5,
no. 8, p. e11976, 2010.
[30] D. J. Fenn, M. A. Porter, M. McDonald, S. Williams, N. F. Johnson, and
N. S. Jones, “Dynamic communities in multichannel data: An application
to the foreign exchange market during the 2007–2008 credit crisis,”
Chaos: An Interdisciplinary Journal of Nonlinear Science, vol. 19, no. 3,
p. 033119, 2009.
[31] C. L. Staudt, A. Sazonovs, and H. Meyerhenke, “Networkit: An inter-
active tool suite for high-performance network analysis,” arXiv preprint
arXiv:1403.3005, 2014.
[32] T. H. Cormen, C. E. Leiserson, R. L. Rivest, C. Stein et al.,Introduction
to algorithms - Chapter 21. MIT press Cambridge, 2001, vol. 2.
[33] I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is
vulnerable,Commun. ACM, vol. 61, no. 7, pp. 95–102, Jun. 2018.
[Online]. Available: http://doi.acm.org/10.1145/3212998
[34] M. Conti, S. K. E, C. Lal, and S. Ruj, “A survey on security and privacy
issues of bitcoin,IEEE Communications Surveys Tutorials, pp. 1–1,
2018.
[35] Y. Yuan and F. Wang, “Blockchain and cryptocurrencies: Model, tech-
niques, and applications,IEEE Transactions on Systems, Man, and
Cybernetics: Systems, vol. 48, no. 9, pp. 1421–1428, Sept 2018.
[36] E. Al Kawasmi, E. Arnautovic, and D. Svetinovic, “Bitcoin-based
decentralized carbon emissions trading infrastructure model,Systems
Engineering, vol. 18, no. 2, pp. 115–130, 2015.
[37] N. Z. Aitzhan and D. Svetinovic, “Security and privacy in decentralized
energy trading through multi-signatures, blockchain and anonymous
messaging streams,IEEE Transactions on Dependable and Secure
Computing, vol. 15, no. 5, pp. 840–852, Sept 2018.
[38] B. Ojetunde, N. Shibata, and J. Gao, “Secure payment system utilizing
manet for disaster areas,IEEE Transactions on Systems, Man, and
Cybernetics: Systems, pp. 1–13, 2018.
[39] E. Casagrande, S. Woldeamlak, W. L. Woon, H. H. Zeineldin, and
D. Svetinovic, “Nlp-kaos for systems goal elicitation: Smart metering
system case study,IEEE Transactions on Software Engineering, vol. 40,
no. 10, pp. 941–956, 2014.
[40] E. Casagrande, E. Arnautovic, W. L. Woon, H. H. Zeineldin, and
D. Svetinovic, “Semiautomatic system domain data analysis: a smart
grid feasibility case study,IEEE Transactions on Systems, Man, and
Cybernetics: Systems, vol. 47, no. 12, pp. 3117–3127, 2017.
[41] H. Suleiman, I. Alqassem, A. Diabat, E. Arnautovic, and D. Svetinovic,
“Integrated smart grid systems security threat model,” Information
Systems, vol. 53, pp. 147–160, 2015.
Israa Alqassem is a PhD student at Purdue uni-
versity, USA. She is interested in machine learning,
blockchain technology, and the IoT. Currently, she
is a visiting research student at Ludwig Maximilian
University of Munich, Germany. Her research focus
is the development of statistical methods and com-
putational tools for analyzing genomic data.
Iyad Rahwan is the AT&T Career Development
Professor and an Associate Professor of Media Arts
& Sciences at the MIT Media Lab, where he leads
the Scalable Cooperation group. A native of Aleppo,
Syria, Rahwan holds a PhD from the University of
Melbourne, Australia. He is an affiliate faculty at the
MIT Institute of Data, Systems and Society (IDSS),
and member of the MIT Taskforce on the Work of
the Future.
Rahwan’s work lies at the intersection of computer
science and human behavior, with a focus on collec-
tive intelligence, large-scale cooperation, and the societal impact of Artificial
Intelligence and social media. His early work explored how social media can
be used to achieve unprecedented feats, such as searching an entire continent
within 9 hours, and re-assembling shredded documents. He led the winning
team in the US State Department’s Tag Challenge, using social media to locate
individuals in remote cities within 12 hours using only their mug shots.
Recently, Rahwan led a team that crowdsourced 40 million decisions from
people worldwide about the ethics of autonomous vehicles. Through a series
of projects, he also exposed tens of millions of people world-wide to new
implications of AI, such as bias in machine learning, human-AI creativity
and the ability of AI to induce fear and empathy in humans at scale.
Another theme that interests Iyad is the future of work and human-
machine cooperation. He demonstrated the world’s first human-level strategic
cooperation by an AI, and innovated new methods to anticipate the potential
impact of AI on human labor.
Iyad Rahwan’s work appeared in major academic journals, including
Science and PNAS, and features regularly in major media outlets, including
the New York Times, The Economist, and the Wall Street Journal.
12
Davor Svetinovic is an Associate Professor of Com-
puter Science at Masdar Institute, Khalifa University
of Science and Technology, UAE. He received his
PhD (2006) degree in Computer Science from Uni-
versity of Waterloo, Canada. Previously, he worked
as a visiting professor and research affiliate at the
Massachusetts Institute of Technology (MIT); and
as a postdoctoral researcher at Lero – the Irish
Software Engineering Center, Ireland, and Vienna
University of Technology, Austria. He leads the
Strategic Requirements and Systems Security Group
(SRSSG), and he has extensive experience working on complex multi-
disciplinary research projects. He has published over 65 papers in leading
journals and conferences. His current research interests include systems secu-
rity and privacy, blockchain engineering, cryptocurrencies, and requirements
engineering. He is a Senior Member of IEEE and ACM.
... suitable to represent data relationships between transactions, blocks, addresses and inputs/outputs in blockchain. In this regard, different research studies propose the translation of blockchain data structures into directed graph models (Akcora et al., 2018b;Alqassem et al., 2018;Guo, D. et al., 2019;McGinn et al., 2018;Meiklejohn et al., 2013;Mizerka et al., 2020;Ober et al., 2013;Reid and Harrigan, 2013;Ron and Shamir, 2013;Sompolinsky and Zohar, 2015;Tsoulias et al., 2020). The study of their dynamic evolution and revealed patterns typically provide relevant insights on anonymity, integrity, performance and the security of the corresponding applications. ...
... Directed (Alqassem et al., 2018;Bataineh et al., 2020;Casale-Brunet et al., 2021;Chai et al., 2021;McGinn et al., 2018;Pierro, 2021) Game (Altman et al., 2019;Bataineh et al., 2020;Chen and Wang, 2020;Kim, 2018;Kim, Sungwook, 2019;Lajeunesse and Scolnik, 2021;Liu, W. et al., 2020;Manshaei et al., 2018;Singh et al., 2020;Taghizadeh et al., 2020;Tang et al., 2017;Tang et al., 2020;Toda et al., 2021;Yang et al., 2017) Agent based (Cocco and Marchesi, 2016;Cocco et al., 2019a;Kaligotla and Macal, 2018;Luther, 2016) Machine Learning (Kamble et al., 2021;Polemis and Tsionas, 2021;Tsai et al., 2021) Linear, private, permissioned (ie. HLF, Health Federated, …) ...
Article
Full-text available
Blockchain has emerged as an innovative technology with potential to transform business management, through operational efficiency improvements. Nevertheless, several performance and vulnerability issues have been identified for the different typologies supporting the wide range of blockchain-based applications currently implemented in different domains. A variety of analytical and empirical models are being used to evaluate the issues associated with the different blockchain typologies, enabling systematic analyses of the corresponding efficiency impact, and technical or economic threats. A thorough systematic literature review of these models has been performed, followed by a detailed assessment on the way these models have been employed, and the target parameters and applications evaluated (336 research selected and analysed). We propose a co-classification of these models, allowing us to identify which ones are employed to a greater extent to address the different blockchain issues in scientific research. In a second step, a bibliometric analysis on the selected research is conducted, offering a complementary overview of the status of and trends in blockchain modelling, including the most prolific authors and leading contributing countries to the topic. The main outcome and contribution of the paper is the provision of a broad overview on how blockchain issues have been analytically tackled, through the synthesis and meta-analysis of the models used in the scientific literature since the inception of blockchain technology. The results have two main direct applications, firstly supporting novel vulnerability and performance analyses of existing blockchain applications by providing historical information on the models used so far, as well as the key parameters and typology of the blockchain-based applications evaluated. Secondly, in the implementation of new applications, by allowing the recognition of key issues identified that are associated with the different blockchain typologies and to determine the most suitable models to analyse the weaknesses and risks of the alternative designs under evaluation for these new implementations.
... It has garnered attention owing to its anonymity, nonrepudiation, non-tamperability, and permanent storage [1,2]. In 2009, Satoshi Nakamoto launched the Bitcoin project, the first large-scale application of blockchain, and was the first to introduce cryptocurrency to the real world [3,4]. ...
... Owing to the open and transparent nature of Ethereum, information from transaction records can be extracted [4,14], thus making it possible to detect phishing fraud on the Ethereum network. In the Ethereum network, each node has a unique address, and linking between nodes with edges implies the existence of at least one transaction between two nodes. ...
Article
Full-text available
Blockchain is making a big impact in various applications, but it is also attracting a variety of cybercrimes. In blockchain, phishing transfers the victim’s virtual currency to make huge profits through fraud, which poses a threat to the blockchain ecosystem. To avoid greater losses, Ethereum, one of the blockchain platforms, can provide information to detect phishing fraud. In this study, to effectively detect phishing nodes, we propose a phishing node detection approach as message passing based graph convolution network. We first form a transaction network through the transaction records of Ethereum and then extract the information of nodes effectively via message passing. Finally, we use a graph convolution network to classify the normal and phishing nodes. Experiments show that our method is effective and superior to other existing methods.
... There are myriad studies on modeling blockchain transaction networks by considering unstructured cryptocurrency data as a network structure. Most of them mainly focus on data analysis, such as [20], [21], [22], [23], [24], and [25] explored BCN with a focus on descriptive statistics. Thereafter, studies like [26], [27], and [28] analyze the BCN from perspectives of the long-term evolutionary dynamics. ...
Article
Full-text available
The metaverse and its underlying blockchain technology have attracted extensive attention in the past few years. How to mine, process, and analyze the tremendous data generated by the metaverse systems has posed a number of challenges. Aiming to address them, we mainly focus on modeling and understanding the blockchain transaction network from a structural identity perspective, which represents the entire network structure and reveals the relations among multiple entities. In this article, we analyze three metaverse-related systems: non-fungible token (NFT), Ethereum (ETH), and Bitcoin (BTC) from the structural-identity perspective. First, we conduct the complex network analysis of the metaverse network and obtain several new insights (i.e., power-law degree distribution, disconnection, disassortativity, preferential attachment, and non-rich-club effect). Secondly, based on such findings, we propose a novel representation learning method named structure-to-vector with random pace (SVRP) for learning both the latent representation and structural identity of the network. Thirdly, we conduct node classification and link prediction tasks with the integration of graph neural networks (GNNs). Empirical results on three real-world datasets demonstrate that our proposed SVRP outperforms other existing methods in multiple tasks. In particular, our SVRP achieves the highest node classification accuracy (Acc) (99.3 $\%$ ) and $F$ 1-score (96.7 $\%$ ) while only requiring original non-attributed graphs.
... Everyone makes choices voluntarily on his own behalf in the decentralized network, and there is no principal-agent relationship [66]. Besides, DAOs allow the existence of humanity and the resulted self-interested behaviors, and weaken the possible adverse effects through various mechanism design [67]. Democratic voting-based decision mechanism is a good exemplar. ...
Article
Full-text available
In the future, management in smart societies will revolve around knowledge workers and the works they produce. This article is committed to explore new management framework, model, paradigm, and solution for organizing, managing, and measuring knowledge works. First, the parallel management framework is presented that would allow for the virtual-real interactions of humans in social space, robots in physical space, and digital humans in cyberspace to realize descriptive, predictive, and prescriptive intelligence for management. Then, the management foundation models are proposed by fusing scenarios engineering with artificial intelligence foundation models and cyber–physical-social systems. Moreover, the new management paradigm driven by decentralized autonomous organizations and operations is formulated for the advancement of smart organizations and intelligent operations. On these basis, the management operating systems that highlight features of simple intelligence, provable security, flexible scalability, and ecological harmony are finally put forward as new management solution.
... This work is an improvement on another clusteringrelated work in their team. In reference [66] , they only combine three heuristic addresses of output transaction, multi-input multi-output, and change the address to cluster and compare the results with the results in WalletExplorer [54] . In recent work, Zheng et al. [20] proposed an incremental clustering algorithm based on historical clustering that employed three heuristic algorithms, which can realize address clustering of large datasets. ...
Article
Full-text available
Cryptocurrency based on blockchain technology has gradually become a choice for people to invest in, and a large number of users have participated in the accumulation of massive transaction data. The complete transaction records recorded in the blockchain and the open characteristics of data provide researchers with opportunities to mine and analyze the data in the chain. Network modeling and analysis of cryptocurrency transaction records is a common method of blockchain data analysis. The analysis of attribute graphs can provide insight into various economic indicators, illegal activities, general internet security, and so on. This article aims to summarize and analyze the literature on cryptocurrency transaction data from the perspective of complex networks. To provide systematic guidance for researchers, we put forward a blockchain data analysis framework based on introducing the relevant background and reviewed the work from five aspects: the blockchain data model, data acquisition on the chain, existing analysis tools, available insights, and common analysis methods. For each aspect, we introduce the research problems, summarize the methods, and discuss the results and findings. Finally, we present future research concepts and several open questions in this field.
... The entire Blockchain from inception to 08 May 2020 at 13:21:33 GMT was 298GB. Due to storage, computational, and time complexity, majority researchers (excluding surveys[2,[50][51][52][53][54]) have focused on limited categories of illicit users and shorter periods. ...
Preprint
Full-text available
Forensic investigations increasingly leverage artificial intelligence to identify illegal activities on Bitcoin. Bitcoin transactions have an original graph (network) structure, which is sophisticated and yet informative. However, machine learning applications on Bitcoin have given limited attention to developing end to end deep learning frameworks that are modeled to exploit the Bitcoin graph structure. To identify illegal transactions on Bitcoin, the current paper extracts nineteen features from the bitcoin network and proposes a deep learning based graph neural network model using spectral graph convolutions and transaction features. The proposed model is compared with two state of the art techniques an Ensemble of Decision Trees, and a Decision trees trained on Convoluted features for classification of illegal transactions on Bitcoin. To understand the efficacy of the proposed model, a dataset is collected consisting of 13310125 transactions of 2059 entities having 3152202 Bitcoin account addresses and belonging to 28 categories of users. Two sets of experiments are performed on the datasets: labeling transactions as legal or illegal (binary classification) and identifying the originator of the transaction to one of the twenty-eight types of entities (multi-class classification). For fast and accurate decisions, binary classification is appropriate, and for pinpointing the category of bitcoin users, a multi-class classifier is suitable. On both the tasks, the proposed models achieved a maximum of 92\% accuracy, validating the methodology and suitability of the model for real-world deployment.
... This mechanism can reduce the number of blocks on the blockchain communication overhead between the points, so the number of the nodes can be further expanded. Crash Fault Tolerance (CFT) algorithm can tolerate the failures in the consensus, although it can help the network reach consensus quickly, it needs to run in the network with an authentication mechanism [32]. Reference [33] proposed a partially decentralized consensus algorithm with a high communication speed, but it needs to elect a reliable master node. ...
Article
Full-text available
With the popularity of IoT devices and cloud technology in the medical industry. Sharing EHRs (Electronic Health Records) among medical institutions improves the accuracy of medical diagnosis and promotes the development of public medical. However, it is difficult to share EHRs among hospitals, and patients typically don’t know about the usage of their health records. In this paper, we propose a patient-controlled EHRs sharing scheme based on cloud computing collaborating blockchain technology. The medical abstract and the access strategy are stored in the blockchain to avoid being tampered with. To achieve the fine-grained access control, we propose the attribute-based encryption scheme and multi-keyword encryption scheme to encrypt EHRs. Moreover, we proposed a node-state-checkable Practical Byzantine Fault Tolerance consensus algorithm (sc-PBFT) to prevent the Byzantine nodes from sneaking into the consortium blockchain. First, we check the state of the elected master node to avoid the master node having any malicious records. Then, using pre-prepared, prepare, and commit processes to complete the consensus request submitted by the client. At last, the proposed consensus algorithm evaluates the state of the master node according to the completion of the three-stage process to reduce the impact of the malicious node on the whole consortium blockchain. By doing this, the malicious node will be marked and isolated into the isolation area. The experimental results show that the proposed sc-PBFT algorithm has better handling capability and lower consensus latency. Compared with the PBFT algorithm in the case of Byzantine nodes, sc-PBFT not only improves the robustness of the consortium blockchain network but also improves the handling capability.
... At present, there is not much literature on the Bitcoin network community. Researchers mainly focused on analysing the network graph property of various communities [9,10] and then speculating on the characteristics of large entities in the Bitcoin network [11,12]. Therefore, studying the network of the community, obtaining the structure of the community, and then explaining the transaction pattern of the large Bitcoin community are our research goals in the future. ...
Article
Full-text available
Single heuristic method and incomplete heuristic conditions were difficult to cluster a large number of addresses comprehensively and accurately. Therefore, this paper analysed the associations between Bitcoin transactions and addresses and used six heuristic conditions to cluster addresses and entities. We proposed an improved change address detection algorithm and compared it with the original change address algorithm to prove the effectiveness of the improved algorithm. By adding conditional constraints, the identified change address was more accurate, and the convergence speed of the algorithm was accelerated. Our work presented the pseudo‐anonymity mechanism of the Bitcoin system, which could be used by the law enforcement agencies to track and crack down illegal transactions.
Article
Purpose Bitcoin has indeed been universally acknowledged as an investment asset in recent decades, after the boom-and-bust of cryptocurrency values. Because of its extreme volatility, it requires accurate forecasts to build economic decisions. Although prior research has utilized machine learning to improve Bitcoin price prediction accuracy, few have looked into the plausibility of using multiple modeling approaches on datasets containing varying data types and volumetric attributes. Thus, this paper aims to propose a bitcoin price prediction model. Design/methodology/approach In this research work, a bitcoin price prediction model is introduced by following three major phases: Data collection, feature extraction and price prediction. Initially, the collected Bitcoin time-series data will be preprocessed and the original features will be extracted. To make this work good-fit with a high level of accuracy, we have been extracting the second order technical indicator based features like average true range (ATR), modified-exponential moving average (M-EMA), relative strength index and rate of change and proposed decomposed inter-day difference. Subsequently, these extracted features along with the original features will be subjected to prediction phase, where the prediction of bitcoin price value is attained precisely from the constructed two-level ensemble classifier. The two-level ensemble classifier will be the amalgamation of two fabulous classifiers: optimized convolutional neural network (CNN) and bidirectional long/short-term memory (BiLSTM). To cope up with the volatility characteristics of bitcoin prices, it is planned to fine-tune the weight parameter of CNN by a new hybrid optimization model. The proposed hybrid optimization model referred as black widow updated rain optimization (BWURO) model will be conceptual blended of rain optimization algorithm and black widow optimization algorithm. Findings The proposed work is compared over the existing models in terms of convergence, MAE, MAPE, MARE, MSE, MSPE, MRSE, Root Mean Square Error (RMSE), RMSPE and RMSRE, respectively. These evaluations have been conducted for both algorithmic performance as well as classifier performance. At LP = 50, the MAE of the proposed work is 0.023372, which is 59.8%, 72.2%, 62.14% and 64.08% better than BWURO + Bi-LSTM, CNN + BWURO, NN + BWURO and SVM + BWURO, respectively. Originality/value In this research work, a new modified EMA feature is extracted, which makes the bitcoin price prediction more efficient. In this research work, a two-level ensemble classifier is constructed in the price prediction phase by blending the Bi-LSTM and optimized CNN, respectively. To deal with the volatility of bitcoin values, a novel hybrid optimization model is used to fine-tune the weight parameter of CNN.
Article
Full-text available
The popularity of online contents in social media frequently experiences ebb and flow, and thus its evolution often involves different stages, such as burst and valley. Exploring the patterns of popularity evolution, especially how burst forms and decays, and even further, predicting the trends of popularity evolution is both an important research topic and beneficial to support decision making for many applications, such as emergency management, business intelligence, and public security. Previous work on popularity prediction has focused on predicting the popularity volume of online contents, and at most, popularity burst and ignored the exploration of popularity evolution and the prediction of its stages. To fill this gap, in this paper, we propose our method for the popularity stage prediction problem both at the microscopic level and macroscopic level. At the microscopic level, we first extract multiple dynamic factors and infer future evolution stage by considering the contributions of different dynamic factors. At the macroscopic level, we extract the overall evolution patterns of popularity stages and adopt a pattern matching-based method to predict future popularity stages. We evaluate the proposed approach using tweets in SinaWeibo, the most popular Twitter-like social media platform in China. The experimental results show the effectiveness of our proposed approach in predicting popularity evolution stages.
Article
Full-text available
How to understand and control the individual choices and cooperative conflicts in multiagent systems is a cross-over study which edges into multiple disciplines. An interdisciplinary mathematical tool to theoretically study the issue of cooperative dilemma is evolutionary game theory. The assumption of graphs that maps social interactions provides a useful approach for studying the dynamics in gaming systems, where its theoretical analysis is drop behind simulations. Here we perform analysis on game dynamics in a spatially distributed system situating on multiple-community networks. In the context of the three paradigmatic game prototypes (dominating games, coexistence games, and the coordination games), the stability of the equilibrium state emerging from this is provided. Further investigation on multicommunity system reveals that the community structure plays a key role in the stability of the strategy evolution. Besides, our explorations toward the multiple strategies adopted by the population whose interactions include n communities, certify that the payoff is crucial for individuals' dominating superiority over others in the system. The results are expected to provide effective perspective to control the individual choice in large systems, and lend itself to multiple applications in control engineering perspective. IEEE
Article
Bitcoin is a cryptocurrency and a financial transaction network implemented using blockchain technology. Users in the Bitcoin network use pseudonymous Bitcoin addresses and conduct transactions with others without revealing their real identities. In order to further enhance their privacy and convenience, users often use a large number of different addresses. In this paper, we analyze different patterns of transactions occurring in the Bitcoin network in order to cluster addresses that share the same ownership. In order to evaluate the proposed clustering approach, Bitcoin addresses belonging to known entities are tagged and these are used in conjunction with the Gini impurity index to test the accuracy of the recovered identity-based clusters. The results show that our heuristic was able to detect relationships between Bitcoin addresses that were missed by the existing heuristics.
Article
As an emerging decentralized architecture and distributed computing paradigm underlying Bitcoin and other cryptocurrencies, blockchain has attracted intensive attention in both research and applications in recent years. The key advantage of this technology lies in the fact that it enables the establishment of secured, trusted, and decentralized autonomous ecosystems for various scenarios, especially for better usage of the legacy devices, infrastructure, and resources. In this paper, we presented a systematic investigation of blockchain and cryptocurrencies. Related fundamental rationales, technical advantages, existing and potential ecosystems of Bitcoin and other cryptocurrencies are discussed, and a six-layer reference model of the blockchain framework is proposed with detailed description for each of its six layers. Potential applications of blockchain and cryptocurrencies are also addressed. Our aim here is to provide guidance and reference for future research along this promising and important direction. IEEE
Article
The Bitcoin cryptocurrency records its transactions in a public log called the blockchain. Its security rests critically on the distributed protocol that maintains the blockchain, run by participants called miners. Conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups, that is, it incentivizes miners to follow the protocol as prescribed. We show that the Bitcoin mining protocol is not incentive-compatible. We present an attack with which colluding miners' revenue is larger than their fair share. The attack can have significant consequences for Bitcoin: Rational miners will prefer to join the attackers, and the colluding group will increase in size until it becomes a majority. At this point, the Bitcoin system ceases to be a decentralized currency. Unless certain assumptions are made, selfish mining may be feasible for any coalition size of colluding miners. We propose a practical modification to the Bitcoin protocol that protects Bitcoin in the general case. It prohibits selfish mining by a coalition that command less than 1/4 of the resources. This threshold is lower than the wrongly assumed 1/2 bound, but better than the current reality where a coalition of any size can compromise the system.
Article
People use various online social networks for different purposes. The user information on each social network is usually partial. Thus, matching the users across these multiple online social networks is of great significance for providing new services as well as new insights on user behaviors. Recent research shows that group structure widely exists on social networks, in which members work together with certain purpose and are more influential than individuals on online social networks. Previous works provide outstanding solutions for mapping individuals, but few ones pay attention to the study of groups across multiple social networks. To address the research gap, we first aim to propose an effective method to detect similar group across multiple social networks. The method mainly has three steps, including detecting group structure based on random walks, extracting similarity features, and inferring group similarity using probabilistic graphical model. We evaluate our algorithm on five different types of online social networks. Experimental results show that our method achieves 0.693, 0.779, 0.729 in precision, recall, and F1-measure, which significantly surpass the state-of-the-art by 31.4%-44.3%, 17.3%-26.3%, and 25.9%-31.6%, respectively. The outstanding performance of our method demonstrates that our proposal can reach the requirement of detecting similar groups across social networks. In particular, the result of this paper paves the way for the recommendation system, link prediction and information diffusion across sites.
Article
The growing gap between users and the big data analytics requires innovative tools that address the challenges faced by big data volume, variety, and velocity. Therefore, it becomes computationally inefficient to analyze such massive volume of data. Moreover, advancements in the field of big data application and data science leads toward a new paradigm of human behavior, where various smart devices integrate with each other and establish a relationship. However, majority of the systems are either memoryless or computational inefficient, which are unable to define or predict human behavior. Therefore, keeping in view the aforementioned needs, there is a requirement for a system that can efficiently analyze a stream of big data within their requirements. Hence, this paper presents a system architecture that integrates social network with the technical network. We derive a novel notion of ‘Socio-Cyber Network’, where a friendship is made based on the geo-location information of the user, where trust index is used based on graphs theory. The proposed graph theory provides a better understanding of extraction knowledge from the data and finding relationship between different users. To check the efficiency of the proposed algorithms exploited in the proposed system architecture, we have implemented our proposed system using Hadoop and MapReduce. MapReduce for cyber-physical system (CPS) is supported by a parallel algorithm that efficiently process a huge volume of data sets. The system is implemented using Spark GraphX tool at the top of the Hadoop parallel nodes to generate and process graphs with near real-time. Moreover, the system is evaluated in terms of efficiency by considering the system throughput and processing time. The results show that the proposed system is more scalable and efficient.
Article
Mobile payment system in a disaster area have the potential to provide electronic transactions for people purchasing recovery goods like foodstuffs, clothes, and medicine. Conversely, to enable transactions in a disaster area, current payment systems need communication infrastructures (such as wired networks and cellular networks) which may be ruined during such disasters as large-scale earthquakes and flooding and thus cannot be depended on in a disaster area. In this paper, we introduce a new mobile payment system utilizing infrastructureless mobile adhoc networks to enable transactions that permit users to shop in disaster areas. Specifically, we introduce an endorsement-based mechanism to provide payment guarantees for a customer-to-merchant transaction and a multilevel endorsement (MLE) mechanism with a lightweight scheme based on Bloom filter and Merkle tree to reduce communication overheads. Our mobile payment system achieves secure transaction by adopting various schemes such as location-based mutual monitoring scheme and blind signature, while our newly introduced event chain mechanism prevents double spending attacks. As validated by simulations, the proposed mobile payment system is useful in a disaster area, achieving high transaction completion ratio, 65%-90% for all scenario tested, and is storage-efficient for mobile devices with an overall average of 7 MB merchant message size.
Article
Bitcoin is a popular "cryptocurrency" that records all transactions in an distributed append-only public ledger called "blockchain". The security of Bitcoin heavily relies on the incentive-compatible distributed consensus protocol which is run by participants called "miners". In exchange of the incentive, the miners are expected to honestly maintain the blockchain. Since its launch in 2009, Bitcoin economy has grown at an enormous rate is now worth about 40 billions of dollars. This exponential growth in the market value of Bitcoin motivates adversaries to exploit weaknesses for profit, and researchers to identify vulnerabilities in the system, propose countermeasures, and predict upcoming trends. In this paper, we present a systematic survey on security and privacy aspects of Bitcoin. We start by presenting an overview of the Bitcoin protocol and discuss its major components with their functionality and interactions. We review the existing vulnerabilities in Bitcoin which leads to the execution of various security threats in Bitcoin system. We discuss the feasibility and robustness of the state-of-the-art security solutions. We present privacy and anonymity considerations, and discuss the threats to enabling user privacy along with the analysis of existing privacy preserving solutions. Finally, we summarize the critical open challenges, and suggest directions for future research towards provisioning stringent security and privacy techniques for Bitcoin.