Investigating and Analyzing Bitcoin Blockchain Protocol using Wireshark

Full Text (PDF, 1295KB), PP.36-43

Views: 0 Downloads: 0

Author(s)

Auqib Hamid Lone 1,* Roohie Naaz Mir 1

1. Department of Computer Science and Engineering, NIT Srinagar, Jammu and Kashmir, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2018.07.04

Received: 1 Mar. 2018 / Revised: 25 Apr. 2018 / Accepted: 7 Jun. 2018 / Published: 8 Jul. 2018

Index Terms

Bitcoin, Blockchain, Wireshark

Abstract

A bitcoin node needs to download the full block contents of the entire blockchain, before actually being able to send and receive transactions on bitcoin broadcast network, except simple payment verification clients which require only block headers and bloom filters to sync with others peers available on the network. Transactions/Blocks pass through a complex process at sender and receiver than it apparently looks to be. During transmission transactions/blocks are broken down into smaller chunks of data so that they can be carried on the wire. These chunks are given appropriate headers, encapsulated and then passed through several layers to reach the destination. In this paper we captured Bitcoin packets using Wireshark and deeply investigated and analyzed them. We investigated how bitcoin transaction/block messages work and what values and parameters are considered during this whole process.

Cite This Paper

Auqib Hamid Lone, Roohie Naaz Mir, "Investigating and Analyzing Bitcoin Blockchain Protocol using Wireshark", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.7, pp.36-43, 2018. DOI:10.5815/ijcnis.2018.07.04

Reference

[1]S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.
[2]K.. A and J.. J. S, "Recent Replica Placement Algorithms in P2P Networks – A Review", International Journal of Computer Network and Information Security, vol. 5, no. 5, pp. 55-63, 2013.
[3]N. Koblitz, "Elliptic Curve Cryptosystems", Mathematics of Computation, vol. 48, no. 177, p. 203, 1987.
[4]S. V, H. Shanavas.I, N. V and B. M, "Hardware Implementation of Elliptic Curve Cryptography over Binary Field", International Journal of Computer Network and Information Security, vol. 4, no. 2, pp. 1-7, 2012.
[5]“Protocol documentation.” [Online]. Available: https://en.bitcoin.it/wiki/Protocol_documentation
[6]V. Buterin, “Ethereum: A next-generation smart contract and decentralized application platform,” https://github.com/ethereum/wiki/wiki/White-Paper, 2013.
[7]G. Wood, “Ethereum: a secure decentralised generalised transaction ledger,” http://gavwood.com/paper.pdf, 2014.
[8]“Testnet.” [Online]. Available: https://en.bitcoin.it/wiki/Testnet
[9]“the wireshark wiki.” [Online]. Available: https://wiki.wireshark.org/
[10]A. Turner and A. Irwin, "Bitcoin transactions: a digital discovery of illicit activity on the blockchain", Journal of Financial Crime, vol. 25, no. 1, pp. 109-130, 2018.
[11]“Tp’s testnet faucet.” [Online]. Available: http://tpfaucet.appspot.com/
[12]“Wireshark display filter.” [Online]. Available: https://www.wireshark.org/docs/dfref/b/bitcoin.html