Computer Science ›› 2023, Vol. 50 ›› Issue (11A): 230200115-5.doi: 10.11896/jsjkx.230200115

• Network & Communication • Previous Articles     Next Articles

LN-ERCL Lightning Network Optimization Scheme

SUN Min, XU Senwei, SHAN Tong   

  1. College of Computer and Information Technology,Shanxi University,Taiyuan 030000,China
  • Published:2023-11-09
  • About author:SUN Min,born in 1966,master degree,professor.Her main research interests include computer network and information security.
  • Supported by:
    Shanxi Province Basic Research Program,China(20210302123455,201701D121052).

Abstract: In recent years,blockchain has developed rapidly,and low transaction frequency has become an obstacle to the further development of blockchain.Lightning network,as one of the best solutions to the problem of blockchain transaction frequency,has the advantages of short confirmation time and low cost.However,there are also problems such as low channel capacity,high routing cost and channel congestion.Most of the existing optimization schemes use third-party custody to extend the transaction waiting time,but they cannot solve the channel congestion problem from the root.To solve these problems,this paper proposes a new lightning network optimization scheme.First,set up super nodes in the lightning network,and give super node tokens for mutual channel construction.Users can convert bitcoin into tokens through Ethereum Request for Comment protocol to enter the lightning network.Secondly,the concept of escape value is proposed.The user node chooses to join a super node by calculating the escape value.Finally,the improved landmark algorithm prunes the network channels,improves the network scalability,and solves the channel congestion problem.Simulation results show that this scheme has a good effect on network congestion and long path optimization time when the transaction volume in the lightning network is large.

Key words: Blockchain, Lightning network, Landmark, Off chain transaction, Super node, Privacy protection.

CLC Number: 

  • TP393
[1]LI W,HE M,HAIQUAN S.An Overview of Blockchain Technology:Applications,Challenges and Future Trends[C]//IEEE 11th International Conference on Electronics Information and Emergency Communication(ICEIEC).2021:31-39.
[2]POON J,DRYJA T.The bitcoin lightning network:scalable off-chain lightning network [EB/OL].[2021-06-09].https://lightning.network/lightning-network- paper.pdf.
[3]DECKER C,WATTENHOFER R.A fast and scalable payment network with bitcoin duplex mi-cropayment channels [C]//Symposium on Self-Stabilizing Systems.2015:3-18.
[4]MALAVOLTA G,MORENO-SANCHEZ P,KATE A,et al.Silent whispers:Enforcing security and privacy in decentralized credit networks[C]//IACR Cryptology ePrint Archive 2016.2016:1053-1054.
[5]THAKUR S,BRESLIN J G.Coordinated Landmark-based Routing for Blockchain Offline Channels[C]//2022 Second International Conference on Blockchain Computing and Applications(BCCA).2022:108-114.
[6]STASI G D,AVALLONE S,AL.Routing Payments on theLightning Network[C]//2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications(GreenCom) and IEEE Cyber.2018.
[7]WU J,JIANG S.On Increasing Scalability and Liquidation ofLightning Networks for Blockchains[J].IEEE Transactions on Network Science and Engineering,2022,9(4):2589-2600.
[8]WU J,DAI F.A generic distributed broadcast scheme in ad hoc wireless networks[J].IEEE Transactions on Computers,2004,53(10):1343-1354.
[9]BURCHERT C,DECKER C,WATTENHOFER R.Scalablefunding of bitcoin micropayment channel networks[J].Royal Society Open Science,2018,5(8):180089.
[10]ANGELO M,DSALZER G.Tokens Types and Standards:Identification and Utilization in Ethereum[C]//2020 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS).2020.
[11]TSUCHIYAP F.The landmark hierarchy:A new hierarchy for routing in very large networks[J].ACM SIGCOMM Computer Communication Review,1988,18(4):35-42.
[12]WIKIB.Hash time locked contracts[EB/OL].https://en.bitcoin.it/wiki/Hashed_Timelock_Contracts.
[13]GOLDSCHLAG D M,REED M G,SYVERSON P F.Hidingrouting information[C]//Information Hiding.Berlin,Heidelberg:Springer,1996:137-150.
[14]WOL PERT D H,MACREADY W G.No free lunch theorems for optimization [J].IEEE Transactions on Evolutionary Computation,1997.
[15]JIA L P,PEI Q,WANG X,et al.Survey on Offchain Channel Routing Algorithm[J].Journal of Software,2022,33(1):233-253.
[16]WU J,JIANG S.Local Pooling of Connected Supernodes inLightning Networks for Blockchains[C]//2020 IEEE International Conference on Blockchain(Blockchain).2020:421-427.
[17]CONOSCENTI M,A VETRÒ,MARTIN J.CLoTH:A Lightning Network Simulator[J].Simulation Modelling Practice and Theory,2021,15:100717.
[1] TONG Fei, SHAO Ranran. Study on Blockchain Based Access Control Model for Cloud Data [J]. Computer Science, 2023, 50(9): 16-25.
[2] WANG Junlu, LIU Qiang, ZHANG Ran, JI Wanting, SONG Baoyan. Blockchain-based Dual-branch Structure Expansion Model [J]. Computer Science, 2023, 50(8): 365-371.
[3] HUANG Baohua, PENG Li, ZHAO Weihong, CHEN Ningjiang. Practical Byzantine Consensus Algorithm Based on Verifiable Random Functions [J]. Computer Science, 2023, 50(6A): 220300064-6.
[4] LIN Feilong, YUE Yuedong, ZHENG Jianhui, CHEN Zhongyu, LI Minglu. Blockchain-based Identity Authentication and Authorization Mechanism [J]. Computer Science, 2023, 50(6A): 220700158-9.
[5] PAN Lu, LUO Tao, NIU Xinzheng. Restart and Recovery Algorithm Based on Distributed Cluster Nodes [J]. Computer Science, 2023, 50(6A): 220300205-6.
[6] YANG Jian, WANG Kaixuan. Tripartite Evolutionary Game Analysis of Medical Data Sharing Under Blockchain Architecture [J]. Computer Science, 2023, 50(6A): 221000080-7.
[7] TAN Pengliu, WANG Runshu, ZENG Wenhao, WANG Shikun, ZOU Wenshi. Overview of Blockchain Consensus Algorithms [J]. Computer Science, 2023, 50(6A): 220400200-12.
[8] XIAO Jian, YANG Min. Multi-factor Blockchain Private Key Protection Scheme Based on Secret Sharing [J]. Computer Science, 2023, 50(6): 307-312.
[9] LIU Wei, GUO Lingbei, XIA Yujie, SHE Wei, TIAN Zhao. Raft Consensus Algorithm Based on Credit Evaluation Model [J]. Computer Science, 2023, 50(6): 322-329.
[10] ZHANG Shue, TIAN Chengwei, LI Baogang. Review of Identity Authentication Research Based on Blockchain Technology [J]. Computer Science, 2023, 50(5): 329-347.
[11] LIU Zerun, ZHENG Hong, QIU Junjie. Smart Contract Vulnerability Detection Based on Abstract Syntax Tree Pruning [J]. Computer Science, 2023, 50(4): 317-322.
[12] ZHOU Yuying, MA Miao, SHEN Qiqi, REN Jie, ZHANG Mingrui, YANG Bo. Safe Efficient and Decentralized Model for Mobile Crowdsensing Incentive [J]. Computer Science, 2023, 50(11A): 221000184-10.
[13] CHEN Ruixiang, JIAO Jian, WANG Ruohua. Smart Contract Vulnerability Detection System Based on Ontology Reasoning [J]. Computer Science, 2023, 50(10): 336-342.
[14] ZHANG Yushu, HE Xiaotong, XIAO Xiangli, ZHU Youwen, WANG Liangming. Grouping Storage Optimization Method for Blockchain Ledger Based on Erasure Code [J]. Computer Science, 2023, 50(10): 350-361.
[15] LI Bei, WU Hao, HE Xiaowei, WANG Bin, XU Ergang. Survey of Storage Scalability in Blockchain Systems [J]. Computer Science, 2023, 50(1): 318-333.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!