A consensus-based solution for cryptocurrencies arbitrage bots in intelligent blockchain

Lingyue Zhang , Zongyang Zhang , Tianyu Li , Shancheng Zhang

›› 2025, Vol. 11 ›› Issue (3) : 700 -710.

PDF
›› 2025, Vol. 11 ›› Issue (3) : 700 -710. DOI: 10.1016/j.dcan.2024.09.004
Original article

A consensus-based solution for cryptocurrencies arbitrage bots in intelligent blockchain

Author information +
History +
PDF

Abstract

Intelligent blockchain is an emerging field that integrates Artificial Intelligence (AI) techniques with blockchain networks, with a particular emphasis on improving the performance of blockchain, especially in cryptocurrencies exchanges. Meanwhile, arbitrage bots are widely deployed and increasing in intelligent blockchain. These bots exploit the characteristics of cryptocurrencies exchanges to engage in frontrunning, generating substantial profits at the expense of ordinary users. In this paper, we address this issue by proposing a more efficient asynchronous Byzantine ordered consensus protocol, which can be used to prevent arbitrage bots from changing the order of the transactions for profits in intelligent blockchain-based cryptocurrencies. Specifically, we present two signal asynchronous common subset protocols, the more optimal one with only constant time complexity. We implement both our protocol and the optimal existing solution Chronos with Go language in the same environment. The experiment results indicate that our protocols achieve a threefold improvement over Chronos in consensus latency and nearly a tenfold increase in throughput.

Keywords

Artificial intelligence / Blockchain / Arbitrage bots / Byzantine consensus / Asynchronous network

Cite this article

Download citation ▾
Lingyue Zhang, Zongyang Zhang, Tianyu Li, Shancheng Zhang. A consensus-based solution for cryptocurrencies arbitrage bots in intelligent blockchain. , 2025, 11(3): 700-710 DOI:10.1016/j.dcan.2024.09.004

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

Lingyue Zhang: Writing - review & editing, Writing - original draft, Software, Resources, Methodology, Investigation, Formal analysis, Data curation, Conceptualization. Zongyang Zhang: Writing - review & editing, Validation, Supervision, Formal analysis, Data curation, Conceptualization. Tianyu Li: Software, Resources, Investigation, Data curation. Shancheng Zhang: Writing - review & editing, Resources, Data curation.

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgements

This work is supported by the National Key R&D Program of China under Grant (2022YFB2702702), in part by the National Natural Science Foundation of China under Grants (62372020, 72031001), in part by the Beijing Natural Science Foundation under Grants (L222050), and in part by the Fundamental Research Funds for the Central Universities under Grant (YWF-23-L-1032).

References

[1]

S. Nakamoto,Bitcoin: a peer-to-peer electronic cash system, https://bitcoin.org/bitcoin.pdf, 2008. (Accessed 1 October 2023).

[2]

K. Liu, Z. Yan, X. Liang, R. Kantola, C. Hu, A survey on blockchain-enabled federated learning and its prospects with digital twin, Digit. Commun. Netw. 10 (2) (2024) 248-264.

[3]

H. Kabir, M.-L. Tham, Y.C. Chang, Internet of robotic things for mobile robots: con-cepts, technologies, challenges, applications, and future directions, Digit. Commun. Netw. 9 (6) (2023) 1265-1290.

[4]

P. Daian, S. Goldfeder, T. Kell, Y. Li, X. Zhao, I. Bentov, L. Breidenbach, A. Juels,Flash boys 2.0:frontrunning in decentralized exchanges, miner extractable value, and consensus instability, in:Proceedings of 2020 IEEE Symposium on Security and Privacy, IEEE, 2020, pp. 910-927.

[5]

A. Miller, Y. Xia, K. Croman, E. Shi, D. Song,The honey badger of bft protocols, in:Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2016, pp. 31-42.

[6]

S. Duan, M.K. Reiter, H. Zhang, Beat: asynchronous bft made practical, in: Pro-ceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2018, pp. 2028-2041.

[7]

B. Guo, Z. Lu, Q. Tang, J. Xu, Z. Zhang,Dumbo: faster asynchronous bft protocols,in:Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2020, pp. 803-818.

[8]

Y. Gao, Y. Lu, Z. Lu, Q. Tang, J. Xu, Z. Zhang,Dumbo-ng: fast asynchronous BFT con-sensus with hroughput-oblivious latency,in:Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2022, pp. 1187-1201.

[9]

B. Guo, Y. Lu, Z. Lu, Q. Tang, J. Xu, Z. Zhang,Speeding dumbo: pushing asyn-chronous BFT closer to practice,in:Proceedings of the 29th Annual Network and Distributed System Security Symposium, The Internet Society, 2022.

[10]

H. Zhang, S. Duan,Pace: fully parallelizable bft from reproposable byzantine agree-ment,in:Proceedings of the 2022 ACM SIGSAC Conference on Computer and Com-munications Security, ACM, 2022, pp. 3151-3164.

[11]

H. Zhang, S. Duan, B. Zhao, L. Zhu,Waterbear: practical asynchronous bft matching security guarantees of partially synchronous bft,in:Proceedings of the 32nd USENIX Security Symposium, USENIX, 2023, pp. 5341-5357.

[12]

I. Abraham, D. Malkhi, K. Nayak, L. Ren, M. Yin,Sync hotstuff: simple and practical synchronous state machine replication,in:Proceedings of 2020 IEEE Symposium on Security and Privacy, IEEE, 2020, pp. 106-118.

[13]

Z. Zhang, L. Zhang, Z. Wang, Y. Li, R. Lu, Y. Yu, Chronos: an efficient asynchronous byzantine ordered consensus, Comput. J. 67 (3) (2024) 1153-1162.

[14]

M. Ben-Or, B. Kelmer, T. Rabin,Asynchronous secure computations with optimal resilience (extended abstract),in:Proceedings of the 13th Annual ACM Symposium on Principles of Distributed Computing, ACM, 1994, pp. 183-192.

[15]

M.J. Fischer, N.A. Lynch, M. Paterson, Impossibility of distributed consensus with one faulty process, J. ACM 32 (2) (1985) 374-382.

[16]

G. Bracha, Asynchronous byzantine agreement protocols, Inf. Comput. 75 (2) (1987) 130-143.

[17]

M. Ben-Or,Another advantage of free choice (extended abstract): completely asyn-chronous agreement protocols,in:Proceedings of the 2nd Annual ACM Symposium on Principles of Distributed Computing, ACM, 1983, pp. 27-30.

[18]

M.O. Rabin,Randomized byzantine generals, in:Proceedings of the 24th Annual Symposium on Foundations of Computer Science, IEEE, 1983, pp. 403-409.

[19]

C. Cachin, K. Kursawe, F. Petzold, V. Shoup, Secure and efficient asynchronous broadcast protocols, in: Annual International Cryptology Conference, Springer, 2001, pp. 524-541.

[20]

C. Cachin, J.A. Poritz, Secure intrusion-tolerant replication on the Internet, in: Pro-ceedings of 2002 International Conference on Dependable Systems and Networks, IEEE, 2002, pp. 167-176.

[21]

D. Yakira, A. Asayag, G. Cohen, I. Grayevsky, M. Leshkowitz, O. Rottenstreich, R. Tamari, Helix: a fair blockchain consensus protocol resistant to ordering manipula-tion, IEEE Trans. Netw. Serv. Manag. 18 (2) (2021) 1584-1597.

[22]

C. Liu, S. Duan, H. Zhang,Epic: efficient asynchronous bft with adaptive security,in:Proceedings of 2020 International Conference on Dependable Systems and Networks, IEEE, 2020, pp. 437-451.

[23]

L. Yang, S.J. Park, M. Alizadeh, S. Kannan, D. Tse,Dispersedledger: high-throughput byzantine consensus on variable bandwidth networks,in:Proceedings of 19th USENIX Symposium on Networked Systems Design and Implementation, USENIX, 2022, pp. 493-512.

[24]

M. Kelkar, F. Zhang, S. Goldfeder, A. Juels, Order-fairness for byzantine consensus, in: Annual International Cryptology Conference, Springer, 2020, pp. 451-480.

[25]

M. Kelkar, S. Deb, S. Kannan,Order-fair consensus in the permissionless setting, in:Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop, ACM, 2022, pp. 3-14.

[26]

Y. Zhang, S. Setty, Q. Chen, L. Zhou, L. Alvisi,Byzantine ordered consensus with-out byzantine oligarchy, in:Proceedings of 14th USENIX Symposium on Operating Systems Design and Implementation, USENIX, 2020, pp. 633-649.

[27]

C. Stathakopoulou, S. Rusch, M. Brandenburger, M. Vukolic,Adding fairness to or-der: preventing front-running attacks in bft protocols using tees,in:Proceedings of the 40th International Symposium on Reliable Distributed Systems, IEEE, 2021, pp. 34-45.

[28]

H. Zhang, L. Merino, V. Estrada-Galiñanes, B. Ford,Flash freezing flash boys: coun-tering blockchain front-running,in:Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, IEEE, 2022, pp. 90-95.

[29]

T. Niedermayer, P. Saggese, B. Haslhofer,Detecting financial bots on the Ethereum blockchain, in:Companion Proceedings of the ACM on Web Conference 2024, ACM, 2024, pp. 1742-1751.

[30]

C. Cachin, K. Kursawe, V. Shoup, Random oracles in constantinople: practical asynchronous byzantine agreement using cryptography, J. Cryptol. 18 (3) (2005) 219-246.

[31]

I. Abraham, D. Malkhi, A. Spiegelman,Asymptotically optimal validated asyn-chronous byzantine agreement, in:Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, ACM, 2019, pp. 337-346.

[32]

L. Lamport, Time, clocks, and the ordering of events in a distributed system, in: D. Malkhi (Ed.), Concurrency: the Works of Leslie Lamport, ACM, 2019, pp. 179-196.

[33]

S. Das, Z. Xiang, L. Ren,Asynchronous data dissemination and its applications, in:Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2021, pp. 2705-2721.

[34]

G. Bracha,An asynchronous (𝑛 - 1)∕3-resilient consensus protocol,in:Proceedings of the 3rd Annual ACM Symposium on Principles of Distributed Computing, ACM, 1984, pp. 154-162.

[35]

I.S. Reed, G. Solomon, Polynomial codes over certain finite fields, J. Soc. Ind. Appl. Math. 8 (2) (1960) 300-304.

AI Summary AI Mindmap
PDF

411

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/