Search details

Secure routing method using control nodes for small medium lightning network


As all transactions in Blockchain technology must be confirmed by every Full node in the Blockchain network, the spread of Blockchain technology has been quite gradual. The Lightning network second layer on top of the Blockchain is a solution to solve this problem by using Iight nodes only, which poses various security problems. In this dissertation we proposed a method that controls nodes based on flow table ID routing that has a more secure routing mechanism than simply light nodes without Bitcoin full nodes. As nodes in P2P networks are constantly joining and leaving, the network security and scalability are always being tested. With our method, the Control node flow table, we use a strategy that makes use of route packet information by creating a table of ID addresses. We determine the accuracy of our approach flow measurements, based on the findings, it was determined that an ID table may be used to regulate communication between nodes, making the system more scalable, safe, and independent of the availability of all nodes. The suggested model is a distributed architecture built on top of the Flow table ID routing protocol technology, which offers a cheap, safe, smart, and easy method for building any kind of computer network. Blockchains, like the one used by Bitcoin, allow for instantaneous, peer-to-peer transactions between users worldwide, by passing the need for a centralised banking system. At present, however, Blockchain systems have a very slow transaction throughput and long delays. The Bitcoin network, for example, can only handle approximately seven transactions per second. Off-chain transactions via payment channels are proposed by Blockchain second-layer solutions to address this security issue. The Blockchain full node network is only needed at the start and finish of a node channel. If not, business deals may be closed between pairs of users quickly without utilising the Blockchain network. The Lightning Network is an approach for establishing a payment channel that functions as an overlay network. It is built on the Blockchain and handles the routing of user payments. As it stands, the Lightning network employs source routing to move money from one location to another. It is important to note that source routing is not suitable for use in very large networks. In this thesis, we define a Control node and routing algorithm based on flow table ID that is needed in the Lightning Network. Then, we examine the underlying principles of certain common generic node routing methods, figure out what is needed and where there are node limitations. In addition, we develop a routing algorithm for the Lightning Network that improves upon the foundation laid by prior research. In the realm of computers, we provide control nodes specifically designed to secure the network services for communication transaction, and error reporting with little intrusion on personal privacy. Our method is then put into practice in current development of the Lightning Network codebase. We compare it against pre-existing solutions and assess it based on security performance for small to medium sized networks.