<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Distributed Ledger Technology Workshop, May</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Semi-Hierarchical Payment Channel Networks⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Marco Benedetti</string-name>
          <email>marco.benedetti@bancaditalia.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco De Sclavis</string-name>
          <email>francesco.desclavis@bancaditalia.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giuseppe Galano</string-name>
          <email>giuseppe.galano2@bancaditalia.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sara Giammusso</string-name>
          <email>sara.giammusso@bancaditalia.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonio Muci</string-name>
          <email>antonio.muci@bancaditalia.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Matteo Nardelli</string-name>
          <email>matteo.nardelli@bancaditalia.it</email>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>1</volume>
      <fpage>4</fpage>
      <lpage>15</lpage>
      <abstract>
        <p>Assessing the scalability of a payment channel network is crucial as it directly impacts the eficiency and user experience of blockchain-based payment systems used in high volumes transaction environments, such as Central Bank Digital Currencies (CBDCs). In this work, we present an analysis of the interaction between a Layer-2 Semi-Hierarchical Payment Channel Networks (SH-PCNs) and its Layer-1 blockchain technology. In particular, we focus on how blockchain features, such as latency, throughput and congestion, afect the payment success rate within a SH-PCN, in a scenario in which routing nodes try to keep the state of their channels balanced by exchanging of-ledger and on-ledger liquidity, a technique known as submarine swaps. We use a Parallel Discrete Event Simulator (PDES) for SH-PCNs, in which we incorporate a blockchain component to simulate the dynamics of a limited block size and non negligible block time. We simulate various scenarios, defined by: the total amount of liquidity locked in the channels, constant and variable payment load, blockchain congestion conditions and channel rebalancing strategies adopted by nodes. The experiments reveal how blockchain parameters like congestion rate significantly influence PCN performance metrics such as payment success rate. We conclude that, when designing a PCN for scalability, it's important to take into account that Layer-1 characteristics afect the optimal allocation of liquidity that is needed to match the target performances.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The groundbreaking introduction of blockchains to support the exchange of crypto-assets has also
generated a huge hype regarding its adoption for supporting world-wide eficient retail payments and,
as such, for the design of Central Bank Digital Currencies (CBDCs). Today, retail instant payment
systems manage a very high load of transactions, in the order of 104–105 transactions per second (e.g., [1,
Sect. IV-A]), to be settled within 10 seconds [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Besides performance, CBDCs may also include further
business and technical requirements, such as privacy guarantees, small or no fees for citizens, a cap on
the amount of liquidity users can amass, and the possibility to be usable by unbanked people.
      </p>
      <p>
        In our previous works [
        <xref ref-type="bibr" rid="ref1 ref3 ref4">1, 3, 4</xref>
        ], we started to investigate whether a blockchain can be an appropriate
technological choice to implement a (hyphotetical) CBDC. As expected, ingesting and settling a realistic
transaction load in a timely manner is challenging, especially in a fully decentralized system that
uses a blockchain to store its global state. Therefore, in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], we embraced the of-ledger paradigm,
whereby scalability is achieved by an additional payment channel network (PCN), a second layer built
on top of the actual blockchain [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. It results a two-layered system where the first (wholesale) layer,
i.e., the blockchain, exhibits high integrity, availability, fault-tolerance, and verifiability of monetary
exchanges; and the second (retail) layer, i.e., the PCN, accommodates fast-payments, cash-like levels of
privacy, and handles wallet caps. To sustain the payment load and map technical PCN roles with the
business roles of the 3-tier banking system of the current monetary system [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], we explored a family of
⋆All views are those of the authors and do not necessarily reflect the position of Bank of Italy.
      </p>
      <p>CEUR
Workshop
Proceedings</p>
      <p>
        ceur-ws.org
ISSN1613-0073
PCNs with a partially constrained topology, called “Semi-Hierarchical Payment Channel Networks”
(SHPCNs)—see Sect. 2.2. Besides opening and closing channels, PCNs send transactions to the underlying
blockchain every time the channel should be reconfigured, e.g., to balance its capacity (see Sect. 2.3).
Therefore, some operations in the PCN need to wait for the transaction confirmation on the blockchain
before completing. In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], we conducted our analysis on PCNs with a strong—yet commonly adopted
(e.g., [
        <xref ref-type="bibr" rid="ref10 ref7 ref8 ref9">7, 8, 9, 10</xref>
        ])—simplifying assumption on the interaction between the first and second layer: i.e.,
we assumed that each on-ledger request from the PCN would be satisfied with a constant delay by the
blockchain. We all know that in real life, things turn out very diferent.
      </p>
      <p>
        Several approaches assume that on-chain transactions can be satisfied (i.e., included in a block) after
a constant, predictable delay equal to the block time of the blockchain (e.g., [
        <xref ref-type="bibr" rid="ref10 ref7 ref8 ref9">9, 7, 8, 10</xref>
        ]). To the best
of our knowledge, so far, there is no tool for investigating how diferent working conditions of the
blockchain influence performance of second layer systems, such as a PCN.
      </p>
      <p>
        In this paper, we investigate the interaction between blockchain and PCNs, by specifically focusing
on its impact on the payment success rate, i.e., the probability that a payment is successfully forwarded
from the sender to the recipient in the network. To extensively evaluate such a subtle but pivotal
interaction, we resort to simulations. In particular, we extend the itCoin PCN simulator1, our Parallel
Discrete Event Simulator (PDES) [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], to introduce a model of the blockchain and of its interaction
with the PCN. Basically, our PDES is a porting of CLoTH [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], an open-source sequential simulator of a
Lightning Network (LN) implementation2 widely used in recent works (e.g., [
        <xref ref-type="bibr" rid="ref13 ref14 ref15">13, 14, 15</xref>
        ]), on ROSS [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
The resulting simulator represents a valuable tool to gain interesting insightful regarding the impact of
layer 1 on layer 2, where we can readily see the efect of blockchain working conditions (e.g., congestion)
on performance achievable of-ledger by the PCN. The key contributions of this paper are as follows.
• We present a model of the blockchain suited to explicitly represent its interaction with a layer-2
PCN (Sect. 3). Driven by the use case needs, we consider the blockchain as a single entity of the
system that stores incoming transactions and periodically feeds them in a new block. Diferent
representations, serving diferent purposes, can be easily taken into account;
• We run an extensive set of experiments, aiming to investigate how the blockchain impacts
performance of the PCN in terms of channel rebalancing, locked liquidity in channels, and
payment success rate, when diferent blockchain parameters change, e.g., its congestion rate
(Sect. 4).
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <sec id="sec-2-1">
        <title>2.1. Permissioned Blockchain for Central Bank Digital Currency</title>
        <p>
          In [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] we consider a Bitcoin-like permissioned blockchain for a CBDC, where a set of known miners
validates transactions to be added to the blockchain. Each miner is operated by one member of
a federation of independent, geographically distributed, trusted actors3, that are called validators.
Validators run a Byzantine fault tolerant consensus protocol and collectively publish a new valid block
every target block time, which in our examples is set to one minute. As in most approaches that
require geographically distributed Byzantine consensus among a dozen of nodes, also the blockchain
we consider sufers from scalability issues. Therefore, in [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], we explore the possibility to exploit
Layer-2 solutions to safely exchange instant payments of-ledgers, and in particular a specific topology
of PCN [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ], that we call Semi-Hierarchical PCNs, or SH-PCN for short.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Semi-Hierarchical Topologies in Payment Channel Networks</title>
        <p>In a PCN, two nodes create a bilateral payment channel by locking some amount of liquidity, called
channel capacity, into a 2-of-2 multisig UTXO, using a single on-chain funding transaction. The sum of
1The source-code of the simulator is available at https://github.com/bancaditalia/itcoin-pcn-simulator
2https://github.com/lightningnetwork/lnd
3We target settings where the number of trusted actors is expected to be between 4 and ≈ 20.
Tier
1 RSP, MH
3 110068 // 110035  c1 m1c2 c3 m2 c4 (PFioxleicdytdoepcoilsoigoyn) (PFoixleicdycdaepcaisciiotyn)
Figure 1: Main features of a SH-PCN, plus three sample payment routes: One Point-of-Sale payment from retail
user  4 (a citizen) to merchant  2; one Peer-to-Peer transaction from  2 to  3; one eCommerce route from  1 to a
foreign merchant  1.
nodes’ balance in the channel can never exceed the payment channel capacity.</p>
        <p>
          After the channel is created (i.e., the funding transaction is confirmed), the nodes can exchange
multiple, instant, of-chain payments, which update the balances of nodes and eliminate the need to
constantly execute on-chain transactions. The safety of payments within the channel is ensured through
the pre-funding and a cryptographic mechanism, called channel revocation. If a cheating attempt by one
party is detected, the other is entitled to claim the entire channel capacity. A comprehensive description
of PCNs can be found in [
          <xref ref-type="bibr" rid="ref17 ref5">5, 17</xref>
          ].
        </p>
        <p>
          The most popular PCN implementation, i.e., the Lightning Network (LN), does not constraints how
PCN node should open channels with one another. Therefore, diferent network topologies can be
build or can emerge, ranging from star-like to scale-free (as appears to be the LN, e.g., [
          <xref ref-type="bibr" rid="ref18 ref19">18, 19</xref>
          ]). Each
topology is characterized by its peculiarities in terms of eficiency, fault-tolerance, security, and privacy
(e.g., [
          <xref ref-type="bibr" rid="ref18 ref20">18, 20</xref>
          ]). In [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], we investigate a special family of PCNs, named Semi-Hierarchical PCN (SH-PCN,
for short), and analyze how such a network topology can sustain a real payment trafic.
        </p>
        <p>
          To understand the rationale behind a SH-PCN, we briefly introduce the business roles of a monetary
system that we imagine to be mapped on diferent technical roles in the PCN. The current monetary
system—which is the target deployment environment for our solution—is based on a 3-tier banking
system [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], where: the CB is at the top; a set of authorized intermediaries (e.g., commercial banks)
are in the middle; retail users (e.g., citizens and merchants) are at the bottom. Fig. 1 represents how
these (business) roles are mapped onto diferent (technical) roles in the SH-PCN, i.e., monetary hubs,
lightning service providers, custodian services, and end users. The hierarchical anatomy of the banking
system is reflected in the (semi) hierarchical topology of the network. In a nutshell, these technical
roles are the following.
        </p>
        <p>• Monetary Hubs (MHs) operate nodes with considerable liquidity, which are largely/fully
interconnected. They are managed by a Central Bank (CB) or a set of CBs.
• Lightning Service Providers (LSPs) freely open channels towards each other, forming a “small
world”-like network. They are managed by authorized intermediaries, and ofer service to EUs
by opening channels with them.
• In addition to of-chain liquidity, EUs can own one or more accounts at Custodian Services
(CSs), e.g., banks or exchange. CSs are connected to the LSP network. The monetary interactions
between EUs and CSs happen out-of-band and via LSPs.
• End-Users (EUs) access the network connecting to one or more LSPs. EUs only open channels
with authorized LSP(s).</p>
        <p>
          Our SH-PCN is a composition of various graph models, each representing the connections (i) between
diferent categories of nodes, and (ii) within the same tier:
1. MHs are interconnected in a clique (each channel has capacity of €500 million), and guarantee
network connectivity;
2. Links between MHs and LSPs are generated by dividing the LSPs into one subset per MH. Then, a
channel is established from each MH to every LSP in its subset. The subset sizes are log-normally
distributed ( = 0 and  = 1 ); a range of channel capacities for this subnetwork is explored in the
experiements.
3. Links between LSPs are modeled using a Watts-Strogatz graph [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] ( = 4 and  = 0.1 ); also in
this subnetwork, experiments explore various channel capacities.
4. Channels between LSPs and EUs are modeled just like in (3), albeit with fixed capacities, which
represent the cap on users’ wallets (€3000). Channels linking LSPs with merchants vary based on
the merchant’s size: small (S), medium (M), and large (L) merchants are assigned capacities of
€5k, €50k, and €500k, respectively.
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Channel Rebalancing Techniques in the SH-PCN</title>
        <p>
          Forwarding a payment updates the channel balance, as the payments requires one end to give funds
to the other end of the channel. Therefore, the performance of SH-PCNs subject to a load degrades
over time: Channels become more and more unbalanced, thus preventing them to participate in the
routing of an increasing percentage of payments. Rebalancing techniques improve channel lifetimes
while minimizing locked liquidity (e.g., [
          <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
          ]). In [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], we describe three rebalancing techniques: an
on-chain solution, i.e., submarine swap, and two of-chain solutions, i.e., waterfall and reverse waterfall.
        </p>
        <p>Submarine swaps between LSP/MH nodes. A submarine swap is an exchange of a given amount
of some on-chain asset with the same amount of the of-chain form of the same asset. Hash Time
Locked Contract (HTLCs) guarantee the atomicity of the transaction. Since submarine swaps involve
on-chain transfer, they take time (at least the confirmation time of the HTLC) and possibly require a
fee. Importantly, the transactional capacity of the blockchain limits the number of submarine swaps
per unit of time that can be perform in a PCN. This is the focus of this paper, where we investigate the
impact of the layer-1 blockchain on layer-2 PCN.</p>
        <p>
          Waterfall rebalance. The waterfall [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ] mechanism allows end-users—in particular those having
high inbound trafic (e.g., merchants)—to always be able to get paid, even if the amount  to be received
raises the user balance  above the channel capacity  (wallet cap). This is achieved by automatically
depositing the amount  = max ( +  − ,   ), where   is the minimum amount the user is willing
to deposit, to a linked CS account. When the LSP receives a payment to forward but the end user’s
channel does not have enough outbound liquidity, the LSP notifies the user about the incoming payment,
and delays the payment forwarding until the expiration of a timeout. The user requests a real-time
deposit to their CS, and sends the deposit via the same LSP, thus rebalancing the channel. If the channel
is successfully rebalanced within the timeout, the LSP forwards the payment to the user; otherwise, the
payment fails.
        </p>
        <p>Reverse waterfall rebalance. This functionality allows retail users—in particular those having high
outbound trafic (e.g., citizens)—to automatically fund a payment channel before making transactions
too large for its current state. If there are insuficient funds in the channel to cover the amount  ,
users could request a withdrawal, thus taking out some money from their CS account. The withdrawal
amount is  = max (  − ,  − ) , where   represents a minimum amount the user is willing to
keep in its wallet for future use. Once the withdrawal has transferred liquidity from the linked CS to
the channel, the user can send the payment.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Simulating Blockchain and its PCN</title>
      <sec id="sec-3-1">
        <title>3.1. PCN Simulator Architecture</title>
        <p>
          In [
          <xref ref-type="bibr" rid="ref1 ref11">1, 11</xref>
          ], we described a parallel PCN simulator architecture that we used to analyze the performance
of PCNs in the context of CBDCs. The simulator extends CloTH [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], an open source sequential discrete
event simulator for PCNs that implements source-based path finding and the mechanism of HTLC.
We rebuilt CLoTH on ROSS [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ], a general purpose framework for parallel discrete event simulations
that facilitates the simulation of large-scale networks using multiprocessing and a distributed memory
architecture. We presented simulation results regarding payment success rate, payment completion time,
and liquidity costs in diferent generated SH-PCN topologies (see Fig. 1), which mimic a hypothetical
CBDC implemented within a three-tier banking system. In our simulations, the payment load is
independently generated by each EU, and is designed in a way that globally it achieves an emerging
network behavior that follows real-world payment statistics [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]. A detailed description of the
PCNrelated part of the simulator can be found in [
          <xref ref-type="bibr" rid="ref1 ref24">1, 24</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Extending the PCN Simulator with a Blockchain Component</title>
        <p>A missing piece in the previously described parallel simulator architecture is the detailed analysis of the
interaction between the PCN (as a second-layer solution) and its underlying layer-1 blockchain. Indeed,
in several scenarios users interact with the underlying blockchain through on-chain transactions, in
order to ensure liquidity or security of payment channels. These include: (i) opening of channels, in
which the channel capacity gets locked; (ii) closing of channels, that distributes the locked funds to the
parties according to the final state of their of-chain transactions; (iii) channel splicing, an advanced
feature that allows users to adjust the amounts of funds locked in a payment channel without closing it;
(iv) dispute resolutions, in case there is a disagreement between parties about the state of the channel;
(v) settlement of HTLCs, that are primarily of-chain interactions but may lead to on-chain transactions
in cases when one party is unreachable and does not cooperate to the HTLC consolidation; and (vi)
submarine swaps, that enable users to transfer funds between on-chain and of-chain wallets without
closing existing channels.</p>
        <p>Specifically, the impact that block time and block size limitations can have on the simulation results
is a crucial aspect that warrants further exploration. These two parameters have a direct impact on
transaction latency and on the overall blockchain throughput. The former (transaction latency) refers
to the time taken for a transaction to be confirmed and added to the blockchain and can significantly
influence the payment success rate and liquidity eficiency of PCNs. The latter (blockchain throughput)
refers to the number of transactions processed per unit of time and may become a bottleneck especially
when multiple channel actions need to be performed simultaneously. This limitation can lead to
increased transaction fees and delayed channel operations, thereby afecting the PCN’s ability to handle
high volumes of transactions eficiently.</p>
        <p>For these reasons, we introduce a lightweight model of the blockchain, in which we abstract away
all details related to its network, consensus, and application protocol. In particular, we focus on the
ability of the blockchain to receive transactions, collect them in a transaction pool (mempool), and
periodically publish a new block. We model the blockchain as a single process that manages the chain
data structures and mempool. The chain represents the sequence of all confirmed blocks, whereas the
mempool includes transactions waiting to be included in a block. The blockchain process creates a
new block every block time, that is a simulation parameter we set equal to 1 minute in Sect. 4. The
blockchain throughput is controlled by two parameters, called block size and congestion rate,
representing respectively the number of transactions that can be included in a block and the percentage
of the block size that cannot be used during the simulation. We introduce the congestion rate in
order to account for on-chain transactions that are not in the scope of the simulation. We consider that
the simulation can use 1 - congestion rate of the blockchain space, as we consider the remaining size
of the block to be filled by other blockchain transactions (e.g., wholesale on-chain payments).</p>
        <p>Algorithm 1 reports the pseudo-code of the blockchain process. The blockchain process reacts in
response to two simulation events: BC_TX_BROADCAST notifies that a new transaction has been submitted
to the blockchain, BC_TICK event sets the blockchain timing and ensures that a new block is added to
the chain when expected. A new BC_TICK event is triggered according to an exponential distribution
having block time as mean. In the simulation of the blockchain component, we made two simplifying
assumptions. First, on-chain transactions and blocks are received by the blockchain miner and PCN
nodes respectively after a (small) network delay, and no delays are introduced by gossiping algorithms
for information dissemination. We extract network latencies from a gamma distribution Γ(6.4, 4.35)</p>
        <sec id="sec-3-2-1">
          <title>Algorithm 1 Blockchain Process</title>
          <p>Require: MEMPOOL → []
Require: BC → []
upon event BC_TX_BROADCAST do
tx ← received transaction
if tx is valid then</p>
          <p>Add tx to MEMPOOL
end if
upon event BC_TICK do</p>
          <p>B → []
while B is not full and MEMPOOL is not empty do</p>
          <p>Get tx from MEMPOOL</p>
          <p>Add tx to B
end while
Add B to BC
Notify sender and receiver of all txs in B
Trigger new BC_TICK event according to exp(block time)
▷ Blockchain
▷ New transaction tx received
▷ Time to forge a new block
▷ New block
estimated on the average daily AWS network latencies4 among European regions. Second, the mempool
is a first-in-first-out (FIFO) queue, and the sooner the blockchain receives a transaction, the sooner it
will be included in a block. We do not implement fee estimations when sending transactions and a
transaction selection algorithm based on fees when selecting transactions from the mempool.</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Submarine Swaps in a Constrained Layer1 Environment</title>
        <p>As described in Sect. 2.3, we implement three channel rebalancing channels: i.e., submarine swaps,
waterfall rebalance, and reverse waterfall rebalance. Only the first one requires on-chain transactions,
since the others can be performed entirely in the of-chain layer (i.e., in the PCN). In this section, we
briefly describe the simulation of submarine swaps in an environment with a blockchain having limited
throughput and high latency.</p>
        <p>A submarine swap is initiated by either an LSP or an RSP in response to a FORWARD PAYMENT event
when a payment about to be forwarded would result in the channel balance exceeding a predefined
unbalancedness threshold; When a node prepares to forward a payment, it checks the unbalancedness
of the incoming channel. The incoming channel would result in having an increase in the local balance
of the node if the payment is successfully forwarded. The unbalanceness of the incoming channel
is defined as the ratio between the local balance and the channel capacity: an unbalancedness
greater than 0.5 means that the channel liquidity is more concentrated on the side of the local node,
and the upcoming payment is going to make things even more unbalanced. If the unbalancedness
exceeds the Submarine Swaps Threshold (or simply Swap Threshold), the node attempts to initiate
a submarine swap for the incoming channel. The happy path process is the following: (i) the node
sends a SWAP_REQUEST to the channel counterparty; (ii) the counterparty initiates the swap sending a
PREPARE_HTLC transaction to the blockchain; (iii) once the prepare transaction is confirmed, the node
sends a submarine of-ledger payment to the counterparty, via the channel that parties aim at balancing;
when the submarine payment is completed, the unbalancedness of the channel is reduced; and (iv)
upon receipt of the submarine payment, the node learns the secret preimage used by the counterparty
to lock the funds on the blockchain and can broadcast the CLAIM_HTLC transaction to the blockchain.
Algorithm 2 summarizes how a submarine swap is simulated.</p>
        <p>In the simulation of the submarine swap component we made two simplifying assumptions. First, a
node receiving a swap request always accepts the swap and forwards the prepare HTLC transaction.
4Source: https://www.cloudping.co</p>
        <sec id="sec-3-3-1">
          <title>Algorithm 2 Submarine Swap simulation algorithm</title>
          <p>Require: Swap Threshold&gt;0.5
upon event Forward Payment do
if Incoming Channel Unbalancedness ≥ Swap Threshold then</p>
          <p>Forward Submarine Swap Request
end if
upon event Swap Request do</p>
          <p>Broadcast Prepare HTLC
upon event Blockchain Transaction tx Received do
if tx is of type Prepare HTLC then</p>
          <p>Send submarine payment
else if tx is of type Claim HTLC then</p>
          <p>Delete swap
end if
upon event Receive Payment Success do</p>
          <p>Broadcast Claim HTLC
Second, we do not handle submarine swap timeouts.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Evaluation</title>
      <p>
        We generate and simulate 10 random SH-PCNs whose size is proportional to 4 countries—France,
Germany, Italy, and Spain—with 4 MHs, 40 LSPs, and 404k EUs (400k customers, 4k merchants). We
consider a block time of 1 minute [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and we scale down the block size proportionally to the number
of users, resulting in 4 transactions per block. For each SH-PCN, we simulate a stream of payments for
24 hours of simulated time. In the following, we present and analyze the mean and standard deviation
of the simulation results.
      </p>
      <p>We present three main sets of experiments. First, we analyze the impact of the rebalancing policy on
the payment success rate in a setting of constant payment generation rate. Second, we investigate what
happens when the payment generation rate changes over time. Finally, we investigate the impact of
blockchain congestion on the performance of the PCN.</p>
      <sec id="sec-4-1">
        <title>4.1. Efect of Rebalancing Strategies on Payments</title>
        <p>As detailed in Sect. 3, performing submarine swaps involves on-chain transactions and diferent policies
can be devised to trigger such an operation. Note that performing submarine swaps too soon leads to
a higher volume of locked liquidity for the same payment success rate; conversely, performing them
too late would results in a reduced payment success rate—as it increases the probability of having an
unbalanced channel that is not ready to forward a payment.</p>
        <p>In this section, we evaluate the efect of the threshold-based policy to trigger swaps presented
in Sect. 3.3. We consider a constant global load of 2 payments per second and a fixed blockchain
congestion rate equal to 50%, i.e., PCN-related transactions can occupy up to 50% of the block size.
The congestion rate accounts for on-chain transactions that are not in the scope of the simulation.
Fig. 2 reports the payment success rate and the number of submarine swaps per minutes as the policy
threshold changes; we evaluate also the efect of diferent total network liquidity configurations, i.e.,
the liquidity locked in all MH-LSP and LSP-LSP channels of the network5. First of all, we observe
a general trend whereby higher network liquidity results in higher payment success rate; this is a
rather straightforward result as higher channel capacity ensures their ability to forward payments.
Moreover, when a higher liquidity is locked, the PCN overall performs a sensibly lower number of
5We configure the network so that MH-LSP channels lock twice the liquidity of LSP-LSP channels.
100%
s
ce ) 99%
s
c R
Su S</p>
        <p>P
t ( 98%
en te
ym aR
aP 97%</p>
        <p>Network Liquidity (€)</p>
        <p>
          PSR SPM
800k
1.6M
4M
submarine swaps. This depends also on the stream of payments we are considering: although they
cover 24 hours, they do not move enough balance to trigger channel replenishing operations (i.e.,
submarine swaps). Three further observations can be made. First, submarine swaps enables the PCN
to sustain continuous payments while keeping a high payment success rate. Independently from the
amount of locked liquidity, Fig. 2 shows that at least a swap every 15-20 minutes must be performed
to obtain 100% of success rate even with 4M of network liquidity. Second, the threshold-based policy
help prevent the no-balance available errors in payment forwarding. Specifically, we can see that when
the swap threshold increases up to 90%, the payment success rate increases (with network liquidity
of 800k) or stays fixed to 100% (with liquidity greater or equal to 1.6M). Interestingly, higher values
of the threshold result in a lower payment success rate: this is due to dynamics of the system where
performing a swaps takes much more time than the payment time-out (set to 10 s to let us consider
the payment as “instant” [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]). Third, low values of the threshold reduce the payment success rate,
e.g., see the success rate with swap threshold equal to 60% and network liquidity equal to 1.6M. This
sounds counter-intuitive, although we can observe that lower values of the threshold increase the
number of on-chain transactions that more quickly fill the blockchain mempool. Such a high volume of
requests delays swap requests, which cannot terminate in time to prevent insuficient funds errors in
the payment forwarding.
        </p>
        <p>Fig. 3 summarize results from a second set of experiments, where we change the payment load over</p>
        <p>100%
s
s
e
cc 98%
tnSu tea95%
e R
aym 92%
P
100%
time (as depicted in the upper part of the figure). By comparing Fig. 3a and Fig. 3b, we readily see that
increased network liquidity requires fewer swaps (as seen before). When liquidity is 800k, even with
a 90% of swap threshold, the payment success rate decreases as soon as the overall rate of payments
starts to increase. Lower thresholds worsen performance. The situation is sensibly better with 1.6M of
network liquidity. When the threshold is 90% or 80% the network can withstand up to 300 transactions
per minute with basically no impact on the payment success rate. Note that when the threshold is 60%,
the variability of performance is high indicating that the system is not able of correctly managing the
load; observe how the success rate decreases even when the payment rate is constant in the left-hand
side of Fig. 3b.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Efect of Blockchain Congestion on PCN Performances</title>
        <p>In the previous section, we showed how the PCN performance depends on the blockchain: rebalancing
a channel on-chain imposes long waiting times that can also result in payment failures. In this set of
experiments, we investigate the impact of diferent blockchain congestion ratio on PCN performance.
In particular, we fix the global load at 2 transactions per second and the swap threshold to 80%, and
we analyze the efect of diferent congestion rate of the blockchain on payment success rate. Fig. 4
summarizes results. We observe that, as expected, higher blockchain congestion prevents the PCN to
timely perform submarine swaps, which can be included in a block after some block time. As also
previously discussed, higher network liquidity requires fewer swaps; hence, the payment success rate
stays high even with high blockchain congestion. With 1.6M of network liquidity, the PCN can tolerate
up to a blockchain congestion of 60-70% before a noticeable decrement in the payment success rate.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Related Work</title>
      <sec id="sec-5-1">
        <title>5.1. Lifespan of Payment Channels</title>
        <p>
          Although PCNs represent an interesting approach to improve scalability of blockchains, they are not free
of drawbacks. As also shown in Sect. 4, channels get unbalanced while forwarding payments. Shabgahi
et al. [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] propose a model to predict the expected time for a channel to get unbalanced, considering its
centrality and its initial balance. Basically, two main approaches emerged to replenish channels and
extend their lifespan, namely via on-chain transactions or via in-place rebalancing (e.g., by introducing
ad-hoc routing strategies). Approaches that resort to on-chain transactions (e.g., [
          <xref ref-type="bibr" rid="ref7 ref8 ref9">7, 8, 9</xref>
          ]) usually do not
explicitly model the limits imposed by the blockchain and, often implicitly, assume that the blockchain
can always satisfy rebalancing requests in a constant time interval (as we also did in [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]). To the best of
our knowledge, Papadis and Tassiulas [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] propose the most detailed model of rebalancing through
on-chain transactions. This model is then used to define a reinforcement learning based policy that
proactively performs submarine swaps aiming to maximize profit from blockchain and PCN fees. The
authors elegantly capture the diferent timescale at which rebalancing decisions and user transactions
are performed. Nonetheless, for sake of tractability, they also assume that the blockchain introduces a
constant delay to confirm all on-chain transactions.
        </p>
        <p>We acknowledge that studying the constraints imposed by a blockchain subject to varying loads is
complicated; it cannot be easily captured analytically. Therefore, we resort to simulations.</p>
      </sec>
      <sec id="sec-5-2">
        <title>5.2. Simulating Blockchains and PCNs</title>
        <p>
          Although deeply intertwined, to date there are no simulators that focus on the blockchain-PCN
interaction. We first briefly look at blockchain simulators, and then summarize the key tools for simulating
PCNs and, in particular, the LN.
5.2.1. Simulators of Blockchains
The popularity of blockchains as well as its complexity lead to the development of a rather large number
of simulators (e.g., [
          <xref ref-type="bibr" rid="ref25 ref26 ref27">25, 26, 27</xref>
          ]), with nearly half of them available in open-source (e.g., [
          <xref ref-type="bibr" rid="ref28 ref29 ref30 ref31 ref32">28, 29, 30, 31, 32</xref>
          ]).
They model a wide range of blockchain features ranging from network, consensus, data, execution and
application layers. Paulavičius et al. [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ] and Albshri et al. [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ] present an extensive literature review on
blockchain simulators, and provide an interesting comparison among them along diferent dimensions,
including the supported features. Diferently from our approach that relies on an established PDES, all
of these simulators are sequential discrete event simulators. They do not exploit advanced simulation
features, such as load distribution, optimistic event scheduling, which might turn out to be very useful
when simulating large networks. To the best of our knowledge, all of these simulators do not explicitly
consider second layer systems, and they do not easily allow modeling and evaluating other systems
that depends on blockchain to operate.
5.2.2. Simulators of PCNs
In this context, simulations have been widely used, e.g., to evaluate policies related to channel design,
rebalancing, routing, and privacy of PCNs. Although several PCN simulators exist (e.g. [
          <xref ref-type="bibr" rid="ref35 ref36 ref37">35, 36, 37</xref>
          ]),
a clear comparison among them is lacking. Research eforts typically build their own simulator to
evaluate specific features, therefore most of them—unfortunately—appear not to be actively maintained
(e.g., [
          <xref ref-type="bibr" rid="ref35 ref38">35, 38</xref>
          ]). One of the LN developer open-sourced a simulator6 that focuses on the LN gossiping
protocol. Beres et al. [
          <xref ref-type="bibr" rid="ref35">35</xref>
          ] develop a simulator specifically focused on fee and profitability 7, to empirically
study LN’s transaction fees and privacy provisions. Also Kappos et al. [
          <xref ref-type="bibr" rid="ref39">39</xref>
          ] develop a custom simulator
to investigate the privacy of LN. Simulations are used to investigate the rouging problem, as well.
Engelmann et al. [
          <xref ref-type="bibr" rid="ref40">40</xref>
          ] do it by considering channels characterized with economic-technical constraints.
Zhang et al. [
          <xref ref-type="bibr" rid="ref41">41</xref>
          ] evaluate their routing algorithm, which is aimed to minimize the transaction fee of a
payment path, subject to the timeliness and feasibility constraints. The source code of all these simulators
is not public. Conversely, Brânzei et al. [
          <xref ref-type="bibr" rid="ref42">42</xref>
          ] disclose their custom sequential simulator, which is used to
investigate the Bitcoin ecosystem economics taking into account of-ledger transactions and miner fees
as incentives for honesty. Rebello et al. [
          <xref ref-type="bibr" rid="ref36">36</xref>
          ] introduce an open-source PCN simulator that implements
the oficial LN message protocol in OMNET++. Recently, Conoscenti et al. [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] proposed CLoTH, an
open-source simulator that reproduces the code of LND, with specific regards to routing and HTLC
mechanisms. Diferent research works use CLoTH for evaluating their contributions (e.g., [
          <xref ref-type="bibr" rid="ref13 ref14 ref15">13, 14, 15</xref>
          ]).
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>In this paper, we investigated how a blockchain impacts on a second layer PCN built on top of it. To
this end, we extended our PDES for SH-PCNs to incorporate the dynamics of the layer-1 blockchain
having limited block size and not negligible block time. Then, we conducted an extensive evaluation
and showed how blockchain parameters—such as its congestion rate—significantly influence PCN
performance (e.g., in terms of payment success rate).</p>
      <p>As future work, we will further develop our simulator by implementing key PCN features (e.g.,
routing, channel rebalancing techniques, network load). We also plan to conduct experiment on very
large scale networks, up to a scale of 1:1 with the population of the euro area.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Benedetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. D.</given-names>
            <surname>Sclavis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Favorito</surname>
          </string-name>
          , G. Galano,
          <string-name>
            <given-names>S.</given-names>
            <surname>Giammusso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Muci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nardelli</surname>
          </string-name>
          ,
          <article-title>Selfbalancing semi-hierarchical payment channel networks for central bank digital currencies</article-title>
          ,
          <source>in: Proc. of 2024 IEEE PerCom Workshops</source>
          ,
          <year>2024</year>
          , pp.
          <fpage>530</fpage>
          -
          <lpage>536</lpage>
          . doi:
          <volume>10</volume>
          .1109/PerComWorkshops59983.
          <year>2024</year>
          .
          <volume>10503409</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>European</given-names>
            <surname>Central</surname>
          </string-name>
          <string-name>
            <surname>Bank</surname>
          </string-name>
          ,
          <article-title>What are instant payments?</article-title>
          , https://bit.ly/3RolNlO,
          <year>2023</year>
          . Accessed:
          <fpage>2023</fpage>
          -11-10.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Benedetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>De Sclavis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Favorito</surname>
          </string-name>
          , G. Galano,
          <string-name>
            <given-names>S.</given-names>
            <surname>Giammusso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Muci</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Nardelli, PoWless Bitcoin with Confidential Byzantine PoA</article-title>
          ,
          <source>in: Proc. of 2023 IEEE Int. Conf. Blockchain and Cryptocurrency (ICBC)</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICBC56567.
          <year>2023</year>
          .
          <volume>10174972</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Benedetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. D.</given-names>
            <surname>Sclavis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Favorito</surname>
          </string-name>
          , G. Galano,
          <string-name>
            <given-names>S.</given-names>
            <surname>Giammusso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Muci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nardelli</surname>
          </string-name>
          ,
          <article-title>Certified Byzantine Consensus with Confidential Quorum for a Bitcoin-derived Permissioned DLT</article-title>
          ,
          <source>in: Proc. of the 5th Distributed Ledger Technology Workshop</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          . Available at https: //ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3460</volume>
          /papers/DLT_2023_paper_1.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Gangwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. R.</given-names>
            <surname>Gangavalli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Thirupathi</surname>
          </string-name>
          ,
          <article-title>A survey of layer-two blockchain protocols</article-title>
          ,
          <source>J. Netw. Comput. Appl</source>
          .
          <volume>209</volume>
          (
          <year>2023</year>
          )
          <article-title>103539</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.jnca.
          <year>2022</year>
          .
          <volume>103539</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>F. S.</given-names>
            <surname>Mishkin</surname>
          </string-name>
          ,
          <article-title>The economics of money, banking, and financial markets</article-title>
          ,
          <source>Pearson education</source>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Miyazaki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <article-title>Secure balance planning of of-blockchain payment channel networks</article-title>
          ,
          <source>in: Proc of IEEE INFOCOM '20</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>1728</fpage>
          -
          <lpage>1737</lpage>
          . doi:
          <volume>10</volume>
          .1109/INFOCOM41043.
          <year>2020</year>
          .
          <volume>9155375</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sivaraman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. B.</given-names>
            <surname>Venkatakrishnan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Alizadeh</surname>
          </string-name>
          , G. Fanti,
          <string-name>
            <given-names>P.</given-names>
            <surname>Viswanath</surname>
          </string-name>
          ,
          <article-title>Routing cryptocurrency with the spider network</article-title>
          ,
          <source>in: Proc. of HotNets '18</source>
          ,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          ,
          <year>2018</year>
          , p.
          <fpage>29</fpage>
          -
          <lpage>35</lpage>
          . doi:
          <volume>10</volume>
          .1145/3286062. 3286067.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S. Z.</given-names>
            <surname>Shabgahi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Hosseini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. P.</given-names>
            <surname>Shariatpanahi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Bahrak</surname>
          </string-name>
          , Modeling Efective Lifespan of Payment Channels,
          <year>2022</year>
          . ArXiv:
          <volume>2301</volume>
          .
          <fpage>01240</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>Papadis</surname>
          </string-name>
          , L. Tassiulas,
          <article-title>Deep reinforcement learning-based rebalancing policies for profit maximization of relay nodes in payment channel networks</article-title>
          ,
          <year>2023</year>
          . ArXiv:
          <volume>2210</volume>
          .
          <fpage>07302</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>G.</given-names>
            <surname>Galano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Giammusso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nardelli</surname>
          </string-name>
          ,
          <article-title>Modeling central bank digital currency over payment channels: A parallel ross- based approach</article-title>
          ,
          <source>in: Proc. of 38th ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (SIGSIM PADS '24)</source>
          , ACM,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .1145/3615979.3656052.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Conoscenti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vetrò</surname>
          </string-name>
          , J. C. De Martin,
          <string-name>
            <surname>CLoTH: A Lightning Network</surname>
            <given-names>Simulator</given-names>
          </string-name>
          , SoftwareX
          <volume>15</volume>
          (
          <year>2021</year>
          )
          <article-title>100717</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.softx.
          <year>2021</year>
          .
          <volume>100717</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>K.</given-names>
            <surname>Asgari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Mohammadian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tefagh</surname>
          </string-name>
          , Dyfen:
          <article-title>Agent-based fee setting in payment channel networks</article-title>
          ,
          <year>2022</year>
          . ArXiv:
          <volume>2210</volume>
          .
          <fpage>08197</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>V.</given-names>
            <surname>Davis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Harrison</surname>
          </string-name>
          ,
          <article-title>Learning a scalable algorithm for improving betweenness in the lightning network</article-title>
          ,
          <source>in: Proc. of the 2022 Int. Conf. on Blockchain Computing and Applications (BCCA)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>119</fpage>
          -
          <lpage>126</lpage>
          . doi:
          <volume>10</volume>
          .1109/BCCA55292.
          <year>2022</year>
          .
          <volume>9922233</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>T.</given-names>
            <surname>Dasaklis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Malamas</surname>
          </string-name>
          ,
          <article-title>Lightning network's evolution: Unraveling its present state and the emergence of disruptive digital business models</article-title>
          ,
          <year>2023</year>
          . Preprints.org:
          <volume>202305</volume>
          .
          <fpage>0523</fpage>
          .
          <year>v1</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>C. D. Carothers</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Bauer</surname>
          </string-name>
          , S. Pearce,
          <article-title>ROSS: A high-performance, low-memory, modular Time Warp system</article-title>
          ,
          <source>Journal of Parallel and Distributed Computing</source>
          <volume>62</volume>
          (
          <year>2002</year>
          )
          <fpage>1648</fpage>
          -
          <lpage>1669</lpage>
          . doi:
          <volume>10</volume>
          .1016/ S0743-
          <volume>7315</volume>
          (
          <issue>02</issue>
          )
          <fpage>00004</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>Poon</surname>
          </string-name>
          , T. Dryja,
          <article-title>The bitcoin lightning network: Scalable of-chain instant payments</article-title>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>E.</given-names>
            <surname>Rohrer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Malliaris</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Tschorsch</surname>
          </string-name>
          ,
          <article-title>Discharged payment channels: Quantifying the lightning network's resilience to topology-based attacks</article-title>
          ,
          <source>in: Proc. of 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>347</fpage>
          -
          <lpage>356</lpage>
          . doi:
          <volume>10</volume>
          .1109/EuroSPW.
          <year>2019</year>
          .
          <volume>00045</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Seres</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Gulyás</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Nagy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Burcsi</surname>
          </string-name>
          ,
          <article-title>Topological analysis of Bitcoin's Lightning Network</article-title>
          , in: Mathematical Research for Blockchain Economy, Springer,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          . doi:
          <volume>10</volume>
          .1007/ 978-3-
          <fpage>030</fpage>
          -37110-
          <issue>4</issue>
          _
          <fpage>1</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>G.</given-names>
            <surname>Avarikioti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Wattenhofer</surname>
          </string-name>
          ,
          <article-title>Algorithmic channel design</article-title>
          ,
          <source>in: Proc. of 29th Int. Symposium on Algorithms and Computation (ISAAC</source>
          <year>2018</year>
          ), volume
          <volume>123</volume>
          of Leibniz International Proceedings in Informatics (LIPIcs),
          <source>Schloss Dagstuhl - Leibniz-Zentrum für Informatik</source>
          , Dagstuhl, Germany,
          <year>2018</year>
          , pp.
          <volume>16</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          :
          <fpage>12</fpage>
          . doi:
          <volume>10</volume>
          .4230/LIPIcs.ISAAC.
          <year>2018</year>
          .
          <volume>16</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Watts</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Strogatz</surname>
          </string-name>
          ,
          <article-title>Collective dynamics of 'small-world' networks</article-title>
          ,
          <source>Nature</source>
          <volume>393</volume>
          (
          <year>1998</year>
          )
          <fpage>440</fpage>
          -
          <lpage>442</lpage>
          . doi:
          <volume>10</volume>
          .1038/30918.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>ECB</surname>
          </string-name>
          ,
          <article-title>A stocktake on the digital euro</article-title>
          , https://bit.ly/412yK8a,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>ECB</given-names>
            <surname>Surveys</surname>
          </string-name>
          ,
          <article-title>Study on the payment attitudes of consumers in the euro area (SPACE)</article-title>
          , https: //bit.ly/412qbdE,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M.</given-names>
            <surname>Benedetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>De Sclavis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Favorito</surname>
          </string-name>
          , G. Galano,
          <string-name>
            <given-names>S.</given-names>
            <surname>Giammusso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Muci</surname>
          </string-name>
          , M. Nardelli, SelfBalancing
          <string-name>
            <surname>Semi-Hierarchical PCNs for CBDCs</surname>
          </string-name>
          ,
          <year>2024</year>
          . ArXiv:
          <volume>2401</volume>
          .
          <fpage>11868</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>E.</given-names>
            <surname>Androulaki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. O.</given-names>
            <surname>Karame</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Roeschlin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Scherer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Capkun</surname>
          </string-name>
          ,
          <article-title>Evaluating user privacy in Bitcoin</article-title>
          ,
          <source>in: Financial Cryptography and Data Security</source>
          , Springer, Springer Berlin Heidelberg,
          <year>2013</year>
          , pp.
          <fpage>34</fpage>
          -
          <lpage>51</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -39884-
          <issue>1</issue>
          _
          <fpage>4</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>I.</given-names>
            <surname>Eyal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. G.</given-names>
            <surname>Sirer</surname>
          </string-name>
          ,
          <article-title>Majority is not enough: Bitcoin mining is vulnerable</article-title>
          ,
          <source>Commun. ACM</source>
          <volume>61</volume>
          (
          <year>2018</year>
          )
          <fpage>95</fpage>
          -
          <lpage>102</lpage>
          . doi:
          <volume>10</volume>
          .1145/3212998.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>A.</given-names>
            <surname>Gervais</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. O.</given-names>
            <surname>Karame</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Wüst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Glykantzis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Ritzdorf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Capkun</surname>
          </string-name>
          ,
          <article-title>On the security and performance of proof of work blockchains</article-title>
          ,
          <source>in: Proc. of 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16)</source>
          , ACM, New York, NY, USA,
          <year>2016</year>
          , p.
          <fpage>3</fpage>
          -
          <lpage>16</lpage>
          . doi:
          <volume>10</volume>
          .1145/2976749.2978341.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>A.</given-names>
            <surname>Deshpande</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Nasirifard</surname>
          </string-name>
          , H.
          <article-title>-A. Jacobsen, eVIBES: Configurable and interactive ethereum blockchain simulation framework</article-title>
          ,
          <source>in: Proc. of 19th Int. Middleware Conference (Posters)</source>
          ,
          <source>Middleware '18</source>
          ,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, NY, USA,
          <year>2018</year>
          , p.
          <fpage>11</fpage>
          -
          <lpage>12</lpage>
          . doi:
          <volume>10</volume>
          .1145/3284014.3284020.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>A.</given-names>
            <surname>Miller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Jansen</surname>
          </string-name>
          , Shadow-Bitcoin:
          <article-title>Scalable simulation via direct execution of Multi-Threaded applications</article-title>
          ,
          <source>in: Proc. of 8th Workshop on Cyber Security Experimentation and Test (CSET 15)</source>
          , USENIX Association, Washington, D.C.,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alharby</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. van Moorsel</surname>
          </string-name>
          ,
          <article-title>Blocksim: A simulation framework for blockchain systems</article-title>
          ,
          <source>SIGMETRICS Perform. Eval. Rev</source>
          .
          <volume>46</volume>
          (
          <year>2019</year>
          )
          <fpage>135</fpage>
          -
          <lpage>138</lpage>
          . doi:
          <volume>10</volume>
          .1145/3308897.3308956.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>C.</given-names>
            <surname>Faria</surname>
          </string-name>
          , M. Correia, BlockSim: Blockchain simulator,
          <source>in: 2019 IEEE Int. Conf. on Blockchain</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>439</fpage>
          -
          <lpage>446</lpage>
          . doi:
          <volume>10</volume>
          .1109/Blockchain.
          <year>2019</year>
          .
          <volume>00067</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>D. K.</given-names>
            <surname>Gouda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Jolly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kapoor</surname>
          </string-name>
          ,
          <article-title>Design and validation of blockeval, a blockchain simulator</article-title>
          ,
          <source>in: 2021 Int. Conf. on COMmunication Systems &amp; NETworkS (COMSNETS)</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>281</fpage>
          -
          <lpage>289</lpage>
          . doi:
          <volume>10</volume>
          .1109/COMSNETS51098.
          <year>2021</year>
          .
          <volume>9352838</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>R.</given-names>
            <surname>Paulavičius</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Grigaitis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Filatovas</surname>
          </string-name>
          ,
          <article-title>A systematic review and empirical analysis of blockchain simulators</article-title>
          ,
          <source>IEEE Access 9</source>
          (
          <year>2021</year>
          )
          <fpage>38010</fpage>
          -
          <lpage>38028</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2021</year>
          .
          <volume>3063324</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>A.</given-names>
            <surname>Albshri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alzubaidi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Awaji</surname>
          </string-name>
          , E. Solaiman,
          <article-title>Blockchain simulators: A systematic mapping study</article-title>
          ,
          <source>in: 2022 IEEE Int. Conf. on Services Computing (SCC)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>284</fpage>
          -
          <lpage>294</lpage>
          . doi:
          <volume>10</volume>
          .1109/ SCC55611.
          <year>2022</year>
          .
          <volume>00049</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>F.</given-names>
            <surname>Beres</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Seres</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Benczur</surname>
          </string-name>
          ,
          <article-title>A cryptoeconomic trafic analysis of bitcoin's lightning network</article-title>
          ,
          <year>2019</year>
          . ArXiv:
          <year>1911</year>
          .09432.
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>G. A. F.</given-names>
            <surname>Rebello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. F.</given-names>
            <surname>Camilo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Potop-Butucaru</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. E. M.</given-names>
            <surname>Campista</surname>
          </string-name>
          , et al.,
          <article-title>PCNsim: A flexible and modular simulator for payment channel networks</article-title>
          ,
          <source>in: Proc. IEEE INFOCOM Workshops '22</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>2</lpage>
          . doi:
          <volume>10</volume>
          .1109/INFOCOMWKSHPS54753.
          <year>2022</year>
          .
          <volume>9798003</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>R.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Xue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. T.</given-names>
            <surname>Kilari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Tang,</surname>
          </string-name>
          <article-title>CoinExpress: A fast payment routing mechanism in blockchain-based payment channel networks</article-title>
          ,
          <source>in: Proc. of Int. Conf. on Computer Communication and Networks (ICCCN)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICCCN.
          <year>2018</year>
          .
          <volume>8487351</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>G.</given-names>
            <surname>Di Stasi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Avallone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Canonico</surname>
          </string-name>
          , G. Ventre,
          <article-title>Routing payments on the Lightning Network, in: Proc. of IEEE iThings and GreenCom and CPSCom</article-title>
          and SmartData '
          <volume>18</volume>
          ,
          <year>2018</year>
          , pp.
          <fpage>1161</fpage>
          -
          <lpage>1170</lpage>
          . doi:
          <volume>10</volume>
          .1109/Cybermatics_
          <year>2018</year>
          .
          <year>2018</year>
          .
          <volume>00209</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>G.</given-names>
            <surname>Kappos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Yousaf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Piotrowska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kanjalkar</surname>
          </string-name>
          , et al.,
          <article-title>An empirical analysis of privacy in the Lightning Network</article-title>
          ,
          <source>in: Financial Cryptography and Data Security</source>
          , Springer, Berlin, Heidelberg,
          <year>2021</year>
          , pp.
          <fpage>167</fpage>
          -
          <lpage>186</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>662</fpage>
          -64322-
          <issue>8</issue>
          _
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>F.</given-names>
            <surname>Engelmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kopp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Kargl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Glaser</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Weinhardt</surname>
          </string-name>
          ,
          <article-title>Towards an economic analysis of routing in payment channel networks</article-title>
          ,
          <source>in: Proc. of 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers (SERIAL)</source>
          , ACM,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1145/3152824.3152826.
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Yang</surname>
          </string-name>
          , G. Xue,
          <string-name>
            <surname>CheaPay:</surname>
          </string-name>
          <article-title>An optimal algorithm for fee minimization in blockchainbased payment channel networks</article-title>
          ,
          <source>in: Proc. of the 2019 IEEE Int. Conf. on Communications (ICC)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICC.
          <year>2019</year>
          .
          <volume>8761804</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>S.</given-names>
            <surname>Brânzei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Segal-Halevi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zohar</surname>
          </string-name>
          ,
          <article-title>How to charge lightning: The economics of Bitcoin transaction channels</article-title>
          ,
          <year>2022</year>
          . ArXiv:
          <volume>1712</volume>
          .
          <fpage>10222</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>