Loading...
Modeling the Dynamics and Resilience of Decentralized User to User Transactions


Journal of Computer and Communication Networks

Received On : 26 January 2025

Revised On : 27 February 2025

Accepted On : 30 March 2025

Published On : 30 April 2025

Volume 01, 2025

Pages : 072-083


Abstract

This research provides a novel analysis of the interaction and stability of the loosely coupled User-to-User (U2U) transaction networks associated with Dark Web Marketplaces (DWMs). Therefore, using a dataset of over 31 million Bitcoin transactions involving more than 16 million entities linked to 40 major DWMs, we observe the ubiquity of U2U trading. However, as shown in this paper, the population of casual U2U trading pairs is complemented with a sub-population of highly active and persistent trading pairs with very different characteristics. Some of these stable U2U pairs are responsible for a significantly higher number of transactions than others, trading at a rate 5X higher than the rest of the users, and are likely to spend more time in the DWM ecosystem. In addition, they indicate that DWM platforms themselves seem to contribute to the creation of a large number of these long-lasting U2U connections, as pairs tend to emerge when users are already engaged in trading on the same marketplace. Other common pathways are predating any DWM activity, arising from a lack of trust in a platform, or forming in the wake of a marketplace’s collapse. Nevertheless, the stable U2U networks are rather autonomous and quite resistant compared to the rather vulnerable centralized DWM structures. Their trading volumes are significantly high and remain relatively stable and only slightly erode after DWMs shut down, thus quickly replacing the significant collapse of non-stable U2U trading. This resiliency applies even to systemic shocks such as the COVID-19 pandemic that greatly affected the conventional modes of operation in DWM.

Keywords

Dark Web Marketplaces, User-to-User Transactions, Decentralized Networks, Network Resilience, Marketplace Closures, Systemic Shocks, Pseudoanonymous Networks, Disintermediation Dynamics.

  1. A. Bracci et al., “Vaccines and more: The response of Dark Web marketplaces to the ongoing COVID-19 pandemic,” PLOS ONE, vol. 17, no. 11, p. e0275288, Nov. 2022, doi: 10.1371/journal.pone.0275288.
  2. B. Cohen, “‘The Jews are our Misfortune!’ Contemporary antisemitism as a hydra-headed phenomenon,” Israel Affairs, vol. 29, no. 1, pp. 5–30, Dec. 2022, doi: 10.1080/13537121.2023.2162254.
  3. H. C. Schaller, M. Hofinann, and L. C. Javois, “Effect of head activator on proliferation, head-specific determination and differentiation of epithelial cells in hydra,” Differentiation, vol. 43, no. 3, pp. 157–164, Jun. 1990, doi: 10.1111/j.1432-0436.1990.tb00442.x.
  4. D. Georgoulias, J. M. Pedersen, M. Falch, and E. Vasilomanolakis, “A qualitative mapping of Darkweb marketplaces,” 2021 APWG Symposium on Electronic Crime Research (eCrime), Dec. 2021, doi: 10.1109/ecrime54498.2021.9738766.
  5. I. Pete, J. Hughes, Y. T. Chua, and M. Bada, “A Social Network Analysis and Comparison of Six Dark Web Forums,” 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 484–493, Sep. 2020, doi: 10.1109/eurospw51379.2020.00071.
  6. A. Bracci et al., “Dark Web Marketplaces and COVID-19: before the vaccine,” EPJ Data Science, vol. 10, no. 1, Jan. 2021, doi: 10.1140/epjds/s13688-021-00259-w.
  7. A. Dalvi, G. Patil, and S. G. Bhirud, “Dark Web Marketplace Monitoring - The Emerging Business Trend of Cybersecurity,” 2022 International Conference on Trends in Quantum Computing and Emerging Business Technologies (TQCEBT), vol. 10, pp. 1–6, Oct. 2022, doi: 10.1109/tqcebt54229.2022.10041633.
  8. K. Oosthoek, M. Van Staalduinen, and G. Smaragdakis, “Quantifying Dark Web Shops’ Illicit Revenue,” IEEE Access, vol. 11, pp. 4794–4808, 2023, doi: 10.1109/access.2023.3235409.
  9. S. A. Bakken and J. J. Demant, “Sellers’ risk perceptions in public and private social media drug markets,” International Journal of Drug Policy, vol. 73, pp. 255–262, Nov. 2019, doi: 10.1016/j.drugpo.2019.03.009.
  10. F. Stahl, F. Schomm, G. Vossen, and L. Vomfell, “A classification framework for data marketplaces,” Vietnam Journal of Computer Science, vol. 3, no. 3, pp. 137–143, Mar. 2016, doi: 10.1007/s40595-016-0064-2.
  11. A. Y. L. Chong, E. Lacka, L. Boying, and H. K. Chan, “The role of social media in enhancing guanxi and perceived effectiveness of E-commerce institutional mechanisms in online marketplace,” Information & Management, vol. 55, no. 5, pp. 621–632, Jul. 2018, doi: 10.1016/j.im.2018.01.003.
  12. H. G. Lee and T. H. Clark, “Impacts of the Electronic Marketplace on Transaction Cost and Market Structure,” International Journal of Electronic Commerce, vol. 1, no. 1, pp. 127–149, Sep. 1996, doi: 10.1080/10864415.1996.11518279.
  13. K. Täuscher and S. M. Laudien, “Understanding platform business models: A mixed methods study of marketplaces,” European Management Journal, vol. 36, no. 3, pp. 319–329, Jun. 2018, doi: 10.1016/j.emj.2017.06.005.
  14. C. Walsh, “Drugs, the Internet and Change,” Journal of Psychoactive Drugs, vol. 43, no. 1, pp. 55–63, Mar. 2011, doi: 10.1080/02791072.2011.566501.
  15. M. Baentsch, L. Baun, G. Molter, S. Rothkugel, and P. Sturn, “World Wide Web caching: the application-level view of the Internet,” IEEE Communications Magazine, vol. 35, no. 6, pp. 170–178, Jun. 1997, doi: 10.1109/35.587725.
  16. I. Ladegaard, “Crime displacement in digital drug markets,” International Journal of Drug Policy, vol. 63, pp. 113–121, Jan. 2019, doi: 10.1016/j.drugpo.2018.09.013.
  17. P. E. Chaudhry, “The looming shadow of illicit trade on the internet,” Business Horizons, vol. 60, no. 1, pp. 77–89, Jan. 2017, doi: 10.1016/j.bushor.2016.09.002.
  18. J. Aldridge and R. Askew, “Delivery dilemmas: How drug cryptomarket users identify and seek to reduce their risk of detection by law enforcement,” International Journal of Drug Policy, vol. 41, pp. 101–109, Mar. 2017, doi: 10.1016/j.drugpo.2016.10.010.
  19. R. Frank and A. Mikhaylov, “Beyond the ‘Silk Road’: Assessing Illicit Drug Marketplaces on the Public Web,” Open Source Intelligence and Cyber Crime, pp. 89–111, 2020, doi: 10.1007/978-3-030-41251-7_4.
  20. G. Basu, “The role of transnational smuggling operations in illicit supply chains,” Journal of Transportation Security, vol. 6, no. 4, pp. 315–328, Jun. 2013, doi: 10.1007/s12198-013-0118-y.
  21. G. Basu, “Concealment, corruption, and evasion: a transaction cost and case analysis of illicit supply chain activity,” Journal of Transportation Security, vol. 7, no. 3, pp. 209–226, Jun. 2014, doi: 10.1007/s12198-014-0140-8.
  22. G. Basu, “The strategic attributes of transnational smuggling: Logistics flexibility and operational stealth in the facilitation of illicit trade,” Journal of Transportation Security, vol. 7, no. 2, pp. 99–113, Dec. 2013, doi: 10.1007/s12198-013-0132-0.
  23. D. McCoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker, “Shining Light in Dark Places: Understanding the Tor Network,” Privacy Enhancing Technologies, pp. 63–76, doi: 10.1007/978-3-540-70630-4_5.
  24. D. Pavithran and R. Thomas, “A Survey on Analyzing Bitcoin Transactions,” 2018 Fifth HCT Information Technology Trends (ITT), pp. 227–231, Nov. 2018, doi: 10.1109/ctit.2018.8649517.
  25. D. Vandervort, “Challenges and Opportunities Associated with a Bitcoin-Based Transaction Rating System,” Financial Cryptography and Data Security, pp. 33–42, 2014, doi: 10.1007/978-3-662-44774-1_3.
  26. M. C. Kus Khalilov and A. Levi, “A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems,” IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2543–2585, 2018, doi: 10.1109/comst.2018.2818623.
  27. J. Bonneau, A. Narayanan, A. Miller, J. Clark, J. A. Kroll, and E. W. Felten, “Mixcoin: Anonymity for Bitcoin with Accountable Mixes,” Financial Cryptography and Data Security, pp. 486–504, 2014, doi: 10.1007/978-3-662-45472-5_31.
  28. E. Androulaki, G. O. Karame, M. Roeschlin, T. Scherer, and S. Capkun, “Evaluating User Privacy in Bitcoin,” Financial Cryptography and Data Security, pp. 34–51, 2013, doi: 10.1007/978-3-642-39884-1_4.
  29. D. S. Dolliver, “Evaluating drug trafficking on the Tor Network: Silk Road 2, the sequel,” International Journal of Drug Policy, vol. 26, no. 11, pp. 1113–1123, Nov. 2015, doi: 10.1016/j.drugpo.2015.01.008.
  30. R. Liggett, J. R. Lee, A. L. Roddy, and M. A. Wallin, “The Dark Web as a Platform for Crime: An Exploration of Illicit Drug, Firearm, CSAM, and Cybercrime Markets,” The Palgrave Handbook of International Cybercrime and Cyberdeviance, pp. 91–116, 2020, doi: 10.1007/978-3-319-78440-3_17.
  31. S. Pearson, “Privacy, Security and Trust in Cloud Computing,” Privacy and Security for Cloud Computing, pp. 3–42, Jun. 2012, doi: 10.1007/978-1-4471-4189-1_1.
  32. Lee, Ahn, and Bang, “Managing Consumer Privacy Concerns in Personalization: A Strategic Analysis of Privacy Protection,” MIS Quarterly, vol. 35, no. 2, p. 423, 2011, doi: 10.2307/23044050.
  33. M. S. Featherman, A. D. Miyazaki, and D. E. Sprott, “Reducing online privacy risk to facilitate e‐service adoption: the influence of perceived ease of use and corporate credibility,” Journal of Services Marketing, vol. 24, no. 3, pp. 219–229, May 2010, doi: 10.1108/08876041011040622.
  34. Abuhussein, H. Bedi, and S. Shiva, “Evaluating security and privacy in cloud computing services: A Stakeholder’s perspective,” International Conference for Internet Technology and Secured Transactions, pp. 388–395, Dec. 2012, [Online]. Available: http://gtcs.cs.memphis.edu/pub/Abdullah%20Abuhssein%20ICITST2012.pdf.
  35. O. Mosweu, K. Bwalya, and A. Mutshewa, “Examining factors affecting the adoption and usage of document workflow management system (DWMS) using the UTAUT model,” Records Management Journal, vol. 26, no. 1, pp. 38–67, Mar. 2016, doi: 10.1108/rmj-03-2015-0012.
  36. T. Diab, M. Gilg, P. Lorenz, and F. Drouhin, “Using I2P (Invisible Internet Protocol) Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets: I2P Vehicular Protocol (IVP),” Wireless Personal Communications, vol. 127, no. 3, pp. 2625–2644, Jul. 2022, doi: 10.1007/s11277-022-09888-4.
  37. C. Andersson and A. Panchenko, “Practical anonymous communication on the mobile internet using Tor,” 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007, pp. 39–48, 2007, doi: 10.1109/seccom.2007.4550305.
  38. D. S. Evans, “Economic Aspects of Bitcoin and Other Decentralized Public-Ledger Currency Platforms,” SSRN Electronic Journal, 2014, doi: 10.2139/ssrn.2424516.
  39. Y.-Y. Hsieh, J.-P. Vergne, P. Anderson, K. Lakhani, and M. Reitzig, “Bitcoin and the rise of decentralized autonomous organizations,” Journal of Organization Design, vol. 7, no. 1, Nov. 2018, doi: 10.1186/s41469-018-0038-1.
  40. G. Giudici, A. Milne, and D. Vinogradov, “Cryptocurrencies: market analysis and perspectives,” Journal of Industrial and Business Economics, vol. 47, no. 1, pp. 1–18, Sep. 2019, doi: 10.1007/s40812-019-00138-6.
  41. V. Catalani et al., “Profiling the vendors of COVID‐19 related product on the Darknet: An observational study,” Emerging Trends in Drugs, Addictions, and Health, vol. 3, p. 100051, 2023, doi: 10.1016/j.etdah.2023.100051.
  42. E. Prevete et al., “A Preliminary Inventory of Kratom (Mitragyna Speciosa) Products and Vendors on the Darknet and Cryptomarkets,” Journal of Psychoactive Drugs, vol. 56, no. 4, pp. 485–495, Sep. 2023, doi: 10.1080/02791072.2023.2242361.
  43. D. Zambiasi, “Drugs on the Web, Crime in the Streets. The Impact of Shutdowns of Dark Net Marketplaces on Street Crime,” Journal of Economic Behavior & Organization, vol. 202, pp. 274–306, Oct. 2022, doi: 10.1016/j.jebo.2022.08.008.
  44. F. Soldner, B. Kleinberg, and S. D. Johnson, “Counterfeits on dark markets: a measurement between Jan-2014 and Sep-2015,” Crime Science, vol. 12, no. 1, Oct. 2023, doi: 10.1186/s40163-023-00195-2.
  45. J. G. Snel et al., “A Distributed Workflow Management System for Automated Medical Image Analysis and Logistics,” 19th IEEE Symposium on Computer-Based Medical Systems (CBMS’06), pp. 733–738, 2006, doi: 10.1109/cbms.2006.10.
  46. S. Iyengar, “Energy-efficient and Secure Designs of Spintronic Memory: Techniques and Applications,” ProQuest, Jun. 2018, [Online]. Available: https://etda.libraries.psu.edu/catalog/15584asi7.
  47. S. Hagen, “No Space for Reddit Spacing: Mapping the Reflexive Relationship Between Groups on 4chan and Reddit,” Social Media + Society, vol. 9, no. 4, Oct. 2023, doi: 10.1177/20563051231216960.
  48. Gullberg and C. Larsson, “Keeping track of inventory by introducing a track and trace system -A case study at Svenska Mässan Gothia Towers AB,” GUPEA, Jul. 2019, [Online]. Available: https://gupea.ub.gu.se/bitstream/2077/60865/1/gupea_2077_60865_1.pdf.
  49. Z. Ding, A. Zhang, Y. Tian, and Q. Zheng, “Diffusion World Model,” arXiv (Cornell University), Feb. 2024, doi: 10.48550/arxiv.2402.03570.
  50. A. Bracci et al., “Dark Web Marketplaces and COVID-19: The vaccines,” SSRN Electronic Journal, 2021, doi: 10.2139/ssrn.3783216.
  51. A. Bracci et al., “The COVID-19 Online Shadow Economy,” SSRN Electronic Journal, 2020, doi: 10.2139/ssrn.3703865.
  52. S. Nazah, S. Huda, J. Abawajy, and M. M. Hassan, “Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach,” IEEE Access, vol. 8, pp. 171796–171819, 2020, doi: 10.1109/access.2020.3024198.
  53. V. Catalani et al., “Illicit COVID-19 products online: A mixed-method approach for identifying and preventing online health risks,” PLOS ONE, vol. 18, no. 6, p. e0287231, Jun. 2023, doi: 10.1371/journal.pone.0287231.
  54. M. Jourdan, “Casting light on harm reduction: Introducing two instruments for analysing contradictions between harm reduction and ‘non-harm reduction,’” International Journal of Drug Policy, vol. 20, no. 6, pp. 514–520, Nov. 2009, doi: 10.1016/j.drugpo.2009.02.011.
  55. M. de Reuver, C. Sørensen, and R. C. Basole, “The Digital Platform: A Research Agenda,” Journal of Information Technology, vol. 33, no. 2, pp. 124–135, Jun. 2018, doi: 10.1057/s41265-016-0033-3.
  56. W. Sun and G. P. Harrison, “Wind-solar complementarity and effective use of distribution network capacity,” Applied Energy, vol. 247, pp. 89–101, Aug. 2019, doi: 10.1016/j.apenergy.2019.04.042.
  57. Y. Ye, K. Hung Lau, and L. Teo, “Transforming supply chains for a new competitive market alignment – a case study of Chinese fashion apparel companies,” International Journal of Logistics Research and Applications, vol. 26, no. 3, pp. 365–397, Jul. 2021, doi: 10.1080/13675567.2021.1951690.
  58. P. Spagnoletti, F. Ceci, and B. Bygstad, “Online Black-Markets: An Investigation of a Digital Infrastructure in the Dark,” Information Systems Frontiers, vol. 24, no. 6, pp. 1811–1826, Sep. 2021, doi: 10.1007/s10796-021-10187-9.
  59. Y. Tsuchiya and N. Hiramoto, “Dark web in the dark: Investigating when transactions take place on cryptomarkets,” Forensic Science International: Digital Investigation, vol. 36, p. 301093, Mar. 2021, doi: 10.1016/j.fsidi.2020.301093.
  60. H. Fallmann, G. Wondracek, and C. Platzer, “Covertly Probing Underground Economy Marketplaces,” Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 101–110, 2010, doi: 10.1007/978-3-642-14215-4_6.
  61. Y. Li, C. Wu, and P. Luo, “Rating online commodities by considering consumers’ purchasing networks,” Management Decision, vol. 52, no. 10, pp. 2002–2020, Nov. 2014, doi: 10.1108/md-04-2014-0188.
  62. G. Chatzimarkaki, S. Karagiorgou, M. Konidi, D. Alexandrou, T. Bouras, and S. Evangelatos, “Harvesting Large Textual and Multimedia Data to Detect Illegal Activities on Dark Web Marketplaces,” 2023 IEEE International Conference on Big Data (BigData), pp. 4046–4055, Dec. 2023, doi: 10.1109/bigdata59044.2023.10386326.
  63. E. F. dos Reis, A. Teytelboym, A. ElBahrawy, I. De Loizaga, and A. Baronchelli, “Identifying key players in dark web marketplaces through Bitcoin transaction networks,” Scientific Reports, vol. 14, no. 1, Jan. 2024, doi: 10.1038/s41598-023-50409-5.
  64. A. Ahl et al., “Exploring blockchain for the energy transition: Opportunities and challenges based on a case study in Japan,” Renewable and Sustainable Energy Reviews, vol. 117, p. 109488, Jan. 2020, doi: 10.1016/j.rser.2019.109488.
  65. A. Park, H. Ryu, W. Park, and D. Jeong, “Forensic investigation framework for cryptocurrency wallet in the end device,” Computers & Security, vol. 133, p. 103392, Oct. 2023, doi: 10.1016/j.cose.2023.103392.
  66. M. D. Firoozjaei, R. Lu, and A. A. Ghorbani, “An evaluation framework for privacy‐preserving solutions applicable for blockchain‐based internet‐of‐things platforms,” SECURITY AND PRIVACY, vol. 3, no. 6, Oct. 2020, doi: 10.1002/spy2.131.
  67. A. ElBahrawy, L. Alessandretti, L. Rusnac, D. Goldsmith, A. Teytelboym, and A. Baronchelli, “Collective dynamics of dark web marketplaces,” Scientific Reports, vol. 10, no. 1, Nov. 2020, doi: 10.1038/s41598-020-74416-y.
  68. N. Hiramoto and Y. Tsuchiya, “Measuring dark web marketplaces via Bitcoin transactions: From birth to independence,” Forensic Science International: Digital Investigation, vol. 35, p. 301086, Dec. 2020, doi: 10.1016/j.fsidi.2020.301086.
  69. R. Broadhurst, “Submission to the Parliamentary Joint Committee on Law Enforcement Inquiry into Criminal Activity and Law Enforcement during the COVID-19 Pandemic,” SSRN Electronic Journal, 2021, doi: 10.2139/ssrn.3939974.
  70. A. Baravalle and S. W. Lee, “Dark Web Markets: Turning the Lights on AlphaBay,” Web Information Systems Engineering – WISE 2018, pp. 502–514, 2018, doi: 10.1007/978-3-030-02925-8_35.
  71. M. Nadini, A. Bracci, A. ElBahrawy, P. Gradwell, A. Teytelboym, and A. Baronchelli, “Emergence and structure of decentralised trade networks around dark web marketplaces,” Scientific Reports, vol. 12, no. 1, Mar. 2022, doi: 10.1038/s41598-022-07492-x.
  72. C. Guthrie, S. Fosso-Wamba, and J. B. Arnaud, “Online consumer resilience during a pandemic: An exploratory study of e-commerce behavior before, during and after a COVID-19 lockdown,” Journal of Retailing and Consumer Services, vol. 61, p. 102570, Jul. 2021, doi: 10.1016/j.jretconser.2021.102570.
  73. H. Zhang, L. Song, and Z. Han, “Cellular Assisted UAV Sensing,” Unmanned Aerial Vehicle Applications over Cellular Networks for 5G and Beyond, pp. 101–221, Dec. 2019, doi: 10.1007/978-3-030-33039-2_4.
  74. Y. A. Baker El-Ebiary, W. A. H. M. Ghanem, S. I. A. Saany, A. N. M. Rose, J. A. Jusoh, and H. Hassan, “A Comparative Study of eBay and Amazon Electronic Commerce Platforms,” Proceedings of International Conference on Emerging Technologies and Intelligent Systems, pp. 371–380, Aug. 2021, doi: 10.1007/978-3-030-82616-1_32.
  75. M. R. Khodoomi, M. Seif, and T. Hanne, “Effects and challenges of the COVID-19 pandemic in supply chain management: a text analytics approach,” Supply Chain Forum: An International Journal, vol. 25, no. 4, pp. 486–503, Oct. 2023, doi: 10.1080/16258312.2023.2253523.
  76. K. Suto, H. Nishiyama, N. Kato, T. Nakachi, T. Fujii, and A. Takahara, “THUP: A P2P Network Robust to Churn and DoS Attack Based on Bimodal Degree Distribution,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 247–256, Sep. 2013, doi: 10.1109/jsac.2013.sup.0513022.
  77. H. Yu, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, “SybilGuard: Defending Against Sybil Attacks via Social Networks,” IEEE/ACM Transactions on Networking, vol. 16, no. 3, pp. 576–589, Jun. 2008, doi: 10.1109/tnet.2008.923723.
  78. A. S. Alqahtani, K. A. Abuhasel, and M. Alquraish, “A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection,” Wireless Personal Communications, vol. 127, no. 2, pp. 1705–1716, Jul. 2021, doi: 10.1007/s11277-021-08716-5.
  79. A. Gupta, D. Malhotra, and L. K. Awasthi, “NeighborTrust: A trust-based scheme for countering Distributed Denial-of-Service attacks in P2P networks,” 2008 16th IEEE International Conference on Networks, pp. 1–6, Dec. 2008, doi: 10.1109/icon.2008.4772644.
  80. L. L. Biehl, L. Zhao, C. X. Song, and C. G. Panza, “Cyberinfrastructure for the collaborative development of U2U decision support tools,” Climate Risk Management, vol. 15, pp. 90–108, 2017, doi: 10.1016/j.crm.2016.10.003.
  81. A. Pinyo, A. Bangviwat, C. Menke, and A. Monti, “Decentralized P2P Electricity Trading Model for Thailand,” Sensors, vol. 21, no. 21, p. 7413, Nov. 2021, doi: 10.3390/s21217413.
  82. S. J. Leal and M. Napoletano, “Market stability vs. market resilience: Regulatory policies experiments in an agent-based model with low- and high-frequency trading,” Journal of Economic Behavior & Organization, vol. 157, pp. 15–41, Jan. 2019, doi: 10.1016/j.jebo.2017.04.013.
  83. C. Liu and Z. Li, “Comparison of Centralized and Peer-to-Peer Decentralized Market Designs for Community Markets,” IEEE Transactions on Industry Applications, vol. 58, no. 1, pp. 67–77, Jan. 2022, doi: 10.1109/tia.2021.3119559.
  84. R. E. Kranton, “Reciprocal Exchange: A Self-Sustaining System,” JSTOR, vol. 86, no. 4, pp. 830–851, Sep. 1996, [Online]. Available: https://dukespace.lib.duke.edu/dspace/handle/10161/1732.
CRediT Author Statement

The author reviewed the paper and approved the final version of the manuscript.

Acknowledgements

Authors thank Reviewers for taking the time and effort necessary to review the manuscript.

Funding

No funding was received to assist with the preparation of this manuscript.

Ethics Declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Availability of Data and Materials

Data sharing is not applicable to this article as no new data were created or analysed in this study.

Author Information

Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.

Corresponding Author



Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit: https://creativecommons.org/licenses/by-nc-nd/4.0/

Cite this Article

John Huria Nderitu, “Modeling the Dynamics and Resilience of Decentralized User to User Transactions”, Journal of Computer and Communication Networks, pp. 072-083, 2025, doi: 10.64026/JCCN/2025008.

Copyright

© 2025 John Huria Nderitu. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.