vac.dev/open-problems.md

3.3 KiB

title
Open Research Problems

Open Research Problems

We are seeking to collaborate with researchers in the following topic areas. Feel free to join our Discord for discussion.

DHT (distributed hash table) security / privacy / anonymity

Compared to unstructured P2P overlay networks, DHTs offer efficient and (theoretically) reliable discovery. However, they are prone to eclipse attacks and typically offer weak privacy properties. This topic comprises researching novel techniques mitigating or even thwarting eclipse attacks against DHTs. A focus on Node Discovery Protocol v5 (discv5) is of special interest to the Vac team.

Further background on the usage of discv5 in Waku can be found in our research log. A new version of discv5 that is both efficient and provides eclipse mitigation is currently being researched.

Privacy-Preserving Incentivizations of waku protocols

  • Incentivise relay

Devising novel applications of the Waku protocol stack

examples comprise

  • p2p social network
  • evoting system

Waku simulator

Halo2 in a browser

Meshnet transports and libp2p

Applied ZK

Robust P2P network - NAT traversal

Waku relay, Waku's core protocol, is based on a gossipsub mesh, while Waku discv5 uses a DHT overlay. Both significantly benefit from robust and reliable P2P connections. Better connectivity allows nodes to contribute more to the network and improve overall availability, efficiency, and by extension, anonymity (see k-anonymity).

NAT is a well known problem to P2P connectivity. There are various types of NATs whose behaviours are described in RFC 4787. Carrier-Grade NATs add another layer of indirection, which complicates the matter further. Various NAT traversal protocols have been developed to overcome the different types of NATs. RFC 8445 specifies Interactive Connectivity Establishment (ICE), which integrates a set of NAT traversal techniques. Waku currently uses libp2p NAT traversal, specifically STUN (leveraging the identify protocol) and AutoNAT.

The main focus of this topic is on researching novel ICE-complementary NAT traversal techniques that are decentralized and have desirable privacy and anonymity properties. The topic also comprises integrating and specifying ICE for Waku v2.