Preprint
Article

Lightning Network’s Evolution: Unraveling Its Present State and the Emergence of Disruptive Digital Business Models

Altmetrics

Downloads

565

Views

426

Comments

0

A peer-reviewed article of this preprint also exists.

This version is not peer-reviewed

Submitted:

07 May 2023

Posted:

08 May 2023

You are already at the latest version

Alerts
Abstract
The Lightning Network (LN), a second-layer protocol built on top of the Bitcoin blockchain, is an innovative digital payment solution that offers increased convenience, speed, and cost-effectiveness to consumers and businesses alike. However, there is limited literature available on the characteristics of this nascent technology, the depth and breadth of the various business LN-related applications as well as relevant adoption/implementation challenges. This study aims to contribute to the understanding of the LN’s characteristics, its potential in enhancing business operations and its applicability across different sectors, while taking into account adoption and implementation challenges. We apply a narrative review methodology using a semi-systematic approach to examine new and emerging business models empowered by the LN and its characteristics, topology, performance, privacy, and security. We analyze the data to identify key themes and trends in the literature, offering a critical analysis of the strengths and weaknesses of the existing literature. Based on the findings, we provide several clusters of fruitful areas for future research directions. The findings of this study will help businesses make more informed decisions about adopting and leveraging the LN to improve their operations and enhance customer experience.
Keywords: 
Subject: Business, Economics and Management  -   Business and Management

1. Introduction

Digital payments have become an essential aspect of modern society, offering increased convenience, speed, and cost-effectiveness to consumers and businesses alike. These payment systems encompass card payment, e-payment, mobile payment, and cryptocurrencies, with each having their unique characteristics [1]. Digital payments are increasingly being leveraged to drive financial inclusion, support economic growth, and promote innovation and technological advancement. As digital payment platforms such as WeChat continue to gain popularity, factors such as service quality, perceived security, and ease of use play a significant role in determining global consumer adoption [2]. Studies have shown that the Technology Acceptance Model (TAM) and the Unified Theory of Acceptance and Use of Technology (UTAUT) model, which consider people’s attitudes and perceived risks, are often used to understand consumer adoption of digital payment solutions [3]. Stakeholders should be mindful of these factors and develop policies and regulations to facilitate effective use of digital payment technologies in various sectors [1,4].
One such innovative digital payment solution is the Lightning Network (LN), a second-layer protocol built on top of the Bitcoin blockchain. The LN offers unique features such as instant settlement finality, extremely low transaction fees, practically infinite throughput, and lightning-fast transaction speeds [5,6]. These features make the LN an ideal solution for various applications, including micropayments and low-value transactions that may not be feasible on the Bitcoin blockchain. The network also serves as an interoperability bridge among different financial networks, offering the potential for real-time, low-cost cross-network transactions [6]. In addressing the "Blockchain Trilemma," the LN successfully balances security, scalability, and decentralization, thus maintaining the network’s integrity and security [7]. By enabling off-chain transactions and reducing the load on the main blockchain, the LN has made significant progress in development, liquidity, and user adoption [8]. This approach ensures that the base layer remains immutable and decentralized while accommodating innovation at higher levels [8,9].
Technically speaking, the LN functions as a decentralized layer 2 solution intended to address the scalability challenge faced by the Bitcoin network. Its primary goal is to significantly enhance the speed of transactions. The LN, proposed by [10] in 2016 and implemented as open-source software in 2018, employs user-generated micropayment channels to enable real-time transactions. The LN uses "channels" to transfer Bitcoins between two parties, with each transaction requiring both signatures. The Bitcoin public ledger records this connection, and both parties must agree on the new balance for further transactions. The most recent transaction with both signatures determines the current balance. When making a payment, both parties sign a new exit transaction, invalidating previous ones. Exiting a channel doesn’t require counterparty involvement, and with access to multiple multisignature channels, funds can be transferred across the network. The LN has two types of channel closures: cooperative and non-cooperative. In a cooperative closure, one side initiates and both parties work together to close the channel, which is done immediately with one or more confirmations. In a non-cooperative closure, if one party disappears, a force closure may be necessary, which takes longer, usually around one to three days.
The LN offers a solution that enables fast and high-volume Bitcoin transactions between users without waiting for network confirmations. By opening Lightning channels off-chain, users can transact with each other indefinitely and only settle the final amount. Payments are made using Hashed Timelock Contracts (HTLCs). HTLCs are contractual arrangements employed in the cryptocurrency realm for facilitating conditional payments. Essentially, HTLCs enable payments in which the recipient must confirm receipt before a specified time or predetermined deadline, eliminating the need for custodial trust and enabling dynamic, open participation [10]. Payment routing in the LN is based on the balance of an edge between two nodes, and the distribution of the balance is unknown, so payments are sent through a trial and error process that is probabilistic in nature [11]. The LN enables users to transact without directly moving Bitcoins. Users lock up Bitcoin in a multi-signature address, maintaining a record of each party’s share of the funds. To settle, they submit the most recent address statement to the Bitcoin blockchain, allowing for fair distribution of the unlocked Bitcoin. Alice and Bob can use the LN to handle their transactions, generating invoices and making payments without actually transferring Bitcoin. Although closing the channel involves the usual Bitcoin fees, using the LN only requires fees for opening and closing the channel, providing instant and cost-free money transfers. In particular, as depicted in Figure 1, a LN transaction involves the following steps:
  • Alice and Bob, both with bitcoin wallets, agree to create a channel between them. Alice funds the channel with a specific amount (e.g., 2 BTC). Currently, only one user can fund a channel, but developers aim to enable both parties to contribute.
  • Both participants exchange public keys, which are required for BTC blockchain transactions.
  • A new BTC address, a "2-of-2 multisig address," is created using their public keys. This special address type requires signatures from both participants to validate a transaction.
  • Before the channel is built, a refund transaction is created to ensure Alice can retrieve her funds without trusting Bob. This transaction, signed by both parties, becomes valid once the Lightning channel is funded. It remains off-chain, shared only between Alice and Bob.
  • After validating the refund transaction, the funding transaction takes place, with Alice depositing 2 BTC into the multisig address. The Lightning Channel is now open for further transactions, and Alice can reclaim her Bitcoins through the refund transaction, which can be executed by publishing it on the bitcoin blockchain.
The LN could transform the digital payment landscape with its remarkably low fees, providing significant advantages to merchants burdened by high payment expenses. Credit card processing fees are a major issue for merchants since they frequently need to accept credit card payments. Unfortunately, these fees can erode profits, particularly for businesses operating on slim margins. Commonly, credit card companies like Visa1 , Mastercard2 , and American Express3 charge fees ranging from 1.5% to 3.5%. The same holds for remittance payments. According to a recent report from the World Bank, the average cost of sending remittances on a global scale is 6.3% of the transferred amount4. In the LN, routing nodes charge fees for forwarding payments via HTLCs, promoting efficient capital allocation. Channel fees are the difference between incoming and outgoing HTLCs for a routing node. Fees apply only to successful payments and are charged once per peer and per channel. Peers can set their own fee policies for their channels, allowing them to charge fees when pushing payments to neighbors. There are two types of fees: base fees, which are fixed amounts per forwarded HTLC, and fee rates, which are proportional fees based on the value of each forwarded HTLC5. At present, the median fee rate on the Lightning Network consists of a base fee of 1 satoshi (or 0,02€) and a fee rate of 0.00022 per satoshi [8].
The LN provides numerous benefits for businesses, such as enabling instant, low-cost remittance payments through companies like Strike [6]. In addition, the network’s integration with platforms like Shopify and payment provider Clover allows merchants to accept Bitcoin payments with ease and at lower costs than traditional card networks. As a result, the LN has the potential to be considered the standard monetary network for payments, providing nearly instant transactions, extremely low transaction fees, and increased capacity [5,12]. The LN can also facilitate financial inclusion for over 2 billion unbanked individuals worldwide, who are mainly concentrated in poorer parts of Africa, Latin America, and Asia [8]. This technology has the potential to provide greater access to financial services for these populations, improving their economic prospects.
The LN has experienced tremendous growth since its launch in 2018. The widespread adoption of both custodial and noncustodial LN wallets, its official integration in regions like El Salvador and Lugano and its integration with platforms like Shopify and payment provider Clover have proved to be advantageous for the LN. In particular, the number of LN nodes, which are computers running the LN software, has been steadily increasing. Additionally, the total capacity of the LN, which is the amount of Bitcoin that can be transacted through the network, has also been increasing. A crucial factor for the extensive adoption of the LN lies in the augmentation of nodes underpinning the network and the enhancement of channel capacity. These attributes hold considerable implications for the system’s security and functionality. As depicted in Figure 2, there is a linear progression in the growth of these components over time, which is also observed in the number of channels established. As of April 2023, the LN holds a bitcoin capacity of almost 5,600 bitcoins, with about 18,000 nodes operating on the network and nearly 80,000 unique channels connecting nodes from across the globe.

1.1. Motivation and contribution

Despite the growing importance of digital payments and the increasing interest in the LN as a solution for various transaction-related use cases, there is limited literature available on the characteristics of this nascent technology, the depth and breadth of the various LN-related applications as well as relevant adoption/implementation challenges. For example, some authors have focused on the LN’s development, potential non-monetary uses, along with legal challenges that may impact LN adoption [13]. Other authors discuss recent advancements and applications of the LN in various domains such as international remittances, energy trading, decentralized trade finance, micropayments, consumer IoT devices, food safety management and securities settlement [14,15,16,17,18,19,20,21]. However, it is not clear from the available literature the added value brought forward by the LN as well as the various challenges underpinning the adoption of the LN by merchants and the business sector. Therefore, the motivation behind this study is to contribute to the understanding of the LN’s potential in enhancing business operations and its applicability across different sectors, while taking into account adoption/implementation challenges.
This gap in research represents a significant opportunity for further exploration and analysis, particularly as businesses across various industries continue to seek innovative, cost-effective, and secure payment solutions. By addressing the current gap in the literature relevant to the particularities of the LN, this research will contribute to the broader understanding of digital payment technologies and their impact on various industries. Besides, by providing a comprehensive analysis of the business applications of the LN, this research aims to expand the knowledge base and offer valuable insights for businesses, policymakers, and researchers. Ultimately, the findings of this study will help businesses make more informed decisions about adopting and leveraging the LN to improve their operations and enhance customer experiences, while considering adoption/implementation challenges. Therefore, the primary contributions of this research include:
  • An exploration of the various technical characteristics of the LN as well as its main attributes with respect to network’s topology, performance, privacy and security, among others. By examining these aspects, businesses and the research community can gain insights into how the technical characteristics of the LN can give rise to a new global, monetary network.
  • An exploration of applications and use cases of the LN across different industries, including retail, e-commerce, and remittance services, particularly emphasizing its low transaction costs, near-instant transaction speeds, and scalability. By examining these practical applications, businesses can gain insights into how the LN can be effectively utilized to address specific transaction-related challenges.
  • Identification of potential challenges and limitations associated with the LN, such as liquidity constraints, privacy concerns, and technical complexities. This information will provide businesses and policymakers/researchers with a more comprehensive understanding of the LN and inform future research and development efforts.
The rest of the paper is organised as follows. In Section 2 we present the methodology adopted for conducting our review. The classification of the available LN-derived literature is presented in Section 3. In Section 4 we classify the prevalent LN-related business models. In Section 5 we discuss various challenges and open issues prevalent to the LN. The paper ends with some concluding remarks.

2. Methodology

We have chosen a narrative review methodological approach for conducting our research. In this section we provide background information with respect to the methodological underpinnings of narrative reviews, proper justification for choosing such a methodological approach as well as the relevant steps for practically conducting our research.
A narrative review is a form of literature review that focuses on interpretation and critique of a body of literature to provide a compelling argument based on primary evidence [22]. It summarizes and combines evidence from various sources, such as primary studies, theoretical papers, and other relevant literature, without strict methodology or inclusion and exclusion criteria [23]. The authors’ expertise and interpretation play a crucial role in narrative reviews, but they should strive for objective conclusions based on the reviewed literature [24].
Narrative reviews have various benefits. In particular, narrative reviews provide a comprehensive summary of a topic, considering various types of evidence sources, historical and theoretical perspectives, and identifying gaps in the literature [22]. They offer a broader and more flexible perspective on a subject, allowing for greater interpretation and critique, which can help pinpoint areas requiring further research [23]. Narrative reviews are accessible and easier to read, making them valuable for researchers, clinicians, and policymakers seeking a quick understanding of the current state of knowledge on a particular subject [24]. They can also be particularly useful when limited empirical evidence is available or when the research question is intricate or multi-dimensional [24].
Compared to systematic literature reviews, narrative reviews have attracted significant criticism. However, different approaches to literature reviews, such as narrative and systematic reviews, should be considered complementary rather than hierarchical, as each type of review serves distinct purposes and offers unique insights [22,23]. Policymakers, stakeholders, and research commissioners should reassess the lower status assigned to narrative reviews and recognize their potential to enhance knowledge within a field [23]. It is crucial to avoid being misled by a false hierarchy of secondary evidence and acknowledge the limitations of systematic reviews [23]. Meta-narrative reviews, which aim to provide a comprehensive overview of the research landscape on a particular topic across multiple traditions or disciplines, can follow the RAMESES publication standards for transparent and comprehensive reporting, emphasizing the importance of being open to different perspectives, critical debate, and reflection on biases [25].
This study will employ a narrative review methodology using a semi-systematic approach to examine new and emerging business models empowered by the LN as well as characteristics of the LN and relevant adoption/implementation challenges. The choice of a narrative review over a systematic review is driven by three primary arguments. First, the nascent nature of the LN and its applications in business models requires a more exploratory and flexible approach to account for the limited and diverse research available. In particular, a narrative review can provide a deeper exploration of underlying concepts and relationships between them. In a systematic literature review, the focus is on quantitatively synthesizing the data, which may not be appropriate for a topic with limited literature. A narrative review, on the other hand, allows for a more qualitative exploration of the underlying concepts and relationships, which can be valuable for developing a deeper understanding of the topic. Second, narrative reviews can incorporate a wider range of sources, such as grey literature, which may be particularly valuable when studying emerging technologies. Finally, narrative reviews are better equipped to address the evolving nature of the LN, as they can capture the rapid advancements and shifting perspectives in this dynamic field.
We opted for a semi-systematic approach rather than a mere narrative review approach for various reasons. A semi-systematic approach to literature reviews combines elements of both systematic and narrative reviews, offering a balance between rigor and flexibility. This approach involves a systematic search for literature with predefined search terms and inclusion criteria, while allowing for additional sources, such as grey literature or expert opinions, to provide a more comprehensive view of the topic. The researcher then employs narrative synthesis to analyze and present the findings, organizing sources thematically or chronologically and providing a narrative description of key findings and implications. A semi-systematic narrative review can be particularly useful for topics with limited literature or when a fully systematic review is not feasible due to time or resource constraints, maintaining a structured and transparent approach to the review process. To this end, we have utilized various aspects of the approach outlined in [26] to conduct our review. In particular, our review protocol comprises five steps: 1) Defining the scope of the review, 2) Search strategy, 3) Assessing the eligibility of the retrieved literature, 4) Content Analysis and 5) Synthesis and Reporting.

2.1. Defining the scope of the review

The first step in conducting a narrative review is to define the scope of the review by setting relevant research questions and objectives (as seen in Table 1. The research questions should be broad enough to capture the key themes and trends in the literature, but focused enough to provide a clear direction for the review.

2.2. Search strategy

The search strategy for this narrative review involved a systematic search for literature using predefined search terms and inclusion criteria. Our primary source of locating LN-related papers was the Scopus electronic database. We conducted a systematic search in February 2023 (which was updated in mid-April 2023) without any time-frame limitations. We used the term "Lightning Network" to search in the titles of all available literature in Scopus. For streamlining our assessment, we also used Google to locate grey literature sources, especially reports covering the current status of the LN.

2.3. Assessing the eligibility of the retrieved literature

Given the relatively limited literature relevant to LN, we incorporated all English papers found in Scopus into our analysis. It is worth noting that some papers were excluded due to their focus on meteorology (as the term "lightning" generates a conflict). As a result, our analysis encompassed all pertinent papers published in journals, conference proceedings, and book chapters, without considering quality assessment approaches.

2.4. Content Analysis

Once the relevant articles have been selected, we extracted the data from each study. In particular, we employed a thematic content analysis approach to extract research areas and common themes from the relevant literature. For the thematic content analysis of the chosen literature, we utilized qualitative analysis software (MAXQDA2020).
Figure 3. Distribution of the publication types
Figure 3. Distribution of the publication types
Preprints 72989 g003

2.5. Synthesis and Reporting

In the last step of our methodological approach we provide a synthesis of the available literature and we report the main research findings. The synthesis process entails organizing sources thematically, based on research questions, and delivering a narrative description of the findings and their implications. We have tried to synthesize the data to identify key themes and trends in the literature, offering a critical analysis of the strengths and weaknesses of existing research. Additionally, we provide recommendations for future research in the field.

3. Literature review

Based on the available literature, in the sequence we provide a classification of the various topics addressed with respect to the LN. The available literature on the topic of LN can be classified into four main areas. The first area is network topology and modeling, which involves the study of the structure and behavior of the network. The second area is security and privacy, which is concerned with protecting user data and preventing unauthorized access to the network. The third area is performance and optimization, which involves improving the efficiency and scalability of the network. The final area is use cases and applications, which explores the various ways in which the LN can be utilized in real-world scenarios.
Before delving into the details of the available LN- related literature, a bilbiometric analysis is deemed necessary. In total, we retrieved sixty-four (64) papers from Scopus and three (3) reports from Google. Figure 3 provides the distribution of the publication types, indicating that the majority of the publications are journal articles (32) followed by conference proceedings (23) and book chapters (9). Figure 4 shows the year-wise publication trend. The data suggests a steady increase in the number of publications from 2017 to 2023, with a sharp rise from 2020 onwards. In 2020, the number of publications jumped to 20 from 7 in the previous year. Figure 5 provides insights into the research focus of the publications. The majority of the publications focus on network topology and modeling (19) followed by security and privacy (22), performance and optimization (15), and use cases and applications (8). This indicates that network topology and modeling and security and privacy are the two most prominent research areas so far. It is clear form the bibliographic analysis that the majority of the publications are journal articles, and there has been a significant increase in the number of publications since 2020. Furthermore, network topology and modeling and security and privacy are the two most prominent research areas in the LN literature.

3.1. Network topology and modeling

Arguably, early research on the LN has focused on the topological properties, modeling and analysis of the network [27], especially with respect to its scalability properties, sustainability of the protocol and centralization features. The LN, an off-chain transaction protocol, has the potential to address Bitcoin’s scalability issues, as shown in studies by [28] and [6]. [29] provides an introduction to the LN, covering the setup process, tool gathering, testing, and possible future applications and developments. Several authors discuss the centralization and security concerns in the Bitcoin LN. [30] find that the network is becoming more centralized, with 10% of nodes holding 80% of the bitcoins, making it potentially vulnerable to split attacks. [5] conducted a systematic measurement of the LN’s topology and performance, providing insights for future implications. [31] model the emergence of the LN as a percolation process and investigate how transaction volume and size distribution impact its feasibility. [32] propose a supernodes-based pooling architecture to address micropayment scalability and liquidation challenges in the LN, showing improved routing scalability and liquidation under various settings. [11,33] developed a Probabilistic Logic Programming model to better understand the routing process, while [34] analyzed the topology of the network, focusing on centrality measurements, churn rate, and clustering coefficients. [35] compared the network’s topological properties with the Barabasi Albert Model and found significant differences, suggesting that the Barabasi Albert Model is not a suitable choice for autopilot functions (the process of automatically establishing payment channels between nodes). It should be noted that Studies have found that the Bitcoin LN is becoming increasingly centralized, with few highly active nodes [36]. This centralization makes the network more compatible with a core-periphery structure and vulnerable to attackers within the system [30]. The network’s robustness against random disruptions and improvements in efficiency has also been noted [36]. [37] propose using logic programming to represent and query the LN, which can help study the network’s evolution over time. [38] present a large measurement study of the LN, providing insights into its structure, distribution, channel behavior, and fairness, which can be useful for performance improvements and security considerations.
The topological characteristics of the LN, particularly its centralization features, have been linked by certain authors to security-related factors and potential vulnerabilities. With respect to the topological features and security, a common theme among several studies is the increasing centralization of the Lightning Network and the resulting vulnerabilities. Researchers have investigated the network’s topology and found that it exhibits scale-free and small-world characteristics, making it susceptible to targeted attacks and DDoS attacks. [39] and [40] both find that the Bitcoin LN is becoming more centralized, with a decreasing Nakamoto coefficient, increasing Gini coefficient, and a core-periphery structure. To this end, several researchers have studied the topological properties of the LN and propose methods to improve the network’s structure for enhanced security and potential [41]. In [42] the researchers conducted an empirical centrality analysis, focusing on the betweenness centrality distribution of the routing system. They developed a TimeMachine tool to examine network evolution, using millions of channel update messages as data. The findings show that while the LN is mostly decentralized, a few nodes can attract a considerable portion of transactions, leading to some skew.

3.2. Security and privacy

A large body of the available literature addresses aspects of security and privacy of the LN as well as mitigation tools. With respect to security, the LN is vulnerable to various attacks, such as channel balance disclosure attacks [43], channel exhaustion, and node isolation attacks [44]. Several researchers have proposed countermeasures to address these vulnerabilities and provided attack strategies and metrics to evaluate adversaries’ advantage [43,44]. [45] analyze the key agreement protocol of the LN, identifying a lack of authenticity for the responder and proposing an amendment to the protocol to ensure authenticity. [46] discuss the forensic implications of collusion attacks in the LN and the potential use of LN for money laundering activities. [47] introduce a game-theoretic model for analyzing griefing attacks in HTLCs, proposing HTLC-GPZ, an improved countermeasure that offers better protection and reduces coins locked in the network. [38] also observe increased inequality in the network. This centralization increases the network’s vulnerability to security threats like split attacks and targeted attacks, contrasting with the goal of a fully decentralized network [39,40].
Research has identified several vulnerabilities in the LN, including the wormhole attack, anonymity issues, and scalability limitations [48]. [9] discuss the LN’s properties and identify security and privacy issues while proposing solutions to enhance its robustness. The network’s increasing centralization makes it susceptible to split attacks [30]. Balance disclosure attacks [49] and balance lockdown attacks [50] pose additional threats. Security guarantees depend on the properties of the underlying ledger and protocol participants’ availability [51]. [52] focus on the confidentiality of data and user authenticity within the protocol. [53] address the Griefing Attack problem, proposing countermeasures and a new payment protocol to preserve privacy and prevent attackers from blaming honest parties. [12] explore a systemic attack on the LN and propose mitigation strategies to reduce the network’s attack risk. [54] proposed TEE Guard, a scalable watchtower architecture leveraging Trusted Execution Environments for the LN. TEE Guard is deployable with existing protocols, economically viable for third-party watchtower services, and includes a mechanism for verifying continuous watchtower operation.
With respect to privacy, [55] develop a new probing model that accounts for parallel channels and propose jamming-enhanced probing to extract full balance information. They also discuss potential countermeasures such as new forwarding strategies, intra-hop payment split, rebalancing, and unannounced channels. [56] conducted blockchain analysis to identify LN transactions, channel setups, and teardowns, providing insights into off-chain transaction visibility and showing that only partial topology of payment channels can be obtained from blockchain data. Studies have focused on enhancing privacy within the LN. [57] applied approximate differential privacy to improve transaction privacy, while [58] introduced space-efficient key management schemes to reduce storage complexity. [59] presented Torrent, a balance discovery method that overcomes limitations of existing methods by utilizing multi-path payments and a novel max flow algorithm. [60] identify an enhanced channel balance disclosure attack that exploits parallel transactions to reveal the balance of any channel in the network and discuss potential countermeasures against this attack. Meanwhile, [61] propose a new-generation hybrid botnet called LNBot, which covertly communicates over the LN, raising concerns about potential countermeasures to detect and minimize its impacts. [62] analyze privacy concerns and reveal potential attacks that exploit publicly available information.

3.3. Performance and Optimization

Several studies address issues of network performance and Optimization, in particular in terms of routing, efficiency, balance management, fees and re-balancing mechanisms. [63] introduce CLoTH, a simulator for HTLC payment networks that helps predict potential issues and estimate optimization impact. [64] propose a new fee policy for LN nodes to improve long-term performance and network balance, along with a multipath routing payment scheme that reduces fees. [65] find a significant association between LN adoption and reduced blockchain congestion, suggesting improved payment efficiency for Bitcoin, but discuss potential centralization issues. Another theme involves the optimization of global transaction paths and efficiency in the LN. [66] propose a blockchain-edge scheme using dynamic programming to optimize routing fees, improving food safety management. [67] present a new construction of anonymous multi-hop locks that are secure, efficient, and LN-compatible. [68] introduce a scalable algorithm for solving the Maximum Betweenness Improvement Problem in the LN, while [69] propose a two-layer structure for aggregating payment requests, extending the network’s bandwidth. [70] introduce supernodes and supernode-based pooling to improve micropayment scalability and liquidation. In [71], the authors analyze the relationship between Bitcoin market conditions and the efficiency of the LN, finding that its functioning is not significantly influenced by the underlying cryptocurrency’s market performance. Finally, in [72] the authors find that payment attempt failures are more frequent in the LN due to the convergence delay. They analyze the delay’s causes and suggest potential improvements to the protocol, including simple parameter changes or a complete protocol overhaul. They confirm their findings through a simulation of the LN gossip protocol.
Several researchers have proposed methods to improve payment and balance management in the LN. [73] introduced CLoTH, a simulator that models payment-channel networks and analyzes multi-path-payment features to minimize payment failures. [74] developed a non-intrusive balance tomography method for accurately inferring channel balances without creating fake invoices. [75] introduce a network imbalance measure and a greedy heuristic to improve the balance of the LN, showing that this approach significantly increases the success rate of single unit payments and the median possible payment size. Researchers have studied the effects of payment channel fees on the LN, revealing a trade-off between short path lengths and low channel imbalances [76]. [77] analyzed the network’s performance focusing on hub influence, channel rebalancing, and service-provider scenarios, indicating resilience to hub removal and improved payment failures with passive rebalancing.

3.4. Use cases and applications

Several studies discuss recent advancements and applications of the LN in various domains such as international remittances, energy trading, decentralized trade finance, micropayments, consumer IoT devices, food safety management and securities settlement. For example, international remittances have benefited from the LN, with [14] demonstrating its viability for faster and more cost-effective transactions. Meanwhile, [15] propose a mobile energy trading scheme based on the LN and smart contracts, addressing transaction latency and security concerns. In the realm of decentralized trade finance, [16] present a model leveraging the LN, enabling importers and exporters to engage in trade finance via a decentralized network. Additionally, [17] explore new business models enabled by feeless micropayments in cryptocurrency, such as shorter subscription times and prosumers selling self-generated data. For consumer IoT devices, [18] review existing micropayment approaches and discuss future research challenges. [19] propose a protocol for IoT devices to use the LN’s functions through a gateway LN node, offering a feasible and secure solution for resource-constrained devices. [20] assess the LN’s potential to support micropayments in IoT ecosystems by integrating it into the bIoTope H2020 project and designing an algorithm for payment channel fee reduction. In the food safety management domain, [21] propose a lightning network-blockchain system, demonstrating its potential for practical adoption by ensuring data authenticity and solving the throughput bottleneck issue.

4. Business models empowered by the Lightning Network

The Bitcoin community takes a cautious approach to modifying its base layer to ensure the preservation of decentralization, stability, and security. Layer 2 solutions, such as the LN, tackle the scalability trilemma by offering near-instant and affordable transactions without compromising security or decentralization. Since Bitcoin’s base layer isn’t well-suited for small transactions, the implementation of additional layers becomes crucial. Layer 2 solutions, in conjunction with Layer 3 applications like SPHINX and ZEBEDEE, deliver decentralized and censorship-resistant experiences in areas like social networking and gaming. These advancements uphold Bitcoin’s core principles while expanding its capabilities and practical applications.
The LN has the potential to increase the adoption of Bitcoin and other cryptocurrencies by making them more usable and accessible for everyday transactions. This could lead to increased business opportunities and new use cases that were previously not possible on the Bitcoin blockchain and the cyberspace in general. In the original paper describing the LN published by [10], the authors portray four (4) possible use case scenarios for the LN, namely instant transactions, micropayments, financial Smart Contracts and escrow and cross-chain Payments. In the sequence, we provide a classification of the various business models (Figure 6) empowered by the LN as derived by the relevant literature (both grey and scientific).

4.1. Micropayments

The LN enables micropayments on the Bitcoin blockchain, creating opportunities for new business models that rely on microtransactions, such as pay-per-use services, in-game purchases, and online content tipping [10]. In particular, the LN holds significant promise in transforming micropayments, providing businesses and individuals with avenues to enhance productivity and monetize their offerings. Micropayments have existed since the mid-1990s but were limited by high transaction fees. LN’s low fees make it an essential component of micropayment channels, supporting use cases like value-for-value models, where content creators trust users to evaluate the worth of the content and compensate accordingly [8]. The LN also facilitates nanopayments, reducing financial inefficiencies and optimizing business models by minimizing costs from payment processing and intermediaries.
Blockchain micropayments can impact crowdsourcing by enabling direct donations to recipients, eliminating intermediaries, and reducing overhead costs. However, this may require a rating and auditing system to prevent fraud [17]. Pay-per-use models can leverage micropayments to provide shorter subscription durations, improving consumer choice and access to content. Digital property rights, royalties, and referrals can also benefit from the simplicity and low minimum limits of micropayments. The LN can be used for purposes beyond payments, as demonstrated by the Zion app, which allows users to share content in an encrypted message through minuscule Lightning payments, maintaining privacy and avoiding central intermediaries [13].
The LN is an ideal solution for high-frequency payments across various sectors due to its instant, affordable, and relatively secure transactions. In stock trading, it can streamline high-frequency trading by minimizing latency and speeding up trade execution, optimizing profits for trading firms. In retail, it can improve customer experience through fast and secure payments at various outlets, complementing contactless and mobile payment methods. Additionally, online advertising platforms can benefit from the LN’s capacity to manage real-time bidding systems effortlessly, ensuring smooth auctions. In gaming, incorporating the LN results in seamless in-game purchases and microtransactions, enhancing user experience. Finally, freelance marketplaces can utilize the LN’s quick and dependable payment processing to ensure timely payments, fostering trust and satisfaction among users.
Another interesting micropayment use case scenario refers to employee and customer rewards. For example, MicroStrategy has developed the MicroStrategy Lightning Rewards platform6. The platform provides enterprises with a tool to incentivize any behavior and maximize engagement with instant Satoshi redemption. The Lightning Rewards platform is designed for unlimited scalability and the highest security with an open, extensible microservices architecture. Companies can create and configure reward rules via the administrative portal, and build rules that combine events, users, dates, and reward amounts. The platform allows any enterprise to reward their employees, customers, partners, and prospects for their engagement, and is expected to integrate directly into MicroStrategy Lightning as an out-of-the-box application or payment partner.

4.2. Cross-border and remittance payments

The LN’s efficiency makes it suitable for cross-border payments, reducing transaction friction for businesses and financial institutions. LN’s low fees and instant transactions can reduce the $40 billion lost annually in remittance payments, benefiting both the sender and the recipient regardless of their currency preference [8]. The LN allows for quick and inexpensive transfer of funds in various currencies, which are automatically converted into bitcoins and then into the local currency of the receiver. This helps to reduce processing times and costs associated with traditional remittance services. The LN can also assist the unbanked population, which comprises over two billion people worldwide, by providing easy access to financial services.
Companies like Strike and Bottlepay use it for global payments due to its speed, low cost, and convenience. In particular, Strike7 is a payment application that uses the LN layer to provide fast and cost-effective transactions. It allows individuals and businesses to send and receive money instantly and without fees, using only a smartphone and an Internet connection. Strike’s new feature enables companies to send US dollars through the LN, without having to deal with the volatility of bitcoin. Payments can be completed in seconds, and currently there are no fees involved to send or receive payments or to withdraw funds from your account. The app also makes it easy to invoice and track payments, and it integrates with popular accounting software. Galoy8, a Lightning enterprise software provider, offers cost-effective risk hedging solutions for exchange rate fluctuations (stablesats.com). Bitcoin’s high liquidity, combined with the LN’s capabilities, allows users to quickly convert and transfer funds across borders.
It is clear form the above-mentioned business solutions that the LN enables businesses to expand their customer base globally, without the need for middlemen or high fees. We should also note that the LN has the potential to benefit the banking industry by reducing transaction costs, increasing transaction speed, and enabling micropayments. The LN can be used to facilitate faster and cheaper payments between suppliers and buyers in supply chain finance. By opening a payment channel, immediate payment for goods or services delivered can be received and subsequent transactions can be settled instantly and at a lower cost. This reduces payment delays, increases speed and efficiency, and lowers costs for both suppliers and buyers.

4.3. IoT and Machine-to-Machine payments

The Internet of Things (IoT) has vast potential, but one obstacle to its full realization is the lack of a straightforward monetization model. Micropayments on the blockchain could be the solution, enabling data collection and sharing for various applications, such as traffic planning and road maintenance, while compensating users and protecting their privacy [19]. Machine-to-machine (M2M) payments through the LN can facilitate direct, automated, and anonymous payments for services like electric car charging or autonomous taxis. Such payments can be split and forwarded to different parties, streamlining transactions and reducing administrative costs [19]. In the energy market, financial inefficiencies hinder progress, with payments for electricity taking longer to process than the electricity flow itself. The LN and smart contracts could significantly reduce these inefficiencies by allowing for instant payment routing and M2M payments for electricity consumption [15]. A mobile energy trading scheme utilizing the LN and smart contracts has been proposed, featuring an off-blockchain exchange of value to eliminate transaction lag [15]. Additionally, a study examined the requirements of various blockchain technologies for IoT micro-payments, benchmarking the LN’s performance against similar solutions, integrating it into an existing IoT ecosystem, and designing a novel algorithm for payment channel fee reduction [20].

4.4. Decentralized Exchanges

Centralized exchanges (CEXs) serve as the primary venue for trading digital assets, providing infrastructure similar to that of traditional equities markets. CEXs facilitate the exchange of tokens and currencies, offering liquidity and enabling price discovery. However, due to the unregulated nature of the cryptocurrency market and the significant exchange counterparty risk exposure, investors are subject to significant risk of loss. Public records indicate that billions of dollars have been stolen from prominent CEXs by hackers over the last few years, highlighting the vulnerabilities of these centralized platforms [78].
On the other hand, a decentralized exchange (DEX) is a type of cryptocurrency exchange that operates on a decentralized, peer-to-peer (P2P) network, rather than a centralized platform. Unlike centralized exchanges, which are owned and operated by a single entity and require users to deposit their funds onto the exchange’s platform, a decentralized exchange enables direct, P2P trading between users without the need for a central authority [78,79]. DEXs can be implemented using an on-chain order book, which records every order on the blockchain, or an off-chain order book, which records orders elsewhere and only uses the blockchain for settlement [80]. Decentralized exchanges (DEXs) can use automated market makers (AMMs) instead of an order book system. AMMs allow traders to place orders with the market maker, which algorithmically provides a price, rather than relying on matches between price and volume orders provided by buyers and sellers. Liquidity for an AMM to act as a DEX is provided by owners of various tokens placing their tokens within a liquidity pool. AMM prices are determined algorithmically, but can be aligned with external reference markets through arbitrage or allowing the reference market to act as an oracle [78,80]. The LN and it’s characteristics provide an interesting fit in this use case scenario. In [16], the authors propose a decentralized trade finance system that leverages smart contracts and blockchain technology to improve efficiency, security, and accessibility. This system increases trust and transparency, enabling smaller businesses to participate in the global economy and contribute to economic growth. The model involves a community-owned liquidity pool that facilitates trade finance for importers and exporters using the LN. The platform validates invoices and provides funds from the liquidity pool, with the platform being compensated after trade completion. Participants receive trade tokens as incentives for successful transactions, promoting good behavior within the network.

4.5. Transfers of digital assets

The LN offers an innovative solution for transferring digital tokens, including stablecoins, using the RGB protocol9. This protocol, a set of open-source smart contracts, provides a scalable and confidential way to execute complex transactions. RGB leverages the Bitcoin blockchain for state commitment while keeping smart contract code and data off-chain. This approach mitigates saturation and excessive resource usage, common issues in other blockchain-based smart contract systems. By employing Bitcoin transactions and Script as an ownership control system, smart contract evolution is defined through an off-chain scheme, with all validations occurring on the client side. RGB smart contracts are directed acyclic graphs (DAGs) of state changes, following specific rules dictating their evolution. Fungible assets in RGB follow the LNP/BP RGB-20 specification, while non-fungible tokens (NFTs) adhere to the LNP/BP RGB-21 specification. RGB-20 allows for the creation, management, and transfer of fungible tokens, while RGB-21 enables NFT creation and management, including custom data attachment via an engraving procedure.
The RGB protocol offers several advantages over other NFT platforms, such as reduced dependence on expensive blockchain storage and the elimination of the need for specialized data management solutions or the InterPlanetary File System (IPFS). Instead, Bifrost, a LN extension, is utilized, providing end-to-end encryption, built-in DRM encryption, and ownership management. Furthermore, RGB supports multiple monetization methods beyond just selling the NFT. The LM’s integration of stablecoins and other digital assets paves the way for decentralized exchange (DEX) functionalities directly on LN. This enables users to atomically swap Bitcoin against other assets with the same speed and cost of a Lightning payment, eliminating counterparty risks. Consequently, more users may transition away from centralized exchanges, removing the need to trust third parties with their collateral.

4.6. Lightning Network-related services

The LN ecosystem consists of a diverse array of companies and participants, each contributing to the network’s maintenance and growth in their unique way. Key LN-related services and participants include LN nodes, Lightning wallet providers, LN service providers, and LN developers. These participants work together to create a more decentralized, democratic, and efficient payment system for Bitcoin blockchain users. Some popular players in this ecosystem include Zap, BlueWallet, Wallet of Satoshi, Bitrefill, Lightning Labs, and ACINQ.
The main players within the LN ecosystem are merchants accepting payments, developers building LN native projects, existing crypto companies adopting LN technology, wallet and gaming app developers focusing on consumer use cases, and users engaging in earning, stacking, tipping, and other micropayment activities. The growth of the ecosystem is driven primarily by LN native projects, focusing on building the infrastructure layer. Financial infrastructure and LiFi solutions are also significant segments. Gaming is the largest category within the ecosystem, followed by wallets and payments, and merchant services.

5. Discussion

Arguably, the Bitcoin network exhibits a layered scaling structure. At its foundation lies the primary Bitcoin blockchain, which serves as a platform for recording and settling transactions. However, due to constraints in transaction throughput and escalating fees, supplementary layers have emerged to tackle these scalability challenges. The most notable example of a second-layer solution within the Bitcoin network ecosystem is the LN, which facilitates swift, cost-effective transactions via off-chain payment channels. Consequently, the Bitcoin blockchain could operate as a global, distributed financial infrastructure and monetary value settlement protocol, while the LN could act as a worldwide decentralized payment system. These stratified scaling solutions pave the way for a plethora of payment options and innovative business models within cyberspace, as described earlier in our analysis.
The LN brings forward significant added value for both the economy and society. The conventional banking system is often complicated, resulting in higher costs and wasted time for merchants and customers. Remittance payments, which are essential for many developing countries, have high fees averaging 6.4% in 2021. The LN can help reduce these fees and positively impact millions of people who rely on remittances for their livelihood [8]. The LN offers instant, borderless, and intermediary-free payments with instant settlement and lower fees, leading to potential discounts for customers and reduced chargeback risks for businesses. Besides, the LN has the potential to revolutionize how businesses perform their financial transactions and improve customer experience. Although it might sound as an overstatement, but we believe that businesses may face several risks by not paying attention to disruptive technologies like the LN. Failure to adopt this technology can result in missed opportunities, lack of competitive disadvantage, vulnerability to disruption, and negative impact on reputation and customer trust. Early adoption of disruptive technologies can give businesses a competitive advantage over those who are slower to adopt. It is important for businesses to stay up-to-date with emerging technologies, understand their potential benefits and risks, and develop strategies to adapt to these changes to remain competitive in the market.
Predicting the scale of the LN adoption is a challenging task, especially considering that we are still in the early stages of this emerging technology. With limited knowledge of how various players will respond to the technology, it becomes challenging to anticipate the extent of its adoption. In this context, we have identified a set of catalysts that could drive the adoption of the LN. In particular, we try to understand the strategic decision-making of various players and anticipate the potential outcomes of their interactions in view of certain catalysts that could accelerate the adoption of the LN. Such an approach provides insights into the complex dynamics involved in the adoption of LN, which can inform the development of strategies and policies to support its growth and adoption. To this end, we have identified the following catalysts that we expect will drive the LN’s adoption in the long run:
Sustainability of the Bitcoin network: The LN relies upon the Bitcoin blockchain network and, therefore, the sustainability of the underlying Bitcoin network becomes crucial for almost all aspects and functionalities of the LN. Although the sustainability of the Bitcoin network depends on a multitude of factors, we strongly believe that energy consumption is found at the centre of the current debate with respect to the environmental costs associated with Bitcoin mining and the maintenance of the Bitcoin network (namely through the Proof of Work consensus mechanism).
The energy consumption of the Bitcoin network is significant, and although direct comparisons with the financial sector are difficult, Bitcoin mining has been found to be highly unsustainable in some cases [81]. However, according to other studies, Bitcoin mining operations can contribute to reducing greenhouse gas emissions and support the transition to renewable energy [82]. Besides, other studies suggest that Bitcoin mining’s environmental impact is lower than that of traditional banking systems and that its negative impact could be mitigated by using renewable energy sources [83]. The environmental impact of Bitcoin mining may decrease per terahash (TH) mined in the future due to improvements in mining equipment efficiency and geographical distribution of miners [84]. A recent study suggests that Bitcoin mining in US states that have cheap and sustainable electricity, high share of renewable energy, and low electricity prices could be economically viable, and carbon capture technology could be a cost-effective solution for reducing CO2 emissions [85].
It is worth noting that Bitcoin miners utilize stranded energy assets in remote areas, which would have been wasted otherwise, and they reduce methane emissions by capturing waste methane from industrial processes and converting it into hash rate for the Bitcoin network. Therefore, in the near future, Bitcoin mining could transition from a “low carbon” and “net zero” mining process to a “Climate positive” global monetary infrastructure directly linked to net greenhouse gas (GHG) emissions reductions and corresponding net positive climate benefits. According to a recent report published by the Bitcoin Mining Council, which represents 53 mining companies accounting for 48.4 percent of the global network, the amount of global energy used by Bitcoin mining is inconsequential (17bps), and it generates minimal carbon emissions (11bps). Although the hash rate of Bitcoin mining has increased by 45% YoY, energy usage has only increased by 25% YoY due to improved efficiency (16%). Furthermore, Bitcoin is leading the industry in sustainability with a sustainable energy mix of 58.9% [86].
Inclusiveness, neutrality and censorship-resistant properties of the LN:
While the LN primarily serves as a scaling solution to address Bitcoin’s transaction throughput limitations, it does have some properties that can be seen as inclusive, neutral, and censorship-resistant. This is particularly true if we consider the economic polarization observed in nowadays and the way global financial assets are used [87]. For instance, SWIFT, despite emphasizing its apolitical nature, has become a geopolitical tool that could be compromised and weaponized [88].
On the other hand, LN nodes operate in a decentralized network, which means that there is no central authority controlling the network. This makes it a neutral platform, with no single entity controlling access or influencing the flow of payments. Additionally, LN payments are encrypted and routed through multiple nodes, making it difficult to track or censor individual transactions. In addition, the LN enables micropayments, which allows for a greater degree of inclusiveness by enabling transactions that would otherwise be too small to be economically viable on the Bitcoin blockchain. This makes it possible for individuals and businesses with lower income or limited access to traditional financial services to participate in the digital economy. However, as mentioned previously, the LN is not entirely immune to centralization or censorship. While LN nodes are currently operated by a diverse group of individuals and organizations, it is possible for certain nodes or groups of nodes to gain a significant degree of control over the network. Additionally, while censorship-resistant, LN payments are still subject to the laws and regulations of the jurisdictions in which they operate.
Decentralized ownership property rights and financial gains:
The global monetary system depends on centralized structures, with banks and central banks managing and maintaining payment infrastructure. While providing stability and oversight, these centralized systems may lack flexibility, accessibility, and decentralized control offered by the LN [89]. The LN serves as a tool for ordinary individuals to attain decentralized ownership property rights and financial gains, allowing users to develop and maintain their own nodes, making them owners of a global payment infrastructure. This decentralized ownership fosters a more democratic payment system, where users have greater control and contribute to the network’s security and success.
The LN also enables users to benefit from lower transaction fees and faster processing times. It promotes decentralized ownership and financial gains by allowing node operators to earn interest income without default risk, through a unique mechanism where operators provide the digital energy needed to route bitcoins while retaining custody. By opening payment channels and locking up bitcoins, operators facilitate faster, off-chain transactions and earn fees for routing payments. Continued custody of bitcoins with node operators ensures decentralized ownership and eliminates the need for a centralized authority. HTLCs provide a secure, trustless environment, with locked-up bitcoins as collateral, guaranteeing payment to node operators without default risk.
It’s no exaggeration to say that we foresee a prosumer model in the context of the LN. The term "prosumer" refers to individuals who are both producers and consumers, a concept that has similarities to business models involving external parties in the value chain architecture, such as in the energy sector. In the case of the LN, users can develop and maintain their own nodes, effectively making them owners of a global payment infrastructure and allowing them to contribute to the network’s overall security and success. At the same time, they benefit from the lower transaction fees and faster transaction times that the LN offers. Therefore, the prosumer model in the LN is similar to the energy sector’s prosumer concept, where individuals both produce and consume energy. In this case, users contribute to the payment infrastructure (production) while also benefiting from its services (consumption). This decentralized and democratic payment infrastructure empowers users to take control of their participation in the network and can lead to a more robust and resilient system.

5.1. Open issues and adoption challenges

Despite its promising advantages, the LN remains in the early stages of development and adoption. Its current state, characterized by a limited number of peers and channels with restricted capacities, presents several challenges and risks that must be addressed to facilitate its widespread acceptance as a global payment system, as seen in Figure 7. This explains a number of weaknesses that have been observed through simulations such as in the work of [63]. In the sequence, we provide a classification of the main adoption challenges prevalent to the LN.
Privacy and security: Privacy and security are critical components of any financial system, and the LN is no exception. In recent years, several researchers have conducted investigations into the privacy and security issues that may arise in the context of the LN. The most significant issues identified so far include the risk of network breaches, routing attacks, and node privacy. While these concerns are not unique to the LN and affect other payment systems, they are particularly relevant to the LN due to its decentralized nature. The main security and privacy challenges of the LN include:
  • Channel balance privacy: the risk of exposing channel balances during routing, which could reveal sensitive information about users’ funds. For example, the balance disclosure attack could reveal the balance of a channel by carrying out multiple non-finalized payments. The use of a multi-payment method, called Torrent, has been proposed by [43,59] as a mitigation strategy. Additionally, an attacker could obtain sensitive payment information by controlling just 2% of nodes, as presented in [48], by performing a wormhole attack. To decrease the exposure to this risk, users are suggested to open channels only with trusted parties.
  • Security of payment channels: payment channels could be insecure, particularly in scenarios involving channel closure or uncooperative participants. For example, as mentioned in [12], an attacker could steal funds from nodes on the LN by causing congestion on the Bitcoin blockchain and exploiting the use of time locks to route payments. In another example, presented in [90], malicious actors could disable channels by repeatedly sending small payments through them and holding onto the corresponding HTLCs, causing channels to become frozen.
  • Network attack resistance: the network may not always be able to resist in potential attack vectors, such as denial-of-service or eclipse attacks. For example, as presented in [90], an attacker can isolate a victim node, shut down Lightning channels, and steal funds without the victim being aware. Research has also found that the scale-free network topology used in the LN, makes it resistant to random disruptions but vulnerable to targeted attacks on highly connected hub nodes [28,41]. This means that removing a small number of key nodes can lead to a significant decrease in the efficiency of the network, and in some cases, cause the network to break down into disconnected parts [30,34,36]. Note, also, that an attacker could obtain sensitive payment information by controlling just 2% of nodes, as presented in [48], by performing a wormhole attack. To decrease the exposure to this risk, users are suggested to open channels only with trusted parties.
Scalability and performance: Scalability and performance are critical aspects of the LN, as it was specifically designed to address Bitcoin’s inherent limitations in transaction throughput and latency. The network’s core purpose is to enable a higher volume of transactions to be processed swiftly and at a fraction of the cost associated with on-chain transactions.
Obtaining and receiving liquidity is a vital issue for the scalability and performance of the LN. Non-custodial users must secure receiving liquidity from another node, which presents a fundamental limitation. Custodial solutions can bypass this issue but compromise control over funds. Limited liquidity is a significant problem, as highlighted in [31], since payments require intermediaries to transmit collateral through multiple channels, necessitating sufficient Bitcoins in each channel for the payment’s direction. Insufficient channel capacities often lead to payment route unavailability. This can be addressed by establishing channels with adequate capacity or using more sophisticated methods like Atomic Multi-Path Payments [63,73,77]. These methods break down large payments into smaller ones, which can be transmitted through lower capacity channels and recombined by the recipient. Several attacks have been reported related to the issue of channel liquidity, which can have a significant impact on performance and even network operation. The Griefing Attack for example, as mentioned in [53], could allow an adversary to deliberately drain the channel capacity, blocking it for an extended period and causing harm to several nodes by preventing them from processing future transaction requests.
Routing efficiency is also a crucial challenge for the scalability and performance of the LN, as it directly impacts transaction success rates, speed, and overall user experience. The network relies on decentralized, multi-hop routing to facilitate transactions. As pointed out by [64], the routing issue is contingent on the fee structure used by LN nodes for processing payments, as intermediate nodes impose a fixed fee plus a fee proportional to the payment being forwarded. Therefore, inefficient routing can lead to increased payment failures, higher transaction latency, and a diminished user experience. As the network expands and the number of channels and nodes increases, optimizing routing efficiency becomes even more critical. As presented in [76], the three crucial elements of the LN - fees, channel imbalances, and routing path lengths - are in conflict and cannot be optimized simultaneously. Therefore, there is a need for development of robust algorithms that can swiftly identify optimal payment routes. Some researchers have worked towards this direction like [76], where they proposed having fees proportional to the square root of the channel capacity, allowing for reasonably short path lengths and well-balanced channel capacities.
To fully realize the LN’s potential in promoting widespread Bitcoin adoption for everyday transactions, it is crucial to address the challenges related to channel capacity and routing efficiency. Overcoming these obstacles will enhance user experience and facilitate the network’s scalability and performance.
Governance and regulatory compliance: One of the primary governance open issues in the LN is standardization. Arguably, effective governance structures help to establish the rules and procedures necessary for developing and implementing technical standards. Without effective governance, it can be difficult to reach a consensus on the adoption of common standards, and competing interests may result in fragmentation and inconsistency in the development and implementation of the LN. The LN requires a high degree of interoperability and compatibility across various implementations. The development and adoption of technical standards is needed to ensure seamless communication between nodes and maintain consistency in the network’s operation. Standardization could also help reduce potential fragmentation that could arise from divergent implementations, which could hamper the network’s growth and user experience. As the LN continues to evolve, fostering collaboration among developers, researchers, and industry stakeholders is essential in establishing widely-accepted standards that promote a unified and reliable system.
Regulatory compliance is also a significant concern, as the evolving legal landscape for cryptocurrencies and digital assets necessitates adherence to various rules and regulations due to the complex legal environment that varies across jurisdictions. Ensuring compliance with existing laws, such as those related to consumer protection, securities, and taxation, is essential to maintain the network’s legitimacy and foster wider adoption. Additionally, keeping abreast of regulatory developments and adapting to new requirements will be crucial for the network’s long-term success and stability. Engaging with regulators and policymakers to promote a clear understanding of the technology and its potential benefits can help facilitate a more conducive regulatory environment for the LN and other decentralized financial systems.
In addition, an aspect of regulatory compliance in the LN is addressing Anti-Money Laundering (AML) and Know Your Customer (KYC) requirements. While the LN’s privacy-preserving features offer significant benefits to users, they can also present challenges in meeting AML/KYC obligations. Developing and implementing mechanisms that strike a balance between preserving user privacy and complying with regulatory requirements is vital. By demonstrating a commitment to regulatory compliance and responsible innovation, the LN can cultivate trust among users, regulators, and the broader financial ecosystem, ultimately contributing to its growth and widespread acceptance.
User experience: One of the primary adoption challenge faced by the LN is the need to improve user experience. As a layer-two solution for Bitcoin, the network aims to provide faster, more scalable transactions. However, for the LN to gain mainstream acceptance, it must be accessible and user-friendly for both merchants and consumers. Simplifying the process of setting up and managing channels, securing liquidity, and handling transactions is essential to attract a broader audience. Developing intuitive interfaces, comprehensive documentation, and user support will not only help drive adoption but also build trust in the network’s capabilities. For example, Speed10 is a company focusing on Bitcoin payment solutions and supports both online and offline transactions. It offers both static and dynamic QR codes, and it’s system is developer-friendly. Speed facilitates bitcoin payments, manages business operations over the LN, and is available for use by individuals and businesses worldwide.
Another crucial challenge for the LN’s adoption is its integration with existing systems and services. For the network to become a viable payment solution, it must seamlessly interact with traditional financial infrastructure, as well as other blockchain-based systems. Facilitating compatibility and interoperability with existing payment gateways, e-commerce platforms, and point-of-sale systems will be critical to encourage merchants to adopt the LN as a payment method. Additionally, integration with popular wallets, exchanges, and other cryptocurrency services will further promote its usage. By addressing these adoption challenges and bridging the gap between the LN and current financial systems, the network can position itself as a reliable, efficient, and accessible solution for instant, low-cost Bitcoin transactions.

5.2. Key findings and future research suggestions

In the sequence, we present a synopsis of the primary outcomes of our investigation in line with the different research questions we had at the outset. Additionally, we suggest several possibilities for future research that are relevant to the LN and its acceptance as a viable global payment infrustructure.
RQ1: According to the relevant literature, the LN has several current and potential business-related applications, including micropayments, cross-border and remittance payments, IoT and machine-to-machine payments, decentralized exchanges, transfers of digital assets, and LN-related services. In particular, the LN enables businesses to expand their customer base globally, without the need for middlemen or high fees. It can enhance productivity, monetize offerings, reduce transaction costs, increase transaction speed, and streamline payment processes across various sectors. The LN ecosystem consists of a diverse array of companies and participants, each contributing to the network’s maintenance and growth in their unique way. Overall, the LN represents a promising innovation in the blockchain space, with significant potential to transform the way businesses operate and transact.
RQ2: The LN has undergone significant research and development, with interesting progress made in its network topology, performance, privacy, and security. However, there are still technical challenges that need to be addressed to ensure its widespread adoption and effectiveness for business-related applications. In terms of network topology, the LN has been found to exhibit scale-free and small-world characteristics, making it susceptible to targeted attacks and DDoS attacks. Moreover, several studies have shown that the network is becoming more centralized, with a few highly active nodes holding the majority of bitcoins, making it vulnerable to split attacks. These findings highlight the importance of improving the network’s structure for enhanced security and potential. With respect to performance, several studies have focused on optimizing global transaction paths and improving the efficiency of the LN. However, researchers have identified technical challenges such as convergence delays, payment attempt failures, and network imbalance that need to be addressed to improve the protocol’s effectiveness for business-related applications. Regarding privacy, research has proposed various countermeasures to address the vulnerabilities of the LN, including balance disclosure attacks and collusion attacks. Additionally, researchers have proposed methods to improve transaction privacy, such as approximate differential privacy and space-efficient key management schemes. However, there are still concerns about privacy breaches, particularly in the case of jamming-enhanced probing, which can extract full balance information. Finally, with respect to security, researchers have identified several vulnerabilities in the LN, including channel balance disclosure attacks, node isolation attacks, and wormhole attacks. There are also concerns about the increasing centralization of the network and the resulting vulnerabilities, making it susceptible to split attacks and targeted attacks. Arguably, while the LN’s potential is vast, it may face challenges in adoption and implementation due to the above-mentioned technical challenges.
RQ3: Businesses may face several adoption challenges when using the LN. One of the primary challenges is the need to improve user experience, as the current process of setting up and managing channels, securing liquidity, and handling transactions can be complex and challenging. This may deter businesses from adopting the LN as a payment solution, particularly those with less technical expertise. Limited liquidity is also a significant problem that can have a significant impact on performance and even network operation. Payments require intermediaries to transmit collateral through multiple channels, necessitating sufficient bitcoins in each channel for the payment’s direction. Insufficient channel capacities often lead to payment route unavailability, which can cause inconvenience and delays for businesses that need to process a high volume of transactions. Regulatory compliance is another significant challenge for businesses using the LN. Ensuring compliance with existing laws, such as those related to consumer protection, securities, and taxation, can be complex and time-consuming, particularly as the legal environment for cryptocurrencies and digital assets continues to evolve. Adapting to new regulatory requirements and keeping abreast of regulatory developments can also be challenging, particularly for small and medium-sized enterprises with limited resources. Finally, businesses may also face challenges related to integrating the LN with existing systems and services. Facilitating compatibility and interoperability with existing payment gateways, e-commerce platforms, and point-of-sale systems can be complex and require significant technical expertise. Integration with popular wallets, exchanges, and other cryptocurrency services may also be necessary to promote the LN’s usage, but this may require additional resources and investment.
Based on the aforementioned findings, some fruitful areas for future research directions with respect to the LN, it’s characteristics and adoption, include:
  • Scalability, interoperability, and performance: Research should focus on improving the LN’s scalability to handle a growing number of transactions while ensuring interoperability with other blockchain platforms and payment systems. This includes optimizing the network topology to enhance resilience against attacks, addressing performance challenges such as convergence delays and network imbalance, and designing incentive mechanisms to encourage a decentralized distribution of nodes and channels.
  • Security and privacy: Future research should examine security risks and privacy concerns associated with the LN, developing methods to mitigate these issues while maintaining the network’s efficiency and speed. This includes creating advanced privacy solutions to counterbalance various attacks and examining the trade-offs between privacy, performance, and network security. Researchers should work on identifying and addressing security vulnerabilities in the LN and developing adaptive routing protocols that can dynamically respond to network changes, congestion, and potential attacks, in order to maintain high transaction throughput and low latency.
  • Regulatory frameworks and market adoption: Investigating appropriate regulatory frameworks for successful LN implementation and adoption is crucial, addressing compliance, consumer protection, and taxation issues. Additionally, understanding factors that influence LN adoption across industries and exploring innovative financial services and products through the LN will help expand its applications. To understand the adoption of the LN, we can use game theory to model the behavior of various actors, such as bitcoin users, merchants, payment processors, and developers.
  • Integration with IoT, M2M ecosystems, and existing systems: Studying potential LN use cases in the context of IoT and M2M ecosystems is essential, as well as examining technical requirements for integration. Additionally, research should focus on seamless integration of the LN with existing payment systems and explore tailored solutions for small and medium-sized enterprises to address their specific challenges and resource limitations.
  • Economic, social impact, and impact assessment: Investigating the broader economic and social implications of widespread LN adoption, such as financial inclusion and global economic growth, is essential. Evaluating the impact of LN adoption on businesses and developing metrics to assess the effectiveness of LN integration and adoption efforts will help drive informed decision-making. Analyzing the potential implications of LN adoption for traditional financial institutions is important for understanding how they might need to adapt their business models and strategies to remain competitive in a blockchain-driven financial landscape.
  • Education and awareness: Developing educational resources and initiatives to increase LN awareness among businesses, policymakers, and the general public is crucial for facilitating its adoption and integration into mainstream financial systems.
  • Usability, user experience, and liquidity management: Research should focus on improving the LN’s usability and user experience, addressing onboarding, user interface, and user support. Enhancing the user experience by simplifying channel management and securing liquidity, as well as developing innovative solutions to address liquidity and channel capacity issues, will make LN adoption more accessible for businesses with varying technical expertise.

5.3. Limitations

Narrative reviews, while valuable for understanding crucial policy issues and shaping future research, possess several limitations that merit acknowledgement. One limitation is that narrative reviews are founded upon the author’s interpretation of the literature, which can lead to cherry-picking evidence to support a specific viewpoint, consequently affecting the credibility of the review [22,23]. This issue can be particularly concerning if the authors have a vested interest in the outcome or a strong pre-existing belief about the topic under review. In our analysis, however, we utilized all available scientific literature, striving to minimize inclusion bias.
Another weakness of narrative reviews is the lack of transparency in their methodology. In contrast to systematic reviews, which adhere to a rigorous set of guidelines for selecting and analyzing studies, narrative reviews may be less transparent in their approach. This lack of clarity can make it challenging for readers to assess the quality of the review and determine whether the author’s conclusions are substantiated by the evidence. To address this particular limitation, we employed a semi-systematic narrative review approach.
Despite these limitations, when conducted effectively, narrative reviews can still prove valuable for comprehending vital policy issues and informing the direction of future research programs [23].

6. Conclusions

The LN is a powerful tool that has the potential to revolutionize the way businesses operate and transact. While it cannot solve all of Bitcoin’s challenges, it offers a promising solution for providing cheap global payments to everyone in the world. To realize its potential, it is crucial to address technical barriers and regulatory hurdles. With advancements in technology and continued research and development, the LN can improve its performance, scalability, and security, and become more accessible to businesses and users alike. The recent signs of maturity in the network, such as improvements in payment routing, increased liquidity, and the release of excellent mobile apps, have boosted its practicality and efficiency, leading to a surge in money flow and the ability to make payments. Ultimately, the LN offers a promising path towards creating a global financial infrastructure that could serve as the default payment system for businesses and individuals across the globe.

Funding

This work was supported by the Hellenic Open University (Project

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Khando, K.; Islam, M.S.; Gao, S. The Emerging Technologies of Digital Payments and Associated Challenges: A Systematic Literature Review. Future Internet 2023, 15. [Google Scholar] [CrossRef]
  2. Tang, Y.M.; Chau, K.Y.; Hong, L.; Ip, Y.K.; Yan, W. Financial innovation in digital payment with wechat towards electronic business success. Journal of Theoretical and Applied Electronic Commerce Research 2021, 16, 1844–1861. [Google Scholar] [CrossRef]
  3. Patil, P.P.; Dwivedi, Y.K.; Rana, N.P. Digital payments adoption: An analysis of literature. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 0595. [Google Scholar] [CrossRef]
  4. Chaveesuk, S.; Khalid, B.; Chaiyasoonthorn, W. Digital payment system innovations: A marketing perspective on intention and actual use in the retail sector. Innovative Marketing 2021, 17, 109–123. [Google Scholar] [CrossRef]
  5. Guo, Y.; Tong, J.; Feng, C. A measurement study of bitcoin lightning network. Proceedings - 2019 2nd IEEE International Conference on Blockchain, Blockchain 2019, 2019, pp. 202–211. [Google Scholar]
  6. Khan, N.; State, R. Lightning network: A comparative review of transaction fees and data analysis; Vol. 1010, 2020. Pages: 18.
  7. Teoh, B. Navigating the Blockchain Trilemma: A Supply Chain Dilemma. Advanced Structured Materials 2022, 166, 291–300. [Google Scholar] [CrossRef]
  8. Arcane Research. The State of Lightning Volume 2. Retrieved , 2023 from https://arcane.no/research/reports/the-state-of-lightning-volume-2. Technical report. 02 February.
  9. Zhao, Z.; Zhou, L.; Su, C. Systematic Research on Technology and Challenges of Lightning Network. 2021 IEEE Conference on Dependable and Secure Computing, DSC 2021, 2021.
  10. Poon, J.; Dryja, T. The bitcoin lightning network: Scalable off-chain instant payments, 2016.
  11. Azzolini, D.; Riguzzi, F. Probabilistic Logic Models for the Lightning Network. Cryptography 2022, 6. [Google Scholar] [CrossRef]
  12. Harris, J.; Zohar, A. Flood & Loot: A Systemic Attack on the Lightning Network. AFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, 2020; pp. 202–213. [Google Scholar]
  13. Miraz, M.; Donald, D. Lapps: Technological, legal and market potentials of blockchain lightning network applications. ACM International Conference Proceeding Series, 2019, pp. 185–189.
  14. Ibaba, A.; Abdulmalik, A.; Alhassan, A.B.; Sunusi, I.; Thomas, S. Rem9ja: Bitcoin Lightning Network Remittance Solution. 2021 1st International Conference on Multidisciplinary Engineering and Applied Science, ICMEAS 2021, 2021.
  15. Tan, C.; Chen, Y.; Ren, X.; Peng, C. A mobile energy trading scheme based on Lightning Network. Concurrency and Computation: Practice and Experience.
  16. Kumar, S.; Amin, R. Decentralized trade finance using blockchain and lightning network. SECURITY AND PRIVACY. [CrossRef]
  17. Klein, M.; Stummer, C. Feeless Micropayments as Drivers for New Business Models: Two Exemplary Application Cases. Frontiers in Blockchain 2021, 4. [Google Scholar] [CrossRef]
  18. Mercan, S.; Kurt, A.; Akkaya, K.; Erdin, E. Cryptocurrency Solutions to Enable Micropayments in Consumer IoT. IEEE Consumer Electronics Magazine 2022, 11, 97–103. [Google Scholar] [CrossRef]
  19. Kurt, A.; Mercana, S.; Erdin, E.; Akkaya, K. Enabling micro-payments on IoT devices using bitcoin lightning network. IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2021, 2021.
  20. Robert, J.; Kubler, S.; Ghatpande, S. Enhanced Lightning Network (off-chain)-based micropayment in IoT ecosystems. Future Generation Computer Systems 2020, 112, 283–296. [Google Scholar] [CrossRef]
  21. Fang, Z.; Gai, K.; Zhu, L.; Xu, L. LNBFSM: A Food Safety Management System Using Blockchain and Lightning Network; Vol. 12454 LNCS, 2020. Pages: 34.
  22. Furley, P.; Goldschmied, N. Systematic vs. Narrative Reviews in Sport and Exercise Psychology: Is Either Approach Superior to the Other? Frontiers in Psychology 2021, 12. [Google Scholar] [CrossRef]
  23. Greenhalgh, T.; Thorne, S.; Malterud, K. Time to challenge the spurious hierarchy of systematic over narrative reviews? European Journal of Clinical Investigation 2018, 48. [Google Scholar] [CrossRef] [PubMed]
  24. Green, B.; Johnson, C.; Adams, A. Writing narrative literature reviews for peer-reviewed journals: Secrets of the trade. Journal of Sports Chiropractic and Rehabilitation 2001, 15, 5–17. [Google Scholar] [CrossRef] [PubMed]
  25. Wong, G.; Greenhalgh, T.; Westhorp, G.; Buckingham, J.; Pawson, R. RAMESES publication standards: Meta-narrative reviews. BMC Medicine 2013, 11. [Google Scholar] [CrossRef]
  26. Denyer, D.; Tranfield, D. Producing a systematic review. 2009.
  27. Chen, Y.J.; Zhu, X.T.; Yu, Y.R.; Cheng, Z.Y. Empirical Analysis of Lightning Network: Topology, Evolution, and Fees. Ruan Jian Xue Bao/Journal of Software 2022, 33, 3858–3873. [Google Scholar] [CrossRef]
  28. Lee, S.; Kim, H. On the robustness of Lightning Network in Bitcoin. Pervasive and Mobile Computing 2020, 61. [Google Scholar] [CrossRef]
  29. Chiam, E. Hands-on guide to bitcoin layer-2 lightning network node setup; 2021. D: Publication Title: Blockchain And Smart Contracts. [CrossRef]
  30. Lin, J.H.; Primicerio, K.; Squartini, T.; Decker, C.; Tessone, C. Lightning network: A second path towards centralisation of the Bitcoin economy. New Journal of Physics 2020, 22. [Google Scholar] [CrossRef]
  31. Bartolucci, S.; Caccioli, F.; Vivo, P. A percolation model for the emergence of the Bitcoin Lightning Network. Scientific Reports 2020, 10. [Google Scholar] [CrossRef]
  32. Wu, J.; Jiang, S. Local Pooling of Connected Supernodes in Lightning Networks for Blockchains. Proceedings - 2020 IEEE International Conference on Blockchain, Blockchain 2020, 2020, pp. 421–427. [Google Scholar]
  33. Azzolini, D.; Riguzzi, F.; Bellodi, E.; Lamma, E. A Probabilistic Logic Model of Lightning Network; Vol. 444 LNBIP, 2022. Pages: 333.
  34. Lisi, A.; Di Francesco Maesa, D.; Mori, P.; Ricci, L. Lightnings over rose bouquets: An analysis of the topology of the Bitcoin Lightning Network. Proceedings - 2021 IEEE 45th Annual Computers, Software, and Applications Conference, COMPSAC 2021, 2021, pp. 324–331. [Google Scholar]
  35. Wang, Z.; Zhang, R.; Sun, Y.; Ding, H.; Lv, Q. Can Lightning Network’s Autopilot Function Use BA Model as the Underlying Network? Frontiers in Physics 2022, 9. [Google Scholar] [CrossRef]
  36. Martinazzi, S.; Flori, A. The evolving topology of the Lightning Network: Centralization, efficiency, robustness, synchronization, and anonymity. PLoS ONE 2020, 15. [Google Scholar] [CrossRef] [PubMed]
  37. Azzolini, D.; Bellodi, E.; Brancaleoni, A.; Riguzzi, F.; Lamma, E. Modeling bitcoin lightning network by logic programming (extended abstract). Electronic Proceedings in Theoretical Computer Science, EPTCS, 2020, Vol. 325.
  38. Zabka, P.; Foerster, K.T.; Schmid, S.; Decker, C. Empirical evaluation of nodes and channels of the lightning network. Pervasive and Mobile Computing 2022, 83. [Google Scholar] [CrossRef]
  39. Lin, J.H.; Marchese, E.; Tessone, C.; Squartini, T. The weighted Bitcoin Lightning Network. Chaos, Solitons and Fractals 2022, 164. [Google Scholar] [CrossRef]
  40. Camilo, G.; Rebello, G.; De Souza, L.; Potop-Butucaru, M.; Amorim, M.; Campista, M.; Costa, L. Topological Evolution Analysis of Payment Channels in the Lightning Network. 2022 IEEE Latin-American Conference on Communications, LATINCOM 2022, 2022. [CrossRef]
  41. Seres, I.; Gulyás, L.; Nagy, D.; Burcsi, P. Topological Analysis of Bitcoin’s Lightning Network. Springer Proceedings in Business and Economics, 2020, pp. 1–12.
  42. Zabka, P.; Foerster, K.T.; Decker, C.; Schmid, S. Short Paper: A Centrality Analysis of the Lightning Network 2022. 1 2022, 3411 LNCS, 374–385. [Google Scholar] [CrossRef]
  43. Herrera-Joancomartí, J.; Navarro-Arribas, G.; Ranchal-Pedrosa, A.; Pérez-Solà, C.; Garcia-Alfaro, J. On the difficulty of hiding the balance of lightning network channels. AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019, pp. 602–612.
  44. Rohrer, E.; Malliaris, J.; Tschorsch, F. Discharged Payment Channels: Quantifying the Lightning Network’s Resilience to Topology-Based Attacks. Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019, 2019, pp. 347–356. [Google Scholar]
  45. Hüttel, H.; Staroveški, V. Key Agreement in the Lightning Network Protocol; Vol. 1545 CCIS, 2022. Pages: 155.
  46. Piatkivskyi, D.; Axelsson, S.; Nowostawski, M. Digital forensic implications of collusion attacks on the lightning network; Vol. 511, 2017. Pages: 147.
  47. Mazumdar, S.; Banerjee, P.; Sinha, A.; Ruj, S.; Roy, B. Strategic Analysis of Griefing Attack in Lightning Network. IEEE Transactions on Network and Service Management. [CrossRef]
  48. Tikhomirov, S.; Moreno-Sanchez, P.; Maffei, M. A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network. Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020, 2020, pp. 387–396. [Google Scholar]
  49. van Dam, G.; Kadir, R.; Nohuddin, P.; Zaman, H. Improvements of the Balance Discovery Attack on Lightning Network Payment Channels; Vol. 580 IFIP, 2020. Pages: 323.
  50. Pérez-Solà, C.; Ranchal-Pedrosa, A.; Herrera-Joancomartí, J.; Navarro-Arribas, G.; Garcia-Alfaro, J. LockDown: Balance Availability Attack Against Lightning Network Channels; Vol. 12059 LNCS, 2020. Pages: 263.
  51. Kiayias, A.; Litos, O. A Composable Security Treatment of the Lightning Network. Proceedings - IEEE Computer Security Foundations Symposium, 2020, Vol. 2020-June, pp. 334–349.
  52. Hüttel, H.; Staroveski, V. Secrecy and authenticity properties of the lightning network protocol. ICISSP 2020 - Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020, pp. 119–130.
  53. Mazumdar, S.; Banerjee, P.; Ruj, S. Time is money: Countering griefing attack in lightning network. Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, 2020, pp. 1036–1043. [Google Scholar]
  54. Leinweber, M.; Grundmann, M.; Schönborn, L.; Hartenstein, H. TEE-Based Distributed Watchtowers for Fraud Protection in the Lightning Network; Vol. 11737 LNCS, 2019. Pages: 194.
  55. Biryukov, A.; Naumenko, G.; Tikhomirov, S. Analysis and Probing of Parallel Channels in the Lightning Network 2022. 1 2022, 3411 LNCS, 337–357. [Google Scholar] [CrossRef]
  56. Nowostawski, M.; Tøn, J. Evaluating methods for the identification of off-chain transactions in the lightning network. Applied Sciences (Switzerland) 2019, 9. [Google Scholar] [CrossRef]
  57. van Dam, G.; Abdul Kadir, R. Hiding payments in lightning network with approximate differentially private payment channels. Computers and Security 2022, 115. [Google Scholar] [CrossRef]
  58. Wei, G.; Mao, X.; Lu, R.; Shao, J.; Guan, Y.; Lu, G. Achieve space-efficient key management in lightning network. Computer Networks 2021, 197. [Google Scholar] [CrossRef]
  59. Rahimpour, S.; Khabbazian, M. Torrent: Strong, Fast Balance Discovery in the Lightning Network. IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2022, 2022.
  60. Zhao, Z.; Ge, C.; Zhou, L.; Wang, H. Fully Discover the Balance of Lightning Network Payment Channels; Vol. 12937 LNCS, 2021. Pages: 173.
  61. Kurt, A.; Erdin, E.; Cebe, M.; Akkaya, K.; Uluagac, A. Lnbot: A covert hybrid botnet on bitcoin lightning network for fun and profit 2020. 1 2020, 2309 LNCS, 734–755. [Google Scholar] [CrossRef]
  62. Kappos, G.; Yousaf, H.; Piotrowska, A.; Kanjalkar, S.; Delgado-Segura, S.; Miller, A.; Meiklejohn, S. An Empirical Analysis of Privacy in the Lightning Network; Vol. 12674 LNCS, 2021. Pages: 186.
  63. Conoscenti, M.; Vetrò, A.; De Martin, J.; Spini, F. The CLoTH simulator for HTLC payment networks with introductory lightning network performance results. Information (Switzerland) 2018, 9. [Google Scholar] [CrossRef]
  64. Di Stasi, G.; Avallone, S.; Canonico, R.; Ventre, G. Routing Payments on the Lightning Network. Proceedings - IEEE 2018 International Congress on Cybermatics: 2018 IEEE Conferences on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, iThings/GreenCom/CPSCom/SmartData/Blockchain/CIT 2018, 2018, pp. 1161–1170. [Google Scholar]
  65. Divakaruni, A.; Zimmerman, P. The Lightning Network: Turning Bitcoin into money. Finance Research Letters 2023, 52. [Google Scholar] [CrossRef]
  66. Gai, K.; Fang, Z.; Wang, R.; Zhu, L.; Jiang, P.; Choo, K.K.R. Edge Computing and Lightning Network Empowered Secure Food Supply Management. IEEE Internet of Things Journal 2022, 9, 14247–14259. [Google Scholar] [CrossRef]
  67. Liu, M.; Au, M. Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3787. [Google Scholar] [CrossRef]
  68. Davis, V.; Harrison, B. Learning a Scalable Algorithm for Improving Betweenness in the Lightning Network. 2022 4th International Conference on Blockchain Computing and Applications, BCCA 2022, 2022, pp. 119–126. [Google Scholar] [CrossRef]
  69. Seo, J.; Kim, J. Enhancing Scalability with Payment Requests Aggregation in Lightning Network. Proceedings - 2022 IEEE International Conference on Blockchain, Blockchain 2022, 2022, pp. 340–347. [Google Scholar] [CrossRef]
  70. Wu, J.; Jiang, S. On Increasing Scalability and Liquidation of Lightning Networks for Blockchains. IEEE Transactions on Network Science and Engineering 2022, 9, 2589–2600. [Google Scholar] [CrossRef]
  71. Martinazzi, S.; Regoli, D.; Flori, A. A tale of two layers: The mutual relationship between bitcoin and lightning network. Risks 2020, 8, 1–18. [Google Scholar] [CrossRef]
  72. Gögge, N.; Rohrer, E.; Tschorsch, F. On the Routing Convergence Delay in the Lightning Network. Data Privacy Management, Cryptocurrencies and Blockchain Technology; Garcia-Alfaro, J., Navarro-Arribas, G., Dragoni, N., Eds.; Springer International Publishing: Cham, 2023; pp. 203–218. [Google Scholar]
  73. Conoscenti, M.; Vetrò, A.; De Martin, J. CLoTH: A Lightning Network Simulator. SoftwareX 2021, 15. [Google Scholar] [CrossRef]
  74. Qiao, Y.; Wu, K.; Khabbazian, M. Non-Intrusive and High-Efficient Balance Tomography in the Lightning Network. ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 2021, pp. 832–843.
  75. Pickhardt, R.; Nowostawski, M. Imbalance measure and proactive channel rebalancing algorithm for the Lightning Network. IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020, 2020.
  76. Jun Ren, A.; Feng, L.; Cheong, S.; Goh, R. Optimal Fee Structure for Efficient Lightning Networks. Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, 2019, Vol. 2018-December, pp. 980–985.
  77. Conoscenti, M.; Vetro, A.; De Martin, J. Hubs, Rebalancing and Service Providers in the Lightning Network. IEEE Access 2019, 7, 132828–132840. [Google Scholar] [CrossRef]
  78. Aspris, A.; Foley, S.; Svec, J.; Wang, L. Decentralized exchanges: The “wild west” of cryptocurrency trading. International Review of Financial Analysis 2021, 77. [Google Scholar] [CrossRef]
  79. Doe, D.; Li, J.; Dusit, N.; Wang, L.; Han, Z. Incentive Mechanism Design for Mitigating Frontrunning and Transaction Reordering in Decentralized Exchanges. IEEE Access. [CrossRef]
  80. Mohan, V. Automated market makers and decentralized exchanges: A DeFi primer. Financial Innovation 2022, 8. [Google Scholar] [CrossRef]
  81. Jones, B.A.; Goodkind, A.L.; Berrens, R.P. Economic estimation of Bitcoin mining’s climate damages demonstrates closer resemblance to digital crude than digital gold. Scientific Reports 2022, 12. [Google Scholar] [CrossRef] [PubMed]
  82. Velický, M. Renewable Energy Transition Facilitated by Bitcoin. ACS Sustainable Chemistry & Engineering 2023, 11, 3160–3169. [Google Scholar] [CrossRef]
  83. Badea, L.; Mungiu-Pupazan, M.C. The Economic and Environmental Impact of Bitcoin. IEEE Access 2021, 9, 48091–48104. [Google Scholar] [CrossRef]
  84. Köhler, S.; Pizzol, M. Life Cycle Assessment of Bitcoin Mining. Environmental Science & Technology 2019, 53, 13598–13606. [Google Scholar] [CrossRef]
  85. Niaz, H.; Shams, M.H.; Liu, J.J.; You, F. Mining bitcoins with carbon capture and renewable energy for carbon neutrality across states in the USA. Energy and Environmental Science 2022, 15, 3551–3570. [Google Scholar] [CrossRef]
  86. Bitcoin Mining Council. Global Bitcoin mining data review, Q4 2022. Technical report, 2023.
  87. Farrell, H.; Newman, A. Weak links in finance and supply chains are easily weaponized. Nature 2022, 605, 219–222. [Google Scholar] [CrossRef]
  88. Robinson, G.; Dörry, S.; Derudder, B. Global networks of money and information at the crossroads: Correspondent banking and SWIFT. Global Networks 2023, 23, 478–493. [Google Scholar] [CrossRef]
  89. Pixley, J.; Whimster, S.; Wilson, S. Central bank independence: A social economic and democratic critique. Economic and Labour Relations Review 2013, 24, 32–50. [Google Scholar] [CrossRef]
  90. CoinDesk Research. A Deep Dive Into Lightning as a Bitcoin Scaling Solution. Technical report, 2021.
1
2
3
4
5
6
7
8
9
10
Figure 1. Opening channels in Lightning network
Figure 1. Opening channels in Lightning network
Preprints 72989 g001
Figure 2. Lightning Network growth
Figure 2. Lightning Network growth
Preprints 72989 g002
Figure 4. Year-wise publication trend
Figure 4. Year-wise publication trend
Preprints 72989 g004
Figure 5. Research focus of the publications
Figure 5. Research focus of the publications
Preprints 72989 g005
Figure 6. Lightning Network business models
Figure 6. Lightning Network business models
Preprints 72989 g006
Figure 7. Open issues in the Lightning Network
Figure 7. Open issues in the Lightning Network
Preprints 72989 g007
Table 1. Research questions and objectives of the survey
Table 1. Research questions and objectives of the survey
Research questions Objectives
RQ1: What are the current and potential business-related applications of the LN? This question would explore the various ways that businesses could use the LN to streamline their operations, reduce costs, and offer new services to customers. It would involve a comprehensive review of the existing literature on LN applications, as well as a discussion of potential future applications.
RQ2: What is the current status of the LN in terms of its technical characteristics (network topology, performance, privacy, and security etc.), and how do these factors affect its adoption and effectiveness for business-related applications? The objective of this research is to assess the current status of the LN and its implications for business-related applications by focusing on the network’s technical characteristics, topology, performance, privacy, and security.
RQ3: What are the adoption challenges that businesses may face when using the LN? To what extent? This question would explore the barriers and challenges that businesses may encounter when implementing the LN, such as regulatory hurdles, security concerns, and user adoption. It would involve a review of the existing literature on LN adoption challenges, as well as a discussion of potential strategies for addressing these challenges.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated