System Architecture

Bunkercoin represents a radical departure from traditional blockchain architectures, designed specifically for operation in hostile, disconnected environments where conventional internet infrastructure is unavailable or unreliable. The system prioritizes deterministic behavior, minimal resource consumption, and radio-friendly communication patterns.

Core Components

System Architecture Diagram

Application Layer

  • CLI Interface (main.rs)

  • Command Processing

  • Configuration Management

Core Logic

  • Blockchain State (blockchain.rs)

  • Mining Coordinator

  • Transaction Pool

Network Layer

  • HTTP Server (web.rs)

  • P2P Protocol (network.rs)

  • Event Broadcasting

Cryptographic Layer

  • Ed25519 Signatures (wallet.rs)

  • Blake3 Hashing (transaction.rs)

  • VDF Proof-of-Work (vdf.rs)

Data Structures

  • Block Format (block.rs)

  • Transaction Format (transaction.rs)

  • Persistent Storage

Modular Design Philosophy

Each module encapsulates a specific concern, enabling independent development and testing. The clean separation allows components to be replaced or upgraded without affecting the entire system - crucial for field deployment scenarios.

Data Flow

Transaction Lifecycle

  1. Transaction Creation: Wallet generates Ed25519-signed transaction with deterministic nonce

  2. Mempool Injection: Transaction added to local mempool with hash-based deduplication

  3. Peer Propagation: HTTP POST to /tx endpoint broadcasts to network peers

  4. Block Inclusion: Mining process selects transactions deterministically by hash order

  5. Block Finalization: VDF computation completes, block added to chain and broadcast to peers

Mining Process Flow

Network Synchronization Flow

Peer Discovery

  • Static peer configuration via CLI

  • HTTP endpoint scanning on port 10000

  • Support for cloud services (render.com)

  • DNS resolution for radio bridge nodes

Chain Synchronization

  • GET /sync for lightweight status check

  • Compare local vs peer chain height

  • GET /chain for full blockchain download

  • Longest chain rule for conflict resolution

Security Model

Cryptographic Security Layers

1. Transaction Integrity

Ed25519 signatures provide 128-bit security with fast verification, crucial for resource-constrained radio bridge environments.

2. Block Chain Integrity

Blake3 provides cryptographic linking between blocks while being significantly faster than SHA-256, important for low-power radio deployments.

3. Proof-of-Work via VDF

The VDF requires sequential computation that cannot be parallelized, ensuring fair resource consumption and predictable timing for radio synchronization.

Network Security Considerations

Security Layer
Implementation
Radio Considerations

HTTP Transport Security

Unencrypted HTTP with cryptographic signatures

Radio environments often preclude TLS due to overhead constraints

Replay Attack Prevention

Transaction nonces and block timestamps

Deterministic nonce system ensures each transaction can only be valid once

Resource Exhaustion Protection

Fixed block intervals, limited block size (10KB)

Hash-based deduplication prevents computational attacks

Network Partition Tolerance

Longest chain rule

Automatic recovery from network partitions

Radio-Specific Security Adaptations

HF Radio Threat Model

Eavesdropping Resistance All transaction data is cryptographically signed but not encrypted. While transaction amounts are visible, sender/receiver identity requires knowledge of the corresponding private keys.

Jamming Tolerance The 6-hour block interval provides large transmission windows that can accommodate temporary jamming or propagation blackouts. Nodes automatically resynchronize when communication is restored.

Error Correction JSON serialization with checksums enables detection of transmission errors. The deterministic block structure allows reconstruction of corrupted data from known good fragments.

Future Security Enhancements

Planned Improvements

  • Real Wesolowski VDF implementation

  • UTXO set validation

  • Multi-signature wallet support

  • Advanced radio error correction

Research Areas

  • Zero-knowledge transaction privacy

  • Mesh network routing protocols

  • Quantum-resistant signatures

  • Adaptive difficulty adjustment

Last updated