Skip to main content

Cryptocurrency Wallets: Assessment and Security

  • Chapter
  • First Online:
Blockchain for Cybersecurity in Cyber-Physical Systems

Part of the book series: Advances in Information Security ((ADIS,volume 102))

  • 474 Accesses

Abstract

Digital wallet as a software program or a digital device allows users to conduct various transactions. Hot and cold digital wallets are considered as two types of this wallet. Digital wallets need an online connection fall into the first group, whereas digital wallets can operate without internet connection belong to the second group. Prior to buying a digital wallet, it is important to define for what purpose it will be utilized. The ease with which a mobile phone transaction may be completed in a couple of seconds and the speed with which transactions are executed are reflection of efficiency. One of the most important elements of digital wallets is data organization. Digital wallets are significantly less expensive than classic methods of transaction, which entails various charges and fees. Constantly, demand for their usage is growing due to speed, security, and the ability to conduct transactions between two users without the need of a third party. As the popularity of digital currency wallets grows, the number of security concerns impacting them increases significantly. The current status of digital wallets on the market, as well as the options for an efficient solution for obtaining and utilizing digital wallets. Finally, the digital wallets’ security and future improvement prospects are discussed in this chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. https://coinmarketcap.com/, accessed: 2022-03-13

  2. https://www.bitcoin.com/get-started/how-bitcointransactions-work, accessed: 2022-03-13

  3. https://www.statista.com/statistics/1202468/global-cryptocurrency-ownership/, accessed: 2022-03-12

  4. https://www.criptovaluta.it/hardware-wallet, accessed: 2022-03-11

  5. https://hobowithalaptop.com/crypto-wallets, accessed: 2022-03-11

  6. https://www.investopedia.com/ledger-nano-s-review-5190302, accessed: 2022-03-16

  7. https://www.ledger.com/ledger-blue-an-enterprise-grade-security-device, accessed: 2022-03-12

  8. https://www.channelnewsasia.com/singapore/police-warn-phishing-scams-2433296, accessed: 2022-03-15

  9. Ali, G., Ally Dida, M., Elikana Sam, A.: Two-factor authentication scheme for mobile money: A review of threat models and countermeasures. Future Internet 12(10), 160 (2020)

    Article  Google Scholar 

  10. Aydar, M., Cetin, S.C., Ayvaz, S., Aygun, B.: Private key encryption and recovery in blockchain. arXiv preprint arXiv:1907.04156 (2019)

    Google Scholar 

  11. Bosamia, M.P.: Mobile wallet payments recent potential threats and vulnerabilities with its possible security measures. In: Proceedings of the 2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp-2017), Changa, India. pp. 1–2 (2017)

    Google Scholar 

  12. Chaeikar, S.S., Jolfaei, A., Mohammad, N., Ostovari, P.: Security principles and challenges in electronic voting. In: 2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW). pp. 38–45 (2021)

    Google Scholar 

  13. Diao, W., Liu, X., Li, Z., Zhang, K.: No pardon for the interruption: New inference attacks on android through interrupt timing analysis. In: 2016 IEEE Symposium on Security and Privacy (SP). pp. 414–432 (2016)

    Google Scholar 

  14. Dikshit, P., Singh, K.: Efficient weighted threshold ecdsa for securing bitcoin wallet. In: 2017 ISEA Asia Security and Privacy (ISEASP). pp. 1–9 (2017)

    Google Scholar 

  15. Gentilal, M., Martins, P., Sousa, L.: Trustzone-backed bitcoin wallet. In: Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems. pp. 25–28 (2017)

    Google Scholar 

  16. Hassan, M.A., Shukur, Z.: Review of digital wallet requirements. In: 2019 International Conference on Cybersecurity (ICoCSec). pp. 43–48 (2019)

    Google Scholar 

  17. He, D., Li, S., Li, C., Zhu, S., Chan, S., Min, W., Guizani, N.: Security analysis of cryptocurrency wallets in android-based applications. IEEE Network 34(6), 114–119 (2020)

    Article  Google Scholar 

  18. Jokić, S.: Analysis and security of crypto currency wallets. ZBORNIK RADOVA UNIVERZITETA SINERGIJA 19(4) (2019)

    Google Scholar 

  19. Jørgensen, K.P., Beck, R.: Universal wallets. Business & Information Systems Engineering pp. 1–11 (2022)

    Google Scholar 

  20. Kanimozhi, G., Kamatchi, K.: Security aspects of mobile based e wallet. International Journal on Recent and Innovation Trends in Computing and Communication 5(6), 1223–1228 (2017)

    Google Scholar 

  21. Khan, A.G., Zahid, A.H., Hussain, M., Riaz, U.: Security of cryptocurrency using hardware wallet and qr code. In: 2019 International Conference on Innovative Computing (ICIC). pp. 1–10 (2019). https://doi.org/10.1109/ICIC48496.2019.8966739

  22. Muthavhine, K.D., Sumbwanyambe, M.: An analysis and a comparative study of cryptographic algorithms used on the internet of things (iot) based on avalanche effect. In: 2018 International Conference on Information and Communications Technology (ICOIACT). pp. 114–119. IEEE (2018)

    Google Scholar 

  23. Palattella, M.R., Accettura, N., Vilajosana, X., Watteyne, T., Grieco, L.A., Boggia, G., Dohler, M.: Standardized protocol stack for the internet of (important) things. IEEE communications surveys & tutorials 15(3), 1389–1406 (2012)

    Article  Google Scholar 

  24. Rezaeighaleh, H., Zou, C.C.: New secure approach to backup cryptocurrency wallets. In: 2019 IEEE Global Communications Conference (GLOBECOM). pp. 1–6 (2019)

    Google Scholar 

  25. Rezaeighaleh, H., Zou, C.C.: Multilayered defense-in-depth architecture for cryptocurrency wallet. In: 2020 IEEE 6th International Conference on Computer and Communications (ICCC). pp. 2212–2217 (2020)

    Google Scholar 

  26. Sai, A.R., Buckley, J., Le Gear, A.: Privacy and security analysis of cryptocurrency mobile applications. In: 2019 Fifth Conference on Mobile and Secure Services (MobiSecServ). pp. 1–6 (2019)

    Google Scholar 

  27. Singh, G.: A review of factors affecting digital payments and adoption behaviour for mobile e-wallets. International Journal of Research in Management & Business Studies 6(4), 89–96 (2019)

    Google Scholar 

  28. Suratkar, S., Shirole, M., Bhirud, S.: Cryptocurrency wallet: A review. In: 2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP). pp. 1–7 (2020)

    Google Scholar 

  29. Tan, Q., Gao, Y., Shi, J., Wang, X., Fang, B., Tian, Z.: Toward a comprehensive insight into the eclipse attacks of tor hidden services. IEEE Internet of Things Journal 6(2), 1584–1593 (2019)

    Article  Google Scholar 

  30. Taylor, S.K., Ariffin, A., Zainol Ariffin, K.A., Sheikh Abdullah, S.N.H.: Cryptocurrencies investigation: A methodology for the preservation of cryptowallets. In: 2021 3rd International Cyber Resilience Conference (CRC). pp. 1–5 (2021)

    Google Scholar 

  31. Uddin, M.S., Mannan, M., Youssef, A.: Horus: A security assessment framework for android crypto wallets. In: International Conference on Security and Privacy in Communication Systems. pp. 120–139. Springer (2021)

    Google Scholar 

  32. Varghese, H.M., Nagoree, D.A., Anshu, Jayapandian, N.: Cryptocurrency security and privacy issues: A research perspective. In: 2021 6th International Conference on Communication and Electronics Systems (ICCES). pp. 902–907 (2021)

    Google Scholar 

  33. Veinović, M., Adamović, S.: Kriptologija 1. Beograd: Univerzitet Singidunum (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ehsan Nowroozi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Nowroozi, E., Seyedshoari, S., Mekdad, Y., Savaş, E., Conti, M. (2023). Cryptocurrency Wallets: Assessment and Security. In: Maleh, Y., Alazab, M., Romdhani, I. (eds) Blockchain for Cybersecurity in Cyber-Physical Systems. Advances in Information Security, vol 102. Springer, Cham. https://doi.org/10.1007/978-3-031-25506-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-25506-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-25505-2

  • Online ISBN: 978-3-031-25506-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics