Abstract
Digital wallet as a software program or a digital device allows users to conduct various transactions. Hot and cold digital wallets are considered as two types of this wallet. Digital wallets need an online connection fall into the first group, whereas digital wallets can operate without internet connection belong to the second group. Prior to buying a digital wallet, it is important to define for what purpose it will be utilized. The ease with which a mobile phone transaction may be completed in a couple of seconds and the speed with which transactions are executed are reflection of efficiency. One of the most important elements of digital wallets is data organization. Digital wallets are significantly less expensive than classic methods of transaction, which entails various charges and fees. Constantly, demand for their usage is growing due to speed, security, and the ability to conduct transactions between two users without the need of a third party. As the popularity of digital currency wallets grows, the number of security concerns impacting them increases significantly. The current status of digital wallets on the market, as well as the options for an efficient solution for obtaining and utilizing digital wallets. Finally, the digital wallets’ security and future improvement prospects are discussed in this chapter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
https://coinmarketcap.com/, accessed: 2022-03-13
https://www.bitcoin.com/get-started/how-bitcointransactions-work, accessed: 2022-03-13
https://www.statista.com/statistics/1202468/global-cryptocurrency-ownership/, accessed: 2022-03-12
https://www.criptovaluta.it/hardware-wallet, accessed: 2022-03-11
https://hobowithalaptop.com/crypto-wallets, accessed: 2022-03-11
https://www.investopedia.com/ledger-nano-s-review-5190302, accessed: 2022-03-16
https://www.ledger.com/ledger-blue-an-enterprise-grade-security-device, accessed: 2022-03-12
https://www.channelnewsasia.com/singapore/police-warn-phishing-scams-2433296, accessed: 2022-03-15
Ali, G., Ally Dida, M., Elikana Sam, A.: Two-factor authentication scheme for mobile money: A review of threat models and countermeasures. Future Internet 12(10), 160 (2020)
Aydar, M., Cetin, S.C., Ayvaz, S., Aygun, B.: Private key encryption and recovery in blockchain. arXiv preprint arXiv:1907.04156 (2019)
Bosamia, M.P.: Mobile wallet payments recent potential threats and vulnerabilities with its possible security measures. In: Proceedings of the 2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp-2017), Changa, India. pp. 1–2 (2017)
Chaeikar, S.S., Jolfaei, A., Mohammad, N., Ostovari, P.: Security principles and challenges in electronic voting. In: 2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW). pp. 38–45 (2021)
Diao, W., Liu, X., Li, Z., Zhang, K.: No pardon for the interruption: New inference attacks on android through interrupt timing analysis. In: 2016 IEEE Symposium on Security and Privacy (SP). pp. 414–432 (2016)
Dikshit, P., Singh, K.: Efficient weighted threshold ecdsa for securing bitcoin wallet. In: 2017 ISEA Asia Security and Privacy (ISEASP). pp. 1–9 (2017)
Gentilal, M., Martins, P., Sousa, L.: Trustzone-backed bitcoin wallet. In: Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems. pp. 25–28 (2017)
Hassan, M.A., Shukur, Z.: Review of digital wallet requirements. In: 2019 International Conference on Cybersecurity (ICoCSec). pp. 43–48 (2019)
He, D., Li, S., Li, C., Zhu, S., Chan, S., Min, W., Guizani, N.: Security analysis of cryptocurrency wallets in android-based applications. IEEE Network 34(6), 114–119 (2020)
Jokić, S.: Analysis and security of crypto currency wallets. ZBORNIK RADOVA UNIVERZITETA SINERGIJA 19(4) (2019)
Jørgensen, K.P., Beck, R.: Universal wallets. Business & Information Systems Engineering pp. 1–11 (2022)
Kanimozhi, G., Kamatchi, K.: Security aspects of mobile based e wallet. International Journal on Recent and Innovation Trends in Computing and Communication 5(6), 1223–1228 (2017)
Khan, A.G., Zahid, A.H., Hussain, M., Riaz, U.: Security of cryptocurrency using hardware wallet and qr code. In: 2019 International Conference on Innovative Computing (ICIC). pp. 1–10 (2019). https://doi.org/10.1109/ICIC48496.2019.8966739
Muthavhine, K.D., Sumbwanyambe, M.: An analysis and a comparative study of cryptographic algorithms used on the internet of things (iot) based on avalanche effect. In: 2018 International Conference on Information and Communications Technology (ICOIACT). pp. 114–119. IEEE (2018)
Palattella, M.R., Accettura, N., Vilajosana, X., Watteyne, T., Grieco, L.A., Boggia, G., Dohler, M.: Standardized protocol stack for the internet of (important) things. IEEE communications surveys & tutorials 15(3), 1389–1406 (2012)
Rezaeighaleh, H., Zou, C.C.: New secure approach to backup cryptocurrency wallets. In: 2019 IEEE Global Communications Conference (GLOBECOM). pp. 1–6 (2019)
Rezaeighaleh, H., Zou, C.C.: Multilayered defense-in-depth architecture for cryptocurrency wallet. In: 2020 IEEE 6th International Conference on Computer and Communications (ICCC). pp. 2212–2217 (2020)
Sai, A.R., Buckley, J., Le Gear, A.: Privacy and security analysis of cryptocurrency mobile applications. In: 2019 Fifth Conference on Mobile and Secure Services (MobiSecServ). pp. 1–6 (2019)
Singh, G.: A review of factors affecting digital payments and adoption behaviour for mobile e-wallets. International Journal of Research in Management & Business Studies 6(4), 89–96 (2019)
Suratkar, S., Shirole, M., Bhirud, S.: Cryptocurrency wallet: A review. In: 2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP). pp. 1–7 (2020)
Tan, Q., Gao, Y., Shi, J., Wang, X., Fang, B., Tian, Z.: Toward a comprehensive insight into the eclipse attacks of tor hidden services. IEEE Internet of Things Journal 6(2), 1584–1593 (2019)
Taylor, S.K., Ariffin, A., Zainol Ariffin, K.A., Sheikh Abdullah, S.N.H.: Cryptocurrencies investigation: A methodology for the preservation of cryptowallets. In: 2021 3rd International Cyber Resilience Conference (CRC). pp. 1–5 (2021)
Uddin, M.S., Mannan, M., Youssef, A.: Horus: A security assessment framework for android crypto wallets. In: International Conference on Security and Privacy in Communication Systems. pp. 120–139. Springer (2021)
Varghese, H.M., Nagoree, D.A., Anshu, Jayapandian, N.: Cryptocurrency security and privacy issues: A research perspective. In: 2021 6th International Conference on Communication and Electronics Systems (ICCES). pp. 902–907 (2021)
Veinović, M., Adamović, S.: Kriptologija 1. Beograd: Univerzitet Singidunum (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Nowroozi, E., Seyedshoari, S., Mekdad, Y., Savaş, E., Conti, M. (2023). Cryptocurrency Wallets: Assessment and Security. In: Maleh, Y., Alazab, M., Romdhani, I. (eds) Blockchain for Cybersecurity in Cyber-Physical Systems. Advances in Information Security, vol 102. Springer, Cham. https://doi.org/10.1007/978-3-031-25506-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-25506-9_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-25505-2
Online ISBN: 978-3-031-25506-9
eBook Packages: Computer ScienceComputer Science (R0)