Abstract
Blockchain is a substantive technology which provide reliable and convenient services by establishing trust in open environment. Blockchain basically relies upon two critical technological areas of cryptography and decentralization to perform transactions of confidential data. This technology is gaining traction since its discovery in 2008 due to its ability to accomplish immutable transactions without third party interfere. Owing to these astonishing features, it has become backbone of all industries and business including digital financing, e-Governance, smart grid, etc. Many banking and financial service providers have started to allot wallets to its customer where they can use money in highly secure environment. However, blockchain is considered the most secure technology available today, but its wallet is still not a temper proof. This paper aims to analyse various issues pertaining to blockchain wallet security. The existing developments in this area are studied in detail to pave a future direction of research in this regime. Section 1 is introduction of blockchain which includes blockchain wallets and their types, security issues in wallets and security practices used to resolve those issues. Section 2 includes wallet security challenges, vulnerabilities and recent review of literature on wallet security practices. Section 3 compare the related work and discuss growth in crypto crimes due to loss of cryptocurrency. Last section concludes the paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.s
Sengupta, J., Ruj, S., & Bit, S. D. (2020). A Comprehensive survey on attacks, security issues and Blockchain Solutions for IoT and IIoT. Journal of Network and Computer Applications, 149, 102481. ISSN 1084–8045.
Casino, F., Dasaklis, T. K., Patsakis, C. (2019). A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telematics and Informatics, 36, 55–81. ISSN 0736-5853.https://doi.org/10.1016/j.tele.2018.11.006
Mohanta, B. K., Jena, D., Panda, S. S., & Sobhanayak, S. (2019). Blockchain technology: A survey on applications and security privacy challenges. Internet of Things, 8, 100107. ISSN 2542-6605.https://doi.org/10.1016/j.iot.2019.100107
Sisodiya, V. S., & Garg, H. (2020). A comprehensive study of Blockchain and its various Applications. In 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), Mathura, Uttar Pradesh, India (pp. 475–480). https://doi.org/10.1109/PARC49193.2020.236659
“COinMarketCap. https://coinmarketcap.com/all/views/all/. Accessed on Oct. 21, 2020.
Taylor, P. J., Dargahi, T., Dehghantanha, A., Parizi, R. M., Raymond Choo, K.-K. (2020). Systematic literature review of blockchain cyber security. Digital Communications and Networks, 6(2), 147–156, ISSN 2352-8648. https://doi.org/10.1016/j.dcan.2019.01.005
“Blockchain Edify”. https://blockchainedify.com/2020/09/26/what-is-blockchain-technology/
Ghimire, S., & Selvaraj, H. (2018). A survey on bitcoin cryptocurrency and its mining. In 2018 26th International Conference on Systems Engineering (ICSEng), Sydney, Australia (pp. 1–6). https://doi.org/10.1109/ICSENG.2018.8638208
Rajput, S., Singh, A., Khurana, S., Bansal, T., & Shreshtha, S. (2019). Blockchain technology and cryptocurrenices. In 2019 Amity International Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates (pp. 909–912). https://doi.org/10.1109/AICAI.2019.8701371
Pal, O., Alam, B., Thakur, V., & Singh, S. (2019). Key management for blockchain technology. In ICT Express, ISSN 2405-9595. https://doi.org/10.1016/j.icte.2019.08.002
Sabah, S., Mahdi, N., & Majeed, I. (2019). The road to the blockchain technology: Concept and types. Periodicals of Engineering and Natural Sciences (PEN) (Vol. 7, pp. 1821–1832), Dec 2019. https://doi.org/10.21533/pen.v7i4.935
Conti, M., Sandeep Kumar, E., Lal, C., & Ruj, S. (2018). A survey on security and privacy issues of bitcoin. In IEEE Communications Surveys & Tutorials (Vol. 20, No. 4, pp. 3416–3452), Fourthquarter 2018. https://doi.org/10.1109/COMST.2018.2842460
Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. A survey on the security of blockchain systems. Future Generation Computer Systems, 107, 841–853. ISSN 0167-739X
Dasgupta, D., Shrein, J. M., & Gupta, K. D. (2019). A survey of blockchain from security perspective. Journal of Banking and Financial Technology, 3, 1–17. https://doi.org/10.1007/s42786-018-00002-6
Jokić, S., Cvetković, A. S., Adamović, S., Ristić, N., & Spalević, P. (2019). Comparative analysis of cryptocurrency wallets vs traditional wallets. Proceedings of International Journal for Economic Theory and Practice and Social Issues, Oct 2019, https://scindeks-clanci.ceon.rs/data/pdf/0350-137X/2019/0350-137X1903065J.pdf
Latifa, E.-R., Ahemed, E. K. M., Mohamed, E. G., & Omar, A. Blockchain: bitcoin wallet cryptography security, challenges and countermeasures. Journal of Internet Banking and Commerce. https://www.icommercecentral.com/open-access/blockchain-bitcoin-wallet-cryptography-security-challenges-and-countermeasures.php?aid=86561
Aydar, M., Cetin, S., Ayvaz, S., & Aygun, B. (2020). Private key encryption and recovery in blockchain. Submitted on 9 Jul 2019 (v1), last revised 25 Jun 2020 (this version, v2).
Sun, S.-F., Au, M. H., Liu, J. K., & Yuen, T. H., (2017). RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero. In Proc. Eur. Symp. Res. Comput. Secur. (pp. 456–474).
https://cointelegraph.com/news/14b-in-crypto-stolen-in-first-five-months-of-2020-says-ciphertrace. Accessed on Oct. 21, 2020.
Rezaeighaleh, H., & Zou, C. C. (2019). New secure approach to backup cryptocurrency wallets. In 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA (pp. 1–6). https://doi.org/10.1109/GLOBECOM38437.2019.9014007
https://ledgerops.com/blog/2019-03-28-top-five-blockchain-security-issues-in-2019. Accessed on Oct. 16, 2020.
Kaushal, P. K., Bagga, A., & Sobti, R. (2017). Evolution of bitcoin and security risk in bitcoin wallets. In 2017 International Conference on Computer, Communications and Electronics (Comptelix), Jaipur (pp. 172–177). https://doi.org/10.1109/COMPTELIX.2017.8003959
Wang, H., Wang, Y., Cao, Z., Li, Z., Xiong, G. (2019). An overview of blockchain security analysis. In: X. Yun, et al. (eds.). Cyber Security. CNCERT 2018, Communications in Computer and Information Science (Vol. 970). Springer. https://doi.org/10.1007/978-981-13-6621-5_5
Breitner, J., Heninger, N. (2019). Biased Nonce sense: Lattice attacks against weak ECDSA signatures in cryptocurrencies. In: I. Goldberg, T. Moore (eds.). Financial cryptography and data security. FC 2019. Lecture Notes in Computer Science (Vol. 11598). Cham: Springer. https://doi.org/10.1007/978-3-030-32101-7_1
https://www.internetsociety.org/blog/2017/11/roca-encryption-vulnerability. Accessed on Oct. 21, 2020.
https://www.zdnet.com/article/upbit-cryptocurrency-exchange-loses-48-5-million-to-hackers. Accessed on Oct. 21, 2020.
Gan, S. (2017). An IoT simulator in NS3 and a key based authentication architecture for IoT devices using blockchain. Indian Institute of Technology, Kanpur (online). https://security.cse.iitk.ac.in/node/240. Accessed on Oct. 21, 2020.
Salman, T., Zolanvari, M., Erbad, A., Jain, R., & Samaka, M. (2019). Security services using blockchains: A state-of-the-art survey. In IEEE Communications Surveys & Tutorials (Vol. 21, No. 1, pp. 858–880), Firstquarter. https://doi.org/10.1109/COMST.2018.2863956
Matsumoto, S., Reischuk, R. M. (2017). IKP: turning a PKI around with decentralized automated incentives. In 2017 IEEE Symposium on Security and Privacy, SP, San Jose, CA (pp. 410–426).
Guardtime. (2017). Internet of Things authentication: A blockchain solution using SRAM physical unclonable functions (online). https://www.intrinsic-id.com/wpcontent/uploads/2017/05/gt_KSIPUF-web-1611pdf. Accessed on Oct. 21, 2020.
He, S., et al. (2018). A social-network-based cryptocurrency wallet-management scheme. IEEE Access, 6, 7654–7663. https://doi.org/10.1109/ACCESS.2018.2799385
Litke, P., & Stewart, J. (2014). Cryptocurrency-stealing malware landscape (Online). Available https://www.secureworks.com/research/cryptocurrency-stealing-malware-landscape
M. Team. Multibit. Available: https://multibit.org. Accessed on Oct. 21, 2020.
Wuille. P. (2020). Bip32: Hierarchical deterministic wallets. Available: https://github.com/genjix/bips/blob/master/bip0032.md. Accessed on Oct. 2, 2020.
Vasek, M., Bonneau, J., Ryan Castellucci, C. K., & Moore, T. (2016). The Bitcoin brain drain: A short paper on the use and abuse of Bitcoin brain wallets. In Financial Cryptography and Data Security (Lecture Notes in Computer Science). New York, NY, USA: Springer.
Wang, N., Chen, Y., Yang, Y., Fang, Z. & Sun, Y. (2019). Blockchain private key storage algorithm based on image information hiding. https://doi.org/10.1007/978-3-030-24268-8_50
Biswas, C., Gupta, U. D., & Haque, M. M. (2019). An efficient algorithm for confidentiality, integrity and authentication using hybrid cryptography and steganography. In 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), Cox'sBazar, Bangladesh (pp. 1–5). https://doi.org/10.1109/ECACE.2019.8679136
Rashmi, N., & Jyothi, K. (2018). An improved method for reversible data hiding steganography combined with cryptography (pp. 81–84). https://doi.org/10.1109/ICISC.2018.8398946
Kumar, R., & Singh, N. (2020). A survey based on enhanced the security of image using the combined techniques of steganography and cryptography (March 29, 2020). In Proceedings of the International Conference on Innovative Computing & Communications (ICICC), Available at SSRN: https://ssrn.com/abstract=3563571
Chauhan, S., Jyotsna, Kumar, J., & Doegar, A. (2017). Multiple layer text security using variable block size cryptography and image steganography. In 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad (pp. 1–7). https://doi.org/10.1109/CIACT.2017.7977303
Hosam, O. (2018). Hiding bitcoins in steganographic fractals (pp. 512–519). https://doi.org/10.1109/ISSPIT.2018.8642736
Boiangiu, C.-A., & Morosan, A., & Stan, M. (2015). Fractal objects in computer graphics.
Ma, H., & Sun, G. (2020). Blockchain-based group key management scheme in IoT. In D. S. Huang, V. Bevilacqua, A. Hussain (eds.). Intelligent Computing Theories and Application. ICIC 2020. Lecture Notes in Computer Science (Vol. 12463). Cham: Springer. https://doi.org/10.1007/978-3-030-60799-9_39
Tian, Y., Wang, Z., Xiong, J., & Ma, J. (2020). A blockchain-based secure key management scheme with trustworthiness in DWSNs. IEEE Transactions on Industrial Informatics, 16(9), 6193–6202. https://doi.org/10.1109/TII.2020.2965975
Zhu, F., et al. (2017). Trust your wallet: A new online wallet architecture for Bitcoin. In 2017 International Conference on Progress in Informatics and Computing (PIC), Nanjing (pp. 307–311). https://doi.org/10.1109/PIC.2017.8359562
Engelmann, C., Scott, S. L., Leangsuksun, C., & He, X. (2008). Symmetric active/active high availability for high-performance computing system services: Accomplishments and limitations. In 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID) (pp. 813–818).
Tschorsch, F., & Scheuermann, B. (2016). Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys & Tutorials, 18(3), 2084–2123.
Alqahtani, H., Kavakli-Thorne, M., & Kumar, G. (2019). Applications of Generative Adversarial Networks (GANs): An updated Review. Arch Computat Methods Eng. https://doi.org/10.1007/s11831-019-09388-y
https://ciphertrace.com/spring-2020-cryptocurrency-anti-money-laundering-report. Accessed on Oct. 21, 2020.
https://in.reuters.com/article/us-crypto-currency-crime/cryptocurrency-thefts-scams-hit-1-7-billion-in-2018-report-idINKCN1PN1SQ. Accessed on Oct. 17, 2020.
https://www.cnbc.com/2019/01/29/crime-still-plague-cryptocurrencies-as-1point7-billion-was-stolen-last-year-.html. Accessed on Oct. 19.
Acknowledgements
Acknowledgements and Reference heading should be left justified, bold, with the first letter capitalized but have no numbers. Text below continues as normal.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Taruna, Rishabh (2022). Analysis of Security Issues in Blockchain Wallet. In: Gupta, D., Khanna, A., Kansal, V., Fortino, G., Hassanien, A.E. (eds) Proceedings of Second Doctoral Symposium on Computational Intelligence . Advances in Intelligent Systems and Computing, vol 1374. Springer, Singapore. https://doi.org/10.1007/978-981-16-3346-1_63
Download citation
DOI: https://doi.org/10.1007/978-981-16-3346-1_63
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-3345-4
Online ISBN: 978-981-16-3346-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)