Skip to main content

Analysis of Security Issues in Blockchain Wallet

  • Conference paper
  • First Online:
Proceedings of Second Doctoral Symposium on Computational Intelligence

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1374))

Abstract

Blockchain is a substantive technology which provide reliable and convenient services by establishing trust in open environment. Blockchain basically relies upon two critical technological areas of cryptography and decentralization to perform transactions of confidential data. This technology is gaining traction since its discovery in 2008 due to its ability to accomplish immutable transactions without third party interfere. Owing to these astonishing features, it has become backbone of all industries and business including digital financing, e-Governance, smart grid, etc. Many banking and financial service providers have started to allot wallets to its customer where they can use money in highly secure environment. However, blockchain is considered the most secure technology available today, but its wallet is still not a temper proof. This paper aims to analyse various issues pertaining to blockchain wallet security. The existing developments in this area are studied in detail to pave a future direction of research in this regime. Section 1 is introduction of blockchain which includes blockchain wallets and their types, security issues in wallets and security practices used to resolve those issues. Section 2 includes wallet security challenges, vulnerabilities and recent review of literature on wallet security practices. Section 3 compare the related work and discuss growth in crypto crimes due to loss of cryptocurrency. Last section concludes the paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.s

    Google Scholar 

  2. Sengupta, J., Ruj, S., & Bit, S. D. (2020). A Comprehensive survey on attacks, security issues and Blockchain Solutions for IoT and IIoT. Journal of Network and Computer Applications, 149, 102481. ISSN 1084–8045.

    Google Scholar 

  3. Casino, F., Dasaklis, T. K., Patsakis, C. (2019). A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telematics and Informatics, 36, 55–81. ISSN 0736-5853.https://doi.org/10.1016/j.tele.2018.11.006

  4. Mohanta, B. K., Jena, D., Panda, S. S., & Sobhanayak, S. (2019). Blockchain technology: A survey on applications and security privacy challenges. Internet of Things, 8, 100107. ISSN 2542-6605.https://doi.org/10.1016/j.iot.2019.100107

  5. Sisodiya, V. S., & Garg, H. (2020). A comprehensive study of Blockchain and its various Applications. In 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), Mathura, Uttar Pradesh, India (pp. 475–480). https://doi.org/10.1109/PARC49193.2020.236659

  6. “COinMarketCap. https://coinmarketcap.com/all/views/all/. Accessed on Oct. 21, 2020.

  7. Taylor, P. J., Dargahi, T., Dehghantanha, A., Parizi, R. M., Raymond Choo, K.-K. (2020). Systematic literature review of blockchain cyber security. Digital Communications and Networks, 6(2), 147–156, ISSN 2352-8648. https://doi.org/10.1016/j.dcan.2019.01.005

  8. “Blockchain Edify”. https://blockchainedify.com/2020/09/26/what-is-blockchain-technology/

  9. Ghimire, S., & Selvaraj, H. (2018). A survey on bitcoin cryptocurrency and its mining. In 2018 26th International Conference on Systems Engineering (ICSEng), Sydney, Australia (pp. 1–6). https://doi.org/10.1109/ICSENG.2018.8638208

  10. Rajput, S., Singh, A., Khurana, S., Bansal, T., & Shreshtha, S. (2019). Blockchain technology and cryptocurrenices. In 2019 Amity International Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates (pp. 909–912). https://doi.org/10.1109/AICAI.2019.8701371

  11. Pal, O., Alam, B., Thakur, V., & Singh, S. (2019). Key management for blockchain technology. In ICT Express, ISSN 2405-9595. https://doi.org/10.1016/j.icte.2019.08.002

  12. Sabah, S., Mahdi, N., & Majeed, I. (2019). The road to the blockchain technology: Concept and types. Periodicals of Engineering and Natural Sciences (PEN) (Vol. 7, pp. 1821–1832), Dec 2019. https://doi.org/10.21533/pen.v7i4.935

  13. Conti, M., Sandeep Kumar, E., Lal, C., & Ruj, S. (2018). A survey on security and privacy issues of bitcoin. In IEEE Communications Surveys & Tutorials (Vol. 20, No. 4, pp. 3416–3452), Fourthquarter 2018. https://doi.org/10.1109/COMST.2018.2842460

  14. Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. A survey on the security of blockchain systems. Future Generation Computer Systems, 107, 841–853. ISSN 0167-739X

    Google Scholar 

  15. Dasgupta, D., Shrein, J. M., & Gupta, K. D. (2019). A survey of blockchain from security perspective. Journal of Banking and Financial Technology, 3, 1–17. https://doi.org/10.1007/s42786-018-00002-6

    Article  Google Scholar 

  16. Jokić, S., Cvetković, A. S., Adamović, S., Ristić, N., & Spalević, P. (2019). Comparative analysis of cryptocurrency wallets vs traditional wallets. Proceedings of International Journal for Economic Theory and Practice and Social Issues, Oct 2019, https://scindeks-clanci.ceon.rs/data/pdf/0350-137X/2019/0350-137X1903065J.pdf

  17. Latifa, E.-R., Ahemed, E. K. M., Mohamed, E. G., & Omar, A. Blockchain: bitcoin wallet cryptography security, challenges and countermeasures. Journal of Internet Banking and Commerce. https://www.icommercecentral.com/open-access/blockchain-bitcoin-wallet-cryptography-security-challenges-and-countermeasures.php?aid=86561

  18. Aydar, M., Cetin, S., Ayvaz, S., & Aygun, B. (2020). Private key encryption and recovery in blockchain. Submitted on 9 Jul 2019 (v1), last revised 25 Jun 2020 (this version, v2).

    Google Scholar 

  19. Sun, S.-F., Au, M. H., Liu, J. K., & Yuen, T. H., (2017). RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero. In Proc. Eur. Symp. Res. Comput. Secur. (pp. 456–474).

    Google Scholar 

  20. https://cointelegraph.com/news/14b-in-crypto-stolen-in-first-five-months-of-2020-says-ciphertrace. Accessed on Oct. 21, 2020.

  21. Rezaeighaleh, H., & Zou, C. C. (2019). New secure approach to backup cryptocurrency wallets. In 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA (pp. 1–6). https://doi.org/10.1109/GLOBECOM38437.2019.9014007

  22. https://ledgerops.com/blog/2019-03-28-top-five-blockchain-security-issues-in-2019. Accessed on Oct. 16, 2020.

  23. Kaushal, P. K., Bagga, A., & Sobti, R. (2017). Evolution of bitcoin and security risk in bitcoin wallets. In 2017 International Conference on Computer, Communications and Electronics (Comptelix), Jaipur (pp. 172–177). https://doi.org/10.1109/COMPTELIX.2017.8003959

  24. Wang, H., Wang, Y., Cao, Z., Li, Z., Xiong, G. (2019). An overview of blockchain security analysis. In: X. Yun, et al. (eds.). Cyber Security. CNCERT 2018, Communications in Computer and Information Science (Vol. 970). Springer. https://doi.org/10.1007/978-981-13-6621-5_5

  25. https://www.bleepingcomputer.com/news/security/iota-cryptocurrency-users-lose-4-million-in-clever-phishing-attack/#:~:text=A%20clever%20hacker%20made%20off,steal%20money%20from%20users'%20accounts.Accessed on Oct. 23, 2020.

  26. Breitner, J., Heninger, N. (2019). Biased Nonce sense: Lattice attacks against weak ECDSA signatures in cryptocurrencies. In: I. Goldberg, T. Moore (eds.). Financial cryptography and data security. FC 2019. Lecture Notes in Computer Science (Vol. 11598). Cham: Springer. https://doi.org/10.1007/978-3-030-32101-7_1

  27. https://www.internetsociety.org/blog/2017/11/roca-encryption-vulnerability. Accessed on Oct. 21, 2020.

  28. https://www.zdnet.com/article/upbit-cryptocurrency-exchange-loses-48-5-million-to-hackers. Accessed on Oct. 21, 2020.

  29. Gan, S. (2017). An IoT simulator in NS3 and a key based authentication architecture for IoT devices using blockchain. Indian Institute of Technology, Kanpur (online). https://security.cse.iitk.ac.in/node/240. Accessed on Oct. 21, 2020.

  30. Salman, T., Zolanvari, M., Erbad, A., Jain, R., & Samaka, M. (2019). Security services using blockchains: A state-of-the-art survey. In IEEE Communications Surveys & Tutorials (Vol. 21, No. 1, pp. 858–880), Firstquarter. https://doi.org/10.1109/COMST.2018.2863956

  31. Matsumoto, S., Reischuk, R. M. (2017). IKP: turning a PKI around with decentralized automated incentives. In 2017 IEEE Symposium on Security and Privacy, SP, San Jose, CA (pp. 410–426).

    Google Scholar 

  32. Guardtime. (2017). Internet of Things authentication: A blockchain solution using SRAM physical unclonable functions (online). https://www.intrinsic-id.com/wpcontent/uploads/2017/05/gt_KSIPUF-web-1611pdf. Accessed on Oct. 21, 2020.

  33. He, S., et al. (2018). A social-network-based cryptocurrency wallet-management scheme. IEEE Access, 6, 7654–7663. https://doi.org/10.1109/ACCESS.2018.2799385

    Article  Google Scholar 

  34. Litke, P., & Stewart, J. (2014). Cryptocurrency-stealing malware landscape (Online). Available https://www.secureworks.com/research/cryptocurrency-stealing-malware-landscape

  35. M. Team. Multibit. Available: https://multibit.org. Accessed on Oct. 21, 2020.

  36. Wuille. P. (2020). Bip32: Hierarchical deterministic wallets. Available: https://github.com/genjix/bips/blob/master/bip0032.md. Accessed on Oct. 2, 2020.

  37. Vasek, M., Bonneau, J., Ryan Castellucci, C. K., & Moore, T. (2016). The Bitcoin brain drain: A short paper on the use and abuse of Bitcoin brain wallets. In Financial Cryptography and Data Security (Lecture Notes in Computer Science). New York, NY, USA: Springer.

    Google Scholar 

  38. Wang, N., Chen, Y., Yang, Y., Fang, Z. & Sun, Y. (2019). Blockchain private key storage algorithm based on image information hiding. https://doi.org/10.1007/978-3-030-24268-8_50

  39. Biswas, C., Gupta, U. D., & Haque, M. M. (2019). An efficient algorithm for confidentiality, integrity and authentication using hybrid cryptography and steganography. In 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), Cox'sBazar, Bangladesh (pp. 1–5). https://doi.org/10.1109/ECACE.2019.8679136

  40. Rashmi, N., & Jyothi, K. (2018). An improved method for reversible data hiding steganography combined with cryptography (pp. 81–84). https://doi.org/10.1109/ICISC.2018.8398946

  41. Kumar, R., & Singh, N. (2020). A survey based on enhanced the security of image using the combined techniques of steganography and cryptography (March 29, 2020). In Proceedings of the International Conference on Innovative Computing & Communications (ICICC), Available at SSRN: https://ssrn.com/abstract=3563571

  42. Chauhan, S., Jyotsna, Kumar, J., & Doegar, A. (2017). Multiple layer text security using variable block size cryptography and image steganography. In 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad (pp. 1–7). https://doi.org/10.1109/CIACT.2017.7977303

  43. Hosam, O. (2018). Hiding bitcoins in steganographic fractals (pp. 512–519). https://doi.org/10.1109/ISSPIT.2018.8642736

  44. Boiangiu, C.-A., & Morosan, A., & Stan, M. (2015). Fractal objects in computer graphics.

    Google Scholar 

  45. Ma, H., & Sun, G. (2020). Blockchain-based group key management scheme in IoT. In D. S. Huang, V. Bevilacqua, A. Hussain (eds.). Intelligent Computing Theories and Application. ICIC 2020. Lecture Notes in Computer Science (Vol. 12463). Cham: Springer. https://doi.org/10.1007/978-3-030-60799-9_39

  46. Tian, Y., Wang, Z., Xiong, J., & Ma, J. (2020). A blockchain-based secure key management scheme with trustworthiness in DWSNs. IEEE Transactions on Industrial Informatics, 16(9), 6193–6202. https://doi.org/10.1109/TII.2020.2965975

    Article  Google Scholar 

  47. Zhu, F., et al. (2017). Trust your wallet: A new online wallet architecture for Bitcoin. In 2017 International Conference on Progress in Informatics and Computing (PIC), Nanjing (pp. 307–311). https://doi.org/10.1109/PIC.2017.8359562

  48. Engelmann, C., Scott, S. L., Leangsuksun, C., & He, X. (2008). Symmetric active/active high availability for high-performance computing system services: Accomplishments and limitations. In 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID) (pp. 813–818).

    Google Scholar 

  49. Tschorsch, F., & Scheuermann, B. (2016). Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys & Tutorials, 18(3), 2084–2123.

    Article  Google Scholar 

  50. Alqahtani, H., Kavakli-Thorne, M., & Kumar, G. (2019). Applications of Generative Adversarial Networks (GANs): An updated Review. Arch Computat Methods Eng. https://doi.org/10.1007/s11831-019-09388-y

    Article  Google Scholar 

  51. https://ciphertrace.com/spring-2020-cryptocurrency-anti-money-laundering-report. Accessed on Oct. 21, 2020.

  52. https://in.reuters.com/article/us-crypto-currency-crime/cryptocurrency-thefts-scams-hit-1-7-billion-in-2018-report-idINKCN1PN1SQ. Accessed on Oct. 17, 2020.

  53. https://www.cnbc.com/2019/01/29/crime-still-plague-cryptocurrencies-as-1point7-billion-was-stolen-last-year-.html. Accessed on Oct. 19.

Download references

Acknowledgements

Acknowledgements and Reference heading should be left justified, bold, with the first letter capitalized but have no numbers. Text below continues as normal.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Taruna, Rishabh (2022). Analysis of Security Issues in Blockchain Wallet. In: Gupta, D., Khanna, A., Kansal, V., Fortino, G., Hassanien, A.E. (eds) Proceedings of Second Doctoral Symposium on Computational Intelligence . Advances in Intelligent Systems and Computing, vol 1374. Springer, Singapore. https://doi.org/10.1007/978-981-16-3346-1_63

Download citation

Publish with us

Policies and ethics