Introducing Bitcoin and its Security Challenges

Document Type : Original Article

Authors

beheshti shahid university

Abstract

The growing trend in data and transactions in the world implies the need for fast high-security systems. For this reason, digital exchange has attracted the attention of researchers over the past few years. The Bitcoin is the first digital currency to be offered and operates on the block chain. The demand for using Bitcoin is now high due to the special features of digital currencies. Specifically, the most important feature of these currencies, and in particular the Bitcoin is decentralization, which does not require a trustworthy intermediary for security matters. In this paper, while introducing Bitcoins and the mechanisms for producing this digital currency, we will examine its security against attacks. Specifically, this article examines challenges such as attack and anonymity in Bitcoin. Understanding the challenges and characteristics of digital currencies especially Bitcoin, can help us understand the challenges and opportunities ahead in this area. Using Bitcoin is surprisingly increasing in our country, and because in case of any threats or attacks, this could potentially cause severe weakness in some parts of country’s economy, studies such as the present research appear indispensable in the field of passive defense.

Keywords


[1]
S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” Oct. 2008.##
[2]
I. Miers, C. Garman, M. Green, and A. D. Rubin, “Zerocoin: Anonymous Distributed E-Cash from Bitcoin,” in IEEE Symposium on Security and Privacy, 2013.##
[3]
E. B. Sasson , A. Chiesa , C. Garman, M. Green, I. Miers , E. Tromer, and M. Virza, “Zerocash: Decentralized Anonymous Payments from Bitcoin,” in Symposium on Security and Privacy, 2014.##
[4]
N. Van Saberhagen, “CryptoNote v. 2.0,” [Online]. Available: https://cryptonote.org/whitepaper.pdf.##
[5]
[6]
A. Antonopoulos, “Mastering Bitcoin: Unlocking Digital Cryptocurrencies,” O'Reilly, 2015.##
[7]
J. Bonneau, A. Miller , J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten, “Research Perspectives and Challenges for Bitcoin and Cryptocurrencies,” in IEEE Symposium on Security and Privacy, 2015.##
[8]
M. Moser and R. Bohme, “Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees,” in International Workshops Financial Cryptography and Data Security, 2015.##
[9]
T. Moore and N. Christin, “Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk,” in 17th International Conference Financial Cryptography and Data Security, 2013.##
[10]
A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, “Bitcoin and Cryptocurrency Technologies,” Princeton University Press, Feb. 2016.##
[11]
M. Rosenfeld, “Analysis of Bitcoin Pooled Mining Reward Systems,” arXiv, 2011.##
[12]
A. Back, “Hashcash - A Denial of Service        Counter-Measure,” 2002. [Online]. Available: http://www.hashcash.org/papers/hashcash.pdf.##
[13]
M. B. Taylor, “Bitcoin and the Age of Bespoke Silicon,” in International Conference on Compilers, Architectures and Synthesis for Embedded Systems, 2013.##
[14]
A. Kampl, “Analysis of Large-Scale Bitcoin Mining Operations,” White paper, 2014.##
[15]
“bitcoin wisdom,” [Online]. https://bitcoinwisdom.com/##
[16]
J. Kroll, I. C. Davey, and E. W. Felten, “The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries,” in Workshop on the Economics of Information Security 2013, 2013.##
[17]
I. Eyal, “The Miner’s Dilemma,” in Symposium on Security and Privacy, 2015.##
[18]
I. Eyal and M. G. Esirer, “Majority Is Not Enough: Bitcoin Mining Is Vulnerable,” in 18th International Conference Financial Cryptography and Data Security, 2014.##
[19]
S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M. Voelker, and S. Savage, “A fistful of Bitcoins: characterizing payments among men with no names,” Commun. {ACM}, vol. 59, no. 4, pp. 86-93, 2016.##
[20]
J. Bonneau, A. Narayanan, A. Miller, J. Clark , J. A. Kroll, and E. W. Felten, “Mixcoin: Anonymity for Bitcoin with Accountable Mixes,” in 18th International Conference Financial Cryptography and Data Security, 2014.##
[21]
M. Malte, R. Böhme, and D. Breuker, “An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem,” in eCrime Researchers Summit, 2013.##