Use of Bitcoin for Internet Trade

Use of Bitcoin for Internet Trade

Sadia Khalil (NUST School of Electrical Engineering and Computer Science, Pakistan), Rahat Masood (NUST School of Electrical Engineering and Computer Science, Pakistan) and Muhammad Awais Shibli (VisionIT, USA)
Copyright: © 2018 |Pages: 12
DOI: 10.4018/978-1-5225-2255-3.ch251

Abstract

Bitcoin is considered to be the world's first peer to peer and unregulated crypto-currency which has received widespread popularity in the last few years. It is issued and controlled by the members of the Bitcoin system. The success of Bitcoin has spurred the launch of many other crypto-currencies. Despite being widely adopted by various large scale businesses, Bitcoin transactions are still exposed to many known as well as zero-day attacks due to various vulnerabilities being exploited by the malicious entities. In order to achieve reliable and secure transactions, extensive research needs to be carried out to critically examine Bitcoin architecture and its level of security. In this regard, this chapter presents a holistic analysis of Bitcoin architecture and a survey of the attacks prevalent to its transactions. As an evaluation of the Bitcoin system, a comparison of different crypto-currencies has been presented, based on their features, possible attacks, disadvantages and the advantages which they possess over Bitcoin.
Chapter Preview
Top

Introduction

The advent of the digital currency systems has revolutionized the concept of money transfer by allowing the internet based creation, storage and transference of money. In the past few years, the digital currency systems have emerged as an efficient means of money transfer. They have received worldwide adoption by providing a medium of exchange based on mathematical operations and by taking the currencies out of the control and manipulation of the governments. In addition to being used in the e-commerce and commercial sectors, the digital currencies have also attracted a large population of the earth which cannot get access to the formal banking systems. The crypto-currencies, being one of their types, involve different cryptographic functions for their creation and transference, in a trusted and secure environment. The use of crypto-currencies has progressed from a virtual concept to reality by the evolution of Bitcoin. The success of this concept has led to the creation of many other crypto-currencies which include Litecoin, PeerCoin, Namecoin, Quarkcoin, Primecoin and Zetacoin (Stevenson, 2013). Bitcoin, along with the other crypto-currency systems, is very popular in the business world and the global economy, due to its decentralized peer-to-peer architecture. In comparison with the other payment platforms, which maintain a private communication network for sending and receiving money, Bitcoin uses the internet as its medium of transference.

By Looking critically into the Bitcoin protocol, we can find some weaknesses that can be violated by the attackers for malicious purposes. In the past few years, a lot of vulnerabilities have been exploited causing the users to lose their bitcoins (L., n.d.), (Blasco, 2013), (arXiv, 2014). Matthew Wilson et al. (Yelowitz, 2014) analyze the characteristics of the Bitcoin users based on the Google search data and found that illegal activities and programming enthusiast are related to Bitcoin search but no correlation was found with political and investment motives. As of March 2014, bitcoins of worth 502,081,166.11$ have been stolen (L., n.d.). Based on the empirical analysis of Bitcoin exchange risks, it is found that the failure rate of bitcoin exchanges is 40% (Christin, 2013). Mt. Gox that was considered to be the largest Bitcoin exchange, got bankrupt in February 2014, allegedly due to theft, resulting in the loss of 850,000 bitcoins, out of which 20,000 were later recovered (https://en.bitcoin.it/wiki/Mt._Gox, n.d.).

Key Terms in this Chapter

Altcoins: All the crypto-currencies other than the Bitcoin.

Digital Signature: A mathematical scheme for ensuring the authenticity of a message. The sender encrypts the message using its private key in order to create a digital signature. By doing this, the sender adds his identity to the message since the private key is only owned by that particular sender.

Crypto-Currencies: The type of digital currencies that use cryptography for their creation, security and transference.

Proof-of-Work: A defense mechanism against Denial of Service attacks in which the service requester has to perform some mathematical task before accessing the services.

Public Key Cryptography: An encryption technique in which each entity possesses a key pair (public/private key). In comparison with symmetric encryption in which single key is shared among the sender and the receiver, the public key cryptography involves two keys without the need of sharing them.

Digital Currencies: The currencies that use internet for their transference.

Complete Chapter List

Search this Book:
Reset