Security Of Cryptocurrency Using Hardware Wallet And QR Code

Today, the privacy and the security of any organization are the key requirement, the digital online transaction of money or coins also needed a certain level of security not only during the broadcasting of the transaction but before the sending of the transaction. In this research paper we proposed and implemented a cryptocurrency (Bitcoin) wallet for the android operating system, by using the QR code-based android application and a secure private key storage (Cold Wallet). Two android applications have been implemented one of them is called cold wallet and the other one is hot wallet. Cold wallet (offline) is to store and generate the private key addresses for secure transaction confirmation and the hot wallet is used to send bitcoin to the network. Hot wallet application gives facility to the user view history of performed transactions, to send and compose a new bitcoin transaction, receive bitcoin, sign it and send it to the network. By using the process of cross QR code scanning of the hot and cold wallet to the identification, validation and authentication of the user made it secure.

[1]  Arati Baliga,et al.  Understanding Blockchain Consensus Models , 2017 .

[2]  Akanksha Kaushik,et al.  Blockchain — Literature survey , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).

[3]  Muzammil Hussain,et al.  Crypto-Currency , 2019, FinTech as a Disruptive Technology for Financial Institutions.

[4]  D. Birch What Does Cryptocurrency Mean for the New Economy , 2015 .

[5]  Sihua Ma USING BLOCKCHAIN TO BUILD DECENTRALIZED ACCESS CONTROL IN A PEER-TO-PEER E-LEARNING PLATFORM , 2018 .

[6]  Hai Jin,et al.  SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone , 2018, IEEE Access.

[7]  Indrajit Ray,et al.  Measuring, analyzing and predicting security vulnerabilities in software systems , 2007, Comput. Secur..

[8]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[9]  Ghassan O. Karame,et al.  Double-spending fast payments in bitcoin , 2012, CCS.

[10]  B. B. Zaidan,et al.  A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy , 2015, Journal of Medical Systems.

[11]  Usman W. Chohan The Double Spending Problem and Cryptocurrencies , 2017 .

[12]  Sang-Soo Yeo,et al.  Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value , 2011, Comput. Commun..

[13]  Muzammil Hussain,et al.  Security and Privacy in FinTech , 2019, Research Anthology on Concepts, Applications, and Challenges of FinTech.

[14]  Iuon-Chang Lin,et al.  A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..

[15]  B. B. Zaidan,et al.  A security framework for mHealth apps on Android platform , 2018, Comput. Secur..

[16]  Ghassan O. Karame,et al.  Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin , 2012, IACR Cryptol. ePrint Arch..

[17]  Abdul Ghaffar Khan,et al.  Analysis of asymmetric cryptography in information security based on computational study to ensure confidentiality during information exchange , 2018 .

[18]  Mikko Huhmo Blockchain Technology : Bitcoin as a case , 2018 .

[19]  B. B. Zaidan,et al.  Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS , 2015, J. Biomed. Informatics.

[20]  Kunwar Singh,et al.  Efficient weighted threshold ECDSA for securing bitcoin wallet , 2017, 2017 ISEA Asia Security and Privacy (ISEASP).

[21]  Sunil Kumar Khatri,et al.  Role and Aplications of Iot in Online Transactions using Blockchain Technology , 2018, 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE).

[22]  Kim-Kwang Raymond Choo,et al.  On cloud security attacks: A taxonomy and intrusion detection and prevention as a service , 2016, J. Netw. Comput. Appl..

[23]  Yue Liu,et al.  Recognition of QR Code with mobile phones , 2008, 2008 Chinese Control and Decision Conference.

[24]  Hauptadministrator,et al.  QR code , 2016, The Fairchild Books Dictionary of Fashion.

[25]  Joshua A. Kroll,et al.  Securing Bitcoin wallets via threshold signatures , 2014 .