Bitcoin double-spending risk and countermeasures at physical retail locations

被引:1
|
作者
Masteika, Saulius [1 ]
Rebzdys, Eimantas [1 ]
Driaunys, K. estutis [1 ]
Sapkauskiene, Alfreda [1 ]
Macerinskiene, Aida [1 ]
Krampas, Evaldas [2 ]
机构
[1] Vilnius Univ, Univ Str 3, LT-01513 Vilnius, Lithuania
[2] UAB Spectro Finance, Gediminas Ave 44A, LT-01110 Vilnius, Lithuania
关键词
Bitcoin; Instant payments; Zero-confirmation; Lightning network; Non-custodial wallets;
D O I
10.1016/j.ijinfomgt.2023.102727
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
This research examines vulnerabilities and potential attacks using Bitcoin payment systems at physical retail locations. It also lays a theoretical and practical foundation for effective countermeasures that ensure the integrity of decentralized transactions and bolster the confidence of both merchants and customers. The study focuses on potential double-spend attacks, particularly in the context of instant payments made via non-custodial crypto wallets. It also evaluates alternatives for instant crypto payments that use alternative coins and secondlayer blockchain solutions. Research has indicated that Eclipse, Sybil, Majority, Race, and Finney attacks carry a relatively low risk, especially when payment amounts are limited. The paper identifies Replace-By-Fee attacks as the most significant threat and presents a set of countermeasures. These findings are of great importance to cryptocurrency experts, payment tech researchers, retail enterprises, and stakeholders using noncustodial wallets while exploring decentralized blockchain aspects.
引用
收藏
页数:17
相关论文
共 43 条
  • [21] Vulnerability of scale-free cryptocurrency networks to double-spending attacks
    Zhang, Junhuan
    Xu, Yuqian
    Houser, Daniel
    EUROPEAN JOURNAL OF FINANCE, 2021, 27 (12): : 1235 - 1249
  • [22] Occupation mechanism for eliminating double-spending attacks on trusted transaction blockchain
    Zhang, Yu Yan
    Huang, Meng Yan
    Zhang, Xu
    2021 THE 3RD INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY, ICBCT 2021, 2021, : 14 - 19
  • [23] RETRACTED: Countering Double-Spending in Next-Generation Blockchains (Retracted Article)
    Saad, Muhammad
    Mohaisen, Aziz
    Kamhoua, Charles
    Kwait, Kevin
    Njilla, Laurent
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [24] An Off-line Mobile Payment Protocol Providing Double-spending Detection
    Tso, Raylin
    Lin, Chen-Yi
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 570 - 575
  • [25] Opportunistic Algorithmic Double-Spending: How I Learned to Stop Worrying and Love the Fork
    Stifter, Nicholas
    Judmayer, Aljosha
    Schindler, Philipp
    Weippl, Edgar
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 46 - 66
  • [26] Securing IoT Transactions Against Double-Spending Attacks based on Signaling Game Approach
    Benaddi, Hafsa
    Jouhari, Mohammed
    Ibrahimi, Khalil
    Benslimane, Abderrahim
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [27] PSPAB: Privacy-preserving average procurement bidding system with double-spending checking
    Li, Li
    Liu, Jiayong
    Jia, Peng
    Zheng, Rongfeng
    PLOS ONE, 2020, 15 (10):
  • [28] Personalized Difficulty Adjustment for Countering the Double-Spending Attack in Proof-of-Work Consensus Protocols
    Chou, Chi-Ning
    Lin, Yu-Jing
    Tu, I-Ping
    Liao, Shih-wei
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1456 - 1462
  • [29] Evaluation of Hash Rate-based Double-Spending based on Proof-of-Work Blockchain
    Suliyanti, Widya Nita
    Sari, Riri Fitri
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 169 - 174
  • [30] Comprehensive Overview of Selfish Mining and Double Spending Attack Countermeasures
    Nicolas, Kervins
    Wang, Yi
    Giakos, George C.
    2019 IEEE 40TH SARNOFF SYMPOSIUM, 2019,