Visible to the public Security Of Cryptocurrency Using Hardware Wallet And QR Code

TitleSecurity Of Cryptocurrency Using Hardware Wallet And QR Code
Publication TypeConference Paper
Year of Publication2019
AuthorsKhan, Abdul Ghaffar, Zahid, Amjad Hussain, Hussain, Muzammil, Riaz, Usama
Conference Name2019 International Conference on Innovative Computing (ICIC)
KeywordsAndroid (operating system), Android applications, authorisation, bitcoin transaction, blockchain, cold wallet, cross QR code scanning, cryptocurrency, cryptocurrency wallet, cryptography, cyber physical systems, data privacy, digital online transaction, electronic money, hardware wallet, Hot Wallet, hot wallet application, mobile computing, Peer-to-peer computing, private key cryptography, pubcrawl, QR code, QR code-based android application, QR codes, Resiliency, secure private key storage, secure transaction confirmation, smart phones, transaction processing
AbstractToday, the privacy and the security of any organization are the key requirement, the digital online transaction of money or coins also needed a certain level of security not only during the broadcasting of the transaction but before the sending of the transaction. In this research paper we proposed and implemented a cryptocurrency (Bitcoin) wallet for the android operating system, by using the QR code-based android application and a secure private key storage (Cold Wallet). Two android applications have been implemented one of them is called cold wallet and the other one is hot wallet. Cold wallet (offline) is to store and generate the private key addresses for secure transaction confirmation and the hot wallet is used to send bitcoin to the network. Hot wallet application gives facility to the user view history of performed transactions, to send and compose a new bitcoin transaction, receive bitcoin, sign it and send it to the network. By using the process of cross QR code scanning of the hot and cold wallet to the identification, validation and authentication of the user made it secure.
DOI10.1109/ICIC48496.2019.8966739
Citation Keykhan_security_2019