Research Article
Open access
Published on 15 March 2024
Download pdf
Wang,Z. (2024). Navigating the digital currency landscape: A comprehensive examination from blockchain foundations to website security. Applied and Computational Engineering,47,36-44.
Export citation

Navigating the digital currency landscape: A comprehensive examination from blockchain foundations to website security

Ziyue Wang *,1,
  • 1 University of Nottingham

* Author to whom correspondence should be addressed.

https://doi.org/10.54254/2755-2721/47/20241129

Abstract

This paper offers an exhaustive exploration of the burgeoning digital currency realm, spanning from the foundational tenets of blockchain technology to the evaluation of pivotal website security vulnerabilities. The rise of decentralized cryptocurrencies, anchored in pioneering cryptography and consensus protocols, has deeply transformed traditional financial interactions. However, this transformation brings to the forefront new cybersecurity risks, borne from the intricate nature of these systems. Addressing these imminent challenges, the study introduces a holistic security model, meticulously designed for the Ethereum blockchain environment. This model integrates methods such as smart contract rigorous validation, transaction irregularity spotting, and network assault emulation. Rigorous experiments and simulations vouch for the model’s efficiency in pinpointing security breaches, marking an impressive 85% detection precision and an 81% robustness against uncharted zero-day onslaughts not encountered during model preparation. When juxtaposed with individual security tactics, the model exhibits a dominant stance in terms of attack deterrence, threat spectrum, and system productivity. Yet, the relentless advent of innovative attack strategies in this field means vulnerabilities remain. To bolster applicability in real-world scenarios, delving deeper into forecasting methodologies and broader tests on active systems prove essential. In essence, this multifaceted research initiative illuminates both theoretical and practical pathways to refine the strategic outline for unyielding security measures, championing prudent innovation and oversight in the rapidly evolving cryptocurrency landscape.

Keywords

Blockchain, Cryptocurrency, Bitcoin, Ethereum, Network Security

[1]. Viano, C., Avanzo, S., Boella, G., Schifanella, C., & Giorgino, V. (2023). Civic Blockchain: Making blockchains accessible for social collaborative economies. Journal of Responsible Technology, 15, 100066.

[2]. Li, W., Stidsen, C., Adam, T. (2023). A blockchain-assisted security management framework for collaborative intrusion detection in smart cities. Computers and Electrical Engineering, 111(Part A), 108884.

[3]. Li, Z., Li, J., & Zhou, K. (2023). Bitcoin transaction fees and the decentralization of Bitcoin mining pools. Finance Research Letters, 58(Part B), 104347.

[4]. Bouteska, A., & Harasheh, M. (2023). Bitcoin volatility and the introduction of bitcoin futures: A portfolio construction approach. Finance Research Letters, 57, 104200.

[5]. Nguyen, T., Nguyen, H., Partala, J., & Pirttikangas, S. (2023). TrustedMaaS: Transforming trust and transparency Mobility-as-a-Service with blockchain. Future Generation Computer Systems, 149, 606-621.

[6]. Dong, G., Liu, F., & Wu, G. (2022). A Website’s Network Attack Analysis and Security Countermeasures. Procedia Computer Science, 208, 577-582.

[7]. Chen, Y., Zahedi, F. M., Abbasi, A., & Dobolyi, D. (2021). Trust calibration of automated security IT artifacts: A multi-domain study of phishing-website detection tools. Information & Management, 58(1), 103394.

[8]. Gao, X., Yu, L., He, H., Wang, X., & Wang, Y. (2020). A research of security in website account binding. Journal of Information Security and Applications, 51, 102444.

[9]. Pourrahmani, H., Yavarinasab, A., Hosseini Monazzah, A. M., & Van herle, J. (2023). A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain. Internet of Things, 23, 100888.

[10]. Chan, H.-L., Choi, T.-M., & De la Torre, D. M. (2023). The “SMARTER” framework and real application cases of blockchain. Technological Forecasting and Social Change, 196, 122798.

[11]. Qin, M., Wu, T., Ma, X., Albu, L. L., & Umar, M. (2023). Are energy consumption and carbon emission caused by Bitcoin? A novel time-varying technique. Economic Analysis and Policy, 80, 109-120.

[12]. Singh, A., Parizi, R. M., Zhang, Q., Choo, K.-K. R., & Dehghantanha, A. (2020). Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities. Computers & Security, 88, 101654.

[13]. Abas, S. U., Duran, F., & Tekerek, A. (2023). A Raspberry Pi based blockchain application on IoT security. Expert Systems with Applications, 229(Part A), 120486.

[14]. Goldsby, C. M., & Hanisch, M. (2023). Agency in the algorithmic age: The mechanisms and structures of blockchain-based organizing. Journal of Business Research, 168, 114195.

[15]. Mzoughi, H., Benkraiem, R., & Guesmi, K. (2022). The bitcoin market reaction to the launch of central bank digital currencies. Research in International Business and Finance, 63, 101800.

[16]. Costantini, M., Maaitah, A., Mishra, T., & Sousa, R. M. (2023). Bitcoin market networks and cyberattacks. Physica A: Statistical Mechanics and its Applications, 129165.

Cite this article

Wang,Z. (2024). Navigating the digital currency landscape: A comprehensive examination from blockchain foundations to website security. Applied and Computational Engineering,47,36-44.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of the 4th International Conference on Signal Processing and Machine Learning

Conference website: https://www.confspml.org/
ISBN:978-1-83558-335-7(Print) / 978-1-83558-336-4(Online)
Conference date: 15 January 2024
Editor:Marwan Omar
Series: Applied and Computational Engineering
Volume number: Vol.47
ISSN:2755-2721(Print) / 2755-273X(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).