Skip to main content

Bitcoin: A Digital Cryptocurrency

  • Chapter
  • First Online:
Blockchain Technology: Applications and Challenges

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 203))

Abstract

Bitcoin is the largest cryptocurrency ever created and traded using a decentralized ledger known as the blockchain. Altogether, Bitcoin is a network in which every computing node is responsible to service the others and allows shared access to the data, known peer to peer (P2P) network, and provides an adaption of electronic-cash that supports e-payments. Such payments are transferred directly from transacting parties to the receiver without the requirement of any intermediary monetary body. Satoshi Nakamoto introduced bitcoin in 2009 and since then it has emerged as the most thriving cryptocurrency. Bitcoin is a globally accepted and immutable e-payment system of digital currency. All the electronic transactions performed using bitcoin are verified by the intermediate nodes called miners and then added as a block in the distributed ledger. Bitcoin blockchains are maintained by the miners running Bitcoin software. Bitcoin depends on Proof-of-Work (PoW) to confront double-spending by a distributed timestamping service. To ensure the operations and security of Bitcoin, all the transactions and their execution order must be available to all Bitcoin users. In addition to its security robustness, anonymity is the key attribute for its success. There are several factors like market-cap, the marketplace, miners-revenue, etc. which causes the rise and fall of the price of Bitcoin. This chapter focus on the factors that are responsible for the rise and fall of Bitcoin Price with a comparison with other Cryptocurrencies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Dhulavvagol, P., Bhajantri, V., Totad, S.: Blockchain ethereum clients performance analysis considering e-voting application. Procedia Comput. Sci. 167. 2506–2515 (2020). https://doi.org/10.1016/j.procs.2020.03.303

  2. Rahouti, M., Xiong, K., Ghani, N.: Bitcoin concepts, threats, and machine-learning security solutions. IEEE Access, 1–1 (2018). https://doi.org/10.1109/ACCESS.2018.2874539

  3. Herrera-Joancomartí, J.: Research and Challenges on Bitcoin Anonymity. 8872. https://doi.org/10.1007/978-3-319-17016-9_1. (2014)

  4. Mastering Bitcoin. Andreas M. Antonopoulos

    Google Scholar 

  5. Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain Technology Overview (2019)

    Google Scholar 

  6. Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15, 843–859 (2013). https://doi.org/10.1109/SURV.2012.060912.00182

  7. Bradbury, D.: Anonymity and privacy: a guide for the perplexed. Network Security (2014). https://doi.org/10.1016/S1353-4858(14)70102-3

  8. Eckhoff, D., Wagner, I.: Privacy in the smart city—applications, technologies, challenges and solutions. IEEE Commun. Surv. Tutor., 1–1 (2019). https://doi.org/10.1109/COMST.2017.2748998

  9. Ferrag, M.A., Maglaras, L., Ahmim: A privacy-preserving schemes for ad hoc social networks: a survey. IEEE Commun. Surv. Tutor., 1–1 (2017). https://doi.org/10.1109/COMST.2017.2718178

  10. Davenport, D.: Anonymity on the internet: why the price may be too high. Commun. ACM 45 (2002). https://doi.org/10.1145/505248.505267

  11. Kelly, D., Raines, R., Baldwin, R., Grimaila, M., Mullins, B.: Exploring extant and emerging issues in anonymous networks: a taxonomy and survey of protocols and metrics. IEEE Commun. Surv. Tutor. 14. 1–28.https://doi.org/10.1109/SURV.2011.042011.00080

  12. Chaum, D.: Untraceable electronic mail, return addresses and digital pseudonyms. Commun. ACM 24, 84–88 (1981). https://doi.org/10.1145/358549.358563

  13. Chaum, D.: cMix: anonymization by high-performance scalable mixing. IACR Cryptol. ePrint Archive, Rep. 2016/008 (2016)

    Google Scholar 

  14. Syverson, P., Goldschlag, D., Reed, M.: Anonymous connections and onion routing. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 44–54 (1997). https://doi.org/10.1109/SECPRI.1997.601314

  15. Dingledine, R., Mathewson, N., Syverson, P.: Tor: the secondgeneration onion router. In: Proceedings of 13th Conference on USENIX Security Symposium (SSYM), vol. 13, pp. 21–37, San Diego, CA, USA (2004)

    Google Scholar 

  16. Moser, M., Bohme, R., Breuker, D.: An inquiry into money laundering tools in the Bitcoin ecosystem, pp. 1–14 (2013). https://doi.org/10.1109/eCRS.2013.6805780

  17. Erdin, E., Zachor, C., Gunes, M.: How to find hidden users: a survey of attacks on anonymity networks. IEEE Commun. Surv. Tutor. 17, 1–1 (2015). https://doi.org/10.1109/COMST.2015.2453434

  18. A Taxi Driver Registered in ‘Bitaksi’ Application Plans to Murder a Passenger After Very Deserved Bad Review, Reddit: The Front Page of the Internet (2017). Accessed: 23 Jan 2018. [Online]. Available: https://redd.it/61zczy

  19. Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. Secur. Privacy Soc. Netw. 3 (2011). https://doi.org/10.1109/PASSAT/SocialCom.2011.79

  20. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., Mccoy, D., Voelker, G., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names, pp. 127–140 (2013). https://doi.org/10.1145/2504730.2504747

  21. Ortega, M.S.: The Bitcoin transaction graph anonymity. M.S. thesis, Security of Information and Communication Technologies, Universitat Autònoma de Barcelona, Barcelona, Spain, 2013. Accessed: 14 Sept 2016 (2016)

    Google Scholar 

  22. Fleder, M., Kester, M., Pillai, S.: Bitcoin Transaction Graph Analysis (2015)

    Google Scholar 

  23. Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: Extracting Intelligence from the Bitcoin Network, vol. 8437, pp. 457–468 (2014). https://doi.org/10.1007/978-3-662-45472-5_29

  24. Lischke, M., Fabian, B.: Analyzing the Bitcoin Network: The First Four Years. Future Internet, vol. 8 (2016). https://doi.org/10.3390/fi8010007

  25. Alessandretti, L., Elbahrawy, A., Luca, M., Baronchelli, A.: Anticipating cryptocurrency prices using machine learning. Complexity 2018, 1–16 (2018). https://doi.org/10.1155/2018/8983590

    Article  Google Scholar 

  26. Corbet, S., Lucey, B., Urquhart, A., Yarovaya, L.: Cryptocurrencies as a financial asset: a systematic analysis. Int. Rev. Fin. Anal. 62 (2018). https://doi.org/10.1016/j.irfa.2018.09.003

  27. McNally, S., Roche, J., Caton, S.: Predicting the Price of Bitcoin Using Machine Learning, pp. 339–343 (2018). https://doi.org/10.1109/PDP2018.2018.00060

  28. Saad, M., Choi, J., Nyang, D., Kim, J., Mohaisen, A.: Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions. IEEE Syst. J., 1–12 (2019). https://doi.org/10.1109/JSYST.2019.2927707

  29. Jang, H., Lee, J.: An empirical study on modeling and prediction of bitcoin prices with bayesian neural networks based on blockchain information. IEEE Access, 1–1 (2017). https://doi.org/10.1109/ACCESS.2017.2779181

  30. Nakano, M., Takahashi, A., Takahashi, S.: Bitcoin technical trading with artificial neural network. Phys. A Stat. Mech. Its Appl. 510, 587–609 (2018). https://doi.org/10.1016/j.physa.2018.07.017

  31. Rebane, J., Karlsson, I., Denic, S., Papapetrou, P.: Seq2Seq RNNs and ARIMA models for Cryptocurrency Prediction: A Comparative Study (2018)

    Google Scholar 

  32. Huisu, J., Lee, J., Ko, H., Lee, W.: Predicting bitcoin prices by using rolling window LSTM model. In: Proceedings of the KDD Data Science in Fintech Workshop, London, UK (2018)

    Google Scholar 

  33. Shintate, T., Pichl, L.: Trend prediction classification for high frequency bitcoin time series with deep learning. J. Risk and Fin. Manage. 12, 17 (2019). https://doi.org/10.3390/jrfm12010017

  34. Chen, G., Nikolov, S., Shah, D.: A latent source model for nonparametric time series classification. Advances in Neural Information Processing Systems (2013)

    Google Scholar 

  35. Shah, D., Zhang, K.: Bayesian regression and Bitcoin. In: 2014 52nd Annual Allerton Conference on Communication, Control, and Computing, Allerton (2014). https://doi.org/10.1109/ALLERTON.2014.7028484

  36. Giaglis, G., Georgoula, I., Pournarakis, D., Bilanakos, C., Sotiropoulos, D.: Using time-series and sentiment analysis to detect the determinants of bitcoin prices. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2607167(2015).

  37. Matta, M., Lunesu, Maria I., Marchesi, M.: Bitcoin Spread Prediction Using Social and Web Search Media (2015)

    Google Scholar 

  38. Matta, M., Lunesu, M.I., Marchesi, M.: The Predictor Impact of Web Search Media on Bitcoin Trading Volumes.https://doi.org/10.5220/0005618606200626

  39. Kristoufek, L.: What are the main drivers of the bitcoin price? Evidence from wavelet coherence analysis. PLoS ONE (2014). https://doi.org/10.1371/journal.pone.0123923

  40. Alex, G., Au, B.: Using the bitcoin transaction graph to predict the price of bitcoin (2015)

    Google Scholar 

  41. Madan, I., Saluja, S., Zhao, A.: Automated bitcoin trading via machine learning algorithms (2015)

    Google Scholar 

  42. Pham, T., Lee, S.: Anomaly Detection in the Bitcoin System—A Network Perspective (2016)

    Google Scholar 

  43. Xu, J.: Are blockchains immune to all malicious attacks? Financial Innovation 2 (2016). https://doi.org/10.1186/s40854-016-0046-5

  44. Smith, R., Bivens, A., Embrechts, M., Palagiri, C., Szymanski, B.: Clustering approaches for anomaly-based intrusion detection. In: Proceedings of Intelligent Engineering Systems Through Artificial Neural Networks, pp. 579–584 (2002)

    Google Scholar 

  45. Pham, T., Lee, S.: Anomaly Detection in Bitcoin Network Using Unsupervised Learning Methods (2016)

    Google Scholar 

  46. Monamo, P., Marivate, V., Twala, B.: Unsupervised learning for robust Bitcoin fraud detection, pp. 129–134 (2016). https://doi.org/10.1109/ISSA.2016.7802939

  47. Monamo, P., Marivate, V., Twala, B.: A Multifaceted Approach to Bitcoin Fraud Detection: Global and Local Outliers, pp. 188–194 (2016). https://doi.org/10.1109/ICMLA.2016.0039

  48. Zambre, D., Shah, A.: Analysis of bitcoin network dataset for fraud. Unpublished Report (2013)

    Google Scholar 

  49. Bartoletti, M., Pes, B., Serusi, S.: Data Mining for Detecting Bitcoin Ponzi Schemes, pp. 75–84 (2018). https://doi.org/10.1109/CVCBT.2018.00014

  50. Zhdanova, M., Repp, J., Rieke, R., Gaber, C., Hemery, B.: No Smurfs: Revealing Fraud Chains in Mobile Money Transfers (2014). https://doi.org/10.1109/ARES.2014.10

  51. Harlev, M., Yin, H., Langenheldt, K., Mukkamala, R. R., Vatrapu, R.: Breaking Bad: De-Anonymising Entity Types on the Bitcoin Blockchain Using Supervised Machine Learning (2018). https://doi.org/10.24251/HICSS.2018.443

  52. Yin, H., Vatrapu, R.: A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning, pp. 3690–3699 (2017). https://doi.org/10.1109/BigData.2017.8258365

  53. Hirshman, J., Huang, Y., Macke, S.: Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network, Technical report, Technical report, Stanford University (2013)

    Google Scholar 

  54. Liu, Z., Zhao, H., Chen, W., Cao, X., Peng, H., Yang, J., Yang, T., Lin, P.: Double-Spending Detection for Fast Bitcoin Payment Based on Artificial Immune, pp. 133–143 (2017). https://doi.org/10.1007/978-981-10-6893-5_10

  55. Bogner, A.: Seeing is understanding anomaly detection in blockchains with visualized features. In: Proceedings of the International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the International Symposium on Wearable Computers, pp. 5–8. ACM (2017)

    Google Scholar 

  56. Cazabet, R., Rym, B., Latapy, M.: Tracking Bitcoin Users Activity Using Community Detection on a Network of Weak Signals, pp. 166–177 (2018). https://doi.org/10.1007/978-3-319-72150-7_14

  57. Kurtulmus, A., Daniel, K.: Trustless Machine Learning Contracts; Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain (2018)

    Google Scholar 

  58. Shaukat, S., Ribeiro, V.: RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning, pp. 356–363 (2018). https://doi.org/10.1109/COMSNETS.2018.8328219

  59. Baqer, K., Huang, D., Mccoy, D., Weaver, N.: Stressing Out: Bitcoin “Stress Testing”, vol. 9604, pp. 3–18 (2016). https://doi.org/10.1007/978-3-662-53357-4_1

  60. Holub, A., O’Connor, J.: Coinhoarder: Tracking a Ukrainian Bitcoin phishing ring DNS style. In: APWG Symposium on Electronic Crime Research (eCrime), 2018, pp. 1–5. IEEE (2018)

    Google Scholar 

  61. Ermilov, D., Panov, M., Yanovich, Y.: Automatic Bitcoin Address Clustering, pp. 461–466 (2017). https://doi.org/10.1109/ICMLA.2017.0-118

  62. Dey, S.: Securing Majority-Attack in Blockchain Using Machine Learning and Algorithmic Game Theory: A Proof of Work, pp. 7–10 (2018). https://doi.org/10.1109/CEEC.2018.8674185

  63. Portnoff, R., Huang, D., Doerfler, P., Afroz, S., Mccoy, D: Backpage and Bitcoin: Uncovering Human Traffickers, pp. 1595–1604 (2017). https://doi.org/10.1145/3097983.3098082

  64. Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin P2P network. In: Proceedings of the ACM Conference on Computer and Communications Security (2014). https://doi.org/10.1145/2660267.2660379

  65. Box, G., E., P., Jenkins, G., Reinsel, G., Ljung, G.: Time Series Analysis: Forecasting and Control (2016). https://doi.org/10.2307/2284112

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Saxena, R., Arora, D., Nagar, V., Mahapatra, S. (2021). Bitcoin: A Digital Cryptocurrency. In: Panda, S.K., Jena, A.K., Swain, S.K., Satapathy, S.C. (eds) Blockchain Technology: Applications and Challenges. Intelligent Systems Reference Library, vol 203. Springer, Cham. https://doi.org/10.1007/978-3-030-69395-4_2

Download citation

Publish with us

Policies and ethics