Abstract
Bitcoin is the largest cryptocurrency ever created and traded using a decentralized ledger known as the blockchain. Altogether, Bitcoin is a network in which every computing node is responsible to service the others and allows shared access to the data, known peer to peer (P2P) network, and provides an adaption of electronic-cash that supports e-payments. Such payments are transferred directly from transacting parties to the receiver without the requirement of any intermediary monetary body. Satoshi Nakamoto introduced bitcoin in 2009 and since then it has emerged as the most thriving cryptocurrency. Bitcoin is a globally accepted and immutable e-payment system of digital currency. All the electronic transactions performed using bitcoin are verified by the intermediate nodes called miners and then added as a block in the distributed ledger. Bitcoin blockchains are maintained by the miners running Bitcoin software. Bitcoin depends on Proof-of-Work (PoW) to confront double-spending by a distributed timestamping service. To ensure the operations and security of Bitcoin, all the transactions and their execution order must be available to all Bitcoin users. In addition to its security robustness, anonymity is the key attribute for its success. There are several factors like market-cap, the marketplace, miners-revenue, etc. which causes the rise and fall of the price of Bitcoin. This chapter focus on the factors that are responsible for the rise and fall of Bitcoin Price with a comparison with other Cryptocurrencies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dhulavvagol, P., Bhajantri, V., Totad, S.: Blockchain ethereum clients performance analysis considering e-voting application. Procedia Comput. Sci. 167. 2506–2515 (2020). https://doi.org/10.1016/j.procs.2020.03.303
Rahouti, M., Xiong, K., Ghani, N.: Bitcoin concepts, threats, and machine-learning security solutions. IEEE Access, 1–1 (2018). https://doi.org/10.1109/ACCESS.2018.2874539
Herrera-Joancomartí, J.: Research and Challenges on Bitcoin Anonymity. 8872. https://doi.org/10.1007/978-3-319-17016-9_1. (2014)
Mastering Bitcoin. Andreas M. Antonopoulos
Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain Technology Overview (2019)
Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15, 843–859 (2013). https://doi.org/10.1109/SURV.2012.060912.00182
Bradbury, D.: Anonymity and privacy: a guide for the perplexed. Network Security (2014). https://doi.org/10.1016/S1353-4858(14)70102-3
Eckhoff, D., Wagner, I.: Privacy in the smart city—applications, technologies, challenges and solutions. IEEE Commun. Surv. Tutor., 1–1 (2019). https://doi.org/10.1109/COMST.2017.2748998
Ferrag, M.A., Maglaras, L., Ahmim: A privacy-preserving schemes for ad hoc social networks: a survey. IEEE Commun. Surv. Tutor., 1–1 (2017). https://doi.org/10.1109/COMST.2017.2718178
Davenport, D.: Anonymity on the internet: why the price may be too high. Commun. ACM 45 (2002). https://doi.org/10.1145/505248.505267
Kelly, D., Raines, R., Baldwin, R., Grimaila, M., Mullins, B.: Exploring extant and emerging issues in anonymous networks: a taxonomy and survey of protocols and metrics. IEEE Commun. Surv. Tutor. 14. 1–28.https://doi.org/10.1109/SURV.2011.042011.00080
Chaum, D.: Untraceable electronic mail, return addresses and digital pseudonyms. Commun. ACM 24, 84–88 (1981). https://doi.org/10.1145/358549.358563
Chaum, D.: cMix: anonymization by high-performance scalable mixing. IACR Cryptol. ePrint Archive, Rep. 2016/008 (2016)
Syverson, P., Goldschlag, D., Reed, M.: Anonymous connections and onion routing. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 44–54 (1997). https://doi.org/10.1109/SECPRI.1997.601314
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the secondgeneration onion router. In: Proceedings of 13th Conference on USENIX Security Symposium (SSYM), vol. 13, pp. 21–37, San Diego, CA, USA (2004)
Moser, M., Bohme, R., Breuker, D.: An inquiry into money laundering tools in the Bitcoin ecosystem, pp. 1–14 (2013). https://doi.org/10.1109/eCRS.2013.6805780
Erdin, E., Zachor, C., Gunes, M.: How to find hidden users: a survey of attacks on anonymity networks. IEEE Commun. Surv. Tutor. 17, 1–1 (2015). https://doi.org/10.1109/COMST.2015.2453434
A Taxi Driver Registered in ‘Bitaksi’ Application Plans to Murder a Passenger After Very Deserved Bad Review, Reddit: The Front Page of the Internet (2017). Accessed: 23 Jan 2018. [Online]. Available: https://redd.it/61zczy
Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. Secur. Privacy Soc. Netw. 3 (2011). https://doi.org/10.1109/PASSAT/SocialCom.2011.79
Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., Mccoy, D., Voelker, G., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names, pp. 127–140 (2013). https://doi.org/10.1145/2504730.2504747
Ortega, M.S.: The Bitcoin transaction graph anonymity. M.S. thesis, Security of Information and Communication Technologies, Universitat Autònoma de Barcelona, Barcelona, Spain, 2013. Accessed: 14 Sept 2016 (2016)
Fleder, M., Kester, M., Pillai, S.: Bitcoin Transaction Graph Analysis (2015)
Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: Extracting Intelligence from the Bitcoin Network, vol. 8437, pp. 457–468 (2014). https://doi.org/10.1007/978-3-662-45472-5_29
Lischke, M., Fabian, B.: Analyzing the Bitcoin Network: The First Four Years. Future Internet, vol. 8 (2016). https://doi.org/10.3390/fi8010007
Alessandretti, L., Elbahrawy, A., Luca, M., Baronchelli, A.: Anticipating cryptocurrency prices using machine learning. Complexity 2018, 1–16 (2018). https://doi.org/10.1155/2018/8983590
Corbet, S., Lucey, B., Urquhart, A., Yarovaya, L.: Cryptocurrencies as a financial asset: a systematic analysis. Int. Rev. Fin. Anal. 62 (2018). https://doi.org/10.1016/j.irfa.2018.09.003
McNally, S., Roche, J., Caton, S.: Predicting the Price of Bitcoin Using Machine Learning, pp. 339–343 (2018). https://doi.org/10.1109/PDP2018.2018.00060
Saad, M., Choi, J., Nyang, D., Kim, J., Mohaisen, A.: Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions. IEEE Syst. J., 1–12 (2019). https://doi.org/10.1109/JSYST.2019.2927707
Jang, H., Lee, J.: An empirical study on modeling and prediction of bitcoin prices with bayesian neural networks based on blockchain information. IEEE Access, 1–1 (2017). https://doi.org/10.1109/ACCESS.2017.2779181
Nakano, M., Takahashi, A., Takahashi, S.: Bitcoin technical trading with artificial neural network. Phys. A Stat. Mech. Its Appl. 510, 587–609 (2018). https://doi.org/10.1016/j.physa.2018.07.017
Rebane, J., Karlsson, I., Denic, S., Papapetrou, P.: Seq2Seq RNNs and ARIMA models for Cryptocurrency Prediction: A Comparative Study (2018)
Huisu, J., Lee, J., Ko, H., Lee, W.: Predicting bitcoin prices by using rolling window LSTM model. In: Proceedings of the KDD Data Science in Fintech Workshop, London, UK (2018)
Shintate, T., Pichl, L.: Trend prediction classification for high frequency bitcoin time series with deep learning. J. Risk and Fin. Manage. 12, 17 (2019). https://doi.org/10.3390/jrfm12010017
Chen, G., Nikolov, S., Shah, D.: A latent source model for nonparametric time series classification. Advances in Neural Information Processing Systems (2013)
Shah, D., Zhang, K.: Bayesian regression and Bitcoin. In: 2014 52nd Annual Allerton Conference on Communication, Control, and Computing, Allerton (2014). https://doi.org/10.1109/ALLERTON.2014.7028484
Giaglis, G., Georgoula, I., Pournarakis, D., Bilanakos, C., Sotiropoulos, D.: Using time-series and sentiment analysis to detect the determinants of bitcoin prices. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2607167(2015).
Matta, M., Lunesu, Maria I., Marchesi, M.: Bitcoin Spread Prediction Using Social and Web Search Media (2015)
Matta, M., Lunesu, M.I., Marchesi, M.: The Predictor Impact of Web Search Media on Bitcoin Trading Volumes.https://doi.org/10.5220/0005618606200626
Kristoufek, L.: What are the main drivers of the bitcoin price? Evidence from wavelet coherence analysis. PLoS ONE (2014). https://doi.org/10.1371/journal.pone.0123923
Alex, G., Au, B.: Using the bitcoin transaction graph to predict the price of bitcoin (2015)
Madan, I., Saluja, S., Zhao, A.: Automated bitcoin trading via machine learning algorithms (2015)
Pham, T., Lee, S.: Anomaly Detection in the Bitcoin System—A Network Perspective (2016)
Xu, J.: Are blockchains immune to all malicious attacks? Financial Innovation 2 (2016). https://doi.org/10.1186/s40854-016-0046-5
Smith, R., Bivens, A., Embrechts, M., Palagiri, C., Szymanski, B.: Clustering approaches for anomaly-based intrusion detection. In: Proceedings of Intelligent Engineering Systems Through Artificial Neural Networks, pp. 579–584 (2002)
Pham, T., Lee, S.: Anomaly Detection in Bitcoin Network Using Unsupervised Learning Methods (2016)
Monamo, P., Marivate, V., Twala, B.: Unsupervised learning for robust Bitcoin fraud detection, pp. 129–134 (2016). https://doi.org/10.1109/ISSA.2016.7802939
Monamo, P., Marivate, V., Twala, B.: A Multifaceted Approach to Bitcoin Fraud Detection: Global and Local Outliers, pp. 188–194 (2016). https://doi.org/10.1109/ICMLA.2016.0039
Zambre, D., Shah, A.: Analysis of bitcoin network dataset for fraud. Unpublished Report (2013)
Bartoletti, M., Pes, B., Serusi, S.: Data Mining for Detecting Bitcoin Ponzi Schemes, pp. 75–84 (2018). https://doi.org/10.1109/CVCBT.2018.00014
Zhdanova, M., Repp, J., Rieke, R., Gaber, C., Hemery, B.: No Smurfs: Revealing Fraud Chains in Mobile Money Transfers (2014). https://doi.org/10.1109/ARES.2014.10
Harlev, M., Yin, H., Langenheldt, K., Mukkamala, R. R., Vatrapu, R.: Breaking Bad: De-Anonymising Entity Types on the Bitcoin Blockchain Using Supervised Machine Learning (2018). https://doi.org/10.24251/HICSS.2018.443
Yin, H., Vatrapu, R.: A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning, pp. 3690–3699 (2017). https://doi.org/10.1109/BigData.2017.8258365
Hirshman, J., Huang, Y., Macke, S.: Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network, Technical report, Technical report, Stanford University (2013)
Liu, Z., Zhao, H., Chen, W., Cao, X., Peng, H., Yang, J., Yang, T., Lin, P.: Double-Spending Detection for Fast Bitcoin Payment Based on Artificial Immune, pp. 133–143 (2017). https://doi.org/10.1007/978-981-10-6893-5_10
Bogner, A.: Seeing is understanding anomaly detection in blockchains with visualized features. In: Proceedings of the International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the International Symposium on Wearable Computers, pp. 5–8. ACM (2017)
Cazabet, R., Rym, B., Latapy, M.: Tracking Bitcoin Users Activity Using Community Detection on a Network of Weak Signals, pp. 166–177 (2018). https://doi.org/10.1007/978-3-319-72150-7_14
Kurtulmus, A., Daniel, K.: Trustless Machine Learning Contracts; Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain (2018)
Shaukat, S., Ribeiro, V.: RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning, pp. 356–363 (2018). https://doi.org/10.1109/COMSNETS.2018.8328219
Baqer, K., Huang, D., Mccoy, D., Weaver, N.: Stressing Out: Bitcoin “Stress Testing”, vol. 9604, pp. 3–18 (2016). https://doi.org/10.1007/978-3-662-53357-4_1
Holub, A., O’Connor, J.: Coinhoarder: Tracking a Ukrainian Bitcoin phishing ring DNS style. In: APWG Symposium on Electronic Crime Research (eCrime), 2018, pp. 1–5. IEEE (2018)
Ermilov, D., Panov, M., Yanovich, Y.: Automatic Bitcoin Address Clustering, pp. 461–466 (2017). https://doi.org/10.1109/ICMLA.2017.0-118
Dey, S.: Securing Majority-Attack in Blockchain Using Machine Learning and Algorithmic Game Theory: A Proof of Work, pp. 7–10 (2018). https://doi.org/10.1109/CEEC.2018.8674185
Portnoff, R., Huang, D., Doerfler, P., Afroz, S., Mccoy, D: Backpage and Bitcoin: Uncovering Human Traffickers, pp. 1595–1604 (2017). https://doi.org/10.1145/3097983.3098082
Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin P2P network. In: Proceedings of the ACM Conference on Computer and Communications Security (2014). https://doi.org/10.1145/2660267.2660379
Box, G., E., P., Jenkins, G., Reinsel, G., Ljung, G.: Time Series Analysis: Forecasting and Control (2016). https://doi.org/10.2307/2284112
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Saxena, R., Arora, D., Nagar, V., Mahapatra, S. (2021). Bitcoin: A Digital Cryptocurrency. In: Panda, S.K., Jena, A.K., Swain, S.K., Satapathy, S.C. (eds) Blockchain Technology: Applications and Challenges. Intelligent Systems Reference Library, vol 203. Springer, Cham. https://doi.org/10.1007/978-3-030-69395-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-69395-4_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69394-7
Online ISBN: 978-3-030-69395-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)