SlideShare a Scribd company logo
1 of 30
Have a Snack, Pay with
BitCoins
Guided By Presented By:
Shilpa G.V Nikhil Ranjan
Asst Prof(Selection Grade) (1VI07CS039)
Department Of CSE,VemanaIT
Introduction
 Cashless payments are nowadays ubiquitous
 Peer-to-peer-based digital Decentralized payment
infrastructure was, developed in 2008 by Satoshi
Nakamoto.
 Transactions can only be confirmed if the majority of
participating nodes accepts them.
 Due to the delay of the transaction Confirmation.
 not used for payments that rely on quick transaction
confirmation.
 This transaction confirmation process can take several
minutes and touted as the digital equivalent of cash.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
2
Introduction Contd..
Not problematic for most online purchases
 Prevents the use of BitCoins situations where a transaction
confirmation is required in the order of seconds, such as
paying in a supermarket or at a snack vending machine.
 Come up with concepts to spend the BitCoins and evaluating
it against
 Fast Transaction
 Double Spending
 Present a real world application of a modified snack
vending machine to accept BitCoins payments and make
use of fast transaction confirmation.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
3
Existing System
 Traditionally, cashless transactions require an
issuing/clearing authority which will act as a trusted third
party.
 In BitCoins, the entire computer network fulfills the role of
the trusted third party where nodes
 Propagate and
 Verify transactions.
 Nodes implement a replicated ledger that keeps track of the
account balances.
 verifies transactions
 Current state and Updates account balances.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
3
Overview of BitCoins
 A transaction in the BitCoins network a specific amount of
BitCoins from one account to another
 Transactions represented as Signed data structures.
 Transaction is Comprised of
References to one or more previous transactions that
funded the spending party
Assignment of a specific amount of BitCoins to one or
more addresses.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
4
Overview of BitCoins Contd.
 A transaction is atomic in the sense
 Claiming of BitCoins is inseparably linked to the transfer
of these BitCoins
The references to previous transactions are referred to
as Inputs to the transaction,
The amount of BitCoins that it ought to receive are
called Outputs .
 The balance of an account is Sum of the values of all unspent
outputs owned by that account.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
5
Issues
 As soon as an output is claimed and used as an input to a
transaction it may not be reused.
 A single output may not be used as an input to multiple
transactions.
 Violation of the same is referred to as Double Spending
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
6
Work Flow
 For a transaction specifying, Outputs as well as Inputs and
signs the transaction.
 The transaction broadcasted through the network using a
flood broadcast.
 Each node verifies that
 (a) The O/P of the transaction does not exceed the Input.
 (b) Outputs are spent only once and
 (c) The Signatures match the Sending Account
 If the transaction passes validation, the nodes will forward it
to their neighbors.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
7
Work Flow Contd…
 In the transaction passes Validation, the nodes will forward it
to their neighbors.
 Eventually, the network will confirm the transaction by
including it into the public ledger.
 The transaction confirmation is a crucial step but also the
most time-consuming.
 In expectation, it takes 10 minutes for the network to reach
consensus about a set of transactions.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
8
Trade Offs
 A confirmation time in the order of minutes is undesirable.
 Purchased products released to the customer immediately.
 However, merchants may choose not to wait for the
confirmation of incoming transactions.
This is called a fast payment.
 Fast payments build upon trusting a transaction to be
eventually confirmed.
 Trade-off of not waiting for the definitive transaction
confirmation .
 Accepted for low-priced goods Where instant delivery is
desired and possible loss of revenue marginal.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
9
Literature Survey
 Double-spends and fast payments were first analyzed by G.
Karame, E. Androulaki, and S. Capkun, “Two BitCoins at the
price of one? double-spending attacks on fast payments in
BitCoins,” in 2012.found that double-spend attempts have a
non-negligible probability of success
 A first analysis of the anonymity was done by F. Reid and M.
Harrigan, “An analysis of anonymity in the bitcoin system,”
in SocialCom, 2011, which used information from the
publicly available ledger to connect multiple addresses to
relinquish information about their owner.
 D. Ron and A. Shamir, “Quantitative analysis of the full
BitCoins transaction graph, "among other things, attempted
to infer patterns from individual transactions.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
10
Literature Survey Contd…
 I. Miers, C. Garman, M. Green, and A. D. Rubin, “Zerocoin:
Anonymous distributed e-cash from bitcoin,” 2013 a system
that uses zero-knowledge proofs as a claiming condition of
transactions, would allow truly anonymous transactions in
which BitCoins can be acquired without a direct connection
between sender and receiver.
 With the recently published reports of the European Central
Bank , the US department of treasury and the FBI , Bitcoin
received the needed legal status that allows its adoption at a
large scale
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
11
SECURING FAST
PAYMENTS
 Transaction not being confirmed by the network
 An attacker try to double-spend the payment.
 Attacker may connect to an arbitrary number of nodes in the
network and broadcast any number of transactions claiming
outputs.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
12
Double Spending
 To perform a double-spending attack, the attacker would
create two transactions TA and TV.
 Both transactions spend the same output and can therefore
not both be valid.
 TV denotes the transaction to the merchant, whereas
 TA is a transaction that transfers the same amount back to
the attacker.
 The attacker then attempts to convince the merchant about
the validity of TV .
 While broadcasting TA to the network at the same time.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
13
Double Spending Contd…
 For the double-spending attempt to succeed two conditions
have to be met:
 The merchant should only see TV until the good or service
is released, and
 TA must be confirmed by the Bitcoin network, hence TV
would not be valid.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
14
Countermeasures
 To harden against the aforementioned attack, we propose
several countermeasures.
 Guarantee that the attacker is not the only source of
information.
 Connect to a sufficiently large random sample of nodes in
the BitCoins network.
 Attacker cannot inject faulty transaction as she does not
know over which nodes the merchant communicates.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
15
Design
 The merchant should not accept incoming connections.
 Thus an attacker cannot directly send TV to the merchant.
 Forcing the attacker to broadcast it over the network
 This will ensure that TV ends up in the local view of those
nodes that forward it.
 Furthermore, the merchant can effectively avoid isolation by
not relaying transaction TV .
 Now the attacker would have to shield all of the merchant’s
connected nodes from TA in order to keep the merchant
isolated.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
16
Design Contd…
 As soon as a single node is uninfluenced by the attacker, it
will forward TA to the merchant, thus informing the
merchant of the attempted double-spend.
 In addition, by not relaying transactions, the merchant
protects itself against timing attacks.
 An attacker could otherwise monitor and time relayed
transactions in order to map out the merchant’s connected
nodes.
 The remainder of the network will ensure that the transaction
is propagated to all nodes.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
17
Result Set
 The merchant examines the propagation depth of TV , i.e., a
listening period before the transaction is accepted by the
merchant.
 It would be imprudent of the attacker to attempt the double-
spend, as any of the merchant’s connected nodes could detect
it.
 If the attacker were to broadcast TA, only a minority of
nodes in the network would forward it ensuring that TA is
ever included in the public ledger.
 After the listening period, the legitimate transaction TV will
have propagated through a sufficiently large part of the
network. Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
18
Return Chaining
 The merchant needs a mechanism to return money to the
customer.
 We can distinguish three possible transaction scenarios in
which money is returned.
 A transaction can be underspent and insufficient funds are
returned.
 A transaction can be overspent, in which case the
customer is entitled to change.
 The customer could cancel the transaction, entitled to the
total amount of money.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
19
Countermeasures
 In order to avoid being vulnerable to this type of attack
 Merchant has to ensure that if TV is not valid, then also
TR is not valid as well.
 This automatic invalidation of the return transaction is
possible by using a mechanism called return chaining
 Return chaining means that the merchant claims the
output created as a result of TV and uses it as an input to
TR
 The outputs would not be created and thus could not be
claimed by any transaction as TR is a transaction claiming
one of the outputs of TV it would automatically be invalid.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
20
EVALUATION
 To evaluate the accuracy of the proposed system and to
detect and reject double-spends the attacker and the merchant
are implemented as fully automated systems
 The trace is used in the evaluation by selecting a random
subset of the actually connected nodes.
 Simulating multiple configurations and samples as they
could have been observed in the real network
 During the measurements 1922 double-spending attempts
were initiated where the merchant was connected to 1024
nodes on average.
 Each additional connection causes an average of 104
bytes/second of additional bandwidth
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
21
Evaluation Contd…
 The transactions were released simultaneously , the ratio
between the transactions observed by the merchants was not
1=2 for either of the transactions.
 The average ratio between the least distributed transaction to
the most distributed transaction was 31.78%.
 The 99 percentile for the detection of a double spend
corresponds to 37 announcements.
 The time until the merchant detects the double-spending
attack quickly decreases for larger sample sizes, 99 percentile
is at 6.29 seconds for 100 peers.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
22
Observations
 Setting the threshold for the announcement count to 37 and
the time to 6.29 seconds, the transaction is said to be
accepted if both conditions are fulfilled.
 With over 40 sample nodes, the probability that the first seen
transaction will be confirmed is 73.64%.
 The attacker is left with a 0.088% chance of performing a
successful double-spending attack.
 This means that the merchant has to hedge against a loss of
one purchase in one thousand.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
23
Observations Contd…
 On average 26.09% of peers did not announce either of the
two transactions in a double-spending attempt.
 This lack of announcements is likely due
 Nodes not being up to date with the current ledger,
 trying to synchronize the ledger state with the rest of the
network.
 Each simulation was repeated 1000 times, resulting in
192,200,000 individual evaluations.
 At 100 nodes the merchant will not learn of a double-
spending attempt in only 0.77% of all attempted double-
spends.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
24
Implementation
 In real world scenario, we realized a working system, where
people can actually pay in a few seconds using BitCoins.
 A fitting example for a venue where fast transactions are
essential is a snack vending machine.
 Our solution is divided into
 a verification server that connects to the Bitcoin network
 vending machine interface that connects to the server and
handles the user interaction
 A Single server may verify transactions for any number of
clients, keeping the impact on the BitCoins network low.
 Server’s wallet holds all the addresses generated through
payment requests over time.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
25
Implementation Contd…
 The vending machine interface is implemented as an Android
smartphone application using the IOIO prototyping platform.
 Customer selects a product in the vending machine, the
vending machine interface displays a QR-code.
 Customer scans the code and issues the payment. A progress
bar informs the customer about the verification progress and,
upon completion, the product is dispensed.
 The server starts verifying the transaction by monitoring the
BitCoins network.
 As soon as the fast verification is complete, the result is sent
to the client (i.e. Smartphone in the vending machine).
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
26
Implementation Contd…
 Aiming at anonymity, in the sense that it is not possible to
easily identify the server as a major payment recipient.
 Considering verification times of 10 seconds based on our
measurements , we chose T = 40
 The vending machine is works correctly experiments show
that not a single double-spending attack was successful
against the prototype.
 A planned large scale test, together with the manufacturer, in
Switzerland will show whether such a deployment could be
successful and gauge interest in the wider public.
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
27
CONCLUSION
 We have shown that BitCoins can be used as a reliable
alternative for fast cashless payments.
 The low transaction fees of the network (compared to
traditional centralized cashless payment processors) and the
instant availability of the money to the merchant might
render BitCoins interesting for vending machine operators
Department Of CSE,VemanaIT
Have a Snack Pay With BitCoins
28
Department Of CSE,VemanaIT

More Related Content

Similar to BitCoin_Updated.pptx

Cryptocurrency Payment Gateway Its Pros and Cons
Cryptocurrency Payment Gateway Its Pros and ConsCryptocurrency Payment Gateway Its Pros and Cons
Cryptocurrency Payment Gateway Its Pros and Consitio Innovex Pvt Ltv
 
Bitcoin - First Blockchain Implementation -- What is it? How can it be used? ...
Bitcoin - First Blockchain Implementation -- What is it? How can it be used? ...Bitcoin - First Blockchain Implementation -- What is it? How can it be used? ...
Bitcoin - First Blockchain Implementation -- What is it? How can it be used? ...Prashant Shahi
 
Cryptocurrency guide.pptx
Cryptocurrency guide.pptxCryptocurrency guide.pptx
Cryptocurrency guide.pptxMarina Ibrahim
 
Behind the scenes of bitcoin protocol
Behind the scenes of bitcoin protocolBehind the scenes of bitcoin protocol
Behind the scenes of bitcoin protocolVedran Ilić-Dreven
 
Blockchain_Technology_Blog
Blockchain_Technology_BlogBlockchain_Technology_Blog
Blockchain_Technology_BlogKaustubh Tare
 
httpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docx
httpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docxhttpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docx
httpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docxpooleavelina
 
Understanding Bitcoin
Understanding BitcoinUnderstanding Bitcoin
Understanding BitcoinLeslie Bayona
 
Transform Your Financial System with Crypto Payment Gateway Solutions
Transform Your Financial System with Crypto Payment Gateway SolutionsTransform Your Financial System with Crypto Payment Gateway Solutions
Transform Your Financial System with Crypto Payment Gateway Solutionsrichardaustin1595
 
Automated cross chain-fiat exchange solution concept --- How WeChat can lever...
Automated cross chain-fiat exchange solution concept --- How WeChat can lever...Automated cross chain-fiat exchange solution concept --- How WeChat can lever...
Automated cross chain-fiat exchange solution concept --- How WeChat can lever...Duc Pham
 
A Deep Guide to Real Time Payments- ITIO
A Deep Guide to Real Time Payments- ITIOA Deep Guide to Real Time Payments- ITIO
A Deep Guide to Real Time Payments- ITIOITIO Innovex
 
190221 masterclass blockchain
190221 masterclass blockchain190221 masterclass blockchain
190221 masterclass blockchainBoFrank01
 
Cryptocurrency secrets
Cryptocurrency secretsCryptocurrency secrets
Cryptocurrency secretsMohammed NAZIH
 
Cryptocurrency Secrets
Cryptocurrency SecretsCryptocurrency Secrets
Cryptocurrency SecretsFlavian Mwasi
 
The Ultimate Guide to Understanding Cryptocurrency: Invest with Confidence
The Ultimate Guide to Understanding Cryptocurrency: Invest with ConfidenceThe Ultimate Guide to Understanding Cryptocurrency: Invest with Confidence
The Ultimate Guide to Understanding Cryptocurrency: Invest with ConfidenceKhemitEric
 
Discover the Secrets to Making a Fortune with Cryptocurrency
Discover the Secrets to Making a Fortune with CryptocurrencyDiscover the Secrets to Making a Fortune with Cryptocurrency
Discover the Secrets to Making a Fortune with CryptocurrencyKhemitEric
 
Coin payments review crypto payment processor guide
Coin payments review  crypto payment processor guideCoin payments review  crypto payment processor guide
Coin payments review crypto payment processor guideParveenKumar601
 

Similar to BitCoin_Updated.pptx (20)

Cryptocurrency Payment Gateway Its Pros and Cons
Cryptocurrency Payment Gateway Its Pros and ConsCryptocurrency Payment Gateway Its Pros and Cons
Cryptocurrency Payment Gateway Its Pros and Cons
 
Bitcoin - First Blockchain Implementation -- What is it? How can it be used? ...
Bitcoin - First Blockchain Implementation -- What is it? How can it be used? ...Bitcoin - First Blockchain Implementation -- What is it? How can it be used? ...
Bitcoin - First Blockchain Implementation -- What is it? How can it be used? ...
 
Cryptocurrency guide.pptx
Cryptocurrency guide.pptxCryptocurrency guide.pptx
Cryptocurrency guide.pptx
 
Bitcoin trading
Bitcoin tradingBitcoin trading
Bitcoin trading
 
Behind the scenes of bitcoin protocol
Behind the scenes of bitcoin protocolBehind the scenes of bitcoin protocol
Behind the scenes of bitcoin protocol
 
Blockchain_Technology_Blog
Blockchain_Technology_BlogBlockchain_Technology_Blog
Blockchain_Technology_Blog
 
httpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docx
httpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docxhttpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docx
httpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docx
 
Understanding Bitcoin
Understanding BitcoinUnderstanding Bitcoin
Understanding Bitcoin
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Transform Your Financial System with Crypto Payment Gateway Solutions
Transform Your Financial System with Crypto Payment Gateway SolutionsTransform Your Financial System with Crypto Payment Gateway Solutions
Transform Your Financial System with Crypto Payment Gateway Solutions
 
Automated cross chain-fiat exchange solution concept --- How WeChat can lever...
Automated cross chain-fiat exchange solution concept --- How WeChat can lever...Automated cross chain-fiat exchange solution concept --- How WeChat can lever...
Automated cross chain-fiat exchange solution concept --- How WeChat can lever...
 
A Deep Guide to Real Time Payments- ITIO
A Deep Guide to Real Time Payments- ITIOA Deep Guide to Real Time Payments- ITIO
A Deep Guide to Real Time Payments- ITIO
 
190221 masterclass blockchain
190221 masterclass blockchain190221 masterclass blockchain
190221 masterclass blockchain
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Cryptocurrency secrets
Cryptocurrency secretsCryptocurrency secrets
Cryptocurrency secrets
 
Cryptocurrency Secrets
Cryptocurrency SecretsCryptocurrency Secrets
Cryptocurrency Secrets
 
The Ultimate Guide to Understanding Cryptocurrency: Invest with Confidence
The Ultimate Guide to Understanding Cryptocurrency: Invest with ConfidenceThe Ultimate Guide to Understanding Cryptocurrency: Invest with Confidence
The Ultimate Guide to Understanding Cryptocurrency: Invest with Confidence
 
Discover the Secrets to Making a Fortune with Cryptocurrency
Discover the Secrets to Making a Fortune with CryptocurrencyDiscover the Secrets to Making a Fortune with Cryptocurrency
Discover the Secrets to Making a Fortune with Cryptocurrency
 
Atm reconciliation manual
Atm reconciliation manualAtm reconciliation manual
Atm reconciliation manual
 
Coin payments review crypto payment processor guide
Coin payments review  crypto payment processor guideCoin payments review  crypto payment processor guide
Coin payments review crypto payment processor guide
 

Recently uploaded

Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 

Recently uploaded (20)

Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 

BitCoin_Updated.pptx

  • 1. Have a Snack, Pay with BitCoins Guided By Presented By: Shilpa G.V Nikhil Ranjan Asst Prof(Selection Grade) (1VI07CS039) Department Of CSE,VemanaIT
  • 2. Introduction  Cashless payments are nowadays ubiquitous  Peer-to-peer-based digital Decentralized payment infrastructure was, developed in 2008 by Satoshi Nakamoto.  Transactions can only be confirmed if the majority of participating nodes accepts them.  Due to the delay of the transaction Confirmation.  not used for payments that rely on quick transaction confirmation.  This transaction confirmation process can take several minutes and touted as the digital equivalent of cash. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 2
  • 3. Introduction Contd.. Not problematic for most online purchases  Prevents the use of BitCoins situations where a transaction confirmation is required in the order of seconds, such as paying in a supermarket or at a snack vending machine.  Come up with concepts to spend the BitCoins and evaluating it against  Fast Transaction  Double Spending  Present a real world application of a modified snack vending machine to accept BitCoins payments and make use of fast transaction confirmation. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 3
  • 4. Existing System  Traditionally, cashless transactions require an issuing/clearing authority which will act as a trusted third party.  In BitCoins, the entire computer network fulfills the role of the trusted third party where nodes  Propagate and  Verify transactions.  Nodes implement a replicated ledger that keeps track of the account balances.  verifies transactions  Current state and Updates account balances. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 3
  • 5. Overview of BitCoins  A transaction in the BitCoins network a specific amount of BitCoins from one account to another  Transactions represented as Signed data structures.  Transaction is Comprised of References to one or more previous transactions that funded the spending party Assignment of a specific amount of BitCoins to one or more addresses. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 4
  • 6. Overview of BitCoins Contd.  A transaction is atomic in the sense  Claiming of BitCoins is inseparably linked to the transfer of these BitCoins The references to previous transactions are referred to as Inputs to the transaction, The amount of BitCoins that it ought to receive are called Outputs .  The balance of an account is Sum of the values of all unspent outputs owned by that account. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 5
  • 7. Issues  As soon as an output is claimed and used as an input to a transaction it may not be reused.  A single output may not be used as an input to multiple transactions.  Violation of the same is referred to as Double Spending Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 6
  • 8. Work Flow  For a transaction specifying, Outputs as well as Inputs and signs the transaction.  The transaction broadcasted through the network using a flood broadcast.  Each node verifies that  (a) The O/P of the transaction does not exceed the Input.  (b) Outputs are spent only once and  (c) The Signatures match the Sending Account  If the transaction passes validation, the nodes will forward it to their neighbors. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 7
  • 9. Work Flow Contd…  In the transaction passes Validation, the nodes will forward it to their neighbors.  Eventually, the network will confirm the transaction by including it into the public ledger.  The transaction confirmation is a crucial step but also the most time-consuming.  In expectation, it takes 10 minutes for the network to reach consensus about a set of transactions. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 8
  • 10. Trade Offs  A confirmation time in the order of minutes is undesirable.  Purchased products released to the customer immediately.  However, merchants may choose not to wait for the confirmation of incoming transactions. This is called a fast payment.  Fast payments build upon trusting a transaction to be eventually confirmed.  Trade-off of not waiting for the definitive transaction confirmation .  Accepted for low-priced goods Where instant delivery is desired and possible loss of revenue marginal. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 9
  • 11. Literature Survey  Double-spends and fast payments were first analyzed by G. Karame, E. Androulaki, and S. Capkun, “Two BitCoins at the price of one? double-spending attacks on fast payments in BitCoins,” in 2012.found that double-spend attempts have a non-negligible probability of success  A first analysis of the anonymity was done by F. Reid and M. Harrigan, “An analysis of anonymity in the bitcoin system,” in SocialCom, 2011, which used information from the publicly available ledger to connect multiple addresses to relinquish information about their owner.  D. Ron and A. Shamir, “Quantitative analysis of the full BitCoins transaction graph, "among other things, attempted to infer patterns from individual transactions. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 10
  • 12. Literature Survey Contd…  I. Miers, C. Garman, M. Green, and A. D. Rubin, “Zerocoin: Anonymous distributed e-cash from bitcoin,” 2013 a system that uses zero-knowledge proofs as a claiming condition of transactions, would allow truly anonymous transactions in which BitCoins can be acquired without a direct connection between sender and receiver.  With the recently published reports of the European Central Bank , the US department of treasury and the FBI , Bitcoin received the needed legal status that allows its adoption at a large scale Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 11
  • 13. SECURING FAST PAYMENTS  Transaction not being confirmed by the network  An attacker try to double-spend the payment.  Attacker may connect to an arbitrary number of nodes in the network and broadcast any number of transactions claiming outputs. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 12
  • 14. Double Spending  To perform a double-spending attack, the attacker would create two transactions TA and TV.  Both transactions spend the same output and can therefore not both be valid.  TV denotes the transaction to the merchant, whereas  TA is a transaction that transfers the same amount back to the attacker.  The attacker then attempts to convince the merchant about the validity of TV .  While broadcasting TA to the network at the same time. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 13
  • 15. Double Spending Contd…  For the double-spending attempt to succeed two conditions have to be met:  The merchant should only see TV until the good or service is released, and  TA must be confirmed by the Bitcoin network, hence TV would not be valid. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 14
  • 16. Countermeasures  To harden against the aforementioned attack, we propose several countermeasures.  Guarantee that the attacker is not the only source of information.  Connect to a sufficiently large random sample of nodes in the BitCoins network.  Attacker cannot inject faulty transaction as she does not know over which nodes the merchant communicates. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 15
  • 17. Design  The merchant should not accept incoming connections.  Thus an attacker cannot directly send TV to the merchant.  Forcing the attacker to broadcast it over the network  This will ensure that TV ends up in the local view of those nodes that forward it.  Furthermore, the merchant can effectively avoid isolation by not relaying transaction TV .  Now the attacker would have to shield all of the merchant’s connected nodes from TA in order to keep the merchant isolated. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 16
  • 18. Design Contd…  As soon as a single node is uninfluenced by the attacker, it will forward TA to the merchant, thus informing the merchant of the attempted double-spend.  In addition, by not relaying transactions, the merchant protects itself against timing attacks.  An attacker could otherwise monitor and time relayed transactions in order to map out the merchant’s connected nodes.  The remainder of the network will ensure that the transaction is propagated to all nodes. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 17
  • 19. Result Set  The merchant examines the propagation depth of TV , i.e., a listening period before the transaction is accepted by the merchant.  It would be imprudent of the attacker to attempt the double- spend, as any of the merchant’s connected nodes could detect it.  If the attacker were to broadcast TA, only a minority of nodes in the network would forward it ensuring that TA is ever included in the public ledger.  After the listening period, the legitimate transaction TV will have propagated through a sufficiently large part of the network. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 18
  • 20. Return Chaining  The merchant needs a mechanism to return money to the customer.  We can distinguish three possible transaction scenarios in which money is returned.  A transaction can be underspent and insufficient funds are returned.  A transaction can be overspent, in which case the customer is entitled to change.  The customer could cancel the transaction, entitled to the total amount of money. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 19
  • 21. Countermeasures  In order to avoid being vulnerable to this type of attack  Merchant has to ensure that if TV is not valid, then also TR is not valid as well.  This automatic invalidation of the return transaction is possible by using a mechanism called return chaining  Return chaining means that the merchant claims the output created as a result of TV and uses it as an input to TR  The outputs would not be created and thus could not be claimed by any transaction as TR is a transaction claiming one of the outputs of TV it would automatically be invalid. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 20
  • 22. EVALUATION  To evaluate the accuracy of the proposed system and to detect and reject double-spends the attacker and the merchant are implemented as fully automated systems  The trace is used in the evaluation by selecting a random subset of the actually connected nodes.  Simulating multiple configurations and samples as they could have been observed in the real network  During the measurements 1922 double-spending attempts were initiated where the merchant was connected to 1024 nodes on average.  Each additional connection causes an average of 104 bytes/second of additional bandwidth Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 21
  • 23. Evaluation Contd…  The transactions were released simultaneously , the ratio between the transactions observed by the merchants was not 1=2 for either of the transactions.  The average ratio between the least distributed transaction to the most distributed transaction was 31.78%.  The 99 percentile for the detection of a double spend corresponds to 37 announcements.  The time until the merchant detects the double-spending attack quickly decreases for larger sample sizes, 99 percentile is at 6.29 seconds for 100 peers. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 22
  • 24. Observations  Setting the threshold for the announcement count to 37 and the time to 6.29 seconds, the transaction is said to be accepted if both conditions are fulfilled.  With over 40 sample nodes, the probability that the first seen transaction will be confirmed is 73.64%.  The attacker is left with a 0.088% chance of performing a successful double-spending attack.  This means that the merchant has to hedge against a loss of one purchase in one thousand. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 23
  • 25. Observations Contd…  On average 26.09% of peers did not announce either of the two transactions in a double-spending attempt.  This lack of announcements is likely due  Nodes not being up to date with the current ledger,  trying to synchronize the ledger state with the rest of the network.  Each simulation was repeated 1000 times, resulting in 192,200,000 individual evaluations.  At 100 nodes the merchant will not learn of a double- spending attempt in only 0.77% of all attempted double- spends. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 24
  • 26. Implementation  In real world scenario, we realized a working system, where people can actually pay in a few seconds using BitCoins.  A fitting example for a venue where fast transactions are essential is a snack vending machine.  Our solution is divided into  a verification server that connects to the Bitcoin network  vending machine interface that connects to the server and handles the user interaction  A Single server may verify transactions for any number of clients, keeping the impact on the BitCoins network low.  Server’s wallet holds all the addresses generated through payment requests over time. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 25
  • 27. Implementation Contd…  The vending machine interface is implemented as an Android smartphone application using the IOIO prototyping platform.  Customer selects a product in the vending machine, the vending machine interface displays a QR-code.  Customer scans the code and issues the payment. A progress bar informs the customer about the verification progress and, upon completion, the product is dispensed.  The server starts verifying the transaction by monitoring the BitCoins network.  As soon as the fast verification is complete, the result is sent to the client (i.e. Smartphone in the vending machine). Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 26
  • 28. Implementation Contd…  Aiming at anonymity, in the sense that it is not possible to easily identify the server as a major payment recipient.  Considering verification times of 10 seconds based on our measurements , we chose T = 40  The vending machine is works correctly experiments show that not a single double-spending attack was successful against the prototype.  A planned large scale test, together with the manufacturer, in Switzerland will show whether such a deployment could be successful and gauge interest in the wider public. Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 27
  • 29. CONCLUSION  We have shown that BitCoins can be used as a reliable alternative for fast cashless payments.  The low transaction fees of the network (compared to traditional centralized cashless payment processors) and the instant availability of the money to the merchant might render BitCoins interesting for vending machine operators Department Of CSE,VemanaIT Have a Snack Pay With BitCoins 28