Abstract
Blockchain Technology helps buy and sell digital assets known as Non-Fungible Tokens (NFT). It is an asset that is not fungible. It is a different type of asset that exists in the virtual world and uses cryptocurrencies. Unique individual cartoons, like the ‘Bored Ape Yacht Club’, are made available through the NFT collection with unlimited, choices. The owners of such NFTs exhibit them with pride as avatars on social media. These tokens are not merely images. They include assets in the form of art, music, video game items, collectibles, sports memorabilia, domain names, and tweets, on various websites such as ‘Decentraland’ and the ‘Sandbox’. It is interesting to note that even land in the virtual world using NFT. This process of recording the ownership details of a digital asset is sure to revolutionize the thinking in the minds of people. This paper aims to study the overview of NFTs in detail. It further focuses on the advantages and limitations of NFTs. An attempt has been made to compare NFTs with Blockchain and cryptocurrencies. This paper also deals with the standards and protocols used for NFTs. Further, the issues and challenges with cyber security and privacy in NFTs are discussed. This paper focuses on the future scope of NFTs in the context of the ‘Metaverse’.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Abbreviations
- NFT:
-
Non-fungible tokens
- ID:
-
Identification
- ERC:
-
Ethereum Request for comments
- ACID:
-
Atomic, Consistent, Isolated, and Durable
- STRIDE:
-
Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege
- DoS:
-
Denial of Service
- EoP:
-
Elevation of Privilege
- NIFTY:
-
National Stock Exchange FIFTY
- IPFS:
-
Inter Planetary File System
- DeFI:
-
Decentralized Finance
References
https://www.investopedia.com/non-fungible-tokens-nft-5115211 [KB1]. Accessed on 09 Sep 2022
https://www.cryptokitties.co/. Accessed on 06 Sep 2022
Financial Times. NFTs: Identity in the metaverse. https://www.ft.com/partnercontent/crypto-com/nfts-identity-in-the-metaverse.html. Accessed on 10 Sep 2022
https://www.zenofineart.com/blogs/news/the-beginning-of-nfts-a-brief-history-of-nft-art. Accessed on 10 Mar 2022
https://www.digitaltrends.com/computing/what-are-nfts-non-fungible-tokens-historyexplained/. Accessed on 04 Mar 2022
Qin W et al (2021) Non-Fungible Token (NFT): Overview, Evaluation, Opportunities and Challenges (Tech ReportV2)
Cryptopunks. (2021) Accessible: https://www.larvalabs.com/cryptopunks. Accessed on 11 Sep 2022
Loot contract code (2021). https://etherscan.io/address/0xff9c1b15b16263c61d017ee9f65c50e4ae0113d7#code. Accessed on 10 Aug 2022
Fabian V, Vitalik B (2015) Eip-20: Erc-20 token standard. Accessible: https://eips.ethereum.org/EIPS/eip-20. Accessed on 11 Sep 2022
William E, Dieter S, Jacob E, Nastassia S (2018) Eip-721: Erc-721 non-fungible token standard. Accessible: https://eips.ethereum.org/EIPS/eip-721. Accessed on 15 Sep 2022
Witek R et al (2018) Eip-1155: Erc-1155 multi token standard. Accessible: https://eips.ethereum.org/EIPS/eip-1155. Accessed on 20 Sep 2022
Buterin V et al (2014) A next-generation smart contract and decentralized application platform. White Paper 3(37):2
https://www.c-sharpcorner.com/article/understanding-the-workflow-of-nft-systems/. Accessed on 12 Sep 2022
Zhou J, Gollman D (1996) A fair non-repudiation protocol. In: Proceedings 1996 IEEE symposium on security and privacy. pp 55–61. IEEE
Menezes AJ, Van Oorschot PC, Vanstone SA (2018) Handbook of applied cryptography. CRC Press
Moore D, Voelker G, Savage S (2006) Inferring internet denial-of-service activity. ACM Trans Comput Syst 24:115–139
Shostack A (2008) Experiences threat modeling at microsoft. MODSEC@ MoDELS 2008
Wang Q, Li R (2021) A weak consensus algorithm and its application to high performance blockchain. In: IEEE INFOCOM 2021-IEEE Conference on Computer Communications (INFOCOM). IEEE
Hackers stole NFTs from nifty gateway users. https://www.theverge.com/2021/3/15/22331818/nifty-gateway-hack-steal-NFTs-credit-card. Accessed on 18 Sep 2022
https://www.fool.com/investing/stock-market/marketsectors/financials/cryptocurre1ncy-stocks/crypto-tokens/. Accessed on 09 Sep 2022
https://cyberscrilla.com/nft-smart-contracts-explained. Accessed on 17 Sep 2022
https://dappradar.com/blog/blockchain-user-behavior-report-nftperspective#Key%20Findings. Accessed on 20 Sep 2022
https://www.investopedia.com/decentralized-finance-defi-5113835:~:text=Decentralized%20finance%20(DeFi)%20is%20an,financial%20products%2C%20and%20financial%20services. Accessed on 22 Sep 2022
https://coinmarketcap.com/alexandria/glossary/rug-pull. Accessed on 24 Sep 2022
https://www.jdsupra.com/legalnews/nfts-privacy-issues-for-consideration-7804114/. Accessed on 24 Sep 2022
https://101blockchains.com/nfts-and-metaverse/. Accessed on 28/01/2022
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kala, N. (2024). Cyber Security Issues and Challenges on Non-fungible Tokens. In: Patel, S.J., Chaudhary, N.K., Gohil, B.N., Iyengar, S.S. (eds) Information Security, Privacy and Digital Forensics. ICISPD 2022. Lecture Notes in Electrical Engineering, vol 1075. Springer, Singapore. https://doi.org/10.1007/978-981-99-5091-1_12
Download citation
DOI: https://doi.org/10.1007/978-981-99-5091-1_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-5090-4
Online ISBN: 978-981-99-5091-1
eBook Packages: Computer ScienceComputer Science (R0)