SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1441
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN
ALGORITHM ON IoT DEVICES
Rajagopalan.B1, Revanth.R2, Sandhiya.G3, Shamsiya Banu.A.R4, Ms. Abirami .S5
1,2,3,4 Department of Electronics and Communication Engineering, SRM Valliammai Engineering College
5Department of Electronics and Communication Engineering, SRM Valliammai Engineering College
---------------------------------------------------------------------***------------------------------------------------------------------ ---
Abstract - A blockchain is a upcoming revolutionary one
with crypto smart contract that is used for tokentransaction
with the help of unique address id. In this blockchain
transactions, each block contains unique id ,hash rate and
the content of the previous block .In this manner all the
blocks are interconnected to ensure security. In terms of
privacy and security it fulfils everything,herethesenderand
receiver cannot be knownby thethird man.Tamperingthese
integrated blocks will be difficult. All the blocks in the
blockchain are encrypted If one has to tamper or steal the
data from the blocks, they have to hack 60-70% of the
blocks. If they fail to do ,the system will automatically
initialize the tamper blocks as NIL so that the tokensthatare
hacked by hacker will be declared as void. Image if we add
this type of security to our IOT and next gen devices, we can
reduce the tampering and data stealingcanbeminimal.Here
we are done a basic payment verification blockchain coding
in python and we implemented it on the IOT device (ESPN
kit)
INTRODUCTION
A blockchain is simply a distributed database of records or
public ledger of all completed and shared transactions or
digital occurrences. Every transaction in the public ledger is
confirmed by a majority of the system's members.
Information cannot be deleted once it has been entered.
Every every transaction ever made is recorded in the
blockchain, which is certain and provable .To give a simple
analogy, stealing a cookie from a cookie jar stored in an
isolated location is far easier than stealing a cookie from a
cookie jar placed in a market place when hundredsof people
will watch the process.
A blockchain is simply a distributed database of records or
public ledger of all completed and shared transactions or
digital occurrences. Every transaction in the public ledger is
confirmed by a majority of the system's members.
Information cannot be deleted once it has been entered.
Every every transaction ever made is recorded in the
blockchain, which is certain and provable .To give a simple
analogy, stealing a cookie from a cookie jar stored in an
isolated location is far easier than stealing a cookie from a
cookie jar placed in a market place when hundredsof people
will watch
Blockchain on IOT
Engineers can utilise blockchain data sharing to enable IoT
devices to communicate with one another in the IoT. The
gadgets accomplish this without the use of a centralised
network. The distributed network of computer systemsthat
makes up the blockchain makes those communications
tamper-proof. Hundreds of billions, if not trillions,ofdevices
will be connected to the InternetofThings.However,most of
these devices now interact through centralised computing
systems, which can fail at times. Other issues are caused by
hackers. And the costs are enormous. Blockchain, on the
other hand, avoids this by establishing a digital ledger of
data, such as transactions. By confirming and adding to the
blockchain, each data block builds on the previous one.
Leasing a truck. According to the Gartner Inc. research
"Integrating Blockchain With IoT Strengthens Trust in
Multiparty Processes," IoT sensors installed in leased
vehicles may record crucial events on a blockchain to better
monitor fleet whereabouts and returns, as well as to enable
more meaningful payment methods. With IoT sensors on
board vehicles, truck leasing businesses will be able to
charge renters fees depending on the torque of the loads
rather than miles, as is now the case," according to the
article. "The blockchaindistributedledgertechnologyallows
people to share a single version of the truth." The data is not
controlled by any single institution, and truckersandleasing
businesses may independently check their owncopiesofthe
distributed ledger. This blockchain/IoT connection should
aid leasing organisations in increasing income while
lowering costs.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1442
All of this means that the information cannot be tampered
with. It provides for efficient embedded system verification
in the IoT. As a result, IoT devices can use the technology to
connect safely.
Existing System
In Early 2008, some group of anonymous experts developed
blockchain like peer-peer network lately in2009,the bitcoin
was developed (first digital currency in the world).
Transaction in Ethereum smart contractandripplecurrency
are done in blockchain. In India, the CBSE exam results are
published through blockchain. Insmartcontracts,itrequires
high hash rate to process the data which is too expensive.
However, there is no support for low-end devices because
the process is very complicated and difficult to process.
Proposed System
Here we are sorting out the problem in low end IOT devices
also. To prove this, we demonstrated through ESPN kit (IOT
Device), Node MCU, RFID card which contains unique
information about the user and we implemented blockchain
code through python. The RFID card works like Wi-Fi hard
here, RFID reader is connected to the ESPN kit which has Wi-
fi and Bluetooth connection for access. Also contains 32-bit
LX106 RISC microprocessor for high processing rate. Every
customer information is dumped in these cards like
debit/credit cards. And the kit is connected to monitor to
conduct the experiment and the output is verified
METHODOLOGY
SHA256 ALGORITHM IN BLOCKCHAIN: SHA256 is a
patented cryptographic hash function that returns a 256-bit
value. What is a hash? Encryption transforms data into a
secure format that cannot be read unless the recipient has
the key. In encrypted format, the size of the data is unlimited
and is often the same as unencrypted. This algorithm is used
in blockchain technology that has been used to secure the
data of transaction in this project.
ARDUINO IDE:The Arduino Integrated Development
Environment - or Arduino Software (IDE) -contains a text
editor for writing code, a message area, a text console, a
toolbar with buttons for common functions and a series of
menus. It connects to the Arduino hardware to upload
programs and communicate with them. In this project,
Arduino IDE is used to read the data from the RFID reader to
Serial Monitor and verify the data for further processing.
EMBEDDED C
Embedded C is most popular programming language in
software field for developing electronic gadgets. Embedded C
programming plays a key role in performingspecificfunction
by the processor. In this project, Embedded C is used for
Arduino IDE.
PYTHON IDLE
Python IDLE is a IDE for Python which has inbuiltlibrariesin
it. It helps us to code faster and it has automatic indentation
features. In this project, Python IDLE is used as the main
language for generating Blockchain algorithm.
NODE MCU AND RFID CARDS:
Node MCU ESP8266 development board isthecontrollerused
in the project. It is based 32-bit LX106 RISC microprocessor
and supports RTOS. It has in-built Wi-Fi / Bluetooth features
used for remote access. Consumes Less energy. RFID (Radio
Frequency Identification) cards are used for transaction
purpose.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1443
REPRESENTATION:
This is the real-time representation of our project. ESP8266
kit is used to receive the data from the user. Here we are
going to use RFID (Radio Frequency Identification) cards for
scanning the data. This data is scanned by RFID reader and
verified by the SERIAL MONITOR ('tether' between the
computer and Arduino). The RFID card number has been
already pre-registered in the program (Only registered RFID
cards can be used). GPIO (General Purpose Input Output) is
used to connect the kit with the system through USB. The
data travels through the PROOF OF WORK. Once it passes the
PROOF OF WORK, the data will be entered into the program
and saved in the ledger. The first data enters the first ledger
called Genesis Block. The hash value of the block is generated
and previous hash will be zero since there is no previous
block. Then when the second data enters, same steps are
followed and the second data is stored in second ledger. The
previous hash of the second block will be the current hash of
the first block (Genesis Block). Then the current hash of
second ledger will be the previous hash of third ledger.This is
the way blockchain algorithm works. Thehashvaluewegetis
of 256-bit value (64 characters) since we are using SHA256
algorithm. The information of the user will be stored as
blocks and if any changes occur in hash value, then we can
easily detect the malicious act. However, hacking this
technology is not easier to do and this will be the safest way
for low-end devices to protect the information against
hackers.
OUTPUT
The program printsseveralinformationsowecanget
a clear understanding about the process. The information of
the user is stored in blocks and protected by hash function.
The program asks for the amount to be transacted as an
input and the output shows the current hash of the block
(ledger), block data code, RFID card name (customer name),
amount to be transacted and the previous hash of the block.
The hash value has 64 characters and it isa256bitvalue.The
program also use inbuild functions from Python Library to
display the exact time and date when the transaction occurs
to add more accuracy to the output. This output is just a real-
time representation of how the data are protected in
blockchain algorithm.
CONCLUSION
The program prints several information so we can get a clear
understanding about the process.Theinformationofthe user
is stored in blocks and protected by hash function. The
program asks for the amount to be transacted as an input
and the output shows the current hash of the block (ledger),
block data code, RFID card name (customer name),amountto
be transacted and the previous hash of the block. The hash
value has 64 characters and it is a 256 bit value. Theprogram
also use inbuild functions from Python Library to display the
exact time and date when the transaction occurs to add more
accuracy to the output. This output is just a real-time
representation of how the data are protected in blockchain
algorithm.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1444
REFERENCES
[1] J. A. Stankovic, I. Lee, A. Mok, and R. Rajkumar,
“Opportunities and obligations for physical computing
systems,” Computer, vol. 38, no. 11,pp. 23–31, Nov. 2005.
[2] W. Wolf, “Cyber-physical systems,” Computer, vol. 42, no.
3, pp. 88–89,Mar. 2009.
[3] Bellare, Mihir; and Rogaway, Phillip. (September 21,
2005). “Introduction.” In Introduction to Modern
Cryptography (p. 10).
[4]loFundamentals and Applications in Contactless Smart
Cards and Identification, May 2003
[5] ESP8266 Node MCU Using Arduino IDE: Getting Start
With ESP8266 (IoT hands on projects)May 2018
[6] Python: A Beginners Complete Reference Guide to Learn
The Python Programming Language, June 2019
BIOGRAPHIES
B.Rajagopalan pursuing his B.E., in
Electronics and Communication in 2022
from the college of SRM Valliammai
Engineering College.
R.Revanth pursuing his B.E., in
Electronics and Communication in 2022
from the college of SRM Valliammai
Engineering College.
G.Sandhiya pursuing her B.E., in
Electronics and Communication in 2022
from the college of SRM Valliammai
Engineering College.
A.R.Shamsiya Banu pursuing her B.E., in
Electronics and Communication in 2022
from the college of SRM Valliammai
Engineering College.

More Related Content

Similar to A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES

IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET Journal
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET Journal
 
Online Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyOnline Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyIRJET Journal
 
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET-  	  IoT and Bigdata Analytics Approach using Smart Home Energy Managem...IRJET-  	  IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...IRJET Journal
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
IoT Assisted Fingerprint Based Door Security System using Raspberry PI 4
IoT Assisted Fingerprint Based Door Security System using Raspberry PI 4IoT Assisted Fingerprint Based Door Security System using Raspberry PI 4
IoT Assisted Fingerprint Based Door Security System using Raspberry PI 4ijtsrd
 
Blockchain as a Foundation for Industrial IoT | Dr Craig S. Wright
Blockchain as a Foundation for Industrial IoT | Dr Craig S. WrightBlockchain as a Foundation for Industrial IoT | Dr Craig S. Wright
Blockchain as a Foundation for Industrial IoT | Dr Craig S. WrightLiz Louw
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKIRJET Journal
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET Journal
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsNagarro
 
IOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsIOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsKuldeep Singh
 
Real-life Application of a Decentralized System
Real-life Application of a Decentralized SystemReal-life Application of a Decentralized System
Real-life Application of a Decentralized SystemIRJET Journal
 
IRJET- IoT Applications on Secure Smart Shopping System
IRJET-  	  IoT Applications on Secure Smart Shopping SystemIRJET-  	  IoT Applications on Secure Smart Shopping System
IRJET- IoT Applications on Secure Smart Shopping SystemIRJET Journal
 
Global Azure Bootcamp 2018 - Azure IoT Central
Global Azure Bootcamp 2018 - Azure IoT CentralGlobal Azure Bootcamp 2018 - Azure IoT Central
Global Azure Bootcamp 2018 - Azure IoT CentralAndri Yadi
 
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGAUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGIRJET Journal
 
Gvm project report g95
Gvm project report g95Gvm project report g95
Gvm project report g95G0VIND G0URAV
 

Similar to A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES (20)

IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 
Online Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyOnline Voting System Using Blockchain Technology
Online Voting System Using Blockchain Technology
 
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET-  	  IoT and Bigdata Analytics Approach using Smart Home Energy Managem...IRJET-  	  IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
IoT Assisted Fingerprint Based Door Security System using Raspberry PI 4
IoT Assisted Fingerprint Based Door Security System using Raspberry PI 4IoT Assisted Fingerprint Based Door Security System using Raspberry PI 4
IoT Assisted Fingerprint Based Door Security System using Raspberry PI 4
 
Blockchain as a Foundation for Industrial IoT | Dr Craig S. Wright
Blockchain as a Foundation for Industrial IoT | Dr Craig S. WrightBlockchain as a Foundation for Industrial IoT | Dr Craig S. Wright
Blockchain as a Foundation for Industrial IoT | Dr Craig S. Wright
 
What is an IoT Gateway Device & Why It's Important?
What is an IoT Gateway Device & Why It's Important?What is an IoT Gateway Device & Why It's Important?
What is an IoT Gateway Device & Why It's Important?
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of Things
 
IOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsIOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of Things
 
Real-life Application of a Decentralized System
Real-life Application of a Decentralized SystemReal-life Application of a Decentralized System
Real-life Application of a Decentralized System
 
IRJET- IoT Applications on Secure Smart Shopping System
IRJET-  	  IoT Applications on Secure Smart Shopping SystemIRJET-  	  IoT Applications on Secure Smart Shopping System
IRJET- IoT Applications on Secure Smart Shopping System
 
Global Azure Bootcamp 2018 - Azure IoT Central
Global Azure Bootcamp 2018 - Azure IoT CentralGlobal Azure Bootcamp 2018 - Azure IoT Central
Global Azure Bootcamp 2018 - Azure IoT Central
 
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGAUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
 
Gvm project report g95
Gvm project report g95Gvm project report g95
Gvm project report g95
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 

Recently uploaded (20)

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 

A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1441 A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES Rajagopalan.B1, Revanth.R2, Sandhiya.G3, Shamsiya Banu.A.R4, Ms. Abirami .S5 1,2,3,4 Department of Electronics and Communication Engineering, SRM Valliammai Engineering College 5Department of Electronics and Communication Engineering, SRM Valliammai Engineering College ---------------------------------------------------------------------***------------------------------------------------------------------ --- Abstract - A blockchain is a upcoming revolutionary one with crypto smart contract that is used for tokentransaction with the help of unique address id. In this blockchain transactions, each block contains unique id ,hash rate and the content of the previous block .In this manner all the blocks are interconnected to ensure security. In terms of privacy and security it fulfils everything,herethesenderand receiver cannot be knownby thethird man.Tamperingthese integrated blocks will be difficult. All the blocks in the blockchain are encrypted If one has to tamper or steal the data from the blocks, they have to hack 60-70% of the blocks. If they fail to do ,the system will automatically initialize the tamper blocks as NIL so that the tokensthatare hacked by hacker will be declared as void. Image if we add this type of security to our IOT and next gen devices, we can reduce the tampering and data stealingcanbeminimal.Here we are done a basic payment verification blockchain coding in python and we implemented it on the IOT device (ESPN kit) INTRODUCTION A blockchain is simply a distributed database of records or public ledger of all completed and shared transactions or digital occurrences. Every transaction in the public ledger is confirmed by a majority of the system's members. Information cannot be deleted once it has been entered. Every every transaction ever made is recorded in the blockchain, which is certain and provable .To give a simple analogy, stealing a cookie from a cookie jar stored in an isolated location is far easier than stealing a cookie from a cookie jar placed in a market place when hundredsof people will watch the process. A blockchain is simply a distributed database of records or public ledger of all completed and shared transactions or digital occurrences. Every transaction in the public ledger is confirmed by a majority of the system's members. Information cannot be deleted once it has been entered. Every every transaction ever made is recorded in the blockchain, which is certain and provable .To give a simple analogy, stealing a cookie from a cookie jar stored in an isolated location is far easier than stealing a cookie from a cookie jar placed in a market place when hundredsof people will watch Blockchain on IOT Engineers can utilise blockchain data sharing to enable IoT devices to communicate with one another in the IoT. The gadgets accomplish this without the use of a centralised network. The distributed network of computer systemsthat makes up the blockchain makes those communications tamper-proof. Hundreds of billions, if not trillions,ofdevices will be connected to the InternetofThings.However,most of these devices now interact through centralised computing systems, which can fail at times. Other issues are caused by hackers. And the costs are enormous. Blockchain, on the other hand, avoids this by establishing a digital ledger of data, such as transactions. By confirming and adding to the blockchain, each data block builds on the previous one. Leasing a truck. According to the Gartner Inc. research "Integrating Blockchain With IoT Strengthens Trust in Multiparty Processes," IoT sensors installed in leased vehicles may record crucial events on a blockchain to better monitor fleet whereabouts and returns, as well as to enable more meaningful payment methods. With IoT sensors on board vehicles, truck leasing businesses will be able to charge renters fees depending on the torque of the loads rather than miles, as is now the case," according to the article. "The blockchaindistributedledgertechnologyallows people to share a single version of the truth." The data is not controlled by any single institution, and truckersandleasing businesses may independently check their owncopiesofthe distributed ledger. This blockchain/IoT connection should aid leasing organisations in increasing income while lowering costs.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1442 All of this means that the information cannot be tampered with. It provides for efficient embedded system verification in the IoT. As a result, IoT devices can use the technology to connect safely. Existing System In Early 2008, some group of anonymous experts developed blockchain like peer-peer network lately in2009,the bitcoin was developed (first digital currency in the world). Transaction in Ethereum smart contractandripplecurrency are done in blockchain. In India, the CBSE exam results are published through blockchain. Insmartcontracts,itrequires high hash rate to process the data which is too expensive. However, there is no support for low-end devices because the process is very complicated and difficult to process. Proposed System Here we are sorting out the problem in low end IOT devices also. To prove this, we demonstrated through ESPN kit (IOT Device), Node MCU, RFID card which contains unique information about the user and we implemented blockchain code through python. The RFID card works like Wi-Fi hard here, RFID reader is connected to the ESPN kit which has Wi- fi and Bluetooth connection for access. Also contains 32-bit LX106 RISC microprocessor for high processing rate. Every customer information is dumped in these cards like debit/credit cards. And the kit is connected to monitor to conduct the experiment and the output is verified METHODOLOGY SHA256 ALGORITHM IN BLOCKCHAIN: SHA256 is a patented cryptographic hash function that returns a 256-bit value. What is a hash? Encryption transforms data into a secure format that cannot be read unless the recipient has the key. In encrypted format, the size of the data is unlimited and is often the same as unencrypted. This algorithm is used in blockchain technology that has been used to secure the data of transaction in this project. ARDUINO IDE:The Arduino Integrated Development Environment - or Arduino Software (IDE) -contains a text editor for writing code, a message area, a text console, a toolbar with buttons for common functions and a series of menus. It connects to the Arduino hardware to upload programs and communicate with them. In this project, Arduino IDE is used to read the data from the RFID reader to Serial Monitor and verify the data for further processing. EMBEDDED C Embedded C is most popular programming language in software field for developing electronic gadgets. Embedded C programming plays a key role in performingspecificfunction by the processor. In this project, Embedded C is used for Arduino IDE. PYTHON IDLE Python IDLE is a IDE for Python which has inbuiltlibrariesin it. It helps us to code faster and it has automatic indentation features. In this project, Python IDLE is used as the main language for generating Blockchain algorithm. NODE MCU AND RFID CARDS: Node MCU ESP8266 development board isthecontrollerused in the project. It is based 32-bit LX106 RISC microprocessor and supports RTOS. It has in-built Wi-Fi / Bluetooth features used for remote access. Consumes Less energy. RFID (Radio Frequency Identification) cards are used for transaction purpose.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1443 REPRESENTATION: This is the real-time representation of our project. ESP8266 kit is used to receive the data from the user. Here we are going to use RFID (Radio Frequency Identification) cards for scanning the data. This data is scanned by RFID reader and verified by the SERIAL MONITOR ('tether' between the computer and Arduino). The RFID card number has been already pre-registered in the program (Only registered RFID cards can be used). GPIO (General Purpose Input Output) is used to connect the kit with the system through USB. The data travels through the PROOF OF WORK. Once it passes the PROOF OF WORK, the data will be entered into the program and saved in the ledger. The first data enters the first ledger called Genesis Block. The hash value of the block is generated and previous hash will be zero since there is no previous block. Then when the second data enters, same steps are followed and the second data is stored in second ledger. The previous hash of the second block will be the current hash of the first block (Genesis Block). Then the current hash of second ledger will be the previous hash of third ledger.This is the way blockchain algorithm works. Thehashvaluewegetis of 256-bit value (64 characters) since we are using SHA256 algorithm. The information of the user will be stored as blocks and if any changes occur in hash value, then we can easily detect the malicious act. However, hacking this technology is not easier to do and this will be the safest way for low-end devices to protect the information against hackers. OUTPUT The program printsseveralinformationsowecanget a clear understanding about the process. The information of the user is stored in blocks and protected by hash function. The program asks for the amount to be transacted as an input and the output shows the current hash of the block (ledger), block data code, RFID card name (customer name), amount to be transacted and the previous hash of the block. The hash value has 64 characters and it isa256bitvalue.The program also use inbuild functions from Python Library to display the exact time and date when the transaction occurs to add more accuracy to the output. This output is just a real- time representation of how the data are protected in blockchain algorithm. CONCLUSION The program prints several information so we can get a clear understanding about the process.Theinformationofthe user is stored in blocks and protected by hash function. The program asks for the amount to be transacted as an input and the output shows the current hash of the block (ledger), block data code, RFID card name (customer name),amountto be transacted and the previous hash of the block. The hash value has 64 characters and it is a 256 bit value. Theprogram also use inbuild functions from Python Library to display the exact time and date when the transaction occurs to add more accuracy to the output. This output is just a real-time representation of how the data are protected in blockchain algorithm.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1444 REFERENCES [1] J. A. Stankovic, I. Lee, A. Mok, and R. Rajkumar, “Opportunities and obligations for physical computing systems,” Computer, vol. 38, no. 11,pp. 23–31, Nov. 2005. [2] W. Wolf, “Cyber-physical systems,” Computer, vol. 42, no. 3, pp. 88–89,Mar. 2009. [3] Bellare, Mihir; and Rogaway, Phillip. (September 21, 2005). “Introduction.” In Introduction to Modern Cryptography (p. 10). [4]loFundamentals and Applications in Contactless Smart Cards and Identification, May 2003 [5] ESP8266 Node MCU Using Arduino IDE: Getting Start With ESP8266 (IoT hands on projects)May 2018 [6] Python: A Beginners Complete Reference Guide to Learn The Python Programming Language, June 2019 BIOGRAPHIES B.Rajagopalan pursuing his B.E., in Electronics and Communication in 2022 from the college of SRM Valliammai Engineering College. R.Revanth pursuing his B.E., in Electronics and Communication in 2022 from the college of SRM Valliammai Engineering College. G.Sandhiya pursuing her B.E., in Electronics and Communication in 2022 from the college of SRM Valliammai Engineering College. A.R.Shamsiya Banu pursuing her B.E., in Electronics and Communication in 2022 from the college of SRM Valliammai Engineering College.