Submit Search
Upload
Blockchain Technology using System Requirement Specification and IoT Devices
•
0 likes
•
8 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i9/IRJET-V9I9148.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
IRJET Journal
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
IRJET Journal
IRJET - BI: Blockchain in Insurance
IRJET - BI: Blockchain in Insurance
IRJET Journal
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET Journal
Energy Meters using Internet of Things Platform
Energy Meters using Internet of Things Platform
IRJET Journal
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
IRJET- In-House File Tracking System
IRJET- In-House File Tracking System
IRJET Journal
Authentication system with Decentralized chat app
Authentication system with Decentralized chat app
IRJET Journal
Recommended
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
IRJET Journal
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
IRJET Journal
IRJET - BI: Blockchain in Insurance
IRJET - BI: Blockchain in Insurance
IRJET Journal
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET Journal
Energy Meters using Internet of Things Platform
Energy Meters using Internet of Things Platform
IRJET Journal
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
IRJET- In-House File Tracking System
IRJET- In-House File Tracking System
IRJET Journal
Authentication system with Decentralized chat app
Authentication system with Decentralized chat app
IRJET Journal
The Tools of Industry 4.0
The Tools of Industry 4.0
Osama Shahumi
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET Journal
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
IRJET Journal
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET Journal
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
IRJET Journal
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
User Authentication Technique for Office Environment
User Authentication Technique for Office Environment
IRJET Journal
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET Journal
Cloud Based Development for Medical Pharmacy and DCA Application
Cloud Based Development for Medical Pharmacy and DCA Application
IRJET Journal
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
IRJET Journal
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET Journal
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET Journal
IRJET- Effect of ICT Application in Manufacturing Industry
IRJET- Effect of ICT Application in Manufacturing Industry
IRJET Journal
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
IRJET Journal
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET Journal
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Blockchain Technology using System Requirement Specification and IoT Devices
The Tools of Industry 4.0
The Tools of Industry 4.0
Osama Shahumi
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET Journal
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
IRJET Journal
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET Journal
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
IRJET Journal
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
User Authentication Technique for Office Environment
User Authentication Technique for Office Environment
IRJET Journal
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET Journal
Cloud Based Development for Medical Pharmacy and DCA Application
Cloud Based Development for Medical Pharmacy and DCA Application
IRJET Journal
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
IRJET Journal
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET Journal
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET Journal
IRJET- Effect of ICT Application in Manufacturing Industry
IRJET- Effect of ICT Application in Manufacturing Industry
IRJET Journal
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
IRJET Journal
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET Journal
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
Similar to Blockchain Technology using System Requirement Specification and IoT Devices
(20)
The Tools of Industry 4.0
The Tools of Industry 4.0
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
User Authentication Technique for Office Environment
User Authentication Technique for Office Environment
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
Cloud Based Development for Medical Pharmacy and DCA Application
Cloud Based Development for Medical Pharmacy and DCA Application
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Effect of ICT Application in Manufacturing Industry
IRJET- Effect of ICT Application in Manufacturing Industry
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Recently uploaded
(20)
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
power system scada applications and uses
power system scada applications and uses
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Blockchain Technology using System Requirement Specification and IoT Devices
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 829 Blockchain Technology using System Requirement Specification and IoT Devices Greeshma PP1, J S Rajashekar2 Student1 , Professor2, Department of Electronics and Instrumentation Engineering Dayananda Sagar College of Engineering, Bangalore, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The Internet of Things (IoT) is a network connected objects like sensors; actuators, electronics and software that are future requirements of any industry and modern society. These embedded systemsaremadetoprovidestate-of-the-art facilitiesto exchange data over the internet. IoT technology can be efficiently used in various sectors like agriculture, healthcare, transportation, water and wastewater management, productmanufacturing, powergeneration&distributionetc. Blockchainhas emerged as a key technology is quickly rising to the top, especially considering its widespread use. The integration intoworkplace networks still faces some difficulties. IoT raises security and privacy issues because data authenticationandexchangearehandled solely through the central server. The main server model and blockchain technology isadded whileacomponentabout IoT tolabel such certainty and problems. Three primary characteristics, namely, extensibility, inactivity, and network longevity, impact security measures without them, internal attack mitigation would be difficult. Using block chain can upgrade net conservation, efficiency and certainty. Recovery after events is fairly simple because the block chain stores the entire history of modifications to device configuration. Key Words: Blockchain Technology, Internet of Things (IoT), Sensors, Embedded Systems, Data authentication 1. INTRODUCTION Data is gathered from multiple selector, sensors, and apparatus in a manufacturing setting the right to approach and command the data, is the data itself. It is being created by things that are allowing on the Internet, like Industrial IoT refers to such a circumstance (IIoT). The development of Industry 4.0 and the IIoT creates opportunities for connecting pre- programmed computer control schemes for remote observation and quick response to situations necessitating concurrent handling. Additionally, the use of sensors may result in a number of benefits over other industrial architectures. Blockchain, often known as a Distributedashared ledger, is a cryptographically protected, unchangeable store of information. Digital advantage can be traded and stored withoutthe requirementforoutsidesupervision. Devicesthatdownloadconfigurationfiles from a centralized server must have confidence in that authority; otherwise, the device is susceptible. A blockchaineliminates the need for a centralized authority. Peer-to-peer is the direct exchange of strength between devices. In Information technology, the term "Internet of Things" refers to the link between on-devices and the internet. The devices should be connected wirelessly, opening up new opportunities for system interactions as well as new possibilities for the management, succeeding, andinitiationofimprovedserviceability.IoTadeviceshaveperformanceandresourcelimitations by design when compared to network devices in enterprise contexts. When creating management andmonitoringsystemsfor IoT devices, this must be taken into account. IoT device heterogeneity employs multipleconfigurationsandoffersvariedlevels of monitoring for diverse reasons. Enterprise network settings similar device heterogeneitymakesitpossibletoadaptcurrent network monitoring and management tools forIoTimplementation.Asthebackbone ofcommunicationwithincommunitiesor businesses, undertaking networksandpopular entrancenetworksarea commonlyusedpresenting enablerglobally.Theentire enterprise sector is in constant need of stronger, more secure connection for all nodes. Networks are being developed systematically and are open to new ideas. The primary innovation need to be on the following crucial elements boosting network efficiency, boosting security, and decreasing using blockchain technology to save maintenance expenses. The term "System Requirements Specification"(SRS) or "Requirements Specification" is used in the requirements engineering community to refer to a contract that details various practical issues of a structure, generally a firmware system and also sometimes a system that combines software and hardware. Throughout various phases of the forecast life cycle, an SRS is used to help the major stakeholders share the system's vision, as well as to streamline communication and the general project administration and system evolution processes. A better SRS offers a number of advantages,including establishingthe foundation for accordance between the purchaser and the supplier providing a basis forapproximatebudgetandprogramme, offering a control for confirmation and affirmation and serving is a foundation for future preservation activities. A SRS may further be included in contracts or request for proposals documents related to a project. A SRS typically attach to a
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 830 predetermined arrangement that provides a specific document construction and additional useful suggestions.SRS templates must, by definition, be modified and tailored to the requirements of the company in question. This stage involves determining the project's feasibility and presenting a business scheme that includes a very simple project outline and some cost evaluate. During system analysis, the feasibility of the suggested system must be studied. This will secure that the offered resolve won't put a tension on the company. 1.1. SYSTEM REQUIREMENT SPECIFICATION ON BLOCKCHAIN A key document that establishes the framework for the process of product advancement is the System Requirement Specification (SRS). It includes a description of the structure's key feature in addition to its requirements. A SRS is simply an organization's assessment of a client's or potential client's operational needs and circumstances at a certain moment in time prior to any real outline or improvement work. It is a symbolic protection scheme that ensuresespeciallyatanyspecifiedtime, the association andathe customer are both aware of the requirements of exchange from that perspective. The inclusion of programming requirement information reduces effort required for advancement since careful review of the report can find oversights, false assumptions, and variability earlier in the improvement circle when they are secure to fix. Although the SRS may required to be modified, it does supply a substructure for moving forward with creation assessment. Simply said, determining the necessity of programming is the first step in every product improvement process. Decoding client thoughts and information into a formal archive is what the SRS refers to as the output of the prerequisite stage. Therefore, the stage's output is composed of formal requirements that are, ideally, complete and consistent, whereas the data lacks all of these characteristics. Functional requirements specify how a software structure should work and counter to specific inputs or conditions. Computations, data clearing, and other limited functionality may be amidst them. One of the most crucial elements in termsof the overall mechanism of modules is the project's functional requirements. Fig 1 shows the entry details in the SRS software, Service providers can register, adddeviceinformation,addprivacypolicies,andadddevicespecifications.Transferredfromthe sensor to the server, the information is saved in the blockchain, the user has access to the sensor information,andtheuser can make payments. The framework must provide crucial security in addition to bug prevention and must prevent the entire process from collapsing. Security became a major worry for an association when innovation began to advance at a rapid pace. Giving security requires a significant investment of financial resources. Bug tracking ensures that unauthorized users can't access crucial issue data without permission while delivering the highest level of security currently possible. Multipleverified clients receive different mystery passwords from the bug-following framework,resulting inlimitedfunctionalityfor all clients. Fig 1: IoT devices registration on Blockchain.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 831 The system will be used continuously by many factors. Performance becomes a significantconsiderationastheframework will be run on a unique web server and a single particular server that are both unseen. Although several customers are using the framework continuously, it shouldn't fail. All of its customers should be able to access it quickly. For instance, there shouldn't be any irregularity concurrently if two test specialists are simultaneously trying to notify the location of a bug. 1.2. IoT Blockchain Focusing on the subsequent challenges, such as confirmation, exposure, and empirical of IoT or wirelessasensors in the industrialaplatform, is necessary fully govern every smart device. We must make sure that the individuals tracking the product's manufacture or documentation are reputableandpossesstheappropriatecredentials.Eventhoughindustry4.0uses smart devices to handle all data and activities, there are still some security concerns that could compromise sensors and IoT devices, hence exponentially slowing down corporate growth. Therefore, it is necessarytoindexingeachsensorthatrecognize data into the blockchain grid in order to give clarity and track whereabouts of each employee and product. Additionally, it is necessary to regularly gather and verify data from each registered IoT device. So that once the information or IoT/sensorsare cast, nothing should be up to exchange, adjust, or path them. Blockchaintechnology,whichallowsforeasytrackingofall device activities including data collection, product documentation, manufacturing, and shipment, can, however, resolve these concerns. The compromised sensor or device may enter the system fast or easily. As a result, before offering services, all IoT devices will schedule in the blockchain grid. Prior to receiving assistance, IoT devices must scheduleontheBlockchaingrid.A contributionappeal mustfirstsenttothe grid, position will be checked by miner nodes. Additionally, minersuseinformation-accessingdevicestoverifythe authenticity or legality of each sensor. After successful confirmation or substantiation, miners will produce a split key that will aid in subsequent confirmation. Finally, utilising the shared key between squintjunctionand sensors,all sensorsawill assembletheir allocate blink sensors. Each Internet of Things (IoT) device or user is connected to nearby or subscribing peer devices. Each organization or user must register on the blockchain grid in order to enjoy the services offered by the industrysupplier. When a user requests a product from the industry, we have treated them as customers for the sake of our framework. Similar tothis, we count an industry provider as a provider any time it ships the customer's order. Every time a user orders the shipmentofa goods, they must register and construct their user profile on the blockchain. The user includes information about their identification, the product, payment details, etc. in that profile. The user can access or utilize the product once they have successfully registered. For product and service operations, security and privacy are crucial. 2. DISCUSSIONS AND RELATED WORKS We can manage and keep track of any IoT device that is integrated into our blockchain infrastructure. If it require new arrangements or situations, a trusted customer adds them to the blockchain, where they are optionallyordirectly accessedby the IoT device. Middleware fetches fresh data and alerts users when a successful or a failed attempt. This implies that IoT network management can be decentralized. All configurations are known provenances, distributed, and immutable. The following traits are achieved by making use of blockchain technology. The succeeding challenges,suchasconfirmation,clarity, and empirical of IoT/wireless sensors in the production platform, need to be the emphasis of every smart device. We must make sure that the individuals trackingtheproduct'smanufactureordocumentationarereputableandpossessthe appropriate credentials. Even though industry 4.0 uses smart devices to handle all data andactivities,therearestill somesecurityconcerns that could compromise sensors and IoT devices, hence exponentially slowing down corporate growth. The design that are communicated in the examine document and evolved in the outline phase are actually put into practice during the implementation phase. In order to provide the required final result, executionshouldbea flawlessplotoftheoutlinedocument in an appropriate programmingalanguage. Choosing the wrong programming language or using an inappropriateapproachof programming frequently results in the product being damaged. It is ideal for the coding stage to be straight related to the outline phase in the sensation if the outline is in terms of object oriented phrase then executionshouldbeideallyconveyedout in an object oriented approach. Additionally, it is necessary to regularly gather and verify data from each registered IoT device. So that once the information or IoT/sensors are cast, nothing should be able to exchange, remake, or trace them. Blockchaintechnology,which allows for easy tracking of all device activities including data collection,productdocumentation,manufacturing,andshipment, can, however, resolve these concerns. Additionally, we must explain the necessary smart agreement just as we writethecopy, rules, codes, and article between the organizations. Without any further interference, all sensor or IoT devices or junction can calculate their consensus outcomes. Using blockchainatechnology, each IoTadevice or user involved in the production or delivery of a product must first register or log in to the network in order to utilize or provide the services.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 832 3. CONCLUSION All sensor or IoT devices can compute their common results. Using blockchain technology, each IoT device or user involved in the production or delivery of a product must first register or log in to the network in order to utilize or providethe services. The IoTaapparatus orasensors are gatheredintheablockchaintotrack eachsensoractivity.Inordertoassuresecurity and transparency among users in various locations, the blockchain project is typically utilized to forced details from sensors and to additionally conserve and extract it into blockchain. With the help of a blockchain mechanism and several security indicators, the suggested framework significantlyincreasedthesecurityofwirelesssensors.Thesuggestedframework istested against the likelihood that an attack would succeed, the system's capacity to detectanassault,anda alterationattack.IoT could present a number of security and privacy concerns. These were found based on observations of the interactions between IoT components. Only the alternatives for resolving the problems and difficulties in IoT isablockchain technology. The work describethe possibility for blockchain combination with IoT. The numerous IoT and blockchain technologies requisition were also discussed. This technology can be used for a variety of engineering services. But it is important to thoroughly research the precise consequences of each technology. Blockchain offers more freedom in how you can access the data. REFERENCES [1] Geetanjali Rathee, M. Balasaraswathi2, K. Prabhu Chandran3, Sharmi Dev Gupta4 C. S. Boopathi5. A secure IoT sensors communication in industry 4.0 using blockchain technology [2] Kristián Koštál , Pavol Helebrandt, Matej Belluš , Michal Ries and Ivan Kotuliak. ManagementandMonitoringofIoTDevices Using Blockchain. [3] Chanson, Andreas Bogner , Dominik Bilgeri , Elgar Fleisch , Felix Wortmann Leveraging, Blockchain Technology to Protect Sensor Data Mathieu. Privacy-Preserving Data Certification in the Internet of Things. [4] Manoj Kumara ,Pradeep Kumar Mallickb.Blockchain technology for security issues and challenges in IoT Nallapaneni. [5] Dr. D. Sivaganesan. A Data Driven Trust Mechanism Based on Blockchain in IoT Sensor Networks for Detection and Mitigation of Attacks [6] Alberto Rodrigues da Silva , Jan Verelst , Herwig Mannaert , David Almeida Ferreira1 , Philip Huysmans. Effects Towards a System Requirements Specification Template that Minimizes Combinatorial. [7] Sabah Suhail, Rasheed Hussain, Raja Jurda, Alma Oracevic, Khaled Salah, Raimundas Matulevičius, Choong Seon Hong, Blockchain-based Digital Twins: Research Trends, Issues, and Future Challenges. [8] Suhail, Rasheed Hussain, Raja Jurdak,andChoongSeonHong,TrustworthyDigital TwinsintheIndustrial InternetofThings with Blockchain, [9] Günther Pernul and Marietheres Dietz. 2020. Unleashing the Digital Twin's Potential for ICS Security. [10] DimitrisaGeneiatakis, IoannisaKounelis,RicardoaNeisse,IgorNai-FovinoGaryaSteri,andGianmarcoaBaldini. Securityand PrivacyaIssues for an IoT based Smart Home. [11] NoriaaFoukia, DavidaBillard & Eduardo Solana. PISCES: A Framework for Privacy by Design in IoT. [12] ArijitaUkil, SomaaBandyopadhyay, Joel Joseph, VijayanandaBanahatti & SachinaLodha. Negotiation-based PrivacyaPreservation Scheme in Internet of Things Platform. [13] Jong-HyoukaLee and MarcaPilkington. How the BlockchainaRevolution Will Reshape the Consumer ElectronicsIndustry. [14] ChristianaCachin. Architecture of theaHyperledger Blockchain Fabric. [15] Nigel Davies, Nina Taft, Mahadev Satyanarayanan, Sarah Clinch, Brandon Amos. Privacy Mediators: HelpingIoTCrossthe Chasm.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 833 [16]Fangyuan Sui, Fangfeng Cheng, Qinglin Qi, Meng Zhang, He Zhang, and Fei Tao. Big data-drivendigital twin-drivenproduct design, manufacturing, and service. [17] Satoshi Nakamoto Bitcoin is a peer-to-peer electronic currency. Report on Technology. Manubot,2019. Journal of IoT in Social, Mobile, Analytics, and Cloud, June 2022, Volume 4, Issue 2 105 [18] Ibrahim Yitmen, Christopher Santi Götz, and Patrik Karlsson. 2020. The applicability, interoperability,andintegrabilityof Blockchain-based digital twins for asset life cycle management are being investigated. [19] Jiewu Leng, Guolei Ruan, Pingyu Jiang, Kailin Xu, Qiang Liu, Xueliang Zhou, and Chao Liu. 2020. A survey of blockchain- enabled sustainable manufacturing and product lifecycle management in Industry 4.0. [20] Günther Pernul, Marietheres Dietz, and Benedikt Putz. 2019. A Distributed Ledger approach to Digital Twin data sharing security. [21] Chao Zhang, Guanghui Zhou, Han Li, and Yan Cao, Manufacturing Blockchain of Things for the Configurationof a Data-and Knowledge Driven Digital Twin Manufacturing Cell, 2020. [22] Günther Pernul, Benedikt Putz, Marietheres Dietz, Philip Empl, and Benedikt Putz. 2021.EtherTwinisa blockchain-based information management system for secure digital twins [23] Andrea Urbinati, Claudio Mandolla, Antonio Messeni Petruzzelli, Gianluca Percoco, and Claudio Mandolla. A case studyof the aerospace industry in creating a digital twin for additive manufacturing using blockchain technology. [24] Xiongbing Fang, Sihan Huang, Guoxin Wang, Yan Yan, and Sihan Huang. 2020.Forthedigital twinofa product,blockchain- based data management is used. [25] Haya R Hasan, Khaled Salah, Raja Jayaraman, Mohammed Omar, Ibrar Yaqoob, Saa Pesic, Todd Taylor, and Dragan Boscovic are among the members of the squad. 2020. A Blockchain-Based Approach to Digital Twin Creation. [26] F. Shahid, C. Maple, A. Ahmad, and G. Jeon. A. Khan, F. Shahid, C. Maple, A. Ahmad, and G. Jeon. Spiral Digital Twin Framework and Twinchain for Smart Manufacturing Blockchain-based digital twins for the industrial internet of things [27] Trond Kvamsdal, Adil Rasheed, and Omer San 2020. From a modelling standpoint, what are the benefits, constraints,and facilitators of a digital twin? [28] Chapter Thirteen - Empowering digital twins with blockchain. Pethuru Raj.2021.Blockchain Technology for Secure and Smart Applications in a Variety of Industries [29] J. S. Rajashekar , P. P. Greeshma. Blockchain-based Digital Twins for the Industrial Internet of Things [30] Moily, Ashwini, Guru Prasanna, Keerthi S. Shetty, and Sanjay Singh. "Model checking message exchangeinLocationBased Services" , International Conference [31] Shashank Kathar, Harsh Hardel,ZeeshanAlam,Shraddha Phansalkar,RajaniSajjan."AuctionSystemforAgricultural Trade Using Blockchain Technology [32] J S Rajashekar, Greeshma P P .Blockchain for Industrial Internet of Things. [33] Chao Wang, Wei Duan, Jianzhang Ma, Chenhui Wang. "The research of Android System architecture and application programming", Proceedings of International Conference on Computer Science and Network Technology. [34] "Information Systems Design and Intelligent Applications", Springer Science and Business Media LLC, 2018 [35] Alberto Rodrigues da Silva. "Linguistic Patterns and Linguistic Styles for Requirements Specification (I)" , Proceedings of the 22nd European Conference on Pattern Languages of Programs - EuroPLoP '17, 2017.
Download now