SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 829
Blockchain Technology using System Requirement Specification and
IoT Devices
Greeshma PP1, J S Rajashekar2
Student1 , Professor2, Department of Electronics and Instrumentation Engineering
Dayananda Sagar College of Engineering, Bangalore, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The Internet of Things (IoT) is a network connected objects like sensors; actuators, electronics and software that are
future requirements of any industry and modern society. These embedded systemsaremadetoprovidestate-of-the-art facilitiesto
exchange data over the internet. IoT technology can be efficiently used in various sectors like agriculture, healthcare,
transportation, water and wastewater management, productmanufacturing, powergeneration&distributionetc. Blockchainhas
emerged as a key technology is quickly rising to the top, especially considering its widespread use. The integration intoworkplace
networks still faces some difficulties. IoT raises security and privacy issues because data authenticationandexchangearehandled
solely through the central server. The main server model and blockchain technology isadded whileacomponentabout IoT tolabel
such certainty and problems. Three primary characteristics, namely, extensibility, inactivity, and network longevity, impact
security measures without them, internal attack mitigation would be difficult. Using block chain can upgrade net conservation,
efficiency and certainty. Recovery after events is fairly simple because the block chain stores the entire history of modifications to
device configuration.
Key Words: Blockchain Technology, Internet of Things (IoT), Sensors, Embedded Systems, Data authentication
1. INTRODUCTION
Data is gathered from multiple selector, sensors, and apparatus in a manufacturing setting the right to approach and
command the data, is the data itself. It is being created by things that are allowing on the Internet, like Industrial IoT refers to
such a circumstance (IIoT). The development of Industry 4.0 and the IIoT creates opportunities for connecting pre-
programmed computer control schemes for remote observation and quick response to situations necessitating concurrent
handling. Additionally, the use of sensors may result in a number of benefits over other industrial architectures. Blockchain,
often known as a Distributedashared ledger, is a cryptographically protected, unchangeable store of information. Digital
advantage can be traded and stored withoutthe requirementforoutsidesupervision. Devicesthatdownloadconfigurationfiles
from a centralized server must have confidence in that authority; otherwise, the device is susceptible. A blockchaineliminates
the need for a centralized authority. Peer-to-peer is the direct exchange of strength between devices.
In Information technology, the term "Internet of Things" refers to the link between on-devices and the internet. The
devices should be connected wirelessly, opening up new opportunities for system interactions as well as new possibilities for
the management, succeeding, andinitiationofimprovedserviceability.IoTadeviceshaveperformanceandresourcelimitations
by design when compared to network devices in enterprise contexts. When creating management andmonitoringsystemsfor
IoT devices, this must be taken into account. IoT device heterogeneity employs multipleconfigurationsandoffersvariedlevels
of monitoring for diverse reasons. Enterprise network settings similar device heterogeneitymakesitpossibletoadaptcurrent
network monitoring and management tools forIoTimplementation.Asthebackbone ofcommunicationwithincommunitiesor
businesses, undertaking networksandpopular entrancenetworksarea commonlyusedpresenting enablerglobally.Theentire
enterprise sector is in constant need of stronger, more secure connection for all nodes. Networks are being developed
systematically and are open to new ideas. The primary innovation need to be on the following crucial elements boosting
network efficiency, boosting security, and decreasing using blockchain technology to save maintenance expenses.
The term "System Requirements Specification"(SRS) or "Requirements Specification" is used in the requirements
engineering community to refer to a contract that details various practical issues of a structure, generally a firmware system
and also sometimes a system that combines software and hardware. Throughout various phases of the forecast life cycle, an
SRS is used to help the major stakeholders share the system's vision, as well as to streamline communication and the general
project administration and system evolution processes. A better SRS offers a number of advantages,including establishingthe
foundation for accordance between the purchaser and the supplier providing a basis forapproximatebudgetandprogramme,
offering a control for confirmation and affirmation and serving is a foundation for future preservation activities. A SRS may
further be included in contracts or request for proposals documents related to a project. A SRS typically attach to a
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 830
predetermined arrangement that provides a specific document construction and additional useful suggestions.SRS templates
must, by definition, be modified and tailored to the requirements of the company in question.
This stage involves determining the project's feasibility and presenting a business scheme that includes a very simple
project outline and some cost evaluate. During system analysis, the feasibility of the suggested system must be studied. This
will secure that the offered resolve won't put a tension on the company.
1.1. SYSTEM REQUIREMENT SPECIFICATION ON BLOCKCHAIN
A key document that establishes the framework for the process of product advancement is the System Requirement
Specification (SRS). It includes a description of the structure's key feature in addition to its requirements. A SRS is simply an
organization's assessment of a client's or potential client's operational needs and circumstances at a certain moment in time
prior to any real outline or improvement work. It is a symbolic protection scheme that ensuresespeciallyatanyspecifiedtime,
the association andathe customer are both aware of the requirements of exchange from that perspective. The inclusion of
programming requirement information reduces effort required for advancement since careful review of the report can find
oversights, false assumptions, and variability earlier in the improvement circle when they are secure to fix. Although the SRS
may required to be modified, it does supply a substructure for moving forward with creation assessment. Simply said,
determining the necessity of programming is the first step in every product improvement process. Decoding client thoughts
and information into a formal archive is what the SRS refers to as the output of the prerequisite stage. Therefore, the stage's
output is composed of formal requirements that are, ideally, complete and consistent, whereas the data lacks all of these
characteristics.
Functional requirements specify how a software structure should work and counter to specific inputs or conditions.
Computations, data clearing, and other limited functionality may be amidst them. One of the most crucial elements in termsof
the overall mechanism of modules is the project's functional requirements. Fig 1 shows the entry details in the SRS software,
Service providers can register, adddeviceinformation,addprivacypolicies,andadddevicespecifications.Transferredfromthe
sensor to the server, the information is saved in the blockchain, the user has access to the sensor information,andtheuser can
make payments. The framework must provide crucial security in addition to bug prevention and must prevent the entire
process from collapsing. Security became a major worry for an association when innovation began to advance at a rapid pace.
Giving security requires a significant investment of financial resources. Bug tracking ensures that unauthorized users can't
access crucial issue data without permission while delivering the highest level of security currently possible. Multipleverified
clients receive different mystery passwords from the bug-following framework,resulting inlimitedfunctionalityfor all clients.
Fig 1: IoT devices registration on Blockchain.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 831
The system will be used continuously by many factors. Performance becomes a significantconsiderationastheframework
will be run on a unique web server and a single particular server that are both unseen. Although several customers are using
the framework continuously, it shouldn't fail. All of its customers should be able to access it quickly. For instance, there
shouldn't be any irregularity concurrently if two test specialists are simultaneously trying to notify the location of a bug.
1.2. IoT Blockchain
Focusing on the subsequent challenges, such as confirmation, exposure, and empirical of IoT or wirelessasensors in the
industrialaplatform, is necessary fully govern every smart device. We must make sure that the individuals tracking the
product's manufacture or documentation are reputableandpossesstheappropriatecredentials.Eventhoughindustry4.0uses
smart devices to handle all data and activities, there are still some security concerns that could compromise sensors and IoT
devices, hence exponentially slowing down corporate growth. Therefore, it is necessarytoindexingeachsensorthatrecognize
data into the blockchain grid in order to give clarity and track whereabouts of each employee and product. Additionally, it is
necessary to regularly gather and verify data from each registered IoT device. So that once the information or IoT/sensorsare
cast, nothing should be up to exchange, adjust, or path them. Blockchaintechnology,whichallowsforeasytrackingofall device
activities including data collection, product documentation, manufacturing, and shipment, can, however, resolve these
concerns. The compromised sensor or device may enter the system fast or easily. As a result, before offering services, all IoT
devices will schedule in the blockchain grid.
Prior to receiving assistance, IoT devices must scheduleontheBlockchaingrid.A contributionappeal mustfirstsenttothe
grid, position will be checked by miner nodes. Additionally, minersuseinformation-accessingdevicestoverifythe authenticity
or legality of each sensor. After successful confirmation or substantiation, miners will produce a split key that will aid in
subsequent confirmation. Finally, utilising the shared key between squintjunctionand sensors,all sensorsawill assembletheir
allocate blink sensors. Each Internet of Things (IoT) device or user is connected to nearby or subscribing peer devices. Each
organization or user must register on the blockchain grid in order to enjoy the services offered by the industrysupplier. When
a user requests a product from the industry, we have treated them as customers for the sake of our framework. Similar tothis,
we count an industry provider as a provider any time it ships the customer's order. Every time a user orders the shipmentofa
goods, they must register and construct their user profile on the blockchain. The user includes information about their
identification, the product, payment details, etc. in that profile. The user can access or utilize the product once they have
successfully registered. For product and service operations, security and privacy are crucial.
2. DISCUSSIONS AND RELATED WORKS
We can manage and keep track of any IoT device that is integrated into our blockchain infrastructure. If it require new
arrangements or situations, a trusted customer adds them to the blockchain, where they are optionallyordirectly accessedby
the IoT device. Middleware fetches fresh data and alerts users when a successful or a failed attempt. This implies that IoT
network management can be decentralized. All configurations are known provenances, distributed, and immutable. The
following traits are achieved by making use of blockchain technology. The succeeding challenges,suchasconfirmation,clarity,
and empirical of IoT/wireless sensors in the production platform, need to be the emphasis of every smart device. We must
make sure that the individuals trackingtheproduct'smanufactureordocumentationarereputableandpossessthe appropriate
credentials. Even though industry 4.0 uses smart devices to handle all data andactivities,therearestill somesecurityconcerns
that could compromise sensors and IoT devices, hence exponentially slowing down corporate growth. The design that are
communicated in the examine document and evolved in the outline phase are actually put into practice during the
implementation phase. In order to provide the required final result, executionshouldbea flawlessplotoftheoutlinedocument
in an appropriate programmingalanguage. Choosing the wrong programming language or using an inappropriateapproachof
programming frequently results in the product being damaged. It is ideal for the coding stage to be straight related to the
outline phase in the sensation if the outline is in terms of object oriented phrase then executionshouldbeideallyconveyedout
in an object oriented approach.
Additionally, it is necessary to regularly gather and verify data from each registered IoT device. So that once the
information or IoT/sensors are cast, nothing should be able to exchange, remake, or trace them. Blockchaintechnology,which
allows for easy tracking of all device activities including data collection,productdocumentation,manufacturing,andshipment,
can, however, resolve these concerns. Additionally, we must explain the necessary smart agreement just as we writethecopy,
rules, codes, and article between the organizations. Without any further interference, all sensor or IoT devices or junction can
calculate their consensus outcomes. Using blockchainatechnology, each IoTadevice or user involved in the production or
delivery of a product must first register or log in to the network in order to utilize or provide the services.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 832
3. CONCLUSION
All sensor or IoT devices can compute their common results. Using blockchain technology, each IoT device or user
involved in the production or delivery of a product must first register or log in to the network in order to utilize or providethe
services. The IoTaapparatus orasensors are gatheredintheablockchaintotrack eachsensoractivity.Inordertoassuresecurity
and transparency among users in various locations, the blockchain project is typically utilized to forced details from sensors
and to additionally conserve and extract it into blockchain. With the help of a blockchain mechanism and several security
indicators, the suggested framework significantlyincreasedthesecurityofwirelesssensors.Thesuggestedframework istested
against the likelihood that an attack would succeed, the system's capacity to detectanassault,anda alterationattack.IoT could
present a number of security and privacy concerns. These were found based on observations of the interactions between IoT
components.
Only the alternatives for resolving the problems and difficulties in IoT isablockchain technology. The work describethe
possibility for blockchain combination with IoT. The numerous IoT and blockchain technologies requisition were also
discussed. This technology can be used for a variety of engineering services. But it is important to thoroughly research the
precise consequences of each technology. Blockchain offers more freedom in how you can access the data.
REFERENCES
[1] Geetanjali Rathee, M. Balasaraswathi2, K. Prabhu Chandran3, Sharmi Dev Gupta4 C. S. Boopathi5. A secure IoT sensors
communication in industry 4.0 using blockchain technology
[2] Kristián Koštál , Pavol Helebrandt, Matej Belluš , Michal Ries and Ivan Kotuliak. ManagementandMonitoringofIoTDevices
Using Blockchain.
[3] Chanson, Andreas Bogner , Dominik Bilgeri , Elgar Fleisch , Felix Wortmann Leveraging, Blockchain Technology to
Protect Sensor Data Mathieu. Privacy-Preserving Data Certification in the Internet of Things.
[4] Manoj Kumara ,Pradeep Kumar Mallickb.Blockchain technology for security issues and challenges in IoT Nallapaneni.
[5] Dr. D. Sivaganesan. A Data Driven Trust Mechanism Based on Blockchain in IoT Sensor Networks for Detection and
Mitigation of Attacks
[6] Alberto Rodrigues da Silva , Jan Verelst , Herwig Mannaert , David Almeida Ferreira1 , Philip Huysmans. Effects Towards a
System Requirements Specification Template that Minimizes Combinatorial.
[7] Sabah Suhail, Rasheed Hussain, Raja Jurda, Alma Oracevic, Khaled Salah, Raimundas Matulevičius, Choong Seon Hong,
Blockchain-based Digital Twins: Research Trends, Issues, and Future Challenges.
[8] Suhail, Rasheed Hussain, Raja Jurdak,andChoongSeonHong,TrustworthyDigital TwinsintheIndustrial InternetofThings
with Blockchain,
[9] Günther Pernul and Marietheres Dietz. 2020. Unleashing the Digital Twin's Potential for ICS Security.
[10] DimitrisaGeneiatakis, IoannisaKounelis,RicardoaNeisse,IgorNai-FovinoGaryaSteri,andGianmarcoaBaldini. Securityand
PrivacyaIssues for an IoT based Smart Home.
[11] NoriaaFoukia, DavidaBillard & Eduardo Solana. PISCES: A Framework for Privacy by Design in IoT.
[12] ArijitaUkil, SomaaBandyopadhyay, Joel Joseph, VijayanandaBanahatti & SachinaLodha. Negotiation-based
PrivacyaPreservation Scheme in Internet of Things Platform.
[13] Jong-HyoukaLee and MarcaPilkington. How the BlockchainaRevolution Will Reshape the Consumer ElectronicsIndustry.
[14] ChristianaCachin. Architecture of theaHyperledger Blockchain Fabric.
[15] Nigel Davies, Nina Taft, Mahadev Satyanarayanan, Sarah Clinch, Brandon Amos. Privacy Mediators: HelpingIoTCrossthe
Chasm.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 833
[16]Fangyuan Sui, Fangfeng Cheng, Qinglin Qi, Meng Zhang, He Zhang, and Fei Tao. Big data-drivendigital twin-drivenproduct
design, manufacturing, and service.
[17] Satoshi Nakamoto Bitcoin is a peer-to-peer electronic currency. Report on Technology. Manubot,2019. Journal of IoT in
Social, Mobile, Analytics, and Cloud, June 2022, Volume 4, Issue 2 105
[18] Ibrahim Yitmen, Christopher Santi Götz, and Patrik Karlsson. 2020. The applicability, interoperability,andintegrabilityof
Blockchain-based digital twins for asset life cycle management are being investigated.
[19] Jiewu Leng, Guolei Ruan, Pingyu Jiang, Kailin Xu, Qiang Liu, Xueliang Zhou, and Chao Liu. 2020. A survey of blockchain-
enabled sustainable manufacturing and product lifecycle management in Industry 4.0.
[20] Günther Pernul, Marietheres Dietz, and Benedikt Putz. 2019. A Distributed Ledger approach to Digital Twin data sharing
security.
[21] Chao Zhang, Guanghui Zhou, Han Li, and Yan Cao, Manufacturing Blockchain of Things for the Configurationof a Data-and
Knowledge Driven Digital Twin Manufacturing Cell, 2020.
[22] Günther Pernul, Benedikt Putz, Marietheres Dietz, Philip Empl, and Benedikt Putz. 2021.EtherTwinisa blockchain-based
information management system for secure digital twins
[23] Andrea Urbinati, Claudio Mandolla, Antonio Messeni Petruzzelli, Gianluca Percoco, and Claudio Mandolla. A case studyof
the aerospace industry in creating a digital twin for additive manufacturing using blockchain technology.
[24] Xiongbing Fang, Sihan Huang, Guoxin Wang, Yan Yan, and Sihan Huang. 2020.Forthedigital twinofa product,blockchain-
based data management is used.
[25] Haya R Hasan, Khaled Salah, Raja Jayaraman, Mohammed Omar, Ibrar Yaqoob, Saa Pesic, Todd Taylor, and Dragan
Boscovic are among the members of the squad. 2020. A Blockchain-Based Approach to Digital Twin Creation.
[26] F. Shahid, C. Maple, A. Ahmad, and G. Jeon. A. Khan, F. Shahid, C. Maple, A. Ahmad, and G. Jeon. Spiral Digital Twin
Framework and Twinchain for Smart Manufacturing Blockchain-based digital twins for the industrial internet of things
[27] Trond Kvamsdal, Adil Rasheed, and Omer San 2020. From a modelling standpoint, what are the benefits, constraints,and
facilitators of a digital twin? [28] Chapter Thirteen - Empowering digital twins with blockchain. Pethuru Raj.2021.Blockchain
Technology for Secure and Smart Applications in a Variety of Industries
[29] J. S. Rajashekar , P. P. Greeshma. Blockchain-based Digital Twins for the Industrial Internet of Things
[30] Moily, Ashwini, Guru Prasanna, Keerthi S. Shetty, and Sanjay Singh. "Model checking message exchangeinLocationBased
Services" , International Conference
[31] Shashank Kathar, Harsh Hardel,ZeeshanAlam,Shraddha Phansalkar,RajaniSajjan."AuctionSystemforAgricultural Trade
Using Blockchain Technology [32] J S Rajashekar, Greeshma P P .Blockchain for Industrial Internet of Things.
[33] Chao Wang, Wei Duan, Jianzhang Ma, Chenhui Wang. "The research of Android System architecture and application
programming", Proceedings of International Conference on Computer Science and Network Technology.
[34] "Information Systems Design and Intelligent Applications", Springer Science and Business Media LLC, 2018
[35] Alberto Rodrigues da Silva. "Linguistic Patterns and Linguistic Styles for Requirements Specification (I)" , Proceedings of
the 22nd European Conference on Pattern Languages of Programs - EuroPLoP '17, 2017.

More Related Content

Similar to Blockchain Technology using System Requirement Specification and IoT Devices

The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0Osama Shahumi
 
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET-  	  Secured Real Estate Transactions using Blockchain TechnologyIRJET-  	  Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain TechnologyIRJET Journal
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it DomainIRJET Journal
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSIRJET Journal
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
 
User Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentUser Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentIRJET Journal
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain ProxyIRJET Journal
 
Cloud Based Development for Medical Pharmacy and DCA Application
Cloud Based Development for Medical Pharmacy and DCA ApplicationCloud Based Development for Medical Pharmacy and DCA Application
Cloud Based Development for Medical Pharmacy and DCA ApplicationIRJET Journal
 
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionWeb Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionIRJET Journal
 
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...IRJET Journal
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...IRJET Journal
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET Journal
 
IRJET- Effect of ICT Application in Manufacturing Industry
IRJET- Effect of ICT Application in Manufacturing IndustryIRJET- Effect of ICT Application in Manufacturing Industry
IRJET- Effect of ICT Application in Manufacturing IndustryIRJET Journal
 
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...IRJET Journal
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 

Similar to Blockchain Technology using System Requirement Specification and IoT Devices (20)

The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET-  	  Secured Real Estate Transactions using Blockchain TechnologyIRJET-  	  Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
User Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentUser Authentication Technique for Office Environment
User Authentication Technique for Office Environment
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
 
Cloud Based Development for Medical Pharmacy and DCA Application
Cloud Based Development for Medical Pharmacy and DCA ApplicationCloud Based Development for Medical Pharmacy and DCA Application
Cloud Based Development for Medical Pharmacy and DCA Application
 
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionWeb Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
 
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
 
IRJET- Effect of ICT Application in Manufacturing Industry
IRJET- Effect of ICT Application in Manufacturing IndustryIRJET- Effect of ICT Application in Manufacturing Industry
IRJET- Effect of ICT Application in Manufacturing Industry
 
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence Approach
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 

Blockchain Technology using System Requirement Specification and IoT Devices

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 829 Blockchain Technology using System Requirement Specification and IoT Devices Greeshma PP1, J S Rajashekar2 Student1 , Professor2, Department of Electronics and Instrumentation Engineering Dayananda Sagar College of Engineering, Bangalore, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The Internet of Things (IoT) is a network connected objects like sensors; actuators, electronics and software that are future requirements of any industry and modern society. These embedded systemsaremadetoprovidestate-of-the-art facilitiesto exchange data over the internet. IoT technology can be efficiently used in various sectors like agriculture, healthcare, transportation, water and wastewater management, productmanufacturing, powergeneration&distributionetc. Blockchainhas emerged as a key technology is quickly rising to the top, especially considering its widespread use. The integration intoworkplace networks still faces some difficulties. IoT raises security and privacy issues because data authenticationandexchangearehandled solely through the central server. The main server model and blockchain technology isadded whileacomponentabout IoT tolabel such certainty and problems. Three primary characteristics, namely, extensibility, inactivity, and network longevity, impact security measures without them, internal attack mitigation would be difficult. Using block chain can upgrade net conservation, efficiency and certainty. Recovery after events is fairly simple because the block chain stores the entire history of modifications to device configuration. Key Words: Blockchain Technology, Internet of Things (IoT), Sensors, Embedded Systems, Data authentication 1. INTRODUCTION Data is gathered from multiple selector, sensors, and apparatus in a manufacturing setting the right to approach and command the data, is the data itself. It is being created by things that are allowing on the Internet, like Industrial IoT refers to such a circumstance (IIoT). The development of Industry 4.0 and the IIoT creates opportunities for connecting pre- programmed computer control schemes for remote observation and quick response to situations necessitating concurrent handling. Additionally, the use of sensors may result in a number of benefits over other industrial architectures. Blockchain, often known as a Distributedashared ledger, is a cryptographically protected, unchangeable store of information. Digital advantage can be traded and stored withoutthe requirementforoutsidesupervision. Devicesthatdownloadconfigurationfiles from a centralized server must have confidence in that authority; otherwise, the device is susceptible. A blockchaineliminates the need for a centralized authority. Peer-to-peer is the direct exchange of strength between devices. In Information technology, the term "Internet of Things" refers to the link between on-devices and the internet. The devices should be connected wirelessly, opening up new opportunities for system interactions as well as new possibilities for the management, succeeding, andinitiationofimprovedserviceability.IoTadeviceshaveperformanceandresourcelimitations by design when compared to network devices in enterprise contexts. When creating management andmonitoringsystemsfor IoT devices, this must be taken into account. IoT device heterogeneity employs multipleconfigurationsandoffersvariedlevels of monitoring for diverse reasons. Enterprise network settings similar device heterogeneitymakesitpossibletoadaptcurrent network monitoring and management tools forIoTimplementation.Asthebackbone ofcommunicationwithincommunitiesor businesses, undertaking networksandpopular entrancenetworksarea commonlyusedpresenting enablerglobally.Theentire enterprise sector is in constant need of stronger, more secure connection for all nodes. Networks are being developed systematically and are open to new ideas. The primary innovation need to be on the following crucial elements boosting network efficiency, boosting security, and decreasing using blockchain technology to save maintenance expenses. The term "System Requirements Specification"(SRS) or "Requirements Specification" is used in the requirements engineering community to refer to a contract that details various practical issues of a structure, generally a firmware system and also sometimes a system that combines software and hardware. Throughout various phases of the forecast life cycle, an SRS is used to help the major stakeholders share the system's vision, as well as to streamline communication and the general project administration and system evolution processes. A better SRS offers a number of advantages,including establishingthe foundation for accordance between the purchaser and the supplier providing a basis forapproximatebudgetandprogramme, offering a control for confirmation and affirmation and serving is a foundation for future preservation activities. A SRS may further be included in contracts or request for proposals documents related to a project. A SRS typically attach to a
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 830 predetermined arrangement that provides a specific document construction and additional useful suggestions.SRS templates must, by definition, be modified and tailored to the requirements of the company in question. This stage involves determining the project's feasibility and presenting a business scheme that includes a very simple project outline and some cost evaluate. During system analysis, the feasibility of the suggested system must be studied. This will secure that the offered resolve won't put a tension on the company. 1.1. SYSTEM REQUIREMENT SPECIFICATION ON BLOCKCHAIN A key document that establishes the framework for the process of product advancement is the System Requirement Specification (SRS). It includes a description of the structure's key feature in addition to its requirements. A SRS is simply an organization's assessment of a client's or potential client's operational needs and circumstances at a certain moment in time prior to any real outline or improvement work. It is a symbolic protection scheme that ensuresespeciallyatanyspecifiedtime, the association andathe customer are both aware of the requirements of exchange from that perspective. The inclusion of programming requirement information reduces effort required for advancement since careful review of the report can find oversights, false assumptions, and variability earlier in the improvement circle when they are secure to fix. Although the SRS may required to be modified, it does supply a substructure for moving forward with creation assessment. Simply said, determining the necessity of programming is the first step in every product improvement process. Decoding client thoughts and information into a formal archive is what the SRS refers to as the output of the prerequisite stage. Therefore, the stage's output is composed of formal requirements that are, ideally, complete and consistent, whereas the data lacks all of these characteristics. Functional requirements specify how a software structure should work and counter to specific inputs or conditions. Computations, data clearing, and other limited functionality may be amidst them. One of the most crucial elements in termsof the overall mechanism of modules is the project's functional requirements. Fig 1 shows the entry details in the SRS software, Service providers can register, adddeviceinformation,addprivacypolicies,andadddevicespecifications.Transferredfromthe sensor to the server, the information is saved in the blockchain, the user has access to the sensor information,andtheuser can make payments. The framework must provide crucial security in addition to bug prevention and must prevent the entire process from collapsing. Security became a major worry for an association when innovation began to advance at a rapid pace. Giving security requires a significant investment of financial resources. Bug tracking ensures that unauthorized users can't access crucial issue data without permission while delivering the highest level of security currently possible. Multipleverified clients receive different mystery passwords from the bug-following framework,resulting inlimitedfunctionalityfor all clients. Fig 1: IoT devices registration on Blockchain.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 831 The system will be used continuously by many factors. Performance becomes a significantconsiderationastheframework will be run on a unique web server and a single particular server that are both unseen. Although several customers are using the framework continuously, it shouldn't fail. All of its customers should be able to access it quickly. For instance, there shouldn't be any irregularity concurrently if two test specialists are simultaneously trying to notify the location of a bug. 1.2. IoT Blockchain Focusing on the subsequent challenges, such as confirmation, exposure, and empirical of IoT or wirelessasensors in the industrialaplatform, is necessary fully govern every smart device. We must make sure that the individuals tracking the product's manufacture or documentation are reputableandpossesstheappropriatecredentials.Eventhoughindustry4.0uses smart devices to handle all data and activities, there are still some security concerns that could compromise sensors and IoT devices, hence exponentially slowing down corporate growth. Therefore, it is necessarytoindexingeachsensorthatrecognize data into the blockchain grid in order to give clarity and track whereabouts of each employee and product. Additionally, it is necessary to regularly gather and verify data from each registered IoT device. So that once the information or IoT/sensorsare cast, nothing should be up to exchange, adjust, or path them. Blockchaintechnology,whichallowsforeasytrackingofall device activities including data collection, product documentation, manufacturing, and shipment, can, however, resolve these concerns. The compromised sensor or device may enter the system fast or easily. As a result, before offering services, all IoT devices will schedule in the blockchain grid. Prior to receiving assistance, IoT devices must scheduleontheBlockchaingrid.A contributionappeal mustfirstsenttothe grid, position will be checked by miner nodes. Additionally, minersuseinformation-accessingdevicestoverifythe authenticity or legality of each sensor. After successful confirmation or substantiation, miners will produce a split key that will aid in subsequent confirmation. Finally, utilising the shared key between squintjunctionand sensors,all sensorsawill assembletheir allocate blink sensors. Each Internet of Things (IoT) device or user is connected to nearby or subscribing peer devices. Each organization or user must register on the blockchain grid in order to enjoy the services offered by the industrysupplier. When a user requests a product from the industry, we have treated them as customers for the sake of our framework. Similar tothis, we count an industry provider as a provider any time it ships the customer's order. Every time a user orders the shipmentofa goods, they must register and construct their user profile on the blockchain. The user includes information about their identification, the product, payment details, etc. in that profile. The user can access or utilize the product once they have successfully registered. For product and service operations, security and privacy are crucial. 2. DISCUSSIONS AND RELATED WORKS We can manage and keep track of any IoT device that is integrated into our blockchain infrastructure. If it require new arrangements or situations, a trusted customer adds them to the blockchain, where they are optionallyordirectly accessedby the IoT device. Middleware fetches fresh data and alerts users when a successful or a failed attempt. This implies that IoT network management can be decentralized. All configurations are known provenances, distributed, and immutable. The following traits are achieved by making use of blockchain technology. The succeeding challenges,suchasconfirmation,clarity, and empirical of IoT/wireless sensors in the production platform, need to be the emphasis of every smart device. We must make sure that the individuals trackingtheproduct'smanufactureordocumentationarereputableandpossessthe appropriate credentials. Even though industry 4.0 uses smart devices to handle all data andactivities,therearestill somesecurityconcerns that could compromise sensors and IoT devices, hence exponentially slowing down corporate growth. The design that are communicated in the examine document and evolved in the outline phase are actually put into practice during the implementation phase. In order to provide the required final result, executionshouldbea flawlessplotoftheoutlinedocument in an appropriate programmingalanguage. Choosing the wrong programming language or using an inappropriateapproachof programming frequently results in the product being damaged. It is ideal for the coding stage to be straight related to the outline phase in the sensation if the outline is in terms of object oriented phrase then executionshouldbeideallyconveyedout in an object oriented approach. Additionally, it is necessary to regularly gather and verify data from each registered IoT device. So that once the information or IoT/sensors are cast, nothing should be able to exchange, remake, or trace them. Blockchaintechnology,which allows for easy tracking of all device activities including data collection,productdocumentation,manufacturing,andshipment, can, however, resolve these concerns. Additionally, we must explain the necessary smart agreement just as we writethecopy, rules, codes, and article between the organizations. Without any further interference, all sensor or IoT devices or junction can calculate their consensus outcomes. Using blockchainatechnology, each IoTadevice or user involved in the production or delivery of a product must first register or log in to the network in order to utilize or provide the services.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 832 3. CONCLUSION All sensor or IoT devices can compute their common results. Using blockchain technology, each IoT device or user involved in the production or delivery of a product must first register or log in to the network in order to utilize or providethe services. The IoTaapparatus orasensors are gatheredintheablockchaintotrack eachsensoractivity.Inordertoassuresecurity and transparency among users in various locations, the blockchain project is typically utilized to forced details from sensors and to additionally conserve and extract it into blockchain. With the help of a blockchain mechanism and several security indicators, the suggested framework significantlyincreasedthesecurityofwirelesssensors.Thesuggestedframework istested against the likelihood that an attack would succeed, the system's capacity to detectanassault,anda alterationattack.IoT could present a number of security and privacy concerns. These were found based on observations of the interactions between IoT components. Only the alternatives for resolving the problems and difficulties in IoT isablockchain technology. The work describethe possibility for blockchain combination with IoT. The numerous IoT and blockchain technologies requisition were also discussed. This technology can be used for a variety of engineering services. But it is important to thoroughly research the precise consequences of each technology. Blockchain offers more freedom in how you can access the data. REFERENCES [1] Geetanjali Rathee, M. Balasaraswathi2, K. Prabhu Chandran3, Sharmi Dev Gupta4 C. S. Boopathi5. A secure IoT sensors communication in industry 4.0 using blockchain technology [2] Kristián Koštál , Pavol Helebrandt, Matej Belluš , Michal Ries and Ivan Kotuliak. ManagementandMonitoringofIoTDevices Using Blockchain. [3] Chanson, Andreas Bogner , Dominik Bilgeri , Elgar Fleisch , Felix Wortmann Leveraging, Blockchain Technology to Protect Sensor Data Mathieu. Privacy-Preserving Data Certification in the Internet of Things. [4] Manoj Kumara ,Pradeep Kumar Mallickb.Blockchain technology for security issues and challenges in IoT Nallapaneni. [5] Dr. D. Sivaganesan. A Data Driven Trust Mechanism Based on Blockchain in IoT Sensor Networks for Detection and Mitigation of Attacks [6] Alberto Rodrigues da Silva , Jan Verelst , Herwig Mannaert , David Almeida Ferreira1 , Philip Huysmans. Effects Towards a System Requirements Specification Template that Minimizes Combinatorial. [7] Sabah Suhail, Rasheed Hussain, Raja Jurda, Alma Oracevic, Khaled Salah, Raimundas Matulevičius, Choong Seon Hong, Blockchain-based Digital Twins: Research Trends, Issues, and Future Challenges. [8] Suhail, Rasheed Hussain, Raja Jurdak,andChoongSeonHong,TrustworthyDigital TwinsintheIndustrial InternetofThings with Blockchain, [9] Günther Pernul and Marietheres Dietz. 2020. Unleashing the Digital Twin's Potential for ICS Security. [10] DimitrisaGeneiatakis, IoannisaKounelis,RicardoaNeisse,IgorNai-FovinoGaryaSteri,andGianmarcoaBaldini. Securityand PrivacyaIssues for an IoT based Smart Home. [11] NoriaaFoukia, DavidaBillard & Eduardo Solana. PISCES: A Framework for Privacy by Design in IoT. [12] ArijitaUkil, SomaaBandyopadhyay, Joel Joseph, VijayanandaBanahatti & SachinaLodha. Negotiation-based PrivacyaPreservation Scheme in Internet of Things Platform. [13] Jong-HyoukaLee and MarcaPilkington. How the BlockchainaRevolution Will Reshape the Consumer ElectronicsIndustry. [14] ChristianaCachin. Architecture of theaHyperledger Blockchain Fabric. [15] Nigel Davies, Nina Taft, Mahadev Satyanarayanan, Sarah Clinch, Brandon Amos. Privacy Mediators: HelpingIoTCrossthe Chasm.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 833 [16]Fangyuan Sui, Fangfeng Cheng, Qinglin Qi, Meng Zhang, He Zhang, and Fei Tao. Big data-drivendigital twin-drivenproduct design, manufacturing, and service. [17] Satoshi Nakamoto Bitcoin is a peer-to-peer electronic currency. Report on Technology. Manubot,2019. Journal of IoT in Social, Mobile, Analytics, and Cloud, June 2022, Volume 4, Issue 2 105 [18] Ibrahim Yitmen, Christopher Santi Götz, and Patrik Karlsson. 2020. The applicability, interoperability,andintegrabilityof Blockchain-based digital twins for asset life cycle management are being investigated. [19] Jiewu Leng, Guolei Ruan, Pingyu Jiang, Kailin Xu, Qiang Liu, Xueliang Zhou, and Chao Liu. 2020. A survey of blockchain- enabled sustainable manufacturing and product lifecycle management in Industry 4.0. [20] Günther Pernul, Marietheres Dietz, and Benedikt Putz. 2019. A Distributed Ledger approach to Digital Twin data sharing security. [21] Chao Zhang, Guanghui Zhou, Han Li, and Yan Cao, Manufacturing Blockchain of Things for the Configurationof a Data-and Knowledge Driven Digital Twin Manufacturing Cell, 2020. [22] Günther Pernul, Benedikt Putz, Marietheres Dietz, Philip Empl, and Benedikt Putz. 2021.EtherTwinisa blockchain-based information management system for secure digital twins [23] Andrea Urbinati, Claudio Mandolla, Antonio Messeni Petruzzelli, Gianluca Percoco, and Claudio Mandolla. A case studyof the aerospace industry in creating a digital twin for additive manufacturing using blockchain technology. [24] Xiongbing Fang, Sihan Huang, Guoxin Wang, Yan Yan, and Sihan Huang. 2020.Forthedigital twinofa product,blockchain- based data management is used. [25] Haya R Hasan, Khaled Salah, Raja Jayaraman, Mohammed Omar, Ibrar Yaqoob, Saa Pesic, Todd Taylor, and Dragan Boscovic are among the members of the squad. 2020. A Blockchain-Based Approach to Digital Twin Creation. [26] F. Shahid, C. Maple, A. Ahmad, and G. Jeon. A. Khan, F. Shahid, C. Maple, A. Ahmad, and G. Jeon. Spiral Digital Twin Framework and Twinchain for Smart Manufacturing Blockchain-based digital twins for the industrial internet of things [27] Trond Kvamsdal, Adil Rasheed, and Omer San 2020. From a modelling standpoint, what are the benefits, constraints,and facilitators of a digital twin? [28] Chapter Thirteen - Empowering digital twins with blockchain. Pethuru Raj.2021.Blockchain Technology for Secure and Smart Applications in a Variety of Industries [29] J. S. Rajashekar , P. P. Greeshma. Blockchain-based Digital Twins for the Industrial Internet of Things [30] Moily, Ashwini, Guru Prasanna, Keerthi S. Shetty, and Sanjay Singh. "Model checking message exchangeinLocationBased Services" , International Conference [31] Shashank Kathar, Harsh Hardel,ZeeshanAlam,Shraddha Phansalkar,RajaniSajjan."AuctionSystemforAgricultural Trade Using Blockchain Technology [32] J S Rajashekar, Greeshma P P .Blockchain for Industrial Internet of Things. [33] Chao Wang, Wei Duan, Jianzhang Ma, Chenhui Wang. "The research of Android System architecture and application programming", Proceedings of International Conference on Computer Science and Network Technology. [34] "Information Systems Design and Intelligent Applications", Springer Science and Business Media LLC, 2018 [35] Alberto Rodrigues da Silva. "Linguistic Patterns and Linguistic Styles for Requirements Specification (I)" , Proceedings of the 22nd European Conference on Pattern Languages of Programs - EuroPLoP '17, 2017.