scholarly journals Applicability of Blockchain Technology in Communication of Data using Raspberry Pi as Server

The main things we used to build the project in this paper are one raspberry pi as server, two Arduino’s as two nodes which are configured to connect to Wi-Fi using ESP8266 (node mcu). We will connect temperature and humidity sensor to one Arduino and RFID Reader module to another Ardunio Board to demonstrate the entire process. The working follows as the data is taken from DTH sensor and RFID Reader module which is sent to Raspberry Pi. Arduino’s acts as nodes from which data transmission starts. The Raspberry Pi acts as gateway between two Arduino’s and it is the server. All the components are connected to the Wi-Fi. The data from the sensors is taken and will be sent to server in hash, hash includes all the previous data and we already know that block chain is a decentralized network. We cannot manipulate the values of data at any point because of their data contains both previous and local hash. This is why usage of block chain provides more security to IOT devices. Henceforth, we implemented this exceptional way of blockchain technology for communication of data for safety and immense security

IoT (Internet of Things) made headway from Machine to Machine communication without human intrusion for number of machines to connect with the aid of network. There is esteem; by 2020 there will be 26 times more connected things than people. Hence, the concern of security rises along with the high installments. The BlockChain Technology takes place of all central entities, which is peer to peer communication with the distributed network. In this paper, two Arduino boards as nodes and a Raspberry Pi as server are to be configured to connect to the Wi-Fi using ESP8266(node mc). To make data transmission from the two nodes to server, integration of temperature and humidity sensor in one node and RFID (Radio Frequency Identification) reader in other node is to be done. Data should be in the form of blocks and integration of data is in the form of a chain, forming it a Blockchain. All the blocks are linked in the chain manner of which the current hash of the previous block must match with the previous hash of the next block. Then only the blocks of data are secured. While receiving data every time from nodes to server, the previous hash is to be checked such that the arrival of the information is being verified to know if it’s really genuine. If the cryptographic hash does not match then data manipulation is happened. So, in this paper, we will see, along with how practically the security is highly offered by the blockchain technology and how can we easily identify if the data has been tampered along the way it reaches to us. Henceforth, we will found a way of application to secure our IoT data without any regrets in this paper.


2020 ◽  
Vol 2020 ◽  
pp. 1-14
Author(s):  
Rizwan Majeed ◽  
Nurul Azma Abdullah ◽  
Imran Ashraf ◽  
Yousaf Bin Zikria ◽  
Muhammad Faheem Mushtaq ◽  
...  

The idea of a smart home is getting attention for the last few years. The key challenges in a smart home are intelligent decision making, secure identification, and authentication of the IoT devices, continuous connectivity, data security, and privacy issues. The existing systems are targeting one or two of these issues whereas a smart home automation system that is not only secure but also has intelligent decision making and analytical abilities is the need of time. In this paper, we present a novel idea of a smart home that uses a machine learning algorithm (Support Vector Machine) for intelligent decision making and also uses blockchain technology to ensure identification and authentication of the IoT devices. Emerging blockchain technology plays a vital role by providing a reliable, secure, and decentralized mechanism for identification and authentication of the IoT devices used in the proposed home automation system. Moreover, the SVM classifier is applied to classify the status of devices used in the proposed smart home automation system into one of the two categories, i.e., “ON” and “OFF.” This system is based on Raspberry Pi, 5 V relay circuit, and some sensors. A mobile application is developed using the Android platform. Raspberry Pi acting as the server maintains the database of each appliance. The HTTP web interface and apache server are used for communication among the Android app and Raspberry Pi. The proposed idea is tested in the lab and real life to validate its effectiveness and usefulness. It is also ensured that the hardware and technology used in the proposed idea are cheap, easily available, and replicable. The experimental results highlight its significance and validate the proof of the concept.


2013 ◽  
Vol 329 ◽  
pp. 378-381 ◽  
Author(s):  
Xue Yan Zang

In this paper, the design of remote multi-point temperature and humidity control system consists of two parts of the master and slave, Responsible for the display and control of the host system. Responsible for the collection of temperature data and humidity data from the local system, Between the master and slave data transmission RS-485 communication interface chip, can be realized in a remote control room to monitor the scene of multiple monitoring points.


The majority organizations associate blockchain technology with the financial services manufacturing, it has concealed use within the manufacturing, government, healthcare, and education sectors as well. The Block chain is an unlock and dispersed ledger. The Blockchain contract between two or more parties is confirmable and everlasting documentation. The Proposed System is smart market system, in this system Producers can sell the product directly in the market under the municipal counsil supervision or through online using block chain technology in cloud environment. The planned work is to intend a decentralized cloud server. We are powerful authentication where the information regarding all the products is encrypted. Those who have registered in the system come to know the product details about selling and purchasing. A highly developed method in cryptography can be used to address the issue of confidentiality, and some system could even monitor how much contact persons have. The blockchain technology is united with cloud computing to offer the enlarged transparency and efficient market system. The proposed research work can apply merkle tree in the designed algorithm on smart contracts performance optimization and automatic repair. We acquire benefits of the scattered confirmation security of the Blockchain technology for financial transaction verification and influence smart contracts for protected service organization. In this system bitcoin, cryptocurrencies or any other money transfer mechanism is used for transaction. Without a third party dealings may get more profit for both sides. Different types of on-site circumstances are collected and checked by installing sensors that are IoT devices in different services, and on-site calculating devices are restricted slightly if required.


2021 ◽  
Vol 11 (9) ◽  
pp. 4011
Author(s):  
Dan Wang ◽  
Jindong Zhao ◽  
Chunxiao Mu

In the field of modern bidding, electronic bidding leads a new trend of development, convenience and efficiency and other significant advantages effectively promote the reform and innovation of China’s bidding field. Nowadays, most systems require a strong and trusted third party to guarantee the integrity and security of the system. However, with the development of blockchain technology and the rise of privacy protection, researchers has begun to emphasize the core concept of decentralization. This paper introduces a decentralized electronic bidding system based on blockchain and smart contract. The system uses blockchain to replace the traditional database and uses chaincode to process business logic. In data interaction, encryption techniques such as zero-knowledge proof based on graph isomorphism are used to improve privacy protection, which improves the anonymity of participants, the privacy of data transmission, and the traceability and verifiable of data. Compared with other electronic bidding systems, this system is more secure and efficient, and has the nature of anonymous operation, which fully protects the privacy information in the bidding process.


Author(s):  
Naresh Sammeta ◽  
Latha Parthiban

Recent healthcare systems are defined as highly complex and expensive. But it can be decreased with enhanced electronic health records (EHR) management, using blockchain technology. The healthcare sector in today’s world needs to address two major issues, namely data ownership and data security. Therefore, blockchain technology is employed to access and distribute the EHRs. With this motivation, this paper presents novel data ownership and secure medical data transmission model using optimal multiple key-based homomorphic encryption (MHE) with Hyperledger blockchain (OMHE-HBC). The presented OMHE-HBC model enables the patients to access their own data, provide permission to hospital authorities, revoke permission from hospital authorities, and permit emergency contacts. The proposed model involves the MHE technique to securely transmit the data to the cloud and prevent unauthorized access to it. Besides, the optimal key generation process in the MHE technique takes place using a hosted cuckoo optimization (HCO) algorithm. In addition, the proposed model enables sharing of EHRs by the use of multi-channel HBC, which makes use of one blockchain to save patient visits and another one for the medical institutions in recoding links that point to EHRs stored in external systems. A complete set of experiments were carried out in order to validate the performance of the suggested model, and the results were analyzed under many aspects. A comprehensive comparison of results analysis reveals that the suggested model outperforms the other techniques.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Yang Xu ◽  
Guojun Wang ◽  
Jidian Yang ◽  
Ju Ren ◽  
Yaoxue Zhang ◽  
...  

The emerging network computing technologies have significantly extended the abilities of the resource-constrained IoT devices through the network-based service sharing techniques. However, such a flexible and scalable service provisioning paradigm brings increased security risks to terminals due to the untrustworthy exogenous service codes loading from the open network. Many existing security approaches are unsuitable for IoT environments due to the high difficulty of maintenance or the dependencies upon extra resources like specific hardware. Fortunately, the rise of blockchain technology has facilitated the development of service sharing methods and, at the same time, it appears a viable solution to numerous security problems. In this paper, we propose a novel blockchain-based secure service provisioning mechanism for protecting lightweight clients from insecure services in network computing scenarios. We introduce the blockchain to maintain all the validity states of the off-chain services and edge service providers for the IoT terminals to help them get rid of untrusted or discarded services through provider identification and service verification. In addition, we take advantage of smart contracts which can be triggered by the lightweight clients to help them check the validities of service providers and service codes according to the on-chain transactions, thereby reducing the direct overhead on the IoT devices. Moreover, the adoptions of the consortium blockchain and the proof of authority consensus mechanism also help to achieve a high throughput. The theoretical security analysis and evaluation results show that our approach helps the lightweight clients get rid of untrusted edge service providers and insecure services effectively with acceptable latency and affordable costs.


2020 ◽  
Vol 21 (1) ◽  
pp. 6-12
Author(s):  
Javier Pinzón Castellanos ◽  
Miguel Antonio Cadena Carter

Fog Computing is the distributed computing layer that lies between the user and the cloud. A successful fog architecture reduces delay or latency and increases efficiency. This paper describes the development and implementation of a distributed computing architecture applied to an automation environment that uses Fog Computing as an intermediary with the cloud computing layer. This study used a Raspberry Pi V3 board connected to end control elements such as servomotors and relays, indicators and thermal sensors. All is controlled by an automation framework that receives orders from Siri and executes them through predetermined instructions. The cloud connection benefits from a reduced amount of data transmission, because it only receives relevant information for analysis.


Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


Sign in / Sign up

Export Citation Format

Share Document