Implementation of Block Chain Technology and Internet of Things: An Introduction

Author(s):  
Mohammed Rahmat Ali

Internet of things or internet of everywhere is considered as the modern weapon used to control monitor or access anything anywhere at any time. Internets of things works on the principle of receive, analyse, monitor and respond to and from things connected to it. Anything which is connected to the internet that can receive and send information is considered as Internet of things (IoT). Internet keeps a record of Information which is received from different sources and amount of information being transferred to the network. IoT works follows the distributed computing concept in which information is been shared and stored at different places for a backup. Block chain technology is the concept of collection and storing of information called blocks and are hierarchal structure which generates a hash code of its type to secure the transaction and also to store the information in a secure way. Block chain follows the mechanism of linking the document one to second and list to other records to create chain of network called block chain. The use of block chain technology in Internet of Things generates a new form of model which comprises of connection of networks which monitors the networks chain of transaction so that the security and authenticity of the network can be maintained. The network cannot be manipulated and data cannot be changed. If the data is changed or is been manipulated or the sequence of data is changed it reflects the whole network resulting in mismatch of the data and data can easily been identified of change. Block chain works with the principle of hash code, every transaction that happened will generate a hash code and based on the previous transactions code the nest transaction takes place. This creates a chain in custody of transaction in block chain. So it helps in making a track of information and transaction in internet of things, as the data is shared and is distributes the data can be stored in the form of block chain and no venerability can happen to the data in terms of breaching.


2014 ◽  
Vol 7 (2) ◽  
Author(s):  
Theo Kanter ◽  
Rahim Rahmani ◽  
Jamie Walters ◽  
Willmar Sauter

This article investigates new forms for creating and enabling massive and scalable participatory immersive experiences in live cultural events, characterized by processes, involving pervasive objects, places and people. The multi-disciplinary research outlines a new paradigm for collaborative creation and participation towards technological and social innovation, tapping into crowd-sensing. The approach promotes user-driven content-creation and offsets economic models thereby rewarding creators and performers. In response to these challenges, we propose a framework for bringing about massive and real-time presence and awareness on the Internet through an Internet-of-Things infrastructure to connect artifacts, performers, participants and places. Equally importantly, we enable the in-situ creation of collaborative experiences building on relevant existing and stored content, based on decisions leveraging multi-criteria clustering and proximity of pervasive information, objects, people and places. Finally, we investigate some new ways for immersive experiences via distributed computing but pointing forward to the necessity to do more with regard to collaborative creation.



Author(s):  
Dr. Wang Haoxiang

The Internet of things is the basic paradigm with the cluster of techniques that ensure innovations in the service rendered in various applications. It aims to develop a seamless connection between the tangible objects around and the information network in turn to provide a well-structured servicing to its users. Though the IOT service seems to be promising, the risks still prevail in the form of privacy and the security in user acceptance in utilizing the internet of things services, and its application. This makes the trust management very important for the internet of things. So the paper puts forth the distributed block chain involved trust system to manage the conveyance infrastructures of the internet of things paradigm. The evaluation of the proposed model evinces the enhanced security provided for the nodes of the IOT as well as its information exchange.



Author(s):  
Yuji Huang ◽  
Aravindhan K

The present cyber-physical schemes and the Internet of Things (IoT) schemes comprise of both complex and simple interactions defining the different sources of the IoT systems such as cloud information and the edge internet service centres. All the modeling frameworks have been established on the virtualization dimensions that include both the cloud and the edge structures. Apart from that, the systems deal with big data based on the connections of various forms of services and networks. In that case, various forms of data uncertainties are evident. These uncertainties include elasticity and actuation uncertainties. As a result, this leads to a number of challenges that affect the process of testing these uncertainties in the big data systems. Nonetheless, there is a research gap present to effectively model and design the precise infrastructure frameworks that handle the necessities for evaluating these emergent big data uncertainties. With that regard, this scholastic paper focusses on the techniques used to generate and determine the deployment configurations used in the process of evaluating both the cloud and IoT systems. In this research, the survey will consider the actual-world application for analysing and monitoring the transceiver frameworks.



Author(s):  
Andino Maseleno ◽  
Marini Othman ◽  
P. Deepalakshmi ◽  
K. Shankar ◽  
M. Ilayaraja


2021 ◽  
Vol 10 (5) ◽  
pp. 25327-2535
Author(s):  
Dr. K.Nagarathna rajur

It is a modern type of technology that empowers virtual and physical artefacts to interact and provide digitized services for each other, and includes the Internet of Things (IoT). But it has some benefits, but raises problems of single point of failure, anonymity, accountability, and data integrity due to the new structured design. Challenges like these stands in the path of the introduction of all the most interesting Internet of Things technologies. Bringing the Internet of Things through the public ledger might fix these issues. Decentralized ledger systems are comprised of blockchain as well as distributed ledgers. The introduction of the Internet of Things (IoT) to the blockchain will offer tremendous advantages. Blockchain integration in this paper offers a detailed exploration of how to combine the IoT technology with the IoT scheme. It is followed by reviewing the basic framework and addressing the problems inherent in the system's integration, explaining the advantages of it, and describing ways in which the blockchain can help to overcome such problems. Blockchain as a Service for IoT can illustrate how different protocol concepts can be applied using different service types on blockchain. After this, there would be an important section about the integration of artificial intelligence (AI) into the Internet of Things (IoT) and blockchain. Finally, potential study avenues will focus on ways of applying the Internet of Things (IoT) with blockchain are suggested. The open issues and challenges of 5G-enabled IoT for blockchain-based Industrial automation are also analyzed in the text.



2021 ◽  
Vol 22 (2) ◽  
Author(s):  
Yunyan Chang ◽  
Jian Xu ◽  
Kayhan Zrar Ghafoor

In all the smart applications, evolution of the Internet of Things (IOT) is utilized as a complete matured technology and in the future internet generations, established itself. Blockchain is also the blooming technique like Internet of things in which the distributed ledger which enhances the security contained in the each node of the block-chain. In the block-chain network, any fault transaction is not done by the illegal users. The block-chain is combined with the Internet of Things for the improvement of real time application performance. IOT based smart water management system is designed in this paper for the agriculture which ensures the effectiveness of the agriculture water management. The remote monitoring with the IOT is used for this purpose. By linking with 2D modelling, the control and management of the agriculture water were performed. Finally, a system is implemented for the agriculture water management through the real time data collection. The obtained result shows the data that updates the water monitoring interface with the varying number of hours. The IoT technology and remote monitoring technology is utilized to the existing water management infrastructure. For water resources management and water supply, this is the very efficient technology.



2019 ◽  
Vol 8 (2S11) ◽  
pp. 1083-1086

In recent years everything is connected and passing through the internet, but Internet of Things (IOT), which will change all aspects of our lives and future. While the things are connected to the internet, they will generate the huge amount of information which has to be processed. The information that gathered from various IoT devices has to be recognized and organized according to the environments of their type. To recognize and organize the data gathered from different things, the important task to be played is making things passing through different Data Mining Techniques (DMT). In this article, we mainly focus on analysis of various Data Mining Techniques over the data that has been generated by the IOT Devices which are connected over the internet using DBSCAN Technique. And also performed review over different Data Mining Techniques for Data Analysis



Symmetry ◽  
2018 ◽  
Vol 10 (11) ◽  
pp. 537 ◽  
Author(s):  
Wayne Chiu ◽  
Chunhua Su ◽  
Chuan-Yen Fan ◽  
Chien-Ming Chen ◽  
Kuo-Hui Yeh

The Internet-of-Things (IoT) is an emerging paradigm seamlessly integrating a great number of smart objects ubiquitously connected to the Internet. With the rise in interest in the IoT, industry and academia have introduced a variety of authentication technologies to deal with security challenges. Authentication in IoT involves not only shifting intelligent access control down to the end smart objects, but also user identification and verification. In this paper, we build an authentication system based on brainwave reactions to a chain of events. Brainwaves, as external signals of a functioning brain, provide a glimpse into how we think and react. However, seen another way, we could reasonably expect that a given action or event could be linked back to its corresponding brainwave reaction. Recently, commercial products in the form of wearable brainwave headsets have appeared on the market, opening up the possibility of exploiting brainwaves for various purposes and making this more feasible. In the proposed system, we use a commercially available brainwave headset to collect brainwave data from participants for use in the proposed authentication system. After the brainwave data collection process, we apply a machine learning-based approach to extract features from brainwaves to serve as authentication tokens in the system and support the authentication system itself.



Sign in / Sign up

Export Citation Format

Share Document