0% found this document useful (0 votes)
40 views

Next-Generation Defense Security: Blockchain, IoT, Digital Twin, and Face Recognition-Based Smart Monitoring System

Protecting sensitive data, personnel, and assets in the defence sector against unauthorised access and security breaches requires authentication. Strong authentication protocols are needed to preserve the security and integrity of military networks, systems, and facilities as defence operations become more digitalised. The development of safe and efficient monitoring systems is necessary due to the quick advancements in technology and the increasing complexity of defence operations.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

Next-Generation Defense Security: Blockchain, IoT, Digital Twin, and Face Recognition-Based Smart Monitoring System

Protecting sensitive data, personnel, and assets in the defence sector against unauthorised access and security breaches requires authentication. Strong authentication protocols are needed to preserve the security and integrity of military networks, systems, and facilities as defence operations become more digitalised. The development of safe and efficient monitoring systems is necessary due to the quick advancements in technology and the increasing complexity of defence operations.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14621435

Next-Generation Defense Security: Blockchain,


IoT, Digital Twin, and Face Recognition-Based
Smart Monitoring System
Priya.M1; Viji.K2
Assistant Professor 1; Student2
Department of Computer Science and Engineering, Tagore
Institute of Engineering and Technology ,
Deviyakuruchi, Salem, Tamil Nadu, India

Abstract:- Protecting sensitive data, personnel, and blockchain database. Since network consensus is required to
assets in the defence sector against unauthorised access remove or alter the chain, the data is chronologically
and security breaches requires authentication. Strong consistent. Blockchains function as a public distributed
authentication protocols are needed to preserve the ledger and are frequently managed using peer-to-peer (P2P)
security and integrity of military networks, systems, and computer networks. Nodes create and validate new
facilities as defence operations become more digitalised. transaction blocks using a consensus method protocol.
The development of safe and efficient monitoring Blockchains may be said to as secure by design, illustrating
systems is necessary due to the quick advancements in a distributed computing system with great Byzantine fault
technology and the increasing complexity of defence tolerance, even though blockchain records are not
operations. This article addresses the unique security unchangeable due to the possibility of blockchain forks.
issues faced by the military industry by combining Conventional database solutions have a number of
blockchain technology, AI-powered facial recognition challenges when it comes to recording financial
technology, and Internet of Things-based digital twin transactions. Think about the sale of a home. The buyer
technology. The proposed system builds a robust receives possession of the property after the money is
platform for monitoring people, assets, and critical transferred. Both the seller and the buyer can independently
infrastructure by utilising blockchain's inherent record financial transactions, but neither source is
advantages, including decentralisation, immutability, trustworthy. The customer can assert that they have paid the
and enhanced security. By employing facial recognition money when they haven't, and the vendor can simply state
technology to instantly identify and validate people, the that they haven't received it when they have. Transactions
system automates access control and grants only must be monitored and verified by a reliable third party to
authorised individuals access to vital resources or avoid any legal issues. This central authority creates a single
restricted areas. To prevent manipulation and safeguard point of risk and complicates the process. Both parties can
data privacy, licensed workers' biometric information is suffer if the central database is compromised. By creating a
safely stored on the blockchain. The decentralised ledger decentralised, impenetrable system for transaction
records each access attempt, permitted or not, recording, blockchain overcomes these challenges.
establishing an unchangeable audit trail for compliance Blockchain creates a single ledger for each buyer and seller
and accountability. Blockchain-integrated smart in a real estate transaction. Every transaction is
contracts enable automated responses to security automatically entered in both ledgers in real time and
incidents, like alerting authorities, setting off alarms, or requires both parties' approval. The ledger as a whole will
securing areas when unauthorised individuals are be impacted by any corruption in previous transactions.
detected. The distributed form of the framework Because of these characteristics, blockchain technology has
eliminates single points of failure, boosting defences been used in many other fields, including the creation of
against upcoming cyberattacks and guaranteeing virtual currencies like Bitcoin. The scope of the study
business continuity. includes developing and implementing a state-of-the-art
security framework designed to satisfy the complex
Keywords:- Authentication, Block Chain, Digital Twin requirements of contemporary defence systems. By
Technology, Face Recognition, Monitoring Systems, Smart removing the limitations of outdated methods like ID cards
Contracts, Security Branches, Unauthorised Access. and passwords, it focusses on implementing robust access
control through the use of contemporary facial recognition
I. INTRODUCTION technology, guaranteeing quick and safe identity
verification. Additionally, the paper includes IoT-enabled
A sophisticated database approach called blockchain sensors and devices for real-time surveillance, which offer
technology makes it possible for transparent information to constant monitoring of critical areas to promptly detect
be shared across a corporate network. Data is stored in unauthorised entrance or potential threats. Blockchain
blocks that are linked together in a chain within a technology ensures transparency, immutability, and security

IJISRT25JAN140 www.ijisrt.com 153


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14621435
against cyber attacks while protecting data transactions and monitoring, which enables prompt identification of
records. Additionally, real-time system simulations and anomalies, potential hazards, and unauthorised activity.
predictive maintenance are made possible by the use of Blockchain technology protects data flows by offering
digital twin technology, which promotes proactive decision- immutability, transparency, and defence against online
making and system optimisation. The document should be threats. Additionally, real-time simulations and predictive
scalable, flexible enough to accommodate future maintenance are made possible by digital twin technology,
advancements, and able to meet evolving military security which offers crucial information for proactive decision-
requirements. By using cutting-edge facial recognition making. By offering a scalable, reliable, and extremely
technology for robust access control, the system aims to efficient solution to growing defence concerns, these
increase security by making sure that only approved technologies seek to completely transform defensive
individuals may enter vital areas. The article makes use of security systems. Figure 1 depicts the fundamental block
IoT-enabled devices to provide real-time data collection and chain architecture.

Fig 1 Block Chain Framework

II. RELATED WORK Jonathan ernestsirait, et.al,…[2] Because of


characteristics that make daily chores easier, communication
P. Pătraşcu, et.al,…[1] Crucial services are among the and information technology are becoming more and more
many industries where emerging technologies are becoming popular every year. Organisations across a wide range of
a prominent topic. Thus, the use of such technologies in disciplines and industries have used information and
sensitive areas of national security presents a serious communication technology in a variety of ways to increase
challenge, which is reinforced by the characteristics that productivity and profitability. Digital manufacturing is
distinguish emerging technologies, namely the imprecision defined as the intensive use of a digital model to digitise the
of assessing technical maturity over time. Despite some supply, production, and delivery activities of networked
uncertainty, emerging technologies need to be carefully organisations. The military industry, which is controlled by
considered from a national security perspective as both manufacturing companies, is being disrupted by the
potential threats and real opportunities. In this article, I will existence of information and communication technologies in
assess the Internet of Things (IoT) as a new technology and the 4.0 industrial era. Without a doubt, the demands of
its impact on national security from the viewpoints of the modern industrial enterprise differ greatly from those of the
military sector and the defence of vital infrastructure. The early Industrial Revolution. Resource conservation and
advantages of contemporary technology are becoming more process sustainability are given equal weight with quantity
and more important to today's society. As a result, changing and quality in modern manufacturing. To stay competitive
technologies have a big influence on people's lives as well and prevent being overtaken by international rivals, the
as the functioning and security of the infrastructures that manufacturing sector must also adopt digitalisation, such as
make it possible to deliver essential services and goods. smart manufacturing or cloud computing, in the face of a
Because of this, even in the most delicate areas of operation, global economy influenced by political pressure, shifting
it is now necessary to take use of emerging technology, environmental conditions, technological breakthroughs, and
which has significant implications for maintaining national fierce business rivalry. In addition to reducing unnecessary
security. expenses and increasing operational profitability,
digitalisation enables real-time monitoring and enhancement
of product production, marketing, and after-sales activities.

IJISRT25JAN140 www.ijisrt.com 154


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14621435
Pradip kumarsharma, et.al,…[3] The use of connected be enhanced by integrating IoT sensors, data analytics, data
smart devices has increased in military organisations in storage and integration, and machine learning with CPSsThe
recent years. The full realisation of ubiquitous sensing, system collects data from various sensors embedded in
networking, and computation is known as the Internet of different equipment, continuously feeding it into system
Battlefield Things (IoBT). Connectivity and cooperative analytics. Machine learning (ML) algorithms process this
decision-making over battlefield resources and combat gear data to improve and optimize the system’s performance over
are two of IoBT's unique characteristics. Conversely, edge time. Advanced Persistent Threat (APT) attacks aim to
computing gets beyond the drawbacks of conventional exploit Cyber-Physical Systems (CPSs) integrated with the
centrally planned network designs. Data collection and Industrial Internet of Things (I-IoT) through rapid attack
processing take place at or close to the application's source techniques. ML algorithms have shown promise in detecting
or device when computing and storage resources are APT attacks within autonomous systems and malware
positioned at the network's edge. By connecting wearable detection environments. However, detecting stealthy APT
computing devices on the battlefield, edge computing attacks within I-IoT-enabled CPSs and achieving real-time
enables military organisations to increase personnel safety detection accuracy remain significant challenges. To
and decision-making accuracy. The purpose of wearable overcome these issues, a novel solution is proposed that
computing in the military automation system is examined in utilizes the Graph Attention Network (GAN), a
this study. We offer a taxonomy of wearable computing in multidimensional algorithm capable of capturing behavioral
military automation systems and describe how each patterns and relevant information that earlier methods
component relates to the others. We also describe the issues overlooked. This approach uses masked self-attention layers
and challenges in cyber security and communication that to address the limitations of traditional Deep Learning (DL)
come up when using the 5G network for defence methods that primarily depend on convolutions.
automation. Additionally, in the context of 5G, we propose
the design of the wearable wristwatch architecture as an Munish bhatia, et.al,…[6] Advancements in
example of healthcare transformation in defence automation. information and communication technology (ICT) have led
to the adoption of innovative technologies across various
Munish bhatia, et.al,…[4] Industry 4.0 is a result of the industries, such as healthcare, transportation, agriculture,
Internet of Things (IoT) being a major force behind and logistics. The Internet of Things (IoT) plays a central
innovation in smart environments including healthcare, role in these developments, driving automation and
logistics, and agriculture. The world's technical decentralized intelligence as essential tools for the future of
advancement is being directed towards more sophisticated industries. With the increasing ability to integrate ambient
research and discoveries thanks to the advancements intelligence, IoT devices are connecting the physical and
brought about by this paradigm shift. By evaluating data at cyber worlds to automate data analysis and facilitate
the network edge, fog computing, an extension of the cloud intelligent decision-making. Rooted in IoT, concepts like
computing platform, promises to allow IoT technology to Smart Cities, Cyber-Physical Systems (CPS), and Industry
generate original solutions for challenging time-sensitive 4.0 have emerged, contributing to global development. In
scenarios. The combination of cloud computing, fog, and addition, fog computing, as an extension of IoT, has arisen
IoT has demonstrated a number of service delivery to address the growing demand for real-time service
applications in the food industry. The growing focus on food delivery. The healthcare sector is one of the leading fields
technology has led to the development of cutting-edge, transformed by IoT, particularly in the development of smart
futuristic technologies for offering profitable food-related medical applications. This work proposes an efficient home-
services. Information and communication technology (ICT) based urine-based diabetes (UbD) monitoring system. The
has been transformed in a number of industries, including system is designed with four layers to predict and monitor
logistics, healthcare, and agriculture, by the Internet of diabetes-related urinary infections. These layers include the
Things (IoT) and the fog-cloud paradigm. This study Diabetic Data Acquisition (DDA) layer, Diabetic Data
proposes a novel idea for smart restaurants to use game Classification (DDC) layer, Diabetic Mining and Extraction
theory to assess food quality, motivated by the enormous (DME) layer, and Diabetic Prediction and Decision Making
advantages of IoT technology. In particular, this study (DPDM) layer. This structure enables individuals to
suggests a clever approach of evaluating restaurant meal regularly track their diabetes measures and perform
quality. Real-time data is gathered by a variety of IoT predictive analysis, allowing for early intervention and
devices in order to evaluate the quality of food. The cloud proactive management of their condition.
platform facilitates the transmission of the data to the fog
nodes. Munish bhatia, et.al,…[7] Fog computing serves as an
innovative framework for deploying wireless applications at
Safdar hussainjaved, et.al,…[5] Cyber-Physical the user level. By enhancing wireless technology with fog
Systems (CPSs), which are software components that computing, it has made possible several applications that
function similarly to hardware to automate industrial were previously limited by technological constraints.
processes, collect real-time data, and interface with devices However, a key challenge remains in efficiently scheduling
and sensors via Human-Computer Interfaces (HCI), are tasks across geographically dispersed fog computing nodes.
made possible by the Industrial Internet of Things (I-IoT). As wireless data continues to grow rapidly, distributing this
This multifaceted technology aims to boost consistency, find data across various fog computing nodes is crucial for
opportunities for growth, and unlock untapped potential. providing effective decision-making services. Managing the
Interoperability and coordination across various systems can scheduling of diverse data and tasks across geographically

IJISRT25JAN140 www.ijisrt.com 155


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14621435
distributed fog devices remains an ongoing challenge in Nobuyuki fukawa, et.al,…[10] This catalyst
achieving high levels of efficiency and performance. The investigates the academic and managerial ramifications of
Internet of Things (IoT) environments, consisting of the digital twin in terms of innovation management. This
millions of wireless devices, generate numerous tasks, each intriguing new technology has the potential to transform
with its own specific resource needs. Traditional task both upstream and downstream innovation activities by
allocation methods are inadequate for addressing time- combining the physical and digital (Maddikunta et al.,
sensitive resource demands. Scheduling at the fog 2021). Furthermore, the digital twin connects with other
computing level has recently become a significant area of Industry 4.0 technologies, such as 3D printing, big data, and
research. In the current IoT era, the rapid generation of large artificial intelligence. Thus, the processes and products
volumes of cyber data, combined with a limited number of created by a digital twin are relevant to researchers and
computing devices, has made efficient load balancing more practitioners interested in these neighbouring technologies.
complex than ever before. To achieve optimal scheduling, At the moment, digital twin technology is still at an early
new techniques must be developed to deploy efficient, time- stage of development and somewhat disconnected from a
sensitive wireless applications.. firm's overall innovation strategy. Our inquiry is forward-
looking in character, serving as a catalyst for future
Luning li, et.al,…[8] Heterogeneous IoT environments innovation management research and practices. First, we
consist of millions of wireless devices, each creating tasks look at the relationship between the digital twin and three
with unique resource needs. Traditional task allocation associated technologies (3D printing, big data, and AI).
methods struggle to meet the time-sensitive demands of Second, we develop a typology of four distinct digital twin
these tasks. Recently, scheduling tasks at the fog computing types (monitoring, creating, enhancing, and replicating) and
level has gained attention as an important research area. demonstrate their importance for innovation management.
With the massive growth of cyber data and a limited number Third, we provide a series of case studies that demonstrate
of computing devices in today’s IoT world, efficiently this typology and how the digital twin has been used in
allocating resources has become more difficult. To achieve practice. Fourth, we create a set of future research paths in
optimal scheduling, improved methods are needed for this area that includes a broad variety of innovation-related
deploying time-sensitive wireless applications.For instance, subjects, such as service innovation, co-creation, and
when associating a digital twin with an intelligent model, product design.
neglecting essential components like data collection and
visualization can result in creating digital shadows or III. EXISTING METHODOLOGIES
models instead of a true digital twin. This document
explores the challenges of using digital twin technology, Traditional surveillance systems, such as CCTV
particularly in the aerospace sector, while also addressing its cameras and motion sensors, have been widely used to
broader applications. It highlights the limitations that monitor activities and record events for later analysis. While
prevent effective use in safety-critical systems and offers a these systems provide valuable insights after incidents
detailed look at the fundamental aspects of digital twins.The occur, they are limited in offering real-time situational
paper proposes three key aspects for future digital twins in awareness or proactively detecting potential threats during
aerospace, known as aero-Digital Twins (aero-DTs), an event. However, with the rise of emerging technologies
like IoT, the capabilities of surveillance systems have
Xiaokangzhou, et.al,…[9] A-YONet is a deep neural greatly improved. IoT enables real-time data collection,
network model designed to be lightweight, combining the allowing a network of connected sensors and devices to
strengths of YOLO and MTCNN to achieve efficient continuously gather information. This connected system can
training and feature learning with minimal computing quickly detect abnormalities and improve situational
resources. It includes a dynamic anchor box adjustment awareness across large areas, enabling security personnel to
mechanism, using a clustering scheme to modify bounding respond faster to potential threats.
boxes, and a multi-level feature fusion process to improve
training efficiency when dealing with multiple targets of IoT-enabled devices can include various data sources
different sizes. The model also features a multimarket like temperature sensors, motion detectors, cameras, and
identification technique, which improves accuracy when environmental sensors, giving a more comprehensive view
tracking many moving objects in real-time surveillance. of the monitored area. Despite these advancements, IoT-
Experiments were conducted using two datasets one public based surveillance systems still face challenges, such as
and one custom within an actual surveillance system. The cybersecurity risks and scalability issues. Many IoT systems
results showed that A-YONet outperformed three baseline are vulnerable to cyberattacks because their centralized
methods in real-time monitoring for smart IoT devices. architecture allows attackers to compromise the entire
Traditional Computer Vision Systems (CVS) are typically system by targeting a single central hub. Additionally, as the
centralized, but with the rapid growth of surveillance number of connected devices grows, managing and
devices and the increasing volume of high-quality IoT processing the large volumes of data can overwhelm
surveillance data, these centralized systems are facing existing infrastructure, causing slow performance, data
greater challenges congestion, or even system failures. Figure 2 illustrates the
current framework with hardware deployment.

IJISRT25JAN140 www.ijisrt.com 156


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14621435

Fig 2 Existing Framework

IV. PROPOSED FRAMEWORK of information such as access logs, alarms, and surveillance
footage. SHA-256 encryption within the blockchain adds an
The proposed integrated system aims to provide a extra layer of security, defending against cyberattacks.
comprehensive, real-time monitoring solution for military Advanced access control based on facial recognition is a key
security. It includes secure data management, predictive feature of the system. It utilizes an improved Grassmann
analytics, and advanced access control, creating a robust and algorithm for identity verification, particularly in complex
scalable defense infrastructure. The system uses cutting- and dynamic environments. This method analyzes data in
edge technologies to build a flexible framework that meets the Grassmannian space, ensuring high accuracy and
current military needs. It continuously monitors vital assets reliability even in challenging conditions like low light,
and locations through IoT-enabled sensors and cameras, changing angles, and varying facial expressions. This
which collect and analyze real-time data. The data is innovative algorithm prevents unauthorized access to
securely transmitted and stored, offering fast insights and sensitive areas and offers a secure, contactless way to verify
enabling quick responses to potential threats or anomalies. identity. Personnel are granted or denied access based on
To securely manage critical defense data, the system uses facial recognition, ensuring only authorized individuals can
Blockchain technology. A decentralized ledger ensures that enter restricted zones. Figure 3 shows the proposed block
data is stored in a secure, immutable format, protecting it diagram.
from tampering. This is crucial for maintaining the integrity

Fig 3 Proposed Framework

IJISRT25JAN140 www.ijisrt.com 157


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14621435
 Grassmann Algorithm we will frequently use the notation Y to refer to its
Many image and video recognition systems use equivalence class span(Y), and Y1 = Y2 to refer to span(Y1)
Grassmann manifolds to represent data. This study = span(Y2).
introduces a deep learning architecture that extends
traditional Euclidean networks to Grassmann manifolds, The length of the shortest geodesic linking two points
enabling deep learning directly on these manifolds. The on the Grassmann manifold is the Riemannian distance
architecture includes several key components: between two subspaces. However, utilising the principal
angles to define the distances is a more perceptive and
 Full rank mapping layers to convert input Grassmannian computationally well-organized method.
data into more useful forms.
 Orthogonal re-normalization layers to normalize the  Input: A set of P points on manifold
resulting matrices.
 Projection pooling layers to reduce model complexity in {𝑋𝑖 }𝑃𝑖=1 ∈ 𝐺(𝑑, 𝐷)
the Grassmannian context.
 Projection mapping layers to transform Grassmannian  Output: Karcher mean𝜇𝐾
data into Euclidean forms for the final output layers.
 Set an initial estimate of Karcher mean 𝜇𝐾 = 𝑋𝑖 by
The model is trained using stochastic gradient descent, randomly picking one point in 𝑋𝑖 }𝑃𝑖=1
with a matrix-based approach to backpropagation for  Compute the average tangent vector
updating the structured data. This novel network 1
 A = ∑𝑃𝑖=1 𝑙𝑜𝑔𝜇𝐾 (𝑋𝑖 )
𝑃
architecture is designed to process Grassmannian data
directly, learning representations that improve visual tasks.  If ‖𝐴‖ < 𝜀 then return 𝜇𝐾 stop, else go to Step 4
It aims to fully learn Grassmannian data on their underlying  Move 𝜇𝐾 in average tangent direction 𝜇𝐾 =
Riemannian manifolds in an end-to-end learning framework. 𝑒𝑥𝑝𝜇𝐾 (𝛼𝐴), where𝛼 > 0 is a parameter of step size. Go
to Step 2, until 𝜇𝐾 meets the termination conditions
Previous efforts often involve embedding the (reaching the max iterations, or other convergence
Grassmannian data into a Euclidean space, either by conditions
approximating it in the tangent space or using kernel
functions in Hilbert spaces. These approaches allow V. EXPERIMENTAL RESULTS
traditional Euclidean techniques to be applied to the
embedded data. For example, Grassmannian data can be Blockchain algorithms differ in terms of consensus,
embedded in a high-dimensional Hilbert space, where energy efficiency, scalability, security, and decentralisation,
conventional methods like Fisher analysis are used. with each tailored to a distinct use case. Bitcoin uses Proof
However, these methods are often limited to Mercer kernel- of Work (PoW), which requires miners to solve
based classifiers and face increased computational cryptographic problems to validate transactions, making it
complexity as the number of training samples grows. The extremely secure but energy-intensive and sluggish, with
Grassmann manifold, represented as G(m, D), refers to the limited scalability. Proof of Stake (PoS) chooses validators
set of m-dimensional subspaces in a D-dimensional space. It based on the amount of bitcoin they own and stake, giving
is a compact Riemannian manifold with m(D-m) better energy efficiency and faster transaction rates than
dimensions. PoW, but with modest decentralisation and susceptible to
majority stake assaults. Delegated Proof of Stake (DPoS)
An orthonormal matrix Y of size D by m can be used enhances scalability by electing a limited number of
to correspond to an element of G(m, D), with Y = Im, where delegates to validate transactions, making them quicker and
Im is the m by m identity matrix. For instance, Y may more energy-efficient, but less decentralised and potentially
symbolize the m basis vectors of a set of R D photographs. vulnerable to delegate collusion. In contrast, Proof of
Authority (PoA) relies on a few trusted authority nodes to
However, the matrices Y1 and Y2 are considered the confirm transactions, delivering very high scalability and
same if and only if span(Y1) = span(Y2), where span(Y) efficiency but compromising decentralisation because it
signifies the subspace spanned by the column vectors of Y. depends significantly on the honesty of validators. Table 1
In other words, if and only if Y1R1 = Y2R2 for some R1, shows the comparative analysis for proposed work.
R2 O, span(Y1) = span(Y2) (m). With this understanding,

Table 1 Comparison Details with Criteria


Delegated PoS Proof of Authority
Criteria Proof of Work (PoW) Proof of Stake (PoS)
(DPoS) (PoA)
Voting among
Consensus Mining solves Stake-based selection Trusted validators
stakeholders to elect
Mechanism cryptographic puzzles. of validators. (authority nodes).
delegates.
Low (high energy High (energy- High (energy- High (energy-
Energy Efficiency
consumption). efficient). efficient). efficient).
Scalability Limited (low TPS). Moderate (higher than High (optimized for High (optimized for

IJISRT25JAN140 www.ijisrt.com 158


Volume 10, Issue 1, January – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.5281/zenodo.14621435
PoW). speed). speed).
Vulnerable if a
Resilient but susceptible to Delegates could Dependent on
Security majority stake is
51% attacks. collude. authority honesty.
controlled.
Moderate Moderate (limited
Decentralization High (many miners). Low (authority nodes).
(stakeholders). delegates).
Example Bitcoin, Ethereum (pre- Ethereum (post-
EOS, TRON. VeChain, BNB Chain.
Blockchains Merge). Merge).
Fast (up to 10,000 Very fast (~10,000
Transaction Speed Slow (~7 TPS for Bitcoin). Faster than PoW.
TPS). TPS).

However, its reliance on a small number of nodes [3]. Sharma, Pradip Kumar, et al. "Wearable computing
renders it less decentralised and therefore vulnerable to for defence automation: Opportunities and challenges
concerted assaults. Each algorithm proposes a trade-off in 5G network." IEEE Access 8 (2020): 65993-
between decentralisation, security, and performance, 66002.
catering to diverse blockchain applications, including [4]. Bhatia, Munish, and Ankush Manocha. "Cognitive
cryptocurrency and business networks. framework of food quality assessment in IoT-
inspired smart restaurants." IEEE Internet of Things
VI. CONCLUSION Journal 9.9 (2020): 6350-6358.
[5]. Javed, Safdar Hussain, et al. "APT adversarial
The Next-Generation Defence Security Framework defence mechanism for industrial IoT enabled cyber-
combines Blockchain, IoT, Digital Twin Technology, and physical system." IEEE Access 11 (2023): 74000-
Advanced Face Recognition to provide a secure, scalable, 74020.
and comprehensive solution for modern defence [6]. Bhatia, Munish, et al. "Internet of things-inspired
infrastructures. This system addresses real-time monitoring, healthcare system for urine-based diabetes
secure data management, and predictive analytics to prediction." Artificial Intelligence in Medicine 107
improve situational awareness and enable quick responses (2020): 101913.
by defence personnel. Blockchain ensures that defence data [7]. Bhatia, Munish, Sandeep K. Sood, and Simranpreet
is immutable and tamper-proof, protecting it from attackers. Kaur. "Quantumized approach of load scheduling in
With decentralised ledgers and SHA-256 encryption, data fog computing environment for IoT
integrity and confidentiality are maintained, while smart applications." Computing 102.5 (2020): 1097-1115.
contracts automate and enforce security protocols. IoT [8]. Li, Luning, et al. "Digital twin in aerospace industry:
enables continuous surveillance, early threat detection, and A gentle introduction." IEEE Access 10 (2021):
rapid response, enhancing the protection of critical assets 9543-9562.
and infrastructure. Digital Twin technology creates virtual [9]. Zhou, Xiaokang, et al. "Deep-learning-enhanced
replicas of physical assets, allowing real-time simulations multitarget detection for end–edge–cloud
and predictive maintenance. This helps identify and resolve surveillance in smart IoT." IEEE Internet of Things
potential issues before they become security risks, boosting Journal 8.16 (2021): 12588-12596.
operational efficiency. Advanced facial recognition, [10]. Fukawa, Nobuyuki, and Aric Rindfleisch.
powered by the Grassmann algorithm, ensures precise "Enhancing innovation via the digital twin." Journal
identity verification and restricts access to authorized of Product Innovation Management 40.4 (2023): 391-
personnel, speeding up access control procedures. This 406.
integrated system is designed to be both secure and scalable,
adapting to future technologies and evolving security needs.
Its modular design allows for easy addition of new devices
and sensors, ensuring the system remains effective in the
face of increasingly complex threats.

REFERENCES

[1]. Pătraşcu, Petrișor. "Emerging technologies and


National Security: The impact of IoT in critical
infrastructures protection and defencesector." Land
Forces Academy Review 26.4 (2021): 423-429.
[2]. Sirait, Jonathan, Hazen Alrasyid, and Nadia Aurora
Soraya. "Strengthening The Defense Industry's
Independence Through The Internet Of Things In
The Manufacturing Sector: A Review." International
Journal of Science, Technology & Management 4.2
(2023): 335-340.

IJISRT25JAN140 www.ijisrt.com 159

You might also like