OceanofPDF.com Blockchain and IoT Foundations Applications - R Anandan
OceanofPDF.com Blockchain and IoT Foundations Applications - R Anandan
com
Blockchain and IoT
Explains how IoT devices can leverage blockchain technology to enhance security,
transparency, and efficiency in data management and transactions.
Explores the security challenges faced by IoT devices and how blockchain can address these
challenges by providing a decentralized and tamper-resistant platform for data exchange and
storage.
Investigates the potential of cloud-based IoT platforms, analytics, protocols, and business
models to revamp the workforce.
Discusses how companies can leverage the data generated by IoT devices securely through
blockchain-based data marketplaces.
Provides real-world examples and case studies of successful implementations of IoT and
blockchain technologies across different industries such as healthcare, manufacturing,
logistics, and energy.
OceanofPDF.com
Chapman & Hall/CRC Internet of
Things: Data-Centric Intelligent
Computing, Informatics, and
Communication
This series focuses to attract researchers and practitioners who are working
in Information Technology and Computer Science in the field of intelligent
computing paradigm, Big Data, machine learning, Sensor data, Internet of
Things, and data sciences. The main aim of the series is to make available a
range of books on all aspects of learning, analytics and advanced intelligent
systems and related technologies. This series will cover the theory, research,
development, and applications of learning, computational analytics, data
processing, machine learning algorithms, as embedded in the fields of
engineering, computer science, and Information Technology.
Series Editors:
Data Science for Effective Healthcare Systems
Hari Singh, Ravindara Bhatt, Prateek Thakral and Dinesh Chander Verma
OceanofPDF.com
Blockchain and IoT
Foundations, Applications and Case Studies
Edited by
R Anandan, D Akila, and Souvik Pal
OceanofPDF.com
Designed cover image: ShutterStock
First edition published 2025
by CRC Press
2385 NW Executive Center Drive, Suite 320, Boca Raton FL 33431
and by CRC Press
4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
© 2025 selection and editorial matter, R Anandan, D Akila, and Souvik Pal; individual chapters, the
contributors
Reasonable efforts have been made to publish reliable data and information, but the author and
publisher cannot assume responsibility for the validity of all materials or the consequences of their
use. The authors and publishers have attempted to trace the copyright holders of all material
reproduced in this publication and apologize to copyright holders if permission to publish in this
form has not been obtained. If any copyright material has not been acknowledged please write and let
us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access
www.copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive,
Danvers, MA 01923, 978-750-8400. For works that are not available on CCC please contact
[email protected]
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are
used only for identification and explanation without intent to infringe.
ISBN: 978-1-032-54626-1 (hbk)
ISBN: 978-1-032-55070-1 (pbk)
ISBN: 978-1-003-42888-6 (ebk)
DOI: 10.1201/9781003428886
Typeset in Times
by Deanta Global Publishing Services, Chennai, India
OceanofPDF.com
Contents
Preface
Editors
Contributors
SECTION–I Foundations in Block Chain
Index
OceanofPDF.com
Preface
We take great pleasure in presenting this book, Blockchain and IoT, aimed
at advancing knowledge and sharing recent applications and case studies in
areas such as the Internet of Things (IoT), robotic and intelligent systems,
web-based applications, and blockchain technology among working
professionals and those engaged in education and research across various
technical disciplines.
The objective of this book is to enable students to delve into IoT
knowledge, which necessitates new security frameworks aligned with
emerging technical standards. Consequently, the design of the book aims to
address the need for new security paradigms for IoT based on these
standards. Security, encompassing both physical devices and management
applications, is paramount for the successful operation of IoT systems. The
advantages of incorporating IoT in industrial automation include heightened
efficiency, increased accuracy, cost-effectiveness, accelerated process
completion, reduced power consumption, minimized errors, and enhanced
control. Forward-thinking entrepreneurs aspire to automate their office
processes to align with the latest technological advancements. However, it’s
important to acknowledge the challenges associated with automating
industrial processes. In subsequent sections, we explore the potential
synergy between blockchain and IoT technologies, investigating how they
can complement each other effectively. The convergence of IoT and
blockchain has the potential to reshape industries, redefining how we
interact with technology, manage data, and conduct transactions. At its core,
IoT empowers devices and sensors to communicate and exchange data
seamlessly, creating a network of interconnected systems that gather real-
time insights and drive efficiency. On the other hand, blockchain, renowned
for its decentralized and immutable ledger technology, ensures
transparency, security, and trust in data transactions, eliminating
intermediaries and enabling peer-to-peer interactions. In recent years, the
synergy between IoT and blockchain has gained significant attention,
promising transformative solutions across various sectors, including
healthcare, supply chain management, finance, energy, agriculture, and
beyond. From optimizing supply chains and tracking assets to enabling
secure micropayments and ensuring data integrity, the applications are
diverse and profound.
This book serves as a comprehensive guide to understanding the
dynamics, applications, and implications of integrating IoT and blockchain
in industry. Through a blend of theoretical frameworks, practical case
studies, and insightful analyses, we delve into the intricacies of this
burgeoning field, exploring its potential to revolutionize business models,
enhance operational efficiency, and drive innovation. Whether you are a
seasoned professional, a curious enthusiast, or an industry leader navigating
the digital transformation journey, this book provides valuable insights and
practical guidance to harness the power of IoT and blockchain synergies.
Join us as we explore the transformative potential of these technologies and
embark on a journey toward a more connected, efficient, and transparent
future.
OceanofPDF.com
Editors
R Anandan completed
his UG, PG, doctorate and post-doctoral degree (DSc) in computer science
and engineering in Mexico. He is an IBMS/390 Mainframe professional and
is recognized as a chartered engineer by the Institution of Engineers in
India. He currently works as a professor, Department of CSE, School of
Engineering; and is director of the Innovation and Incubation, Vels Institute
of Science, Technology & Advanced Studies (VISTAS), Chennai, India. He
has vast experience in corporate and all levels of academics in computer
Science and engineering. He is currently supervising 8 PhD research
scholars and 16 research scholars have been awarded PhD’s under his
guidance.
He is a member of many reputed international and national societies. He
serves as an editorial board member, technical Committee member, or
reviewer of several international journals. He has published more than 140
research papers in various international journals. He has presented 92
papers at various international conferences. He has received 18 awards from
national and international agencies. He has authored and edited 28 books,
including 10 international books, and published 30 chapters in various
books. He has filed 18 patents of which 4 patents and 3 copyrights have
been granted.
OceanofPDF.com
Contributors
B Chidhambararajan
SRM Valliammai Engineering College
Kanchipuram, India
Hariharan B
SRM Institute of Science and Technology
Chennai, India
Anwer Basha H
Saveetha College of Liberal Arts and Sciences
Chennai, India
Jeba Sonia J
SRM Institute of Science & Technology
Chennai, India
Maxraj J
VELS Institute of Science, Technology and Advanced Studies
Chennai, India
Edwin Jijo
Military Technological College
Muscat, Sultanate of Oman
Charanjeet K
SRM Institute of Science & Technology
Chennai, India
Revathi K P
Easwari Engineering College
Chennai, India
Balamurugan K
SRM Madurai College for Engineering and Technology
Pottapalayam, India
Priyadarsini K
SRM Institute of Science & Technology
Chennai, India
Senthil Kumar M
SRM Valliammai Engineering College
Kattankulathur, India
Azhagiri M
SRM Institute of Science and Technology
Chennai, India
Harsha Vardhini P A
Vignan Institute of Technology and Science,
Telangana, India
Jawahar P K
B.S. Abdur Rahman Crescent Institute of Science and Technology
Chennai, India
Latha Parthiban
Pondicherry University Community College
Puducherry, India
Anitha R
B.S. Abdur Rahman Crescent Institute of Science and Technology
Chennai, India
Parthiban R
Sri Sivasubramaniya Nadar College of Engineering
Kalavakkam, India
Selvakumarasamy
SRM Institute of Science and Technology
Chennai, India
Shenbagavadivu
SRM Valliammai Engineering College
Chennai, India
Anusooya S
B.S. Abdur Rahman Crescent Institute of Science and Technology
Chennai, India
Karthik S
SRM Institute of Science and Technology
Chennai, India
Mubeena S
B.S. Abdur Rahman Crescent Institute of Science and Technology
Chennai, India
Sandhya S
SRM Valliammai Engineering College
Kattankulathur, India
Susee S K
SRM Madurai College for Engineering and Technology
Madurai, India
Sahunthala S
Rajalakshmi Institute of Technology
Chennai, India
Selvakumarasamy Subramaniyam
SRM Institute of Science and Technology
Nagar, India
VijayAnanth Suyamburajan
Vels Institute of Science, Technology and Advanced Studies
Chennai, India
Manikandan T
Rajalakshmi Engineering College
Chennai, India
Jean Shilpa V
B.S. Abdur Rahman Crescent Institute of Science and Technology
Chennai, India
OceanofPDF.com
Section–I Foundations in Block Chain
OceanofPDF.com
1 Architecture, Security, and
Privacy for Blockchain Using
Enabling Technologies
Priyadarsini K, Karthik S, R Anitha, Jean Shilpa V,
Anusooya S, Jeba Sonia J, and Charanjeet K
DOI: 10.1201/9781003428886-2
INTRODUCTION
In 2009 Nakamoto Satoshi developed blockchain to make Bitcoins more
secure. As of January 2018, the capital fee of Bitcoin was $180 billion.
Blockchain is a multidisciplinary topic that involves mathematics,
computation, big data, IoT, and cloud computing. Blockchain isn’t always a
product, however, it is an alternative as it is also used as the primary
software of Bitcoin. A block is part of the blockchain that consists of a
block header, which in turn is divided into fundamental block hash, block
model, timestamp, nonce value, simple records, information, and Merkel
root hash. The block also includes interactive records, input, and output. In
general, it is an interconnected time series of information with cryptography
and a dispensed shared ledger. It performs unusual operations by using
consensus, smart contracts, preferred ledger, and cross-chain generation.
Each block is connected to different blocks (nodes) and knows the previous
and subsequent hashes in a peer-to-peer network. Blocks cannot be deleted
or changed by blockchain users. It has a verification facility by which
individual blocks have to be completely verified. Blocks have the traits of
decentralization, persistency, anonymity, independence, openness,
immutability, safety and agreement, collective renovation, programmability,
transparency, unforgeability, and auditability [5] (Figure 1.1).
FIGURE 1.1 Block structure.
where Sig ska is the signature with the aid of a private key and BTC is the
Bitcoin amount to be transferred. There are a few shadow addresses that are
mechanically created when transactions change values. A transaction CS (P,
C, d, t, s) among P and C is carried out and there may be a CS. Devote, CS.
Open, and CS. Nice stages denoting successful execution, starting, and
aborting the transaction. If the transaction is completed successfully by
secret key s, the Bitcoin price d is assigned to the receiver. There are several
types of metadata: text, which uses many textual content messages; hash, a
code that specifies the possession of files in the blockchain; financial
document, a file of virtual payments or property; copyright, which allows
manufacturers to promote and display the file; script, the many languages
used for blockchain; photo, photos are sometimes also present in a
blockchain; and archive, records saved in the compact form (Figure 1.2).
FIGURE 1.2 Chain of blocks.⏎
The articles selected for this chapter are from 2009 to 2021 (Figure 1.3).
FIGURE 1.3 Year-wise paper selection.⏎
Architecture of Blockchain
The blockchain architecture is a collection of layers showing the functions
and protocols supported by each layer [1, 2, 7, 32, 33, 34]:
i. Data layer: It creates the blocks and has its own information,
verification, timestamp, block numbers, hash values of its
predecessor, and successor nodes.
ii. Network layer: It makes a complete network of nodes via a peer-to-
peer network with no fixed topology. Nodes can verify, transmit, and
route for interactions.
iii. Consensus layer: It is used to store accurate information by nodes in
the shared ledger. It exhibits a higher satisfaction level in consensus
efficiency. In a peer-to-peer network, all nodes work together to reach
a consensus by Byzantine consensus. There could also be an oral or
written consensus. After a block miner signs the blocks and
broadcasts them, the receiver signs a new block after verification. The
algorithm works on a majority of 51%. There are four types of
consensus mechanisms: POW (proof of work) (Figure 1.4), proof of
stake (POS), practical Byzantine fault tolerance (PBFT), and
delegated proof of stake (DoPOS). Some other mechanisms are proof
of authority (POA), proof of bandwidth, proof of elapsed time
(POET).
iv. Contract layer: It is the lowest layer to make a blockchain
operational via sophisticated programming. Examples are Ethereum
and Definity. There are vulnerabilities in contracts, e.g., errors in
encoding, cryptography, misaligned incentives, transaction ordering,
timestamp dependence, mishandled exceptions, reentrancy, and data
feed.
v. Service layer: It provides the services to the upper layer by software
and hardware.
vi. Application layer: It offers services and platforms to applications like
IoT, smart city, and VANET (Figure 1.5).
FIGURE 1.4 PoW consensus mechanism.⏎
SELFISH MINING
Blocks are brought to the blockchain and mined via block miners. There are
miners with their own mining powers, mi, such that ∑I = n mi. To check the
validity of a block, hard crypto puzzles are solved by miners. Sometimes
puzzles are too hard for one miner to solve, therefore, miners will pool
together to collect enough computing strength. Miners get their rewards in
Bitcoins once they solve the puzzle.
Extra computing energy will increase the rewards and the possibility of
solving the crypto puzzles. Mining pools result in two types of companies:
honest and egocentric [21, 35].
Egocentric miners convince the genuine miners to fix stale blocks with
the aid of a forking blockchain, creating a copy of the blockchain (Figure
1.6). As a result, they waste their computing energy in futile efforts. Mining
should be sincere and incentive-free. If a couple of block is introduced
through miners, they create a fork into branches of a tree referred to as
Merkel tree, which can be difficult or smooth depending on the basis of old
and new regulations.
Bitcoin Wallets
There are many Bitcoin wallets, including TREZOR, MultiBit Core,
Coinbase, Blockchain, Exodus, MyCelium, Bitcoin middle, MultiBit HD,
Electrum, Copay, Amory. For security and privacy, Coinbase, MyCelium,
Bitcoin middle Blockchain, TREZOR, Exodus, MultiBit middle, MultiBit
HD are desirable, whereas Electrum, Copay, and Amory are not. They’re
unbiased wallets, except Coinbase. In large experience, Bitcoin wallets are
classified into types 0, 1, and 2, on the basis of the capacities of logistic
assets they require [31] (Figure 1.7).
Fintech
Since operations of Bitcoins are unforgeable, accurate, and untraceable,
through the smart contract agreement with the regulations, blockchain has
increased the confidence of the financial industry. It provides security to the
upper layer and multi-signature scheme messages are encrypted to improve
the verification and anonymity.
Cloud
A cloud is a network of blocks and a database of nodes of a blockchain is
considered big data. Therefore, a blockchain would require a cloud to store
and manage the database because of its size, volume, veracity, and velocity.
Governance
It is desired to increase the digital transmission of financial institutions,
digitization of important government records, land registries, patients’
records, and so on. Currently, flexible regulations may need to be
standardized and regulated to cope with attacks, threats, and vulnerabilities.
Corda
Corda is a public digital ledger technology, not a blockchain, because it
creates a network by which messages and other information flow. It is more
reliable, transparent, immutable, reduces risk, flexible, and regulated. It
controls financial transactions by recording financial agreements, validating
transactions between two parties, and providing the perfect flow of
information in a regulated and supervised manner. Corda automatically
produces legal document models representing individuals’ legal rights.
Corda uses PoA, is permissioned, and is not suitable for use-case. A
drawback is the generation of millions of long-lasting threads [38].
Permissions of the blockchain are not like the regular ones because it is not
more secure. It can connect to any node, which can add blocks to the
blockchain.
Applications
FIGURE 1.8 Layers applicable to traditional
blockchain.⏎
FIGURE 1.9 Layers in data management in blockchain.⏎
i. Bitcoin: It uses POW mining and no smart contract. They are more
popular and good for scalability for a number of nodes, but it is
expensive computationally and time consuming.
ii. Ethereum: It uses the smart contract, POW, and POS mining. It is
scalable and it does not require any computation for mining, but it is
costly.
iii. Hyperledger: It requires a smart contract and PBFT, and it is the
fastest to detect the validity of the transactions. It records transactions
and it is accessible to all nodes. It cannot be added, deleted, or
modified, meaning it is fully protected from attacks.
iv. Blockchain APIs and development platforms: Chain.info consists
of APIs with wallets to perform payments and other operations [13].
v. Multichain, Hydrachain, Bigchain, Openchain, Quorm, Chaincore:
They are privately permissioned and they are developed in Java and
Python. They are used in financial operations, banking, land registries,
and ID verification (Table 1.3).
vi. Selfish mining: Some nodes do not broadcast their share and cheat,
even if they have less than 51% hashing power for transmission.
vii. Usage: The development of API is challenging. An easy-to-use
Bitcoin API is needed.
Security
Security means providing the access control, confidentiality, integrity,
authentication, availability, and non-repudiation of services. Miners whose
computing power is below 25% of the network’s total power are
incentivized. Therefore, they are lured to use small blocks and extend the
longest and heaviest chains. The honest users follow the heaviest chain
while shellfish users may follow any chain. To increase their revenue,
miners prefer to follow the longest blockchain fork. Bitcoins are more
flexible in network optimal conditions, stating zero attacks in zero latency.
Secure multiparty computation, attribute-based mechanisms, and non-
interactive Bitcoins are more flexible in zero-knowledge proof. Blockchain
provides very good authentication for access control with the help of
hashing [47]. Some of the security issues are as follows:
Wallet security: Wallets need to be protected from the attacks to get the private key.
Censorship resistance: To limit the power of the lead miner to a single epoch.
Resilience to mining power variation: They are adjustable to different mining power
variations.
Forks: Making of other blockchains, which wastes the efforts of honest nodes.
Double-spending: Nodes try to transfer the same Bitcoin amount to more than one node.
Classification of Attacks
Attacks compromise the security of the system. Attacks are classified into
several different categories depending on where they pose the threats [4,
20]: identity based (replay, impersonation, and Sybil), manipulation
(Eclipse, transaction malleability, time jacking, quantum, reputation),
vulnerability in service (race, DdoS, double-spending, finney, vector76,
collusion; malware), application vulnerability (use case design flow, coding
vector) [8].
Risks to Blockchains
Various dangers or threats to Bitcoins are considered here [3] (Table 1.5).
They are vulnerable to 51% attacks. It results in many attacks such as
opposite transactions, reverse ordering, hampering of mining transactions,
and confirmation of ordinary transactions. Private key security, referred to
as identification, is dealt with by a third party. Some criminal activities can
be managed like ransomware, underground marketplace, money laundering,
and double-spending. Transactions are traceable and their order of
execution needs to be recorded in a defensive storage. Transaction privacy
is not secure and criminals can conduct malicious activities through smart
contracts risking information leakage. The fee of operations is judged by the
execution time, bandwidth, computing, and resources. In under-priced
operations, the attacker launches attacks that consume a lot of resources.
Marketplace risk is due to the versions inside the foreign exchange quotes.
In shallow marketplace problems, a few parties hesitate to obtain or pay the
high amount because of the low quantity of Bitcoins.
Blockchain Applications
Some of the main applications of blockchains are as follows (also see
Figure 1.12):
CONCLUSIONS
Blockchain is an integration of information technology, IoT, and machine-
to-machine (M2M) interactions. It has scope for digital artificial
intelligence (smart contracts), IoT, and consensus mechanisms based on
collaboration for resolutions. There are unique elements, for example,
safety and privacy, threats, attacks, and their implementation through open
sources. Bitcoin is useful because of its security, trust, public validity
checking, and its restricted guidelines. It’s one of the safest and maximally
secure foreign money in the arena. Worldwide, people are preferring
shopping for and doing commercial enterprise in cryptocurrencies. This
chapter covered its safety, methodologies, processing, designing, mining,
and validating mechanisms. It also reviewed the developments regarding
key control (privateness and protection), identity control, solving difficult
crypto puzzles, caching of records, and mobility.
REFERENCES
1. Salman T, Zolanvari M, Erbad A, Jain R, Samaka M. Security services
using blockchains: A state of the art survey. IEEE Communications
Surveys & Tutorials. 2018; 21 (1):858–880.
https://ieeexplore.ieee.org/document/8428402.
2. Lu Y. Blockchain: A survey on functions, applications and open issues.
Journal of Industrial Integration and Management. 2018; 3
(04):1850015.
https://www.worldscientific.com/doi/10.1142/S242486221850015X.
3. Zheng Z, Xie S, Dai HN, Chen X, Wang H. Blockchain challenges and
opportunities: A survey. International Journal of Web and Grid
Services. 2018; 14 (4):352–375.
https://www.researchgate.net/publication/328338366_Blockchain_cha
llenges_and_opportunities_A_survey.
4. Li X, Jiang P, Chen T, Luo X, Wen Q. A survey on the security of
blockchain systems. Future Generation Computer Systems.
2020;107:841–853.https://doi.org/10.1016/j.future.2017.08.020.
5. Herlihy M. Blockchains from a distributed computing perspective.
Communications of the ACM 62 (2):78–85.
https://dl.acm.org/doi/10.1145/3209623.
6. Tschorsch F, Scheuermann B. Bitcoin and beyond: A technical survey
on decentralized digital currencies. IEEE Communications Surveys &
Tutorials. 2016; 18 (3):2084–2123.
https://ieeexplore.ieee.org/document/7423672.
7. Dinh TT, Wang J, Chen G, Liu R, Ooi BC, Tan KL. Blockbench: A
framework for analyzing private blockchains. In Proceedings of the
2017 ACM International Conference on Management of Data 2017
May 9, 2017, pp. 1085–1100. https://arxiv.org/abs/1703.04057.
8. Bhushan B, Sinha P, Sagayam KM, Andrew J. Untangling blockchain
technology: A survey on state of the art, security threats, privacy
services, applications and future research directions. Computers &
Electrical Engineering. 2021;90:106897.
https://doi.org/10.1016/j.compeleceng.2020.106897.
9. Ali MS, Vecchio M, Pincheira M, Dolui K, Antonelli F, Rehmani MH.
Applications of blockchains in the Internet of Things: A
comprehensive survey. IEEE Communications Surveys & Tutorials.
2018; 21 (2):1676–1717.
https://ieeexplore.ieee.org/abstract/document/8580364/
10. Sankar SL, Sindhu M, Sethumadhavan V. Survey of consensus on
blockchain applications. Int’l Conference on Advanced Computing
and Communication System, January 2017, pp. 1–4.
https://www.researchgate.net/publication/319277442_Survey_of_cons
ensus_protocols_on_blockchain_applications.
11. Alhadharmi, Z., Alghfeli, S, Alghfeli M. Zawish M. Introducing
blockchains for healthcare. Int’l, Conference on Electrical and
Computing Technologies and Applications (ICECTA), 2017, pp. 1–4.
12. Yli-Huumo J, Ko D, Choi S, Park S, Smolander K. Where is current
research on blockchain technology?—A systematic review. PloS
ONE. 2016; 11 (10):e0163477.
https://doi.org/10.1371/journal.pone.0163477.
13. Swan M. Blockchain: Blueprint for a new economy. O’Reilly Media,
Inc.; 2015. https://dl.acm.org/doi/10.5555/3006358
14. Böhme R, Christin N, Edelman B, Moore T. Bitcoin: Economics,
technology, and governance. Journal of Economic Perspectives. 2015;
29 (2):213–238. https://www.aeaweb.org/articles?
id=10.1257/jep.29.2.213.
15. Eyal I, Gencer AE, Sirer EG, Van Renesse R. Bitcoin-NG: A scalable
blockchain protocol. In 13th {USENIX} symposium on networked
systems design and implementation ({NSDI} 16), 2016, pp. 45–59.
https://www.usenix.org/conference/nsdi16/technical-
sessions/presentation/eyal.
16. Brito J, Castillo A. Bitcoin: A primer for policymakers. Mercatus
Center at George Mason University; 2013.
https://www.mercatus.org/publications/technology-and-
innovation/bitcoin-primer-policymakers.
17. Bentov I, Kumaresan R. How to use bitcoin to design fair protocols.
Annual Cryptology Conference 2014 Aug 17, pp. 421–439. Springer,
Berlin, Heidelberg.
https://www.iacr.org/archive/crypto2014/86160326/86160326.pdf.
18. Bariviera AF. The inefficiency of Bitcoin revisited: A dynamic
approach. Economics Letters. 2017; 161:1–4.
https://www.sciencedirect.com/science/article/abs/pii/S016517651730
3804
19. Grinberg R. Bitcoin: An innovative alternative digital currency.
Hastings Science & Technology. 2012; 4:159.
https://www.researchgate.net/publication/228199328_Bitcoin_An_Inn
ovative_Alternative_Digital_Currency.
20. Conti M, Kumar ES, Lal C, Ruj S. A survey on security and privacy
issues of bitcoin. IEEE Communications Surveys & Tutorials. 2018;
20(4):3416–3452. https://ieeexplore.ieee.org/document/8369416
21. Eyal I, Sirer EG. Majority is not enough: Bitcoin mining is
vulnerable. International Conference on Financial Cryptography and
Data Security 2014 Mar 3, pp. 436–454. Springer, Berlin, Heidelberg.
https://www.researchgate.net/publication/258224002_Majority_Is_No
t_Enough_Bitcoin_Mining_Is_Vulnerable.
22. Garay J, Kiayias A, Leonardos N. The bitcoin backbone protocol:
Analysis and applications. Annual International Conference on the
Theory and Applications of Cryptographic Techniques 2015 Apr 26,
pp. 281–310. Springer, Berlin, Heidelberg.
https://eprint.iacr.org/2014/765.pdf.
23. Ron D, Shamir A. Quantitative analysis of the full bitcoin transaction
graph. International Conference on Financial Cryptography and Data
Security 2013 Apr 1, pp. 6–24. Springer, Berlin, Heidelberg.
https://eprint.iacr.org/2012/584.pdf.
24. Barber S, Boyen X, Shi E, Uzun E. Bitter to better—how to make
bitcoin a better currency. International Conference on Financial
Cryptography and data security 2012 Feb.
25. Antonopoulos AM. Mastering Bitcoin: Programming the open
blockchain. O’Reilly Media, Inc.; 2017.
https://github.com/bitcoinbook/bitcoinbook.
26. Lischke M, Fabian B. Analyzing the bitcoin network: The first four
years. Future Internet. 2016;8 (1):7. https://www.mdpi.com/1999-
5903/8/1/7/htm.
27. Reid F, Harrigan M. An analysis of anonymity in the bitcoin system.
Security and privacy in social networks 2013, pp. 197–223. Springer,
New York, NY.
https://users.encs.concordia.ca/~clark/biblio/bitcoin/Reid%202011.pdf
.
28. Beck R. Beyond bitcoin: The rise of blockchain world. Computer.
2018; 51 (2):54–58.
https://www.computer.org/csdl/magazine/co/2018/02/mco2018020054
/13rRUwx1xL2.
29. Androulaki E, Karame GO, Roeschlin M, Scherer T, Capkun S.
Evaluating user privacy in bitcoin. International Conference on
Financial Cryptography and Data Security 2013 Apr 1, pp. 34–51.
Springer, Berlin, Heidelberg.
https://link.springer.com/chapter/10.1007/978-3-642-39884-1_4.
30. Tama BA, Kweka BJ, Park Y, Rhee KH. A critical review of
blockchain and its current applications. 2017 International
Conference on Electrical Engineering and Computer Science
(ICECOS) 2017 Aug 22, pp. 109–113. IEEE.
https://ieeexplore.ieee.org/document/8167115.
31. Zaghloul E, Li T, Mutka MW, Ren J. Bitcoin and blockchain:
Security and privacy. IEEE Internet of Things Journal. 2020; 7
(10):10288–10313. https://ieeexplore.ieee.org/document/9122595.
32. Khan FA, Asif M, Ahmad A, Alharbi M, Aljuaid H. Blockchain
technology, improvement suggestions, security challenges on smart
grid and its application in healthcare for sustainable development.
Sustainable Cities and Society. 2020;55:102018.
https://www.sciencedirect.com/science/article/abs/pii/S221067072030
0056.
33. Zhu L, Zheng B, Shen M, Yu S, Gao F, Li H, Shi K, Gai K. Research
on the security of blockchain data: A survey. arXiv
preprint1812.02009. 2018. https://arxiv.org/abs/1812.02009.
34. Zhang R, Xue R, Liu L. Security and privacy on blockchain. ACM
Computing Surveys (CSUR). 2019; 52 (3):1–34.
35. Lin IC, Liao TC. A survey of blockchain security issues and
challenges. IJ Network Security. 2017; 19 (5):653–659.
http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p653-
659.pdf.
36. Lin W, Yin X, Wang S, Khosravi MR. A Blockchain-enabled
decentralized settlement model for IoT data exchange services.
Wireless Networks. 2020; 30:1–5.
https://link.springer.com/article/10.1007/s11276-020-02345-9.
37. Ma Y, Sun Y, Lei Y, Qin N, Lu J. A survey of blockchain technology
on security, privacy, and trust in crowdsourcing services. World Wide
Web 2020; 23 (1):393–419.
https://link.springer.com/article/10.1007/s11280-019-00735-4.
38. Khan C, Lewis A, Rutland E, Wan C, Rutter K, Thompson C. A
distributed-ledger consortium model for collaborative innovation.
Computer. 2017; 50 (9):29–37.
https://www.researchgate.net/publication/319995681_A_Distributed-
Ledger_Consortium_Model_for_Collaborative_Innovation.
39. Cheng J, Xie L, Tang X, Xiong N, Liu B. A survey of security threats
and defense on Blockchain. Multimedia Tools and Applications. 2020;
3:1–30.
https://www.researchgate.net/publication/330125746_A_survey_of_bl
ockchain_from_security_perspective.
40. Huang H, Kong W, Zhou S, Zheng Z, Guo S. A survey of state-of-
the-art on blockchains: Theories, modelings, and tools. ACM
Computing Surveys (CSUR). 2021; 54 (2):1–42.
https://dl.acm.org/doi/10.1145/3441692.
41. Dasgupta D, Shrein JM, Gupta KD. A survey of blockchain from
security perspective. Journal of Banking and Financial Technology.
2019; 3 (1):1–7. https://doi.org/10.1007/s42786-018-00002-6.
42. Honar Pajooh H, Rashid M, Alam F, Demidenko S. Multi-layer
blockchain-based security architecture for internet of things. Sensors.
2021; 21 (3):772. https://doi.org/10.3390/s21030772.
43. Nartey C, Tchao ET, Gadze JD, Keelson E, Klogo GS, Kommey B,
Diawuo K. On blockchain and IoT integration platforms: current
implementation challenges and future perspectives. Wireless
Communications and Mobile Computing. 2021; 2021:6672482.
https://doi.org/10.1155/2021/6672482.
44. Zhang Z, Song X, Liu L, Yin J, Wang Y, Lan D. Recent Advances in
blockchain and artificial intelligence integration: Feasibility analysis,
research issues, applications, challenges, and future work. Security
and Communication Networks. 2021; 2021:9991535.
https://doi.org/10.1155/2021/9991535.
45. Idrees SM, Nowostawski M, Jameel R, Mourya AK. Security aspects
of blockchain technology intended for industrial applications.
Electronics. 2021; 10 (8):951.
https://kdoi.org/10.3390/electronics10080951.
46. Nabben K. Blockchain security as “people security”: Applying
sociotechnical security to blockchain technology. Frontiers in
Computer Science. 2021; 2:62.
https://doi.org/10.3389/fcomp.2020.599406.
47. Algarni S, Eassa F, Almarhabi K, Almalaise A, Albassam E, Alsubhi
K, Yamin M. Blockchain-based secured access control in an IoT
system. Applied Sciences. 2021; 11 (4):1772.
https://doi.org/10.3390/app11041772.
48. Bharati TS. Security and privacy of internet of things. International
Journal of Innovative Technology and Exploring
Engineering(IJITEE). 2019; 8 (8):2740–2743.
49. Bharati TS. Security enhancement and privacy preserving of big data.
International Journal of Innovative Technology and Exploring
Engineering (IJITEE). 2019; 8 (10):1754–1758.
50. Bharati TS. Internet of Things (IoT): A critical review. International
Journal of Scientific & Technology Research (IJSTR). 2019; 8 (9):
227–232.
51. Bharati TS. Challenges, issues, security and privacy of big data.
International Journal of Scientific & Technology Research (IJSTR).
2020; 9 (2):1482–1486.
52. Bharati, T.S, Kumar R. Enhanced key management for mobile adhoc
networks. International Journal of Engineering Science and
Computing (IJESC). 2016; 6 (4):4184–4187.
OceanofPDF.com
2 Internet of Things and Industrial
Internet of Things Powered by
Blockchain
INTRODUCTION
The Internet of Things (IoT) is an effective internet and managerial setting
that works together to create a world that is intelligently interconnected [1].
IoT users can broadcast the data that they place on the server where it can
be used intelligently. At present, IoT is being used in many contexts, such as
corporations, industries, environmental engineering, mobile devices, and
governance. IoT also helps the transportation, healthcare, agriculture,
energy, and environmental management industries. Additionally, IoT
supports many commercial initiatives in the fields of services,
manufacturing, logistics, and food production. Academics and businesses
have paid a lot of attention to Industrial IoT (IIoT), which could be very
important in the upcoming conversion of industrial schemes. IoT plays a
vital role in Industry 4.0, and it is also one of the most important topics in
academics and politics. The major difference between IIoT and IoT is that
whereas IIoT is frequently applied in applications like smart factories and
smart manufacturing, IoT environments frequently feature a variety of
automation equipment and industrial devices.
IIoT provides intelligence and connectivity to industrial systems through
the help of drives, sensing devices, a pervasive network, and processing
power. Implementing IIoT is intended to increase manufacturing efficiency
and business productivity, lessen device downtime, and raise the caliber of
the final output. Specifically, IIoT features the following characteristics:
decentralization of IIoT systems, a variety of IIoT-based applications,
schemes, heterogeneity of IIoT-based information, and network strain [2].
Advancements in blockchain technology increase the chances of solving
IIoT difficulties. Bitcoin’s core technology is blockchain. Blockchain makes
it possible for computer programs to send and receive messages or keep
transactions in a widely accepted (peer-to-peer) fashion. Blockchain is
swiftly gaining popularity and is mostly used for distributed storage, smart
contract applications, and digital assets [3]. Applications that use the
blockchain for IIoT include storage attributes (such as temperature,
humidity, or location deviations) and creating block challenge ledgers that
are understandable only by certain users, like particular contributors of the
supply chain. Blockchain technology has transmuted from an unworkable
approach to a reliable approach to problem-solving.
Smart contracts (SCs) have been used in digital economics based on
blockchain 2.0 in an automatic way, whereas blockchain 1.0 is generally
associated with cryptocurrencies and overhead (for example, Bitcoin). The
focus of more recent blockchain 3.0 is on meeting the demands of the
digital world, such as Industry 4.0’s concerns with smart cities. IoT
continuously energizes Industry 4.0. Industry 4.0 is associated with IIoT.
Though one may regard IIoT as an improvement of IoT, it also involves a
further focus on IoT use in industry. Additionally, Industry 4.0 is frequently
associated with ethical manufacturing workplace groups.
The blockchain’s internal secular and spatial data can be found and
verified via traceability. Additionally, each data block stored within a
blockchain has a suitable timestamp added to it, ensuring data discovery.
With IIoT equipment and physical equipment, interoperability may
exchange data. Building an overlay P2P network on top with persistent
access across many IIoT methods will enable interoperability within the
blockchain composite layer.
The potential for IIoT to cooperate without the interference of a trusted
third party (TTP) is discussed in autonomous interactions. Blockchains
enable smart contracts to attain this autonomy. Particularly, contract clauses
encircled by smart contracts will be habitually enforced after a specific
circumstance is met.
Motive
Cloud-based manufacturing (CBM) is a new phenomenon in the most
recommended pattern for production. An isolated group of flexible
resources for production can be quickly given with a minimum of service
provider administrative effort or contact thanks to CBM’s constant, suitable,
whenever-needed network connectivity. A decentralized, peer-to-peer IIoT
system called BIIoT is suggested. A central CBM operator, the BIIoT
system improves the usefulness of older CBM systems, especially when
integrating outdated floor equipment in cloud environments. Additionally,
resources that are meant for production are enabled by CBM on an on-
demand basis, necessitating the usage of trustworthy distributors in
transactions between users unable to contract for production services.
Though BIIoT stands as an approval to IIoT, a number of problems need
to be overcome before it can be successfully implemented and its potential
fully realized. As a result, the purpose of this chapter is to offer a thorough
overview of the architecture that reports difficulties and explores BIIoT-
related research issues.
IOT: AN OVERVIEW
The term “Internet of Things (IoT)” refers to a collection of “things” that
are comprised of software, electronics, actuators, and sensors and connected
via the web in order to exchange information. IoT nodes are made up of
processing power and sensor devices, which are common in numerous
industries. Figure 2.1 shows the devices that are connected through IoT. IoT
home automation refers to the capacity to automate household appliances
using digitally controlled, network-connected systems to uphold the safety
of the populace. An IoT system can monitor and control anything remotely,
including lights, through the component known as a smart grid [7].
FIGURE 2.1 IoT connectivity.⏎
IOT OBSTACLES
Battery life and streamlined computational needs are the two criteria that
IoT devices must meet above all else.
DURATION OF A BATTERY
Many IoT nodes are positioned in remote areas without access to power.
The nodes only have a limited amount of power to carry out the intended
function and necessary safety commands, which often deplete the node’s
battery power. There are three practical strategies to resolve the battery life
issue [8]. The most crucial strategy is to use the minimal amount of security
requirements on the node, which is not advised, especially during the
handling of sensitive information. The second strategy involves increasing
the battery’s capacity. The majority of IoT nodes are planned and
constructed to be lightweight and with less volume, which leaves less room
for a larger battery. The last strategy utilizes natural sources (such as heat,
light, wind, and vibration) to generate a sufficient amount of power.
Nodes typically lack the computing power needed to carry out complex security measures.
Nodes used in many IoT systems might not be physically protected, leaving them open to
malicious users.
It may not always be possible to join via a node. For instance, a node might be in “sleep
mode” to conserve power, or it might be mobile and not accessible at the moment.
IIOT DIFFICULTIES
IIoT ensures the connectivity of diverse things by using a variety of
actuators. Sensors and software systems are installed to detect and gather
data from the actual environment, and those devices should generate the
actions in a subsequent manner. The unique features of IIoT provide a
chance to study a number of examination issues. Information and
communication technology (ICT) advancements in recent years have made
it possible to overcome some of the fundamental limitations of IIoT. For
example, interactions with ambient backscatter can help IIoT devices and
increase power. Additionally, by shifting the process-intensive tasks to edge
servers, mobile edge computing can increase the functionality of the IIoT
device. Additionally, current advancements in blockchain technologies
bring difficulties, including inadequate interoperability, safety, and
confidentiality vulnerabilities.
BLOCKCHAIN TECHNOLOGY: AN
OVERVIEW
Blockchain
A distributed ledger that spreads throughout an entire distributed system is
referred to as a blockchain. With decentralized permission, blockchains can
enable contracts to take place and validate collectively distributed things.
Blockchains can, therefore, perform decentralized contract confirmation,
leading to lower costs and traffic operation in the centralized organization.
Additionally, as every node in the network keeps a record of the completed
transactions inside the blockchain, all transactions saved in blockchains are
impenetrable. Meanwhile, cryptographic techniques ensure the data block’s
integrity inside the blockchain. As a result, blockchains can ensure that
communications are not lost [10]. All contracts can also be tracked thanks
to the significant timestamp that was assigned. A blockchain is made up of
neatly organized parts called blocks that have headers with transaction
information. By using a predecessor’s hash, the predecessor reflects the
header and metadata-related information. Within the initial block, known as
the genesis block, which has no old model or method, the first position is
encoded in a hard sense. Merkle trees are used for hashing the transactions
that are based on Ethereum and Bitcoin. A blockchain instance with blocks
and repeated chains is depicted. With the help of the parent block hash
value, every block in a blockchain points to its immediately previous block
(referred to as the parent block). For instance, block i contains the block i –
1 hash.
Consensus Algorithms
The one major advantage of blockchain techniques is the ability to verify
the constancy of the block in decentralized, despondent settings that need
the authorization of a trusted third party. However, a consensus is required
in distributed contexts. The agreement may also be biased in favor of good
devices, therefore, it must be obtained on a newly constructed block.
Consensus methods are often used to attain this level of reliability in
decentralized systems. Practical Byzantine fault tolerance (PBFT), proof of
stake (PoS), and proof of work (PoW) are common consensus algorithms.
Consensus algorithms are an essential piece of the puzzle for effective
blockchain operating rules since they safely update duplicated distributed
conditions.
Workflow of Blockchains
The following shows a functional instance of the blockchain. The method of
money transfer is as follows:
Step 1: Transfer cash from person A to person B.
Step 2: A Bitcoin wallet is used to begin the contract at a system. The transaction comprises
the recipient’s address, the sender’s wallet, and the total amount of currency.
Step 3: A block represents the online transaction. The block is then advertised to every node
in the network using the next three steps.
Step 4: Network members confirm the transaction’s validity.
Step 5: After that, a verified transaction is added to the top of the contact’s chain, creating a
new block inside the blockchain.
Step 6: The money is transferred from person A to person B.
SMART CONTRACT
Blockchain-based smart contracts are programmable programs that control
transactions under certain conditions. Smart contracts are created based on
blockchain technology, which raises great interest among the stakeholders
and several enterprises. Due to this interest, it has become a technology that
is welcomed in enabling the automation of digital processes among the
parties to be verifiable and enforceable.
Smart contracts have their own blockchain accounts and addresses,
which is why they are sometimes referred to as “independent agents”.
In order to complete the predetermined criteria, the contract may gain
ownership of tokenized assets while designating the contributor as the
employee. IoT and financial services are just two of the many areas that the
smart contract has the potential to change. Smart contracts are frequently
used on a blockchain network to carry out and advance aims, such as:
BIIOT ARCHITECTURE
The blockchain composite layer is used in this design as a distributor
between IoT and industrial applications. This design offers the following
two important advantages: user access to blockchain-based services and an
idea from the IIoT’s fundamental layers. The blockchain composite layer is
used to provide heterogeneity to the lower layers and sufficient API in order
to support industrial demands. Therefore, the concept made possible by the
blockchain composite layer can help reduce the difficulty of creating
industrial applications. The five sublayers of the blockchain composite
layer’s descriptions are also displayed. In a typical IoT architecture and
framework, the subscheme layer concept from bottom to top is used.
The perception layer allows various IoT devices to sense and collect data
from their immediate ambiances. These devices include actuators, sensors,
RFID tags, controllers, and smart meters.
The communication layer helps to build an industrial network. Many IoT
devices can connect by using the WAP–Wi-Fi Access Point, Base Station
(BS), Macro BS, and gateways for IoT. Several communication protocols,
including Near Field Communications (NFC), Bluetooth, Wireless Highway
Addressable Remote Transducer (WirelessHART), and Low Power Wide
Area Networks (LPWAN) techniques with LoRa, Sigfox, industrial
Ethernet, and Narrowband IoT (NB-IoT), are capable of connecting IoT
sensors.
A variety of industrial applications can be broadly maintained by using
IoT. The food sector, manufacturing, smart grid, and supply chain are
among the common industrial applications.
Deployment of BIIoT
It is difficult to save the whole blockchain at IIoT nodes due to imitation
IIoT nodes. The real BIIoT distribution is of maximum importance. There
are two types of storage: partial storage and complete storage. With partial
storage, just a portion of the information blocks are locally kept.
Lightweight nodes is another name for partial storage nodes. Complete
storage saves the entire blockchain. Complete nodes refer to entire storage
nodes (such as edge servers and cloud servers). Since storing many
complete blockchains requires a lot of storage space and current processing
power to overcome consensus problems, a complete node has enough
processing power. Alternatively, IoT devices with limited resources are
small devices that guarantee transaction faithfulness without extracting.
IIoT devices perform the swap of partial blockchain information through
D2D connections, and it is referred to as direct communication with the
IIoT devices. Also, the IIoT devices can transfer the blockchain-based
information that is stored in the edge servers with the help of MBS and
IIoT-based gateways, and this type of communication is referred to as direct
communication among blockchain and IIoT. Hybrid communication
between edge servers and blockchain [11]
Food Sector
BIIoT makes a commodity’s life cycle more visible, especially in the food
sector. Food product traceability (FPT) is essential for ensuring that the
food is protected. The entire food supply chain is guaranteed by FPT along
with IoT. For instance, a company that manufactures food might be
recommended by several suppliers. The entire food manufacturing business
must therefore digitize information from sources. Blockchain technology
can ensure the food’s provenance and tracking capabilities through this
process. An RFID and blockchain-based supply chain platform in China
connects farmers and food producers. The purpose of this system is to make
sure that the food supply chain’s data can be tracked.
Further, blockchain technology can help increase food protection by
making trackable food production more accessible. It demonstrates how
integrating blockchain into the food supply chain can enable clients to trace
the entire process of food production. Researchers have offered a
blockchain application case for the industry of natural coffee in Colombia.
It provides a facility to track the food protection system that is supported by
blockchain technology and electronic product code (EPC) IoT tags.
Through smart contracts, this technology can specifically stop the
interception and disclosure of confidential information. To demonstrate its
effectiveness, a model of the proposed architecture has been put into action.
Smart Manufacturing
The manufacturing sector is moving from mechanical to smart techniques.
Big data analytics is crucial to this advancement in the manufacturing
industry. A huge amount of information is produced during each stage of a
commodity’s life cycle, including the procurement of raw materials,
designing, sharing, manufacturing, after-sales repair, and selling of
manufactured goods. However, information aggregation and analytics are
required due to the fragmented nature of the production data. The
interoperability problem is solved by BIIoT by integrating the IIoT-based
systems through P2P networks, which facilitates the sharing of information
among the various industrial sectors. For example, several distributed
blockchains, with each supporting a distinct industry, are commonly
constructed to support diverse industries. Through BIIoT, security in smart
manufacturing can be enhanced [12].
The majority of enhanced firmware is physically installed at IIoT nodes
after being physically imported from a central server. The firmware updates
must be organized in a distributed IIoT, which is expensive and time-
consuming. The work offers a standard firmware upgrade option that uses
blockchain technology and smart contracts. The entire industrial network is
organized around smart contracts that handle firmware improvement
strategies. Smart contracts are implemented by design and can be used by
nodes to install and import firmware hashes. A decentralized blockchain-
based autonomous manufacturing solution was put up to offer stronger
security than the typical centralized architecture. In addition, blockchain
was used to develop a mobile-based crowd-sensing system to address the
issue of information in smart manufacturing.
Healthcare Sector
The rapid development in the field of digital technology plays an important
role in the progress of healthcare services, which has the potential to free
clinical data and offer a more practical means of enhancing healthcare
outcomes and processes. Because hospitals have limited resources,
healthcare services currently face new obstacles. The probability of
developing remote healthcare services is increased by recent developments
in wearable medical technology and big data analytics in healthcare
information. As a result, hospital resources are regularly and effectively
released. For instance, elderly people who live in their homes wear medical
devices on their bodies. These gadgets continuously measure and collect
health data, including blood pressure, heart rate, and sugar level.
Through healthcare networks, medical teams and lab assistants can
access medical information at any time and from any location. However,
using medical data raises concerns about security, privacy, and
confidentiality. Healthcare information confidentiality and safety are
challenged by network heterogeneity and vulnerabilities prevalent in
medical technology. Blockchain-based healthcare network integration can
successfully address issues with healthcare data security and confidentiality.
For instance, blockchain technology might be used to protect healthcare
data stored on cloud servers. Notably, to support real-time patient
observation, the healthcare data generated by medical sensors is on a
routine basis, and based on the smart contract, it is broadcast to the system.
Using blockchains, confidentiality is typically maintained throughout the
entire process.
Digital signatures can identify the owner of healthcare information and
verify the validity of the information. This system can also safeguard the
owner’s right to privacy when it comes to medical information. In order to
offer confidentiality and secrecy, the present effort combines blockchain-
based mobile edge computing with IoT to establish a framework for
controlling in-home therapy. It also provides traceability and possibilities
for patients who have contracted contagious viruses such as COVID-19,
Middle East respiratory syndrome, and severe acute respiratory syndrome.
Notably, patients using IIoT technology can be consecutively tracked in a
manner akin to quarantine while maintaining patient confidentiality.
Automotive Industry
Industry 4.0 refers to the post-digitalization stage that suffers from
cyberattacks and several issues related to safety and operability. Due to
advancements like IIoT integration along with IoT connected to electric,
hybrid, and self-driving smart cars, the automotive industry is one of the
most technologically advanced sectors. These issues have just been
approved for dissemination to the many different parties who participated in
the vehicle’s lifespan. The utilization of enormous sensors and information
technology is made possible by Industry 4.0, which benefits from
developments in several fields, including the expansion of cutting-edge
technologies and the rise in connectivity and computational power.
Multiple services and features are made possible by the expanding
capacities offered by complex diverse linked and autonomous networked
organisms. They do, however, exist due to the danger of malicious assaults
or other dangers, which call for more effective cybersecurity. Furthermore,
open protection is promised when the restricted organisms are based on
vehicle-associated systems, making strong cybersecurity an absolute
necessity. The automotive sector may make use of BIIoT technologies to
alleviate this problem.
Privacy Leakage
There are many protection layers built into blockchain technologies to
prevent unauthorized access to transaction-based reports maintained in
blockchains. Bitcoin transactions are made using IP addresses rather than
actual customer identities, which ensures personal confidentiality. Even
though these protection measures are inconsistent and insufficient, one-time
accounts (OTAs) can be created under Bitcoin to help users maintain their
anonymity. For instance, it has been found that consumer pseudonyms are
regularly broken by inferring from and learning about the various
transactions connected to a single general user. In addition, the entire
blockchain’s transaction data storage space can still have an impact on the
possibility of confidentiality leakage, as noted.
Security Vulnerability
IIoT can increase security through encryption and signature creation by
blockchains. BIIoT continues to work actively on protection due to the
weaknesses of both blockchain and IIoT systems. Building wireless
networks in industrial contexts is becoming more popular since wireless
communication organizations can be measured and are practical. Security
breaches like jamming, submissive overhearing, and recurrent attacks are
caused due to the open wireless channel. Additionally, due to the resource
restraints of IIoT nodes, conventional extreme weighted encryption
methods might not be applicable in the IIoT. In dispersed locations, it can
be difficult to keep an eye on the keys as well.
Resource Constraints
Numerous IIoT nodes with constrained resources are present. RFID tags,
sensors, and smart meters, for instance, have lessened network link ability,
constrained storage, and decreased computational power. Additionally, the
decentralized consensus techniques employed by blockchains typically
consume more energy and need more computational power. For instance, it
has been proven that Bitcoin’s PoW uses a significant amount of electricity.
Therefore, the consensus technique, which necessitates a large power
expenditure, may not be practical for low-energy IIoT nodes. On the other
hand, the sheer volume of blockchain data makes it impractical to
implement blockchains completely across the IIoT. For instance, the size of
blockchain-based Bitcoin had crossed 185 GB by the end of September
2018. An IIoT node cannot fully save the entire blockchain.
Scalability
Scalability limits the usage of the blockchain in the context of extensive
IIoT. It is common practice to measure the quantity of concurrent
workloads, the size of the IIoT nodes, and the throughput of transactions per
second. Failure transaction issues have disappointed many blockchain
initiatives. For instance, Bitcoin’s evolution to seven transactions per
second is demonstrated. PayPal can process 170 transactions per second,
and VISA can produce close to 2000 transactions per second. Due to weak
measurability, the Bitcoin blockchain may not be appropriate for IIoT. As a
result, applications like IIoT that require a high rate of transactions may not
be suitable for current blockchain platforms.
CONCLUSION
The Industrial Internet of Things is now facing many difficulties, such as
inadequate interoperability, heterogeneity, security and confidentiality
flaws, and resource constraints. IIoT challenges can be solved by utilizing
current blockchain technologies, which improve privacy, interoperability,
trackability, safety, and dependability. In order to undertake the
investigation described in this chapter, blockchain and IIoT were combined.
The term “BIIoT” refers to such a marriage of blockchain and IIoT, and this
study conducts a thorough survey of the literature published in this area.
The main topics that have been studied and presented include the Industrial
Internet of Things, blockchain technology, and the Internet of Things. The
chapter also assesses the applications of BIIoT and illustrates BIIoT
architecture. Detailed illustrations of BIIoT-capable applications have been
provided, along with a list of BIIoT open research issues. Due to their high
centralization and single point of failure, IIoT security systems, as they
currently exist, are inefficient. However, IIoT that is based on blockchain is
particularly resistant to external hacking and other threats. The same data is
kept on each blockchain node, so there is no chance of data loss. Future
work will put the BIIoT system into practice and demonstrate it for practical
solutions like on-demand manufacturing and device self-service.
REFERENCES
1. A. AlAbdullatif, K. AlAjaji, N. S. A. Serhani, R. Zagrouba, M.
AlDossary, ‘‘Improving an Identity Authentication Management
Protocol in IIoT”, 2nd International Conference on Computer
Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia,
July 2019.
2. I. Makhdoom, M. Abolhasan, J. Lipman, R. P. Liu, W. Ni, ‘‘Anatomy
of threats to the Internet of Things”, IEEE Communications Surveys &
Tutorials, vol. 21, no. 2, pp. 1636–1675, 2018. DOI: 10.1109/
COMST.2018.2874978.
3. F. Tariq, M. Anwar, A. R. Janjua, M. H. Khan, A. U. Khan, N. Javaid,
‘‘Blockchain in WSNs, VANets, IoTs and Healthcare: A Survey”,
Artificial Intelligence and Network Applications , WAINA 2020.
Advances in Intelligent Systems and Computing, vol. 1150, Springer,
Cham, 2020.
4. H. G. Do, W. K. Ng, ‘‘Blockchain-based System for Secure Data
Storage with Private Keyword Search”, 2017 IEEE 13th World
Congress on Services, Honolulu, HI, 2017. DOI:
10.1109/SERVICES.2017.23.
5. Z. Li, J. Kang, R. Yu, D. Ye, Q. Deng, Y. Zhang, “Consortium
Blockchain for Secure Energy Trading in Industrial Internet of
Things”, IEEE Transactions on Industrial Informatics, vol. 14, no. 8,
pp. 3690–3700, August 2018. DOI: 10.1109/TII.2017.2786307.
6. N. Teslya, I. Ryabchikov, “Blockchain Platforms Overview for
Industrial IoT Purposes”, 2018 22nd Conference of Open Innovations
Association (FRUCT), Jyvaskyla, Finland, pp. 250–256, 2018. DOI:
10.23919/FRUCT.2018.8468276.
7. Q. Lu, X. Xu, ‘‘Adaptable Blockchain-based Systems: A Case Study
for Product Traceability”, IEEE Software, vol. 34, no. 6, pp. 21–27,
November/December 2017.
8. P. K. Sharma, S. Singh, Y.S. Jeong, and J. H. Park, ‘‘Distblocknet: A
Distributed Blockchain-Based Secure SDN Architecture for IoT
Networks”, IEEE Communications Magazine, vol. 55, no. 9, pp. 78–
85, September 2017. DOI: 10.1109/ MCOM.2017.1700041.
9. A. Dorri, S. S. Kanhere, R. Jurdak, ‘‘Towards an Optimized
BlockChain for IoT”, IEEE/ACM Second International Conference on
Internet-of-Things Design and Implementation (IoTDI), Pittsburgh,
PA, June 2017.
10. M. Conti, S. K. E, C. Lal, S. Ruj, ‘‘A Survey on Security and Privacy
Issues of Bitcoin”, IEEE Communications Surveys & Tutorials, vol.
20, no. 4,pp. 3416–3452, 2018. DOI: 10.1109/COMST.2018.2842460.
11. G. Sagirlar, B. Carminati, E. Ferrari, J. D. Sheehan, E. Ragnoli,
‘‘Hybrid-IoT: Hybrid Blockchain Architecture for Internet of Things –
PoW Sub-Blockchains”, IEEE Conference on Internet of Things,
Green Computing and Communications, Cyber, Physical and Social
Computing, Smart Data, Blockchain, Computer and Information
Technology, Halifax, NS, Congress on Cybermatics, 2018.
12. J. Leng, D. Yan, Q. Liu, K. Xu, J. L. Zhao, R. Shi, L. Wei, D. Zhang,
X. Chen, ‘‘ManuChain: Combining Permissioned Blockchain With a
Holistic Optimization Model as Bi-Level Intelligence for Smart
Manufacturing”, Systems Man and Cybernetics: Systems IEEE
Transactions, vol. 50, no. 1, pp. 182–192, 2020.
OceanofPDF.com
3 Utilizing Blockchain and
Interplanetary File System for
Enhanced User Privacy in Secure
Data Sharing
K Balamurugan, M Azhagiri, P A Harsha Vardhini,
Edwin Jijo, and Latha Parthiban
DOI: 10.1201/9781003428886-4
INTRODUCTION
In the current digital era, the proliferation of data sharing across various
platforms and applications has raised significant concerns about user
privacy and data security. Sensitive data integrity and confidentiality are
jeopardized by hacking, data breaches, and unauthorized access of
centralized traditional data storage systems. In response to these challenges,
innovative technologies such as blockchain and the InterPlanetary File
System (IPFS) have emerged as promising solutions for enhancing user
privacy and security in data-sharing environments [1].
Blockchain technology was initially developed as the base infrastructure
for virtual currencies like Bitcoin but has now expanded its range to serve a
variety of purposes, including safe data sharing. In essence, blockchain can
transparently and impenetrably record transactions which is immutable.
Blockchain eliminates the need for intermediates and guarantees data
integrity by spreading data among a network of nodes and using
cryptographic techniques to encrypt transactions. This lowers the possibility
of unauthorized access and manipulation [2].
Complementing blockchain technology, IPFS offers a decentralized
approach to the sharing of files and their storage. As opposed to
conventional file systems, which depend on centralized servers, IPFS
utilizes a peer-to-peer network to distribute and retrieve content in a
distributed manner. Files stored on IPFS are identified by their unique
content hashes, allowing users to access and share data directly from the
network without relying on centralized servers. This decentralized
architecture enhances data availability, resilience, and privacy because there
isn’t a single control or point of failure [3].
By bringing together blockchain with IPFS, organizations can create an
impeccable and privacy-enhancing framework for data sharing. The
combination of blockchain’s tamper-proof ledger and IPFS’s decentralized
file storage provides a robust infrastructure for storing, sharing, and
accessing sensitive data while preserving user privacy. Blockchain
technology ensures the integrity of data transactions, whereas IPFS
facilitates secure and efficient content distribution across the network [4].
Automating access control procedures on the blockchain can further
improve user privacy. Smart contracts are contracts embedded into the
blockchain with preset rules and conditions. Organizations can edit
sensitive information for data sharing [5].
The probability of cyberattacks is lowered by the decentralized structure
of IPFS and blockchain. Because blockchain and IPFS disperse data over a
network of nodes rather than centralized servers, which are vulnerable to
hacking and data breaches, it is far more difficult for malicious activity to
take place. Additionally, using techniques related to cryptography as
encryption and digital signatures enhances the security of data transactions,
further mitigating the risk of unauthorized access [6].
In addition to enhancing user privacy and security, the combination of
blockchain and IPFS offers other benefits for data-sharing environments.
For example, the transparent and immutable ledger of blockchain provides a
verifiable record of data transactions, enhancing accountability and
auditability. Meanwhile, IPFS’s distributed file storage improves data
availability and resilience, ensuring that files can be accessed even in the
event of network disruptions or failures [7].
The Internet of Things (IoT) is quickly changing the industry and
enabling previously unheard-of levels of automation, data analysis, and
collecting by linking gadgets, sensors, and machines to the internet. But as
IoT networks grow in stature and complexity, scalability, security, and
privacy issues confront traditional centralized designs. Blockchain
technology has come in as a potential solution for these issues, improving
the security, privacy, and effectiveness of IoT networks [8].
Originally intended to serve as the foundational technology that
facilitates safe transactions among a network of dispersed nodes,
blockchain reduces the danger by ensuring data integrity and doing away
with the need for intermediaries by recording transactions in an immutable
and tamper-proof manner. Blockchain technology, when combined with IoT
devices, can offer a decentralized and safe architecture for controlling
access control, data transfers, and device IDs in IoT networks [9].
Updated and upgraded security is an important advantage of using
blockchain with IoT. As opposed to systems that store data centrally, which
often collect and monetize user data for targeted advertising or other
purposes, blockchain and IPFS enable users to retain data control. By data
storage on a decentralized network and employing encryption techniques,
blockchain, and IPFS make sure that private and inaccessible information
stays out of the reach of unauthorized people. Conventional IoT designs are
vulnerable to cyberattacks and single points of failure since they frequently
rely on centralized servers for data processing and storing. On the flip side,
blockchain technology uses decentralized data that is dispersed over a
network of nodes, which increases the difficulty of systemic compromise by
malicious actors. Additionally, by guaranteeing that only authorized access
and editing are available on data stored on the blockchain, blockchain’s
cryptographic algorithms and consensus methods improve data security
[10].
Blockchain offers an open and auditable record of data exchanges, and it
strengthens data integrity and trust in IoT networks. Each transaction
recorded on the blockchain is timestamped and cryptographically secured,
making it tamper-proof and verifiable. This transparency and immutability
of data transactions improve accountability and enable stakeholders to trace
the origin and history of data in IoT ecosystems, fostering trust and
reliability [11].
The other key benefit of integrating blockchain with IoT is improved
privacy and data ownership. Traditional IoT architectures often raise
concerns about data privacy, as centralized servers have access to huge
amounts of sensitive information collected from connected devices. By
contrast, blockchain enables users to retain control over their data by
storing it on a decentralized and permissioned network. This gives
assurance that sensitive data are kept private and inaccessible to
unauthorized parties, enhancing user privacy [12].
Blockchain enhances the efficiency and reliability of IoT networks by
enabling automated execution of smart contracts with preset terms and
conditions. By deploying smart contracts in IoT ecosystems, organizations
can automate various processes, such as device provisioning, data sharing,
and payments, thereby reducing manual intervention, minimizing errors,
and improving operational efficiency [13].
Blockchain-based systems have a significant hurdle in transaction and
contract execution performance prohibiting them from competing on a wide
scale with present applications. Evaluation of the performance of
blockchain technology and the metrics linked with it have been the subject
of a significant amount of research. A system’s performance is assessed
using a procedure known as performance evaluation. Many performance
evaluations are based on determining how a change in a dependent variable
affects performance.
The layer-based IoT operation is currently classified into three different
taxonomies: three-, four-, or five-layered architectures. A closer look at all
the taxonomies shows that three layers are the most frequently adopted in
most IoT applications. Therefore, the proposed system considers choosing a
three-layered architecture [14].
The three-layer architecture is shown in Figure 3.1. The application
layer, which defines all IoT applications, is frequently impacted by several
types of infiltration, such as malicious codes and cross-scripting assaults. It
is contingent upon the application’s sensitivity, though. All of the data
received from the IoT device is forwarded using the network layer, which is
also utilized for transmission. This layer hosts the majority of the
communication protocol. There are several ways for interruptions to occur
in these layers, including exploitation and storage. The perception layer is
responsible for extracting the raw sensory data and transmitting it to the
network layer. This layer is typically vulnerable to node capture and
eavesdropping replay attacks. Since the goal of the proposed study is to
create a secure communication scheme, the network and application layers
take care of this [15].
PROBLEM STATEMENT
The hybridization of blockchain with IoT has massive opportunities for
promoting different businesses by enabling secure, autonomous, and data
exchange among interconnected devices. However, many challenges get
delayed for the broad acceptance and successful application of blockchain-
enabled IoT solutions.
Scalability: The exponential growth of IoT devices created essential concerns about
blockchain networks’ scalability. It is difficult for traditional blockchain systems like
Ethereum and Bitcoin to handle large numbers of transactions quickly and cost-effectively. For
blockchain-enabled IoT applications, requiring real-time data processing and transaction
validation to serve a variety of use cases like supply chain management, industrial automation,
and smart cities, this scalability issue presents a major difficulty.
Security and privacy: Although blockchain has inherent security advantages such as
immutability and cryptographic algorithms, IoT devices are susceptible to cyberattacks due to
their limited computing resources and lack of built-in security features. Securing IoT devices
against malware is essential to preserving the security of data in blockchain-powered IoT
network ecosystems. Additionally, preserving user privacy and ensuring compliance with data
protection regulations remain important challenges, especially in applications involving
sensitive personal or industrial data.
Interoperability: The interoperability of blockchain networks and IoT devices is another
critical challenge that controls or stops the various platforms and ecosystems. Increasing the
number of diverse IoT devices targeted in achieving interoperability between blockchain
networks and IoT devices is a difficult task. To deliver common protocols that promote
interoperability and smooth integration of blockchain-enabled IoT solutions across various
industries and use cases, standardization efforts are crucial.
Energy consumption: Blockchain networks require a lot of techniques to secure the network
and validate transactions, especially when using consensus methods based on proof of work
(PoW). This high energy consumption is not sustainable, especially in IoT deployments where
energy-efficient operation is crucial for battery-powered devices and remote sensors.
Addressing the energy consumption of blockchain networks is essential to mitigate
environmental impacts and ensure the feasibility of blockchain-enabled IoT solutions in
resource-constrained environments.
Regulatory compliance: Compliance with regulatory requirements and legal frameworks
poses a significant challenge for blockchain-enabled IoT deployments, particularly in domains
like supply chain management, healthcare, and finance. Regulatory uncertainties regarding
data ownership, liability, and data protection laws obstruct the adoption of blockchain
technology in IoT applications. Clarifying regulatory guidelines and establishing industry-
specific standards are essential to address legal and compliance challenges and have
blockchain-enabled IoT solutions.
MOTIVATION
Blockchain technology and IoT integration have the capacity to completely
transform several industries and tackle important privacy issues. The
motivation behind exploring this convergence stems from several key
factors:
Enhanced security: Traditional centralized architectures for IoT data management are
vulnerable to cyberattacks and prone to single points of failure. By leveraging the
decentralized and tamper-proof ledger of blockchains, IoT ecosystems can enhance data
security by guaranteeing the confidentiality and integrity of data transactions. The idea to
integrate blockchain with IoT lies in modifying security risks and preserving stakeholder trust
by offering an absolute and transparent record of transactions of devices.
Improved privacy: With the proliferation of IoT devices collecting sensitive personal and
industrial data, concerns about data privacy and ownership have become paramount.
Blockchain technology enables users to control their data by providing secure and transparent
access control mechanisms. The idea to integrate blockchain with IoT lies in empowering
individuals and organizations to uphold data ownership.
Autonomous transactions: Through the use of smart contracts, blockchain provides safe,
autonomous transactions between Internet of Things devices without the need for
intermediaries. This removes the requirement for centralized authorities, streamlines
processes, and reduces transaction costs associated with traditional payment systems. The idea
to integrate blockchain with IoT lies in enabling new use cases, business models, and
opportunities for innovation by enabling autonomous transactions and value exchange among
interconnected devices.
Environmental sustainability: To ensure the viability of blockchain-enabled IoT solutions, it
is imperative to access energy requirements, especially in resource-constrained environments.
The idea to integrate blockchain with IoT lies in developing energy-efficient blockchain
consensus mechanisms and protocols that mitigate environmental impacts and enable
sustainable IoT deployments.
RESEARCH OBJECTIVES
To investigate the feasibility and scalability of integrating blockchain technology with the IoT
to conjure data security and privacy in diverse use cases, including smart cities, healthcare,
and industrial automation.
To assess the effectiveness of blockchain-enabled IoT solutions in mitigating security risks and
ensuring data integrity, confidentiality, and availability in IoT ecosystems, with a focus on
identifying vulnerabilities and potential attack vectors.
To evaluate blockchain technology’s impact on enhancing user privacy and data ownership in
IoT deployments, including the implementation of decentralized access control mechanisms
and adherence to laws governing data privacy, like the General Data Protection Regulation
(GDPR).
To explore strategies to improve blockchain and IoT devices interoperability, protocols, and
platforms to facilitate collaboration across heterogeneous environments and ecosystems.
To investigate energy-efficient blockchain consensus mechanisms and protocols suitable for
IoT deployments to minimize energy consumption and environmental impacts while ensuring
the reliability of blockchain-enabled IoT solutions.
To assess the controlling system governing blockchain-enabled IoT deployments, including
liability, and compliance with industry-specific regulations and standards.
To develop and evaluate prototype blockchain-enabled IoT solutions for specific use cases,
demonstrating the possibility, effectiveness, and feasible benefits of integrating IoT and
blockchain.
To identify challenges, limitations, and best practices associated with the integration of
blockchain with IoT and offer suggestions for resolving these issues and optimizing the
advantages of blockchain-enabled IoT systems.
To explore opportunities for innovation and value creation enabled by blockchain-enabled IoT
solutions, including new business models, revenue streams, and opportunities for collaboration
and partnership across industries and sectors.
To provide insights and recommendations for policymakers, industry stakeholders, and
technology innovators on the adoption, implementation, and optimization of blockchain-
enabled IoT solutions to address critical challenges and unlock new opportunities for
innovation and growth.
BLOCKCHAIN IN IOT
Blockchain’s primary innovation is the ability to achieve consensus among
participants without reliance on a central authority. Blockchain technology
makes use of advanced cryptography to provide extra characteristics such
as decentralization, immutability, consensus processes, and smart contracts.
The primary focus of advanced cryptography is the protection of data and
communications. The combination of cryptography and blockchain
technology provides a higher level of security and trust, in addition to
opening new opportunities for a wide range of applications.
Blockchain technology is being used for a variety of purposes, and
although advanced encryption is an essential component, blockchain also
provides a number of other benefits that are entirely unique. Poor network
visibility in an IoT environment is the next security concern. As the number
of devices in IoT is rising exponentially, providing generalized security for
every device is becoming increasingly challenging.
Because of the many IoT devices and dynamic factors, traditional
information technology security approaches require accounting for every
component linked to the network, which is not practical in IoT. There is still
a problem with the link between mobility and security. Figure 3.2 lists the
many types of IoT security vulnerabilities. Another critical security
vulnerability in the IoT context is ignorance among users. It would not be
prudent to assume that users are aware of every possible method of attack
and weak spots in the user environment. Users are less concerned about
security vulnerabilities related to IoT device use and more focused on how
convenient the devices are to use.
FIGURE 3.2 IoT security issues.⏎
REFERENCES
1. Tyagi, A. K., Dananjayan, S., Agarwal, D., & Thariq Ahmed, H. F.
(2023). Blockchain—Internet of Things Applications: Opportunities
and Challenges for Industry 4.0 and Society 5.0. Sensors, 23(2), 947.
2. Issa, W., Moustafa, N., Turnbull, B., Sohrabi, N., & Tari, Z. (2023).
Blockchain-based federated learning for securing internet of things: A
comprehensive survey. ACM Computing Surveys, 55(9), 1–43.
3. Latchoumi, T. P., Swathi, R., Vidyasri, P., & Balamurugan, K. (2022).
Develop new algorithm to improve safety on WMSN in health disease
monitoring. In 2022 International Mobile and Embedded Technology
Conference (MECON) (pp. 357–362). IEEE.
4. Balamurugan, K., Latchoumi, T. P., & Ezhilarasi, T. P. (2022).
Wearables to improve efficiency, productivity, and safety of
operations. In Smart Manufacturing Technologies for Industry 4.0 (pp.
75–90). CRC Press.
5. Abed, S. E., Jaffal, R., & Mohd, B. J. (2023). A review on blockchain
and iot integration from energy, security and hardware perspectives.
Wireless Personal Communications, 129(3), 2079–2122.
6. Hu, H., Xu, J., Liu, M., & Lim, M. K. (2023). Vaccine supply chain
management: An intelligent system utilizing blockchain, IoT and
machine learning. Journal of Business Research, 156, 113480.
7. Latchoumi, T. P., Parthiban, L., Balamurugan, K., Raja, K., Vijayaraj,
J., & Parthiban, R. (2023). A framework for low energy application
devices using blockchain-enabled IoT in WSNs. In Integrating
Blockchain and Artificial Intelligence for Industry 4.0 Innovations
(pp. 121–132). Springer International Publishing.
8. Yazdinejad, A., Dehghantanha, A., Parizi, R. M., Srivastava, G., &
Karimipour, H. (2023). Secure intelligent fuzzy blockchain
framework: Effective threat detection in IoT networks. Computers in
Industry, 144, 103801.
9. Cai, J., Liang, W., Li, X., Li, K., Gui, Z., & Khan, M. K. (2023).
GTxChain: A secure IoT smart blockchain architecture based on graph
neural network. IEEE Internet of Things Journal, 10(24), 21502–
21514.
10. Aroul Anandam, V. V., Latchoumi, T.P., Balamurugan, K., &
Yookesh, T. L. (2020). Improving the energy efficiency in mobile ad-
hoc network using learning-based routing. Revue d’Intelligence
Artificielle, 34(3), 337–343.
11. Arun karthikeyan, K., & Balamurugan, K. (2020). Performance
improvement of Cryo treated insert on turning studies of AISI 1018
steel using multi objective optimization. In 2020 International
Conference on Computational Intelligence for Smart Power System
and Sustainable Energy (CISPSSE) (pp. 1–4). IEEE.
12. Kumar, D., Singh, R. K., Mishra, R., & Daim, T. U. (2023). Roadmap
for integrating blockchain with Internet of Things (IoT) for
sustainable and secured operations in logistics and supply chains:
Decision making framework with case illustration. Technological
Forecasting and Social Change, 196, 122837.
13. Al Hwaitat, A. K., Almaiah, M. A., Ali, A., Al-Otaibi, S., Shishakly,
R., Lutfi, A., & Alrawad, M. (2023). A new blockchain-based
authentication framework for secure IoT networks. Electronics,
12(17), 3618.
14. Sharma, P., Namasudra, S., Crespo, R. G., Parra-Fuente, J., &
Trivedi, M. C. (2023). EHDHE: Enhancing security of healthcare
documents in IoT-enabled digital healthcare ecosystems using
blockchain. Information Sciences, 629, 703–718.
15. Taloba, A. I., Elhadad, A., Rayan, A., Abd El-Aziz, R. M., Salem, M.,
Alzahrani, A. A., ... & Park, C. (2023). A blockchain-based hybrid
platform for multimedia data processing in IoT-Healthcare.
Alexandria Engineering Journal, 65, 263–274.
16. Kumar, P., Kumar, R., Gupta, G. P., Tripathi, R., Jolfaei, A., & Islam,
A. N. (2023). A blockchain-orchestrated deep learning approach for
secure data transmission in IoT-enabled healthcare system. Journal of
Parallel and Distributed Computing, 172, 69–83.
17. Oudani, M., Sebbar, A., Zkik, K., El Harraki, I., & Belhadi, A.
(2023). Green blockchain based IoT for secured supply chain of
hazardous materials. Computers & Industrial Engineering, 175,
108814.
18. Zubaydi, H. D., Varga, P., & Molnár, S. (2023). Leveraging
blockchain technology for ensuring security and privacy aspects in
internet of things: A systematic literature review. Sensors, 23(2), 788.
19. Koe, A. S. V., Ai, S., Chen, Q., Tang, J., Chen, K., Zhang, S., & Li, X.
(2023). Hieraledger: Towards malicious gateways in appendable-
block blockchain constructions for IoT. Information Sciences, 632,
87–104.
20. Khan, A. A., Shaikh, A. A., & Laghari, A. A. (2023). IoT with
multimedia investigation: A secure process of digital forensics chain-
of-custody using blockchain hyperledger sawtooth. Arabian Journal
for Science and Engineering, 48(8), 10173–10188.
21. Sammeta, N., & Parthiban, L. (2022). Hyperledger blockchain
enabled secure medical record management with deep learning-based
diagnosis model. Complex & Intelligent Systems, 8(1), 625–640.
22. Sammeta, N., & Parthiban L. (2021). Medical data analytics for
secure multi-party-primarily based cloud computing utilizing
homomorphic encryption. Journal of Scientific and Industrial
Research (JSIR), 80, 692–698.
23. Sammeta, N., & Parthiban, L. (2022). An optimal elliptic curve
cryptography based encryption algorithm for blockchain-enabled
medical image transmission. Journal of Intelligent & Fuzzy Systems,
43(6), 8275–8828.
24. Sammeta, N., & Parthiban, L. (2023). Blockchain-based scalable and
secure EHR data sharing using proxy re-encryption. International
Arab Journal of Information Technology, 20(5), 702–710.
25. Sammeta, N., & Parthiban, L. (2021). Data ownership and secure
medical data transmission using optimal multiple key-based
homomorphic encryption with hyperledger blockchain. International
Journal of Image and Graphics, 23(3), 2240003.
OceanofPDF.com
Section–II Industrial and societal implications
using blockchain and IoT
OceanofPDF.com
4 Exploration and Review of
Blockchain Technology Used in
Industrial Solutions
Maxraj J and VijayAnanth Suyamburajan
DOI: 10.1201/9781003428886-6
INTRODUCTION
Following a paper titled “A Peer-to-Peer Electronic Cash System,”
published in 2008 by someone under the pseudonym Satoshi Nakamoto,
blockchain technology gained widespread public awareness with the
introduction and use of the Bitcoin network. The blueprint schemes
described in the article are used by many contemporary cryptocurrencies.
The first of numerous blockchain-based apps is Bitcoin.
The various elements of blockchain technology and their key
characteristics that make blockchain a compelling technology can
sometimes make it challenging to understand. Blockchain is in the form of
blocks that create distributed digital ledgers that hold transfers that have
been signed securely in each block. Further, a block itself is
cryptographically linked to the previous block forming a linear chain of
blocks, after validations and undergoing consensus decisions. Because of
this, if the data is altered in one block, its unique identifier will change and
be visible in the next block (providing tamper evidence). All users within
the blockchain can determine whether the data in a prior block has been
altered with this domino effect. A blockchain network offers a robust way
of cooperative recordkeeping because it is challenging to alter or delete.
Blockchain technology at its core combines three mathematical
constructs—cryptography, distributed systems, and game theory—in a
meaningful and elegant way. Blockchain technology has the ability to be
integrated into a wide range of systems, including data registers, digital
identification, manufacturing supply chains, and records management.
CONCLUSION
Blockchain has been a hot topic for several years. It has long been apparent
that the distributed database and record system, first used for Bitcoin, is
capable of much more than just enabling cryptocurrencies. Today,
blockchain is used to build smart contracts that have variables and values
specific to each transaction written directly into the code. It accomplishes
this without the use of an intermediary, which is typically used to mediate
real or electronic contracts between clients and customers.
The fact that blockchain is a decentralized system, which promotes trust
in a digital ecosystem without the need for middlemen, as well as its
transparency, which enables all users to audit transactions and precisely
trace stored data back along the chain to its point of origin, are just a few of
the key benefits that make it appealing for a variety of industries. The
potential for creating new company models is enormous.
Due to the fact that blockchain creates confidence between parties who
might not typically get along, future developments will focus more on
shared goals and collaboration. Where there was no openness before,
blockchain creates it.
Finally, blockchain technology is progressing as many organizations,
like Siemens, are researching various business use cases.
REFERENCES
1. WHO, 2017. “Food Safety.” https://www.who.int/news-room/fact-
sheets/detail/food-safety.
2. “NetNames report on Counting the Cost of Counterfeiting,” n.d.
https://www.yumpu.com/en/document/read/57066883/counting-the-
cost-of-counterfeiting-a-netnames-report.
3. Siemens, n.d. “Blockchain IoT.”
https://xcelerator.siemens.com/global/en/industries/food-
beverage/exclusive-area/blockchain-iot.html.
4. Enterprise, n.d. “FAQ.”
https://www.enterprisecarshare.com/us/en/faq.html.
5. Zipcar, n.d. “Zipcar,” https://www.zipcar.com/.
OceanofPDF.com
5 Harnessing IoT for Effective
Smart Farming
INTRODUCTION
In the future, it is predicted that the influence of the Internet of Things (IoT)
will serve as the primary foundation upon which intelligent computing will
be built. The transition from “traditional technology” to “next generation
everywhere computing” is an important endeavor that must be undertaken
by both private and commercial sectors. The idea of an “Internet of Things”
has recently emerged as one of the most significant topics of conversation
in research groups all around the globe, with a special emphasis placed on
advanced wireless communication technology. IoT is presently having a
significant influence on people in a broad variety of settings all around the
world. IoT is providing the groundwork, from the perspective of the
average user, for the creation of a wide variety of goods, such as intelligent
automation, intelligent living solutions, and intelligent healthcare services.
In addition, it is often used for business reasons across a wide variety of
industries, including manufacturing, transportation, agriculture, and
corporate management, to name a few.
IoT has received the greatest attention and study in the realm of
agriculture more than any other industry. The capacity of this business to
provide food security is one of its most important aspects. This ability is
becoming more important as the world’s population continues to grow at an
alarming rate. Researchers in this discipline first used methods that were
based on ICT (information and communications technology). The
difficulties faced by farmers are not solved by these strategies and are not a
long-term answer to the problem. Researchers are investigating the
possibilities of IoT technology in the agriculture industry as a feasible
alternative to ICT. There are many different applications required for
agricultural goods, such as managing supply chains, maintaining
infrastructure, and monitoring soil moisture, temperature, and moisture
levels in the surrounding environment. The use of IoT technology within
the realm of agriculture has resulted in a new agricultural management
paradigm referred to as “smart farming.” This strategy seeks to maximize
the amount of produce that can be harvested from agricultural land by using
a wide range of technological instruments. Farmers have learned techniques
in order to improve both the quality and quantity of their agricultural
products. Smart farming practices require farmers to make use of many
resources, including fertilizers. It has been noticed that agricultural laborers
are not able to sustain a continuous presence in the field. In addition, it is
conceivable that farmers do not possess the necessary expertise to assess the
ideal environmental conditions for their crops via the use of a variety of
technical instruments, and this is a possibility that should be taken into
consideration. Farmers are given access to an IoT-based automated system
that may function on its own and alert them to any possible issues that may
arise in connection with farming. Because the technology is able to warn
farmers even when they are not physically present in the field, it enables
farmers to more effectively manage many farms and increase their
agricultural production.
By the year 2050, the world population is anticipated to reach 9 billion
people. In order to maximize the use of available resources and keep up
with the requirements of a fast growing population, it is essential for the
agricultural industry to make use of applications of IoT. The effects of
global warming on farmers have resulted in significant losses owing to the
increased frequency and severity of extreme weather events. However, the
deployment of the IoT smart farming application provides a method to
offset these losses by allowing farmers to rapidly adapt to changing weather
conditions. This enables farmers to save more money. Researchers have
provided a quantum of analysis of the relevance of smart farming as well as
the possible future uses of IoT.
LITERATURE REVIEW
IoT makes use of mobile devices such as smartphones to obtain data
wirelessly from other mobile devices and to monitor the activity of living
organisms such as plants and animals. Farmers are able to estimate output
levels and evaluate weather conditions with the widespread use of sensors
and gadgets in their operations. In the realms of water harvesting, flow
monitoring and management, crop water needs assessment, supply
scheduling, and water conservation, IoT is finding an increasing amount of
use. Through the usage of sensors and cloud connection that is provided by
a gateway, remote monitoring of the water supply and status can be carried
out. This monitoring is performed in accordance with the particular
demands that are placed on the soil and plants. It is not possible for farmers
to do manual monitoring of each plant in order to treat nutrient deficits,
eliminate pests, or prevent illnesses. In spite of this, the use of IoT
technology has been shown to be helpful, and it has provided farmers with
the opportunity to attain a new level of success in contemporary agriculture.
The expansion of IoT technology in recent years has brought about
substantial advantages for the agricultural business, especially with respect
to its connection infrastructure. The combination of smart devices, remote
data collecting, the utilization of sensors and vehicles via the use of mobile
devices and the internet, cloud-based intelligent analysis and decision-
making, and the automation of agricultural activities have all been vital
components of this phenomenon. The agricultural industry has undergone a
great change as a result of the skills that have been developed in areas such
as resource optimization, climate change effect mitigation, and crop yield
improvement.
For the purpose of collecting and sending agricultural data throughout
different development phases, researchers have suggested several methods,
strategies, and instruments. These approaches, techniques, and tools vary
according to the kind of crop and area. For the purpose of data collection
and dissemination, a number of different firms provide communication
tools, sensors, robots, huge machinery, and drones. Food and agricultural
agencies, in addition to other governmental organizations, are working
together to set standards and procedures for the use of technology in the
preservation of the quality of food and the environment. There are several
methods, including photoelectricity, electromagnetics, conductivity, and
ultrasound, that are used in the process of analyzing the texture and
structure of the soil, as well as its nutrient content, vegetation, humidity,
vapor, air, temperature, and other elements linked to this topic. According to
the findings of earlier studies, data collected by remote sensing may be
employed to recognize crop varieties, categorize different kinds of pests and
weeds, ascertain levels of stress in soil and plant conditions, and monitor
levels of dryness.
The general health of a plant may be affected by a number of elements,
including the amount of moisture in the soil, the availability of nutrients,
the intensity of the light, the humidity, the amount of precipitation that falls,
and the color of the leaves. The plants are being watched while the
temperature and light conditions are kept at their ideal levels, and just a
small amount of microirrigation is being applied. A wide variety of sensors
are employed in order to detect a myriad of properties. According to the
conclusions of the investigation, it has been noticed that the sensor is able
to detect changes that are greater than a predefined threshold. This is
something that has been seen. When the predetermined limit is breached,
the sensor starts communicating the changes it has noticed with the
microcontroller. The microcontroller will subsequently conduct the
necessary actions in accordance with the predetermined protocol until the
parameter reaches the level that is considered to be ideal [1].
A wide variety of sensors, such as those for temperature, humidity, soil
patterns, airflow, location, carbon dioxide, pressure, light, and wetness, are
routinely used in sensing systems. According to findings from earlier
studies, the appropriateness of sensors for use in agricultural settings is
dependent on a number of important features, including but not limited to
dependability, storage capacity, mobility, robustness, breadth, and
computational effectiveness. The usage of wireless sensors has developed
into an essential component in the gathering of data pertaining to crops and
the presentation of supplementary information. The integration of different
kinds of sensors with more complex agricultural gear and equipment may
be adapted to meet the particular demands of a given application in a
manner that is completely customizable.
The exploitation of satellite images has the ability to unearth differences
in crop yield and soil quality that are influenced by the topographical
elements that are located in the surrounding area. In order to obtain precise
management of the production ingredients that boost productivity and
effectiveness, such as seeds, fertilizers, and pesticides, this goal must first
be accomplished. One of the oldest methods used in agriculture is the
practice of producing crops in a controlled environment, also known as
smart farming. Some practices were seen to become more prevalent in
nations that had more severe weather conditions during the course of the
20th century. When crops are grown inside, their vulnerability to the effects
of the surrounding environment is significantly decreased. The growing of
crops, which was formerly confined to locations with optimum
circumstances, has become possible at any time and any location thanks to
the usage of sensors and communication technologies. The production of
crops in controlled settings is based on a variety of elements including the
design of sheds and materials used to limit wind impacts, aeration systems,
reliable monitoring data, decision-support systems, and other variables
connected to agricultural production. In greenhouse settings, accurate
monitoring of the environment’s many different factors is a substantial
problem. As a consequence of this, a number of different measurement
points are needed in order to make accurate predictions about the numerous
factors required for the regulation and maintenance of the ambient
temperature. An IoT greenhouse makes use of sensors to monitor and
measure inside characteristics such as temperature, light pressure, and
humidity.
Research Hypotheses
There is no significant difference between the application of IoT in smart
farming and better crop management.
There is no significant difference between the application of IoT in smart
farming and site-specific nutrition management.
There is no significant difference between the application of IoT in smart
farming and Support in achieving strategic goals.
Discriminant Analysis
This part of the analysis explores understanding the significant differences
between the independent and dependent variables, for this purpose
discriminant analysis is used. The main objective of using discriminant
analysis is to classify the various mutually exclusive data groups into one
based on the predictor value.
From Table 5.2 it is noted that the mean value of all the independent
variables for agree and strongly agree is more than 4 and their
corresponding standard deviation is less. This shows that most of the
respondents agree with the statement that the application of IoT enables
better crop management, site-specific nutrition management of crops, and
support in achieving the strategic development goals (SDGs)
Based on the analysis, it is noted that the significance value of Wilks’s
lambda is 0.00 (Table 5.3). This shows that the independent variables
possess significant difference to the dependent variable.
The analysis shows that the classification functions are high for the
responses agree and strongly agree for all the independent variables
considered in the study (Table 5.4).
FIGURE 5.1 Canonical discriminant grouping.
From Figure 5.1, it is noted that the model has created a grouping
commonly for the responses agree and strongly agree as they tend to
provide similar responses about the application of IoT in smart farming.
CONCLUSION
In order to meet the issue of rapid global population growth on a shrinking
amount of arable land, there is an urgent need for agricultural production
systems that are both technologically sophisticated and highly efficient. It is
of the utmost importance that people be aware of the significance of
sustainable agriculture in ensuring that there will always be food available.
This research aims to evaluate the elements that impact the view of farming
as a respectable career choice among young people who are inventive and
to investigate the potential of new technologies to improve agricultural
output. Additionally, the study will investigate the factors that influence the
perception of farming as a career choice among older generations. The
focus of this research is on the investigation of various agricultural
technologies, with a specific concentration on IoT, as a method of boosting
agricultural productivity and intelligence in order to satisfy future needs.
Academics and engineers might profit from the highlighting of the
identification of probable future prospects and industrial constraints.
Increasing agricultural productivity requires careful management of every
square inch of field utilizing environmentally friendly sensors and
communication technologies that are based on IoT.
The concepts of data analytics and machine learning are put to use in
order to perform analyses on real-time data. The implementation of
methods that are related to machine learning may be used to perform one of
the most important aspects of crop production, which is the identification of
genes that provide the best results. The use of machine learning in
agriculture entails the prediction of genes that are most suited for
agricultural output. This may be accomplished via the use of computer
programs. This is especially important to keep in mind when picking seeds
that are well suited to the unique environmental conditions of a given
location. The use of algorithms for machine learning has the ability to
recognize things that are in great demand as well as those that are presently
out of supply. Recent developments in machine learning and analytics have
made it possible for farmers to properly classify their crops before
processing them and distributing them to customers.
BIBLIOGRAPHY
1. Adamides, G.; Kalatzis, N.; Stylianou, A.; Marianos, N.;
Chatzipapadopoulos, F.; Giannakopoulou, M.; Papadavid, G.;
Vassiliou, V.; Neocleous, D. Smart Farming Techniques for Climate
Change Adaptation in Cyprus. Atmosphere 2020, 11, 557.
2. Ayaz, M.; Ammad-uddin, M.; Baig, I.; Aggoune, E.M. Wireless
Sensor‘s Civil Applications, Prototypes, and Future Integration
Possibilities: A Review. IEEE Sens . J. 2018, 18, 4–30.
3. Ferrández-Pastor, F.J.; García-Chamizo, J.M.; Nieto-Hidalgo, M.;
Mora-Martínez J. Precision Agriculture Design Method Using a
Distributed Computing Architecture on Internet of Things Context.
Sensors 2018, 18, 1731.
4. Hassan, A.; Aitazaz, A.F.; Farhat, A.; Bishnu, A.; Travis, E. Precision
Irrigation Strategies for Sustainable Water Budgeting of Potato Crop
in Prince Edward Island. Sustainability 2020, 12, 2419.
5. Hernández-Ochoa, I.M.; Gaiser, T.; Kersebaum, K.C.; Webber, H.;
Seidel, S.J.; Grahmann, K.; Ewert, F. Model-Based Design of Crop
Diversification Through New Field Arrangements in Spatially
Heterogeneous Landscapes. A review. Agron. Sustain. Dev 2022, 42,
74
6. Liakos, K.G.; Busato, P.; Moshou, D.; Pearson, S.; Bochtis, D.
Machine Learning in Agriculture: A Review. Sensors 2018, 18, 2674.
7. Muhammad, S.F.; Shamyla, R.; Adnan, A.; Tariq, U.; Yousaf, B.Z.
Role of IoT Technology in Agriculture: A Systematic Literature
Review. Electronics 2020, 9, 319.
8. Potamitis, I.; Rigakis, I.; Tatlas, N.A.; Potirakis, S. In-Vivo
Vibroacoustic Surveillance of Trees in the Context of the IoT. Sensors
2019, 19, 1366.
9. Quy, V.K.; Hau, N.V.; Anh, D.V.; Quy, N.M.; Ban, N.T.; Lanza, S.;
Randazzo, G.; Muzirafuti, A. IoT-Enabled Smart Agriculture:
Architecture, Applications, and Challenges. Appl. Sci 2022, 12, 3396.
10. Reddy, T.; Dutta, M. Impact of Agricultural Inputs on Agricultural
GDP in Indian Economy. Theor. Econ. Lett 2018, 8, 1840–1853.
11. Shi, X.; An, X.; Zhao, Q.; Liu, H.; Xia, L.; Sun, X.; Guo, Y. State- of-
the- Art Internet of Things in Protected Agriculture. Sensors 2019, 19,
1833.
12. Zhmud, V.A.; Kondratiev, N.O.; Kuznetsov, K.A.; Trubin, V.G.;
Dimitrov, L.V. Application of Ultrasonic Sensor for Measuring
Distances in Robotics. J. Phys. Conf. Ser 2018, 1015, 032189.
OceanofPDF.com
6 Blockchain-Based Parking
System Using IoT
S Sahunthala, Latha Parthiban, and R Parthiban
DOI: 10.1201/9781003428886-8
INTRODUCTION
The various components of a smart city are shown in Figure 6.1. These
components are important for creating a smart city, and the Internet of
Things (IoT) is an effective way to handle this.
The IoT evolution is shown in Figure 6.2. It has helped in the machine-
to-machine interface. The main motivation behind the use of IoT is the
integration of devices.
SYSTEM ANALYSIS
This research work helps to facilitate users and admins to park vehicles in a
well-defined method. This study helps to show updates about empty
parking slots in the location chosen by the users. The research uses Arduino
to monitor and control the parking system. The Wi-Fi module ESP8266
NodeMCU is used to communicate between the IoT and the web server.
The web server updates the user about empty parking slots every three
minutes.
Infrared (IR) sensors are affixed to the entry gate and exit gates to sense
objects and when to open the gate. The servomotors collect the signal from
the IR sensors in the entry and exit gates. The IR sensors used in the
parking slots sense the status of the slots and send a signal to Arduino. The
LCD display at the entry gate will display the number of empty and filled
slots in the parking area. Users can check slot status through the web server.
Users can choose to display the status of their desired parking location.
REQUIREMENT SPECIFICATION
Hardware Requirements
The various hardware requirements are shown in Figures 6.4 to 6.8.
FIGURE 6.4 Arduino Uno.⏎
Software Requirements
Tools required: Arduino IDE (Figure 6.9)
IMPLEMENTATION
Modules
Selection of location and area.
Check slot status.
Updating of lots.
Visualization.
Architecture
The architecture represents the overall working of the parking system
(Figure 6.14). It is implemented in two modules: hardware implementation
and web server. Both modules update the status of the parking slots and
display the output on a screen. In the first module, we implement the
hardware component to develop the parking system using the Arduino
board. The Arduino board works as a microcontroller and it controls the
overall system. There is an entrance and exit gate in the parking system that
is used to allow the vehicle to enter the system.
The IR sensors are used to sense the vehicle and to send a signal to the
Arduino about the vehicle’s status. The Wi-Fi module is used to integrate
the Arduino with the web server that updates the parking slot status.
The web server is developed using Arduino IDE, which is used for
updating the parking slot status for users. In the web server, users can select
the location and particular parking area. When the particular area is chosen,
the web server will display the slot status to the users.
The slot details are stored in the database to maintain the records. The
admin can monitor the parking system regularly and update the status every
three minutes. This system will help the user to know the current
availability status and reduce the time to search for parking.
Modules Description
Updating of Slots
This module can be controlled by the admin side. The admin will monitor
the parking area and update the parking slot status every three minutes. The
slot details will be stored in the database server.
Visualization
The generated results are visualized in a web server, which makes the
parking process easier. The web server is monitored and controlled using
the Arduino.
TESTING
Manual Testing
Table 6.1 provides the manual testing of the project and Table 6.2 its
implementation.
SOURCE CODE
Arduino Implementation
REFERENCES
1. Mazlan, Muhammad & A Hamid, Isredza Rahmi and Kamaludin,
Hazalila. ‘Radio Frequency Identification (RFID) Based Car Parking
System’, JOIV: International Journal on Informatics Visualization,
vol. 2, no. 4–2, 2018.
2. Aye, K. Nan, Zin Oo, P. and Naing, W. War. ‘RFID Based Automatic
Multi-storeyed Car Parking System’, International Journal of Science
and Engineering Applications, Vol. 8, no. 07, pp. 172–175, 2019.
3. Abdulkader, Omar, et al. ‘A Novel and Secure Smart Parking
Management System (SPMS) Based on the Integration of WSN,
RFID, and IoT’, 15th Learning and Technology Conference (L&T).
IEEE, 2018.
4. Razinkoval, Anastasia, Chol, Hyun-Chan, and Jeon, Hong-Tae. ‘An
Intelligent Auto Parking System for Vehicle’, International Journal of
Fuzzy Logic and Intelligent Systems, vol. 12, no. 3, pp. 226–231,
2012.
5. Azshwanth, D., Koshy, Mithul Titten and Balachander, T. ‘Automated
Car Parking System’, International Conference on Physics and
Photonics Processes in Nano Sciences, vol. 1362, pp. 1–9, 2019.
6. Patil, M. and Bhonge, V. N. ‘Wireless Sensor Network and RFID for
Smart Parking System’, International Journal of Emerging
Technology and Advanced Engineering, vol. 3, no. 4, pp. 188–192,
2013.
7. DharmaReddy, P., RajeshwarRao, A. and Ahmed, Dr. Syed Musthak.
‘An Intelligent Parking Guidance and Information System by Using
7 Blockchain-Based Online
Attendance Management System
Latha Parthiban, S Sahunthala, and R Parthiban
DOI: 10.1201/9781003428886-9
INTRODUCTION
The practice of marking student attendance is traditionally done using a
logbook. New methods of marking attendance have evolved with
automation. But special care must be taken to store the data safely from
later, unauthorized modification. Many applications use the Internet of
Things (IoT) to capture attendance with biometrics. Parents can access the
attendance of their ward and track a problem if there is an issue. For
scholarships, the government can directly access the data.
A blockchain is made up of a growing list of records called blocks that
are linked by encryption. Many blockchain frameworks have been proposed
to integrate it with industrial advancements. Again integrating it with
federated learning helps it work collaboratively in a distributed
environment.
LITERATURE SURVEY
Avoade et al. [1] created a trusted blockchain environment for managing
data. Androulaki et al. [2] created a Hyperledger fabric for blockchain.
Aazam et al. [3] designed an internet cloud of things and resolved most
problems in integration. Makhdoom et al. [4] proposed methods and
solutions for the use of blockchain. Ramezan et al. [5] proposed a routing
protocol for IoT, and Lim et al. [6] proposed an automated attendance
system using IoT. Arbain et al. [7] presented an attendance system based on
the web. Chintalapati et al. [8] developed a face recognition-based
attendance system. A biometric attendance management system [9, 10] and
blockchain-based attendance system [11, 12–13] have also been developed
and implemented [14, 15] .
By using an employee management system, one can create an identity
profile for an employee. The profile can be managed (e.g., editing, creating,
deleting) in the system. Mostly this type of system is highly secure. If the
employee wants to transfer to another branch, management can help by
sending an application for a branch transfer request. If the employee wants
to apply for leave, they can request it through the system. In a university
environment, faculty become the employees and they can use all the
facilities as shown in Figure 7.1.
SYSTEM ANALYSIS
An online attendance management system was developed with PHP. This
online management system has several modules, including signup, login,
teacher, student, admin, and attendance. In the signup module, the user can
register in the system by providing the required details. For example, the e-
mail column can only be completed with a valid mail ID. The password
should be eight characters long and a combination of uppercase and
lowercase letters. The username and password must not be the same.
In the login module, the user can log in to the online attendance
management system by giving their username and password. In the teacher
module, the teacher can log in with their credentials to mark the daily
attendance of students. In the student module, the student also can log in
with credentials. But they can’t edit the marked attendance. If there is a
mistake in the marked attendance, students can rectify it by informing the
teachers. In the admin module, the admin can also log in by giving their
credentials. They can check attendance status by date, and CRUD (create,
read, update, delete) operations of the student list are performed. The
attendance report counts the presence and absence of students.
The proposed system helps to mark the student’s attendance without any
buffering. Unlike PHP, there is no flexibility when compared to MERN
stack. So, the web application is created with the help of MERN stack
(MongoDb, Expressjs, Nodejs, Reactjs).
Requirements Specification
The use case diagram for the proposed system is provided in Figure 7.2.
The characters involved here are faculty and admin. The setting is to gather
the details from the students and attendance analysis. The analysis is done
using the MERN stack. The class diagram is presented in Figure 7.3 and the
sequence diagram in Figure 7.4.
FIGURE 7.2 Use case diagram.⏎
The data is obtained from the students and analyzed using the two
modules, namely, the Java implementation and Weka analysis. The naive
Bayes algorithm is employed for analysis and the results are visualized.
SYSTEM IMPLEMENTATION
Modules in System Implementation
Faculty module
Admin module
Architecture Diagram
The architecture (Figure 7.6) represents the overall working of the
attendance management process. It is implemented in two modules:
1. Admin module
2. Faculty module
Both modules query the details from the admin and faculty, perform the
attendance process, and generate the results. In the first module, the
researcher created the student list using the MERN stack. The reason to
implement this module is to perform the attendance process. Admin can
manipulate the student details and also check the status of the student by
date. Then the report of the attendance process is also generated by the
admin and the report can be viewed by date.
In the second module, the researcher implements marking student
attendance using the MERN stack. A user interface is created using Reacts
and it is connected with the MongoDB database.
The dataset from the MongoDB database is displayed using the
MongoDB Compass software on the faculty panel page. Then the
attendance is marked by the faculty, and the attendance data is stored in the
attendance collection in the MongoDB database. Then the stored attendance
is viewed as a status on the status page.
Modules Description
Faculty Module
In the faculty module, the web page is designed using the MERN stack.
Details like name, gender, department, date of birth (DOB), year, and
section are obtained from the created student list from the MongoDB.
The student list is displayed along with the date and the faculty chooses
the particular department, year, and section to mark the attendance. Then
the faculty is able to view the attendance status that they marked by the
date.
Admin Module
In the admin module, the web page is designed using the MERN stack.
Details like name, gender, department, DOB, year, and section are stored in
the MongoDB database. Only the admin can create the student list and
manipulate the list. Faculty cannot modify the content of the student list.
The status of the marked attendance is checked and maintained in the
MongoDB database.
The report of the attendance is generated and can be downloaded in the
CSV format.
BACKEND IMPLEMENTATION
INDEX.js
//Middleware app.use(morgan('dev'));
//router
const router1 = require('./SchemaRoutes/StudentRouter');
app.use('/',router1);
const router2 =
require('./SchemaRoutes/AttendanceRouter');
app.use('/Attendance',router2);
//LocalHost
//DB Server Creation
mongoose.connect('mongodb+srv://mohanraj:5683263464@mern
-app- ilfch.mongodb.net/Attendance-
Schema
Student Schema
Name: {
},
Regno : {
type: Number, required: true, trim: true,
min : 100000000000,
max : 999999999999
},
Department : {},
DOB : {
now, required:true
},
Year :{
type: Number, min: 1000,
max: 9999, required:true
},
Gender :
},
Section : {, trim : true
},
});
module.exports = mongoose.model('students', Students);
Router Implementation
Student Router}
});
//GET method with
}});
//BY id
({ "err": err });
}
});
//UPDATE method
router.put('/update', async (req, res) => { try {
const updStu = await students.update({ _id: req.body._id
}, {
$set: {
Name: req.body.Name, Regno: req.body.Regno,
Department: req.body.Department, DOB: req.body.DOB,
Year: req.body.Year, Gender: req.body.Gender, Section:
req.body.Section
}});
res.status(200).json(updStu);
} catch (err) {
res.json({ "err": err });}
});
//DELETE methodrouter.put('/:id',async(req,res) => {
router.delete('/delete/:id', async (req, res) => {
try {
const delStu = await students.remove({ _id:
req.params.id }); res.status(200).json(delStu); } catch
(err) {
); }
});
Admin Panel
import { Modal, ModalHeader, ModalFooter, ModalBody,
Table, Spinner, Row, Col, For mGroup, Input } from
'reactstrap';
import Navbar from '../Navbar' import Axios from
'axios'; import '../../App.css';
import { MDBBtn, MDBIcon, MDBInput } from "mdbreact";
const clearNullProp = (obj = {}) => {
for (const key in obj)
const getDateLabel = (date, format) => { let dateObj =
new Date(date)
if (format === 'slash') return
dateObj.toLocaleDateString() return
dateObj.toDateString()}
const initFilterObj = { Department: '', Year: '',
Section: ''
}
class AdminDashboard
= {
//initial values modal: false, modal1: false, loading:
false, data: [],
editData: [],
_id: "",
Name: "",
Regno: "", Department: "", Year: "",
DOB: "",
Gender: "",
Section: "", isEdit: false, mode: 'update',
filterObj: { ...initFilterObj }
}
this.isCreateClose = this.isCreateClose.bind(this)
this.infoChange = this.infoChange.bind(this)
this.infoSubmit = this.infoSubmit.bind(this)
this.isCreate = this.isCreate.bind(this) }
isCreate() {
this.setState({ modal: true, mode: 'create' });
}
//modal update isUpdate = (data) => {
this.setState({ modal: true,
...data,
mode: 'update'
}) }
//modal close isCreateClose() {
this.setState({ modal: false,
_id: "",
Name: "",
Regno: "", Department: "", Year: "",
DOB: "",
Gender: "",
Section: "",
});
}
//getting all values form DB componentDidMount() {
this.getAll(); } infoChange = event =>
{
}) }
//Create and update functions infoSubmit = event => {
if (this.state._id === null) { let data = {
Name: this.state.Name, Regno: this.state.Regno,
Department: this.state.Department, DOB: this.state.DOB,
Year: this.state.Year, Gender: this.state.Gender,
Section: this.state.Section }
this.create(data)
} else {
let data = {
}
this.create(data) }
this.isCreateClose() }
//Create and Update API call create = data => {
if (!data._id) {
Axios.post("http://localhost:4000/", data).then(res => {
this.getAll()
}) }
else {
Axios.put("http://localhost:4000/update", data).then(res
=> { this.getAll()
}) } }
//GET all Function getAll() {
let { filterObj } = this.state
// clear null properties
filterObj = clearNullProp(filterObj)
Axios.get("http://localhost:4000/", { params: filterObj
}).then(res => { this.setState({
data: res.data
}) }) }
//delete function del = data => {
var option = window.confirm(`Do You Want To Delete
${data.Name}`) if (option) {
Axios.delete(`http://localhost:4000/delete/${data._id}`)
.then(res => {
this.getAll();
}) } }
viewButton() {
if (this.state.mode === 'update') { return (
<MDBBtn color="success" onClick=
{this.infoSubmit}>Update</MDBBtn>)
}
else {
return (
<MDBBtn color="indigo" onClick=
{this.infoSubmit}>Create</MDBBtn>)
} }
modalHead() {
if (this.state.mode === 'update') { return (
<ModalHeader toggle={this.isCreateClose}>Update
Students</ModalHeader>
) }
else {
return (
<ModalHeader toggle={this.isCreateClose}>Creates
Students</ModalHeader>
) } }
// filter operations handleFilterReset = () => {
this.setState({ filterObj: { ...initFilterObj } },
this.getAll) } handleFilterDepartmentFilterChange = (e)
=> {
const { value } = e.target let { filterObj } =
this.state
filterObj = { ...filterObj, Department: value }
this.setState({ filterObj }, this.getAll) }
handleFilterYearFilterChange = (e) => { const { value }
= e.target
let { filterObj } = this.state
filterObj = { ...filterObj, Year: value }
this.setState({ filterObj }, this.getAll)
}
handleFilterSectionFilterChange = (e) => { const { value
} = e.target
let { filterObj } = this.state
filterObj = { ...filterObj, Section: value }
this.setState({ filterObj }, this.getAll)
}
render() {
const { modal, loading, filterObj: { Department, Year,
Section } } = this.state; const isResetRequired =
Department|| Year|| Section
return (
<div>
<div style={{ marginBottom: '90px' }} >
<Navbar />
</div>
<h3 className="text-
center" style={{fontWeight:'bold', marginBottom:"30px"}}
>Students list</h3>
<Row style={{paddingLeft:"20px"}}>
<Col>
<MDBBtn color="cyan" onClick={this.isCreate}><MDBIcon
icon="plus- circle"/> Create</MDBBtn>
</Col>
<Col >
<FormGroup style={{marginTop:"0.6rem"}}> {/* col form
group margin
-top: 0.5rem; changesss */}
<Input type="select" value={Department} onChange=
{this.handleFilter DepartmentFilterChange}
name="departmentFilter" id="departmentFilter">
<option value="" >Select Department
<option value="ARCHI" >Architechture</option>
</Input>
</FormGroup>
</Col>
<Col>
<FormGroup style={{marginTop:"0.6rem"}}>
<Input type="select" value={Year} onChange=
{this.handleFilterYearFi lterChange}
name="departmentFilter" id="departmentFilter">
</Input>
</FormGroup>
</Col>
<Col>
<FormGroup style={{marginTop:"0.6rem"}}>
<Input type="select" value={Section} onChange=
{this.handleFilterSect ionFilterChange}
name="departmentFilter" id="departmentFilter">
<option value="" >Select Section</option>
</FormGroup>
</Col>
<Col>
{isResetRequired && <MDBBtn color="deep- orange"
onClick={this.handleFilterReset}>Reset</MDBBtn>}
</Col>
</Row>
<Table hover striped responsive borderless>
<thead className="thead-dark">
{loading && <Spinner color="success" />}
{this.state.data.length > 0 && !loading ?
this.state.data.map((e, i) => <tr key={e._id}>
<td>{i + 1}</td>
<td>{e.Name}</td>
<td>{e.Regno}</td>
<td>{e.Department}</td>
<td>{getDateLabel(e.DOB, 'slash')}</td>
<td>{e.Year}</td>
<td>{e.Section}</td>
<td>{e.Gender}</td>
<td><a color="warning" href="# " onClick={event => {
this.isUpdate(e) }}><MDBIcon className="icon" data-
toggle="tooltip" title="Edit" color="#xE147" icon="edit"
/></a></td>
<td><a color="danger" href="# " onClick={evevt => {
this.del(e) }}>< MDBIcon className="icon1" data-
toggle="tooltip" title="Delete" far icon="trash-
alt" /></a></td>
</tr>) : <tr><td>{!loading && 'No results found'}</td>
</tr>
}
</tbody>
</Table>
<div>
Backend Implementation
Figure 7.7 presents the snapshot of the application starting and
Figure 7.8 shows the backend implementation using MERN stack.
Figure 7.10 shows the attendance status and the submission of user details
into the MongoDB database for the implementation of the attendance
management system. Figure 7.11 shows the status list of the attendance
system.
FIGURE 7.10 Attendance status.⏎
User Manual
Instructions to Run the Project
Install the Nodejs, MongoDB Compass, VSCode editor.
List of Software
NodeJS
MongoDB Compass
VSCode Editor
REFERENCES
1. G. Ayoade, V. Karande, L. Khan and K. Hamlen, “Decentralized IoT
data management using blockchain and trusted execution
environment”, 2018 IEEE International Conference on Information
Reuse and Integration (IRI), pp. 15–22, 2018.
2. E. Androulaki et al., “Hyperledger fabric: A distributed operating
system for permissioned blockchains”, Proceedings of the Thirteenth
EuroSys Conference, pp. 1–15, 2018.
3. M. Aazam, I. Khan, A. A. Alsaffar and E.-N. Huh, “Cloud of things:
Integrating internet of things and cloud computing and the issues
involved”, Proceedings of 2014 11th International Bhurban
Conference on Applied Sciences & Technology (IBCAST) Islamabad
Pakistan 14th–18th January 2014, pp. 414–419, 2014.
4. I. Makhdoom, M. Abolhasan, H. Abbas and W. Ni, “Blockchain’s
adoption in IoT: The challenges and a way forward”, Journal of
Network and Computer Applications, vol. 125, pp. 251–279, 2019.
5. G. Ramezan and C. Leung, “A blockchain-based contractual routing
protocol for the internet of things using smart contracts”, Wireless
Communications and Mobile Computing, vol. 2018, 2018.
6. T. Lim, S. Sim and M. Mansor, “RFID based attendance system”, 2009
IEEE Symposium on Industrial Electronics & Applications, vol. 2, pp.
778–782, 2009.
7. N. Arbain, N. F. Nordin, N. M. Isa and S. Saaidin, “LAS: Web-based
laboratory attendance system by integrating RFID-ARDUINO
technology”, 2014 2nd International Conference on Electrical
Electronics and System Engineering (ICEESE), pp. 89–94, 2014.
8. S. Chintalapati and M. Raghunadh, “Automated attendance
management system based on face recognition algorithms”, 2013
IEEE International Conference on Computational Intelligence and
Computing Research, pp. 1–5, 2013.
9. P. Wagh, R. Thakare, J. Chaudhari and S. Patil, "Attendance system
based on face recognition using eigen face and PCA algorithms”,
2015 International Conference on Green Computing and Internet of
Things (ICGCIoT), pp. 303–308, 2015.
10. J. A. Badejo, C. C. Eke, S. I. Popoola, T. O. Odu and A. A. Atayero,
“Integrating automated fingerprint-based attendance into a university
portal system”, 2017 International Conference on Computational
Science and Computational Intelligence (CSCI), pp. 1016–1020,
2017.
11. M. A. Islam and S. Madria, “A permissioned blockchain based access
control system for IOT”, 2019 IEEE International Conference on
Blockchain (Blockchain), pp. 469–476, 14–17 July 2019.
12. H. Ardina and I. G. B.B. Nugraha, “Design of a blockchain-based
employee attendance system”, 2019 International Conference on ICT
for Smart Society (ICISS), vol. 7, pp. 1–4, 2019.
13. J. Yang, Z. Lu and J. Wu, “Smart-toy-edge-computing-oriented data
exchange based on blockchain”, Journal of Systems Architecture, vol.
87, pp. 36–48, 2018.
14. Naresh Sammeta and Latha Parthiban, “Data ownership and secure
medical data transmission using optimal multiple key-based
homomorphic encryption with hyperledger blockchain”, International
Journal of Image and Graphics, vol. 23, no. 3, p. 2240003, 2023.
15. Naresh Sammeta and Latha Parthiban, “An optimal elliptic curve
cryptography based encryption algorithm for blockchain-enabled
medical image transmission,” Journal of Intelligent & Fuzzy Systems,
vol. 43, no. 6, pp. 8275–8287, 2022.
OceanofPDF.com
Section–III Blockchain Security in Healthcare
OceanofPDF.com
8 Blockchain and AI in eHealth
K P Revathi and T Manikandan
DOI: 10.1201/9781003428886-11
INTRODUCTION
Constant health monitoring of infants and children is used for evaluation of
their vital parameters to avoid death. Noninvasive sensors are used to
monitor the children. The caretaker or the parents can remotely monitor the
child’s vital parameters. Using a wireless sensor network (WSN), health
parameters can be monitored by sending the data via a communication
medium. Machine learning is used to analyze biomedical signals that are
attained from the sensors to perform medical diagnosis. The machine
learning approach detects the diagnosis with a human-like detection
capability. The smart healthcare monitoring system is used to evaluate the
physiological activities of the infant and child condition. These are used to
monitor remotely in the home or hospital. To track the normal activity and
everyday activity of the child, smart child healthcare monitoring is used.
According to recent research, many researchers have developed flexible and
biointegrated sensors to measure the physiological activity of children.
These biointegrated sensors can stretch, bend, and fold into thin layers.
They are small in size and are compatible with nature. They provide high-
quality detection in measuring vital parameters. They are skin safe. They
are soft, skin-like types with a high resolution of input. Different parameters
that are measured are heart rate, pulse rate, lactose, blood pressure, pH
level, emotional disorder, and hemoglobin level of the child and infant. The
Internet of Things (IoT) is used to connect every node to another within the
network. They are very accurate and used for real-time analysis. IoT plays a
vital role in handling critical situations in healthcare. The behavioral
condition and activity pattern of the child and infant are analyzed. These
vital parameters can constantly monitor the health condition to avoid health
deterioration. Some existing systems have many disadvantages and
limitations in collecting, processing, and analyzing data. To avoid those
limitations, IoT is used in the wireless media to track the physiological and
behavioral analyses simultaneously. In this proposed model, the
biointegrated sensors are used to collect the data of the child. A machine
algorithm is used for gathering the information and to monitor the general
status of their health condition. Tracking the health condition continuously
helps to analyze health deterioration in the data records. Classifying the
health condition of the child continuously can detect the abnormality in
their health condition. Child health monitoring is one of the prominent
factors to check and monitor the constant growth of a child. The proper way
of analyzing the behavioral and physiological parameters of a child for 0–3
years and 6–10 years of age is determined. Children’s healthcare monitoring
provides flexible monitoring of their health conditions. To monitor the
physical activity using the framework, the proposed model is implemented.
This framework provides access to the child’s health data. A wearable
sensor is a new development that is initiated to analyze the health of a child.
In the traditional method, direct supervision is needed for analyzing the
health condition of the child. By using this new methodology, the cost of a
hospital and clinical laboratory can be reduced. It gives a routine check-up
of the child’s health and detects early intervention. Some of the early types
of symptoms such as high fever, sweating, breathing difficulty, and
pneumonia can be detected at an early stage. According to the researchers,
viruses can attack the child by attacking the cells in their body. It can cause
vulnerability to their cells. These viruses show an indication of fever. By
detecting the body temperature abnormality, the hyperthermia can be
analyzed. These non-invasive sensors are biodegradable and are safe and
reliable (Figure 8.1).
FIGURE 8.1 Smart textile type biosensors.
LITERATURE REVIEW
Samira Shamsir et al. [1] wrote a paper that presents the development of
multiple noninvasive sensors to measure physiological parameters using a
smart infant monitoring system. They can evaluate the different vital
parameters such as movement, noise, positioning, temperature, and
humidity. They can also identify the ambient temperature. The acquired
data are processed using the different levels of sensor nodes. In this
proposed model, the system generates alarm signals when a deterioration in
health occurs such as a seizure or apnea. These systems can detect the
critical state of the respiratory system by measuring saturated blood level
and breathing data. These data are analyzed using the machine learning
approach. In this approach, the caretaker can monitor the data by checking
the condition of the patient in a remote location through the wireless
communication medium. These are used in clinical as well as in home-
based environments. Shuai Xu et al. [2] proposed a paper where vulnerable
patients who have neonatal cardiopulmonary can be detected. Detection of
early medical intervention can help the death rate decrease. In the existing
system, these physiological systems require multiple ranges of electrodes.
These electrode wires are linked to which there is a wall-mounted display
of units. In this research, the novelty is the use of wireless and biosensors to
enhance monitoring by reducing generic injuries. These are soft, flexible,
and biotype sensors that are easy and convenient to use. Souri et al. [3]
introduced IoT to monitor the behavioral and physiological conditions of
students. IoT is used for healthcare monitoring where it detects biological
and behavioral parameters of the student. By using the experimental
approach, the results are evaluated where they attain the proper accuracy of
99.1% in the range. Using different machine learning algorithms such as
random forest, decision tree, and neural network, the results are determined.
Abdullah et al. [4] proposed a way to detect lower-back pain. A machine
learning approach was used to assist diagnosing the disease at an early
stage. The significant vital parameters are able to identify the abnormality
in the spinal cord. The data are gathered using the unsupervised learning
approach. Using principal component analysis and the supervised learning
approach, the abnormality in the spinal cord region is determined. From the
comparative analysis, the better performance is evaluated from the KNN
classifier. The KNN classifier has a higher percentage when compared to
the RF classifier approach. Fuentes et al. [5] defined four stages of child
development during which safety and health are important. The child
monitoring system emphasizes the benefits of monitoring health. The
researchers provided the efficiency of the system requirements and different
modules were represented. Joseph et al. [6] proposed a paper about the
body temperature of babies. The main aim of the paper was to ensure that
the temperature is constantly monitored using the smart body temperature
monitoring system. The temperature measures were taken periodically,
especially during the nighttime to identify any irregularity in their
temperature range. This project is a benefit for patients and caretakers as it
reduces their anxiety. Once the body temperature exceeds the threshold
range, the alarm is triggered.
Gupta et al. [7] initiated an efficient way of monitoring the health of
infants using a wearable sensor system and wireless communication. Fully
integrated sensors are used to measure the ECG, CO2, and temperature of
the infant. The wearable sensors set off an alarm or warning signs to
identify the abnormality or sudden infant death syndrome. This system has
some disadvantages:
RELATED WORK
Internet of Things
The Internet of Things (IoT) is a network of objects connected to the
internet. Devices may now transmit sensor data online without human
interaction. IoT incorporates several devices and expands quickly due to its
broad phase. According to predictions, there will be about 26.66 billion IoT
devices operating by 2019 and 75 billion IoT devices available and
wirelessly connected online by 2025. Millions of wearable sensors are
among these connected gadgets, and they are extensively used in healthcare
systems. IoT-related spending reached $737 billion globally in 2016 and
was expected to reach $1.29 trillion by 2020. IoT is a fantastic industry with
tremendous growth potential. Control, real-time monitoring, and
independence or autonomous work and efficiency are all functions of IoT.
IoT tries to make life easier, and people frequently invest in products that
make their lives easier. This may be one of the primary reasons why IoT is
so popular. As a result, the number of IoT applications is increasing across
numerous industries. IoT was incorporated into the child monitoring system
in this study to improve response times and provide parents a better sense of
security.
The IoT’s organizational structure as it relates to medical care
applications aids in integrating the benefits of distributed computing and
IoT innovation with the area of medicine. Additionally, it disperses the
protocols for communicating patient data from various sensors and clinical
devices to a specific medical care organization. The geography of a
healthcare IoT (HIoT) is the overall framework or network of various IoT
medical services that are well-connected in a healthcare environment. A
fundamental HIoT framework consists of the distributor, the representative,
and the endorser. The distributor speaks to a group of connected sensors and
other medical devices that may or may not operate together to record the
patient’s vital information. Circulatory strain, pulse, temperature, oxygen
saturation, ECG, EEG, and other measurements may be included in this
information. The distributor might continually convey this data to a
professional through the company. The dealer is responsible for managing
and storing the collected data on the cloud. Finally, the supporter
appreciates having constant access to and visual representations of the
patient’s data via a mobile device, computer, tablet, etc. When the
distributor notices any physiological oddity or debasement in the patient’s
illness, they can handle this knowledge and offer feedback. A specific
object is committed to each component of the IoT organization and cloud in
the healthcare organization. It is difficult to suggest a widespread
architecture for HIoT since the configuration depends on the interest in and
use of medical care. A HIoT framework has historically embraced a number
of fundamental modifications. While developing another IoT-based medical
care framework for ongoing patient monitoring, it is crucial to drill down
entirely relevant tests associated with the optimal well-being application.
The IoT framework’s outcome significantly depends on how items conform
to the requirements of healthcare providers. The configuration should
adhere to the clinical recommendations and processes in the decision-
making process because every ailment necessitates a complex system of
medical care exercises.
Sensor
Sensors detect stimuli and change it into information. Normal sensors like
the temperature sensor estimate the intensity of an item. Closeness sensors
are used to identify the proximity of objects. Strain sensors ascertain the
pressure applied. Optical sensors can detect light intensity. Humidity
sensors will distinguish the presence of water vapor in the air. Miniature
sensors are intended to gather and transfer data about the climate.
Cloud
Distributed computing implies shared registering assets (networks, servers,
stockpiles, applications, and administrations) are conveyed over the web
from cloud to client. As indicated, the cloud is an interconnected
organization of servers offering types of assistance for individuals or
organizations. The cloud upholds continuous, as a matter-of-fact activity,
handling, investigating, associating, making due furthermore, and getting
IoT gadgets along with applications. What’s more, it decreases cost since
clients are paying in light of utilization without building the physical
foundation. It also permits engineers to make projects quicker. Associations
can likewise get to big data from the cloud. The purpose of the cloud is to
decrease handling trouble on clients. Therefore, various devices such as
PCs, smartphones, and other tech-savvy phones are equipped to access
different utility programs, storage, and application development platforms
over the internet.
Wi-Fi Module
The Wi-Fi module is utilized for the process. Since it has Wi-Fi capabilities,
the ESP8266 can either host an application or delegate all Wi-Fi networking
tasks to another application. A newborn’s health condition data will be
automatically uploaded into the cloud storage from linked devices so the
data is available everywhere in the world and is accessible to parents and
doctors during examinations.
GSM Modem
The term “GSM” stand for to Global System for Mobile Communications,
which is used to establish a connection between a mobile device and a GSM
modem. In order to enable connection with the network, GSM modems
need a SIM (Subscriber Identity Module) card, a 12V power source, and a
communication interface like RS232. The GSM modem uses the AT-
Commands to facilitate communication.
METHODOLOGY
Textile Biosensors
Biosensors are highly flexible and user-interactive. They are user-friendly
for the purpose of health monitoring. These devices can simplify the
transmission of signals, minimize delay, and reduce noise. This wearable
health monitoring device is comfortable on the skin and enhances sensing
accuracy from the human body. These stretchable sensors are used to
measure the heart rate by detecting the electrical activity in the heart. These
elastic substrates have photodetectors to emit light from a source on the
surface of the skin.
Heart Rate
The volumetric ranges of variations of blood that is circulated all over the
body are determined using heart rate (also see Table 8.1). Wearable sensors
pay attention to the vital signals of the infant and child. They are small in
size, low in cost, and consume less power. The electrical activity is
measured from the P wave, T wave, and QRS complex. Traditional methods
of using gel electrodes are harmful to children’s skin. To avoid that, textile
electrodes that are highly conductive and flexible are used. The reliable
integration inside the clothing is convenient as it avoids direct contact with
elements and children. Rather than using conventional gel electrodes, the
textile electrodes are used where it is convenient and the signal quality is
comparatively high with the accurate level of beat detection of the heart
rate. The heart rate indicates the change in the emotional stability of the
child or infant by their increase in the heart beat rate per minute.
Hemoglobin
By using the photodiode, the volume and the concentration of hemoglobin
in blood are determined by using the light absorption. Organic types of
sensors are mounted inside, which consist of the photodiode and other
sensors to detect the oxygenation level in the blood. These physical signal
biosensors have motion detection to analyze the movement of the child. The
ambient temperature is attained by using the LM35 sensor. The pH level
and the lactic acid level are measured by using the biosensors. Biosensors
are compatible and are less expensive. The hemoglobin level is used to
identify any abnormality in the volume of the blood.
Sound Sensor
One form of module utilized to hear the baby’s sound is the sound sensor.
Typically, the sound sensor outputs true or false values. The result is 1 if the
sensor hears sound. If not, the value is 0. This allows us to determine if the
infant is sleeping or awake.
Ambient Temperature
The temperature in a room that measures the humidity in the air is called
the ambient temperature. Along with the crucial metrics, the temperature
and humidity of the room are measured. To check if surroundings are warm
or cold to achieve a pleasant temperature state, it is important to take into
account both the temperature and humidity. Heat-sensing devices are
incorporated to measure the environment’s ambient temperature.
CONSTRUCTION
Raw Data Collection
The raw data that are sent from the smart biosensors are integrated using the
wireless communication. By using the wireless network, the raw signal is
attenuated and collected in the cloud storage. The stored data are raw,
unprocessed data. The unprocessed data have to be filtered and processed to
avoid any signal distortion. Signal distortion has to be reduced to avoid the
minimal loss. The child’s data are analyzed according to their physical
conditions. In general, the raw signal has noise distortion and random
interference, which can increase the error percentage.
Data Preprocessing
Raw data are processed to remove the noise distortion in the dataset values.
By preprocessing the data, the format is getting changed in an effective
way. The data are cleansed, encoded, and transformed into the known set of
values by using the preprocessing technique. The unknown set of missing
values data are disrupted accordingly. It changes the data into an
understandable format for further use.
Trained Dataset
The data are trained using the initial dataset and used to help the program.
Each dataset is processed using the training model. The model can label and
enrich the data by increasing the accuracy. To build a trained model, the set
of information is processed. The model is tested and validated according to
their typeset. For prediction purposes, an algorithm is used to train the
model of the dataset. The data are organized according to their trained set of
models.
Data Annotation
Data annotation is used to add the metadata to the dataset. It is mainly used
for labeling the dataset. It cleans up the data by annotating the dataset using
a pipeline method. The machine learning approach is used to train the
model of the dataset, so that the machine can be able to understand its
format. It can make the machine easily understand the format by
memorizing their input patterns.
Data Validation
After training the data, the data gets validated before the transmission
power. It checks whether the data is accurate by analyzing the dataset. The
validated dataset is sent to the actual model to check whether it is free from
error. The quality of the data is checked by validating the dataset. Each
sample data is trained by using the training model by checking the null
values or missing values. It removes the null values or the missing values to
ensure that the data validation is complete. The preceding processes and
flow are featured in Figure 8.2 and Figure 8.3.
FIGURE 8.2 Architecture diagram.⏎
FIGURE 8.3 Flowchart representation.⏎
KNN Classifier
The KNN classifier is a popular machine learning approach used for
classification and regression tasks. In this model, the unlabeled data points
and the existing set of training dataset distances are determined in the
featured set of stored space. It is highly compatible for predicting classes.
The nearest set of data points are validated according to the K value of new
observations. This KNN classifier can allocate the predicted classes
according to class label volume. The optimized set of KNN algorithm
generates a neighbor only with a positive relationship to the requester. It can
evaluate the weight of the adjacent neighbor. The weight of the adjacent
neighbor is determined by using the KNN algorithm by measuring the
distance function. Different types of continuous distance function variables
are used to weight the adjacent neighbor. By using the KNN classifier
algorithm, the distance functions of the test and training data can be
validated. The algorithmic steps to be followed are:
Step 1: Load the dataset of values.
Step 2: After loading the data, initialize the set of values of k.
Step 3: For prediction purposes, use the iterate set of values from 0 to the total range of the
training set of data points.
Step 4: Euclidean distance d(x, y) is used to measure the distance metrics by calculating the
distance between the training data and the test data.
Step 5: After calculating the data, sort the distance in ascending order.
Step 6: Gather the k set of rows from the sorted type of array.
Step 7: Gather the frequent class from each row.
Step 8: After the prediction, the process is returned to the original state.
Blockchain in Healthcare
The distributed and safe method to collect and gather transactions is
provided by blockchain technology. A blockchain stores information and
offers advantages including privacy, interoperability, and audits of an
immutable nature. It uses a digital ledger of transactions that distributes the
networks throughout the computer system to duplicate the complete
network. It creates a chain of immutable blocks using a decentralized,
digital ledger of transactions. The public key and private key are used in the
blockchain technology to verify validity. The storing of a child’s health
information is controlled by blockchains. By using digital transactions, the
application notifies the health records. The decentralized system is used to
eliminate the point of failure or delay in order to eliminate traffic flows. It
can guarantee the information’s scalability and robustness. The signature is
used to identify the user’s identification and to verify the data. The
blockchain can be used to boost scalability by adding more nodes. Data
storage in the cloud server is encrypted by using common cryptographic
techniques. Given the sensitivity of health data records, the digital signature
is authenticated in order to examine user data (Figure 8.4a).
Comparative Analysis
Each dataset is validated by using the performance of the model. By using
the different algorithms, the data are formatted where each data is
normalized ranging from both the positive values and negative values.
Some of them are overfitted and are validated to avoid any set of potential
bias. In the training step process, the predicted value is tested. Different
parameters are validated to attain the train and test values, such as positive
value, precision, and recall, to validate the cross-validations. From the
outcome of the ROC curve, the prediction is validated as it occurs from the
test data values. Some of the data validations are calculated as follows:
Sensitivity = TP
T P +F N
; Specificity = FP
T N +F P
; Precision = TP
T P +F P
; Recall =
TP
T P +F N
;
Accuracy = T N +T P
T N +T P +F P +F N
The dataset is from the Pima Indian research center. Nine attributes
were taken from the children’s vital parameters (Table 8.2). TP is the
number of children who have an abnormality in their vital parameters,
TN is the number of children who are healthy, FP is the number of
children who have an abnormality in their vital condition, and FN is the
number of children who are found to be normal. The features extracted
are ranked according to their evaluation. The evaluated dataset uses each
feature in the context according to the output variable. Based upon the
Pima dataset from the medical records, the number of features is
determined. Both the training dataset and testing dataset are combined for
the predictive results. The feature extraction is used to reduce the number
of features by using the dataset (Figure 8.5a). The dataset is created by
using the new features from the existing features. The results of a
comparison on the basis of accuracy and computational burden are
shown in Figure 8.5b and Table 8.3.
CONCLUSION
The chapter analyzes the smart ways of monitoring child health using
noninvasive sensors. By using textile biosensors, the constant monitoring of
health parameters is detected. Child health monitoring is one of the
prominent factors to check and monitor the constant growth of a child.
Constant monitoring of the system can detect any early abnormalities in
their health conditions. A machine algorithm is used for gathering the
information and to monitor the general status of their health conditions.
These types of physical and smart biosensors are small in size, flexible, low
in cost, and low in power consumption. Everyday monitoring identifies the
behavioral and physiological conditions of an infant or child. The proper
way of analyzing the behavioral and physiological parameters of a child 0–
3 years and 6–10 years of age is determined. In this futuristic approach, the
detection of ailments by analyzing the different diseases can be analyzed.
By using the comparative approach over the dataset of the records, the
random forest method has the highest accuracy at 86% than the two other
algorithms. The machine learning approach is widely used in modern
healthcare applications as it attains precise results and good performance
accuracy.
ACKNOWLEDGMENT
This work was supported by Supervisor T. Manikandan, Department of
Electronics and Communication Engineering, Rajalakshmi Engineering
College, Chennai, India.
REFERENCES
1. S. Shamsir, O. Hassan and S. K. Islam, “Smart Infant-Monitoring
System with Machine Learning Model to Detect Physiological
Activities and Ambient Conditions,” 2020 IEEE International
Instrumentation and Measurement Technology Conference (I2MTC),
2020, pp. 1–6. https://doi.org/10.1109/I2MTC43012.2020.9129295.
2. Xu, Shuai, Alina Rwei, Bellington Vwalika, Maureen Chisembele,
Jeffrey Stringer, Amy Ginsburg and John Rogers. Wireless skin
sensors for physiological monitoring of infants in low-income and
middle-income countries. The Lancet Digital Health. 3, 2021.
https://doi.org/10.1016/S2589-7500(21)00001-7.
3. Souri, Alireza, Marwan Ghafour, Aram Ahmed, Fatemeh Safara, Ali
Yamini and Mahdi Hoseyninezhad. A new machine learning-based
healthcare monitoring model for student’s condition diagnosis in
Internet of Things environment. Soft Computing. 24, 2020.
https://doi.org/10.1007/s00500-020-05003-6.
4. A. A. Abdullah, A. Yaakob and Z. Ibrahim. “Prediction of Spinal
Abnormalities Using Machine Learning Techniques,” 2018
International Conference on Computational Approach in Smart
Systems Design and Applications (ICASSDA), 2018, pp. 1–6.
https://doi.org/10.1109/ICASSDA.2018.8477622.
5. G. S. Fuentes and G. L. D. Intal, “E-healthcare: Child Monitoring
Health System (CHMS) with SMS Functionality,” 2020 IEEE 7th
International Conference on Industrial Engineering and Applications
(ICIEA), 2020, pp. 842–846.
https://doi.org/10.1109/ICIEA49774.2020.9101976.
6. A. A. Joseph, T. H. L. Xuan, K. Kipli, K. L. Chin and N. S. Song.
“Smart Body Temperature Monitoring system for Children via
Mobile,” 2018 International Conference on Computational Approach
in Smart Systems Design and Applications (ICASSDA), 2018, pp. 1–6.
https://doi.org/10.1109/ICASSDA.2018.8477613.
7. Sakshi Gupta, Zarnain M. Khan, Rupali Srivastava, P. A. Chougule.
“Infant Monitoring System Using Multiple Sensors,” International
Journal of Research in Engineering and Technology, 2016. eISSN:
2319-1163 | pISSN: 2321-7308.
8. Ibrahim, Dina, Mohammad Ali Hammoudeh, Sadaf Ambreen and Sajid
Mohammadi. Raspberry Pi-based smart infant monitoring system.
International Journal of Engineering Research and Technology. 12,
2019, pp. 1723–1729.
9. Krishana Tupe, Vinod Jandrao, Sachin Chappe, Pawankumar
Bhusalwad and A. V. Turukmane. “Child health care monitoring using
sensor technology,” International Research Journal of Engineering
and Technology (IRJET). 4(3), 2017, p-ISSN: 2395-0072.
10. Alam, Md, M. Rahman and Mohammad Rahman. “A Random Forest
based predictor for medical data classification using feature ranking,”
Informatics in Medicine Unlocked. 15, 2019, p. 100180.
https://doi.org/10.1016/j.imu.2019.100180.
11. Shreelatha, Shreya Pai, Sonal Cynthia Pereira, Tanya Nicole and Ms
Ushadevi A., “Advanced baby monitor,” International Journal of
Internet of Things, 6(2), 2017, pp. 51–55.
https://doi.org/10.5923/j.ijit.20170602.09.
12. S. P. Patil and M. R. Mhetre. “Intelligent baby monitoring system,”
ITSI Transactions on Electrical and Electronics Engineering, 2(1),
2014, pp. 11–16.
13. Andre G. Ferreira, D. Fernandes, Sérgio Branco, J. Monteiro, J.
Cabral, A. Catarino and A. Rocha “A smart wearable system for
sudden infant death syndrome monitoring,” IEEE International
Conference on Industrial Technology (ICIT), 2016.
https://doi.org/10.1109/ICIT.2016.7475060.
14. Mairo Leier and G. Jervan “Miniaturized wireless monitor for long-
term monitoring of newborns,” 14th Biennial Baltic Electronic
Conference (BEC), 2014. https://doi.org/10.1109/BEC.2014.7320589.
15. Suresh, B., P. Ramaprasad, M. Mariyam and J. Abdul. “Advanced
baby care system,” SSRG International Journal of Electronics and
Communication Engineering, 2(10), 2015, SSRGIJECE. ISSN: 2348
8549.
16. Chanakya Mothukuri and K. CH. Prathap Kumar, “Patient
monitoring system,” International Journal of Science and Research.
2(2), 2013, ISSN: 23197064.
17. R. Palaskar, S., A. Pandey, A. Telang, A. Wagh and R. M. Kagalkar,
“An automatic monitoring and swing the baby cradle for infant care,”
International Journal of Advanced Research in Computer and
Communication Engineering. 4(12), 2015, pp. 187–189.
18. Harper, M., and Maxine R. Blea. “Automatically rocking baby
cradle,” US3769641, Date: November. 6, 1973.
19. Revathi, K. P., T. Manikandan. “IOT based shrewd monitoring
framework for children safety,” ECS Transactions. 107(1), 2022, pp.
13967–13975.
20. Wesseler, M. E., R. Saatchi and D. Burke. “Child-friendly wireless
remote health monitoring system,” In 2014 9th International
Symposium on Communication Systems, Networks & Digital Sign
(CSNDSP) (pp. 198–202). IEEE, 2014, July.
21. Aldahiri, Amani, Bashair Alrashed and Hussain Walayat. “Trends in
using IoT with machine learning in health prediction system,”
Forecasting. 3, 2021, pp. 181–207. 10.3390/forecast3010012.
22. Sadhana, Tiwari and Sonali Agarwal. “Data stream management for
CPS-based healthcare: A contemporary Review,” In IETE Technical
Review, 2021. https://doi.org/10.1080/02564602.2021.1950578.
23. Jeevan, Kharel and Haftu Tasew Reda. “Fog-computing based smart
health monitoring system deploying LoRa wireless communication,”
In IETE Technical Review, 2019.
https://doi.org/10.1080/02564602.2017.1406828.
24. Jabbar, W. A., H. K. Shang, S. N. I. S. Hamid, A. A. Almohammedi,
R. M. Ramli and M. A. H. Ali. “IoT-BBMS: Internet of things-based
baby monitoring system for smart cradle,” In IEEE Access. 7, 2019,
pp. 93791–93805. https://doi.org/10.1109/ACCESS.2019.2928481.
25. Uddin, Shahadat, Arif Khan, Md Hossain and Mohammad Ali Moni.
“Comparing different supervised machine learning algorithms for
disease prediction,” BMC Medical Informatics and Decision Making.
19, 2019. https://doi.org/10.1186/s12911-019-1004-8.
26. Wei, Ding, Yukari Nagai, Liu Jing and Guo Xiao. “Designing
comfortable smart clothing: For infants’ health monitoring,”
International Journal of Design Creativity and Innovation. 7, 2018,
pp. 1–13. https://doi.org/10.1080/21650349.2018.1428690.
27. Binu, P. K., V. Akhil and V. Mohan. “Smart and secure IOT based
child behaviour and health monitoring system using hadoop,” 2017
International Conference on Advances in Computing,
Communications and Informatics (ICACCI), 2017, pp. 418–423.
https://doi.org/10.1109/ICACCI.2017.8125876.
28. Ahmed, I. U., N. Hassan and H. Rashid. “Solar powered smart
wearable health monitoring and tracking device based on GPS and
GSM technology for children with autism,” 2017 4th International
Conference on Advances in Electrical Engineering (ICAEE), 2017,
pp. 111–116. https://doi.org/10.1109/ICAEE.2017.8255337.
29. Zhu, Zhihua, Tao Liu, Guangyi Li, Tong Li and Yoshio Inoue. 2015.
“Wearable sensor systems for infants,” Sensors. 15, 2015, pp. 3721–
3749. https://doi.org/10.3390/s150203721.
30. Revathi, K. P. and T. Manikandan. “A smart and secured approach for
children’s health monitoring using machine learning techniques
enhancing data privacy,” IETE Journal of Research. 69(3), 2023, pp.
1210–1221. https://doi.org/10.1080/03772063.2022.2150697
OceanofPDF.com
9 Blockchain-Driven Solutions for
IoT Data Security in Healthcare
P K Jawahar, S Mubeena, V Jean Shilpa, R Anitha,
and S Anusooya
DOI: 10.1201/9781003428886-12
INTRODUCTION
Recently, the trends and technology advancements of the Internet of Things
(IoT) have made it possible for automation, data collection, and analytics in
numerous industries. Communication between physical devices is made
possible via the IoT, for example, using sensors for the collection and
exchange of data with other devices over the internet. The hub connects
various devices, gathers real-time data, analyzes it, and shares it locally.
The applications of IoT include smart water and smart healthcare level
monitoring, smart solar panels, smart home, smart waste management, and
smart agriculture.
The Internet of Things makes it possible for the connectivity of
inventory materials, over the Internet; information can be delivered or
received. IoT has an impact on a variety of technologies, including
embedded systems, artificial intelligence sensors, and real-time analysis.
Smart devices can gather information and transmit it to perform specific,
everyday life tasks. Smart cities, networked healthcare systems, intelligent
transportation systems, and various other IoT applications are now
accessible. IoT implementation in the medical sector is centered on a
variety of sensors, medical devices, AI, diagnostic tools, and high-tech
imaging equipment [1].
After the data has been connected to the control systems and collected
from the sensors near or on patients, it is transmitted to the health
monitoring unit. The cloud is used to store data, which helps manage the
amount of data while preserving security. Since it is challenging to encrypt
data from minimal-resource devices, security is a vital aspect of IoT. When
data is sent from the sensor to the cloud, there is a chance that its integrity
and confidentiality will be compromised. Due to its distributed nature, the
cloud is the best option for storing health information that is simple for
clinicians to gain access to while providing care for patients who reside far
away. IoT and cloud use real-time processing, which increases complexity
[2].
IoT is a bulk of networks that connect devices that are recognized,
verified, and linked through cloud servers under the server–client paradigm,
needing a huge amount of computing power and storing space.
Additionally, communication between the devices must happen over the
internet regardless of how close they are to one another. Although this
approach works well for small IoT systems, it cannot be scaled. It is
expensive to set up a large number of communication connections, run
centralized clouds, and connect the complete equipment for large-scale IoT
networks [3].
LITERATURE REVIEW
Sun et al. [3] propose storing medical data in the blockchain, which may be
made secure and impenetrable by developing associated smart contracts.
The plan leverages attribute-based access management to allow dynamic
and granular access to that data. Additionally, IPFS technology is
implemented into this system to decrease the storage-related issues on the
blockchain. Tests show that the proposed system in this study ensures not
only the integrity and safe storage of healthcare data but also increases
efficiency when requesting access to that data. Prior to storing medical data
in the blockchain, which may be made secure and impenetrable by
developing associated smart contracts, the plan leverages attribute-based
access management to allow dynamic and granular access to that data.
Ray et al. [1] focus on the Integration of blockchain and IoT technology
as a logical option for creating a distributed IoT-based healthcare system.
This paper discusses e-health and how it is used to assess popular
blockchain consensus techniques. It assesses the blockchain platform’s
suitability for IoT-based electronic healthcare. Several practical application
scenarios are provided to demonstrate how major IoT and blockchain
capabilities could be used to assist healthcare services and ecosystems. It
also provides a health data flow architecture, which unifies blockchain, and
e-healthcare data can be stored, managed, and accessed through IoT.
Control over access to private medical data is possible using a
blockchain technology data sharing permission paradigm. By using smart
contracts, one can dynamically express consent about their health
information and make the information searchable and available to data
requesters. On the Ethereum blockchain, researchers put the idea into
practice and evaluated several data-sharing scenarios. The model for
individual permission for networks that share healthcare information has
been developed as a result of the work by Jaiman and Urovi [4]. According
to the assessment of the solution, such a data exchange architecture offers
data requesters a flexible decision-making strategy regarding data
utilization. The experimental evaluation demonstrates the efficacy of the
suggested approach and its ability to adapt to customized access control
settings in various data-sharing scenarios.
Gadekulla et al. [5] state decentralized, immutable, and traceable
blockchain networks have the potential to reconfigure and revolutionize
current IoT systems and provide them with improved degrees of security. A
fresh paradigm known as BEoT, which combines the Edge of Things (EoT)
with blockchain, was created specifically in conjunction with blockchain
and IoT as a potential mediator for forthcoming services and applications.
The researchers reviewed changes to BEoT technology and examined its
immense potential in a range of application fields. BEoT is used in a range
of commercial applications, such as smart grids, smart houses, smart towns,
and smart healthcare.
Zghaibeh et al. [6] propose SHealth, which offers consumers maximum
autonomy. It takes advantage of smart contracts by means of an easy-to-use
graphical interface to start different requests and questions about, for
example, consultations, diagnostic procedures, prescriptions, medical
interventions, or past experiences with the patient. SHealth is easy to use,
reliable, efficient, secure, and fully automated. The distributed database that
stores the health-related data is accessible to all system participants without
any sort of danger to the data’s integrity. The paper discusses some
scenarios involving the health system covered by SHealth.
Wu et al. [7] present a blockchain-enabled secure transaction network, a
triple subject purpose-based access control (TS-PBAC) paradigm, and
access control with diverse functions and responsibilities in the Internet of
Medical Things (IoMT) scenarios. In an edge computation environment, the
researchers created a local privacy differential (LDP)-based strategy and a
role-based authentication mechanism to grant authorized users fine-
granularity privileges in order to strengthen the security for important
characteristics against an in-house attacker. The experimental findings
demonstrate that the recommended privacy-preserving scheme can protect
patient confidentiality in IoMT environments superior to conventional
access control policies by making reliable and constant access control
selections between information publishers and information requesters with
different purposes.
APPLICATIONS OF IOT
The application of devices and sensors together with a range of
technologies to acquire data from physical objects while interacting with
other layers is one of the two primary uses for IoT devices. The complete
network may be used with the process in connection with a supply-chain
assessment that is proposed due to the RFID chip’s ability to be connected
to the product that needs monitoring and recognized with data that needs to
be supplied. Realistically, the sector will benefit from the ability to
consistently provide accurate information interchange using a variety of
technological combinations.
Telemedicine is very popular and widely used in healthcare as a result of
the growth of IoT technologies. A real-time tracking system for patients’
vital signs and the condition of their rooms is proposed by a smart
healthcare system inside the IoT environment. This system makes use of
four pulse rate sensors, an electrocardiography sensor, a carbon dioxide
sensor, and a carbon monoxide detector to get data from the hospital’s
environment. In each case, the error percentage of the developed scheme is
within a predetermined range. Through a portal, medical staff can access
patient status updates to process and assess the patient’s current condition.
The primary objective of this chapter is to identify the impact and
possibilities of IoT, blockchain, and fog computing in healthcare services.
Blockchain technology has the ability to completely transform how we
share, store, and transmit data by offering a safe and open platform for a
variety of uses. The following text and Figure 9.2 describe the application
of IoT in various fields.
FIGURE 9.2 Application of IoT.⏎
INTRODUCTION TO BLOCKCHAIN
Blockchain is the emerging technology used for data security in
transactions. Each block includes an index number, transaction data, date,
timestamp, and prior hash value. The previous hash function is the
interconnection of the preceding block. The main features of blockchain
technology include decentralization, transparency, security, increased
capacity, authenticity, and immutability. Blockchain is classified into four
different varieties, including consortium, hybrid, private, and public
blockchains.
A distributed ledger technology, or blockchain, can be described as
where data is stored in different blocks using cryptography hashing.
Blockchain allows for a decentralized system that does not require
centralization to transfer data to a specific organization. Blockchain
monitors the exchange of data and maintains a distributed record of all data
transactions across all nodes. Figure 9.3 depicts the basic concept of
blockchain with the number of blocks connected consisting of the present
block hash and previous block hash value.
Types of Blockchains
Blockchain is categorized into four types: public, private, hybrid, and
consortium (Figure 9.5).
FIGURE 9.5 Types of blockchain.⏎
Two main categories of Byzantine failures are arbitrary node failure and
fail-stop failure. Several illustrations of random node failures are:
It does not yield a result.
Draws an incorrect assumption.
Responds with a purposely misleading result.
Replies that various system components get have varying effects.
In a blockchain peer-to-peer (P2P) network, each node maintains a copy of
the entire blockchain ledger, and each new transaction that occurs on the
network is broadcast to all nodes in the network. This ensures that all nodes
have the same version of the blockchain and that all nodes are aware of all
transactions. When a new block is added to the blockchain, each node in the
network verifies the transactions in the block and checks that the block has
been added in a valid way according to the consensus rules of the network.
If the block is valid, it is added to each node’s copy of the blockchain, and
the process continues. Because the network is decentralized, there is no
central authority that controls the blockchain, and transactions can be
validated without the need for intermediaries. This makes the blockchain
P2P network secure and resilient, as it is not vulnerable to a single point of
failure or attack.
PROPOSED WORK
A simulation test is made where a pseudo electronic health care data is
generated and blockchain is applied to each patient’s details. These secured
details are connected in a distributed network using a P2P network. This
P2P is implemented using the Python program. Each node is completely
checked with the available port address for the edge server and the
Byzantine fault tolerance algorithm is implemented in all the nodes. This is
depicted as the model for the proposed work in Figure 9.7.
FIGURE 9.7 Proposed work.⏎
The four phases of the Byzantine fault tolerance algorithm identify the
fault node and resist that particular node. The remaining node prepares
transactions and commits them with high speed. BFT-based blockchain
networks can provide fast transaction processing and ensure the security
and consistency of the network.
CONCLUSION
Many advancements in science and technology have changed the healthcare
sector. Blockchain technology is implemented by using Byzantine fault
tolerance, a consensus process for IoT data security. This project proposes a
modified PBFT, in which the consensus process incorporates the
mechanism for identifying fault nodes and resisting those nodes. The P2P
network using BFT increases the consensus efficiency and performance
speed. By using the BFT algorithm, blockchain transactions on IoT-based
electronic health records are committed to the nodes connected in the
distributed system and the speed of transactions between nodes is increased.
Finally, electronic health record data are stored in edge servers so that the
data storage problem can be reduced.
REFERENCES
1. Ray, P.P., Dash, D., Salah, K. and Kumar, N., 2020. Blockchain for
IoT-based healthcare: background, consensus, platforms, and use
cases. IEEE Systems Journal, 15(1), pp.85–94.
2. Dai, H.N., Zheng, Z. and Zhang, Y., 2019. Blockchain for internet of
things: A survey. IEEE Internet of Things Journal, 6(5), pp.8076–
8094.
3. Sun, Z., Han, D., Li, D., Wang, X., Chang, C.C. and Wu, Z., 2022. A
blockchain-based secure storage scheme for medical information.
EURASIP Journal on Wireless Communications and Networking,
2022(1), pp.1–25.
4. Jaiman, V. and Urovi, V., 2020. A consent model for blockchain-based
health data sharing platforms. IEEE access, 8, pp.143734–143745.
5. Gadekallu, T.R., Pham, Q.V., Nguyen, D.C., Maddikunta, P.K.R.,
Deepa, N., Prabadevi, B., Pathirana, P.N., Zhao, J. and Hwang, W.J.,
2021. Blockchain for edge of things: applications, opportunities, and
challenges. IEEE Internet of Things Journal, 9(2), pp.964–988.
6. Zghaibeh, M., Farooq, U., Hasan, N.U. and Baig, I., 2020. SHealth: A
blockchain-based health system with smart contracts capabilities.
IEEE Access, 8, pp.70030–70043.
7. Wu, G., Wang, S. and Ning, Z., 2021. Blockchain-enabled privacy-
preserving access control for data publishing and sharing in the
internet of medical things. IEEE Internet of Things Journal, 9(11),
pp.8091–8104.
8. Xiao, L., Ding, Y., Jiang, D., Huang, J., Wang, D., Li, J. and Poor,
H.V., 2020. A reinforcement learning and blockchain-based trust
mechanism for edge networks. IEEE Transactions on
Communications, 68(9), pp.5460–5470.
9. Ganesh, D., Seshadri, G., Sokkanarayanan, S., Bose, P., Rajan, S. and
Sathiyanarayanan, M., 2020, October. Autoimpilo: Smart automated
health machine using iot to improve telemedicine and telehealth. In
2020 International Conference on Smart Technologies in Computing,
Electrical and Electronics (ICSTCEE) (pp. 487–493). IEEE.
10. Saha, S., Sutrala, A.K., Das, A.K., Kumar, N. and Rodrigues, J.J.,
2020, June. On the design of blockchain-based access control protocol
for IoT- enabled healthcare applications. In ICC 2020-2020 IEEE
International Conference on Communications (ICC) (pp. 1–6). IEEE.
11. Almakki, R., AlSuwaidan, L., Khan, S., Baig, A.R., Baseer, S. and
Singh, M., 2022. Fault tolerance byzantine algorithm for lower
overhead blockchain. Security and Communication Networks, 2022.
https://doi.org/10.1155/2022/1855238
12. Pang, Z., Yao, Y., Li, Q., Zhang, X. and Zhang, J., 2022. Electronic
health records sharing model based on blockchain with checkable
state PBFT consensus algorithm. IEEE Access, 10, pp.87803–87815.
13. Rastogi, P., Singh, D. and Bedi, S.S., 2022, April. Design of a
Blockcdhain based security algorithm for IoT in healthcare. In 2022
2nd International Conference on Advance Computing and Innovative
Technologies in Engineering (ICACITE) (pp. 2209–2214). IEEE.
14. Sara, A.B., Khadija, S., Abdessadek, A., Khalid, A. and Bouchaib, C.,
2022. Impact of Blockchain technology in healthcare. In ITM Web of
Conferences (Vol. 43, p. 01007). EDP Sciences.
15. Hegde, P. and Maddikunta, P.K.R., 2023. Secure PBFT consensus-
based lightweight blockchain for healthcare application. Applied
Sciences, 13(6), p.3757.
16. Syed, T.A., Alzahrani, A., Jan, S., Siddiqui, M.S., Nadeem, A. and
Alghamdi, T., 2019. A comparative analysis of blockchain architecture
and its applications: Problems and recommendations. IEEE Access, 7,
pp.176838–176869.
17. Pelekoudas-Oikonomou, F., Zachos, G., Mantas, G., Ribeiro, J.,
Bastos, J.M.C. and Rodriguez, J., 2022, September. A scalable
approach of practical Byzantine fault tolerance algorithms for IoMT
blockchains. In 2022 IEEE International Mediterranean Conference
on Communications and Networking (MeditCom) (pp. 124–129).
IEEE.
18. Shahnaz, A., Qamar, U. and Khalid, A., 2019. Using blockchain for
electronic health records. IEEE Access, 7, pp.147782–147795.
19. Venkatesan, A.L. and Kumar, B.S., 2020, December. Role of
Byzantine Fault Tolerance (BFT) in maintaining patient health records
using block chain technology. In 2020 International Conference on
Interdisciplinary Cyber Physical Systems (ICPS) (pp. 1–6). IEEE.
20. Qu, J., 2022. Blockchain in medical informatics. Journal of Industrial
Information Integration, 25, p.100258.
21. Jia, Q., 2021. Research on medical system based on blockchain
technology. Medicine, 100(16), p.e25625.
22. Christo, M.S., Jesi, V.E., Priyadarsini, U., Anbarasu, V., Venugopal,
H. and Karuppiah, M., 2021. Ensuring improved security in medical
data using ecc and blockchain technology with edge devices. Security
and Communication Networks, 2021, pp.1–13.
23. Namasudra, S., Sharma, P., Crespo, R.G. and Shanmuganathan, V.,
2022. Blockchain-based medical certificate generation and
verification for IoT- based healthcare systems. IEEE Consumer
Electronics Magazine.
24. Arul, R., Alroobaea, R., Tariq, U., Almulihi, A.H., Alharithi, F.S. and
Shoaib, U., 2021. IoT-enabled healthcare systems using block chain-
dependent adaptable services. Personal and Ubiquitous Computing,
pp.1–15. https://doi.org/10.1007/s00779-021-01584-7
25. Zivic, N., Ruland, C. and Ur-Rehman, O., 2019, April. Addressing
byzantine fault tolerance in blockchain technology. In 2019 8th
International Conference on Modeling Simulation and Applied
Optimization (ICMSAO) (pp. 1–5). IEEE.
26. Aujla, G.S. and Jindal, A., 2020. A decoupled blockchain approach
for edge-envisioned IoT-based healthcare monitoring. IEEE Journal
on Selected Areas in Communications, 39(2), pp.491–499.
27. Kassab, M., DeFranco, J., Malas, T., Laplante, P., Destefanis, G. and
Neto, V.V.G., 2019. Exploring research in blockchain for healthcare
and a roadmap for the future. IEEE Transactions on Emerging Topics
in Computing, 9(4), pp.1835–1852.
28. Gunanidhi, G.S. and Krishnaveni, R., 2022, February. Improved
security blockchain for IoT based healthcare monitoring system. In
2022 Second International Conference on Artificial Intelligence and
Smart Energy (ICAIS) (pp. 1244–1247). IEEE.
29. Ameta, G.K., Lavanya, P., Sudheer, S., Nagrath, S. and
Chandramauli, A., 2022, April. Blockchain & IoT based smart home
health monitoring system with a natural user interface. In 2022 3rd
International Conference on Intelligent Engineering and Management
(ICIEM) (pp. 867–871). IEEE.
30. Meshcheryakov, Y., Melman, A., Evsutin, O., Morozov, V. and
Koucheryavy, Y., 2021. On performance of PBFT blockchain
consensus algorithm for IoT-applications with constrained devices.
IEEE Access, 9, pp.80559–80570.
OceanofPDF.com
10 Integrating Blockchain in
Healthcare to Secure Data
Selvakumarasamy, Latha Parthiban, B. Hariharan,
and R Parthiban
DOI: 10.1201/9781003428886-13
INTRODUCTION
Blockchain was first developed to supply distributed records of financial
transactions that had been independent of central authorities or any
financial institutions. Developments in blockchain technology have helped
in improving exchanges that involve smart contracts, medical records,
security, and allowing permanent access to data and insurance billing, along
with that delivering a distributed database of transactions.
There are many advantages of blockchain of which the most important
advantage in the medical records industry is that blockchain could also alter
the exchanges between the databases used in healthcare, thus providing
further access to medical records of patients, prescription and drug supply
databases, tracking of devices, and hospital assets, comprising the whole
life cycle of any device that is a part of the blockchain framework.
Allowing access to the medical records of patients is very important to
properly prescribe medication to patients, with blockchain being capable of
histrionically improving the healthcare services infrastructure.
A blockchain comprises records that are arranged in a block structure in
an ordered manner. Each data block comprises a hash that is a unique
identifier (like a digital fingerprint), a hash of the previous block, and
timestamps of recent transactions. Various blocks are linked in
chronological order with this design, and the blocks that are connected are
termed as a blockchain. It’s virtually unfeasible to alter any of the blocks
that are in the chain.
A smart contract is an algorithm that is executed automatically when the
required conditions are satisfied, and it is a distinct unit from the already
existing blockchain technology. The unit of smart contract was included in
Blockchain 2.0 as a significant function, increasing the application and
functions of blockchain beyond the field of cryptocurrency. The fact that
blockchain cryptographically verifies the transactions executed does away
with the possibility of a man-in-the-middle attack, replay, and all other
traditional “device-to-cloud” attacks. With respect to this context, the aim
of this research is to create a blockchain architecture for healthcare to
secure data.
LITERATURE REVIEW
Previous research has highlighted the privacy and security concerns faced
by health organizations and analyzed some of the solutions that could help
solve those issues [1, 2]. The research by Agbo et al. [3] focuses on the
challenges arising from patient-centered interoperability, which includes
standards for data, privacy, and security, scalability, speed, incentives for
blockchain, and blockchain/healthcare governance. Attaran [4] gives an
overview of what Hyperledger fabric is, how it can be used to build
solutions, and how transactions get executed in Hyperledger fabric.
Aste et al. [5] describe blockchain’s concepts and provide a perspective
on its risks and challenges. Other researchers have investigated privacy in
electronic healthcare as a communication-centered issue since the future of
electronic health systems will probably be quite distributed and will need
the interoperability of a lot of subsystems [6, 7–8]. In addition, the papers
also describe the privacy needs related to research for persons other than
patients. Others have also identified the IT-related privacy issues that
occurred in the healthcare industry [9, 10, 11]. Tariq et al. [2] present a
survey on the various challenges and direct issues encountered in security
requirements and smart healthcare of the mentioned domains. They also
discuss the capabilities of blockchain technology as a potential and strong
security measure and analyze different blockchain-based approaches.
Previous studies provide a complete and detailed abstract on blockchain
technology [12, 13, 14, 15–16]. They provide an outline of blockchain
architecture and compare it with some common consensus algorithms that
are used in various blockchains. Efforts have been made to incorporate a lot
of the compelling ideas from the community of professionals and
researchers involved in improving the security and privacy of blockchain
[17, 18, 19, 20, 21]. Scholars have also described how blockchain enables
transactions and related data to be stored in a secure manner and verified
without requiring any central authority [22, 23, 24, 25].
PROBLEM DESCRIPTION
It is quite important that healthcare systems share data in a systematic way.
Also, they should be able to give privacy, increased access and control to
the data, and guaranteed anonymity to the individual using the system. If
there is a scope for less privacy, lower security, and trust handling, the
person would be unwilling to give their sensitive and important information
or even refrain from getting treatment. At present, a lot of healthcare data
systems depend on a central party for managing confidential and sensitive
healthcare data, which can be very susceptible to single-point-of-failure.
However, due to its distributive nature, the technology of blockchain could
alter this dependency. Blockchain can present the ability to solve technical
issues and system attacks in an immutable and distributive way. Along with
this, a record is included to track the ownership and authenticity of data.
Existing System
Before the advancement of present-day technology, the healthcare industry
was dependent on a system based on handwritten, paper medical records.
This paper-based system of medical records was unorganized, inefficient,
and vulnerable to tampering. Also, the system encountered the problem of
redundancy and duplication of data since all the hospitals that the patient
went to had different copies of his or her medical records. The healthcare
sector then shifted to electronic health records (EHRs). These record
systems were then used to store laboratory-based results and clinical
observations. It was recommended that to strengthen the safety of the data
of the patients, breaches be prevented and access to the stored information
be increased. The main aim of EHR systems had been to fix the issues faced
by the healthcare system that was dependent on paper to build a reliable
system that could revolutionize the healthcare industry. They faced the
problems of being unreliable, less secure, lacking interoperability among
hospitals, and less user-friendly. Given that a lot of these EHR systems are
used in different institutions, it was found that the systems had no
universally defined standard.
Proposed System
The primary aim of this research is to integrate blockchain with healthcare
to create a system to ensure that patients’ data is accessed only by
authorized persons and isn’t changed by a third party for malicious reasons.
A blockchain network will be configured to securely store the collected data
using a blockchain framework platform. The patients and healthcare
workers will be a part of the blockchain network deployed as accounts
having access to it and data will be stored after being considered as valid by
the blockchain consensus mechanism. A Graphical User Interface (GUI)
will be designed that allows an authorized user within the network (doctors,
nurses, patients) to view patients’ records.
Requirement Gathering
The collected data is secured after every transaction in the blockchain for
healthcare devices. One of the main sources from which the data will be
collected is from patients’ healthcare device readings. More precisely, data
collected from patient-connected devices will be sent to the blockchain
system as a transaction. If the transaction is considered valid by a node in
the blockchain network, then it will be added as a block to the network. All
nodes (patient/doctor computers) that are part of the network will also be
updated with the new data.
Analysis of Requirements
Functional Requirements
Allow users or patients to register with their Ethereum address.
Allow patient to give permission to doctors to edit their records.
Allow doctors to enter medical reports for patients and attach their digital signature with it.
The patient can view and share their records. No unauthorized person can view the records.
Nonfunctional Requirements
Efficiency requirement: The system should use the available resources and dataset efficiently
to produce fast and accurate results.
Reliability requirement: The software system should be a reliable and easier to handle for both
owners and customers. Since it is a very sensitive application, the software system should be
reliable and not fail in any case. There must be recovery protocols established in order to avoid
such issues.
Implementation requirement: Implementation of the system is done using JavaScript and
solidity, which makes it versatile and flexible to be used in any type of work environment.
Delivery requirement: The complete system is envisioned to be delivered within four to five
months, including an evaluation by the project guide every week.
Data Source
The data for our project was collected from the internet.
Cost Estimation
The researchers will be using an organic type COCOMO model for
approximate cost estimation: KLOC = Thousand lines of code (estimate) =
2
SYSTEM ARCHITECTURE
Figure 10.1 presents the overall blockchain system. The diagram provides
an overall physical arrangement of the blockchain model of the researchers.
The diagram shows how a healthcare worker creates a medical record in the
application, how MetaMask verifies transactions by generating digital
signatures, and how patients can view their medical records from the
application.
FIGURE 10.1 Overall blockchain system.⏎
Figure 10.4 shows the interface to create a new record and Figure 10.5
shows how the record is shared.
Activity Diagram
Figure 10.9b shows various decision paths undergone during system
activity. The activity starts with the patient registration, followed by logging
in as either a doctor or patient, and ends with the patient viewing their
records.
Figure 10.9b Various decision paths during system
activity.⏎
Sequence Diagram
Figure 10.10 shows how the model works. Patients and healthcare workers
are characters in the diagram. The model shows how a patient registers,
views the record updated by the healthcare worker, and that each time a
record is added, and it is stored in the blockchain.
FIGURE 10.10 Sequence model.⏎
MODEL OPERATION
Design of the Database
ER Diagram
The entity relationship (ER) diagram of the researchers’ model (Figure
10.11a) shows the relationship between the patient, healthcare worker, and
blockchain entities. The diagram also includes the attributes for each entity.
The patient and healthcare worker can store as well as request data from the
blockchain.
Figure 10.11a ER diagram.⏎
Relational Model
Figure 10.11b represents how each patient record is stored. The blockchain
can store numerous patient records as well as the updated healthcare records
of the patient.
Figure 10.11b Relational model.⏎
User Interface
Figure 10.12 shows the landing page for the users.
FIGURE 10.12 User interface.⏎
The patient can give permission to the doctor to add a record. The doctor
can add records as shown in Figure 10.13 or create a new record as in
Figure 10.14. The patient can view the record as in Figure 10.15.
Middleware
Ethereum: It is an open-source blockchain that has smart contract functionality and is also
decentralized. It helps in enabling distributed applications and smart contracts which could be
used to be built and run without any interference from a third party, downtime, or fraud.
Ganache: It is a tool that is used for creating your own blockchain for distributed app
development. Ganache can be used during the whole life cycle, which helps in developing,
deploying, and testing any decentralized apps in a safe environment.
Truffle: It is mainly used for contract development, for testing blockchain environments, and is
also an asset pipeline that is used for Ethereum blockchain. It provides a development
framework for creating, designing, and deploying smart contracts for Ethereum.
Visual Studio Code: It is a freeware source-code editor made by Microsoft for Linux,
Windows, and macOS. It has numerous features, including syntax highlighting, debugging,
code refactoring, embedded Git, intelligent code completion, and snippets.
Node.js: It is an open environment used for the development of web applications. Node.js
applications have a library that helps in developing web-based applications.
Web3: It has a lot of libraries that allow you to work with nodes in Ethereum. The nodes can
be either local Ethereum nodes or remote Ethereum nodes of the contract.
Doctors can add a patient’s record after the patient gives permission to
the doctor as in Figure 10.16b.
Integration Testing
Case 1: The patient is registered and doctor can request to add the patient’s records as in
Figure 10.17a.
Case 2: The doctor adds the records, and the patient (Figure 10.17b) can successfully view
them as in Figure 10.18.
Figure 10.17A Register patients.⏎
User Testing
The home page where users can choose the provider/patient is shown in
Figure 10.20.
FIGURE 10.20 Home page.⏎
The doctor can create a new record for a patient with permission as in
Figure 10.21.
Defect Analysis
A fishbone diagram (Figure 10.24) depicts the cause–effect analysis of
defects.
FIGURE 10.24 Fishbone diagram.⏎
Correctness
The output of the modules of the project is accurate. However, the
completeness of information shown depends on the input data.
Reliability
The system can have a failure rate of 0.1 per hour and so a higher reliability.
In case of a service failure, the data and accounts are not lost and can be
retrieved.
Efficiency
For efficient working of the project, a system with a minimum processing
speed of 2.2 GHz and 4GB RAM is required.
Integrity
The integrity of the system security is maintained by the encryption of data
done by blockchain and the digital signatures that are added to each
transaction to verify which user has committed the transaction.
Usability
The project requires someone with a basic understanding of blockchain
technology to use it, and higher knowledge for someone to make changes to
it. Its usability is moderately easy and requires some prior knowledge of
blockchain. The system also displays the interoperability of blockchain
technology with web applications and databases.
The address of the doctor appears with the record when the patient views
them as in Figure 10.26.
FIGURE 10.26 Share records.⏎
No one else can view the record without permission as in Figure 10.27.
RESULT ANALYSIS
The primary aim of the research is to provide a secure system that is the
most trustworthy and if the data stored in the model is dependable and
cannot be changed by anyone else. This blockchain-based system makes
sure that the model maintains this method. Data that is stored in the model
can only be changed by an authorized person. Other than that, the record
data can be accessed only by doctors and patients. Doctors, patients, or any
other person in the system cannot make modifications in the smart contract
unless they have access to it. This makes sure that the information is private
or the record of the patient cannot be accessed by everyone and stays
tamper-proof. The private details of the patient are stored and a hash is
created for the stored patient information. This hash is now stored and can
be used when healthcare workers and patients need it. The hash is secured
cryptographically. This is used to maintain security in our proposed system.
Performance-wise, we used Apache JMeter to evaluate our system. By
using JMeter we simulated 100–500 users (with a period of 10 to 35
minutes) of the model using the system’s different functions. The
throughput of the JMeter is defined as Data/time, that is KB/sec units. It
was observed that when the amount of requests and the users increased,
there was an increase in the throughput in a linear manner. Hence, results
showed that the system worked efficiently. Simulations were run on our
proposed model to analyze the throughput.
The graphical representation of the results are shown in the following
Figure 10.28.
When the transaction number increased, the execution time of the system
increased. These transactions are for the different functions present in the
smart contracts. When a single user uses the system, the functions for
registering patient details, adding patient medical records, and viewing
patient medical records would take 2.29, 4.3, and 3 seconds, respectively.
The execution times increase when 100 users use the system at the same
time.
REFERENCES
1. Ismail Keshta, Ammar Odeh, “Security and privacy of electronic
health records: Concerns and challenges”, Egypt. Inform. J., vol. 22,
no. 2, pp. 177–183, 2021. ISSN 1110-8665
2. Noshina Tariq, Ayesha Qamar, Muhammad Asim, Farrukh Aslam
Khan, “Blockchain and Smart Healthcare Security: A Survey”,
Procedia Com. Sci., vol. 175, pp. 615–620, 2020.
3. C. Agbo, Q Mahmoud, J Eklund, “Blockchain technology in
healthcare: A systematic review”, Healthcare (Switzerland), vol. 7,
no. 2, p. 56, 2019.
4. M. Attaran, “Blockchain technology in healthcare: Challenges and
opportunities”, Int. J. Health. Manag, vol. 15, no. 1, pp. 70–83, 2022.
5. Tomaso Aste, Paolo Tasca, Tiziana Di Matteo, “Blockchain
technologies: The foreseeable impact on society and industry”,
Computer, vol. 50, no. 9, pp. 18–28, 2017.
6. Naipeng Dong, Hugo Jonker, Jun Pang, “Challenges in eHealth: From
enabling to enforcing privacy”, 2018. https://doi.org/10.1007/978-3-
642-32355-3_12
7. W. J. Gordon, C. Catalini, “Blockchain technology for healthcare:
Facilitating the transition to patient-driven interoperability”, Comput.
Struct. Biotechnol. J., vol. 16, pp. 224–230, 2018.
8. L. Coventry, D. Branley, “Cybersecurity in healthcare: A narrative
review of trends, threats and ways forward,” Maturitas, vol. 113, pp.
48–52, 2018.
9. M. Reisman, “EHRs: The challenge of making electronic data usable
and interoperable,” P T, vol. 42, no. 9, pp. 572–575, 2017.
10. S. T. Argaw, N. E. Bempong, B. Eshaya-Chauvin, A. Flahault, “The
state of research on cyberattacks against hospitals and available best
practice recommendations: A scoping review,” BMC Med. Inform.
Decis. Mak., vol. 19, no. 1, pp. 1–11, 2019.
11. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” SSRN
Elect. J., pp. 1–9, 2008. https://doi.org/10.2139/ssrn.3977007
12. G. Jetley, H. Zhang, “Electronic health records in IS research: Quality
issues, essential thresholds and remedial actions,” Decis. Support
Syst., vol. 126, pp. 113–137, 2019.
13. A. Boonstra, A. Versluis, J. F. J. Vos, “Implementing electronic health
records in hospitals: A systematic literature review,” BMC Health
Serv. Res., vol. 14, no. 1, p. 370, 2014.
14. Z. Zheng, S. Xie, H. Dai, X. Chen, H. Wang, “An overview of
blockchain technology: Architecture, consensus, and future trends”,
Proc. - 2017 IEEE 6th Int. Congr. Big Data, BigData Congr, Vol.
2017, pp. 557–564, 2017.
15. C. Pirtle, J. Ehrenfeld, “Blockchain for healthcare: The next
generation of medical records?”, J. Med. Syst., vol. 42, no. 9, p. 172,
2018.
16. A. A. Siyal, A. Z. Junejo, M. Zawish, K. Ahmed, A. Khalil, G.
Soursou, “Applications of blockchain technology in medicine and
healthcare: Challenges and future perspectives,” Cryptography, vol. 3,
no. 1, p. 3, 2019.
17. D. Vujičić, D. Jagodić, S. Randić, “Blockchain technology, bitcoin,
and Ethereum: A brief overview,” 2018 17th Int. Symp. Infoteh-
Jahorina, Infoteh 2018 - Proc., vol. 2018, pp. 1–6, 2018.
18. S. Wang, Y. Yuan, X. Wang, J. Li, R. Qin, F. Y. Wang, “An overview
of smart contract: Architecture, applications, and future trends,” IEEE
Intell. Veh. Symp. Proc., vol. 2018, no. iv, pp. 108–113, 2018.
19. T. T. Kuo, H. E. Kim, L. Ohno-Machado, “Blockchain distributed
ledger technologies for biomedical and health care applications”, J.
Am. Med. Informatics Assoc., vol. 24, no. 6, pp. 1211–1220, 2017.
20. P. Zhang, J. White, D. C. Schmidt, G. Lenz, S. T. Rosenbloom,
“FHIRChain: Applying blockchain to securely and scalably share
clinical data,” Comput. Struct. Biotechnol. J., vol. 16, pp. 267–278,
2018.
21. S. Gupta, M. Sadoghi, “Blockchain transaction processing,” Encycl.
Big Data Technol., pp. 366–376, 2019.
22. G. Wood, “Ethereum: A secure decentralised generalised transaction
ledger. EIP-150 REVISION,” 2017, no. August 1, 2017, p. 33, 2017.
23. N. Atzei, M. Bartoletti, T. Cimoli, S. Lande, R. Zunino, “SoK:
Unraveling bitcoin smart contracts,” in 7th International Conference,
POST 2018 Held as Part of European Joint Conferences on Theory
and Practice of Software, ETAPS 2018 Thessaloniki, Greece, 2018,
pp. 217–242.
24. I. Grishchenko, M. Maffei, C. Schneidewind, “A semantic framework
for the security analysis of ethereum smart contracts,” in Principles of
Security and Trust, 2018, pp. 243–269.
25. Niranjanamurthy, K. Kumar S, A. Saha, D. D. Chahar, “Comparative
study on performance testing with JMeter,” Int. J. Adv. Res. Comput.
Commun. Eng. 5, no. 2, pp. 70–76, 2016.
OceanofPDF.com
Index
A
ABCS, see Advanced Baby Care System
Admin module , 99, 103
Advanced Baby Care System (ABCS) , 121
AES, 54
Ambient temperature, 129
Apache JMeter, 174
Application layer, 7, 44, 141, 142
Arduino board, 85
Arduino IDE, 85
Arduino Uno, 81
Automotive industry, BIIoT in, 37–38
B
Balance attack, 17
BCG, see Boston Consulting Group
BDA, see Big data analytics
BEoT, see Edge of Things with blockchain
BFT, see Byzantine fault tolerance algorithm
BGP hijacking attack, 17
Bigchain, 13
Big data analytics (BDA), 125
BIIoT, 28, 40; see also Industrial IoT (IIoT)
applications
in automotive industry, 37–38
in food sector, 36
in fuel sectors, 38
in healthcare sector, 37
in smart manufacturing, 36
in trade supply chain industry, 38
architecture, 34–35
deployment, 35
open research issues in
privacy leakage, 39
resource constraints, 39
scalability, 39–40
security vulnerability, 39
Biodegradable sensors, 118
Biointegrated sensors, 117
Biosensors, 129
Bitcoin, 3
activity unlinkability, 15
addresses, 3
applications, 11
architecture, 7
attacks, 17–18
solutions, 18–19
issues and challenges, 14–15
miners, 13
open-source bitcoin implementation, 13–14
privacy techniques, 15–16
profile indistinguishability, 16
security, 17
transaction, 3
wallets, 9
Blind Coin, 16
Blockchain, 3, 28, 43, 63, 145; see also individual entries
applications, 20–22
architecture
application layer, 7
consensus layer, 6
contract layer, 6
data layer, 5
network layer, 5
service layer, 7
with IPFS, 54
-based IoT information storage and retrieval, 53–55
blocks, 3, 32, 63
chain, 4
genesis block, 32
structure, 3, 4
consensus algorithms, 9, 33
data management layers, 11, 12
for enhanced security, 53
frameworks, 98
healthcare data systems, 155
in healthcare to secure data
activity diagram, 160, 162
case diagram, 159, 161
class diagram, 160, 161
cost estimation, 157
database design, 163–165
data flow design, 159, 160
data source, 157
functional requirements, 156–157
integration testing, 168–169
interface prototyping, 157–159
McCall’s quality factors, 170–173
middleware, 163
nonfunctional requirements, 156–157
result analysis, 173–174
sequence diagram, 160, 162
unit testing, 166–168
user testing, 169
integration with IoT, challenges and issues, 55–59
complexity, 57
cost, 58
energy consumption, 47, 56–57
enhanced security, 48
improved privacy, 48
interoperability, 47, 57
latency, 56
legacy systems integration, 58
regulatory compliance, 47, 57
scalability, 46–47, 55
seamless interoperability, 48–49
security and privacy, 47, 57
mining, 7–8
selfish mining, 8–9
for patient medical details, 149, 150, 154
peer-to-peer network, 149, 150
performance evaluation, 44
risks, 19–20
smart contracts, see Smart contracts
structure, 146
technology, 42, 43
Corda, 11
digitalizing supply chain for food and beverage industry, 64–65
Fintech, 10
governance, 11
for industries and enterprises, 64
Internet of Things, see Internet of Things (IoT)
supply and chain management, 10
transparency, 146
types
consortium blockchain, 34, 147
hybrid blockchain, 146–147
private blockchain, 34, 46, 146
public blockchain, 34, 46, 146
workflow, 33
Blockchain 1.0, 28
Blockchain 2.0, 154
Blockchain 3.0, 28
Block withholding, 18
Blood pressure sensor, 128
Body temperature
monitoring system, 120
sensor, 128
Boston Consulting Group (BCG), 65
Bribery attacks, 18
Brute force attack, 18
Brute-force password attack, 51
Business layer, 142
Byzantine fault tolerance (BFT) algorithm, 147–149, 151
Byzantine nodes, 8
C
Car sharing, 67
CBM, see Cloud-based manufacturing
Censorship resistance, 17
Chaincore, 13
Child health monitoring, 117, 119, 136
Clique consensus protocol, 148
Closeness sensors, 124
Cloud-based manufacturing (CBM), 28
Coinbase, 16
CoinParty, 16
Coin shuffle, 16
Complete storage, 35
Consensus algorithms, 9
Consensus layer, 6
Consortium blockchain, 34, 147
Contract layer, 6
Corda, 11
Cryptocurrencies, 5
Cyberattacks, 43, 47, 48, 142
D
DAG, see Directed acyclic graph
Dandelion, 16
DAO attack, 17
Data annotation, 130
Data layer, 5
Data preprocessing, 130
Data validation, 130
DdoS attack, 18
Deanonymization, 18
Denial-of-service, 50
DHT, see Distributed hash table
DiceMix, 16
Digital signatures, 37
Digital wallet services, 11
Directed acyclic graph (DAG), 54
Distributed hash table (DHT), 53, 54
Double-spending, 17, 19
Drug machine learning, 124
E
Eavesdropping, 51
Eclipse attack, 17
Edge of Things with blockchain (BEoT), 140
EEG, see Electroencephalography
EHR, see Electronic health record system
Electroencephalography (EEG), 125
Electronic health record (EHR) system, 53, 156
Electronic medical record (EMR), 122
Electronic product code (EPC), 36
Employee management system, 98
EMR, see Electronic medical record
Entity relationship (ER) diagram, 163, 164
EPC, see Electronic product code
ER, see Entity relationship diagram
Ethereum, 13, 34, 163
blockchain, 140
nodes, 165
F
Faculty module, 103
Feather attacks, 18
Finney attack, 18
Fintech, 10
Firmware jacking, 50
Food product traceability (FPT), 36
Food sector, BIIoT in, 36
Fork and withholding attack, 18
Forking, 17, 19
of blockchain, 8
FPT, see Food product traceability
Fuel industry, 38
BIIoT in, 38
G
Ganache, 163
Genesis block, 32
Gold finger attack, 18
Google Maps, 80
Graphical User Interface (GUI), 156
GSM-based child screen framework, 121
GSM modem, 126
GUI, see Graphical User Interface
H
HDG, see Healthcare Gateway
Healthcare
BIIoT in, 37
IoT in, 144, 145
ambient temperature, 129
BEoT technology, 140
blockchain in, 134
blood pressure sensor, 128
body temperature sensor, 128
child health monitoring, 117, 119, 136
cloud, 124
comparative analysis, machine learning algorithm, 134–136
data annotation, 130
data preprocessing, 130
data validation, 130
GSM modem, 126
heart rate, 126, 128
hemoglobin, 128–129
KNN classifier, 119, 133–134
machine learning in, 124–126, 130–132
PIR motion sensor, 129
pulse oximetry, 128
random forest classifier, 133
raw data collection, 129
respiration sensor, 128
sensors, 124
SHealth, 141
sound sensor, 129
support vector machine, 132–133
textile biosensors, 126
trained dataset, 130
vital parameter ranges, 126, 127
Wi-Fi module, 126
to secure data, Blockchain technology
activity diagram, 160, 162
case diagram, 159, 161
class diagram, 160, 161
cost estimation, 157
database design, 163–165
data flow design, 159, 160
data source, 157
functional requirements, 156–157
integration testing, 168–169
interface prototyping, 157–159
McCall’s quality factors, 170–173
middleware, 163
nonfunctional requirements, 156–157
result analysis, 173–174
sequence diagram, 160, 162
unit testing, 166–168
user testing, 169
Healthcare Gateway (HDG), 21
Healthcare IoT (HIoT), 123
Health professionals share electronic health records (HERs), 21
Hemoglobin, 128–129
HIoT, see Healthcare IoT
Humidity sensors, 124
Hybrid blockchain, 146–147
Hydrachain, 13
Hyperledger, 13
Hyperthermia, 118
I
IBM SPSS package, 73
ICT, see Information and communication technology
IDC, see International Data Corporation
Industrial IoT (IIoT); see also BIIoT
blockchain technology, 28
characteristics, 27
consensus techniques, 29
difficulties, 32
Industry 4.0, 28, 37
Information and communication technology (ICT), 32, 70
Infrared (IR) sensors, 81, 85
International Data Corporation (IDC), 30
Internet of Medical Things (IoMT), 141
Internet of Things (IoT), 10, 21, 27, 43, 70, 117, 123; see also individual entries
in agricultural industry, 72
applications
smart agriculture, 144
smart grid, 144
smart healthcare, 144
smart home, 144
smart industry, 144
smart vehicle, 144
telemedicine, 143
battery duration, 30–31
connectivity, 29, 30
critical security vulnerability, 80
difficulty of confidentiality and safety, 31
difficulty of trust approach, 31
evolution, 79, 80
greenhouse, 73
in healthcare, see Healthcare, IoT in
integration with blockchain, challenges and issues, 55–59
complexity, 57
cost, 58
energy consumption, 47, 56–57
enhanced security, 48
improved privacy, 48
interoperability, 47, 57, 58
latency, 56
legacy systems integration, 58
regulatory compliance, 47, 57–59
scalability, 46–47, 55, 58
seamless interoperability, 48–49
security and privacy, 47, 57, 58
layers
application layer, 44, 45, 141, 142
business layer, 142
network layer, 44, 45, 141, 142
perception layer, 44, 45, 141–142
process layer, 141, 142
nodes, 29, 30
obstacles, 30
security issues
brute-force password attack, 51
denial-of-service, 50
eavesdropping, 51
firmware jacking, 50
malicious nodes, injection of, 50
physical escalation, 51
physical tampering, 50
services, 30
smart farming, 71, 73
canonical discriminant grouping, 74, 76
discriminant analysis, 73–74
frequency analysis, 74
group statistics, 74, 75
Wilks’s lambda, 74, 75
sustainability challenge, 31
working, 79, 80
Interoperability, 36, 45, 47, 48, 57, 58
InterPlanetary File System (IPFS), 42, 43, 46, 53, 140
IoMT, see Internet of Medical Things
IoT, see Internet of Things
IPFS, see InterPlanetary File System
K
KNN classifier, 119, 133–134
L
Latency, 56
Lightweight nodes, 35
Local privacy differential (LDP)-based strategy, 141
M
Machine algorithm, 117
Machine learning, 77, 117–119, 136
in eHealth, 124–126, 130–132
Malicious nodes, 50
Merkle trees, 8, 32
MERN stack, 99, 100, 102, 103, 110
MetaMask, 157
MindSphere, 64
Miniature sensors, 124
Mining pools, 8, 11
Mix Coin, 16
MongoDB database, 102, 103
Multichain, 13
N
Nakamoto consensus, 9
Net split, 18
Network layer, 5, 44, 45, 141, 142
Node .j s, 163
O
One-time accounts (OTAs), 39
Online attendance management system
activity diagram, 100, 102
architecture, 99, 101, 103
backend implementation, 104–105, 110, 111
front end implementation, 105–113
modules, 101
admin module, 103
faculty module, 103
node analysis instructions, 111
project instructions, 110
requirements, 100–101
software, 111
system analysis, 99
Openchain, 13
Open-source bitcoin implementation, 13–14
Optical sensors, 124
OTAs, see One-time accounts
P
P2P, see Peer-to-peer
Parking systems, 79
architecture, 85–86
check slot status, 86
hardware requirements, 81–82
location and area selection, 86
modules, 84–85
software requirements, 81, 83
source code
Arduino implementation, 91–93
web server implementation, 93–96
system design, 82–84
testing
for Arduino implementation, 86, 89–90
for hardware requirements, 86, 91
manual testing, 86–88
update slots, 86
visualization, 86
WSN-based secure parking, 80
Partial storage, 35
Passive infrared (PIR) sensor, 121, 129
Patient Monitoring System (PMS), 121
PayPal, 40
PBFT, see Practical Byzantine fault tolerance protocol
“A Peer-to-Peer Electronic Cash System,” 63
Peer-to-peer (P2P) network
speed analysis, 149, 151
work, 149, 150
Perception layer, 44, 45, 141–142
pH level, 129
Physical escalation, 51
Physical tampering, 50
PMS, see Patient Monitoring System
Pooling, 19
Practical Byzantine fault tolerance (PBFT) protocol, 148
Privacy leakage, 39
Private blockchain, 34, 46, 146
Process layer, 141, 142
Public blockchain, 34, 46, 146
Pulse oximetry, 128
Punitive attacks, 18
Q
Quorm, 13
R
Random forest algorithm, 121
Random forest classifier, 133
Raspberry Pi, 121
Raw data collection, 129
Refund attack, 18
Resource constraint, 39
Respiration sensor, 128
Routing attack, 18
RSA, 54
S
Scalability, 39–40, 55
SCM DigiNetwork, 68
SCs, see Smart contracts
Secure Coin, 16
Securing Bitcoin network, 19
Securing wallets, 19
Security vulnerability, 39, 50
Selfish mining, 8–9, 15, 17, 18
Service layer, 7
SHealth, 141
Siemens Energy, blockchain in, 64, 65
automated pay-per-use, 67
blockchain-based smart parking solution, 68
transparency and traceability, 66
Siemens Mobility, 67
Signal distortion, 129
Smart agriculture, 144
Smart city components, 79
Smart contracts (SCs), 28, 33–34, 36, 43, 53, 154
access control policy function, 55, 57
blockchain node function, 55, 56
IPFS, 55, 56
Smart farming, 71, 73
Smart grid, 29, 144
Smart healthcare, 141, 144
Smart home, 144
Smart industry, 144
Smart manufacturing, BIIoT in, 36
Smart textile type biosensor, 118
Smart vehicle, 144
Sound sensor, 129
Strain sensors, 124
Supply chain management, 10, 22
Supply chain (SC) networks, 29
Support vector machine (SVM), 132–133
Sybil attack, 18
T
Telemedicine, 143, 144
Textile biosensors, 126, 136
Time jacking attack, 18
Trade Supply Chain Industry (TSCI), 38
Trained dataset, 130
Transaction malleability, 18
Triple subject purpose-based access control (TS-PBAC) paradigm, 141
Truffle, 163
Trusted third party (TTP), 28
TSCI, see Trade Supply Chain Industry
TS-PBAC, see Triple subject purpose-based access control paradigm
TTP, see Trusted third party
Tumble Bit, 16
U
Ultrasonic sensors, 80
V
Value Shuffle, 16
VISA, 40
Visual Studio Code, 163
W
Wallet security, 17
Waterproof ultrasonic obstacle sensors, 120
Wearable IoT gadget, 121
Wearable sensors, 118, 120, 126
Web3, 165
Web of Things, 125
Weka analysis module, 100
WHO, see World Health Organization
Wi-Fi module, 85, 126
Wi-Fi module ESP8266 NodeMCU, 81
Wilks’s lambda, 74, 75
Wireless sensor network (WSN), 117
World Health Organization (WHO), 118
WSN, see Wireless sensor network
WSN-based secure parking, 80
X
Xim, 16
OceanofPDF.com