Blockchain, whether public or private, is capable enough to maintain the integrity of transactions by decentralizing the records for users. Many IoT companies are using blockchain technology to make the world a better-connected place. Businesses and researchers are exploring ways to make this technology increasingly efficient for IoT services.
This volume presents the recent advances in these two technologies. Chapters explain the fundamentals of Blockchain and IoT, before explaining how these technologies, when merged together, provide a transparent, reliable, and secure model for data processing by intelligent devices in various domains.
Readers will be able to understand how these technologies are making an impact on healthcare, supply chain management and electronic voting, to give a few examples. The 10 peer-reviewed book chapters have been contributed by scholars, researchers, academicians, and engineering professionals, and provide a comprehensive yet easily digestible update on Blockchain on IoT technology.
Author(s): Koyel Datta Gupta, Deepak Kumar Sharma, Rinky Dwivedi, Fadi Al-Turjman
Series: Advances in Computing Communications and Informatics, 4
Publisher: Bentham Science Publishers
Year: 2022
Language: English
Pages: 191
City: Singapore
Cover
Title
Copyright
End User License Agreement
Contents
Preface
ACKNOWLEDGEMENTS
Blockchain Framework for Data Storage and Security
Salman Azeez Syed1,*, Vivaswat Sinha1, Sachin Singh1 and Aarti Goel1
INTRODUCTION
Centralized Database System
Advantages
Disadvantages
Decentralized Database System
Advantages
Disadvantages
BLOCKCHAIN TECHNOLOGY
Bitcoin
What is Blockchain?
Blockchain Architecture
Block
Characteristics of Blockchain
Decentralized
Immutability
Security
Anonymity
Auditability
VERSION CONTROL SYSTEM
Types of Version Control Systems
Local Version Control System (LVCS)
Centralized Version Control System (CVCS)
Distributed Version Control System (DVCS)
DATA STORAGE
Data Storage Frameworks Implementing Blockchain
Sharding
Drawbacks of Sharding In Blockchain
Alternatives to Sharding
Blockchains Using Sharding
P2P NETWORK
Types of P2P Network
Unstructured Network
Structured Network
Hybrid P2P Network
Disadvantages of P2P Network
Layered Structure
Identity Layer
Data Layer
Data-swap Layer
Network Layer
Routing Layer
Consensus Layer
Incentive layer
Libp2p
INTERPLANETARY FILE SYSTEM (IPFS)
IPFS Functionality
Content Addressing
Content Linking
Content Accessibility
Deeper analysis of IPFS: Networking
Implementation of blockchain on IPFS: Filecoin
Structure of the Filecoin Network
Data Storage and Retrieval Protocols
Fault Tolerance
Why the Hype Around Filecoin?
Swarm
BLOCKCHAIN - PRIVACY
Sybil Attack
51% Attack
How Blockchain Implements Data Privacy
Blockchain Privacy Protection
BLOCKCHAIN - SECURITY
A Deeper Dive into Blockchain Security
Hash Chained Storage
Digital Signature
Consensus
Types of Algorithm
Proof of Work (POW)
Some Problems with Blockchain
DISCUSSION
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Blockchain Based Hybrid Framework for Identity Management in Healthcare
Deepak Kumar Sharma1,*, Arjun Khera1, Koyel Datta Gupta2 and Rinky Dwivedi2
INTRODUCTION
BACKGROUND AND RELATED WORK
MOTIVATION
IDENTITY MANAGEMENT: HEALTHCARE SYSTEM
PROPOSED SOLUTION
Architecture
Creation of Records
Master Record
Device Record
Begin
Creation of Identifiers
Claim Chain
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Blockchain in Smart Healthcare Facility
Ayush Kumar Singh1, Nipunika 1 and Deepak Kumar Sharma1,*
INTRODUCTION
Technical Aspects of Blockchain
Applications of Blockchain
Voting
Identity Management
Real Estate Records Management
Traditional Technology in Healthcare
Electronic Health Records
Patient-Generated Data
Technological Requirements in the Industry
Other Challenges
USE CASES
Health Records
Application in EHR
Personal Health Records(PHR)
Successful Implementations
Internet of Medical Things
Challenges Faced in IoMT
Blockchain in IoMT
Clinical Trials
Health Insurance
Smart Contracts to ease insurance claims
Invoicing
E-Invoicing and Blockchain
Large Scale Implementations
Supply Chain Management
Blockchain-based Supply Chain Management
Sustainability
Limitations in Implementation
CHALLENGES
Security
51% Attack
Criminal Smart Contracts
Scalability
Why is Blockchain so Slow?
Managing Storage Capacity
CASE STUDIES
Gem Health Network
MedRec
Technicalities
MedRec 2.0
Guardtime
New Ventures
Medicalchain
Medicalchain Solutions
OmniPHR
Overview
Design
MediBchain
Protocol for Sending Data to the System
FURTHER DISCUSSION
SUMMARY
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Application of IoT in Patient Health Monitoring System
Rinky Dwivedi1,*, Harshit Mittal1, Manik Agarwal1 and Sahil Dwivedi1
INTRODUCTION
RELATED WORK
SYSTEM ARCHITECTURE
A. System Structure
Algorithm 1.
Algorithm 2.
Algorithm 3.
EQUIPMENT DETAILS
PERFORMANCE AND MEASUREMENT
EMERGENCY ALERT
CONCLUSION AND FUTURE SCOPE
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
IoT Based Verified and Public Vehicle Registration through BlockChain: Future Smart Cities based Applications with Sustainable Approach
Rohit Rastogi1,*, Bhuvneshwar Sharma1, Pardeep Kumar2 and Muskan Gupta1
INTRODUCTION
Concept of Smart Cities
Problem of Car Registration and Motivation
Research Objectives
Scope of the Research Work
5-G Technology and Its Implications
IoT and Its Applications in Transportation
Application in Automobile
Usage of AI, ML in IoT and Blockchain
RELATED WORK
Carchain
Fabcar IBM Blockchain
Blockchain and Future of Automobiles
Significance of 5-G Technology
PRESENTED METHODOLOGY
SOFTWARE REQUIREMENT SPECIFICATION
Product Perspective
Similarities between Carchain and our application
Differences Between Carchain and Our Application
System Interfaces
Interfaces (Hardware and Software and communication)
Login/Signup
Main Page
Contact us
Manufacturer
Dealer
Registration Authority
Police
Customer
Hardware Interfaces
Software Interfaces
Ubuntu 20.04
Hyper ledger Fabric v0.20
NodeJsv12.16.0-x64
Docker 19.03.8
Postman 7.24.0
Communications Interfaces
Memory Constraints
Operations (Product Functions, User Characteristics)
Product-Functions
User Characteristics
Use Case, Sequence Diagram
Use case
Sequence Diagrams
System Design
Architecture Diagrams
Data Flow Diagram
Activity Diagram
ER Diagram
Database Schema Diagrams
Customer
Software Requirements
Hardware Requirements
IMPLEMENTATION DETAILS
Snapshots of Interfaces (shown in Figs. 20 to 27)
Test Cases
RESULTS AND DISCUSSION
NOVELTY AND RECOMMENDATIONS
FUTURE RESEARCH DIRECTION
LIMITATIONS
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Identification of Counterfeit Drugs Using Decentralized Supply Chain
Koyel Datta Gupta1,*, Aditya Gupta1, Tanmay Sharma1 and Aayush Bhatnagar1
INTRODUCTION
Blockchain
Smart Contract
Supply Chain
Ethereum
RELATED WORK
METHODOLOGY
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Making Great Strides Towards Road Detection
Vimal Gaur1,*
INTRODUCTION
RELATED WORK
DATASET
Data Selection
Preprocessing
Method
Architecture of the Model
Model Summary
Splitting and Training
RESULTS
LIMITATIONS & FUTURE WORK
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Subject Index
Back Cover