You are on page 1of 5

Design and implementation of IoT application Based on RFID

and Blockchain

1.1 Introduction

Blockchain is a digital ledger used to record an event. The


event can be just about anything—a financial transaction, the transfer
of a good from a manufacturer to a supplier, the passing of a
checkpoint at a border, a vote cast by a citizen [1]. And because
blockchain does such a good job of recording events while
maintaining transparency and security, the technology is finding its
way into a very wide range of use cases. Perhaps the biggest
application of blockchain to date is in the supply chain. By securely
storing all the information relevant to the management of a given
supply chain, which can span hundreds of stages and dozens of
geographical locations, blockchain gives manufacturers, shippers and
customers a way to gather important data, analyze trends, assure
authenticity, implement predictive monitoring and respond more
quickly to inquiries [2]. A blockchain ledger grows as new sets of
transactions, or “blocks,” are added to it. Each block contains a
timestamp, relevant transaction data and a cryptographic hash of the
previous block, thus forming a “chain” of blocks. The chaining
provided by the cryptographic hashes ensures a high degree of
integrity, from the most recent block all the way back to the original
block in the chain. Also, the integrity and authenticity of individual
transactions are protected by a cryptographic digital signature
computed on the basis of the corresponding asymmetric key pair of
the transaction owner. Blockchain inside the IoT security solutions,
which include everything from secure elements and secure access
modules (SAMs) to secure micorcontrollers and microprocessors, can
authenticate anyone or anything trying to access the blockchain setup,
thereby ensuring only authorized sources provide data to the ledger or
access its contents [3].

Figure 1.1: Application integrated with Blockchain

1.2 Problem Definition

 Traditional IoT systems are dependent on a centralized


architecture. Information is sent from the device to the cloud
where the data is processed using analytics and then sent back
to the IoT devices. With billions of devices set to join IoT
networks in the coming years, this type of centralized system
has very limited scalability, exposes billions of weak points that
compromise network security and will become incredibly
expensive and slow if third-parties have to constantly check and
authenticate each and every micro-transaction between devices.
 With a centralized network, the risk of a single point of failure
disabling an entire network is a very real possibility.
1.3 Objectives

To design and implement an IoT applications integrated with


Blackchain technology in order to provide a powerful and secure
communication through RFID technology based on Arduino Uno and
WiFi module.

1.4 Methodology

Start by study and analyze to the decentralized Blockchain network


mitigates, study related works to gather information about the
Blockchain implementation using Arduino and IoT with the usage of
RFID and WiFi, then implement the circuit and validate.
Reference

1.  "Blockchains: The great chain of being sure about things". The


Economist. 31 October 2015. Archived from the original on 3
July 2016. Retrieved 18 June 2016. The technology behind
bitcoin lets people who do not know or trust each other build a
dependable ledger. This has implications far beyond the crypto
currency.
2. Morris, David Z. (15 May 2016). "Leaderless, Blockchain-
Based Venture Capital Fund Raises $100 Million, And
Counting". Fortune. Archived from the original on 21 May
2016. Retrieved 23 May 2016.
3.  Popper, Nathan (21 May 2016). "A Venture Fund With Plenty
of Virtual Capital, but No Capitalist". The New York
Times. Archived from the original on 22 May 2016.
Retrieved 23 May 2016.
4. Brito, Jerry; Castillo, Andrea (2013). Bitcoin: A Primer for
Policymakers (PDF)(Report). Fairfax, VA: Mercatus Center,
George Mason University. Archived (PDF) from the original
on 21 September 2013. Retrieved 22 October 2013.

You might also like