This document discusses designing and implementing an IoT application integrated with blockchain and RFID technology. It begins with an introduction to blockchain technology and how it can be applied to supply chain management. The problems with traditional centralized IoT systems are outlined, such as limited scalability and single points of failure. The objectives are then stated to design and implement an IoT application using blockchain to provide secure communication between devices via RFID and Arduino. The methodology will involve studying decentralized blockchain networks and related works, then implementing a prototype circuit to validate the approach.
This document discusses designing and implementing an IoT application integrated with blockchain and RFID technology. It begins with an introduction to blockchain technology and how it can be applied to supply chain management. The problems with traditional centralized IoT systems are outlined, such as limited scalability and single points of failure. The objectives are then stated to design and implement an IoT application using blockchain to provide secure communication between devices via RFID and Arduino. The methodology will involve studying decentralized blockchain networks and related works, then implementing a prototype circuit to validate the approach.
This document discusses designing and implementing an IoT application integrated with blockchain and RFID technology. It begins with an introduction to blockchain technology and how it can be applied to supply chain management. The problems with traditional centralized IoT systems are outlined, such as limited scalability and single points of failure. The objectives are then stated to design and implement an IoT application using blockchain to provide secure communication between devices via RFID and Arduino. The methodology will involve studying decentralized blockchain networks and related works, then implementing a prototype circuit to validate the approach.
Design and implementation of IoT application Based on RFID
and Blockchain
1.1 Introduction
Blockchain is a digital ledger used to record an event. The
event can be just about anything—a financial transaction, the transfer of a good from a manufacturer to a supplier, the passing of a checkpoint at a border, a vote cast by a citizen [1]. And because blockchain does such a good job of recording events while maintaining transparency and security, the technology is finding its way into a very wide range of use cases. Perhaps the biggest application of blockchain to date is in the supply chain. By securely storing all the information relevant to the management of a given supply chain, which can span hundreds of stages and dozens of geographical locations, blockchain gives manufacturers, shippers and customers a way to gather important data, analyze trends, assure authenticity, implement predictive monitoring and respond more quickly to inquiries [2]. A blockchain ledger grows as new sets of transactions, or “blocks,” are added to it. Each block contains a timestamp, relevant transaction data and a cryptographic hash of the previous block, thus forming a “chain” of blocks. The chaining provided by the cryptographic hashes ensures a high degree of integrity, from the most recent block all the way back to the original block in the chain. Also, the integrity and authenticity of individual transactions are protected by a cryptographic digital signature computed on the basis of the corresponding asymmetric key pair of the transaction owner. Blockchain inside the IoT security solutions, which include everything from secure elements and secure access modules (SAMs) to secure micorcontrollers and microprocessors, can authenticate anyone or anything trying to access the blockchain setup, thereby ensuring only authorized sources provide data to the ledger or access its contents [3].
Figure 1.1: Application integrated with Blockchain
1.2 Problem Definition
Traditional IoT systems are dependent on a centralized
architecture. Information is sent from the device to the cloud where the data is processed using analytics and then sent back to the IoT devices. With billions of devices set to join IoT networks in the coming years, this type of centralized system has very limited scalability, exposes billions of weak points that compromise network security and will become incredibly expensive and slow if third-parties have to constantly check and authenticate each and every micro-transaction between devices. With a centralized network, the risk of a single point of failure disabling an entire network is a very real possibility. 1.3 Objectives
To design and implement an IoT applications integrated with
Blackchain technology in order to provide a powerful and secure communication through RFID technology based on Arduino Uno and WiFi module.
1.4 Methodology
Start by study and analyze to the decentralized Blockchain network
mitigates, study related works to gather information about the Blockchain implementation using Arduino and IoT with the usage of RFID and WiFi, then implement the circuit and validate. Reference
1. "Blockchains: The great chain of being sure about things". The
Economist. 31 October 2015. Archived from the original on 3 July 2016. Retrieved 18 June 2016. The technology behind bitcoin lets people who do not know or trust each other build a dependable ledger. This has implications far beyond the crypto currency. 2. Morris, David Z. (15 May 2016). "Leaderless, Blockchain- Based Venture Capital Fund Raises $100 Million, And Counting". Fortune. Archived from the original on 21 May 2016. Retrieved 23 May 2016. 3. Popper, Nathan (21 May 2016). "A Venture Fund With Plenty of Virtual Capital, but No Capitalist". The New York Times. Archived from the original on 22 May 2016. Retrieved 23 May 2016. 4. Brito, Jerry; Castillo, Andrea (2013). Bitcoin: A Primer for Policymakers (PDF)(Report). Fairfax, VA: Mercatus Center, George Mason University. Archived (PDF) from the original on 21 September 2013. Retrieved 22 October 2013.