Cross-Industry Blockchain Technology: Opportunities and Challenges in Industry 4.0 -  - E-Book

Cross-Industry Blockchain Technology: Opportunities and Challenges in Industry 4.0 E-Book

0,0
36,94 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

Blockchain technology is part of the 4th industrialrevolution of Industry and has generated a lot of potential for stakeholders and endusers. From Bitcoin and Ethereum, to the third-generation of blockchains, thetechnology has transformed the digital landscape in many industrial sectors. Cross-IndustryBlockchain Technology: Opportunities and Challenges in Industry 4.0 explores the role of blockchains in industry 4.0across multiple industries. It covers the problems and new frontiersencountered by engineers and professionals for commercial and technical use. The range of Blockchain applicationscovered in the book include finance, big data, health industry,hydrophonics, and vehicle ad hoc networks. General readers and industryprofessionals interested in Blockchain technology and industry 4.0 will findinteresting information about current tech trends in this space.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 207

Veröffentlichungsjahr: 2003

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents
BENTHAM SCIENCE PUBLISHERS LTD.
End User License Agreement (for non-institutional, personal use)
Usage Rules:
Disclaimer:
Limitation of Liability:
General:
PREFACE
List of Contributors
Blockchain for IoT Security and Privacy: Challenges, Application Areas and Implementation Issues
Abstract
INTRODUCTION
Blockchain and its Key Concepts
Working of Blockchain
Blockchain Structure and its Operations
Algorithms and Techniques
Trust Essentials and Consensus Protocols
IOT Security
Ongoing Researches
IoT Security using Blockchain
IoT Security using Fog Computing
IoT Security using Machine Learning
IoT Security using Cryptography/Steganography
Blockchain as Key to IoT Security
Blockchain IoT Security: Implementation Challenges
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Distributed Ledger Technology and its Potential Applications – Financial Sector
Abstract
INTRODUCTION
RECENT WORK IN DLT
Early Adopters
Followers
New Entrants (2019)
DLT FEATURES AND PROPERTIES
DLT Based Blockchain in Digital Currencies
DLT Features
Distributed Property of the Ledger
Validation using “Consensus Mechanism”
Digital Signatures and Hash Functions
DLT ADVANTAGES
No Middleman and Decentralized in Nature
Improved Auditability and Enhanced Transparency
Perpetual and Testable
Speed and Efficiency Gain
Reducing Cost
Improved cybersecurity Elasticity
DLT RISKS AND CHALLENGES
Technical Issues
Immature Technology
Transaction Response Time and Scalability
Integration and Compatibility
Cybersecurity
Effective Governance
Legal and Regulatory Issues
Industry Standards and Regulatory Evaluation
Jurisdiction and Ownership - Legal Clarity
Customer Due Diligence and Know-Your-Customer
Dispute Resolution Mechanism
Privacy
Infrastructure Cost
DLT APPLICATIONS
DLT AND FINANCIAL INCLUSION
Cross border Remittance and Payment
Ripple
Abra
Bitpesa
Bitt
Smart Contracts
EXPERIMENT PRACTICES
Project Jasper
Phase I
Phase II
Phase III
Project BLOCKBASTER
Project SALT
Project UBIN
Project Stella
Project Khokha
Project INTHANON
SUMMARY
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Implementation of Blockchain Technology for Big Data
Abstract
INTRODUCTION
CATEGORIES OF BLOCKCHAIN
Generation of Blockchain
Blockchain 1.0
Blockchain 2.0
Blockchain 3.0
Significance of Blockchain Technology and Decentralization and its Effect
Security
Transparency
Inexpensive
Transaction Time
Financial Efficiency
Protect Business from Frauds
Applications of Blockchain Technology
Health Care
Education
Public Services
Cyber Security
Big Data
Significance of Big Data
Cost saving
Time Reduction
Understand the market Condition
Control Online Reputation
Using Big Data Analytics to Boost Customer Acquisition and Retention
Usage of Big Data Analytics to Solve Problems and Promotional Insights into Advertisers
Big Data Analytics as a Catalyst of Product Creation and Innovation
Challenges in Big Data
Data Mining Techniques for Big Data
Clustering
Classification
Association Mining Rules
Regression
Social Network Analysis
Applications of Big Data
Healthcare Sector
Education Sector
Challenges Concerning the Application of Big Data in Education
Remote Sensing
Big Data Analysis Tools and Techniques
Hadoop
Spark
Storm
Cassandra
Mongo DB
Big Data Techniques
INTEGRATION OF BLOCKCHAIN AND Big Data
Data Integrity
Manage Data Sharing
Preventing Malicious Activity
Predictive Analysis
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Hydroponics Monitoring System Based on IoT and Blockchain
Abstract
INTRODUCTION
DISCUSSION
Hydroponics
BLOCKCHAIN SOLUTIONS FOR IoT
Features
Blockchain Types
Public Blockchain
Private Blockchain
Consortium Blockchain
Greenhouse
Hardware
Server and Cloud
WORKING
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Recent Trends in IoT Healthcare-based Blockchain Solutions
Abstract
INTRODUCTION
Healthcare
Blockchain
IoT
Integrated Solutions using BCT and IoT
BCT and IoT Integrated for Healthcare
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Blockchain Technology-based System in Vehicular Ad-hoc Network
Abstract
Introduction
Architecture of VANETs
Communication Architecture of VANET
Blockchain meets VANET
Trust based Models in VANET for Blockchain Technology
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Cross-Industry Blockchain Technology: Opportunities and Challenges in Industry 4.0
Edited by
Rajesh Singh
Uttaranchal University,
Dehradun, Uttarakhand
India
Anita Gehlot
Uttaranchal University,
Dehradun, Uttarakhand
India
Bhavesh Dharmani
Lovely Professional University,
Jalandhar, Punjab
India
&
Kamal Kumar
National Institute of Technology, Srinagar (Garhwal)
Uttrakhand
India

BENTHAM SCIENCE PUBLISHERS LTD.

End User License Agreement (for non-institutional, personal use)

This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the ebook/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.

Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].

Usage Rules:

All rights reserved: The Work is the subject of copyright and Bentham Science Publishers either owns the Work (and the copyright in it) or is licensed to distribute the Work. You shall not copy, reproduce, modify, remove, delete, augment, add to, publish, transmit, sell, resell, create derivative works from, or in any way exploit the Work or make the Work available for others to do any of the same, in any form or by any means, in whole or in part, in each case without the prior written permission of Bentham Science Publishers, unless stated otherwise in this License Agreement.You may download a copy of the Work on one occasion to one personal computer (including tablet, laptop, desktop, or other such devices). You may make one back-up copy of the Work to avoid losing it.The unauthorised use or distribution of copyrighted or other proprietary content is illegal and could subject you to liability for substantial money damages. You will be liable for any damage resulting from your misuse of the Work or any violation of this License Agreement, including any infringement by you of copyrights or proprietary rights.

Disclaimer:

Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.

Limitation of Liability:

In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.

General:

Any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims) will be governed by and construed in accordance with the laws of Singapore. Each party agrees that the courts of the state of Singapore shall have exclusive jurisdiction to settle any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims).Your rights under this License Agreement will automatically terminate without notice and without the need for a court order if at any point you breach any terms of this License Agreement. In no event will any delay or failure by Bentham Science Publishers in enforcing your compliance with this License Agreement constitute a waiver of any of its rights.You acknowledge that you have read this License Agreement, and agree to be bound by its terms and conditions. To the extent that any other terms and conditions presented on any website of Bentham Science Publishers conflict with, or are inconsistent with, the terms and conditions set out in this License Agreement, you acknowledge that the terms and conditions set out in this License Agreement shall prevail.

Bentham Science Publishers Pte. Ltd. 80 Robinson Road #02-00 Singapore 068898 Singapore Email: [email protected]

PREFACE

The book aims to shed light on Blockchain technologies which are the talk of the town in current times and have attracted a lot of potential end users. The excitements engendered by blockchain technologies completely relish the great feature of their exploitation in the facilitation and usage of cryptocurrencies. Bitcoin and Ethereum are the two most illustrious examples which foster a good future for Cryptocurrencies.

A blockchain is an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way. As a promising technique to achieve decentralized consensus, Blockchain helps achieve benefits critical to enterprises and create extraordinary opportunities for businesses to come together in new ways.

The book covers different applications of blockchain in fields including the financial sector, big data, health industry, hydroponics, and vehicle ad hoc networks. Editors are thankful to the authors for their contribution to the completion of the book.

Rajesh Singh Uttaranchal University Dehradun, Uttarakhand IndiaAnita Gehlot Uttaranchal University Dehradun, Uttarakhand IndiaBhavesh Dharmani Lovely Professional University Punjab India &Kamal Kumar

List of Contributors

Aayush VatsMechatronics Engineering, University of Petroleum and Energy Studies, IndiaArpit JainElectrical and Electronics Engineering Department, University of Petroleum and Energy Studies, Dehradun, IndiaChaitali ChoudharySchool of Computer Science, University of Petroleum and Energy Studies, Bidholi, Dehradun 248007, IndiaCharanjeet SinghLovely Professional University, Phagwara, IndiaHardik ChaurasiaElectrical and Electronics Engineering Department, University of Petroleum and Energy Studies, Dehradun, IndiaHarpreet Singh BediSchool of Electronics and Electrical Engineering, Lovely Professional University, Punjab, IndiaHimanshu SharmaElectrical and Electronics Engineering Department, University of Petroleum and Energy Studies, Dehradun, IndiaInder SinghSchool of Computer Science, University of Petroleum and Energy Studies, Bidholi, Dehradun 248007, Uttarakhand, IndiaKamal KumarComputer Science and Engineering, National Institute of Technology Uttarakhand, Srinagar (Garhwal), IndiaKamal Kumar SharmaSchool of Electronics and Electrical Engineering, Lovely Professional University, Punjab, IndiaManoj SindhwaniSchool of Electronics and Electrical Engineering, Lovely Professional University, Punjab, IndiaMohammad ShafiqDepartment of Cyberspace Institute of Advanced Technology, GuangZhou University, Guangzhou, ChinaNazir AhmedElectrical and Electronics Engineering Department, University of Petroleum and Energy Studies, Dehradun, IndiaRaghav GuptaSchool of Electronics and Electrical Engineering, Lovely Professional University, Punjab, IndiaRajesh SinghLovely Professional University, Punjab, IndiaRajeshwar SinghDoaba Group of Colleges, Nawanshar, IndiaSachin SharmaComputer Science and Engineering, Maharishi Markandeshwar (Deemed to be) University, Mullana, Ambala, IndiaShaik Vaseem AkramLovely Professional University, Punjab, IndiaYasir AfaqLovely Professional University, Punjab, India

Blockchain for IoT Security and Privacy: Challenges, Application Areas and Implementation Issues

Chaitali Choudhary1,*,Inder Singh1,*,Mohammad Shafiq2
1 School of Computer Science, University of Petroleum and Energy Studies, Bidholi, Dehradun 248007, Uttarakhand, India
2 Department of Cyberspace Institute of Advanced Technology, GuangZhou University, Guangzhou, China

Abstract

Blockchain and IoT are the most exciting technologies in the current world, combining these two together may resolve a lot of issues. In the current scenario, we are using IoT devices in nearly everything. By the end of this era, we can presume that all of our day-to-day use devices will be smart. But with this various issue may rise like safety, security, and performance concerns of smart devices. To resolve these issues, blockchain technology has emerged as a very powerful tool. In this chapter, the basics of blockchain along with its architecture and algorithms involved are discussed. IoT challenges and related literature are also discussed along with blockchain as an efficient technology to resolve these issues. The chapter also includes the challenges in using blockchain in IoT devices.

Keywords: Blockchain, Cryptocurrency, Distributed ledgers, IoT, Proof-of- stake, Proof-of-work.
*Corresponding authors Chaitali Choudhary & Inder Singh: School of Computer Science, University of Petroleum and Energy Studies, Bidholi, Dehradun 248007, Uttarakhand, India; Tel: +919827180073; E-mails: [email protected] & [email protected]

INTRODUCTION

The chapter includes the two emerging technologies, blockchain and Internet of Things (IoT). Blockchain is a distributed ledger technology that maintains immutable records leading to highly secure data, whereas IoT is the technology that became an essential part of our day-to-day life. IoT applications are used in smart homes, smart cities, industrial productions, smart grids, etc. Here, we discuss various IoT related issues and blockchain technology separately and then the ways in which blockchain can be used to resolve these key challenges of IoT are discussed. Out of the various challenges of IoT, the most crucial one is secu-

rity and confidentiality, which can be resolved using blockchain. Blockchain gives power to the changing digital infrastructure which can help to evolve IoT, ranging from analytics to security. IBM took an initiative of blockchain usage incognitive IoT [1]. They used it in complex trade lanes and logistics where smart contracts can be incorporated using blockchain technology register. According to IBM, three key benefits are firstly building trust using distributed ledger-based authentication system and reducing the risk of collision and tampering, secondly by cost reduction by removing intermediate or third parties, and thirdly accelerated transaction speed by reducing settlement time from days to instantaneous decisions.

Blockchain and its Key Concepts

Blockchain is important as it brings trust to a network, and that is the main reason behind its wide usage in various areas based on trust factors. Blockchain operates with the basic concept of peer-to-peer trust factor with zero intervention from third parties. Blockchain is a decentralized ledger of all transactions across a peer-to-peer network, which means it enables the transfer of digital assets without third party intervention. Blockchain is being used in a wide range of industrial applications as listed below:

One of the most famous is cryptocurrency, for each blockchain. Right now, there are various cryptocurrencies in existence. Out of which the most famous one is Bitcoin. Some other are Ether, USD Digital, Bitcoin Cash, Tether, Stellar, etc.It is used in financial transaction security in the finance industry as transactions should be open and in the form of immutable ledgers.Patient’s data is collected by various devices in healthcare. Such data is highly confidential and need not to be manipulated under any conditions.One of the major issues with government supplies is that they do not reach the designated person or department. To maintain that, government nowadays uses blockchain in supply chain management to ensure the proper delivery of essential items.Blockchain in supply chain management is also used in manufacturing and distribution to ensure an immutable ledger of items produced and distributed.It is also useful in moving point of data computation from one place to another. While doing so, our data should be secured which can be easily done using blockchain.Some other examples are E-voting, Key distribution, funding generation, securing public records etc.

The most known term in the blockchain is Bitcoin. Blockchain is confused with bitcoin, but actually bitcoin is just a cryptocurrency based on blockchain. Whether Bitcoin survives or not, concepts and algorithms of blockchain form an essential backdrop of various key security-based fields. There was a scenario in 2008-09 where major financial systems were facing issues, which led to share market crumbling. Then a person named Satoshi Nakamoto introduced digital currency. Digital currency is an asset which can be transferred securely over internet. This new currency introduced by Satoshi Nakamoto is called Bitcoin [2]. Cryptocurrency is in controversy due to the reason that it does not need any central authority like bank to transfer assets [3]. Thus, many people and countries still do not authenticate it. Bitcoin uses various algorithms for verification, validation and consensus protocol for each transaction.

Working of Blockchain

Centralized vs. decentralized system: Consider a scenario where any person wants to buy something using credit card. This process has many stages including verification of the transaction by credit card authority, payment gateways, banks involved etc. This is an example of centralized system where everyone is connected with other with some legal process Now consider a scenario where a person directly wants to deal with another person irrespective of their location. Here these two people are going to be peers among which we need to establish a transaction in a decentralized way, which means transaction between two persons who are not at the same location and not a part of a centralized system and do not know each other. This is basic concept of decentralized system. The major issue with such systems is trust. We can build trust by framing a process to validate, verify and confirm transaction which should be a tamper proof. The overall process of doing so will include recording the transaction in distributed ledger system, making it tamper proof, creating a chain and finally implementing a consensus protocol for agreement on the verified transaction to be added in the ledger . This individual transaction is called blocks and to make it secure, a chain of blocks is created, that’s why this concept is named as blockchain. Whenever one person transfers a certain amount to others, they keep a ledger of that transaction, but to provide trust, the other person called peers comes into the picture. All these people involved also keep a copy of the ledger. This is the basic concept of an immutable distributed ledger defined in a blockchain process. Similarly, verification methods are also involved and implemented using peers. Summarizing, blockchain uses a decentralized peer-to-peer system using collective trust model for validating and verifying a distributed transaction.

Blockchain Structure and its Operations

The basic structure of blockchain has transaction as the core element, which is called unspent transaction outputs abbreviated as UTXOs. it is an abstraction of electronic money and have different values in different currencies. Whenever any user wants to initiate a transaction, they start by creating UTXOs or by creating a ledger using coins in the form of UTXOs. These are locked up cryptocurrencies until the transaction is complete. These are nothing but like a coin in cryptocurrencies. Each transaction needs to be validated and then broadcasted. Such validated and broadcasted transactions form a chain via digital data link. The work of validation is done by special peer nodes called miners. Miners are computationally fast computers executing a specific blockchain protocol known as proof of work protocol. Fig. (1) shows a basic operation of blockchain.

Fig. (1)) Basic operation of blockchain.

It is the responsibility of peers and their computational nodes to perform each operation. There are two types of participants in blockchain: one who initiates the transaction and other who validates these transactions, known as miners. If someone wants to transfer, then they initiate a transaction, whose ledger is maintained by both the parties. Then to validate, verify and broadcast, miners come into the picture. These transactions are added to the transaction pool, which are viewed by each and every miner. If all the miners validate the block and transmit it, then there will be multiple chains whereas the blockchain is a single consistent linked chain of flux which is challenging. All miners compete to solve the puzzle for validating these transaction blocks, to win the challenge their nodes computational capacity should be high. Once a miner wins, then that node sends the block for consensus validation. This is done by broadcasting the information to all other miners. Major set of miners, minimum 51% should agree to this new block addition. Once verified, then this transaction can be added in form of block in the original blockchain. After successful addition of this block transaction, it is completed and recorded. This algorithm for solving a puzzle and finally able to add a block is called proof-of-work protocol. This protocol needs a lot of computation power. This is one of the biggest disadvantages of blockchain proof-of-work protocol. Thus, various other protocols like proof-of-stake are used nowadays, but none of them are still as successful as this protocol. Now the question is what’s for miners here? Miners earn bitcoins for managing the blockchain. The protocol proof-of-stake uses this bitcoin earned again for solving the puzzle to add a block. So, in this case rather than using their node’s computational power, they use their earnings. This looks good but here came the problem of double spending. If a person has large number of bitcoins, these can be used to manipulate the original blockchain.

Algorithms and Techniques

There are two techniques for efficient validation and verification. Hashing and asymmetric key encryption.

1. The main issue with blockchain is that, it is a decentralized ledger system. So, we won’t be able to verify it by conventional methods. There must be a mechanism to establish trust in between peers. For that, public key cryptography can be used. Public key cryptography uses the concept of symmetric key, which means the key for encryption and decryption is the same. A symmetric key has some major issues like deriving the keys from the data sent and distributing keys secretly. This key distribution is a very crucial task, in symmetric encryption, it should be passed to each participant. Blockchain is a distributed framework which makes this key distribution more difficult. Public key cryptography addresses this concern by using two different keys in spite of using only one key. There must be two keys: one must be public and another one should be private. Here extracting data from a message is possible as the data encrypted using public- private key pair can be extracted or decrypted using only public key. For example, if a person wants to send a message, then the person should be sending data encrypted using its private key and then by the receiver’s public key. Receiver decrypts the data using its private key and then using sender’s public key. This ensures that only the sender can send the data and the receiver can receive the data. A popular algorithm for public-private key pair strategy is Rivest Shamir Adleman (RSA) algorithm. Another algorithm is Elliptic curve cryptography which is stronger that RSA as it uses greater number of bits, thus increasing the security as well as complexity. ECC is used in various blockchain technologies like bitcoin and Ethereum for block generation, as an addition in blockchain.

2. Hashing: It plays a critical role in blockchain’s integrity and confidentiality of data. A hash function converts input data into a unique fixed length value. The algorithm chosen for the hash function should be a one-way function and it should be collision free, or exhibit extremely low probability of collision. The first requirement is to make certain that no one can derive the original items hashed from the hash value. The second requirement is to make sure that the hash value uniquely represents the original items hashed. There should be extremely low probability that two different datasets map onto the same hash value. These requirements can be achieved by choosing a strong algorithm such as secure hash, and by using appropriately large number of bits in the hash value. The most common hash size is 256 bits and the common functions are SHA-3, SHA-256 and Keccak.

3. Transaction Integrity: It works by securing the account address uniquely; the sender should be authenticated using a digital signature before transaction and ensuring the contents of the message sent. In the blockchain, both hashing and public key cryptography are used. The first step is to generate the address using a public private key. Initially a 256-bit random number is taken and kept as a private key which is secured using a code. Secondly, the ECC algorithm is used to generate a private key from public key, after which, the user will be having our public-private key pair. Finally, a hashing function is used to extract account address from the public key. Any transaction needs to be verified for the integrity. For this, a digital signature needs to be applied to the transaction and data needs to be hashed and encrypted. The receiver gets these two things separately: original data and digitally secured hash key. The receiver then needs to recompute the hash from the original message and compare it to the received secure hash key. If it is matched, then the receiver can ensure the data is intact and no changes have been made to it, so user can accept it. Otherwise the receiver can reject the transaction. The original key and the retrieved key match only in case the messages are integral, if a message is changed, then the keys won’t match and lead to rejection from the receiver’s side. Various other things are also verified at receiver’s end like timestamp, balance, and gas balance, etc. Using this complete procedure, the integrity of the complete transaction can be checked

Trust Essentials and Consensus Protocols