09

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Introduction

Good afternoon, sir and everyone.My name is Himanshu Omar and Today, I'm going to talk
about one of the most exciting and innovative technologies of our time - blockchain and iot.

Blockchain and IoT are two emerging technologies due to their potential to disrupt various
industries.

Blockchain provides a secure and decentralised platform, while IoT enables devices to
connect and communicate with each other. When we combine both, It enable secure and
efficient data sharing, improves supply chain management, and enhances the overall
efficiency of various systems.

Let's dive into the world of blockchain and iot and explore their endless possibilities.

What is BlockChain ?

ledger means a block that contains information related to a particular activity


without the need for a central authority.

Will You all know that many famous companies like IBM,Microsoft,Walmart, and JP Morgan
use Blockchain technology for various purposes like security and transparency.

How BlockChain Works?

Are you aware of how blockchain technology can revolutionise the way we handle data and
transactions?

Lets Understand it briefly

Suppose Ram want to send money to Sita ,

For This transaction a block is created which contains relevant information related to the
transaction and has some unique id.

Now this Block is broadcasted to every user in the blockchain network.

Participant in the network checks if the transaction is valid or not.

If valid, Block is added to previously exciting blocks. And all data is made public for
transparency.

And finally sita received money.


Types Of BlockChain

Basically we have two types of blockchain private and public.

Some books refer to the public as permissionless and private as permissioned.

But this was not the case when we talk with reference to iot application

In public blockchains anyone can join the blockchain without the approval of third-parties,
and act as a simple node or as miner or validator

In the case of private blockchains, the owner restricts network access.

there are systems that are tokens based (e.g., Ripple),

while others do not (e.g., Hyperledger).

What Is IOT’s

That allow them to collect data and communicate with other devices over the
internet

And sync data with a mobile app or cloud server.

IOT Architecture Evolution

Cloud-based architecture is a centralised computing model where data


processing and storage are performed on remote servers that are accessed
over the internet.
Fog computing is a decentralised computing model . It uses a network of
edge devices and servers to provide low-latency, high-bandwidth
connectivity.
Edge computing is a distributed computing model where data processing
and storage are performed on local devices, closer to the source of data
generation.
Benefits Of Integration of BlockChain with IOT’s

Enhanced Security : Offers a full proof secured network for IOT devices
to communicate with one another.
Increased Efficiency : Blockchain can help manage vast amount data
by creating a decentralised and transparent network, making it easier to
store, manage and access information efficiently.
Increase Transparency: Combining IoT and blockchain creates a
transparent network that is publicly accessible, promoting transparency
in supply chains and other business processes.
Firewall Against DDoS Attacks : Detect Spam traffic and increase and
decrease bandwidth needed to deal with DDoS attacks.
Real Time Tracking: Can offer the correct location of any good without any
interference.
Stronger Cloud Management: It help to encrypt all IOT data before sending
to cloud Storage.

Cryptographic Algorithms

Cryptographic algorithms are mathematical algorithms used for the secure


communication and transfer of information
To optimize blockchain for IoT applications, cryptographic algorithms are
essential for ensuring the security and privacy of the data transmitted over the
network.
Here are some cryptographic algorithms that can be used to optimize
blockchain for IoT applications:

1.Symmetric key algorithms: In these algorithms, the same key is used for both
encryption and decryption. Examples of symmetric key algorithms include Advanced
Encryption Standard (AES), Data Encryption Standard (DES), and Triple DES.

2.Asymmetric key algorithms: In these algorithms, two different keys are used for
encryption and decryption. Examples of asymmetric key algorithms include RSA and
Elliptic Curve Cryptography (ECC).
2.Elliptic Curve Cryptography (ECC): ECC is a public-key cryptography algorithm
that uses elliptic curves to generate public and private keys.

3.Hash functions: These algorithms take an input and generate a fixed-size output
(called a hash). Hash functions are commonly used for data integrity and message
authentication. Examples of hash functions include SHA-256d, SHA-256, and Scrypt.

Real World Application

SUUPLY CHAIN MANAGEMENT

•With blockchain, it is possible to track every movement of goods through a supply chain,
from the manufacturer to the end customer.

•IoT devices can be used to gather data about the location and condition of the goods, while
blockchain provides a tamper-proof record of every transaction.

• This can help to reduce fraud, errors, and inefficiencies in the supply chain, leading to
cost savings and improved customer satisfaction.

The company uses blockchain to track products from suppliers to stores, and IoT
sensors to monitor the condition of products during transport.

HealthCare

╸Blockchain can be used to securely store and share medical


data between patients, healthcare providers, and insurers.
╸IoT devices can be used to monitor patients and collect data
about their health, while blockchain can ensure that the data is
accurate, secure, and private.
╸Chronicled has developed a blockchain-based platform called MediLedger that
can be used to securely track and manage pharmaceuticals. The platform uses IoT
sensors to track the movement of pharmaceuticals, which is then stored on the
blockchain.

In this seminar, we will explore the potential of this powerful combination and
discuss its real-world applications.

I hope you'll find this presentation informative and engaging.

You might also like