Gc3 May 2022 Reportapplication of Blockchain in Agirculture Sector

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 63

A PROJECT REPORT ON

APPLICATION OF BLOCKCHAIN IN AGIRCULTURE SECTOR


FOR SUPPLY CHAIN MANAGEMENT

SUBMITTED TO THE SAVITRIBAI PHULE PUNE UNIVERSITY, PUNE


IN THE PARTIAL FULFILLMENT OF THE REQUIREMENTS
FOR THE AWARD OF THE DEGREE

OF

BACHELOR OF ENGINEERING
(COMPUTER ENGINEERING)

SUBMITTED BY

MADHUKAR BORPHALKAR B150334228


ATHARVA UTEKAR B150334405
VAISHNAVI SALUNKE B150334369

DEPARTMENT OF COMPUTER ENGINEERING


PCET's PIMPRI CHINCHWAD COLLEGE OF ENGINEERING

SECTOR NO. 26, PRADHIKARAN, NIGDI, PUNE 411044

SAVITRIBAI PHULE PUNE UNIVERSITY


2021 -2022
CERTIFICATE
This is to certify that the project report entitled

“ APPLICATION OF BLOCKCHAIN IN AGIRCULTURE SECTOR


FOR SUPPLY CHAIN MANAGEMENT ”

Submitted by

MADHUKAR BORPHALKAR B150334228


ATHARVA UTEKAR B150334405
VAISHNAVI SALUNKE B150334369

is a bonafide student of this institute and the work has been carried out by him/her under the
supervision of Prof. S.S. Sambare and it is approved for the partial fulfillment of the
requirement of Savitribai Phule Pune University, for the award of the degree of Bachelor of
Engineering (Computer Engineering).

( Prof. S.S. Sambare) (Dr. K. Rajeswari)


Guide Head,
Department of Computer Engineering Department of Computer Engineering

(Prof. Dr. G.N. Kulkarni)


Director,
Pimpri Chinchwad College of Engineering Pune – 44

Place: Pune
Date :
ACKNOWLEDGEMENT

It gives us immense pleasure in presenting the preliminary project report on


“APPLICATION OF BLOCKCHAIN IN AGIRCULTURE SECTOR FOR SUPPLY
CHAIN MANAGEMENT”

I would like to take this opportunity to express my gratitude to my Guide Prof. S.S.
Sambare for giving us all the help and guidance needed, especially for theuseful suggestions
given during the course of the project.

We would also like to thank our Project Coordinator “Prof. Sushma Rahul Vispute”, for
her assistance and support. We would also like to thank our Prof. Dr. K. Rajeswari, Head
of Computer Department for her unwavering support for this project work. We are grateful
to our Director Prof. Dr. G. N. Kulkarni for providing us with an environment to complete
our project successfully. We also thank all the staff members, technicians of our college for
their help.

We also thank all the web committees for enriching us with their immense knowledge.
Finally, we take this opportunity to extend our deep appreciation to our family and friends,
for all that they meant to us during the crucial times of the completion of our project.

MADHUKAR BORPHALKAR
ATHARVA UTEKAR
VAISHNAVI SALUNKE

PCCOE, Department of Computer Engineering 2021-22


iii
ABSTRACT

We’ve completed the entire blockchain-based agriculture and food (agri-food) supply chain repair.
It makes use of the core features of blockchain and smart contracts, all of which are used on
blockchain networks. In this work the functioning of blockchain technology and the possible use or
impact it may have on current SCM Registry systems and the role of legal experts are described.
The spread of blockchain is bad for anyone in the trust business government authorities that are
deemed sufficiently trustworthy to handle transactions. As a result, a dependable system is needed
in the Agri-Food supply chain to ensure traceability, trust, and distribution mechanisms. In the
proposed structure, all transactions are written to the blockchain, uploading the data to the
Interplanetary File Storage System (IPFS). The storage method generates a hash of the
Blockchain’s data, ensuring that the solution is efficient, secure, and dependable. Our framework
provides smart contracts and their algorithms to illustrate the interaction of system entities. Smart
contract simulations and tests and security and risk assessments are all part of this project. We
surveyed to determine the potential obstacles and advantages of blockchain based applications. Given the
current state of the supply chain and logistics industry, this thesis could allow various businesses to
collaborate with blockchain-based application developers. The main objectives were to define how
blockchain can change the supply chain and logistics industry. The typical challenges in these
spheres were considered and the main key features of blockchain that can solve these difficulties
were marked. In survey we were find out possible challenges or benefits of blockchain based
applications. Considering the current situation in the supply chain and logistics industry, this thesis
can empower different businesses to start working with the companies that are creating blockchain-
based applications.

Keywords: Blockchain, Cryptography Decentralized, Distributed Systems, Cloud Storage,


Role base Access Control (RBAC).

PCCOE, Department of Computer Engineering 2021-22


iv
TABLE OF CONTENTS
LIST OF ABBREVIATIONS viii
LIST OF TABLES ix
LIST OF FIGURES x

CHAPTER TOPIC PAGE


NO. NO.
1 Introduction 1
1.1 Introduction 2
1.2 Motivation 2
1.3 Problem Definition 3
1.4 Objectives 3
2 Literature Survey 4

3 Software Requirements Specification 9

3.1 Introduction 10
3.1.1 Project Scope 10

3.1.2 User Classes and Characteristics 10

3.1.3 Assumption and Dependencies 11

3.2 Functional Requirements 11

3.2.1 System Feature 1 11

3.2.2 System Feature 2 13

3.3 External Interface Requirements 15

3.3.1 User Interfaces 15

3.3.2 Hardware Interfaces 15

3.3.3 Software Interfaces 15

3.3.4 Communication Interfaces 16

3.4 N o n Functional Requirements 16

3.4.1 Performance Requirements 16

PCCOE, Department of Computer Engineering 2021-22


v
3.4.2 Safety Requirements 17

3.4.3 Security Requirements 17

3.4.4 Software Quality Attributes 17

6 TESTING 32

6.1 Software Testing 33

3.5 System Requirements 17


3.5.1 Database Requirements 17

3.5.2 Software Requirements (Platform Choice) 18

3.5.3 Hardware Requirements 18

3.6 Analysis Models : SDLC Model to be Applied 19

3.7 System Implementation plan 20

4 System Design 21

4.1 System Architecture 22

4.2 Data Flow DFD Diagram 23

4.2.1 DFD Level 0 Diagram 23

4.2.2 DFD Level 1 Diagram 24

4.3 UML Diagrams 25

4.3.1 Activity Diagram 25

4.3.2 Sequence Diagram 26

4.3.3 Use Case Diagram 27

4.3.4 Class Diagram 28


4 .4 Entity Relationship Diagrams 29

5 Other Specification 30

5.1 Advantages 31
5 .2 Limitations 31

5.3 Applications 31
PCCOE, Department of Computer Engineering 2021-22
vi
6.2 Test Case and Results 34
7 IMPLEMENTATION 35

7.1 Overview of Project modules 36

7.2 Tools & Technologies Used 36


7.3 Implementation 36

7.3.1 Markle Damgard Construction 38

7.3.2 One Way Compression Function 38

8 Results 42
8.1 Outcomes 43
8.2 Screenshots

9 Conclusion 48
9.1 Conclusion 49
9.2 Future Scope 49
Appendix A: Problem statement feasibility assessment using, satisfiability 50
analysis and NP Hard, NP-Complete or P type using modern algebra and
relevant mathematical models.
Appendix B: Details of paper publication: name of the conference/journal,
comments of reviewers, certificate, paper.
Appendix C: Plagiarism Report
References

PCCOE, Department of Computer Engineering 2021-22


vii
LIST OF TABLES

TABLE ILLUSTRATION PAGE NO.


2.1 Comparison Table 7
3.1 System Implementation Plan 20

4.1 Functional Testing 34

8.1 Results Outcome 38

PCCOE, Department of Computer Engineering 2021-22


viii
LIST OF FIGURES

Figure Illustration Page No.


No.

3.1 Waterfall Model 19

4.1 System Architecture 22

4.3 DFD Multilevel Diagram Level 0 23

4.3.1 DFD Multilevel Diagram Level 1 24

4.4 Activity Diagram 25

4.5 Sequence Diagram 26

4.6 Use Case Diagram 27

4.7 Class Diagram 28

4.8 ER Diagram 29

8.1.1 Login Page 43

8.1.2 Registration Page 44

8.1.3 Web Page displaying product information 45

8.1.4 Web page to add product 45

8.1.5 Web page to home details 46

8.1.6 Web page to show food data 46

8.1.7 Web page to show details of product added 47

PCCOE, Department of Computer Engineering 2021-22


ix
CHAPTER 1
INTRODUCTION

PCCOE, Department of Computer Engineering 2021-22


1
INTRODUCTION

1.1 INTRODUCTION

• Food supply chain management is a very tedious and time consuming process in a realtime
environment.

• Data is stored securely in the food supply chain management blockchain which enhances
security.

• It also allows updates to the entire blockchain according to the smart contract system[11].

• Blockchain hash functions offer better strategies for signature protection than a food sup-ply
chain management system using blockchain.

• Blockchain networking system works on to build the control, configuration, particularly


confidentiality, integrity, availability and management [14] .

1.2 MOTIVATION

• Eliminates need for centralized system for key management and provide a keyless signa-ture
structure using block chain.

• We observe in[11][13] that the vision of Block chain Technology is decentralized coop-
eration between distributed agents.

• We notice that the decentralized architecture provides the automatic data recovery from
different attacks.

• Reduce attacks, using block chain based network services in distributed environment[15].

PCCOE, Department of Computer Engineering 2021-22


2
1.3 PROBLEM STATEMENT

To design and developed a system for food supply chain management using block chain
framework.This system carried out different modules such as Farmer, NGO and end user. The
implementation of custom block chain provides data distribution in peer-to-peer network data
security in parallel manner

1.4 OBJECTIVE

• To study and analysis the basic execution of block chain in distributed databases environment.

• To develop system for supply chain management for Agriculture Food using custom block chain.

• To design new hash generation, smart contract and mining approach for proposed block
chain.

• To validate the system with various consensus algorithm in Peer to Peer (P2P) environment.

PCCOE, Department of Computer Engineering 2021-22


3
CHAPTER 2
LITERATURE SURVEY

PCCOE, Department of Computer Engineering 2021-22


4
LITERATURE SURVEY

Whole blockchain based agriculture and food Agriculture food of Blockchain and smart
contracts, and it’s all done on the Ethereum blockchain network. Although blockchain ensures the
immutability of data and records in the network, it still falls short of solving several key issues in
supply chain man- agement, such as the trustworthiness of the parties involved, trading
procedure accountability, and product traceability. As a result, a dependable system that
guarantees traceability, trust, and delivery mechanisms in the Agri-Food supply chain is required.
According to [2] Edgence (EDGe + intelligENCE) is proposed to serve as a blockchain-enabled
edge- computing platform to intelligently manage massive decentralized applications (dApps) in
IoT usecases1. To extend the range of blockchain to IoT-based apps, Edgence adopts master
node technology to connect to a closed system to the real world. A master node contains a full
node of the blockchain and a collateral, and is deployed on an edge cloud of mobile edge
computing, which is convenient for the master node to use resources of the edgecloud to run IoT
dApps
According to [3] introduces HCloud, a trusted JointCloud platform for IoT systems using server
less computing model. HCloud allows an IoT server to be implemented with multiple servers
less functions and schedules these functions on different clouds based on a schedule policy. The
policy is specified by the client and includes the required functionalities, execution resources,
latency, price and so on. HCloud collects the status of each cloud and dispatches server less
functions to the most suitable cloud based on the schedule policy. By leveraging the blockchain
technology, the cloud status nor wrongly dispatch the target functions.
According to [4] introduce the concept of a decentralized gasified service exchange platform
where the solution providers can dynamically offer and request services in an autonomous peer- to-
peer fashion. Cost and decision to exchange services are set during operation time based on
gasification policies according to business goals. The proposed concept is based on blockchain
technology to provide a tokenized economy where the IoT solution providers can implement
gasification techniques using smart contracts to maximize profits during service offering and
requesting.

PCCOE, Department of Computer Engineering 2021-22


5
According to [5] a geuster secure interaction system with smart home IoT health devices to
support elderly people or people with special needs. The framework uses a decentralized
blockchain consensus for storing the smart home IoT health data and user identities. The
framework leverages off-chain solution for storing raw multimedia IoT sensory payload and
gesture data. Using our proposed health monitoring framework, a smart homeowner or service
provider can create a cyber physical space with a secure digital wallet for each human and
authorized IoT health devices. Multiple authorized home residents can interact with the IoT-
based smart home monitoring sensors, carry out user and IoT health sensory media registration,
and transfer transactional values via secure tokens, as well as raw IoT health data payload
through gesture.
Smart Contracts [6] also called Crypto contract, it is a computer program used for transferring/
controlling the property or digital currents in specific parties. It does not only determine the terms
and conditions but may also implement that policy / agreement. These smart contracts are stored on
block-chain and BC is an ideal technology to store these contracts due to the ambi- guity and
security. Whenever a transaction is considered, the smart-contract determines where the transaction
should be transferred / returned or since the transaction actually happened.
Currently CSIRRO team has proposed a new approach to integrate BlockOn IOT with [7]. In its
initial endeavor, he uses smart-home technology to understand how IOT can be blocked. Block
wheels are especially used to provide access control system for Smart Devices Transactions
located on Smart-Home. Introducing BC technology in IOT, this search again provides some
additional security features; however, every mainstream BC technology must have a concept that
does not include the concept of comprehensive algorithms. Moreover, this technology cannot
provide a general form of blockchain solution in case of IOT usage.
According to Huehuangenet. Al [8] they offer a blockchain and a MedRec-based approach by
enabling encryption and attribute based authentication to enable secure sharing of healthcare
data. By applying this approach: 1) The fragmented EHR fragment of all patients can be seen as
a complete record and can be safely stored against tampering; 2) The authenticity of patients’ EHR
can be verified; 3) Flexible and finer access control can be provided 4) It is possible to maintain
a cleared audit trail
According to Vipul Goyalet . Al [9] develops new cryptosystems to share encrypted data prop- erly,
which we call key-policy attribute-based encryption (KPABE). In our cryptosystem, Cefhet-text is
labeled with a set of properties and controls that it connects to private key access config- urations that

PCCOE, Department of Computer Engineering 2021-22


6
a user can decrypt the encryption. We display the utility of our product to share audit log
information and broadcast encryption. Our creation supports private key providers, which
subscribe to categorized identification-based encryption (HIBE).

According to SarmadullahKhanet. Al [10] embedded power transactions in blockchain are


based on their defined characteristics through the signature of many manufacturers. These sig-
natures have been verified and customers are satisfied with the features that do not open any
information that meet those features. The public and private key manufacturers have been cre-
ated for these customers and using this key ensures that the support process is authorized by
customers. There is no central authority required in this perspective. To protest against colli- sion
attacks, the makers are given secret pseudo-functional work seeds. Comparative analysis shows
the efficiency of the proposed approach to existing people.

2.1 COMPARISON TABLE

Table 2.1: Comparison Table

Title Year Observations


Block chain-Based IoT Application 2020 It applicable on smart IoT environment,Not
Using Smart Contracts: Case Study of focused on data privacy.
M2M Autonomous Trading [11]
Edgence: A Block chain-Enabled 2020 Fixing bugs or updating DApps is difficult,
Edge-Computing Platform for Intelli- as every peer in the network has to update
gent IoT-Based dApps.[12] their node software.
HCloud: A Trusted JointCloud Server- 2020 It required High performance computation
less Platform for IoT Systems with for better outcomes.
Blockchain [13]
A Natural User Interface and 2020 No data security provision during data trans-
Blockchain-Based In-Home Smart mission from controller to database server.
Health Monitoring System [14]
Addressing Security and Privacy Is- 2020 Time consuming due to low hash rate and
sues of IoT using Blockchain Technol- high difficulties of mining.
ogy [15]
Cyberphysical blockchain-enabled 2020 It achieves this by managing physical, so-
peer-to-peer energy trading [16] cial and business infrastructures, using tech-
nologies such as the Internet of Things (IoT),
cloud computing and network systems.

PCCOE, Department of Computer Engineering 2021-22


7
Demonstration of Blockchain-based 2020 The application of blockchain-based devices
IoT Devices Anonymous Access Net- anonymous access in the IoT scenario, and
work Using Zero-knowledge Proof. realize the digital identity generation, en-
[17] cryption and network access authentication
of devices in the Internet of Things
SLPoW: Secure and Low Latency 2020 The main idea of our protocol is providing
Proof of Work Protocol for Blockchainin a suitable consensus protocol for dense IoT
Green IoT Networks. [18] networks SLPoW protocol provides an ap-
propriate hash method to increase the secu-
rity of the IoT networks.
IoT Data Security Via Blockchain 2020 SCN provides communication by service
Technology and Service-Centric Net- names instead of addresses, and a decentral-
working [19] ized network that allows the users of the net-
work to communicate fast and data are reli-
able and secure.
Networking Integrated Cloud-Edge- 2020 The further improve the traditional Proof of
End in IoT: A Blockchain-Assisted Work (PoW). Instead of solving a meaning-
Collective Q-Learning Approach. [20] less puzzle, we regard the learning process in
the IoT node as a piece of work

PCCOE, Department of Computer Engineering 2021-22


8
CHAPTER 3
SOFTWARE REQUIREMENTS SPECIFICATION

PCCOE, Department of Computer Engineering 2021-22


9
SOFTWARE REQUIREMENTS SPECIFICATION

3.1 INTRODUCTION

A Software requirements specification document describes the intended purpose, requirements and
nature of software to be developed. It also includes the yield and cost of the software. A
Software Requirements Specification (SRS) is describes the nature of a project, software or
application. In simple words, SRS is a manual of a project provided it is prepared before you kick -
start a project/application. A software document is primarily prepared for a project, software or any
kind of application.

3.1.1 Project Scope

According to industry analysts, blockchain, a digital laser technology that can reliably maintain data
records and ever-growing lists of transactions, has the potential to revolutionary real estate. The real
estate industry's approach to data simplification and acceleration in areas like revenue cycle
management, real estate data inseparability, and supply chain verification, as well as dramatically
lowering back-office data input and maintenance costs in the blockchain, and data accuracy and security,
has the potential to improve.

3.1.2 User Classes and Characteristics

The protocol is implemented in Java language .We also use HTTP/TCP/IP protocols. The system
design has done using java web application. Network programs also present serious problems in the
areas of security and portability. When we download a normal program we risk viral infection. Java
provides a firewall to overcome these problems. Java concerns about these problems by applets. By
using a Java compatible Web browser we can download Java appletswithout fear of viral infection.

PCCOE, Department of Computer Engineering 2021-22


10
3.1.3 Assumptions and Dependencies

1. The new nodes agree with the transaction of block which is sending by the old nodes.

2. The new nodes don’t agree with the transaction of block which is sending by the old
nodes.

3. The old nodes agree with the transaction of block which is sending by the new nodes.

4. The old nodes don’t agree with the transaction of block which is sending by the new
Nodes.

3.2 FUNCTIONAL REQUIREMENTS

• Fast and Efficient

• User friendly GUI

• Re-usability

• Performance

• System validation output

• Proper Output

3.2.1 System Feature 1

1. Supply (Farmer)- A farmer is first entity in agri-food supply chain, first one to invoke smart
contract for trading.

2. User’s Group: The maintains warehouse by (processing, storing & managing) supply ofgoods
from producers & certification of various product standards authentication regard-ing quality.

3. NGO: NGO- To purchase consumer-products and to collect leftover food from different
places.

4. Admin: The admin creates multiple farmers, which contains basic information such as

PCCOE, Department of Computer Engineering 2021-22


11
farmers’ names, addresses and other cooperative information. The administration can update
and delete the information of the farmers respectively. The administrator also has access to see
all customers and distributors through the specific user in the log report. The maintains
warehouse by( processing ,storing & managing )supply of goods from producers &
certification of various product standards authentication regarding quality

5. Distributed Blockchain: The Blockchain is the distributed ledger used to represent the current
state of delegated access rights in the system. Permissions to interact with the Blockchain are
handled by the Root Authority and the Attribute Authorities.

• Make transaction
• Block Generation and blockchain validation
• Consensus Algorithm validation and block chain recovery

• Results Generation

This system highlights the implementation of e-transaction system using blockchain for such a
proposal from a practical point view in both development/deployment and usage contexts.
Concluding this work is a potential roadmap for blockchain technology to be able to support
complex applications. In the system carried out transaction system for online user, where end user
easily access the system and make the transaction without using any third party validation. The
system can’t be generating any high level hard- ware configuration requirement, it possible to
make vote using traditional configuration. The able to perform the transaction without any
hardware device with drastic security manner. In this data is processed in multiple servers so the
transactions are processed in sequencing P2P distributed network. This illuminates the quality of
service issue and time limits. This is a middleware system in which the processing environment in
which the load will be balanced using threads. The request generated will be parallels saved on all
nodes in a Blockchain manner. We use the Hash generation algorithm and the Hash will be
generated for the given string. Before executing any transaction, we use peer to peer verification to
validate the data. If any chain is invalid then it will recover or update the current server blockchain.
This will validate till the all nodes are verified and commit the query. Mining algorithm is used for
checking the hash generated for the query till thevalid hash is generated.

PCCOE, Department of Computer Engineering 2021-22


12
3.2.2 System Feature 2

Decentralization: Decentralization is the dispersion of functions and controls from a central


authority to all the units involved. In blockchain a centralized authority is not available. Instead, every
blockchain user (miner) is provided with a copy of the transaction ledger and a new block is added by
validating transaction by the miners involved. In a decentralized environment the network operates
on a peer-to-peer (user-to-user) basis. The researchers in use this element of blockchain as one of
the major aspects in developing Ethereum digital currency.

Consensus model(s) : Data saved on the blockchain is protected thanks to the consensus
model(s). Many issues and methods, such as blockchain forks, consensus failures, dominance
disputes, validating nodes, and poor blockchain network performance, are known to arise when
the consensus mechanism fails. A consensus protocol has three properties based on applicability
and efficiency:
a). Safety: A consensus protocol must be safe and consistent, meaning that all nodes should
produce the same output which is valid in accordance with the protocol rules.
b). Liveness: A consensus protocol promises liveness of all non-faulty nodes to yield a value. c).
Fault Tolerance: A consensus protocol provides tolerance while providing recovery to afailure
node participating in consensus.
Transparent: The blockchain network routinely checks in with itself every ten minutes in or- der to
self-audit the ecosystem of a digital value, which reconciles transactions that happen in ten-minute
intervals. A collection of these transactions is referred to as a “block”. Two result- ing properties,
transparency and inability of corruption, are generated.
Open source : A decentralized and closed-source application needs user to trust that the ap-
plication is decentralized and the data cannot be accessed from a central source. Closed-source
applications act as a barrier to adoption by users. The repugnance to a closed source network is
noticeable when the application is intended to receive, hold, or transfer user funds. Even though it is
possible to launch a closed source decentralized application, the level of the difficulty to achieve
the desired result would be catastrophic, making it obvious for the users to favor open source
participants. Open sourcing a decentralized application modifies the structure of busi- ness
practices who used to favor the Internet as the common denominator.

PCCOE, Department of Computer Engineering 2021-22


13
Identity and access : The identity and accessibility of a blockchain are related to three main
criteria including public or permission less, private or permission, and consortium. These crite- ria of
blockchain was discussed in detail in. A private blockchain restricts the users from having the
authority to validate block transactions and create smart contracts. This is appropriate for the
traditional businesses and governance models. Public block chains are designed to cut the
middleman out in transactions while keeping the security intact. In public blockchains any user with
access to internet can join the network by participating in block verifications and creating smart
contracts. Consortium blockchains are partly private and allows a few predetermined se- lective
nodes to have full control. It is a substitute for allowing any random user with an internet connection to
verify transactions. The platform like private blockchain provides efficiency and privacy of
transactions.

Autonomy : The main objective of blockchain technology is to switch the trust from one cen-
tralized authority to the whole network without interference. Every node in the blockchain system
can transfer and update information securely. A decentralized autonomous organization (DAO),
which is frequently categorized as decentralized autonomous corporation (DAC), is ex-plained as an
organization that follows a set of rules prearranged as computer programs and termed as smart
contracts. The transaction record and smart contract details are maintained as blocks in blockchain.
Immutability : Immutability is something that is unchanging over a period. In the context of
blockchain, immutability is relevant to data or information stored in the blocks. Once the data or
information is written in a block of blockchain nobody can alter it. This is highly essentially
beneficial for auditing data. On one hand, the provider of data can verify that the data is secure,
efficient, and has not been tampered with or altered. On the other hand, the recipient of data is
confident that data is authentic and unaltered. The immutability element of blockchain is extremely
beneficial for databases used in financial transactions since the records are reserved forever and
cannot be hanged unless somebody takes control of more than 51% of the nodes in the network
simultaneously.
Anonymity : explains the anonymity element of blockchain technology. The blockchain ad- dress
of a miner is necessary for this element and no other detail is required, resulting in anonymity
PCCOE, Department of Computer Engineering 2021-22
14
resolving trust issues. Anonymity of an entity inside a set of entities is not distinguishable. In a
communication system, the anonymity set can be divided into two sets: the sender sets and the
recipient sets.

3.3 EXTERNAL INTERFACE REQUIREMENTS

3.3.1 User Interfaces

The Interface will be in the form of an application. It is designed to be functional and minimal in its
styling. All options will be displayed in a menu based format. Web app will be used to setup the
page layout and add minimal styling to make the interface user friendly.

3.3.2 Hardware Interfaces

The hardware should have following specification’s

• Ability to read gallery

• Ability to exchange data over network

Touch screen for convenience

• Keypad (in case touchpad not available)

• Continuous power supply

• Ability to connect to network

• Ability to take input from user

• Ability to validate user

3.3.3 Software Interfaces

It will also have a MySQL relational database. The main backend processing will be done using
advance java framework including connecting to and accessing the database and processing
requests.
PCCOE, Department of Computer Engineering 2021-22
15
3.3.4 Communication Interfaces

All the program’s features are available offline. You only need an internet connection to download
the application, update it and (optionally) to get some target images for your personal profile. Our
Project belongs to android based, so connecting user at online with request and response form. For
that HTTP protocol we are going to us. HTTP protocol: The Hypertext Transfer protocol is an
application protocol for distributed, collaborative, and hypermedia in- formation systems. HTTP is
the foundation of data communication for the World Wide Web. Hypertext is structured text that
uses logical links (hyperlinks) between nodes containing text.

3.4 NONFUNCTIONAL REQUIREMENTS

3.4.1 Performance Requirements

The only way in which systems will meet their performance targets is for them to be specified
clearly and unambiguously. It is a simple fact that if performance is not a stated criterion of the
system requirements then the system designers will generally not consider performance issues.
While loose or incorrectly defined performance specifications can lead to disputes between clients
and suppliers. In many cases performance requirements are never ridged as system that does not
fully meet its defined performance requirements may still be released as other consideration such as
time to market. In order to assess the performance of a system the following must be clearly
specified:

• Response Time

• Workload

• Scalability

• Platform

PCCOE, Department of Computer Engineering 2021-22


16
3.4.2 Safety Requirements

This Specification shall be sufficient detailed to allow the design and implement to achieve the
required safety integrity and allow an assessment of functional safety

3.4.3 Security Requirements

System security during the data transmission, when user upload image and download image from
cloud server, then eliminate the third party unauthenticate access using proposed authentication
mechanism.

3.4.4 Software Quality Attributes

System must is portable; it can run between only two connected systems or a large Network of
computers. System is maintainable; i.e. in future the properties of the system can be changed to
meet the requirements.

3.5 SYSTEM REQUIREMENTS

3.5.1 Database Requirements

• It should be Mysql database on platform.

• Database must be integrated with key constraints

• It should be maintain the relational base on RDMS and normalization

• System will create database backup on periodic basis.

• It will execute all commands like DML, DDL and DCL as well as we required some
security measurements for sql injection.

PCCOE, Department of Computer Engineering 2021-22


17
3.5.2 Software Requirements (Platform Choice)

• Operating system: Windows XP/7 Higher

• Programming Language: JAVA/J2EE/

• Tools: Eclipse, Heidi SQL, JDK 1.7 or Higher

• Database: MySQL 5.1

3.5.3 Hardware Requirements

• System : Pentium IV (2.4GHz)

• Hard Disk: 500 GB

• Monitor: 15 VGA Color

• Ram : 8GB

PCCOE, Department of Computer Engineering 2021-22


18
3.6 ANALYSIS MODELS: SDLC MODEL TO BE APPLIED

The below table show our project plan, how whole procedure will execute base on SDLC phases.
This plan is the basis for the execution and tracking of all the project activities. It shall be used
throughout the life of the project and shall be kept up to date to reflect the real accomplishmentsand
plans of the project. Below figure shows the software project plan. Requirement gathering and plan
for the initial part of the project was as follows: While requirement gathering and analysis of
proposed system we to understand the problem definition and reliability of system. It also includes
gathering information about required software and hardware.

Figure 3.1: Waterfall Model

• The initial stage is requirement analysis stage here the data is being gathered which is tobe
provided as an input to the system.

PCCOE, Department of Computer Engineering 2021-22


19
• Second stage is the design stage where all the data is being formatted into a particular
matrix. The scores are used to generate the matrix.

• Third stage is the coding stage in which the system performs its main functionality of
mapping of the classes and getting the exact prototype.

• Testing is done in the fourth phase inorder to test the word with the probabilistic label.

• In the maintenance phase it’s the last phase wherein the system has to depict and maintainthe
probabilistic labels of the respective words.

3.7 SYSTEM IMPLEMENTATION PLAN

Table 3.1: System Implementation Plan


Sr. Task Name Begin date End date Remarks
No
1 Selecting project domain 15 July 2021 20 July 2021 Done
2 Understanding project need 21 July 2021 25 July 2021 Done
3 Understanding pre requisites 26 July 2021 30 July 2021 Done
4 Information Gathering 1 Aug 2021 30 Aug 2021 Done
5 Literature Survey 1 Sept 2021 15 Sept 2021 Done
6 Refine Project Scope 16 Sept 2021 18 Sept 2021 Done
7 Concept Development 19 Sept 2021 20 Sept 2021 Done
8 Planning and Scheduling 21 Sept 2021 23 Sept 2021 Done
9 Requirements analysis 24 Sept 2021 25 Sept 2021 Done
10 Risk identification and moni- 26 Sept 2021 27 Sept 2021 Done
toring
11 Design and modeling 28 Sept 2021 15 Oct 2021 Done
12 Design review and refinement 16 Oct 2021 20 Oct 2021 Done
13 GUI design 21 Oct 2021 20 Nov 2021 Done
14 Implementation 21 Nov 2021 15 Feb 2021
15 Review and suggestions for 15 Mar 2022 20 Mar 2022
Implementation
16 Outcome assessment 21 Mar 2022 30 Mar 2022
17 Testing and Quality Assur- 1 Apr 2022 10 Apr 2022
ance
18 Review and suggestions for 11 Apr 2022 15 Apr 2022
Testing and QA
19 Refined QA activities 16 Apr 2022 30 May 2022

PCCOE, Department of Computer Engineering 2021-22


20
CHAPTER 4
SYSTEM DESIGN

PCCOE, Department of Computer Engineering 2021-22


21
SYSTEM DESIGN

4.1 SYSTEM ARCHITECTURE

The system contains following modules:


Supply (Farmer)- A farmer is first entity in agri-food supply chain ,first one to invoke smart
contract for trading .
User’s Group (Consumer): The maintains warehouse by( processing ,storing managing )sup- ply
of goods from producers & certification of various product standards & authentication re-
garding quality.
NGO: NGO- To purchase consumer-products and to collect leftover food from different places.
Distributed Block chain: The Blockchain is the distributed ledger used to represent the current
state of delegated access rights in the system. Permissions to interact with the Blockchain are
handled by the Root Authority and the Attribute Authorities.

Figure 4.1 System Architecture

PCCOE, Department of Computer Engineering 2021-22


22
4.1 DATA FLOW (DFD) DIAGRAMS

DFD which shows how the information moves through the system and how it is modified by a series
of transformations. It is a graphical technique that shows information and the transformation that
are applied as data moves from input to output

4.1.1 DFD Level 0 Diagram

Figure 4.2: DFD Multi Level Basic Flow

PCCOE, Department of Computer Engineering 2021-22


23
4.1.2 DFD Level 1 Diagram

The data flow diagram (DFD) is one of the most important modeling tools. It is used to model the
system components. These components are the system process, the data used by the process, an external
entity that interacts with the system and the information flows in the system.

Figure 4.3: DFD Multi Level Diagram

PCCOE, Department of Computer Engineering 2021-22


24
4.3 UML DIAGRAMS

4.3.1 Activity diagram

Activity diagrams are graphical representations of work flows of stepwise activities and actions with
support for choice, iteration and concurrency. In the Unified Modeling Language, activity diagrams
are intended to model both computational and organizational processes (i.e. work flows). Activity
diagrams show the overall ow of control. Activity diagrams are constructed from a limited number
of shapes, connected with arrows.

Figure 4.4: Activity Diagram

PCCOE, Department of Computer Engineering 2021-22


25
4.3.2 Sequence Diagram

A sequence diagram is a kind of interaction diagram that shows how processes operate with one
another and in what order. It is a construct of a message sequence chart. A sequence diagram shows
object interactions arranged in time sequence. It depicts the objects and classes involved in the
scenario and the sequence of messages exchanged between the objects needed to carry out the
functionality of the scenario.

Figure 4.5: Sequence Diagram

PCCOE, Department of Computer Engineering 2021-22


26
4.3.3 Use case Diagram

Generate data from various resources. Provides data from Agri-food transaction module and
forward to database. Perform all transactions and generate the final results using block chain.

Figure 4.6: Use case Diagram


PCCOE, Department of Computer Engineering 2021-22
27
4.3.4 Class Diagram

The class diagram is a static diagram. It represents the static view of an application. Class diagram
is not only used for visualizing, describing and documenting different aspects of a system but also
for constructing executable code of the software application. The class diagram describes the
attributes and operations of a class and also the constraints imposed on the system

Figure 4.7: Class Diagram

PCCOE, Department of Computer Engineering 2021-22


28
4.4 ENTITY RELATIONSHIP DIAGRAMS

An entity relationship diagram (ERD) shows the relationships of entity sets stored in a database. An
entity in this context is an object, a component of data. An entity set is a collection of similar entities.
These entities can have attributes that define its properties.

Figure 4.8: ER Diagram

PCCOE, Department of Computer Engineering 2021-22


29
CHAPTER 5

OTHER SPECIFICATION

PCCOE, Department of Computer Engineering 2021-22


30
5.1 ADVANTAGES

• Increased communication between producer and consumer

• Improved negotiating positions for the farmers

• Increases transparency in dealings

5.2 LIMITATIONS

• Required multiple database resource to create large peer to peer network

5.3 APPLICATIONS

• Money and time efficient classification for the farmer and end users.

NGO/needy people can get food by this system

PCCOE, Department of Computer Engineering 2021-22


31
CHAPTER 6
TESTING

PCCOE, Department of Computer Engineering 2021-22


32
SOFTWARE TESTING

6.1 TYPES OF TESTING

1)Unit Testing

Unit Testing is the testing of an individual unit or group of related units. Unit testing often comes
under white box testing. Programmer test that the unit he/she has implemented is giving the
expected output to the given input.

2) Integration testing

In Integration Testing the group of components are combined to produce output. If software and
hardware components have any relation it is tested that the software or hardware has any
interaction between them. It may fall under both white box testing and black box testing. It has
two testing under it. These are- (a)Top to bottom. (b)Bottom to top. Top to bottom: In this, the
system is divided into different modules. Each module is tested from top to bottom. Bottom to
top: In this type of testing, every module is tested individually and at the end all modules are
integrated.

3) Functional Testing
Functional testing is the testing to ensure that the specified functionality required in the system
requirements works. Functional testing is a class of black box testing.

6.2 TEST CASES AND RESULTS

System Testing: The purpose of testing is to discover errors. Testing is the process of trying to
discover every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub assemblies, assemblies, and/or a finished product. It is

process of exercising software with the intent. Software system meets its requirements and user
expectations and does not fail in an unacceptable manner. There are various types of tests. Each test

PCCOE, Department of Computer Engineering 2021-22


33
type addresses a specific testing requirement.

Test
Case Test Case Expected Actual Result Status
id Result

1 Choose Login page Login page Passed


login opens opens

2 Choose Registration Registration Passed


registration page opens page opens
with required with required
details details
3 Submit Back to login Back to login Passed
button is page page
clicked
after
entering
registratio
n detials
4 User page Page Page according Passed
details according to to user choosen
user choosen is displayed
is displayed

5 User Shows choose Shows choose Passed


uploads a qr file file
code
6 users click Shows No file Shows No file Passed
on submit chosen chosen page
without
uploading a
Qr code
7 Users click Upload Upload window Passed
on upload window is is opened
button opened

Table 4.2.1 Functional Testing

PCCOE, Department of Computer Engineering 2021-22


34
CHAPTER 7
IMPLEMENTATION

PCCOE, Department of Computer Engineering 2021-22


35
IMPLEMENTATION

7.1 OVERVIEW OF PROJECT MODULES:

The modules included in our project are, firstly the page through which the customer can login and
register himself/herself. Once this is done then customer module has been developed where a customer
can check on the product that has been placed and track the order with traceability that blockchain
provides and our platform as made easy to use and swift with one go use system that makes the customer
feel flexible with our application. the customer gets its details with the usage of QR code so that the
customer gets the information of particular product displayed which is stored using the Inter planetary
way of storing files in the disk. this particular system makes developers usage also easy to go in one shot
which has a huge storage system that provides great level of sophisticated space storage and retrieval is
easy too.

The next module is module that indicates farmer page on our application where this is one of the sides
that shows information of product placed by the farmer and hence farmer can check the order placed by
the customer and accordingly the required product details can be uploaded by the farmer and then
dispatch. Here the farmer too has the tracing system usage that is offered by the new technology
blockchain.

7.2 TOOLS AND TECHNOLOGIES:

The tools and technologies we used are eclipse, SQL, blockchain technology which play main role here.
The databases used are playing important role in combination with file storing system that stores details
of products as well some of the system that is useful in storing information and finally block that stores
the hash value and keeps it linked to the other blocks being in a distributed system over peer-to-peer
network as this network is used for distributed kind of systems.

Tools like Eclipse, MySQL


Technology uses Blockchain Technology with QRious for generating QR code using JAVA and J2EE

7.3 IMPLEMENTATION:

Tools like eclipse are very powerful when working on java like programming languages. The
implementation is according with model as mentioned before nothing but waterfall model and
accordingly implemented the steps.

The initial step was to first work on problem statement related solutions that have been previously
implemented and all the various kinds of platforms that were built in the history of blockchain and study
all the ways and process as well as methods that have been worked on. The important factor that we
studied was limitations that we will overcome in our project. There are many limitations in blockchain
that we need to overcome and which have still been not yet worked upon.

The previous traditional methodology: In the traditional method there are many factors where a
solution was developed which included farmer, customer, distributor, arbitrator, company, retailer. So
many middle men create a gap for eating of money from customers and poor people which cannot afford
such high rates of these products because of middle men. Farmers too because of this do not get proper
PCCOE, Department of Computer Engineering 2021-22
36
wages and these leads to the down line of bread butter of poor's family. In all the traditional
methodologies there a lot of middlemen and working on these so that there is direct communication
between farmer and customer direct.

The new methodology introduced: In the new system that we have introduced has reduced the
middlemen into farmer, distributor and customer. But later on, we all will be experiencing the power of
blockchain in our day to day lives. In future we aim to scope to reduce the distributor and make this
system only from farmer to customer or customer to farmer directly. In our project in future, we will be
aiming to develop a software web application where the farmer and customer will enjoy the benefits of
market by reducing the middle men so that these people do not eat up the money that belongs to farmer
and customer making the market a better place.

The Algorithms Used:

1. Consensus Mechanism types: -


There are many types of mechanism that one can use in their use case particularly. The basic Proof-of-
Work and Proof-of Stake is that both are trying to give a proof of validation for the further to be carried
on. The basic difference is that one is “Work” and other is “Stake” which means that miners have
worked upon the mathematical quiz or puzzle or problem solving that has further given confirmation and
in proof-of-stake it means that financial asset has be put on stake for validating only on the valid
transaction in blockchain.

The basic types of consensus algorithms are


1. Proof-of-Work
2. Proof-of-Stake
3. Proof-of-Stake With Delegated Ownership
4.Fault tolerance with Byzantine Style
a. Fault tolerance in Byzantine Practice
b. Byzantine Fault tolerance delegated
5. Direct Acyclic Graph
6. Proof-of-Burn
7. Proof-of-Capacity
8. Proof-of Authority
9. Proof-of-Elapsed Time
10. Proof-of-Importance
World Widely used consensus algorithm is Proof-of-work as this method is better than stake in many
ways providing many benefits and the main benefit is that work reduces the cost required by miners to
mine a block whereas proof-of-work requires a math solved by miner to mine the block hence reducing
cost that make blockchain has and making it available and easy to use for everyone.

2. Algorithm:

The algorithm Secure Hash Function (SHA 2), is the main algorithm that has been used here as the basic
building foundation for the application and using this we have developed our project of supply chain.
The Sha-2 basically works in a particular strategy which is fixed on how the miners will work and solve
the math puzzle assigned to them.

PCCOE, Department of Computer Engineering 2021-22


37
7.3.1 Markle Damgard Construction

7.3.2 One Way Compression Function

The above figure is Markle Damgard construction in figure 6.2.1 shows that the crypto-graphic hash
function does not collide with other cryptographic hash function making it one way to use which is based
upon One way compression function as shown in the figure 6.2.2. Markle Damgard was used in
developing many hash functions. In one way compression function as shown in the figure takes input A
and input B and converts into output C that means two inputs and one output.

Let Input A = 128 bits,


Input B =128 bits

Input A+ Input B = Output c ..................................... (1)


where the strings are of fixed length.

PCCOE, Department of Computer Engineering 2021-22


38
So, using Markle dimensions in the above calculation we can map as,

Input A = Message 1,
Input A1 = Message 2,
.
.
.
Input n = Message n
This is one set of input of input A

Input B = Message 1,
Input B1 = Message 2,
.
.
.
Input n = Message n

Applying the above in equation (1),

Input A + Input B = Output C


(finalization)
Message 1+message 2+...+message n + message 1+messgae 2 +...+message n = Hash

As given in one way compression diagram the inputs first pass-through f block named F that means
finalization and then after passing through that block it converts the 128+128-bit string only into a single
128-bit string.

This structure is built on the Davies Meyer structure as it indicates that it is difficult to compress 2 inputs
to a single output but it very difficult to decompress those inputs back from the output of 128-bit string.
Because of this security this is highly scalable structure to use.

The SHA Family


a. SHA 0
b. SHA 1
c. SHA 2
1. SHA 224(224 digest)
2. SHA 256(256 digest)
3. SHA 384(384 digest)
4. SHA 512(512 digest)
5. SHA 512/224(512/224 digest)
6. SHA 512/256(512/256 digest)
d. SHA 3

In 2011 the attack that took place broke the 64/ 80 rounds of SHA family
From 80 rounds – 57 broke -- > SHA 512
From 64 rounds – 52 broke -- > SHA 256

Pseudocollision attack – From 64 rounds - 46 broke -- > SHA 256


PCCOE, Department of Computer Engineering 2021-22
39
This is the reason that SHA 256 and SHA 512 are mostly proned to attacks that are length based.

Sucess Probability of SHA 224 and SHA 384 :-


2 POW -(256-224) = 2 POW(-32) > 2 POW(-224)
2 POW -(512-384) = 2 POW(-128) > 2 POW (-384)

Application - The Sha 2 algorithm has widely used application such as in security and protocols that
include
1. TSL
2. SSL
3. PGP
4. SSH
5. S/MIME
6. IPsec

Test Vectors:

SHA224(““)
0x d2n3hfk5sx01nf2284nmcjmw998tgnr8ft8f
SHA256("")
0x enmwieufh4ty89q304hfu8w5riuenajkvnd4y38ut648208491q4uh3fhq98f3jqh
SHA384("")
0x 38b0buwipbec3ub5yj4ervnieqpugurq374983pwinaep9735hrvnd
SHA512("")
0x cianwcne9a8p0yt83470tw80fehroishvybryq97g622r4tgyhev rgf76yue
SHA512/224("")
0x
6ebahvg465yrtq326874813q9wybvrfy5vrgbhekbfq743t7438tfbe8yrf732478tfnefyt68403fnjewfhbyq
4
SHA512/256("")
0x cncwjnbfjwioefurh749348baoefaj74958yb289fbjefc

Pseudo Code / Algorithm: -

1. We first initialize hash value (32 bits of the fraction part)


a. h0 := 0x...
b. h1 := 0x...
c. h2 := 0x...
d. hn := 0x...

2. Initialize array of round constants k[0..63](includes all the combination of hash


value upto 63)

3. Start padding of preprocessing - Begin with original message

4. Processing of message --> 512 bits of chunks

PCCOE, Department of Computer Engineering 2021-22


40
5. For each chunk create message of scheduled array of w[0..63]

6. Initialization of variable to hash value


a. a := h0
b. b := h1
c. c := h2
d. d := h3
e. e := h4

7. Compression main loop


a. for i from 0 to 63
b. Then calculate temp1 temp 2

8. Adding of compressed chunk value to current hash value


a. h0 := h0 + a
b. h1 := h1 + b
c. h2 := h2 + c
d. h3 := h3 + d
e. h4 := h4 + e

9. Generation of final hash value

PCCOE, Department of Computer Engineering 2021-22


41
CHAPTER 8

RESULTS

PCCOE, Department of Computer Engineering 2021-22


42
8.1 GUI Screenshots

8.1.1 Login page

8.1.2 Register

PCCOE, Department of Computer Engineering 2021-22


43
8.1.3 Web page displaying product information

PCCOE, Department of Computer Engineering 2021-22


44
8.1.4 Web page to add products

PCCOE, Department of Computer Engineering 2021-22


45
8.1.5 Web page to home details

PCCOE, Department of Computer Engineering 2021-22


46
8.1.6 Web page to show food data

8.1.7 Web page to show details of product added

PCCOE, Department of Computer Engineering 2021-22


47
CHAPTER 9
CONCLUSION

PCCOE, Department of Computer Engineering 2021-22


48
CONCLUSION

9.1 CONCLUSION

We can implement an online system to help with the selling and buying of agricultural products with
good cost estimation and safety factors in mind, as well as good quality processed food for the poor,
using the appropriate hardware and software to benefit farmers, consumers, the scale of this business,
and the need for more trustworthy and effective information agreement solutions.

9.2 FUTURE SCOPE

Future research will focus on this overall scalability and speed over time to improve the user
experience.

PCCOE, Department of Computer Engineering 2021-22


49
APPENDIX A

Title: Project problem statement feasibility assessment using NP-Hard, NP


Complete orsatisfiability issues using modern algebra and/or relevant mathematical
models.

a. P-Problem: A problem is assigned to the P(polynomial time) class if


there exits at least one algorithm to solve that problem, such that the
number of steps of the algorithm is bounded by a polynomial in
O(n),where n is the size input.

b. NP-Problem: A problem is assigned to NP (non-deterministic


polynomial time) class if it is solvable in polynomial time by a non-
deterministic Turing machine.

PCCOE, Department of Computer Engineering 2021-22


50
APPENDIX B

APPENDIX C

PCCOE, Department of Computer Engineering 2021-22


51
PCCOE, Department of Computer Engineering 2021-22
52
1. Shahid, Affaf, et al. ”Blockchain-based agri-food supply chain: A complete solution.” IEEE
Access 8 (2020): 69230-69243.

2. Xu, Jinliang, et al. Edgence: A blockchain-enabled edge-computing platform for intelli- gent
IoT-based dApps China Communications 17.4 (2020): 78-87.

3. Huang, Zheng, Zeyu Mi, and Zhichao Hua. HCloud: A trusted Joint Cloud server less
platform for IoT systems with blockchain China Communications 17.9 (2020): 1-10.

4. Gheitanchi, Shahin. And Gamified service exchange platform on blockchain for IoT busi- ness
agility & 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
IEEE, 2020.

5. Rahman, Md Abdur, et al. A Natural User Interface and Blockchain-Based In-Home Smart
Health Monitoring System. 2020 IEEE International Conference on Informatics, IoT, and
Enabling Technologies (ICIoT). IEEE, 2020.

6. “Smart Contracts,” http://searchcompliance.techtarget.com/definition/ smart-contract, 2020,


[Online;accessed 4-Dec- 2020]

7. A. Dorri, S. S. Kanhere, and R. Jurdak, “Blockchainin internet of things: Challenges and


Solutions,”arXiv: 1608.05187 [cs], 2019. [Online]. Available:

8. Yang, Huihui, and Bian Yang. ”A Blockchain-based Approach to the Secure Sharing of
Healthcare Data. “Proceedings of the Norwegian Information Security Conference. 2020

9. Goyal, Vipul, et al. ”Attribute-based encryption for fine-grained access control of en- crypted
data.” Proceedings of the 13th ACM conference on Computer and communica- tions security.
Acm, 2006.

10. Khan S, Khan R. Multiple authorities attribute-based verification mechanism for Blockchain
mircogrid transactions. Energies. 2018 May;11(5):1154

11. Gong, Xinglin, Erwu Liu, and Rui Wang. ”Blockchain-based IoT application using smart
contracts: case study of M2M autonomous trading.” 2020 5th International Conference on
Computer and Communication Systems (ICCCS). IEEE, 2020.

PCCOE, Department of Computer Engineering 2021-22


53
12. Huang, Zheng, Zeyu Mi, and Zhichao Hua. ”HCloud: A trusted JointCloud serverless
platform for IoT systems with blockchain.” China Communications 17.9 (2020): 1-10.

13. Rahman, Md Abdur, et al. ”A Natural User Interface and Blockchain-Based In-Home Smart
Health Monitoring System.” 2020 IEEE International Conference on Informatics, IoT, and
Enabling Technologies (ICIoT). IEEE, 2020.

14. Mohanta, Bhabendu Kumar, et al. ”Addressing security and privacy issues of IoT using
blockchain technology.” IEEE Internet of Things Journal 8.2 (2020): 881-888.

15. Ali, Faizan Safdar, et al. ”Cyberphysical blockchain-enabled peer-to-peer energy trad- ing.”
Computer 53.9 (2020): 56-65.

16. Yuan, Jiaqi, et al. ”Demonstration of Blockchain-based IoT Devices Anonymous Access
Network Using Zero-knowledge Proof.” 2020 International Wireless Communications and
Mobile Computing (IWCMC). IEEE, 2020.

17. Yazdinejad, Abbas, et al. ”SLPoW: Secure and Low Latency Proof of Work Protocol for
Blockchain in Green IoT Networks.” 2020 IEEE 91st Vehicular Technology Conference
(VTC2020-Spring). IEEE, 2020.

18. Al-madani, Ali Mansour, and Ashok T. Gaikwad. ”IoT Data Security Via Blockchain
Technology and Service-Centric Networking.” 2020 International Conference on Inven- tive
Computation Technologies (ICICT). IEEE, 2020.

[11] Qiu, Chao, et al. ”Networking Integrated Cloud-Edge-End in IoT: A


Blockchain-Assisted Collective Q-Learning Approach.” IEEE Internet of
Things Journal (2020).

19. Xu, Jinliang, et al. ”Edgence: A blockchain-enabled edge-computing platform for intel- ligent
IoT-based dApps.” China Communications 17.4 (2020): 78-87.

PCCOE, Department of Computer Engineering 2021-22


54

You might also like