SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1441
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN
ALGORITHM ON IoT DEVICES
Rajagopalan.B1, Revanth.R2, Sandhiya.G3, Shamsiya Banu.A.R4, Ms. Abirami .S5
1,2,3,4 Department of Electronics and Communication Engineering, SRM Valliammai Engineering College
5Department of Electronics and Communication Engineering, SRM Valliammai Engineering College
---------------------------------------------------------------------***------------------------------------------------------------------ ---
Abstract - A blockchain is a upcoming revolutionary one
with crypto smart contract that is used for tokentransaction
with the help of unique address id. In this blockchain
transactions, each block contains unique id ,hash rate and
the content of the previous block .In this manner all the
blocks are interconnected to ensure security. In terms of
privacy and security it fulfils everything,herethesenderand
receiver cannot be knownby thethird man.Tamperingthese
integrated blocks will be difficult. All the blocks in the
blockchain are encrypted If one has to tamper or steal the
data from the blocks, they have to hack 60-70% of the
blocks. If they fail to do ,the system will automatically
initialize the tamper blocks as NIL so that the tokensthatare
hacked by hacker will be declared as void. Image if we add
this type of security to our IOT and next gen devices, we can
reduce the tampering and data stealingcanbeminimal.Here
we are done a basic payment verification blockchain coding
in python and we implemented it on the IOT device (ESPN
kit)
INTRODUCTION
A blockchain is simply a distributed database of records or
public ledger of all completed and shared transactions or
digital occurrences. Every transaction in the public ledger is
confirmed by a majority of the system's members.
Information cannot be deleted once it has been entered.
Every every transaction ever made is recorded in the
blockchain, which is certain and provable .To give a simple
analogy, stealing a cookie from a cookie jar stored in an
isolated location is far easier than stealing a cookie from a
cookie jar placed in a market place when hundredsof people
will watch the process.
A blockchain is simply a distributed database of records or
public ledger of all completed and shared transactions or
digital occurrences. Every transaction in the public ledger is
confirmed by a majority of the system's members.
Information cannot be deleted once it has been entered.
Every every transaction ever made is recorded in the
blockchain, which is certain and provable .To give a simple
analogy, stealing a cookie from a cookie jar stored in an
isolated location is far easier than stealing a cookie from a
cookie jar placed in a market place when hundredsof people
will watch
Blockchain on IOT
Engineers can utilise blockchain data sharing to enable IoT
devices to communicate with one another in the IoT. The
gadgets accomplish this without the use of a centralised
network. The distributed network of computer systemsthat
makes up the blockchain makes those communications
tamper-proof. Hundreds of billions, if not trillions,ofdevices
will be connected to the InternetofThings.However,most of
these devices now interact through centralised computing
systems, which can fail at times. Other issues are caused by
hackers. And the costs are enormous. Blockchain, on the
other hand, avoids this by establishing a digital ledger of
data, such as transactions. By confirming and adding to the
blockchain, each data block builds on the previous one.
Leasing a truck. According to the Gartner Inc. research
"Integrating Blockchain With IoT Strengthens Trust in
Multiparty Processes," IoT sensors installed in leased
vehicles may record crucial events on a blockchain to better
monitor fleet whereabouts and returns, as well as to enable
more meaningful payment methods. With IoT sensors on
board vehicles, truck leasing businesses will be able to
charge renters fees depending on the torque of the loads
rather than miles, as is now the case," according to the
article. "The blockchaindistributedledgertechnologyallows
people to share a single version of the truth." The data is not
controlled by any single institution, and truckersandleasing
businesses may independently check their owncopiesofthe
distributed ledger. This blockchain/IoT connection should
aid leasing organisations in increasing income while
lowering costs.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1442
All of this means that the information cannot be tampered
with. It provides for efficient embedded system verification
in the IoT. As a result, IoT devices can use the technology to
connect safely.
Existing System
In Early 2008, some group of anonymous experts developed
blockchain like peer-peer network lately in2009,the bitcoin
was developed (first digital currency in the world).
Transaction in Ethereum smart contractandripplecurrency
are done in blockchain. In India, the CBSE exam results are
published through blockchain. Insmartcontracts,itrequires
high hash rate to process the data which is too expensive.
However, there is no support for low-end devices because
the process is very complicated and difficult to process.
Proposed System
Here we are sorting out the problem in low end IOT devices
also. To prove this, we demonstrated through ESPN kit (IOT
Device), Node MCU, RFID card which contains unique
information about the user and we implemented blockchain
code through python. The RFID card works like Wi-Fi hard
here, RFID reader is connected to the ESPN kit which has Wi-
fi and Bluetooth connection for access. Also contains 32-bit
LX106 RISC microprocessor for high processing rate. Every
customer information is dumped in these cards like
debit/credit cards. And the kit is connected to monitor to
conduct the experiment and the output is verified
METHODOLOGY
SHA256 ALGORITHM IN BLOCKCHAIN: SHA256 is a
patented cryptographic hash function that returns a 256-bit
value. What is a hash? Encryption transforms data into a
secure format that cannot be read unless the recipient has
the key. In encrypted format, the size of the data is unlimited
and is often the same as unencrypted. This algorithm is used
in blockchain technology that has been used to secure the
data of transaction in this project.
ARDUINO IDE:The Arduino Integrated Development
Environment - or Arduino Software (IDE) -contains a text
editor for writing code, a message area, a text console, a
toolbar with buttons for common functions and a series of
menus. It connects to the Arduino hardware to upload
programs and communicate with them. In this project,
Arduino IDE is used to read the data from the RFID reader to
Serial Monitor and verify the data for further processing.
EMBEDDED C
Embedded C is most popular programming language in
software field for developing electronic gadgets. Embedded C
programming plays a key role in performingspecificfunction
by the processor. In this project, Embedded C is used for
Arduino IDE.
PYTHON IDLE
Python IDLE is a IDE for Python which has inbuiltlibrariesin
it. It helps us to code faster and it has automatic indentation
features. In this project, Python IDLE is used as the main
language for generating Blockchain algorithm.
NODE MCU AND RFID CARDS:
Node MCU ESP8266 development board isthecontrollerused
in the project. It is based 32-bit LX106 RISC microprocessor
and supports RTOS. It has in-built Wi-Fi / Bluetooth features
used for remote access. Consumes Less energy. RFID (Radio
Frequency Identification) cards are used for transaction
purpose.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1443
REPRESENTATION:
This is the real-time representation of our project. ESP8266
kit is used to receive the data from the user. Here we are
going to use RFID (Radio Frequency Identification) cards for
scanning the data. This data is scanned by RFID reader and
verified by the SERIAL MONITOR ('tether' between the
computer and Arduino). The RFID card number has been
already pre-registered in the program (Only registered RFID
cards can be used). GPIO (General Purpose Input Output) is
used to connect the kit with the system through USB. The
data travels through the PROOF OF WORK. Once it passes the
PROOF OF WORK, the data will be entered into the program
and saved in the ledger. The first data enters the first ledger
called Genesis Block. The hash value of the block is generated
and previous hash will be zero since there is no previous
block. Then when the second data enters, same steps are
followed and the second data is stored in second ledger. The
previous hash of the second block will be the current hash of
the first block (Genesis Block). Then the current hash of
second ledger will be the previous hash of third ledger.This is
the way blockchain algorithm works. Thehashvaluewegetis
of 256-bit value (64 characters) since we are using SHA256
algorithm. The information of the user will be stored as
blocks and if any changes occur in hash value, then we can
easily detect the malicious act. However, hacking this
technology is not easier to do and this will be the safest way
for low-end devices to protect the information against
hackers.
OUTPUT
The program printsseveralinformationsowecanget
a clear understanding about the process. The information of
the user is stored in blocks and protected by hash function.
The program asks for the amount to be transacted as an
input and the output shows the current hash of the block
(ledger), block data code, RFID card name (customer name),
amount to be transacted and the previous hash of the block.
The hash value has 64 characters and it isa256bitvalue.The
program also use inbuild functions from Python Library to
display the exact time and date when the transaction occurs
to add more accuracy to the output. This output is just a real-
time representation of how the data are protected in
blockchain algorithm.
CONCLUSION
The program prints several information so we can get a clear
understanding about the process.Theinformationofthe user
is stored in blocks and protected by hash function. The
program asks for the amount to be transacted as an input
and the output shows the current hash of the block (ledger),
block data code, RFID card name (customer name),amountto
be transacted and the previous hash of the block. The hash
value has 64 characters and it is a 256 bit value. Theprogram
also use inbuild functions from Python Library to display the
exact time and date when the transaction occurs to add more
accuracy to the output. This output is just a real-time
representation of how the data are protected in blockchain
algorithm.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1444
REFERENCES
[1] J. A. Stankovic, I. Lee, A. Mok, and R. Rajkumar,
“Opportunities and obligations for physical computing
systems,” Computer, vol. 38, no. 11,pp. 23–31, Nov. 2005.
[2] W. Wolf, “Cyber-physical systems,” Computer, vol. 42, no.
3, pp. 88–89,Mar. 2009.
[3] Bellare, Mihir; and Rogaway, Phillip. (September 21,
2005). “Introduction.” In Introduction to Modern
Cryptography (p. 10).
[4]loFundamentals and Applications in Contactless Smart
Cards and Identification, May 2003
[5] ESP8266 Node MCU Using Arduino IDE: Getting Start
With ESP8266 (IoT hands on projects)May 2018
[6] Python: A Beginners Complete Reference Guide to Learn
The Python Programming Language, June 2019
BIOGRAPHIES
B.Rajagopalan pursuing his B.E., in
Electronics and Communication in 2022
from the college of SRM Valliammai
Engineering College.
R.Revanth pursuing his B.E., in
Electronics and Communication in 2022
from the college of SRM Valliammai
Engineering College.
G.Sandhiya pursuing her B.E., in
Electronics and Communication in 2022
from the college of SRM Valliammai
Engineering College.
A.R.Shamsiya Banu pursuing her B.E., in
Electronics and Communication in 2022
from the college of SRM Valliammai
Engineering College.

More Related Content

Similar to A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES (20)

PPTX
A Secure Model of IoT Using Blockchain
Altoros
 
PDF
Blockchain for IoT - Smart Home
Biagio Botticelli
 
PDF
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
AlAtfat
 
PPTX
220943-RSP.pptx
INDHUJALV
 
PDF
Blockchain Fundamental_KIPMI_2022.02.26.pdf
adinugroho751867
 
PDF
Blockchain for IoT
Federico Tenga
 
PDF
The Role of Blockchain in Securing IoT Devices (www.kiu.ac.ug)
publication11
 
PDF
Blockchain for the internet of things a systematic literature review
eraser Juan José Calderón
 
PDF
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET Journal
 
PDF
IoT Cryptocurrency Can Be The Next Big Thing In Blockchain.pdf
imoliviabennett
 
PDF
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
IRJET Journal
 
PDF
Blockchain with iot
SuryaKumarSahani
 
PDF
How blockchain will defend iot
Hitesh Malviya
 
PPTX
blockchain and iot: Opportunities and Challanges
Chetan Kumar S
 
PDF
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET Journal
 
PDF
IRJET- Blockchain Technology for Agriculture Development
IRJET Journal
 
PDF
final.pdf
ishantpatil1
 
DOCX
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
herminaprocter
 
DOCX
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
RAJU852744
 
DOCX
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
jesusamckone
 
A Secure Model of IoT Using Blockchain
Altoros
 
Blockchain for IoT - Smart Home
Biagio Botticelli
 
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
AlAtfat
 
220943-RSP.pptx
INDHUJALV
 
Blockchain Fundamental_KIPMI_2022.02.26.pdf
adinugroho751867
 
Blockchain for IoT
Federico Tenga
 
The Role of Blockchain in Securing IoT Devices (www.kiu.ac.ug)
publication11
 
Blockchain for the internet of things a systematic literature review
eraser Juan José Calderón
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET Journal
 
IoT Cryptocurrency Can Be The Next Big Thing In Blockchain.pdf
imoliviabennett
 
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
IRJET Journal
 
Blockchain with iot
SuryaKumarSahani
 
How blockchain will defend iot
Hitesh Malviya
 
blockchain and iot: Opportunities and Challanges
Chetan Kumar S
 
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET Journal
 
IRJET- Blockchain Technology for Agriculture Development
IRJET Journal
 
final.pdf
ishantpatil1
 
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
herminaprocter
 
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
RAJU852744
 
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
jesusamckone
 

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PDF
Plant Control_EST_85520-01_en_AllChanges_20220127.pdf
DarshanaChathuranga4
 
PPTX
Work at Height training for workers .pptx
cecos12
 
PDF
CLIP_Internals_and_Architecture.pdf sdvsdv sdv
JoseLuisCahuanaRamos3
 
PPTX
FSE_LLM4SE1_A Tool for In-depth Analysis of Code Execution Reasoning of Large...
cl144
 
PDF
Tesia Dobrydnia - An Avid Hiker And Backpacker
Tesia Dobrydnia
 
PPTX
Precooling and Refrigerated storage.pptx
ThongamSunita
 
PPTX
Unit_I Functional Units, Instruction Sets.pptx
logaprakash9
 
PPTX
Computer network Computer network Computer network Computer network
Shrikant317689
 
PPTX
Introduction to File Transfer Protocol with commands in FTP
BeulahS2
 
PDF
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
 
PDF
Clustering Algorithms - Kmeans,Min ALgorithm
Sharmila Chidaravalli
 
PDF
Designing for Tomorrow – Architecture’s Role in the Sustainability Movement
BIM Services
 
PDF
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...
ijujournal
 
PDF
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
PPTX
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
PDF
lesson4-occupationalsafetyandhealthohsstandards-240812020130-1a7246d0.pdf
arvingallosa3
 
PDF
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
 
PDF
輪読会資料_Miipher and Miipher2 .
NABLAS株式会社
 
PPTX
Functions in Python Programming Language
BeulahS2
 
PDF
Bayesian Learning - Naive Bayes Algorithm
Sharmila Chidaravalli
 
Plant Control_EST_85520-01_en_AllChanges_20220127.pdf
DarshanaChathuranga4
 
Work at Height training for workers .pptx
cecos12
 
CLIP_Internals_and_Architecture.pdf sdvsdv sdv
JoseLuisCahuanaRamos3
 
FSE_LLM4SE1_A Tool for In-depth Analysis of Code Execution Reasoning of Large...
cl144
 
Tesia Dobrydnia - An Avid Hiker And Backpacker
Tesia Dobrydnia
 
Precooling and Refrigerated storage.pptx
ThongamSunita
 
Unit_I Functional Units, Instruction Sets.pptx
logaprakash9
 
Computer network Computer network Computer network Computer network
Shrikant317689
 
Introduction to File Transfer Protocol with commands in FTP
BeulahS2
 
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
 
Clustering Algorithms - Kmeans,Min ALgorithm
Sharmila Chidaravalli
 
Designing for Tomorrow – Architecture’s Role in the Sustainability Movement
BIM Services
 
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...
ijujournal
 
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
lesson4-occupationalsafetyandhealthohsstandards-240812020130-1a7246d0.pdf
arvingallosa3
 
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
 
輪読会資料_Miipher and Miipher2 .
NABLAS株式会社
 
Functions in Python Programming Language
BeulahS2
 
Bayesian Learning - Naive Bayes Algorithm
Sharmila Chidaravalli
 
Ad

A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1441 A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES Rajagopalan.B1, Revanth.R2, Sandhiya.G3, Shamsiya Banu.A.R4, Ms. Abirami .S5 1,2,3,4 Department of Electronics and Communication Engineering, SRM Valliammai Engineering College 5Department of Electronics and Communication Engineering, SRM Valliammai Engineering College ---------------------------------------------------------------------***------------------------------------------------------------------ --- Abstract - A blockchain is a upcoming revolutionary one with crypto smart contract that is used for tokentransaction with the help of unique address id. In this blockchain transactions, each block contains unique id ,hash rate and the content of the previous block .In this manner all the blocks are interconnected to ensure security. In terms of privacy and security it fulfils everything,herethesenderand receiver cannot be knownby thethird man.Tamperingthese integrated blocks will be difficult. All the blocks in the blockchain are encrypted If one has to tamper or steal the data from the blocks, they have to hack 60-70% of the blocks. If they fail to do ,the system will automatically initialize the tamper blocks as NIL so that the tokensthatare hacked by hacker will be declared as void. Image if we add this type of security to our IOT and next gen devices, we can reduce the tampering and data stealingcanbeminimal.Here we are done a basic payment verification blockchain coding in python and we implemented it on the IOT device (ESPN kit) INTRODUCTION A blockchain is simply a distributed database of records or public ledger of all completed and shared transactions or digital occurrences. Every transaction in the public ledger is confirmed by a majority of the system's members. Information cannot be deleted once it has been entered. Every every transaction ever made is recorded in the blockchain, which is certain and provable .To give a simple analogy, stealing a cookie from a cookie jar stored in an isolated location is far easier than stealing a cookie from a cookie jar placed in a market place when hundredsof people will watch the process. A blockchain is simply a distributed database of records or public ledger of all completed and shared transactions or digital occurrences. Every transaction in the public ledger is confirmed by a majority of the system's members. Information cannot be deleted once it has been entered. Every every transaction ever made is recorded in the blockchain, which is certain and provable .To give a simple analogy, stealing a cookie from a cookie jar stored in an isolated location is far easier than stealing a cookie from a cookie jar placed in a market place when hundredsof people will watch Blockchain on IOT Engineers can utilise blockchain data sharing to enable IoT devices to communicate with one another in the IoT. The gadgets accomplish this without the use of a centralised network. The distributed network of computer systemsthat makes up the blockchain makes those communications tamper-proof. Hundreds of billions, if not trillions,ofdevices will be connected to the InternetofThings.However,most of these devices now interact through centralised computing systems, which can fail at times. Other issues are caused by hackers. And the costs are enormous. Blockchain, on the other hand, avoids this by establishing a digital ledger of data, such as transactions. By confirming and adding to the blockchain, each data block builds on the previous one. Leasing a truck. According to the Gartner Inc. research "Integrating Blockchain With IoT Strengthens Trust in Multiparty Processes," IoT sensors installed in leased vehicles may record crucial events on a blockchain to better monitor fleet whereabouts and returns, as well as to enable more meaningful payment methods. With IoT sensors on board vehicles, truck leasing businesses will be able to charge renters fees depending on the torque of the loads rather than miles, as is now the case," according to the article. "The blockchaindistributedledgertechnologyallows people to share a single version of the truth." The data is not controlled by any single institution, and truckersandleasing businesses may independently check their owncopiesofthe distributed ledger. This blockchain/IoT connection should aid leasing organisations in increasing income while lowering costs.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1442 All of this means that the information cannot be tampered with. It provides for efficient embedded system verification in the IoT. As a result, IoT devices can use the technology to connect safely. Existing System In Early 2008, some group of anonymous experts developed blockchain like peer-peer network lately in2009,the bitcoin was developed (first digital currency in the world). Transaction in Ethereum smart contractandripplecurrency are done in blockchain. In India, the CBSE exam results are published through blockchain. Insmartcontracts,itrequires high hash rate to process the data which is too expensive. However, there is no support for low-end devices because the process is very complicated and difficult to process. Proposed System Here we are sorting out the problem in low end IOT devices also. To prove this, we demonstrated through ESPN kit (IOT Device), Node MCU, RFID card which contains unique information about the user and we implemented blockchain code through python. The RFID card works like Wi-Fi hard here, RFID reader is connected to the ESPN kit which has Wi- fi and Bluetooth connection for access. Also contains 32-bit LX106 RISC microprocessor for high processing rate. Every customer information is dumped in these cards like debit/credit cards. And the kit is connected to monitor to conduct the experiment and the output is verified METHODOLOGY SHA256 ALGORITHM IN BLOCKCHAIN: SHA256 is a patented cryptographic hash function that returns a 256-bit value. What is a hash? Encryption transforms data into a secure format that cannot be read unless the recipient has the key. In encrypted format, the size of the data is unlimited and is often the same as unencrypted. This algorithm is used in blockchain technology that has been used to secure the data of transaction in this project. ARDUINO IDE:The Arduino Integrated Development Environment - or Arduino Software (IDE) -contains a text editor for writing code, a message area, a text console, a toolbar with buttons for common functions and a series of menus. It connects to the Arduino hardware to upload programs and communicate with them. In this project, Arduino IDE is used to read the data from the RFID reader to Serial Monitor and verify the data for further processing. EMBEDDED C Embedded C is most popular programming language in software field for developing electronic gadgets. Embedded C programming plays a key role in performingspecificfunction by the processor. In this project, Embedded C is used for Arduino IDE. PYTHON IDLE Python IDLE is a IDE for Python which has inbuiltlibrariesin it. It helps us to code faster and it has automatic indentation features. In this project, Python IDLE is used as the main language for generating Blockchain algorithm. NODE MCU AND RFID CARDS: Node MCU ESP8266 development board isthecontrollerused in the project. It is based 32-bit LX106 RISC microprocessor and supports RTOS. It has in-built Wi-Fi / Bluetooth features used for remote access. Consumes Less energy. RFID (Radio Frequency Identification) cards are used for transaction purpose.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1443 REPRESENTATION: This is the real-time representation of our project. ESP8266 kit is used to receive the data from the user. Here we are going to use RFID (Radio Frequency Identification) cards for scanning the data. This data is scanned by RFID reader and verified by the SERIAL MONITOR ('tether' between the computer and Arduino). The RFID card number has been already pre-registered in the program (Only registered RFID cards can be used). GPIO (General Purpose Input Output) is used to connect the kit with the system through USB. The data travels through the PROOF OF WORK. Once it passes the PROOF OF WORK, the data will be entered into the program and saved in the ledger. The first data enters the first ledger called Genesis Block. The hash value of the block is generated and previous hash will be zero since there is no previous block. Then when the second data enters, same steps are followed and the second data is stored in second ledger. The previous hash of the second block will be the current hash of the first block (Genesis Block). Then the current hash of second ledger will be the previous hash of third ledger.This is the way blockchain algorithm works. Thehashvaluewegetis of 256-bit value (64 characters) since we are using SHA256 algorithm. The information of the user will be stored as blocks and if any changes occur in hash value, then we can easily detect the malicious act. However, hacking this technology is not easier to do and this will be the safest way for low-end devices to protect the information against hackers. OUTPUT The program printsseveralinformationsowecanget a clear understanding about the process. The information of the user is stored in blocks and protected by hash function. The program asks for the amount to be transacted as an input and the output shows the current hash of the block (ledger), block data code, RFID card name (customer name), amount to be transacted and the previous hash of the block. The hash value has 64 characters and it isa256bitvalue.The program also use inbuild functions from Python Library to display the exact time and date when the transaction occurs to add more accuracy to the output. This output is just a real- time representation of how the data are protected in blockchain algorithm. CONCLUSION The program prints several information so we can get a clear understanding about the process.Theinformationofthe user is stored in blocks and protected by hash function. The program asks for the amount to be transacted as an input and the output shows the current hash of the block (ledger), block data code, RFID card name (customer name),amountto be transacted and the previous hash of the block. The hash value has 64 characters and it is a 256 bit value. Theprogram also use inbuild functions from Python Library to display the exact time and date when the transaction occurs to add more accuracy to the output. This output is just a real-time representation of how the data are protected in blockchain algorithm.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1444 REFERENCES [1] J. A. Stankovic, I. Lee, A. Mok, and R. Rajkumar, “Opportunities and obligations for physical computing systems,” Computer, vol. 38, no. 11,pp. 23–31, Nov. 2005. [2] W. Wolf, “Cyber-physical systems,” Computer, vol. 42, no. 3, pp. 88–89,Mar. 2009. [3] Bellare, Mihir; and Rogaway, Phillip. (September 21, 2005). “Introduction.” In Introduction to Modern Cryptography (p. 10). [4]loFundamentals and Applications in Contactless Smart Cards and Identification, May 2003 [5] ESP8266 Node MCU Using Arduino IDE: Getting Start With ESP8266 (IoT hands on projects)May 2018 [6] Python: A Beginners Complete Reference Guide to Learn The Python Programming Language, June 2019 BIOGRAPHIES B.Rajagopalan pursuing his B.E., in Electronics and Communication in 2022 from the college of SRM Valliammai Engineering College. R.Revanth pursuing his B.E., in Electronics and Communication in 2022 from the college of SRM Valliammai Engineering College. G.Sandhiya pursuing her B.E., in Electronics and Communication in 2022 from the college of SRM Valliammai Engineering College. A.R.Shamsiya Banu pursuing her B.E., in Electronics and Communication in 2022 from the college of SRM Valliammai Engineering College.