Research Article
IoT Devices, User Authentication, and Data Management in a Secure, Validated Manner through the Blockchain System
Table 4
The output in the case of an authenticated communicational transaction is performed by the end-user mapped on to the IoT device.
| Key Points | Authentic computational transaction description |
| Status | 01 valid transactional and authentication succeed | From | 0CDLWGMGv0Ol6uXy0Tc92IRXJSTOlPVlHrvQxJ0VX3iQ23v20YvHP65YR4yBD3Tia | To | 0SkOD81SAGJVuKZXarAkrFkh5tDJjs9TW5y7XKkzJvhdunX8b5wkrejfjr | Input | User data and device information for the transaction | Decoded input | { $characters = ‘0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ’; | $charactersLength = strlen($characters); | $randomString = “; | For ($i = 0; $i < $length; $i++) { | $randomString. = $characters [rand(0, $charactersLength - 1)]; | } | Decoded output | while($row = mysqli_fetch_array($run)){ | $id = $row[“id”]; | $username = $row[“username”]; | $publickey = $row[“publickey”]; | $previoushash = $row[“previoushash”]; | Transactional cost | Algorithm running cost: O(n)s |
|
|