SlideShare a Scribd company logo
APPLYING BLOCKCHAIN TECHNOLOGY
TO DECENTRALIZED OPERATION IN
FUTURE ENERGY INTERNET
Presented by:
Mohith H B
1KS14TE027
VIII TCE
K S INSTITUTE OF TECHNOLOGY
Department of Telecommunication engineering
Technical seminar on:
QUESTIONS!
Do you like to
be controlled
by someone?
What is the
society built
on?
PRELUDE
2008 Financial crisis Bitcoin whitepaper in 2008 World’s first Cryptocurrency
bitcoin launched in 2009
PRE-REQUISITES
1. Public Key Cryptography
2. Cryptographic Hashing
3. Digital Signature
PUBLIC KEY CRYPTOGRAPHY
Public key cryptography, or asymmetrical cryptography, is any cryptographic system that uses pairs of keys: public
keys which may be disseminated widely, and private keys which are known only to the owner. This accomplishes two
functions: authentication, where the public key verifies that a holder of the paired private key sent the message,
and encryption, where only the paired private key holder can decrypt the message encrypted with the public key.
CRYPTOGRAPHIC HASHING
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for
use in cryptography. It is a mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size (a hash)
and is designed to be a one-way function, that is, a function which is infeasible to invert.
DIGITAL SIGNATURES
A digital signature is a mathematical scheme for demonstrating the authenticity of digital messages or documents. A valid
digital signature gives a recipient reason to believe that the message was created by a known sender (authentication), that
the sender cannot deny having sent the message (non-repudiation), and that the message was not altered in transit
(integrity).
DIFFERENT PARTS OF BLOCKCHAIN
Distributed
ledger and
decentralized
database
Tamper-
Proof
Consensus
Algorithm
Immutable
DIFFERENT CONSENSUS ALGORITHMS
Blockchain?
Blockchain is a type of distributed
ledger for maintaining a
permanent and tamper-proof
record of transactional data. A
blockchain functions as a
decentralized database that is
managed by computers belonging
to a peer-to-peer (P2P) network.
Each of the computers in the
distributed network maintains a
copy of the ledger to prevent a
single point of failure (SPOF) and
all copies are updated and
validated simultaneously.
Ledger
1
Ledger
2
Ledger
3
Ledger
4
Ledger
5
DIFFERENT GENERATIONS OF BLOCKCHAIN
HOW DOES IT WORK?
ADVANTAGES
• Transparency
• Overcomes the double spending Problem
• More secure than centralized systems
• Cannot be Hacked
• Various Applications can be built on the platform
APPLICATIONS
Cryptocurrency
To Store Documents
Smart Contracts
WHY IS IT SO IMPORTANT?
ENERGY INTERNET
The Energy Internet is an Internet of things – cars, appliances, power plants –
woven together into a choreographed dance of energy by a humming buzz of
power lines and wireless communication
MERGING BLOCKCHAIN AND ENERGY INTERNET
OUTCOMES
• An unauthorized user cannot tap into a transaction
• The power is moved efficiently
• Elimination of a single controlling entity
• Can be accessed by anyone on the network
• The time taken for a single transaction is very less
CONCLUSION
• We often see that Revolutions in various fields takes part in a
point where two great technologies converge.
• The urge to move to renewable source of energy has sparked a
lot of interest in incorporating disruptive technologies to the
field of renewable energy.
• As of now the technology is still in its infancy and we cannot
predict for sure the success rate of this innovation.
Applying blockchain technology to decentralized operation in future
THANK YOU!

More Related Content

PDF
Blockfreight Jun 2016 Deck
PDF
Smart contracts & dApps
PPTX
FOSSCOM - Synaphea presentations
PDF
Presented AITC Blockchain Framework @ NPC 17
PPTX
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
PPTX
Deja vu Security - Blockchain Security Summit - Navneet Suman
PDF
IoT on Blockchain Solution Overview
Blockfreight Jun 2016 Deck
Smart contracts & dApps
FOSSCOM - Synaphea presentations
Presented AITC Blockchain Framework @ NPC 17
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
Deja vu Security - Blockchain Security Summit - Navneet Suman
IoT on Blockchain Solution Overview

What's hot (20)

PPTX
Blockchain Introduction
PPTX
Accelerate Blockchain slideshare
PDF
Blockchain - Navigating this Game-Changing Technology
PPTX
Cryptography Projects Research Assistance
DOCX
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
PDF
Privacy-preserving techniques using zero knowledge proof in public Ethereum
PPTX
Ethereum Smart contract
PDF
Executive summary guild42 elca_blockchain.pptx_v1.0
PDF
Hyperledger vs ethereum a dubious choice (1)
PDF
IoT+Blockchain & Decentralized Apps
PPTX
Anonymous Individual Integration for IoT
PDF
Blockchain for IoT
PDF
Blockchain Security and Privacy
PDF
Blockchain glossary en
PDF
LWT Introduction to Blockchain Technologies
PDF
2019 blockchain economy
PDF
Decentralized applications 101: How and why to build a DApp
PDF
ICO and Cyber security - How to protect from hackers during ICOs
PPTX
Webinar: Enterprise Blockchain Radically Simplified with Truffle and Kaleido
Blockchain Introduction
Accelerate Blockchain slideshare
Blockchain - Navigating this Game-Changing Technology
Cryptography Projects Research Assistance
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
Privacy-preserving techniques using zero knowledge proof in public Ethereum
Ethereum Smart contract
Executive summary guild42 elca_blockchain.pptx_v1.0
Hyperledger vs ethereum a dubious choice (1)
IoT+Blockchain & Decentralized Apps
Anonymous Individual Integration for IoT
Blockchain for IoT
Blockchain Security and Privacy
Blockchain glossary en
LWT Introduction to Blockchain Technologies
2019 blockchain economy
Decentralized applications 101: How and why to build a DApp
ICO and Cyber security - How to protect from hackers during ICOs
Webinar: Enterprise Blockchain Radically Simplified with Truffle and Kaleido
Ad

Similar to Applying blockchain technology to decentralized operation in future (20)

PDF
FIWARE Global Summit - BIIOT: Blockchain In Internet of Things
PPTX
Blockchain ppt
PDF
blockchain.pdf
PPTX
Blockchain with HyperLedger (Public version)
PPTX
hyperledger-chaincode & hyperl fabric.pptx
PDF
What is Blockchain Technology?
PDF
Hyperledger: Market, Technology & Community Update
PPTX
BaaS for IoT
PPTX
Blockchain Programming.pptx
PPTX
Block chain
PPTX
Emergence of Blockchain in the finance world
PPTX
What makes blockchain secure: Key Characteristics & Security Architecture
PPTX
Blockchain in the Heart of Digital Transformation
PPTX
Data Integrity Using Blockchain with case studies
PDF
Blockchain and BPM - Reflections on Four Years of Research and Applications
PPTX
Digital Certificate Verification based on blockchain ethereum
PPTX
Blockchain: No Thunder No Wonder
PPTX
Blockchain Technology
PDF
Rene Fischer Bernard CEO of LuxTag and Blockchain Pioneer
PPTX
Hyperledger Project Overview - January 2018.pptx
FIWARE Global Summit - BIIOT: Blockchain In Internet of Things
Blockchain ppt
blockchain.pdf
Blockchain with HyperLedger (Public version)
hyperledger-chaincode & hyperl fabric.pptx
What is Blockchain Technology?
Hyperledger: Market, Technology & Community Update
BaaS for IoT
Blockchain Programming.pptx
Block chain
Emergence of Blockchain in the finance world
What makes blockchain secure: Key Characteristics & Security Architecture
Blockchain in the Heart of Digital Transformation
Data Integrity Using Blockchain with case studies
Blockchain and BPM - Reflections on Four Years of Research and Applications
Digital Certificate Verification based on blockchain ethereum
Blockchain: No Thunder No Wonder
Blockchain Technology
Rene Fischer Bernard CEO of LuxTag and Blockchain Pioneer
Hyperledger Project Overview - January 2018.pptx
Ad

Recently uploaded (20)

PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
history of c programming in notes for students .pptx
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
ai tools demonstartion for schools and inter college
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
Introduction to Artificial Intelligence
PDF
Nekopoi APK 2025 free lastest update
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPT
Introduction Database Management System for Course Database
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
medical staffing services at VALiNTRY
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Odoo Companies in India – Driving Business Transformation.pdf
history of c programming in notes for students .pptx
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
ai tools demonstartion for schools and inter college
Softaken Excel to vCard Converter Software.pdf
Design an Analysis of Algorithms I-SECS-1021-03
L1 - Introduction to python Backend.pptx
Operating system designcfffgfgggggggvggggggggg
VVF-Customer-Presentation2025-Ver1.9.pptx
Introduction to Artificial Intelligence
Nekopoi APK 2025 free lastest update
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
How to Migrate SBCGlobal Email to Yahoo Easily
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Introduction Database Management System for Course Database
Reimagine Home Health with the Power of Agentic AI​
How to Choose the Right IT Partner for Your Business in Malaysia
medical staffing services at VALiNTRY
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf

Applying blockchain technology to decentralized operation in future

  • 1. APPLYING BLOCKCHAIN TECHNOLOGY TO DECENTRALIZED OPERATION IN FUTURE ENERGY INTERNET Presented by: Mohith H B 1KS14TE027 VIII TCE K S INSTITUTE OF TECHNOLOGY Department of Telecommunication engineering Technical seminar on:
  • 2. QUESTIONS! Do you like to be controlled by someone? What is the society built on?
  • 3. PRELUDE 2008 Financial crisis Bitcoin whitepaper in 2008 World’s first Cryptocurrency bitcoin launched in 2009
  • 4. PRE-REQUISITES 1. Public Key Cryptography 2. Cryptographic Hashing 3. Digital Signature
  • 5. PUBLIC KEY CRYPTOGRAPHY Public key cryptography, or asymmetrical cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner. This accomplishes two functions: authentication, where the public key verifies that a holder of the paired private key sent the message, and encryption, where only the paired private key holder can decrypt the message encrypted with the public key.
  • 6. CRYPTOGRAPHIC HASHING A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. It is a mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size (a hash) and is designed to be a one-way function, that is, a function which is infeasible to invert.
  • 7. DIGITAL SIGNATURES A digital signature is a mathematical scheme for demonstrating the authenticity of digital messages or documents. A valid digital signature gives a recipient reason to believe that the message was created by a known sender (authentication), that the sender cannot deny having sent the message (non-repudiation), and that the message was not altered in transit (integrity).
  • 8. DIFFERENT PARTS OF BLOCKCHAIN Distributed ledger and decentralized database Tamper- Proof Consensus Algorithm Immutable
  • 10. Blockchain? Blockchain is a type of distributed ledger for maintaining a permanent and tamper-proof record of transactional data. A blockchain functions as a decentralized database that is managed by computers belonging to a peer-to-peer (P2P) network. Each of the computers in the distributed network maintains a copy of the ledger to prevent a single point of failure (SPOF) and all copies are updated and validated simultaneously. Ledger 1 Ledger 2 Ledger 3 Ledger 4 Ledger 5
  • 12. HOW DOES IT WORK?
  • 13. ADVANTAGES • Transparency • Overcomes the double spending Problem • More secure than centralized systems • Cannot be Hacked • Various Applications can be built on the platform
  • 15. WHY IS IT SO IMPORTANT?
  • 16. ENERGY INTERNET The Energy Internet is an Internet of things – cars, appliances, power plants – woven together into a choreographed dance of energy by a humming buzz of power lines and wireless communication
  • 17. MERGING BLOCKCHAIN AND ENERGY INTERNET
  • 18. OUTCOMES • An unauthorized user cannot tap into a transaction • The power is moved efficiently • Elimination of a single controlling entity • Can be accessed by anyone on the network • The time taken for a single transaction is very less
  • 19. CONCLUSION • We often see that Revolutions in various fields takes part in a point where two great technologies converge. • The urge to move to renewable source of energy has sparked a lot of interest in incorporating disruptive technologies to the field of renewable energy. • As of now the technology is still in its infancy and we cannot predict for sure the success rate of this innovation.