Blockchain-Based Bank Transaction Traceability Paper Work
Blockchain-Based Bank Transaction Traceability Paper Work
Abstract—In today’s financial context, ensuring safe and II. T ECHNOLOGY S TACK AND J USTIFICATION
transparent transaction traceability is critical for preventing
fraud, improving compliance, and maintaining accountability.
The following is the technology stack selected for this
This project aims to create a blockchain-based system for logging project:
and tracking financial transactions that provides immutability Frontend: React.js, Tailwind CSS, Typescript
and decentralization. Using blockchain technology, this system Backend: Spring Boot (Java)
generates a tamper-proof and transparent ledger, dramatically Database: PostgreSQL
increasing the security and integrity of financial transactions. In Build Tool: Maven
the future, the acquired data can be evaluated to identify financial
trends, improve fraud detection methods, and contribute to the Blockchain Technology: Hyperledger Fabric
development of a more secure and transparent decentralized Chain Code: Go
banking ecosystem. Payment Gateway: Razorpay
Index Terms—Blockchain, transaction traceability, fraud de- The following arguments were used to select each stack
tection, smart contracts, financial security. component:
1) A responsive and contemporary user interface that im-
I. I NTRODUCTION proves user experience is guaranteed with React.js ,Tail-
wind CSS and Tyescript.
As digital transactions become more common, maintain- 2) Spring Boot is a scalable and reliable back-end frame-
ing security and transparency has become a major concern. work that makes it easier to integrate secure APIs with
Centralized databases, the foundation of traditional financial the blockchain.
systems, are susceptible to fraud, data breaches, and cyberat- 3) Hyperledger Fabric offers decentralized data storage,
tacks. Blockchain technology is a perfect solution for transac- which significantly reduces the security risks associated
tion traceability since it offers a decentralized, unchangeable with traditional databases.
ledger. In recent years, there have been large financial losses 4) The chosen language for constructing chaincode is Go,
as a result of data tampering and financial fraud. Our strategy which ensures transaction automation as well as rigorous
is to reduce these risks by utilizing the immutability and security.
decentralized nature of blockchain technology. Our research 5) By encrypting user data and guaranteeing data integrity,
investigates how blockchain-based transaction logs can pro- AES-256 encryption and SHA-256 hashing improve
tect financial institutions from unwanted changes and offer security.
trustworthy audit trails. Further improving transaction security
and scalability are new developments in blockchain consensus III. M ETHODOLOGY
algorithms such as Proof of Stake (PoS) and Zero-Knowledge The suggested system employs an orderly manner of track-
Proofs (ZKP). Financial services organizations are increas- ing transactions:
ingly embracing blockchain technology as they investigate its Authentication and verification of users: Before any
possibilities for efficiency and transparency. Blockchain has transactions are executed, they are authenticated using OTP.
been used by a number of sectors, such as banking, insurance, Deploying chaincode in Hyperledger Fabric: Go-based
and supply chain management, to detect fraud, lower operating chaincode is used to validate and store transactions on the
costs, and enhance regulatory compliance. The blockchain’s blockchain.
capacity to remove middlemen and improve data security is the Transaction processing: Users make payments, and all
main justification for its selection for transaction traceability. transactions are permanently recorded on the Hyperledger
Blockchain reduces the danger of fraudulent activity by guar- Fabric blockchain using chaincode.The integrity of data: SHA-
anteeing that every transaction is verifiable and unchangeable, 256 hashing maintains stability and prevents unauthorized
in contrast to traditional databases. Blockchain is a perfect changes to the blockchain.
solution for financial security applications because it provides Detecting Fraud (Future Implementation): In the future,
decentralization, which means that no one entity has control AI and machine learning models will be used to evaluate
over transaction records. transaction patterns and detect potential fraudulent activity.
A. Blockchain Ethereum Virtual Machine) that facilitate the execution of
The picture demonstrates how a blockchain operates, with smart contracts and other blockchain functions.
particular emphasis on Bitcoin transactions. The procedure Block data structures, digital signatures, and Directed
starts when a user sends a certain quantity of bitcoins from one Acyclic Graph (DAG) data structures are examples of the basic
address to another to start a transaction. A peer-to-peer (P2P) data structures found in blockchain systems. These guarantee
network with several nodes is then informed of this transaction effective transaction verification, security, and data integrity.
request. In order to confirm the transaction’s legitimacy and Consensus Mechanisms: Blockchain uses consensus algo-
stop fraudulent practices like double-spending, these nodes are rithms to safeguard the network and validate transactions. The
essential for validation and verification. picture illustrates several consensus protocols, such as:
Miners verify the transaction using cryptographic techniques • Bitcoin uses Proof of Work (PoW), in which miners
after it has reached the network. To verify the validity of confirm transactions by resolving cryptographic puzzles.
transactions, this validation procedure, called mining, entails • Proof of Stake (PoS): The quantity of tokens that val-
resolving challenging mathematical puzzles. As a compensa- idators own and are prepared to stake determines their
tion for securing the network, miners that successfully validate selection.
transactions receive newly created bitcoin units. Following • A consensus method called Practical Byzantine Fault
validation, a new block is created by grouping the transac- Tolerance (PBFT) is intended for fast, permissioned
tion with other confirmed transactions. An unchangeable and blockchain networks.
impenetrable ledger is subsequently produced by appending The Network Layer: All nodes in the blockchain net-
this newly generated block to the already-existing blockchain. work are connected to one another and exchange information
The blockchain is extremely safe and impervious to unwanted without the need for a central authority because it functions
changes since every block is cryptographically connected to in a peer-to-peer (P2P) fashion. This decentralized structure
the one before it. Ultimately, the recipient can view the improves reliability, security, and credibility.
transferred bitcoins in their account once the transaction is
This graphic efficiently describes blockchain technology’s
deemed complete and entered into the blockchain. Supply
structure, including applications, execution techniques, data
chain management, smart grids, and healthcare are all free
management, consensus processes, and network foundation.
from central authority control.
B. Blockchain Architecture Before being included in a block and kept in the distributed
ledger indefinitely, a blockchain transaction must go through
The picture offers a theoretical synopsis of blockchain
several stages. Here is a detailed explanation:
technology and its main elements. The blockchain, which is
linked to several crucial elements that specify its operation
D. Transaction Creation
and application, is at the center of the diagram.The term
”application layer” describes actual blockchain applications When a user wishes to transfer assets (such as cryptocur-
in a variety of sectors, including supply chain management, rency like Bitcoin or Ethereum) to another user, a transaction
smart grids, and healthcare. Blockchain’s decentralized and takes place.
impenetrable records provide speed, security, and transparency For instance, Alice wishes to send Bob one bitcoin. - Alice’s
in many domains. wallet uses her private key to sign a transaction created with
The computational infrastructure needed to handle Bob’s public key (address). - Included in the transaction is
blockchain transactions is included in the Execution Layer. the sender’s address (public key). - Address of the recipient -
It consists of hardware and virtual machines (like the Amount A digital signature (to confirm legitimacy)
E. Transaction Broadcasting
The transaction is broadcast to the blockchain network
(nodes) when Alice’s wallet signs it. After receiving the
transaction, full nodes use Alice’s digital signature to verify
it. - The transaction is picked up for processing by miners or
validators.
F. Transaction Validation
Nodes in the network verify if: The network’s nodes check
the unspent transaction outputs, or UTXOs, to see if Alice
has adequate balance. Using Alice’s public key, the transaction
signature is legitimate. The format of the transaction complies
with protocol guidelines. If the transaction is legitimate, it
is added to the memory pool, which is a waiting area for Fig. 3.4. Blockchain Transaction System
transactions that have not been verified.
G. Transaction Gets Mined (Proof-of-Work) or Validated
threshold (like batch size or timeout) is achieved, rather
(Proof-of-Stake)
than writing each log entry—such user login, payment, or
Depending on the consensus method used by the logout—individually. By removing repetitive writes and less-
blockchain: Bitcoin uses Proof-of-Work (PoW). Hashing a ening the computational burden on endorsers and orderers, this
block is a challenging mathematical challenge that miners method avoids needless blockchain transactions. Furthermore,
strive to solve. The right to add a new block to the blockchain the greedy technique guarantees faster processing of more
belongs to the miner who solves it first. This block contains important data, such as payment transactions. By streamlin-
Alice’s transaction. Ethereum 2.0 uses Proof-of-Stake (PoS), ing log storage and reducing transaction sequencing, This
in which participants stake their cryptocurrency. To validate technique improves throughput in Hyperledger Fabric, boosts
transactions and produce the subsequent block, a validator is efficiency, and lowers gas prices (in a system like Ethereum).
selected at random. The permissioned blockchain technology The greedy approach for log batching ultimately results in
used by Hyperledger Fabric restricts network access to au- reduced resource consumption, quicker transaction finality, and
thorized users. Depending on the network setup, Hyperledger enhanced scalability, making it a useful tool for systems that
Fabric uses a range of protocols, including Raft and Practical must effectively manage massive volumes of log data.
Byzantine Fault Tolerance (PBFT), to reach consensus. These
protocols support transaction validation and blockchain net- K. Round Robin Algorithm for Transaction Load Balancing
work integrity. Transaction load balancing using the round robin algo-
H. Block is Added to the Blockchain rithm Equitable distribution of transactions among several
blockchain nodes is guaranteed by the Round Robin algorithm.
Following validation, the block is appended to the
- This method facilitates effective simultaneous processing
blockchain. After receiving a block hash, the transaction
of financial transactions by preventing congestion and bot-
becomes immutable, meaning it cannot be changed. The
tlenecks.A balanced workload is maintained throughout the
block reward plus transaction fees are given to miners as
blockchain network by allocating transactions to nodes in a
compensation.
circular order. Benefits of load balancing include improved
I. Transaction Confirmation response times and transaction throughput. Prevents overload-
Although the transaction may now be seen on the ing of any single node. Through the equitable distribution
blockchain, it requires confirmations before it can be deemed of workloads, overall network reliability is improved. The
completely secure. -The number of confirmations rises with system allocates a transaction to the next available node
each additional block that is added following Alice’s transac- in the blockchain network when it is launched. This is an
tion. - For instance, high-value transactions involving Bitcoin example of how it is implemented. This method guarantees
take six confirmations. that transaction storage and validation continue to be effective
and non-disruptive.
J. Greedy Algorithm for Smart Contract Optimization
. By combining several log entries into a single blockchain IV. S ECURITY M EASURES : JWT (RS256), PBKDF2,
transaction, Hyperledger Fabric’s greedy log batching algo- HMAC-SHA256, AND S ALTING
rithm streamlines the log storage process. Because fewer JWT (RS256) for Authentication: authentication with
transactions are committed to the blockchain with this method, JWT (RS256): Secure session management is accomplished
network congestion is lessened and system efficiency is in- through the usage of JSON Web Tokens (JWT). Asymmetric
creased. The approach dynamically gathers logs in an in- encryption is provided by the RS256 (RSA with SHA-256)
memory buffer and commits them when a predetermined method, which makes it extremely safe. A private key is
used to sign each session token, guaranteeing its legitimacy. B. Backend: API & Business Logic
Verification can only be done using the public key, which Spring Boot is used to construct the backend, which offers:
guards against manipulation. Microservices architecture for scalability and modularization.
PBKDF2 for Password Hashing: To improve password Role-based authorization and authentication are provided by
security, utilize Password-Based Key Derivation Function 2 Spring Security. For database interaction, use Spring Data JPA.
(PBKDF2). Because it uses several hashing iterations, brute- RESTful APIs that interact with the blockchain and manage
force assaults are not feasible. The number of rounds can client requests. Round Robin Algorithm for Load Balancing:
be changed to accommodate different security requirements. The transactions are dispersed equally throughout
Because PBKDF2 greatly increases the amount of computation blockchain nodes to increase efficiency and avoid conges-
needed to generate the original password, it inhibits brute- tion. By preventing any one node from becoming overloaded,
force attacks. In contrast to conventional hashing algorithms, response time is decreased and performance is enhanced.
PBKDF2 adds a labor factor, which exponentially slows down - JWT with RSA (Asymmetric Encryption): - Secure API
each attack attempt. A distinct salt is used to construct Communications Secure authorization and authentication are
each password hash, guaranteeing that even identical pass- guaranteed by public-private key pairs. JWTs are signed using
words provide distinct hash results. Large-scale brute-force RS256 (RSA with SHA-256), which guarantees integrity and
attacks are extremely inefficient since attackers trying to guess non-repudiation. Third-party authentication connections are
pass-words must put in the entire computational load for possible with Spring Security with OAuth2.
each potential guess. HMAC-SHA256 for Data integrity:
Tamper-proof authentication is provided via the combination C. Blockchain & Smart Contracts
of SHA-256 and the hash-based Message Authentication Code
The Hyperledger Fabric network is used to deploy the
(HMAC). It guarantees that data transferred and saved cannot
blockchain layer, utilizing chaincode (smart contracts) devel-
be changed covertly. Because it uses a secret key in the hashing
oped in Go. Leveraging Hyperledger Fabric’s modular and
process, SHA256 is especially good at detecting unwanted
permissioned architecture, the system benefits from reduced
data alterations. - Secure communication methods frequently
network congestion and higher transaction throughput. The
employ this method to confirm the authenticity and integrity
Greedy Algorithm is employed to optimize the execution of
of messages.
chaincode. By streamlining contract logic and storage usage, it
Salting for Added Security: Prior to hashing, a distinct,
ensures minimal resource consumption. This method reduces
random salt is added to every password. Rainbow table at-
unnecessary operations and lowers execution costs.
tacks are avoided thanks to this procedure, which guarantees
System of Storage: Instead of storing all data on the
that even identical passwords have distinct hash values. An
blockchain, important logs and transactions are stored as
additional degree of protection is added by storing the salt
blockchain events. This approach helps avoid the high costs
independently of the hashed password. Salting forces attackers
associated with directly storing data on the chain, improving
to compute hashes from scratch for every password attempt,
both query efficiency and significantly reducing storage costs.
ensuring that precomputed hash databases (rainbow tables) are
useless. D. Security & Cryptographic Measures
Compared to conventional blockchain implementations,
benchmarking findings show a 30 PBKDF2 (Password-Based Key Derivation Function 2):
Our technology uses an automated smart contract approach Brute-force attacks are impracticable due to the increased
to streamline fraud detection and financial transaction logging. computational difficulty caused by several iterations (100,000+
By reducing data redundancy and improving transaction ver- recommended). HMAC-SHA256: Provides an extra degree of
ification, Merkle Tree implementation helps create scalable security by being used in PBKDF2 for key stretching. Salting:
architectures. To guard against rainbow table attacks, a distinct random
value is appended to passwords prior to hashing. Token-Based
V. I MPLEMENTATION Security User Authentication: JSON Web Token (JWT) with
RSA: Ensures secure user sessions without keeping session
A. Frontend: User Interface Development data on the server. The tamper-proof authentication is guaran-
Because of its component-based architecture, reusability, teed by the RS256 algorithm (RSA with SHA-256). RBAC,
and performance optimization, React.js is used to build the or role-based access control, Different permission levels are
frontend. The styling is done with Tailwind CSS, which offers implemented for system nodes, users, and admins.
a utility-first methodology that guarantees a contemporary and
responsive user interface without requiring extra CSS files. E. Database: PostgreSQL
React Context API/Redux is used for state management in or- Because of its strong scalability, security, and extensibil-
der to manage global state effectively. Through the MetaMask ity, PostgreSQL is the main relational database management
Integration, users may conduct safe blockchain transactions system (RDBMS). It ensures transaction dependability by sup-
and connect their wallets directly to the dApp (Decentralized porting ACID (Atomicity, Consistency, Isolation, Durability)
Application). compliance. Support for JSONB makes it possible to handle
semi-structured blockchain transaction data effectively. Index- VI. R ESULTS AND D ISCUSSION
ing strategies that enhance query performance and retrieval Real-world financial transaction situations were used to test
speeds include B-tree, Hash, GIN, and BRIN. Constraints the system. Key findings include:
based on foreign keys guarantee data integrity across sev-
1) Security: Blockchain technology guarantees immutabil-
eral tables. Transaction logging and anomaly detection are
ity, making transaction records tamper-proof and in-
automated via triggers and stored routines. Performance for
creasing the security of stored data.
large-scale tasks is improved via read replicas and connection
2) Fraud Prevention: The private blockchain’s stored
pooling.
transaction logs will offer a strong basis for future fraud
detection through pattern analysis, even though the fraud
F. Smart Contract Development using Hyperledger Fabric detection model is not yet completely functional.
Hyperledger Fabric chaincodes provide safe, decentralized 3) Performance: Faster access to transaction data stored on
transaction processing on the blockchain. Chaincode, like the private blockchain was made possible by optimizing
Ethereum’s smart contracts, governs asset transactions on the the retrieval time for transaction logs.
network. Chaincode’s transparency and immutability ensure 4) Cost-effectiveness: The technology offers a cost-
the security of business logic and prevent changes after de- effective alternative by avoiding the hefty transaction
ployment. The Fabric SDK enables event logging, allowing costs usually connected to public blockchains by using
for transparency by capturing and querying events triggered a private blockchain network. .
by transactions. Fabric’s gas optimization strategy aims to 5) Scalability: The system is very scalable, and when more
minimize transaction processing costs by lowering compu- transaction data is added to the blockchain and made
tational resources. This differs from Ethereum’s gas model. available, there is a chance that throughput will rise
Fabric uses access control mechanisms based on identity significantly.
and policies to ensure only authorized individuals can do
certain actions. These approaches include the use of role-based TABLE I
access control (RBAC) and client certificates for authorization. T ECHNOLOGY S TACK OVERVIEW
Chaincodes also include error handling and event systems,
Component Technology Used
with functions such as check() and assert() used to prevent
incorrect operations and ensure that only valid transactions Frontend React.js
are handled. Finally, upgradeable chaincodes enable flexibility CSS Framework Tailwind
by permitting version upgrades without the need to reload Scripting Typescript
the entire network, making it easier to update and maintain Backend Spring Boot
business logic. Blockchain Hyperledger Fabric
Chaincode Go
G. Payment & Transaction Processing
Database Postgres SQL
Integration of Razorpay: Accepts payments by online bank- Payment Gateway Razorpay
ing, UPI, and credit/debit cards. Provides fraud detection
Authentication Twilio OTP
and automated settlement tracking. For transactions, round-
robin load balancing is used. It ensures that transactions Email Service SendGrid
are evenly dispersed among multiple nodes, increasing the Caching Redis
system’s dependability and fault tolerance. Build Tool Maven,Vite
Server Node.js , Tomcat
H. Communication & Notifications
Twilio for OTP Verification: For safe user authentication, VII. C ONCLUSION AND F UTURE W ORK
one-time passwords (OTPs) are sent. Assures compliance with
A blockchain-based transaction tracking system intended to
multi-factor authentication (MFA). SendGrid for Notifications
improve data integrity and financial security was introduced
via Email:
in this study. Efficiency and scalability are greatly increased
Handles alerts, transaction confirmations, and other mes-
by using round-robin load balancing for transaction distribu-
sages from the system. In order to preserve brand consistency,
tion, greedy algorithms for smart contract optimization, and
templated emails are used.
sophisticated cryptographic security measures. Furthermore,
we suggest utilizing Hyperledger Fabric to integrate a pri-
I. Build & Dependency Management
vate blockchain solution in order to monitor banking staff
Maven for Dependency Management: An Expert in De- activities, guaranteeing transparency and thwarting internal
pendency Management The build process is automated, guar- fraud. This implementation will lower the danger of unlawful
anteeing that all dependencies are fixed. Modular project financial transactions within banking institutions by enabling
frameworks are provided for improved maintainability. real-time tracking of employee operations. Additionally, by
using the real-time data gathered from banking operations to [20] E. Morabito, “Business Models and Blockchain: Opportunities, Chal-
create strong machine learning models for anomaly and fraud lenges and Risks,” Journal of Computer Science and Technology, vol.
25, pp. 215-234, 2019.
detection, overall security and operational efficiency may be [21] W. B. Arthur, “The Nature of Technology: What It Is and How It
improved. Evolves,” Free Press, 2009.
Future improvements will include an improved consensus [22] C. J. P. La, “Blockchain Applications in the Supply Chain Industry,”
International Journal of Advanced Computer Science and Applications,
mechanism for quicker transaction validation, AI-driven fraud vol. 10, no. 7, 2019.
detection models, and quantum-resistant cryptography. [23] M. A. H. Faruque, “Application of Blockchain in Healthcare: A Survey,”
in 2019 IEEE International Conference on Systems, Man, and Cyber-
VIII. ACKNOWLEDGMENT netics, 2019.
[24] L. P. B. A. Garcıa, “A Decentralized Blockchain-Based Framework for
I’d like to thank my mentors, Mr. V. Venkatesh Babu, B.E. Managing Copyrighted Media,” in International Journal of Software
(Hons.), M.Phil., and Mrs. S. Yogalakshmi, M.Sc., M.Phil., Engineering and Knowledge Engineering, vol. 27, no. 3, pp. 373-393,
2020.
NET, for their important assistance, advice, and encourage- [25] M. P. C. Chen, “The Role of Blockchain Technology in the Internet of
ment during the project’s research and development. Their Things,” Journal of Industrial Engineering and Management, vol. 12,
experience and insights have made a significant contribution pp. 251-265, 2019.
[26] D. Liu, Z. Wang, and F. Chen, “Blockchain Technology for Secure
to the success of this project. I also want to thank Ayya Nadar Online Transactions,” International Journal of Computer Science and
Janaki Ammal College for giving the required resources and Network Security, vol. 19, pp. 46-59, 2019.
support. [27] F. F. T. V. Brown, “Data Security and Privacy on the Blockchain,” in
2018 IEEE Global Communications Conference, 2018.
[28] The Go Programming Language Official Documentation. [Online].
IX. R EFERENCES Available: https://golang.org/doc/
R EFERENCES
[1] V. Buterin, “Ethereum: A Next-Generation Smart Contract and Decen-
tralized Application Platform,” 2014.
[2] M. Pilkington, “Blockchain Technology: Principles and Applications,”
Research Handbook on Digital Transformations, 2016.
[3] D. Drescher, “Blockchain Basics: A Non-Technical Introduction in 25
Steps,” Apress, 2017.
[4] G. Wood, “Ethereum: A Secure Decentralised Generalised Transaction
Ledger,” Ethereum Project Yellow Paper, 2014.
[5] R. G. Brown, J. Carlyle, I. Grigg, and M. Hearn, “Corda: An Introduc-
tion,” R3 CEV, 2016.
[6] S. Haber and W. S. Stornetta, “How to Time-Stamp a Digital Document,”
Journal of Cryptology, 1991.
[7] H. Halpin and M. Piekarska, “Introduction to Security and Privacy on
the Blockchain,” in IEEE European Symposium on Security and Privacy
Workshops, 2017.
[8] React.js Official Documentation. [Online]. Available:
https://reactjs.org/docs/getting-started.html
[9] Spring Boot Official Guide. [Online]. Available:
https://spring.io/projects/spring-boot
[10] PostgreSQL Official Documentation. [Online]. Available:
https://www.postgresql.org/docs/
[11] Hyperledger Fabric White Paper. [Online]. Available:
https://www.hyperledger.org/
[12] N. Szabo, “The Idea of Smart Contracts,” 1996. [Online]. Available:
http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/
CDROM/Literature/Elsevier/1996szabo.pdf
[13] A. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008.
[Online]. Available: https://bitcoin.org/bitcoin.pdf
[14] S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008.
[Online]. Available: https://bitcoin.org/bitcoin.pdf
[15] S. D. B. Calzada and J. P. Sánchez, “Blockchain Applications in the
Energy Sector,” in 2020 IEEE International Conference on Industrial
Engineering and Engineering Management, 2020.
[16] L. Bonneau, J. Miller, M. Narayanan, A. S. P. P. B. T. A. K. S. S. A.
D. L. L. E. D. G. H. L. and L. H. J. B. W. A., “On the Stability of
Bitcoin as a Payment System,” in 2016 IEEE European Symposium on
Security and Privacy, 2016.
[17] T. T. R. de Lemos, L. M. de A. Oliveira, “Blockchain-Based Solutions
for Finance,” in International Journal of Computer Science and Infor-
mation Security (IJCSIS), vol. 16, no. 7, pp. 191-198, 2018.
[18] C. Wang, S. Wei, “A Survey on Blockchain-Based Data Security
Applications,” Journal of Computer Science and Technology, vol. 34,
no. 4, pp. 887-897, 2019.
[19] A. M. Goudarzi, M. F. S. de Oliveira, “Blockchain for Industrial Internet
of Things: Applications and Challenges,” in Proceedings of the 2021
3rd IEEE International Conference on Computing, Communication, and
Networking Technologies, 2021.