Application of Blockchain Based on Deep Learning Algorithm in Enterprise Internet of Things System

e purpose of an IoT enterprise business system is to form a global open network structure. e main task of this process is to build the Internet of ings system based on the internal enterprise, and link the upstream and downstream enterprises to interact with the Internet of ings system. However, existing blockchain systems often have limited performance and capacity, so they cannot be used in many scenarios, resulting in reduced scalability. e most common solution is to use the deep learning algorithm to nd the optimal blockchain parameters. Based on deep learning and blockchain technology, this article proposes an enterprise Internet of ings system, which divides the whole Internet of ings into three layers—device layer, edge layer, and application layer, so as to build a reliable edge layer platform, so as to integrate the application network and blockchain network of the enterprise Internet of ings system and ensure the data security of the enterprise Internet of ings system. Finally, in order to verify the design proposed in this article, we build a distributed IoT business system, implement the deployment of experimental datasets on multiple hardware platforms, and design experiments to verify the security and eectiveness of the system designed in this work. By using blockchain technology based on the deep learning algorithm, the accuracy and time eciency of the enterprise Internet of ings system are improved, and the burden of enterprise operators is greatly reduced. is article studies the deep learning algorithm and blockchain technology, and applies it to the design process of the enterprise Internet of ings system, thus promoting the development of the enterprise Internet of ings system.


Introduction
Scienti c and technological progress is the power source of social and economic development, and it is also the main development goal. In recent years, with the continuous progress of Internet technology in China, the application of new technologies has brought new opportunities and challenges to all elds of economic development [1]. Arti cial intelligence based on deep learning can quickly process a large amount of information, and even partially replace arti cial intelligence for intelligent prediction and decision-making, so as to e ectively improve the e ciency of transaction processing, so as to achieve economies of scale [2]. In recent decades, terminal intelligence, communication technology, cloud computing, and big data technology have developed rapidly. A ected by the above technologies, Internet of ings technology has developed rapidly in the elds of smart home, smart city, and autonomous driving [3,4]. At present, the number of Internet of ings terminals entering the network continues to grow. Cloud computing is limited by network bandwidth, delay, and other factors, and there are still many deciencies in the data processing of edge nodes. At the same time, the consumer-oriented Internet of ings is developing rapidly, and its demand for IoT terminals and applications is growing. Driven by internal and external factors, edge computing is developing rapidly [5]. Blockchain has the characteristics of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm, and smart contract. It is a new kind of distributed infrastructure. e blockchain structure facilitates the storage and tracking of data. In order to ensure the consistency of network data in a distributed environment, the blockchain uses a deep learning algorithm to generate block update registers [6]. Modern cryptographic technology ensures the security of blockchain data sending and storage. Using smart contracts to write automated scripts can build distributed applications. Blockchain adopts distributed consensus to maintain all system data at the same time, so as to effectively resist malicious attacks. erefore, blockchain technology can help the enterprise Internet of ings system build a safe and reliable network environment [7]. e technical characteristics of blockchain technology, such as decentralization, data invariance, traceability, public-private key signature, and smart contract, naturally meet the needs of enterprise Internet of ings systems, and it is hoped to break through the reliance on third-party systems, so as to reduce transaction costs and improve operation efficiency [8]. e progress of Internet information technology such as blockchain has played an important role in promoting the innovation of enterprise Internet of ings system, providing new ideas for truly solving the pain points of the development of the real economy, and effectively optimizing the development and innovation methods of system applications [9].

Related Work
e literature believes that public chain is the original concept of blockchain technology, which means that everyone can participate in it. Compared with traditional trading systems, using public chain can save transaction costs and liberate productivity in data mining and data sharing. e literature believes that the smart contract designed based on blockchain technology has the characteristics of automatic execution [10]. If the smart contract is executed, the code hash value and digital signature will be copied into the smart contract at the same time, so the accuracy of contract execution can be improved. Blockchain is a technology that does not need to rely on intermediaries to reach a credit consensus [11]. Decentralization is the main feature of blockchain. Literature studies have found that the main reasons for the high cost of remittances in Africa are imperfect payment systems and poor market information. It is proposed to use blockchain technology to build a system without financial intermediary participation, such as bitcoin, to reduce costs and increase efficiency [12]. e literature combs the academic research on the consensus mechanism and compares the blockchain consensus mechanism with traditional technologies. e application of blockchain technology such as decentralization, tamper resistance, consensus mechanism, and smart contract seems to be a perfect solution, but this is not the case [13,14]. e weakness of the pow algorithm and uncertain potential security limitations are pointed out in the literature. At present, the research on the application value of blockchain technology is more theoretical and lacks quantitative or empirical research and analysis, but these theories provide direction for the application of blockchain technology and lay the foundation for further research [15]. We need to seek the results of using blockchain technology in various disciplines, including computer, economic, and social research [16]. A multilevel secure Internet of ings model based on blockchain is proposed in the literature. According to the model description, the Internet of ings system is composed of two layers: the edge layer and the top layer above the edge layer. e definition of the edge layer is a local area network, which is composed of multiple devices under the control of a central node [17]. e edge layer node maintains a NoSQL database to store edge layer object information, including UUID, identity information, status dataset, function set, and format document.
ere is no central node at the top level, so each data node is independent and self-managed. e data exchange between nodes is recorded in the blockchain registers maintained by all nodes. Blockchain consensus algorithms have different choices. is mode ensures the security of the Internet of ings deployed in the wide area environment, but this scheme increases the cost of the whole network and requires a lot of time and resources to maintain the smart contract [18]. In order to solve the security problem of the industrial Internet of ings, the literature has designed an integrated identity management system based on blockchain and implemented the access control mechanism by using edge computing [19]. e system uses lightweight self-authentication password to detect the registration and authentication of network entities [20]. Each entity in the system has an identity, and each identity corresponds to a unique implicit certificate. Identity information and certificates are stored in the blockchain network to ensure that they are not deleted or tampered with. e literature uses convolutional neural network (CNN) technology to provide a wide range of video data storage and real-time monitoring [21]. Compared with the traditional video surveillance system, this system has many technical advantages, and there is still room for improvement in data access control and large-scale testing.

Principle and Model of Deep Learning Algorithm.
Deep learning is one of the key technologies in the outbreak of artificial intelligence. It has made progress in the field of computer vision and natural language processing, which has brought AI technology into a new stage of explosive development. e wide and deep model consists of wide components and deep components. Its frame structure is shown in Figure 1.
It can be seen from Figure 1 that the wide component is a generalized linear model, and its shape is shown in the following formula: where x is the original feature, V (x) is the cross-product feature, b is the default polarization value, and W is the weight parameter. Deep neural network is a part of deep. e neural network first learns low dimensional dense embeddings for the feature vector and then uses the original dense feature as the input of the network. e calculation of each hidden layer is shown in the following formula: where a l , W l , and b l represent the activation, weight, and polarization values of the first layer of the hidden layer, respectively, and f represents the activation function. e loss function is logistic loss. At this time, the prediction result of the wide and deep model is shown in the following formula: where ơ represents sigmoid function, V (x) represents the cross-product function, and a lf represents the activation value of the last layer. Wide and deep is a common type of training, and joint training is different from integrated training. In integrated training, each model is trained separately, and the results are combined after training. Compared with joint training, integrated training requires that each part of the training be trained independently and summarized only when certain requirements are met, so the size of the model is larger. e wide component of joint training only uses a small part of the training sample set as the training set and uses its eigenvector to carry out product crossover to make up for the memory defects of deep components.

Blockchain Data
Structure. Since its inception in 2008, blockchain technology has been regarded as a technology for sharing data between untrusted parties. A common form of blockchain is chain blockchain. is blockchain structure is the basis of different blockchain structures and the common feature of other blockchains. Blockchain is composed of interrelated block records. e order of blocks corresponds to the order of time stamps stored internally, as shown in Figure 2.

Mobile Information Systems 3
Blocks are considered the basic unit of blockchain. Each block stores the hash value of the previous block. ese blocks are closely connected in this way. If a block cannot obtain the hash value of the previous block, the block cannot be linked to the blockchain. is structure not only ensures the integrity of data, but also prevents malicious users from modifying blockchain data.
Using blockchain fragmentation, nodes are divided into different shards, and each shard only processes a small part of all data. In this way, transactions are processed equally and in parallel. e partitioned nodes reach an agreement on a set of transactions by running a consensus mechanism. For different application scenarios, information transmission between partitions may occur, so communication protocols between partitions must be designed to handle transactions between partitions.
As shown in Figure 3, the physical fragmentation process realizes grouping for real network nodes. For fragmented public chain nodes, their tasks are the same, and they all need to check the block consensus. Now, the tasks to be completed in the blockchain network are assigned to different partitions according to specific rules, so that different partitions can cope with different tasks. For such a partition structure, each partition is equivalent to an independent small blockchain operating system, and the nodes in each small system must continue to rely on consensus to ensure the consistency of internal data.

Hash Algorithm Design of Blockchain.
Hash algorithm is an important technology in the field of information technology, which is widely used in blockchain. After binary data of any length is mapped to the hash function, it is converted to fixed-length output, and the output value is the hash value of the data. ere are many hash functions, and the hash algorithm is the most widely used in blockchain technology. Using this algorithm, binary data of any length can be converted into hash values of 256 bits and 32 bytes. e hash algorithm has the advantages of unidirectional, random, timing, fixed length, and so on.
(1) Unidirectionality: the output data can be easily extracted from the input data, but the input data cannot be calculated from the output data. (2) Randomness: even if the input data is only slightly modified, the output data may change greatly, so different input data will not produce the same hash value. (3) Timing: any input data with different lengths will consume approximately the same time period through the same type of hash calculation. (4) Fixed length: any input data with different lengths can generate output data with the same length after the hash calculation of the same type.
Hash function is usually defined according to the generated hash value. ere are two main methods.
Hash based on addition and multiplication is achieved by returning data elements and then adding each initial value associated with the data elements. Usually, the value of an element is multiplied by a prime number. e following formulas provide a hash calculation method based on addition and multiplication: Like additive hashing, shift-based hashing also uses each element of the data string, but unlike additive hashing, shift-based hashing algorithms prefer to transmit data. It is usually a combination of left and right transfer operations, and the number of transfers is the quality. e result of each shift is only some additional aggregation operations, and the final result of shift calculation is the final result of change hash calculation. e formula of the shift hash algorithm is shown in the following formulas: Merkel is a binary hash tree. In the Merkel tree, each leaf node is the hash value of a transaction. is article takes the Merkel tree with only four leaves as an example.
(2) Combine the hash values of two leaf nodes H A and H B . is article takes H AB calculation as an example: (3) Perform the same combined hash calculation as in step (2) At present, the workload proof mechanism is considered to be the most efficient blockchain consensus algorithm, but it takes a long time to reach a consensus, which will consume a lot of computing power and resources, so it is not suitable for large-scale promotion and application. e characteristics of various consensus algorithms widely used in blockchain are shown in Table 1.
ere are four private nodes in the experimental system chain. Each node needs real-time data sharing, with high data rate and low hardware computing power. rough comprehensive analysis, the PBFT consensus algorithm is the most suitable for this experimental system, so it is selected as the private chain consensus algorithm of this system to build the private chain of this system.

System Architecture.
is article proposes a distributed Internet of ings system based on blockchain technology and edge computing, which is composed of a device layer, an edge layer, and an application layer. e device layer is composed of various intelligent and nonintelligent IoT terminals, forming a distributed IoT database. e edge layer is composed of multiple edge computing servers, and blockchain is used as the network infrastructure to connect each node of the edge computing server. After the data collected from the device is processed by the edge layer computing framework, part of the data is processed by the edge server and returned to the terminal device for local service closed-loop, and the other part of the data is uploaded to the application layer cloud computing center as the basic data of the top-level application. e application layer is equivalent to the cloud computing hub of the traditional Internet of things architecture, and responsible for the design of top-level business logic and application deployment. e overall architecture of the enterprise Internet of ings system based on blockchain and deep learning technology is shown in Figure 4.

Equipment Level Design.
e IoT terminal at the device level is a bridge connecting the physical world and cyberspace. Terminal devices detect changes in the world's physical environment and digitally transmit analog data to higher-level IoT applications. According to the intelligent degree of terminal equipment, it can be divided into intelligent equipment and limited resource equipment. Intelligent devices have specific computing and storage capabilities, and can perform preprocessing, encryption, data transmission, and other functions independently. On the other hand, equipment with limited resources can only recognize and collect environmental data and convert analog signals into digital signals. In the distributed Internet of ings, we roughly divide IoT terminals into two types of devices: acquisition devices and execution devices. e collection equipment is the producer of data, and the execution equipment is the consumer of data. erefore, the terminal device can be a collection device, an execution device, or have two identities at the same time. e terminal is connected to the adjacent edge computing server through NB-IoT, Lora, WiFi, NFC, and other communication protocols.

Edge Layer Design.
Edge computing servers are all over the Internet of ings. To meet the requirements of internal data security processing, we have implemented Edge X Foundry computing framework, Hyperledger Fabric blockchain, and trusted platform deployment based on microservice architecture.
As an excellent open-source edge computing framework, Edge X Foundry provides device services for device-level terminals through a variety of communication protocols. Users can write Edge X Foundry control commands to manage their devices, and their devices send their production data through the restful API. Edge X Foundry publishes data to edge or cloud applications for further processing according to certain rules. Edge X Foundry is based on the microservice architecture. Each microservice is logically independent and functionally decoupled. e core service layer of Edge X Foundry is divided into an equipment service layer, a basic service layer, a support service layer, and an export service layer. To ensure the stability of Edge X Foundry during operation, it also provides security and In the edge computing environment, we adopt the key functions required to define the Edge X Foundry concept and integrate them into the design platform. From the perspective of users, the functions of the edge computing framework can be obtained as a collection of APIs. With excellent interface design, rich protocol support, and heterogeneous data processing capabilities, Edge X Foundry plays the role of edge-level data processing. Although Edge X Foundry provides security services, this service is only for single-point devices and is not applicable to the entire edge computing network, so we have introduced blockchain technology. Blockchain network realizes a secure, reliable, and decentralized intelligent system in the edge environment, and solves the security and privacy problems in edge computing. A blockchain network is shared by multiple server edge nodes, and each node, as a network participant, can communicate with other nodes in the blockchain network. Due to the limited computing capacity of some terminal devices, they cannot participate in blockchain business. We use the edge server to provide blockchain services for terminal devices. e identity information of all these terminals is recorded and stored in the blockchain network through the edge server. Once the blockchain verifies the identity information, the authorized final entity can read the blockchain data, but the data can only be written to the edge server, which helps to avoid excessive data exposure. Users can access the edge server to edit smart contracts to create blockchain applications that meet the needs of terminal devices. In the edge computing environment, device identity information, access control information, and access control policies are stored in the decentralized blockchain network, which can effectively prevent data corruption.

Performance Parameter Index Design.
For fragment content, in the process of verifying the consensus of new blocks, it is defined that the block manufacturer generates a local block with a maximum size of Bt (bytes) within each packaging interval T n of the block. If the average transaction size is b t , the block header size is B lk , and the number of slices is k, the scalability within the slice can be obtained as follows: If the transaction reaches a consensus within the shard, a local block will be formed. e shard will transfer the local block to the directory shard for final consensus and write it into the final blockchain. In the final consensus stage, check the blocks formed by K partitions, define the partition producer in the block directory, and generate a final block with a maximum size of B F (bytes) within each block interval period T F . If the average transaction size is b F , the block   Mobile Information Systems header size is B H , and the scalability of directory fragmentation can be obtained as follows: Because the blockchain transaction consensus is divided into two processes-the number of transactions that each process can handle is represented by the scalability of internal partitions and directory partitions, and assuming that the scalability of internal partitions and directory partitions are the same, it is recorded as Tt′, and that the block header size is the same, it is recorded as B H ′. en, the scalability of the whole blockchain is recorded as e total propagation time of the internal consensus of the partition is Where, n i, p represents the master node p in the slice i, n i, j represents the node j in the slice i, and R ni, p, ni, j represents the transmission rate between the master node p and the replica node j in the slice i.
Assuming that the computing power of the replica node is C i,j , the processing time of the internal consensus verification fragment of the replica node is In addition, the process of checking the master node and the replica is the same. erefore, the verification time of each message in the intraslice consensus request can be expressed as In the final consensus process, the node receives blocks from each partition. e master node of the shard directory can combine all local blocks in ascending order according to their shard numbers to generate the final consensus blocks and then create the final consensus according to the PBFT consensus algorithm. e information in the last block includes the block maker, timestamp, data size, and transaction hash. e last block of the directory is broadcast, and the consensus process is repeated. e time of final consensus is where n ds,p represents the master node p in the directory partition, n DS,j represents the node j in the directory partition, and R DS,p,DS,j represents the transmission rate between the master node p and the replica node j in the directory partition. e blocks after consensus through k partitions are transferred to the directory partition for final consensus. Directory fragmentation uses the PBFT algorithm to regain consensus. Before that, KM signatures and MAC are verified, and then, the merged blocks are passed to all other nodes. After the final consensus, the consensus results will be transmitted to N-C nodes outside the directory partition for N-C MAC generation operations. erefore, similar to the internal consensus check time within the partition, the verification time of the master node and the replica node of the final consensus in the directory partition are, respectively, where C DS,p and C DS,j represent the calculation speed of the master node and the replica node in the directory partition, respectively. erefore, the final consensus verification time for each request is According to the blockchain fragmentation process based on PBFT consensus algorithm, we can clearly obtain that in order to achieve the results of network consensus, we must go through two main stages: one is the internal consensus process of fragmentation, and the other is the final consensus of directory fragmentation for the internal consensus process. e time required for each step includes message expansion time and message verification time.
en, the segmented blocks of the segmented blockchain based on the PBFT consensus algorithm can be expressed as (24) e above formula calculates the blockchain delay based on PBFT consensus. e consensus delay of blockchain transactions must be completed within a limited number of consecutive block intervals (U is usually taken as 5∼7) to make the blockchain consistent.
T total ≤ uT I .

System Test.
Since the automatic coding network is used to embed and retrieve information, the generated secret transactions may not be successfully sent to the blockchain. If the generated secret transaction cannot be deployed, Alice can reset the transaction attributes and merge again. In addition, the extracted secret information does not have to be the same as the original information, so it is necessary to calculate the success rate of embedding and extracting secret information. e average embedding capacity of 100000 transactions and the corresponding embedding success rate and extraction success rate are shown in Table 3. e unit of embedded capacity in Table 3 is the embedded byte size of each transaction. e embedding success rate is the percentage of 100000 transactions successfully executed. e extraction success rate is the ratio of the number of retrieved correct information bytes to the number of embedded information bytes. It can be seen from Table 3 that with the increase in embedding amount, the success rate of embedding and extracting secret information decreases. Whether it is 4 bytes or 8 bytes of secret information, it has a higher embedding capacity, embedding success rate, and successful extraction rate. If the embedded capacity increases to 10 bytes/t, the success rate of extracting information decreases to 0.81. erefore, it is best to embed 8 bytes of secret information in each transaction.

System Safety Analysis.
Ethereum transactions are deployed directly on the blockchain, so the stability of this scheme is equivalent to the tamper resistance of the blockchain itself. After the training generator and extractor, Alice and Bob must save the trained network model parameter file (pt format). Before the two communicators disclose the stored model parameters, the attacker will not be able to crack the secret information. erefore, deep learning based on blockchain steganography has high security.

Conclusion
As an application paradigm integrating distributed databases, P2P networks, consensus, and encryption algorithms, blockchain is characterized by good decentralization and openness, which can prevent tampering, complete anonymity, and trace data. In addition to the relevant characteristics of blockchain itself, fragmented blockchain is also more efficient than single chain blockchain, so it has better prospects in the application of value chain management. With the development of economy, enterprises have formed a value chain in the process of manufacturing products or completing services, thus improving the efficiency of enterprises. Using blockchain technology in the commercial Internet of ings system can improve the operation efficiency of the commercial Internet of ings and reduce the operation cost. In this context, after introducing the deep learning algorithm, this article expounds the efficiency of data collection and the reliability of data storage in the modern Internet of things system, and summarizes the basic business logic of the Internet of ings. A blockchainbased enterprise Internet of ings system model is proposed. Based on the in-depth study of the business development and business needs of modern Internet of ings, combined with the current blockchain hotspot technology, this article uses the deep learning algorithm to model and proposes a business development-oriented enterprise Internet of ings system model. It provides specific guidance for manufacturers on how to widely use technology to improve the functions of the Internet of ings system and reduce operating costs in the future.

Data Availability
e data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest
All the authors do not have any possible conflicts of interest.