The global transition toward decarbonization has accelerated the development of HRES as resilient, cost-effective, and sustainable energy solutions. This review synthesises findings from >30 recent high-impact studies (2024–2025) on optimisation strategies integrating solar, wind, hydro, and storage technologies. Metaheuristic algorithms, including DE, PSO, and NSGA-II, have demonstrated significant effectiveness in minimising system costs and improving reliability. In off-grid rural electrification applications, DE achieved the lowest Levelized Cost of Energy (LCOE) of $0.062/kWh (USD2024) with an LPSP of 0.05, highlighting its superior cost-efficiency and stability. In grid-connected systems, NSGA-II enabled multi-objective optimisation, reducing total system costs by up to 56.7 % through coordinated use of hybrid battery and pumped-hydro storage. In Turkey, optimised PV–hydro–battery systems maintained a continuous power balance while reducing curtailed energy by 60 %, achieving an LCOE below $0.10/kWh. Moreover, incorporating frequency-constrained UC models with virtual inertia improved grid stability, though at the cost of approximately 12 % lower renewable penetration and 35 % higher operating costs. Emerging research trends emphasise AI-based forecasting, GIS-assisted spatial optimisation, blockchain-enabled peer-to-peer energy trading, and lifecycle sustainability assessments. Persistent challenges include high capital expenditure, technical complexity, and inadequate regulatory and sectoral integration. The review concludes with recommendations for AI-integrated real-time control, modular and scalable HRES design, policy-algorithm co-development, and circular economy frameworks to support the global deployment of intelligent, adaptive, and sustainable hybrid energy systems.
Identification of property in Imami jurisprudence and, accordingly, in Iranian law, is conditional on having exchange value, legitimacy, possession and transferability. Unusual digital tokens that have created a huge transformation in the field of intellectual property rights and virtual objects are known from the perspective of common property; However, the mere customary identification of its property is not the reason for the validity of the property from a jurisprudential and legal point of view, and other conditions for property identification must be met. This research, with a descriptive and analytical method and using library and internet tools, deals with the feasibility of applying the taxation conditions in Iranian law and Imami jurisprudence to Non-Fungible Token. related to property, such as whether it is movable or immovable, the ability to seize it, etc. in relation to this issue in future research. The results of the research indicate the conformity of the four criteria for identification of ownership obtained from the summation of the opinions of Imamiyyah jurists and the custom of economists on digital tokens. Therefore, such tokens in virtual space have financial conditions and will be classified as assets, and civil and commercial legal effects will follow them.1. Introduction
The world has entered a new era since the beginning of the 1980s. Understanding what it is and why it is and understanding the necessary planning to cope with it requires the use of new concepts and theories. Virtual space, as a product of new information and communication technology, has a decisive role in this. This real space, which is an extension of human society in the context of information and communication technology, is an infinite space that organizes all kinds of interactions through information and communication in a digital context. In this space, regardless of the limitation caused by physical geography, extensive communication between persons with each other, persons with objects and objects with each other is provided through computers and in a digital process.
One of the latest phenomena of organizing economic and non-economic interactions in the virtual space is called blockchain, which has created a huge evolution in terms of security, speed and transparency of data. Blockchain technology has brought many derivatives to humanity, one of the most prominent of which is Non-Federal Digital Tokens (NFT). These tokens have various applications in the field of economy, trade, culture, politics and other social and interactive affairs of humans with each other, humans with objects and objects with each other. Although today, art, business, and music are at the forefront of using this tool, and the buying and selling of things such as works of art, digital books, and in fact anything that can be converted into this type of token has become common.
The basic question regarding these tokens is that according to these economic functions, from the perspective of Imami jurisprudence and according to Iranian law, do these tokens have the conditions to be recognized as property so that it can be assumed that they can be owned and have legal effects on them? or that if buying and selling takes place, it is only for the common practice and basically these tokens do not have juridical value. The purpose of this research is to investigate the conformity of property identification criteria in Imamiyyah jurisprudence and Iranian law on non-homologous digital tokens.
Considering that previous researches have generally dealt with finance in the cyber space or paid attention to cryptocurrencies in general, the present research has this innovation that it specifically deals with the finance of non-traditional digital tokens, which until the time of writing this article, in Persian sources, there is no research in this field. The context is not visible.
2. Methodology
The method used for this research is descriptive-analytical. In this article, two categories of sources are used: the first category includes authentic books of Imami jurisprudence, laws related to property rights in Iran's legal system, and authentic articles that serve as a reference for obtaining the nature of property and the criteria required for token comparison. Non-homosexual digital tokens are considered in Imamiya and Iranian jurisprudence, and the second category includes valid educational courses, international authoritative articles and sites that are used to obtain the required information related to non-homosexual digital tokens.
Non-Fungible Token in Iran, like in other countries, is a new phenomenon and does not have a diverse and extensive research history. in other words, this article is the first research in Iran's legal system that comments on the property of these virtual objects.
It should be noted that some limited research related to the rights of Non-Fungible Token in Iran has been done in the form of a thesis in the field of intellectual and intellectual property rights, such as the role of Non-Fungible Token in supporting intellectual property rights at the University of Tehran.
3. Results and Discussion
In order to identify any issue in terms of whether it is tax or not, it is necessary to determine the classification of the issue, because each classification of property requires its own criteria for taxation. In Iranian law, property is divided into the same category as tangible property and benefits. A benefit that is included in the category of property can be manifested in two forms, object or service. As a result, in general, regardless of whether the subject of property is object or benefit, property can be considered in this division according to its different nature, object or service. Any non-physical activity that is transferred from its provider to the applicant is called a service, the characteristics of services include intangibility, non-storability, uniqueness, customer participation in services, and inseparability. In contrast to services, Non-Fungible Token have the ability to be stored in digital wallets, they are also independent of their creator after production and are portable in the virtual space through transfer on the blockchain platform, as a result, digital tokens are not considered services in this division and they should be put it in the category of tangible property.
The basis for examining the wealth criteria of tangible property can be pure Imamiyyah jurisprudence or special economic custom, which includes the opinions of economists. In Imamiyyah jurisprudence, there are three views on the property of the subjects, according to the first point of view, the mere presence of some kind of halal benefit is sufficient to consider the subject as property, but the criticism that can be made to this opinion is that there are some subjects that in the perspective of Iranian law And custom has value, but their benefit is not a generic; Like the photo of the father of the family, which has no benefit in generic standard, while it is very important for his family, and each member of the family may pay a lot of money to the owner to get this photo. The second view considers having a legitimate interest to be enough to be property, but this opinion is also incomplete; Because it is true that the condition of having a legitimate interest is comprehensive; But after examining more opinions, we will realize that the mere benefit and legitimacy does not make the title of property on an issue true. The third and final view in Imamiyyah jurisprudence also considers rational benefit as the criterion for property, which, like the previous views, faces the problem of being incomplete; Because there are many examples in Iran that may have a small rational benefit; However, from the perspective of Imami jurisprudence, they should not be considered property; Like pork, which is not worth eating due to impurity in Iranian law. The opinions of economists are also incomplete just like Imamiyyah jurisprudence and cannot provide comprehensive criteria and obstacles to identify tangible property. The first opinion is the theory of value and utility, which was presented by some thinkers in the 19th century. According to this theory, like the third opinion of the Imami jurists, any subject that has a rational benefit is considered property, while the mere possession of a rational benefit is not considered property and it is not under the ownership of individuals, for example, consider air, it is true that it has the rational benefit of life for humans, but it cannot be considered as property and considered as the property of limited individuals. The second opinion in the specific economic custom is the theory of value resulting from the cost of production and labor, which was presented by Adam Smith, so everything that is created based on human labor has value, but this opinion is also incomplete. Some examples of property, such as horses, are without value. The fact that a person does something on them, they are considered independently from the perspective of custom and property law.
In general, according to the fact that each of the examined opinions is incomplete, the criteria of tangible property should be found in the examination of the relationship between people and property, with a little thought in this connection, four criteria of having an exchange value that causes demand, having juridical and legal legitimacy, ability to possess and transferability can be declared as the criteria of tangible property and concluded that the criteria of tangible property in Iranian law is a combination of Imamiyyah jurists and the special custom of economists. on the same basis, Iranian law has established rules in paragraph 3 of article 190 and articles 215, 240, 348, 422, 637, 754, 773 that imply compliance with these criteria for tangible property. in the end, to check the value of digital tokens, it is necessary to verify the existence of the mentioned criteria in this type of virtual object. Non-fungible tokens due to multiple and unique applications such as creating wealth through selling works of art and playing games and creating virtual property security through providing intellectual and intellectual property rights qualify for the first criterion, i.e. having an exchange value that creates demand. In relation to the second criterion, in Imami jurisprudence as the basis of Iranian law, there are principles that can be used to leave it in case of doubt, in relation to non-fungible tokens due to the lack of a source that indicates sanctity or non-sanctity. There is a doubt in legal and jurisprudential legitimacy that by using the principle of falsity and the principle of authenticity, it is possible to judge the legitimacy of non-fungible tokens, so non-sexual digital tokens have juridical and legal legitimacy as well. Captivability is also subject to the ability to be available and assigned, which non-fungible tokens are also eligible for this criterion because they have the ability to be stored in digital wallets. In order to verify transferability as the fourth criterion, it should be noted that one of the reasons that a person reproduces and offers a work in the form of non-fungible tokens is because it is possible to maintain the intellectual property rights related to his work by selling these works and earn income, the premise of making money in this way is the transfer of non-fungible tokens to the buyer of the work, which in practice is done through the payment of the blockchain network fee and transfer to the person's wallet, as a result, digital tokens are also transferable.
4. Conclusions and Future Research
Finally, according to the comparisons made and the arguments expressed, it can be claimed that according to Imami jurisprudence and Iranian law, these tokens are considered property and are included in the property category. Considering the definition of property for non-fungible tokens can be the introduction of new and important research that is suggested by the author of the following topics:
The issue of the legitimacy of non-fungible tokens has been examined in this article only using practical principles to solve the initial confusion and it is suggested that experts in Islamic sciences deal with this aspect in a more specialized manner.
By discovering the value of these tokens, as mentioned in the conclusion, new legal issues are created that can be investigated in this direction. The topics that can be suggested for research are:
1- matching transactions based on non-representative digital assets with certain contracts,
2- the nature of creating non-representative digital assets is a contract or an event.
3- Since the value of these tokens was determined in this research, it is suggested that the legislator, by introducing a new law or amending the previous laws, consider the laws related to the value of digital tokens as illegal and establish special rules related to it.
4. The identification of these tokens as property is the reason for the authenticity of the transactions whose subject is non-ideal digital tokens (if there are other conditions for the authenticity of the transactions). Create transactions of these tokens.
Regulation of industry, trade, and commerce. Occupational law, Islamic law
Senthil Kumar Jagatheesaperumal, Mohamed Rahouti, Abdellah Chehri
et al.
Uncrewed aerial systems (UASs) were popularly used by hobbyists in the past, but they have now become critical enablers for managing disasters, handling emergencies, and so on. For example, one of their most critical applications is to provide seamless wireless communication services in remote rural areas. Thus, it is substantial to identify and consider the different security challenges in the research and development associated with advanced UAS-based B5G/6G architectures. Catering to this requirement, this article conducts a comprehensive review of the security aspects of UASs with respect to the 5G/6G system architecture, its enabling technologies, and privacy issues. It exhibits security integration at all the protocol stack layers and analyzes the existing mechanisms to secure UAS-based B5G/6G communications and its energy and power optimization factors. Last, this article also summarizes modern technological trends for establishing security and protecting UAS-based systems, along with the open challenges and strategies for future research work.
Telecommunication, Transportation and communications
La transformación digital está revolucionando la industria del turismo, redefiniendo las operaciones empresariales y la interacción de los turistas con los destinos. Este estudio realiza una revisión sistemática de la literatura y un análisis bibliométrico de 408 artículos publicados entre 2023 y 2025, utilizando las bases de datos Web of Science (WoS) y Scopus. Los resultados muestran un crecimiento del 51.06% en publicaciones entre 2023 y 2024, con China, el Reino Unido y Australia como líderes en investigación. Entre los beneficios destacados se encuentran la personalización de servicios, la automatización de procesos y la mejora de la eficiencia operativa. Sin embargo, persisten desafíos como la inversión en infraestructura tecnológica, la regulación de la privacidad de datos y la brecha digital, especialmente para las pequeñas y medianas empresas. Tecnologías emergentes como la inteligencia artificial (IA), el big data, el blockchain, el Internet de las Cosas (IoT) y la realidad virtual (VR) están transformando la competitividad de los destinos turísticos, optimizando la gestión de recursos y mejorando la experiencia del turista. Este estudio subraya la necesidad de investigar la equidad en el acceso a la tecnología, la sostenibilidad y la adaptación de tecnologías para las PYMES, así como la importancia de políticas públicas que fomenten la colaboración internacional. En conclusión, la transformación digital en el turismo ofrece oportunidades significativas, pero requiere un enfoque colaborativo para garantizar una transición inclusiva y sostenible.
The increased digitalization of society raises concerns regarding data protection and user privacy, and criticism on how the companies handle user data without being transparent and without providing adequate mechanisms for users to control how their own data is being processed or shared. To address this problem and open the way for a secure and efficient society, where the privacy of citizens is paramount, the identity concept and proof of identity mechanisms need to be redesigned from the ground up. In this paper we discuss how the emerging Web3 technologies like distributed ledger technology (DLT), blockchain, smart contracts, decentralized storage systems, and crypto wallets can be leveraged to design and implement a decentralized digital identity system based on decentralized identifiers (DID) and self-sovereign identities (SSI). Such a system puts the users in full control over their own data while also providing a solid backbone for building interoperable systems that are secure, scalable, and efficient. We propose different architectures for the decentralized identity infrastructure and storage layer, and also discuss the mapping of these architectures on cloud platforms. The main goal is to provide an architectural blueprint for a scalable, secure, privacy-preserving and trusted system.
This research examines the feasibility of implementing blockchain-based electronic voting systems in Morocco to enhance electoral transparency and integrity. The study employs a methodology that combines Distributed Permission Ledger Technology (DPLT) and the Solana blockchain, resulting in a multilayered system. The main findings highlight the effectiveness of blockchain technology in mitigating electoral fraud and manipulation when implemented with precision, underscoring the importance of meticulous design and execution. These findings contribute significantly to discussions surrounding the modernization of electoral processes in the digital age and support the hypothesis that blockchain can address vulnerabilities in traditional voting methods. Moreover, the study marks a significant step toward modernizing elections, preserving democratic principles, and reinforcing the role of technology in addressing persistent electoral challenges, ultimately enhancing accessibility, security, and transparency in elections and strengthening democracy in the digital era.
Muhammad Usman, Muhammad Shahzad Sarfraz, Muhammad Umar Aftab
et al.
Industrial Internet of Things (IIoT) applications consist of resource constrained interconnected devices that make them vulnerable to data leak and integrity violation challenges. The mobility, dynamism, and complex structure of the network further make this issue more challenging. To control the information flow in such environments, access control is critical to make collaboration and communication safe. To deal with these challenges, recent studies employ attribute-based access control on top of blockchain technology. However, the attribute-based access control frameworks suffer due to high computational overhead. In this paper, we propose an improved role-based access control framework using hyperledger blockchain to deal with IIoT requirements with less computational overhead making the information control process more efficient and real-time. The proposed framework leverages a layered architecture of chaincodes to implement the improved access control framework that handles the permission delegation and conflict management to deal with the dynamism of the IIoT network. The system uses a Policy Contract, Device Contract, and Access Contract to manage the workflow of the whole access control process. Each chaincode in the proposed framework is isolated in terms of its responsibilities to make the design low coupled. The integration of improved access control with blockchain enables the proposed framework to provide a highly scalable solution, tamper-proof, and flexible to manage conflicting scenarios. The proposed system outperforms the recent studies significantly in computational overhead in extensive simulation results. To verify the scalability and efficiency, the proposed is evaluated against a large number of concurrent virtual clients in simulation and statistical analysis proves that the proposed system is promising for further research in this domain.
IoT enables the emergence and implementation of smart devices to address real-world problems and challenges. Today we are surrounded by various smart devices, such as smart phones, smart homes, smart cars, smart televisions, and smartwatches that assist us in making our lives easier and smoother. IoT is a conglomeration of multiple technologies at various layers to impart the best of ubiquitous and pervasive computing to deliver several benefits in a variety of application sectors such as medicine, agriculture, and industry. In an IoT setting, blockchain technology is used for addressing security challenges and eradicating third-party participation. Utilizing public networks for storing or transmitting health care images poses risks of eavesdropping, data breaches, and unauthorized access. Before uploading medical data to the decentralized network, encryption is required to prevent unauthorized access. The aim of this study is to integrate technologies to ensure transactions are conducted safely and securely. We proposed an IoT-Blockchain system based on chaos encryption scheme using Tinkerbell mapping to ensure medical data integrity and authenticity. The suggested approach is examined to assess performance parameters such as, key space analysis, key sensitivity analysis, Information Entropy (IE), histogram, correlation of adjacent pixels, Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) and Structural Similarity Index (SSIM). These findings demonstrated that the suggested method is extremely efficient in avoiding security breaches and guaranteeing information integrity.
Abstract As digital transformation progresses across industries, digital twins have emerged as an important technology. In healthcare, digital twins are created by digitizing patient parameters, medical records, and treatment plans to enable personalized care, assist diagnosis, and improve planning. Data is core to digital twins, originating from physical and virtual entities as well as services. Once processed and integrated, data drives various components. Medical records are critical healthcare data but present unique challenges for digital twins. However, directly storing or encrypting medical records has issues. Plaintext risks privacy leaks while encryption hinders retrieval. To address this, we present a cloud-based solution combining post-quantum searchable encryption. Our system includes key generation using Physical Unable Functions (PUF). It encrypts medical records in cloud storage, verifies records using blockchain, and retrieves records via cloud. By integrating cloud encryption, blockchain verification and cloud retrieval, we propose a secure and efficient cloud-based medical records system for digital twins. Our implementation demonstrates the system provides users efficient and secure medical record services, compared to related designs. This highlights digital twins’ potential to transform healthcare through secure data-driven personalized care, diagnosis and planning.
The advancement of biometric technology has facilitated wide applications of biometrics in law enforcement, border control, healthcare and financial identification and verification. Given the peculiarity of biometric features (e.g., unchangeability, permanence and uniqueness), the security of biometric data is a key area of research. Security and privacy are vital to enacting integrity, reliability and availability in biometric-related applications. Homomorphic encryption (HE) is concerned with data manipulation in the cryptographic domain, thus addressing the security and privacy issues faced by biometrics. This survey provides a comprehensive review of state-of-the-art HE research in the context of biometrics. Detailed analyses and discussions are conducted on various HE approaches to biometric security according to the categories of different biometric traits. Moreover, this review presents the perspective of integrating HE with other emerging technologies (e.g., machine/deep learning and blockchain) for biometric security. Finally, based on the latest development of HE in biometrics, challenges and future research directions are put forward.
Fuad A. Ghaleb, Waleed Ali, Bander Ali Saleh Al-Rimy
et al.
Vehicular ad hoc networks have emerged as the main building block for the future cooperative intelligent transportation system (cITS) to improve road safety and traffic efficiency and to provide passenger comfort. However, vehicular networks are decentralized, characterized by high mobility and dynamicity, and vehicles move in a hostile environment; such characteristics make VANET applications suffer many security and communication issues. Recently, blockchain has been suggested to solve several VANET issues including the dissemination of trustworthy life-threatening information. However, existing dissemination schemes are inefficient for safety messages and are vulnerable to malicious nodes and rely on the majority of honest assumptions. In the VANET context, adversaries may collude to broadcast false information causing serious safety threats. This study proposes an intelligent proof-of-trustworthiness-based secure safety message dissemination scheme (PoTMDS) to efficiently share only trustworthy messages. The consistency and plausibility of the message were evaluated based on a predictive model developed using a convolutional neural network and signal properties such as the received signal strength and angle of arrival. A blockchain-based data dissemination scheme was developed to share critical messages. Each vehicle calculates the proof of trustworthiness of the disseminated messages by comparing the received message with the output of the prediction model. The results showed that the proposed scheme reduced the consensus delay by 58% and improved the detection accuracy by 7.8%. Therefore, the proposed scheme can have an important role in improving the applications of future cITS.
The relationship between image processing and image analysis is inseparable. With the increasing demand for multimedia visual images, the quality of image analysis is also increasing. However, in image processing and computer vision tasks, protecting users' privacy and preventing data leakage and abuse are not handled well. Image enhancement and nonlinear image color balance algorithm are applied to improve the visual quality of multimedia visual images and make them clearer and fuller. The article utilized image enhancement and a non-linear image color balance algorithm to improve the processing effect before visual image analysis. It also utilized the encryption mechanism of blockchain technology to detect the similarity of multimedia visual images. By comparing the feature points of the images, similar images were matched to address the copyright issue of the images. After experimental testing, the effect of image enhancement is significant, and the histogram of image equalization is significantly better than the original image. In the experiment of image analysis, the computer accurately classified visual images with different attributes. Finally, in the similarity detection algorithm of blockchain, the test results showed that when the number of image transactions reaches 500, the difference hash algorithm takes 1.13 s and 0.78 s to calculate the similarity comparison between the original and secondary images. The differential hash algorithm of blockchain is significantly superior to the Message-Digest Algorithm (MD5) in terms of computational speed and resource consumption. It has better image similarity detection performance and can also provide better image copyright protection mechanisms.
Polling system is not trusted everywhere around the world it is very important in this modern world to replace the traditional polling system with the new technology. Some countries like United States, Japan, and India suffer from corrupted polling system. Major issues are faced by current polling systems like system hacking, vote rigging, vote manipulation, distributed denial of service attack, and online polling booth capturing. This paper will lead to the problems faced by the traditional polling system and how the new technology will provide the solution to that problem. Also, our purpose is to check the feasibility of the system by recording the transaction fees and evaluate the right way to spend the amount of gas in the transaction. This will highlight blockchain frameworks including blockchain as a service and polling system which is on blockchain that addresses all constraint introducing ethereum which is a blockchain-based distributed computing platform. Ethereum is open source, and publicly available with a system featuring smart contracts. It provides the cryptocurrency wallets that let you make cheap, instant payments with gas in the form of ethers. The ethereum community is the most active and largest blockchain community in the world. There is no centralized organization that controls ethereum.
Aitizaz Ali, Muhammad Fermi Pasha, Jehad Ali
et al.
Due to the value and importance of patient health records (PHR), security is the most critical feature of encryption over the Internet. Users that perform keyword searches to gain access to the PHR stored in the database are more susceptible to security risks. Although a blockchain-based healthcare system can guarantee security, present schemes have several flaws. Existing techniques have concentrated exclusively on data storage and have utilized blockchain as a storage database. In this research, we developed a unique deep-learning-based secure search-able blockchain as a distributed database using homomorphic encryption to enable users to securely access data via search. Our suggested study will increasingly include secure key revocation and update policies. An IoT dataset was used in this research to evaluate our suggested access control strategies and compare them to benchmark models. The proposed algorithms are implemented using smart contracts in the hyperledger tool. The suggested strategy is evaluated in comparison to existing ones. Our suggested approach significantly improves security, anonymity, and monitoring of user behavior, resulting in a more efficient blockchain-based IoT system as compared to benchmark models.
Sustainable development is crucial to securing the future of humanity. Blockchain as a disruptive technology and a driver for social change has exhibited great potential to promote sustainable practices and help organizations and governments achieve the United Nations’ Sustainable Development Goals (SDGs). Existing literature reviews on blockchain and sustainability often focus only on topics related to a few SDGs. There is a need to consolidate existing results in terms of SDGs and provide a comprehensive overview of the impacts that blockchain technology may have on each SDG. This paper intends to bridge this gap, presenting a tertiary review based on 42 literature reviews, to investigate the relationship between blockchain and sustainability in light of SDGs. The method used is a consensus-based expert elicitation with thematic analysis. The findings include a novel and comprehensive mapping of impact-based interlinkage of blockchain and SDGs and a systematic overview of drivers and barriers to adopting blockchain for sustainability. The findings reveal that blockchain can have a positive impact on all 17 SDGs though some negative effects can occur and impede the achievement of certain objectives. 76 positive and 10 negative linkages between blockchain adoption and the 17 SDGs as well as 45 factors that drive or hinder blockchain adoption for the achievement of SDGs have been identified. Research gaps to overcome the barriers and enhance blockchain’s positive impacts have also been identified. The findings may help managers in evaluating the applicability and tradeoffs, and policymakers in making supportive measures to facilitate sustainability using blockchain.
Priyanka Gaba, Ram Shringar Raw, Mazin Abed Mohammed
et al.
Blockchain, a vital technology in today’s era, changed the way we share, manage and exchange our data in a centralized way to decentralized architecture. With the increasing demand for Blockchain, various platforms are available to implement public, private, consortium, or permissioned, permissionless Blockchain. Hyperledger, an open-source, permissioned, distributed ledger-based Blockchain, was hosted by Linux. This paper explores Hyperledger Fabric Private Blockchain Network (HFPBN). The architecture of HFPBN with its components and transaction flow is explored in detail. The Blockchain in HFPBN comprises multiple blocks that are linked to each other. The block elements are discussed in detail with their type and size, and after that, the total size of the block depending upon various parameters is calculated. Further, one application of Blockchain, i.e., Vehicular Ad-hoc Networks (VANETs), is discussed in this paper as a case study. The VANET application is implemented on the Hyperledger Fabric platform. Formulas showing the dependency of various parameters like endorsement policy, number of transactions, and number of reads and writes on block size are derived and shown in their relationship through the graph for the VANET system. The impact of block size on various performance parameters like throughput, latency, memory, and CPU utilization for the VANET system is then analyzed using Hyperledger Caliper. An optimal required value of throughput and latency is achieved for Blockchain-based VANET. Also, the Hyperledger Fabric platform seems suitable for many applications as it creates separate Blockchain for different applications.