The growth of counterfeit goods has plagued the international community for decades. Nowadays, the battle against counterfeiting remains a significant challenge. Most of the current anti-counterfeiting systems are centralized. Motivated by the evolution of blockchain technology, we propose (Block-Supply), a decentralized anti-counterfeiting supply chain that exploits NFC and blockchain technologies. This paper also proposes a new truly decentralized consensus protocol that, unlike most of the existing protocols, does not require PoW and randomly employs a different set of different size of validators each time a new block is proposed. Our protocol utilizes a game theoretical model to analyze the risk likelihood of the block's proposing nodes. This risk likelihood is used to determine the number of validators involved in the consensus process. Additionally, the game model enforces the honest consensus nodes' behavior by rewarding honest players and penalizing dishonest ones. Our protocol utilizes a novel, decentralized, dynamic mapping between the nodes that participate in the consensus process.This mapping ensures that the interaction between these nodes is executed anonymously and blindly. This way of mapping withstands many attacks that require knowing the identities of the participating nodes in advance, such as DDoS, Bribery, and Eclipse attacks.
Abstract-A data stream generated from hysteresis-based multiscroll chaos is proposed in this paper. The mathematical model of the multi-scroll chaotic attractor is a continuous-time linear third-order system with a feedback of hysteresis-series. The pseudo random data stream is generated from the state values of the third-order systems at the instance of hysteresis switching. Thanks to the complicated dynamical behavior of the multi-scroll chaotic attractor, the resulted data stream demonstrates highly unpredictability which is ideal for security use. Due to the simplicity of system model, the data stream can be generated in resource limited environment, such as mobile computing environment and wireless sensors. The data stream generation has been implemented in mobile phones with J2ME. It has the potential to be used as one time pad key in protecting information in ubiquitous computing environment. The resulting cipher can achieve high security strength with low cost.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.