2021 IEEE International Symposium on Smart Electronic Systems (iSES) 2021
DOI: 10.1109/ises52644.2021.00078
|View full text |Cite
|
Sign up to set email alerts
|

A Holistic Blockchain Based IC Traceability Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…By supply chain requirements, the most appropriate outcomes that should be necessitated are traceability of the product, availability of data, confidentiality of data, transparency of flow, immutability of ledger, counterfeit product detection and prevention and guarantees against other cyberattacks. [52], [65], [73], [74] that have included blockchain technology, but still cannot guarantee all its properties. Some papers [57], [70], [79], [80] add-on to existing technology and provide anti-counterfeit measures by discussing several cases of fraud and how their work prevents it.…”
Section: Security Analysis Of Proposed Frameworkmentioning
confidence: 99%
See 3 more Smart Citations
“…By supply chain requirements, the most appropriate outcomes that should be necessitated are traceability of the product, availability of data, confidentiality of data, transparency of flow, immutability of ledger, counterfeit product detection and prevention and guarantees against other cyberattacks. [52], [65], [73], [74] that have included blockchain technology, but still cannot guarantee all its properties. Some papers [57], [70], [79], [80] add-on to existing technology and provide anti-counterfeit measures by discussing several cases of fraud and how their work prevents it.…”
Section: Security Analysis Of Proposed Frameworkmentioning
confidence: 99%
“…Even integrity, availability, non-repudiation, confidentiality and smart contract vulnerabilities are accounted for. Omar et al [70] conducted a vulnerability analysis in which the smart contract codes are analysed using security tools: Smart Rekha et al [73] were able to trace authentic products with lineage i.e tracking of order history and transfers from manufacturing till the product reaches the consumer with multiple manufacturer entry points. Similarly, Pandey et al [78] combine lineage of product transfer along the supply chain entities with anti-counterfeit strategies from the product's birth.…”
Section: Security Analysis Of Proposed Frameworkmentioning
confidence: 99%
See 2 more Smart Citations