2021
DOI: 10.48550/arxiv.2102.00459
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Toward Blockchain-Enabled Supply Chain Anti-Counterfeiting and Traceability

Neo C. K. Yiu

Abstract: Innovative solutions addressing product anti-counterfeiting and record provenance have been deployed across today's internationally spanning supply chain networks. These product anti-counterfeiting solutions are developed and implemented with centralized system architecture relying on centralized authorities or any form of intermediaries. Vulnerabilities of centralized product anticounterfeiting solutions could possibly lead to system failure or susceptibility of malicious modifications performed on product re… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(14 citation statements)
references
References 32 publications
0
14
0
Order By: Relevance
“…As explained with research findings of security analyses performed in [2], amongst NAS and other existing anticounterfeiting alternatives with centralized architecture, utilizing wireless tag communication technologies, there are three common counterfeit attacks in the existing centralized anti-counterfeiting and traceability solutions: (1) modification of product records stored in tags, such as fabricating product identifiers or metadata of any wine product, (2) cloning of tag metadata such as those genuine wine records to any counterfeit product tag, and (3) removal of legitimate tags from genuine wine products with reapplications to other counterfeit wine products.…”
Section: Current Alternative Resolutions Of Product Anti-counterfeitingmentioning
confidence: 99%
See 4 more Smart Citations
“…As explained with research findings of security analyses performed in [2], amongst NAS and other existing anticounterfeiting alternatives with centralized architecture, utilizing wireless tag communication technologies, there are three common counterfeit attacks in the existing centralized anti-counterfeiting and traceability solutions: (1) modification of product records stored in tags, such as fabricating product identifiers or metadata of any wine product, (2) cloning of tag metadata such as those genuine wine records to any counterfeit product tag, and (3) removal of legitimate tags from genuine wine products with reapplications to other counterfeit wine products.…”
Section: Current Alternative Resolutions Of Product Anti-counterfeitingmentioning
confidence: 99%
“…Given the growing concern and worsening situation in trading activities of counterfeit products, there have been anti-counterfeiting solutions developed and implemented in the supply chain systems of different industries as listed and explained in [2]. Wireless communication technologies, such as RFID (Radio-frequency Identification) or NFC (Nearfield communication which is a subset of RFID), powering the Internet of Things (IoT) are mostly those existing anticounterfeiting and traceability solutions with centralized architectures currently based on, via packaging the tags on packets of goods or products itself for identification and anti-counterfeiting purpose.…”
Section: Current Alternative Resolutions Of Product Anti-counterfeitingmentioning
confidence: 99%
See 3 more Smart Citations