Integrating Blockchain into Supply Chain Safeguarded by PUF-enabled RFID.

Loading...
Thumbnail Image

Authors

Islam, Md Didarul

Issue Date

2021

Type

Thesis

Language

Keywords

Blockchain , PUF , RFID , Secret sharing , Supply chain security

Research Projects

Organizational Units

Journal Issue

Alternative Title

Abstract

Due to globalization, supply chain networks are moving towards higher complexity and becoming vulnerable to various kinds of attacks such as counterfeiting, information tampering, and so on. Appropriate approaches are necessary to tackle different types of attacks and to ensure the required supply chain security. In this thesis, we have addressed the product counterfeiting issue using Physical Unclonable Function (PUF) enabled Radio Frequency Identification (RFID) tag. Applying blockchain technology to supply chain can add many useful features to the supply chain, such as decentralization and immutability. On the other hand, linking supply chain products to blockchain can bring transparency, traceability, and non-repudiation as well. As a preferred alternative to the traditional centralized databases, blockchain can address certain supply chain management issues such as complicated record-keeping, provenance tracking of the products, and distrust among different supply chain parties. In this research, blockchain technology has been leveraged to support anticounterfeiting and deal with data attacks. We have also introduced a reputation-based consensus algorithm for the blockchain which is less resource-intensive and thus will not impose additional cost on supply chain products indirectly. In the same research direction, we have devised our system architecture that is suitable for lightweight supply chain devices. The proposed three protocols, namely: registration protocol, verification protocol, and transaction protocol along with the blockchain technology help to transfer the ownership of the authentic product and keep the sensitive supply chain information safe. An encryption-based secret sharing technique has also been introduced to assist data protection.

Description

Citation

Publisher

License

Journal

Volume

Issue

PubMed ID

DOI

ISSN

EISSN