Block-Supply Chain: A New Anti- Counterfeiting Supply Chain Using - - PowerPoint PPT Presentation

block supply chain a new anti counterfeiting supply chain
SMART_READER_LITE
LIVE PREVIEW

Block-Supply Chain: A New Anti- Counterfeiting Supply Chain Using - - PowerPoint PPT Presentation

Block-Supply Chain: A New Anti- Counterfeiting Supply Chain Using NFC and Blockchain By: Naif Alzahrani Nirupama Bulusu Portland State University Motivation Products Counterfeiting World Health Organization (WHO) 2008 [1]: 30% of


slide-1
SLIDE 1

Block-Supply Chain: A New Anti- Counterfeiting Supply Chain Using NFC and Blockchain

By: Naif Alzahrani Nirupama Bulusu Portland State University

slide-2
SLIDE 2
  • World Health Organization (WHO) 2008 [1]: 30% of

medical products are counterfeit in developing countries

  • MarkMonitor, 2011 [2]: counterfeit sales cost about

$135 billion in online shopping

  • 2017: 40–50% of antimalarials are counterfeit in

countries like SoutheastAsia and Africa [3]

Motivation

Products’ Counterfeiting

slide-3
SLIDE 3

Existing Solutions

Existing Approaches Cryptographic Track &Trace

Challenge Response Protocol

slide-4
SLIDE 4

Challenge Response Protocol

Sever Tag

  • 1. Generates a random Challenge

Challenge

4

slide-5
SLIDE 5

Challenge Response Protocol

Sever Tag

  • 1. Generates a random Challenge

Challenge Response Challenge Sign Private key Response 2.

5

slide-6
SLIDE 6

Challenge Response Protocol

Sever Tag

  • 1. Generates a random Challenge

Challenge Response Challenge Sign Private key Response 2. Verify Public key Response 3. Challenge

6

slide-7
SLIDE 7

7

Existing Solutions

slide-8
SLIDE 8
  • 1. Modification

Genuine Product Legitimate Tag

Expiration Date

Modifies Data

8

Counterfeiting Attacks

slide-9
SLIDE 9
  • 2. Cloning

Genuine Product Counterfeit Product Copies and Writes Data

9

Counterfeiting Attacks

slide-10
SLIDE 10
  • 3. Tag Reapplication

Genuine Product Legitimate Tag Counterfeit Product Removes and Reapplies Tag

10

Counterfeiting Attacks

slide-11
SLIDE 11

Block-Supply Chain: decentralized supply chain to:

  • Track and trace product
  • Detect:

Modifiction Cloning Tag reapplication

Contribution

slide-12
SLIDE 12

Block-Supply Chain

Initialization Phase Verification Phase

slide-13
SLIDE 13

Initialization Phase

slide-14
SLIDE 14

B0

Manufacturer

Initialization Phase

slide-15
SLIDE 15
slide-16
SLIDE 16

B0 B0 B0 B0 B0 B0

Initialization Phase

slide-17
SLIDE 17

B0 B0 B0 B0 B0 B0

Initialization Phase

slide-18
SLIDE 18

Initialization Phase

B0 B0 B0 B0 B0 B0

slide-19
SLIDE 19

Block-Supply Chain

Initialization Phase Verification Phase

slide-20
SLIDE 20

Verification Phase

B0 B0 B0 B0 B0 B0

slide-21
SLIDE 21

Verification Phase

B1 B1 B1 B1 B1 B1 B0 B0 B0 B0 B0 B0

slide-22
SLIDE 22

Verification Phase

B1 B1 B1 B1 B1 B1 B0 B0 B0 B0 B0 B0

Local Authentication

slide-23
SLIDE 23

B2

Verification Phase

B1 B1 B1 B1 B1 B1 B0 B0 B0 B0 B0 B0

slide-24
SLIDE 24

B2 B2 B2 B2 B2 B2

Verification Phase

B1 B1 B1 B1 B1 B1 B0 B0 B0 B0 B0 B0

slide-25
SLIDE 25

B2

Verification Phase

B1 B1 B1 B1 B1 B1 B0 B0 B0 B0 B0 B0

Global Authentication Global Authentication Global Authentication Global Authentication Global Authentication

slide-26
SLIDE 26

B2

Verification Phase

B1 B1 B1 B1 B1 B1 B0 B0 B0 B0 B0 B0

Global Authentication Global Authentication Global Authentication Global Authentication

B2 Valid?

Global Authentication

slide-27
SLIDE 27

B2

Verification Phase

B1 B1 B1 B1 B1 B1 B0 B0 B0 B0 B0 B0 B2 B2 B2 B2 B2

slide-28
SLIDE 28
  • 1. Trace-and-track products
  • 2. Detects:
  • Modification
  • Cloning
  • Tag reapplication

Local Authentication Global Authentication

+

Verification Phase

slide-29
SLIDE 29

Consensus Protocol

slide-30
SLIDE 30

Existing Protocols

Proof of Work (PoW)

  • Solve a challenge: compute a cryptographic

hashes

  • If succeed, submit the block to the network
slide-31
SLIDE 31

Existing Protocols

Proof of Work (PoW)

  • Issues:
  • 1. Huge computational effort
  • 2. Energy and computing resources

consumption

  • 3. Relies on a few mining pools (raises

doubts on the decentralization)

  • 4. Frequently fork
slide-32
SLIDE 32

Existing Protocols

Fixed-Validators Decentralization

  • Small fixed number of nodes chosen to be

validators

  • Proof of Stake (PoS): e.g. the voting power
  • Committee size —> Computation and

communication overhead

slide-33
SLIDE 33

Existing Protocols

Fixed-Validators Decentralization

  • Examples:
  • 1. Tendermint
  • 2. Hyperledger Fabric
  • 1/3 byzantine nodes
slide-34
SLIDE 34

Existing Protocols

Fixed-Validators Decentralization

  • Issues:
  • 1. Strong trust assumption
  • 2. Fixed committee of validators is

vulnerable to adversarial attacks

  • DoS attack
  • Powerful adversary can corrupt or

bribe most of them over time

slide-35
SLIDE 35

Existing Protocols

Fixed-Validators Decentralization

  • Issues:
  • 3. Fairness of selection
  • 4. Small committee + massive number of

transactions —> performance bottleneck

slide-36
SLIDE 36

Design Goals

  • 1. Efficiency:
  • Small number of validators
  • 2. Security:
  • Random rotating-validators’ selection
  • 3. Validators’ selection fairness
  • Selection with equal probability
slide-37
SLIDE 37

New consensus protocol that:

  • Utilizes different set of validators
  • n every block proposal
  • Maintains security by employing

random validators’ selection

  • Achieves efficiency by employing

small number of validators

Contribution

slide-38
SLIDE 38

Proposed Protocol

  • Based on Tendermint
  • Select different set of validators on every

block proposal

  • Balances between efficiency and security
slide-39
SLIDE 39
  • Four types of nodes:
  • 1. Proposer: proposes the new block
  • 2. Validation-leader: selects the validators
  • 3. Validator: validates the proposed block
  • 4. Idle: waits for the consensus on the block

Proposed Protocol

slide-40
SLIDE 40
  • At the genesis state
  • Each proposer is randomly mapped to a

validation-leader

  • The validation-leader is activated upon

receiving the block from its proposer

Proposer to validation-leader mapping

Proposed Protocol

slide-41
SLIDE 41
  • On proposing a new block
  • Each validation-leader randomly selects Log

n validators

  • A validator is activated upon receiving a

‘validate’ message from its validation-leader

Validators Selection

Proposed Protocol

slide-42
SLIDE 42
slide-43
SLIDE 43

Evaluation

Security

0.33% random malicious nodes

slide-44
SLIDE 44

Evaluation

Efficiency

slide-45
SLIDE 45
  • Limitation 1: the number of validators is static

Future solution: dynamic variable number of validators based on a risk likelihood

  • Limitation 2: Malicious or lazy validation-

leaders Future solution: a game theoretical model to reward and punish validation-leaders

Limitations

slide-46
SLIDE 46

Future Work

  • Limitation 1: the number of validators is static

Future solution: dynamic variable number of validators based on a risk likelihood

  • Limitation 2: Malicious or lazy validation-

leaders Future solution: a game theoretical model to reward and punish validation-leaders

slide-47
SLIDE 47
  • Limitation 1: the number of validators is static

Future solution: dynamic variable number of validators based on a risk likelihood

  • Limitation 2: Malicious or lazy validation-

leaders Future solution: a game theoretical model to reward and punish validation-leaders

Limitations

slide-48
SLIDE 48

Future Work

  • Limitation 1: the number of validators is static

Future solution: dynamic variable number of validators based on a risk likelihood

  • Limitation 2: Malicious or lazy validation-

leaders Future solution: a game theoretical model to reward and punish validation-leaders

slide-49
SLIDE 49
  • Limitation 3: always-validation mode

Future solution: a game theoretical model to validate with probability according to the proposing node risk likelihood

  • Limitation 4: validation-leaders know their

proposers in advance Future solution: blind proposers validation- leaders mapping.

Limitations

slide-50
SLIDE 50

Future Work

  • Limitation 3: always-validation mode

Future solution: a game theoretical model to validate with probability according to the proposing node risk likelihood

  • Limitation 4: validation-leaders know their

proposers in advance Future solution: blind proposers validation- leaders mapping.

slide-51
SLIDE 51
  • Limitation 3: always-validation mode

Future solution: a game theoretical model to validate with probability according to the proposing node risk likelihood

  • Limitation 4: validation-leaders know their

proposers in advance Future solution: blind proposers validation- leaders mapping.

Limitations

slide-52
SLIDE 52

Future Work

  • Limitation 3: always-validation mode

Future solution: a game theoretical model to validate with probability according to the proposing node risk likelihood

  • Limitation 4: validation-leaders know their

proposers in advance Future solution: blind proposers validation- leaders mapping.

slide-53
SLIDE 53

Tianks Questjons