7,778 research outputs found
Supply chain traceability using blockchain
Mestrado em Gestão MBARastreabilidade é a capacidade de rastrear a origem, a história e a distribuição de produtos numa cadeia logística. Para implementar rastreabilidade completa, é crucial estabelecer uma cadeia de custódia, normalmente definida como uma sequência de procedimentos que valida a propriedade e o controle de produtos ao longo da cadeia de logística. No mercado atual globalizado, as cadeias de logística podem abranger um grande número de países e fronteiras e exigir a interoperabilidade de numerosas organizações. Esta vastidão e complexidade impacta a competitividade dos negócios e dificulta a segurança, e a transparência da cadeia de logística. A implementação da rastreabilidade é fundamental para que as organizações possam posteriormente demonstrar a rastreabilidade, proveniência e integridade e conformidade do produto. A tecnologia Blockchain, com os seus atributos de descentralização, transparência e imutabilidade, tem sido apontada como destinada a revolucionar vários setores, com aplicação ao gerenciamento de cadeias de logística. O presente estudo começa pela revisão da literatura publicada para encontrar aspetos que influenciam o problema e segue a Metodologia de Pesquisa de Projeto para analisar os requisitos e propor uma solução para um sistema de gestão de cadeia de logística com melhor rastreabilidade. Os resultados da tese são artefactos de arquitetura, incluindo um contracto inteligente para Ethereum e um sistema de autenticação baseado em certificados, que permitem a implementação de um sistema de cadeia de logística suportado em Ethereum Blockchain que providencia aos seus utilizadores e ao consumidor final, as funcionalidades de proveniência, rastreabilidade e cadeia de custódia.Traceability is the ability to trace the origin, processing history, and the distribution of products in a Supply chain. In order to implement a complete traceability system, it is crucial to establish a chain of custody. Chain of Custody is typically defined as a sequence of procedures that validates the ownership and control of products along the supply chain. In the current global marketplace supply chains can span a huge number of countries and require interoperation of a multitude of organizations. This vastness of supply chains impacts business competitiveness since it adds complexity and can difficult securing traceability, chain of custody and transparency. In this work it is proposed a complete approach for organizations to be able to demonstrate traceability, provenance (proof of origin) and product integrity and compliance. Blockchain technology with its attributes of decentralization, transparency and immutability has been touted to revolutionize several industries, and most recently has been proposed for supply chain management (SCM). The present study reviews the published literature to find the aspects that influence the problem and then follows the Design Science Research Methodology to analyze the requirements and propose a solution to a more complete traceability in SCMs. The results of this thesis were architectural artifacts, including an Ethereum SC (Smart Contract) and a certificate-based authentication system. These deliverables would allow implementation of a supply chain system over the Ethereum Blockchain that can provide decentralized and trustful assurance of the provenance, chain of custody and traceability functionalities for the participants and consumers.info:eu-repo/semantics/publishedVersio
Trust in a multi-tenant, logistics, data sharing infrastructure:Opportunities for blockchain technology
In support of the trend towards ever more complex supply chain collaboration for the physical Internet, a trusted, multi-tenant (and interoperable) data sharing infrastructure has to be enabled. Trust is a condition sine qua non organizations may not be prepared to share potentially competitive sensitive information. As such, trust has to be an essential design aspect for any multi-tenant data sharing infrastructure for the data sharing stakeholders To overcome the challenges for trusted data sharing, various reference architectures for a trusted, multi-tenant, data sharing infrastructure are being developed. As such, the Industrial Data Space (IDS) initiative is currently gaining attention. It’s based on the architectural principles of keeping the data owner in control over his data and keeping data, data processing and data distribution at the source. Its reference architecture is strongly grounded on a role / stakeholder model for the intermediary trusted roles to enable peer-to-peer data sharing over a controlled and trusted connector infrastructure. The intermediary trusted roles may contain and process meta-data on the data sources, the data transactions and/or on the identities of the parties involved in the data sharing. This paper focuses on the role of blockchain technology for improving trust levels for such intermediary trusted roles
How to be FAIR with your data
This handbook was written and edited by a group of about 40 collaborators in a series of six book sprints that took place between 1 and 10 June 2021. It aims to support higher education institutions with the practical implementation of content relating to the FAIR principles in their
curricula, while also aiding teaching by providing practical material, such as competence profiles, learning outcomes, lesson plans, and supporting information. It incorporates community feedback received during the public consultation which ran from 27 July to 12 September 2021
EFFICIENT AND SCALABLE NETWORK SECURITY PROTOCOLS BASED ON LFSR SEQUENCES
The gap between abstract, mathematics-oriented research in cryptography and the engineering approach of designing practical, network security protocols is widening. Network researchers experiment with well-known cryptographic protocols suitable for different network models. On the other hand, researchers inclined toward theory often design cryptographic schemes without considering the practical network constraints. The goal of this dissertation is to address problems in these two challenging areas: building bridges between practical network security protocols and theoretical cryptography. This dissertation presents techniques for building performance sensitive security protocols, using primitives from linear feedback register sequences (LFSR) sequences, for a variety of challenging networking applications. The significant contributions of this thesis are:
1. A common problem faced by large-scale multicast applications, like real-time news feeds, is collecting authenticated feedback from the intended recipients. We design an efficient, scalable, and fault-tolerant technique for combining multiple signed acknowledgments into a single compact one and observe that most signatures (based on the discrete logarithm problem) used in previous protocols do not result in a scalable solution to the problem.
2. We propose a technique to authenticate on-demand source routing protocols in resource-constrained wireless mobile ad-hoc networks. We develop a single-round multisignature that requires no prior cooperation among nodes to construct the multisignature and supports authentication of cached routes.
3. We propose an efficient and scalable aggregate signature, tailored for applications like building efficient certificate chains, authenticating distributed and adaptive content management systems and securing path-vector routing protocols.
4. We observe that blind signatures could form critical building blocks of privacypreserving accountability systems, where an authority needs to vouch for the legitimacy of a message but the ownership of the message should be kept secret from the authority. We propose an efficient blind signature that can serve as a protocol building block for performance sensitive, accountability systems.
All special forms digital signatures—aggregate, multi-, and blind signatures—proposed in this dissertation are the first to be constructed using LFSR sequences. Our detailed cost analysis shows that for a desired level of security, the proposed signatures outperformed existing protocols in computation cost, number of communication rounds and storage overhead
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
Recommended from our members
Blockchain and certificate authority cryptography for an asynchronous on-line public notary system
The true innovation behind the Bitcoin protocol is blockchain technology. Blockchain is the underlying distributed database and encryption technology that enables trustless transactions that can be verified, monitored, and enforced without a central institution. This master’s report presents the core concepts behind blockchain that are concerned with carrying instructions for storage, sharing of non-financial data, including an examination of the byzantine fault tolerant cryptography model.
A literature review describes the types of blockchains, nodes, proof of work, disadvantages, and risks and provides a survey of future applications related to state government records, such as birth certificates, automobile registrations, land deeds, and voting. This review will answer the question: Is it possible for a state government to use blockchain employing trusted nodes given that the nature of blockchain is that of a distributed network of peers accompanied by a public ledger without a central authority?
Finally, the requirements for a specific application case study will be defined and developed. The desired application will be a smart contract to invoke a statutory durable power of attorney using blockchain technology for oneself in case of incapacitation while still living.Electrical and Computer Engineerin
- …