67,397 research outputs found
From truth to trust: the impact of blockchain traceability on trust in product authenticity
In the global marketplace, customers are increasingly unaware of the source, provenance, and authenticity of products. Early research has shown that the introduction of blockchain technology into the supply chain area can make it more transparent and trustworthy. As a platform that supports distributed, cryptographically secure, auditable transactions, blockchain has expanded from the domain of digital cryptocurrency into the domain of physical asset provenance and ownership tracking and tracing. This research examines blockchain support of trust in product authenticity adopting a two-paper dissertation format. In the first conceptual paper, I develop a conceptual framework on blockchain technology\u27s unique features and characteristics and how it can boost trust in product authenticity. The second paper adopts the conceptual framework to test through a vignette experiment the effects of blockchain traceability, product identification, and the interaction between them on trust in product origin authenticity. Academics can use this research to develop new instruments to inform practice about how blockchain can boost trust in product authenticity. Results from this study can inform managers considering investments into blockchain solutions and unique product identification as a customer product authenticity, brand protection, or anti-counterfeiting strategy
A Blockchain-Based Approach for Drug Traceability in Healthcare Supply Chain
Healthcare supply chains are complex structures spanning across multiple organizational and geographical boundaries, providing critical backbone to services vital for everyday life. The inherent complexity of such systems can introduce impurities including inaccurate information, lack of transparency and limited data provenance. Counterfeit drugs is one consequence of such limitations within existing supply chains which not only has serious adverse impact on human health but also causes severe economic loss to the healthcare industry. Consequently, existing studies have emphasized the need for a robust, end-to-end track and trace system for pharmaceutical supply chains. Therein, an end-to-end product tracking system across the pharmaceutical supply chain is paramount to ensuring product safety and eliminating counterfeits. Most existing track and trace systems are centralized leading to data privacy, transparency and authenticity issues in healthcare supply chains. In this article, we present an Ethereum blockchain-based approach leveraging smart contracts and decentralized off-chain storage for efficient product traceability in the healthcare supply chain. The smart contract guarantees data provenance, eliminates the need for intermediaries and provides a secure, immutable history of transactions to all stakeholders. We present the system architecture and detailed algorithms that govern the working principles of our proposed solution. We perform testing and validation, and present cost and security analysis of the system to evaluate its effectiveness to enhance traceability within pharmaceutical supply chains
RFID Demystified: Part 3. Company Case Studies.
In the previous two parts of RFID Demystified we have discussed the technology, possible benefits and areas of application for with Radio Frequency Identification (RFID) systems. In this final part we review Company Case-Studies of those who have decided to apply the technology within their organisation. It will be seen that considerable benefits are being experienced within some organisations, pilot applications are increasing our learning and providing a foundation for the future success of projects in this area
After Heparin: Protecting Consumers From the Risks of Substandard and Counterfeit Drugs
Based on case studies, examines globalization and quality management trends in pharmaceutical manufacturing, barriers to Federal Drug Administration oversight, and the security of pharmaceutical distribution. Makes policy recommendations to ensure safety
Critical Management Issues for Implementing RFID in Supply Chain Management
The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains
Efficient and Low-Cost RFID Authentication Schemes
Security in passive resource-constrained Radio Frequency Identification
(RFID) tags is of much interest nowadays. Resistance against illegal tracking,
cloning, timing, and replay attacks are necessary for a secure RFID
authentication scheme. Reader authentication is also necessary to thwart any
illegal attempt to read the tags. With an objective to design a secure and
low-cost RFID authentication protocol, Gene Tsudik proposed a timestamp-based
protocol using symmetric keys, named YA-TRAP*. Although YA-TRAP* achieves its
target security properties, it is susceptible to timing attacks, where the
timestamp to be sent by the reader to the tag can be freely selected by an
adversary. Moreover, in YA-TRAP*, reader authentication is not provided, and a
tag can become inoperative after exceeding its pre-stored threshold timestamp
value. In this paper, we propose two mutual RFID authentication protocols that
aim to improve YA-TRAP* by preventing timing attack, and by providing reader
authentication. Also, a tag is allowed to refresh its pre-stored threshold
value in our protocols, so that it does not become inoperative after exceeding
the threshold. Our protocols also achieve other security properties like
forward security, resistance against cloning, replay, and tracking attacks.
Moreover, the computation and communication costs are kept as low as possible
for the tags. It is important to keep the communication cost as low as possible
when many tags are authenticated in batch-mode. By introducing aggregate
function for the reader-to-server communication, the communication cost is
reduced. We also discuss different possible applications of our protocols. Our
protocols thus capture more security properties and more efficiency than
YA-TRAP*. Finally, we show that our protocols can be implemented using the
current standard low-cost RFID infrastructures.Comment: 21 pages, Journal of Wireless Mobile Networks, Ubiquitous Computing,
and Dependable Applications (JoWUA), Vol 2, No 3, pp. 4-25, 201
A Provisional Framework for Studying Information Connectivity in Food Networks
Through a discussion of peculiarities of food supply, involving focus on information connectivity, a preliminary framework is sought that underlines joint responsibility in a complete supply chain of actors working in network context to achieve safe, quality and economic provision of products to end-use.Food chains and networks, Complete chain and network approach, Information connectivity, Enterprise modelling, Product traceability, Agribusiness, Agricultural and Food Policy, Farm Management, Food Consumption/Nutrition/Food Safety, Industrial Organization,
Recommended from our members
WSN based intelligent cold chain management
This paper presents a cold chain monitoring system which is implemented by using ubiquitous computing technologies, Radio Frequency Identification (RFID) & Wireless Sensor Network (WSN). In this paper, we discuss how cold supply chain works and how we can monitor and control cold supply chain by using wireless tracking and sensing technologies. We propose a prototype design which will provide a well controlled and transparent cold chain system, which could help the users to manage their productsâ environmental data in real time during the life cycle. Moreover, we highlight how the availability of product trace data in combination with historical condition-monitoring data can facilitate decision-making processes enhancing supply chainâs performance. Finally we discuss the integration works of these two technologies together in the cold supply chain management system. Hardware and software platform of WSN used in this system are also described in this paper
- âŠ