288 research outputs found

    Energy consideration when integrating Blockchain with IoT for anti-counterfeit

    Get PDF
    Blockchain technology has been growing in popularity after Bitcoin, the first protocol has demonstrated a strong use case of the technology in Finance. Over the years, as the technology develops more and more, other use cases for the technology which basically relies on a distributed ledger database system have been explored in areas like supply chain and Internet of Things, to help in some of the bottleneck which IoT faces, some of the challenges are security, privacy, scalability, etc. This thesis work will consider energy consumption when integrating IoT with the Blockchain for anti-counterfeit purposes. Because there is little public academic information about the integration of Blockchain with IoT, it is very difficult to ascertain quantitatively, the energy requirement in application areas like anti-counterfeit. This thesis work has to qualitatively, rely on projects whitepapers and application documentation when comparing the energy requirement in the integration of Blockchain and IoT used for counterfeit solutions by different projects. Both private and public (open-sourced) projects were considered and resulted in two broad classifications ‘integration by brands using a unique identifier (RFID and NFC)’ and ‘integration throughout a product lifecycle’. Energy need for each project(s) in a class is considered based on the IoT hardware used and the Blockchain generation and consensus which also seems to have an impact on the implementation cost and complexity of the project

    Monetary Forgery in the Digital Age: Will Physical-Digital Cash Be a Solution?

    Get PDF

    Re-Designing Law and Lawyering for the Information Age

    Get PDF
    This Article analyzes the intersection of three aspects of law, lawyering, and Information Age technology and culture, describing how they disrupt and inhibit one another even as they supply possible opportunities for each to grow and innovate. The Article urges that Information Age challenges to traditional legal institutions and thinking become the foundation for reforms to legal systems and individual lawyering. In embracing changes made possible by emerging technology, the Rule of Law may be strengthened globally and the Preventive/Proactive style of lawyering can be re-invigorated. The Article begins by describing the Preventive/Proactive lawyering ( PPL ) style, and offers an example within commercial contracting. The Article analyzes how the adoption of this PPL style has been limited by traditional legal institutions and thinking, described using the metaphor of a container. The effectiveness and cultural acceptability of this containerized legal system is being challenged, however, by Information Age methods and attitudes concerning information and its delivery; the nature of individuals and their social groupings; and the legitimacy and purposes of social control. Emerging Information Age culture, however, is largely compatible with the assumptions underlying PPL. As Information Age technology unfolds, preventive/proactive thinking and methods may not only become more popular in everyday lawyering practice, but also may serve as a model for how traditional legal systems may be helpfully reformed. The Article concludes with a set of design principles by which those reforms may be guided

    Mobile Identity, Credential, and Access Management Framework

    Get PDF
    Organizations today gather unprecedented quantities of data from their operations. This data is coming from transactions made by a person or from a connected system/application. From personal devices to industry including government, the internet has become the primary means of modern communication, further increasing the need for a method to track and secure these devices. Protecting the integrity of connected devices collecting data is critical to ensure the trustworthiness of the system. An organization must not only know the identity of the users on their networks and have the capability of tracing the actions performed by a user but they must trust the system providing them with this knowledge. This increase in the pace of usage of personal devices along with a lack of trust in the internet has driven demand for trusted digital identities. As the world becomes increasingly mobile with the number of smart phone users growing annually and the mobile web flourishing, it is critical to implement strong security on mobile devices. To manage the vast number of devices and feel confident that a machine’s identity is verifiable, companies need to deploy digital credentialing systems with a strong root of trust. As passwords are not a secure method of authentication, mobile devices and other forms of IoT require a means of two-factor authentication that meets NIST standards. Traditionally, this has been done with Public Key Infrastructure (PKI) through the use of a smart card. Blockchain technologies combined with PKI can be utilized in such a way as to provide an identity and access management solution for the internet of things (IoT). Improvements to the security of Radio Frequency Identification (RFID) technology and various implementations of blockchain make viable options for managing the identity and access of IoT devices. When PKI first began over two decades ago, it required the use of a smart card with a set of credentials known as the personal identity verification (PIV) card. The PIV card (something you have) along with a personal identification number (PIN) (something you know) were used to implement two-factor authentication. Over time the use of the PIV cards has proven challenging as mobile devices lack the integrated smart card readers found in laptop and desktop computers. Near Field Communication (NFC) capability in most smart phones and mobile devices provides a mechanism to allow a PIV card to be read by a mobile device. In addition, the existing PKI system must be updated to meet the demands of a mobile focused internet. Blockchain technology is the key to modernizing PKI. Together, blockchain-based PKI and NFC will provide an IoT solution that will allow industry, government, and individuals a foundation of trust in the world wide web that is lacking today

    Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey

    Get PDF
    This is an accepted manuscript of an article published by IEEE in IEEE Transactions on Engineering Management, available online at: https://ieeexplore.ieee.org/document/9366288 The accepted version of the publication may differ from the final published versionSupply-chains (SC) present performance bottlenecks that contribute to a high level of costs, infltration of product quality, and impact productivity. Examples of such inhibitors include the bullwhip effect, new product lines, high inventory, and restrictive data fows. These bottlenecks can force manufacturers to source more raw materials and increase production signifcantly. Also, restrictive data fow in a complex global SC network generally slows down the movement of goods and services. The use of Distributed LedgerTechnologies (DLT) in supply chain management (SCM) demonstrates the potentials to to reduce these bottlenecks through transparency, decentralization, and optimizations in data management. These technologies promise to enhance the trustworthiness of entities within the supply chain, ensure the accuracy of data-driven operations, and enable existing SCM processes to migrate from a linear to a fully circular economy. This paper presents a comprehensive review of 111 articles published in the public domain in the use and effcacyofDLTin SC.It acts asaroadmapfor current and futureresearchers whofocus onSC Security Management to better understand the integration of digital technologies such as DLT. We clustered these articles using standard descriptors linked to trustworthiness, namely, immutability, transparency, traceability, and integrity

    Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey

    Get PDF
    Supply chains (SC) present performance bottlenecks that contribute to a high level of costs, infiltration of product quality, and impact productivity. Examples of such inhibitors include the bullwhip effect, new product lines, high inventory, and restrictive data flows. These bottlenecks can force manufacturers to source more raw materials and increase production significantly. Also, restrictive data flow in a complex global SC network generally slows down the movement of goods and services. The use of distributed ledger technologies (DLT) in SC management (SCM) demonstrates the potentials to reduce these bottlenecks through transparency, decentralization, and optimizations in data management. These technologies promise to enhance the trustworthiness of entities within the SC, ensure the accuracy of data-driven operations, and enable existing SCM processes to migrate from a linear to a fully circular economy. This article presents a comprehensive review of 111 articles published in the public domain in the use and efficacy of DLT in SC. It acts as a roadmap for current and future researchers who focus on SC security management to better understand the integration of digital technologies such as DLT. We clustered these articles using standard descriptors linked to trustworthiness, namely, immutability, transparency, traceability, and integrity
    • …
    corecore