Professional Documents
Culture Documents
by
Examination Roll:
Md. Aminul Islam (210189)
We hereby declare that this thesis is based on the results found by myself. Ma-
terials of work found by other researchers are mentioned by reference. This thesis,
neither in whole nor in part, has been previously submitted for any degree.
ii
CERTIFICATE
iii
ABSTRACT
In recent years, the prevalence of counterfeit goods in the industrial sector has
increased. The company’s reputation, sales, and profitability are impacted by this.
By giving customers false goods instead of real ones, it has an impact on their health
as well. Counterfeiters benefit by making products with lower-quality materials and
procedures. It takes a skilled specialist a lot of time and money, and it is frustrating
for the average consumer, to be able to tell if a product is fake or not. So, the fight
against counterfeiting is still a big challenge today. The majority of anti-counterfeiting
solutions in use today are centralized. Blockchain is gaining popularity, and several
applications have evolved as a result of this technology.Any application that uses
Blockchain technology as its fundamental architecture guarantees the integrity of its
data. Motivated by the advancement of blockchain technology, we introduce a de-
centralized anti-counterfeiting supply chain that integrates QR code and blockchain
technologies which ensure that customers don’t put all of their trust on retailers to
figure out whether or not things are authentic. In this article, we will provide a
technique for spotting fake products by quickly scanning the fast response code on
them. It is nearly impossible to fabricate these codes because each one is unique and
each one is implemented using a different algorithm. Additionally, the database’s use
of an encrypted peer-to-peer network makes it hard for hackers to tamper with the
database.
iv
TABLE OF CONTENTS
DECLARATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
CERTIFICATE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
ABSTRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv
CHAPTER
I. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Problem statement . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Aim and Objectives . . . . . . . . . . . . . . . . . . . . . . . 2
2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.2 Research Gap . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.2 System Architecture . . . . . . . . . . . . . . . . . . . . . . . 6
3.3 Expected Outcome . . . . . . . . . . . . . . . . . . . . . . . . 7
IV. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
v
CHAPTER I
Introduction
1.1 Overview
Counterfeiting product is one of the major problems in recent world of every sector
of business. According to statista, in 2020 the losses from counterfeit goods worldwide
by retail sector where clothing is 26.3, pharmaceuticals is 10.2, cosmetics and per-
sonal care is 4.7 (in billion euros). The economic impact from counterfeit electronic
parts is estimated to be approximately $169 billion (Havoscope Global Black-Market
Information 2016). The Organization for Economic Co-operation and Development
(OECD) estimates that counterfeit and pirated product trade accounts for around
3.5% of worldwide trade. Two different ways can counterfeiting happen. First, non-
deceptive counterfeiting occurs when a customer is aware that a product is a fake but
nonetheless purchases it. The final sort of counterfeit is called misleading counterfeit
since the client cannot determine whether the item is real or false. Each year, coun-
terfeit medications cost the US $200 billion, and they are responsible for up to 10
million fatalities[1].
Blockchain is a new way of thinking that has changed the way people share data
and information securely. This new technology is made up of a series of blocks
that allow all committed transactions to be stored safely on shared and distributed
networks[2][3].Several fundamental technologies are used to achieve this goal, includ-
ing the cryptographic hash function, distributed consensus techniques, and digital
signatures. Decentralized execution of all transactions eliminates the requirement for
intermediaries to confirm and validate them[4].Blockchain was made so that nodes
in different places could agree on a state without needing a third party to coordi-
nate. These nodes can’t be trusted and may have bad nodes in them (e.g., malicious,
crashed). To agree on a proposed block when some nodes are broken, a protocol called
a "consensus protocol" must be run by some nodes called "validators" or "miners."
1
As a result, a lot of research has been done to come up with strong yet efficient
consensus protocols that will ensure agreement in the blockchain.
• Serial number security: Genuine serial numbers can be stolen and used to la-
bel counterfeit products. Thus, the uniqueness of a serial number should be
verifiable at any point in its supply chain life cycle.
Our main is goal is to solve the problem discussed in the earlier section. The aim
and objectives are: Our main is goal is to solve the problem discussed in the earlier
section. The aim and objectives are:
• Find the solution for serial number security, secure change of custody.
2
CHAPTER II
Literature Review
2.1 Overview
Blockchain has become increasingly popular in the community because of its im-
plementation and research importance. There has been many research involving this
topic. Major features and research gap of these researches will be discussed in this
chapter.
1. In paper [5] the author solve the problem by using Electronic Product Code
(EPC) that track the physical locations of a product, which then stored in a
centralized database. This code appear at least twice in the database so it
detect the cloning attack easily.
2. In paper [6][7] the author uses Near-Field Communication (NFC) tags which
is based on public key cryptography. This approach doesn’t require to access
database while using cell phone customer can check the authenticity of the
product.
3
3. In paper [8] the author determine the connection between industry 4.0, advanced
tracking and tracing technologies, and big data analytic. This thesis is done in
supply chain to determine the risk in it. Blockchain, ERP, and RFID sensors
are distributedly implemented in sourcing, shipping, and production. Big data
analytics enables the utilization of these data by artificial intelligence systems.
In addition, current digital technologies boost capacity flexibility and demand
responsiveness, which can have a favorable influence on the lowering of risk
mitigation inventory in the proactive stage ripple effect.
• limitations: This paper doesn’ t exploring how the digital technologies and
Industry 4.0 affect ripple effect and performance of the supply chain.
4. In paper [9] the author examine the present state of blockchain technology
and its business applications in different sector. Blockchains can be used to
check the integrity of different things, like insurance, issues with counterfeiting,
and intellectual property rights. Big data and artificial intelligence can make
technologies like blockchain even more open. Interoperability problems with
how blockchain is used can help businesses grow.
• limitations: The author didn’t mention the scalability problem of the the
system.
5. In the paper [10] The author looked into how blockchain would affect the quality,
cost, time, risk reduction, flexibility, and reliability of the supply chain. Where
cases from different fields show how blockchain can be used to reach different
goals in a supply chain. The Internet of Things plays a unique role in blockchain-
based solutions, and the degree to which a blockchain is used depends on how
well assets and people are verified.
6. In paper [11] The author shows that counterfeiting is a problem and a worry
in many different fields. So, along with adding a legal framework to blockchain
technology, it is very important for the success of any new technology to stop
counterfeiting that firms, the public, and consumers all work together.
4
• limitations: This paper only works with the fashion industries counterfeit-
ing. It can not consider the scenario of pharmaceutical, agriculture and
fields.
7. In the paper [12] The applications of blockchain and smart contracts to sup-
ply chain management are studied by the author. Barriers to using blockchain
technology for any company can be categorized as intra-organizational, inter-
organizational, external, and technological. Blockchains can facilitate transac-
tions between networked supply chain partners.
8. In the paper [13] the author is used Radio Frequency Identification to detect
the counterfeit products. For this method author proposed a system named
TagPrint. For this system three parties involve: a tag provider, a product
manufacturer and a customer.
5
CHAPTER III
3.1 Introduction
Our system architecture and it’s working procedure is discussed in this chapter.
The overall system structure is discussed section 3.2 and the expected outcome is
discussed in section 3.3.
6
Figure 3.2: Sequence of events in a blockchain network.
1. Proposing (proposer): This is the node in our Block-Supply chain that executes
the local authentication mechanism. After successful authentication, the system gen-
erates, proposes, and broadcasts the new block for the product to the network.
2. Validation-leader (leader): This node is responsible for choosing the random col-
lection of validators for the proposing node.
3. Validator: This node validates the newly proposed block by executing the global
authentication method. In addition, validators communicate their votes on the block
in order to achieve consensus.
In this project we will propose a decentralize consensus protocol with the help of
blockchain techniques and compared them with the existing system to check if the
solution is more efficient than the others.
7
CHAPTER IV
Conclusion
4.1 Conclusion
8
References
[1] N. NIZAMUDDIN and A. AL-FUQAHA, “Blockchain for ai: Review and open
research challenges,” 2030.
[3] S. Thakur and J. G. Breslin, “Scalable and secure product serialization for
multi-party perishable good supply chains using blockchain,” Internet of Things,
vol. 11, p. 100253, 2020.
[6] M. Q. Saeed, Z. Bilal, and C. D. Walter, “An nfc based consumer-level counterfeit
detection framework,” in 2013 Eleventh Annual Conference on Privacy, Security
and Trust, pp. 135–142, IEEE, 2013.
[7] M. Q. Saeed and C. D. Walter, “Off-line nfc tag authentication,” in 2012 Inter-
national Conference for Internet Technology and Secured Transactions, pp. 730–
735, IEEE, 2012.
[8] D. Ivanov, A. Dolgui, and B. Sokolov, “The impact of digital technology and
industry 4.0 on the ripple effect and supply chain risk analytics,” International
Journal of Production Research, vol. 57, no. 3, pp. 829–846, 2019.
9
[9] F. Casino, T. K. Dasaklis, and C. Patsakis, “A systematic literature review of
blockchain-based applications: Current status, classification and open issues,”
Telematics and informatics, vol. 36, pp. 55–81, 2019.
[10] N. Kshetri, “1 blockchain’s roles in meeting key supply chain management ob-
jectives,” International Journal of information management, vol. 39, pp. 80–89,
2018.
[12] S. Saberi, M. Kouhizadeh, J. Sarkis, and L. Shen, “Blockchain technology and its
relationships to sustainable supply chain management,” International Journal of
Production Research, vol. 57, no. 7, pp. 2117–2135, 2019.
[13] L. Yang, P. Peng, F. Dang, C. Wang, X.-Y. Li, and Y. Liu, “Anti-counterfeiting
via federated rfid tags’ fingerprints and geometric relationships,” in 2015 IEEE
Conference on Computer Communications (INFOCOM), pp. 1966–1974, IEEE,
2015.
10