You are on page 1of 13

A Decentralized Consensus Protocol for Preventing Product from

Counterfeiting
Md. Aminul Islam 210189

Supervisor
Prof. K M Akkas Ali
Professor

11/09/2022 Institute of Information Technology, Jahangirnagar University 1


Outline
• Introduction
• Limitation
• Problem statement
• Motivation
• Objectives
• Literature Review
• Proposed System Method
• Expected outcome and Conclusion

11/09/2022 Institute of Information Technology, Jahangirnagar University 2


Introduction
• Counterfeiting product is one of the major problems in recent world of every business
sector.
• According to Statista, in 2020 the losses from counterfeit goods worldwide by retail
sector where clothing is 26.3, pharmaceuticals is 10.2, cosmetics and personal care is 4.7
(in billion euros).
• Two different ways can counterfeiting happen.
1. Non-Deceptive Counterfeiting
2. Deceptive Counterfeiting
• Blockchain is a new way of thinking that has changed the way people share data and
information securely. This new technology is made up of a series of blocks that allow all
committed transactions to be stored safely on shared and distributed networks.

11/09/2022 Institute of Information Technology, Jahangirnagar University 3


Limitation of Existing Systems

• Most of the existing anti-counterfeiting supply chains are centralized and depend
on a central authority.
• The server is under a heavy processing load as large quantities of products flow
through the supply chain nodes.
• Substantial storage is required to store authentication records for all products.
• As with centralized systems, traditional supply chains inherently have the problem
of a single point of failure.

11/09/2022 Institute of Information Technology, Jahangirnagar University 4


Problem Statement

Secure Change of Custody


A few intimidating nodes can
mess up a planned change of
Serial number security custody of a product that is
being sold.
Genuine serial numbers can be
stolen and used to label counterfeit
products.
Control over the serial
number—Perishable
Food:
Perishable food products with an
expired shelf life are thrown away.

11/09/2022 Institute of Information Technology, Jahangirnagar University 5


Motivation
• Analysing many works, we have seen that, the rapid growth of products around
the world has led to the growth of large, globalized, digital supply chains. Modern
supply chains are mostly centralized.
• Track-and-trace based supply chains where a centralized tracking server tracks
the physical locations of products and updates their records.
• So, we are focusing on using decentralized system instead of centralized system
and update the security of product quirky.

11/09/2022 Institute of Information Technology, Jahangirnagar University 6


Objectives

• To use Blockchain, which will be a key technology to overcome those problems .

• Find the solution for both serial number security and secure change of custody

• Consumers don’t need to fully rely on trusted third parties to know the source of
the purchased product.

11/09/2022 Institute of Information Technology, Jahangirnagar University 7


Literature Review
Inspiring Works of THz Communication and IRS :
Serial Title Type and Technique and Limitations
No Publication details Findings
L. Yang, P. Peng and F. Dang, "Anti- IEEE Conference on RFID based TagPrint is used Tag reapplication attacks
1 counterfeiting via federated rfid Computer for anti-counterfeiting. are not detectable by
Communications TagPrint. TagPrint is also
tags’ fingerprints and geometric based on RFID tags, which
relationships." (INFOCOM), pp. 1966– need specialized readers
1974 and make this strategy
inappropriate for regular
consumers.

2 Raja Santhi, Abirami, and Logistics 6.1 (2022): Comprehensive overview of The authors focused
Padmakumar Muthuswamy, 15. blockchain technology’s role on a single application
"Influence of blockchain in tackling supply chain and of blockchain
logistics-related concerns.
technology in manufacturing technology (in the field
supply chain and logistics.” of manufacturing
supply chain and
logistics).

11/09/2022 Institute of Information Technology, Jahangirnagar University 8


Other Significant Works
Serial Title Type and Technique and Limitations
No Publication details Findings
S. Saberi, M. Kouhizadeh, J. Sarkis, and L. International Journal of The applications of blockchain Focuses on the various
Shen, "Blockchain technology and its Production Research, vol. 57, and smart contracts to supply challenges associated with
3 relationships to sustainable supply no. 7, pp. 2117–2135, 2019 chain management are studied implementing the blockchain
chain management." by the author. in the supply chain, but it does
not address how to handle an
attack that occurs there.

4 L. Meraviglia, “Technology and Business Horizons, vol. 61, Along with adding a legal This paper only works with the
counterfeiting in the fashion no. 3, pp. 467–475, 2018 framework to blockchain fashion industries
industry: Friends or foes?,” technology, it is very important counterfeiting. It does not
for the success of any new consider the scenario of
technology to stop pharmaceutical, agriculture
counterfeiting that firms, the and other fields.
public, and consumers all work
together.

11/09/2022 Institute of Information Technology, Jahangirnagar University 9


Proposed System Method
Our research work will propose a decentralized consensus protocol for
preventing product counterfeit. The proposed model will be composed of
three continuous processes:

 Study the existing techniques.

 Construct a Decentralized Consensus Protocol.

 Compare the efficiency with existing techniques.

11/09/2022 Institute of Information Technology, Jahangirnagar University 10


How Blockchain works

11/09/2022 Institute of Information Technology, Jahangirnagar University 11


Expected Outcome and Conclusion

In this work, we propose a decentralized supply chain system


utilizing blockchain technology. We brought out the challenges in
existing supply chain management, and explained how blockchain
may be utilized to bring transparency and visibility to supplies and
overcome the issue of counterfeiting.

11/09/2022 Institute of Information Technology, Jahangirnagar University 12


Thank You!

11/09/2022 Institute of Information Technology, Jahangirnagar University 13

You might also like