block supply chain a new anti counterfeiting supply chain
play

Block-Supply Chain: A New Anti- Counterfeiting Supply Chain Using - PowerPoint PPT Presentation

Block-Supply Chain: A New Anti- Counterfeiting Supply Chain Using NFC and Blockchain By: Naif Alzahrani Nirupama Bulusu Portland State University Motivation Products Counterfeiting World Health Organization (WHO) 2008 [1]: 30% of


  1. Block-Supply Chain: A New Anti- Counterfeiting Supply Chain Using NFC and Blockchain By: Naif Alzahrani Nirupama Bulusu Portland State University

  2. Motivation Products’ Counterfeiting • World Health Organization (WHO) 2008 [1]: 30% of medical products are counterfeit in developing countries • MarkMonitor, 2011 [2]: counterfeit sales cost about $135 billion in online shopping • 2017: 40–50% of antimalarials are counterfeit in countries like SoutheastAsia and Africa [3]

  3. Existing Solutions Existing Approaches Cryptographic Track &Trace Challenge Response Protocol

  4. Challenge Response Protocol Sever Tag 1. Generates a random Challenge Challenge 4

  5. Challenge Response Protocol Sever Tag 1. Generates a random Challenge Challenge 2. Private key Challenge Sign Response Response 5

  6. Challenge Response Protocol Sever Tag 1. Generates a random Challenge Challenge 2. Private key Challenge Sign Response Response 3. Challenge Response Verify Public key 6

  7. Existing Solutions 7

  8. Counterfeiting Attacks 1. Modification Legitimate Tag Expiration Date Modifies Data Genuine Product 8

  9. Counterfeiting Attacks 2. Cloning Copies and Writes Data Genuine Product Counterfeit Product 9

  10. Counterfeiting Attacks 3. Tag Reapplication Legitimate Tag Removes and Reapplies Tag Genuine Product Counterfeit Product 10

  11. Contribution Block-Supply Chain: decentralized supply chain to: • Track and trace product • Detect: Modifiction Cloning Tag reapplication

  12. Block-Supply Chain Initialization Verification Phase Phase

  13. Initialization Phase

  14. Initialization Phase B 0 Manufacturer

  15. Initialization Phase B 0 B 0 B 0 B 0 B 0 B 0

  16. Initialization Phase B 0 B 0 B 0 B 0 B 0 B 0

  17. Initialization Phase B 0 B 0 B 0 B 0 B 0 B 0

  18. Block-Supply Chain Initialization Verification Phase Phase

  19. Verification Phase B 0 B 0 B 0 B 0 B 0 B 0

  20. Verification Phase B 0 B 0 B 1 B 1 B 0 B 1 B 0 B 1 B 0 B 0 B 1 B 1

  21. Verification Phase B 0 B 0 B 1 B 1 Local Authentication B 0 B 1 B 0 B 1 B 0 B 0 B 1 B 1

  22. Verification Phase B 0 B 0 B 1 B 1 B 2 B 0 B 1 B 0 B 1 B 0 B 0 B 1 B 1

  23. Verification Phase B 0 B 0 B 1 B 1 B 2 B 2 B 2 B 0 B 1 B 2 B 2 B 2 B 0 B 1 B 0 B 0 B 1 B 1

  24. Verification Phase B 0 B 0 B 1 B 1 B 2 Global Authentication B 0 B 1 Global Authentication B 0 B 1 B 0 B 0 B 1 B 1 Global Authentication Global Authentication Global Authentication

  25. Verification Phase B 0 B 0 B 1 B 1 B 2 Global Authentication B 0 B 1 B 2 Valid? Global Authentication B 0 B 1 B 0 B 0 B 1 B 1 Global Authentication Global Authentication Global Authentication

  26. Verification Phase B 0 B 0 B 1 B 1 B 2 B 2 B 0 B 1 B 2 B 0 B 1 B 0 B 0 B 2 B 1 B 1 B 2 B 2

  27. Verification Phase + Local Authentication Global Authentication 1. Trace-and-track products 2. Detects: • Modification • Cloning • Tag reapplication

  28. Consensus Protocol

  29. Existing Protocols Proof of Work (PoW) • Solve a challenge: compute a cryptographic hashes • If succeed, submit the block to the network

  30. Existing Protocols Proof of Work (PoW) • Issues: 1. Huge computational effort 2. Energy and computing resources consumption 3. Relies on a few mining pools (raises doubts on the decentralization) 4. Frequently fork

  31. Existing Protocols Fixed-Validators Decentralization • Small fixed number of nodes chosen to be validators • Proof of Stake (PoS): e.g. the voting power • Committee size —> Computation and communication overhead

  32. Existing Protocols Fixed-Validators Decentralization • Examples: 1. Tendermint 2. Hyperledger Fabric • 1/3 byzantine nodes

  33. Existing Protocols Fixed-Validators Decentralization • Issues: 1. Strong trust assumption 2. Fixed committee of validators is vulnerable to adversarial attacks • DoS attack • Powerful adversary can corrupt or bribe most of them over time

  34. Existing Protocols Fixed-Validators Decentralization • Issues: 3. Fairness of selection 4. Small committee + massive number of transactions —> performance bottleneck

  35. Design Goals 1. Efficiency: • Small number of validators 2. Security: • Random rotating-validators’ selection 3. Validators’ selection fairness • Selection with equal probability

  36. Contribution New consensus protocol that: • Utilizes different set of validators on every block proposal • Maintains security by employing random validators’ selection • Achieves efficiency by employing small number of validators

  37. Proposed Protocol • Based on Tendermint • Select different set of validators on every block proposal • Balances between efficiency and security

  38. Proposed Protocol • Four types of nodes: 1. Proposer: proposes the new block 2. Validation-leader: selects the validators 3. Validator: validates the proposed block 4. Idle: waits for the consensus on the block

  39. Proposed Protocol Proposer to validation-leader mapping • At the genesis state • Each proposer is randomly mapped to a validation-leader • The validation-leader is activated upon receiving the block from its proposer

  40. Proposed Protocol Validators Selection • On proposing a new block • Each validation-leader randomly selects Log n validators • A validator is activated upon receiving a ‘ validate’ message from its validation-leader

  41. Evaluation Security 0.33% random malicious nodes

  42. Evaluation Efficiency

  43. Limitations • Limitation 1: the number of validators is static Future solution: dynamic variable number of validators based on a risk likelihood • Limitation 2: Malicious or lazy validation- leaders Future solution: a game theoretical model to reward and punish validation-leaders

  44. Future Work • Limitation 1: the number of validators is static Future solution: dynamic variable number of validators based on a risk likelihood • Limitation 2: Malicious or lazy validation- leaders Future solution: a game theoretical model to reward and punish validation-leaders

  45. Limitations • Limitation 1: the number of validators is static Future solution: dynamic variable number of validators based on a risk likelihood • Limitation 2: Malicious or lazy validation- leaders Future solution: a game theoretical model to reward and punish validation-leaders

  46. Future Work • Limitation 1: the number of validators is static Future solution: dynamic variable number of validators based on a risk likelihood • Limitation 2: Malicious or lazy validation- leaders Future solution: a game theoretical model to reward and punish validation-leaders

  47. Limitations • Limitation 3: always-validation mode Future solution: a game theoretical model to validate with probability according to the proposing node risk likelihood • Limitation 4: validation-leaders know their proposers in advance Future solution: blind proposers validation- leaders mapping.

  48. Future Work • Limitation 3: always-validation mode Future solution: a game theoretical model to validate with probability according to the proposing node risk likelihood • Limitation 4: validation-leaders know their proposers in advance Future solution: blind proposers validation- leaders mapping.

  49. Limitations • Limitation 3: always-validation mode Future solution: a game theoretical model to validate with probability according to the proposing node risk likelihood • Limitation 4: validation-leaders know their proposers in advance Future solution: blind proposers validation- leaders mapping.

  50. Future Work • Limitation 3: always-validation mode Future solution: a game theoretical model to validate with probability according to the proposing node risk likelihood • Limitation 4: validation-leaders know their proposers in advance Future solution: blind proposers validation- leaders mapping.

  51. Ti anks Ques tj ons

Recommend


More recommend