簡易檢索 / 詳目顯示

研究生: Kevin Valentino
Kevin Valentino
論文名稱: Secure Blockchain-Based Supply Chain Management System with QR Code
Secure Blockchain-Based Supply Chain Management System with QR Code
指導教授: 羅乃維
Nai-Wei Lo
Alexander Yohan
Alexander Yohan
口試委員: 賴源正
Yuan-Cheng Lai
楊傳凱
Chuan-Kai Yang
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2021
畢業學年度: 109
語文別: 英文
論文頁數: 75
中文關鍵詞: 2 channelstokenverificationtraceabilityconfidentialityQR codesupply chainblockchain
外文關鍵詞: 2 channels, token, verification, traceability, confidentiality, QR code, supply chain, blockchain
相關次數: 點閱:294下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • Supply chain management is one of the important fields in industry that needs to be properly managed for the continuity in the manufacturing and product procurement. The traditional supply chain management system is built upon a centralized system architecture which is prone to single-point-of-failure problem. In order to solve this issue, blockchain technology with its decentralized architecture can be adopted to solve this problem. Moreover, the usage of centralized intermediaries in traditional supply chain system has low system transparency, thus, several problems are emerged such as in the traceability, authentication of related entities in the supply chain, and the product verification. The goal of this thesis is to design a secure supply chain management system by using blockchain technology and QR code. The proposed model proposed a new method to secure data verification by combining the blockchain technology and QR code to create a token to verify the shipment from 2 channels, digital channel and physical channel. The 2 channels token verification method secures the data stored in the blockchain network by combining the digital data stored in the blockchain and the physical data in the QR code. Aside from securing the data, the QR code technology is cheap and easy to be implemented in any kind of products. A prototype is implemented based on the proposed blockchain-based supply chain model. Furthermore, the security strength of the proposed model and the performance of the prototype are evaluated in this thesis. Based on the system design assessment, the proposed blockchain-based supply chain system provides the following characteristics: protection against counterfeit product, protection toward sensitive product information, effortless product tracing, protection against the cloning of unique product ID and low implementation cost. The security strength of the proposed protocols are evaluated. Based on the evaluation result, the proposed protocols provide session key security, and protect against man-in-the-middle attack, false product verification and impersonation attack.


    Supply chain management is one of the important fields in industry that needs to be properly managed for the continuity in the manufacturing and product procurement. The traditional supply chain management system is built upon a centralized system architecture which is prone to single-point-of-failure problem. In order to solve this issue, blockchain technology with its decentralized architecture can be adopted to solve this problem. Moreover, the usage of centralized intermediaries in traditional supply chain system has low system transparency, thus, several problems are emerged such as in the traceability, authentication of related entities in the supply chain, and the product verification. The goal of this thesis is to design a secure supply chain management system by using blockchain technology and QR code. The proposed model proposed a new method to secure data verification by combining the blockchain technology and QR code to create a token to verify the shipment from 2 channels, digital channel and physical channel. The 2 channels token verification method secures the data stored in the blockchain network by combining the digital data stored in the blockchain and the physical data in the QR code. Aside from securing the data, the QR code technology is cheap and easy to be implemented in any kind of products. A prototype is implemented based on the proposed blockchain-based supply chain model. Furthermore, the security strength of the proposed model and the performance of the prototype are evaluated in this thesis. Based on the system design assessment, the proposed blockchain-based supply chain system provides the following characteristics: protection against counterfeit product, protection toward sensitive product information, effortless product tracing, protection against the cloning of unique product ID and low implementation cost. The security strength of the proposed protocols are evaluated. Based on the evaluation result, the proposed protocols provide session key security, and protect against man-in-the-middle attack, false product verification and impersonation attack.

    Recommendation Letter Approval Letter Abstract Acknowledgment Table of Contents List of Figures List of Tables 1 Introduction 2 Preliminaries 2.1 QR Code 2.2 Blockchain 2.3 Elliptic Curve Cryptosystem 2.3.1 Elliptic Curve Diffie-Hellman Key Agreement (ECDH) 2.3.2 Elliptic Curve Integrated Encryption Scheme (ECIES) 3 Literature Review 3.1 Traditional Supply Chain Management 3.2 Electronic Supply Chain using Blockchain 3.3 Food Supply Chain using Blockchain 4 System Design 4.1 Assumptions 4.2 Supply Chain Network Architecture 4.3 Proposed QRBC Framework’s Architecture 4.4 Shipment ID Generation and Usage 4.5 Securing Data from Physical and Blockchain data 4.6 Protocol Design 5 Prototype Implementation 6 System Analysis 6.1 Performance Analysis 6.2 Security Analysis 7 Conclusion References

    [1]S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,”Working Paper,2008. [Online]. Available:https://bitcoin.org/bitcoin.pdf(visited on10/19/2020).
    [2]P. Helo and Y. Hao, “Blockchains in operations and supply chains: A model andreference implementation,”Computers & Industrial Engineering, vol. 136, pp. 242–251, 2019, ISSN: 0360-8352. DOI:https://doi.org/10.1016/j.cie.2019.07.023. [Online]. Available:http://www.sciencedirect.com/science/article/pii/S0360835219304152.
    [3]K. Zekhnini, C. Anass, I. Bouhaddou, Y. Benghabrit, and J. A. Garza-Reyes, “Sup-ply chain management 4.0: A literature review and research framework,”Bench-markingAnInternationalJournal, Sep. 2020. DOI:10.1108/BIJ-04-2020-0156.
    [4]S. Tiwari, “An introduction to QR code technology,” in2016 International Con-ference on Information Technology (ICIT), Dec. 2016, pp. 39–44. DOI:10.1109/ICIT.2016.021.
    [5]F. Tian, “An agri-food supply chain traceability system for china based on RFID& blockchain technology,”2016 13th International Conference on Service Systemsand Service Management (ICSSSM), 2016.
    [6]K. Salah, N. Nizamuddin, R. Jayaraman, and M. Omar, “Blockchain-based soybeantraceability in agricultural supply chain,”IEEE Access, vol. 7, pp. 73295–73305,2019, ISSN: 2169-3536. DOI:10.1109/ACCESS.2019.2918000.
    [7]W. Sun, X. Zhu, T. Zhou, Y. Su, and B. Mo, “Application of blockchain and RFID inanti-counterfeiting traceability of liquor,”2019 IEEE 5th International Conferenceon Computer and Communications, 2019.
    [8]S. Mondal, K. P. Wijewardena, and S. Karuppuswami, “Blockchain inspired RFID-based information architecture for food supply chain,”IEEE INTERNET OFTHINGS JOURNAL, vol. 6, no. 3, Jun. 2019.61
    [9]R. Azzi, R. K. Chamoun, and M. Sokhn, “The power of a blockchain-based supplychain,”Computers & Industrial Engineering, vol. 135, pp. 582 –592, 2019, ISSN:0360-8352. DOI:https://doi.org/10.1016/j.cie.2019.06.042. [On-line]. Available:http://www.sciencedirect.com/science/article/pii/S0360835219303729.
    [10]M. N. Islam, V. C. Patii, and S. Kundu, “On IC traceability via blockchain,” in2018 International Symposium on VLSI Design, Automation and Test (VLSI-DAT),ISSN: 2472-9124, Apr. 2018, pp. 1–4. DOI:10.1109/VLSI-DAT.2018.8373269.
    [11]X. Xu, F. Rahman, B. Shakya, A. Vassilev, D. Forte, and M. Tehranipoor, “Elec-tronics supply chain integrity enabled by blockchain,”ACM Trans. Des. Autom.Electron. Syst., vol. 24, no. 3, May 2019, Place: New York, NY, USA Publisher:Association for Computing Machinery, ISSN: 1084-4309. DOI:10.1145/3315571.
    [Online]. Available:https://doi.org/10.1145/3315571.
    [12]R. Maes,Physically Unclonable Functions: Constructions, Properties and Appli-cations. Nov. 2013, vol. 9783642413957, ISBN: 978-3-642-41394-0. DOI:10.1007/978-3-642-41395-7.
    [13]P. Wozny, “Elliptic Curve Cryptography: Generating and Validation of Domain Pa-rameters in Binary Galois Fields,” Master Thesis, Rochester Institute of Technol-ogy, 2008, p. 68.
    [14]J. Chang, “An introduction to using qr codes in scholarly journals,”ScienceEditing,vol. 1, pp. 113–117, Aug. 2014. DOI:10.6087/kcse.2014.1.113.
    [15]C. K. P. Clarke,Reed-Solomon Error Correction. 2002. [Online]. Available:https://www.bbc.co.uk/rd/publications/whitepaper031(visited on01/02/2020).
    [16]A. A. Monrat, O. Schelén, and K. Andersson, “A survey of blockchain from theperspectives of applications, challenges, and opportunities,”IEEE Access, vol. 7,pp. 117134–117151, 2019, ISSN: 2169-3536. DOI:10 . 1109 / ACCESS . 2019 .2936094.62
    [17]V. Buterin, “Ethereum white paper: A next generation smart contract & decentral-ized application platform,”White Paper, 2018. [Online]. Available:https : / /whitepaper.io/document/5/ethereum-whitepaper(visited on 10/19/2020).
    [18]B. Mohanta, D. Jena, S. Panda, and S. Sobhanayak, “Blockchain technology: Asurvey on applications and security privacy challenges,” vol. 8, p. 100107, Sep.2019. DOI:10.1016/j.iot.2019.100107.
    [19]N. Koblitz, A. Menezes, and S. Vanstone, “The State of Elliptic Curve Cryptog-raphy,”Designs, Codes and Cryptography, vol. 19, no. 2/3, pp. 173–193, 2000,ISSN: 09251022. DOI:10.1023/A:1008354106356. [Online]. Available:http://link.springer.com/10.1023/A:1008354106356.
    [20]V. S. Miller, “Use of Elliptic Curves in Cryptography,” inAdvances in Cryptology—CRYPTO’85Proceedings, Berlin, Heidelberg: Springer Berlin Heidelberg, 1985,pp. 417–426. DOI:10.1007/3-540-39799-X_31. [Online]. Available:http://link.springer.com/10.1007/3-540-39799-X_31.
    [21]D. R. L. Brown, “SEC1: Elliptic Curve Cryptography,” Certicom Research, Tech.Rep., 2009, p. 144. [Online]. Available:http://www.secg.org/sec1-v2.pdf.
    [22]D. Hankerson, A. Menezes, and S. Vanstone,Guide to Elliptic Curve Cryptog-raphy, ser. Springer Professional Computing. New York: Springer-Verlag, 2004,ISBN: 0-387-95273-X. DOI:10.1007/b97644. [Online]. Available:http://link.springer.com/10.1007/b97644.
    [23]P. N. Panday and S. Panday, “The global supply chain management - process im-provements as a management science.,” Aug. 2012.
    [24]J. Van der Vorst, “Supply chain management: Theory and practices,”Bridging The-ory and Practice, Jan. 2004.
    [25]GS1,EPCIS and CBV Implementation Guideline. Feb. 2017. [Online]. Available:https : / / www . gs1 . org / docs / epc / EPCIS _ Guideline . pdf(visited on04/22/2020).
    [26]——,EPCIS and CBV Implementation Guideline. Jul. 2016. [Online]. Available:https : / / www . gs1 . org / sites / default / files / docs / epc / EPCIS -Standard-1.2-r-2016-09-29.pdf(visited on 04/22/2020).63
    [27]K. Främling, S. Parmar, V. Hinkka, J. Tätilä, and D. Rodgers, “Assessment of epcisstandard for interoperable tracking in the supply chain,” in Mar. 2013, vol. 472,pp. 119–134, ISBN: 978-3-642-35852-4. DOI:10.1007/978-3-642-35852-4_8.
    [28]R. Tröger and R. Alt, “Design options for supply chain visibility services: Learningsfrom three epcis implementations,”Electronic Markets, vol. 27, Sep. 2016. DOI:10.1007/s12525-016-0231-4.
    [29]Q. Lin, H. Wang, X. Pei, and J. Wang, “Food safety traceability system based onblockchain and EPCIS,”IEEE Access, vol. 7, pp. 20698–20707, 2019, ISSN: 2169-3536. DOI:10.1109/ACCESS.2019.2897792.
    [30]H. Zhang, X. Sun, and Y. Liu, “Food safety and technological implications of foodtraceability systems,” inComputer and Computing Technologies in Agriculture IV,D. Li, Y. Liu, and Y. Chen, Eds., Berlin, Heidelberg: Springer Berlin Heidelberg,2011, pp. 1–10, ISBN: 978-3-642-18336-2.64

    QR CODE