Internet of Things Based Blockchain for Temperature Monitoring and Counterfeit Pharmaceutical Prevention

The top priority of today’s healthcare system is delivering medicine directly from the manufacturer to end-user. The pharmaceutical supply chain involves some level of commingling of a collection of stakeholders such as distributors, manufacturers, wholesalers, and customers. The biggest challenge associated with this supply chain is temperature monitoring as well as counterfeit drug prevention. Many drugs and vaccines remain viable within a specific range of temperatures. If exposed beyond this temperature range, the medicine no longer works as intended. In this paper, an Internet of Things (IoT) sensor-based blockchain framework is proposed that tracks and traces drugs as they pass slowly through the entire supply chain. On the one hand, these new technologies of blockchain and IoT sensors play an essential role in supply chain management. On the other hand, they also pose new challenges of security for resource-constrained IoT devices and blockchain scalability issues to handle this IoT sensor-based information. In this paper, our primary focus is on improving classic blockchain systems to make it suitable for IoT based supply chain management, and as a secondary focus, applying these new promising technologies to enable a viable smart healthcare ecosystem through a drug supply chain.

[1]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[2]  Gautam Srivastava,et al.  A game theoretic analysis of resource mining in blockchain , 2020, Cluster Computing.

[3]  Devesh Kapoor,et al.  An Overview on Pharmaceutical Supply Chain: A Next Step towards Good Manufacturing Practice , 2018 .

[4]  Gautam Srivastava,et al.  A Decentralized Privacy-Preserving Healthcare Blockchain for IoT , 2019, Sensors.

[5]  I. Olkin,et al.  A Multivariate Exponential Distribution , 1967 .

[6]  Ashutosh Dhar Dwivedi,et al.  Differential and Rotational Cryptanalysis of Round-reduced MORUS , 2017, SECRYPT.

[7]  Ashutosh Dhar Dwivedi,et al.  Differential-linear and related key cryptanalysis of round-reduced scream , 2018, Inf. Process. Lett..

[8]  Riccardo Gusella,et al.  The Accuracy of the Clock Synchronization Achieved by TEMPO in Berkeley UNIX 4.3BSD , 1987, IEEE Trans. Software Eng..

[9]  Giacomo Colle,et al.  A Blockchain Implementation Prototype for the Electronic Open Source Traceability of Wood along the Whole Supply Chain , 2018, Sensors.

[10]  Gautam Srivastava,et al.  PHANTOM Protocol as the New Crypto-Democracy , 2018, CISIM.

[11]  Antonio Puliafito,et al.  Blockchain and IoT Integration: A Systematic Survey , 2018, Sensors.

[12]  Gautam Srivastava,et al.  Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices , 2019, IEEE Access.

[13]  Ashutosh Dhar Dwivedi,et al.  Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream , 2017, SECRYPT.

[14]  Do-Hyeun Kim,et al.  A Novel Medical Blockchain Model for Drug Supply Chain Integrity Management in a Smart Hospital , 2019, Electronics.

[15]  Ashutosh Dhar Dwivedi,et al.  A Scalable Blockchain Based Digital Rights Management System , 2019, IACR Cryptol. ePrint Arch..

[16]  R. Agha,et al.  World Health Organization declares global emergency: A review of the 2019 novel coronavirus (COVID-19) , 2020, International Journal of Surgery.

[17]  Kun-Lin Tsai,et al.  AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments , 2018, IEEE Access.

[18]  Gautam Srivastava,et al.  Optimized Blockchain Model for Internet of Things based Healthcare Applications , 2019, 2019 42nd International Conference on Telecommunications and Signal Processing (TSP).

[19]  Ashutosh Dhar Dwivedi,et al.  Finding Differential Paths in ARX Ciphers through Nested Monte-Carlo Search , 2018 .

[20]  Gautam Srivastava,et al.  Blockchain Education , 2019, 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE).

[21]  Gautam Srivastava,et al.  Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM , 2019, Cryptogr..

[22]  Gautam Srivastava,et al.  Differential Cryptanalysis of Round-Reduced LEA , 2018, IEEE Access.

[23]  Josef Pieprzyk,et al.  SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition , 2016, IACR Cryptol. ePrint Arch..