Traceability and Risk Analysis Strategies for Addressing Counterfeit Electronics in Supply Chains for Complex Systems

Within the microelectronics industry, there is a growing concern regarding the introduction of counterfeit electronic parts into the supply chain. Even though this problem is widespread, there have been limited attempts to implement risk-based approaches for testing and supply chain management. Supply chain risk management tends to focus on the highly visible disruptions of the supply chain instead of the covert entrance of counterfeits; thus counterfeit risk is difficult to mitigate. This article provides an overview of the complexities of the electronics supply chain, and highlights some gaps in risk assessment practices. In particular, this article calls for enhanced traceability capabilities to track and trace parts at risk through various stages of the supply chain. Placing the focus on risk-informed decision making through the following strategies is needed, including prioritization of high-risk parts, moving beyond certificates of conformance, incentivizing best supply chain management practices, adoption of industry standards, and design and management for supply chain resilience.

[1]  Zachary A. Collier,et al.  A Decision Analytical Approach for Department of Defense Acquisition Risk Management. , 2012 .

[2]  Germaine H. Saad,et al.  Managing Disruption Risks in Supply Chains , 2005 .

[3]  M. Christopher,et al.  Building the Resilient Supply Chain , 2004 .

[4]  Keely L. Croxton,et al.  From risk to resilience: Learning to deal with disruption , 2015 .

[5]  G ci Continuous Improvement Fraudulent/Counterfeit Electronic Parts; Avoidance, Detection, Mitigation, and Disposition , 2013 .

[6]  Virginia Chanley,et al.  DOD Supply Chain: Suspect Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms , 2012 .

[7]  B. Beamon Supply chain design and analysis:: Models and methods , 1998 .

[8]  Zachary A. Collier,et al.  Systems engineering framework for cyber physical security and resilience , 2015, Environment Systems and Decisions.

[9]  Walter E. Beyeler,et al.  The value of utilising stochastic mapping of food distribution networks for understanding risks and tracing contaminant pathways , 2012, Int. J. Crit. Infrastructures.

[10]  James A. Hayward,et al.  DNA Marking and Authentication: A unique, secure anti-counterfeiting program for the electronics industry , 2011 .

[11]  Mark Mohammad Tehranipoor,et al.  Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain , 2014, Proceedings of the IEEE.

[12]  Zachary A. Collier,et al.  Cybersecurity Standards: Managing Risk and Creating Resilience , 2014, Computer.

[13]  Andreas Norrman,et al.  Categorization of supply chain risk and risk management , 2004 .

[14]  Zachary A. Collier,et al.  A Semi-Quantitative Risk Assessment Standard for Counterfeit Electronics Detection , 2014 .

[15]  Chris I. Enyinda,et al.  Sense and Respond Supply Chain: A Prescription for Mitigating Vulnerability in the U.S. Pharmaceutical Value Chain , 2008 .

[16]  Zachary A. Collier,et al.  Decision framework for evaluating the macroeconomic risks and policy impacts of cyber attacks , 2013, Environment Systems and Decisions.

[17]  Zachary A. Collier,et al.  Risk-based standards: integrating top–down and bottom–up approaches , 2014, Environment Systems and Decisions.

[18]  Robert E. Spekman,et al.  An empirical investigation into supply chain management: a perspective on partnerships , 1998 .

[19]  Yaw S. Obeng,et al.  Development of a Methodology to Determine Risk of Counterfeit Use | NIST , 2013 .

[20]  M. Pecht,et al.  Bogus: electronic manufacturing and consumers confront a rising tide of counterfeit electronics , 2006, IEEE Spectrum.

[21]  C. Franck,et al.  Framework for Supply Chain Risk Management , 2007 .

[22]  Mark Mohammad Tehranipoor,et al.  Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead , 2014, J. Electron. Test..

[23]  H. Livingston Avoiding Counterfeit Electronic Components , 2007, IEEE Transactions on Components and Packaging Technologies.

[24]  Elgar Fleisch,et al.  Probabilistic Approach for Location-Based Authentication , 2007 .

[25]  Christopher S. Tang Perspectives in supply chain risk management , 2006 .

[26]  Essam Shehab,et al.  Obsolescence management for long-life contracts: state of the art and future trends , 2010 .

[27]  Bhanu Sood,et al.  Screening for counterfeit electronic parts , 2011 .

[28]  Roger Anderson,et al.  Homeland Security , 2004, Gov. Inf. Q..

[29]  OBSERVATIONS ON EFFORTS TO QUANTIFY THE ECONOMIC EFFECTS OF COUNTERFEIT AND PIRATED GOODS , 2010 .

[30]  D. Kiron,et al.  The talent dividend , 2015 .

[31]  Iwan Vanany,et al.  Supply Chain Risk Management: Literature Review and Future Research , 2007, Int. J. Inf. Syst. Supply Chain Manag..

[32]  Cliff Wang,et al.  Introduction to Hardware Security and Trust , 2011 .

[33]  Srinivas Devadas,et al.  Security Based on Physical Unclonability and Disorder , 2012 .