A new product anti‐counterfeiting blockchain using a truly decentralized dynamic consensus protocol

The growth of counterfeit goods has plagued the international community for decades. Nowadays, the battle against counterfeiting remains a significant challenge. Most of the current anti‐counterfeiting systems are centralized. Motivated by the evolution of blockchain technology, we propose (Block‐Supply), a decentralized anti‐counterfeiting supply chain that exploits NFC and blockchain technologies. This paper also proposes a new truly decentralized consensus protocol that, unlike most of the existing protocols, does not require PoW and randomly employs a different set of different size of validators each time a new block is proposed. Our protocol utilizes a game theoretical model to analyze the risk likelihood of the block's proposing nodes. This risk likelihood is used to determine the number of validators involved in the consensus process. Additionally, the game model enforces the honest consensus nodes' behavior by rewarding honest players and penalizing dishonest ones. Our protocol utilizes a novel, decentralized, dynamic mapping between the nodes that participate in the consensus process. This mapping ensures that the interaction between these nodes is executed anonymously and blindly. This way of mapping withstands many attacks that require knowing the identities of the participating nodes in advance, such as DDoS, Bribery, and Eclipse attacks.

[1]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[2]  Fabian Schuh,et al.  BITSHARES 2.0: GENERAL OVERVIEW , 2017 .

[3]  Ethan Heilman,et al.  Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.

[4]  Moritz Petersen,et al.  Blockchain in logistics and supply chain : trick or treat? , 2017 .

[5]  David Schwartz,et al.  The Ripple Protocol Consensus Algorithm , 2014 .

[6]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[7]  Sunny King,et al.  PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .

[8]  Silvio Micali,et al.  Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..

[9]  Marc Pilkington,et al.  Blockchain Technology: Principles and Applications , 2015 .

[10]  Lei Yang,et al.  Anti-counterfeiting via federated RFID tags' fingerprints and geometric relationships , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[11]  Christoph P. Mayer,et al.  Integrating real world applications into OMNeT , 2008 .

[12]  T. Mackey,et al.  A review of existing and emerging digital technologies to combat the global trade in fake medicines , 2017, Expert opinion on drug safety.

[13]  Feng Tian,et al.  An agri-food supply chain traceability system for China based on RFID & blockchain technology , 2016, 2016 13th International Conference on Service Systems and Service Management (ICSSSM).

[14]  Weiren Shi,et al.  Comparison of OMNET++ and other simulator for WSN simulation , 2008, 2008 3rd IEEE Conference on Industrial Electronics and Applications.

[15]  John K. Ousterhout,et al.  In Search of an Understandable Consensus Algorithm , 2014, USENIX ATC.

[16]  Stefano De Angelis,et al.  Assessing Security and Performances of Consensus algorithms for Permissioned Blockchains , 2018, ArXiv.

[17]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[18]  Joseph Bonneau,et al.  Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus , 2016, Financial Cryptography Workshops.

[19]  Joshua A. Kroll,et al.  Why buy when you can rent ? Bribery attacks on Bitcoin consensus , 2015 .

[20]  Leslie Lamport,et al.  Paxos Made Simple , 2001 .

[21]  S. H. Choi,et al.  Implementation issues in RFID-based anti-counterfeiting systems , 2011, Comput. Ind..

[22]  Marko Vukolic,et al.  Blockchain Consensus Protocols in the Wild , 2017, DISC.

[23]  Mikko Lehtonen,et al.  From Identification to Authentication – A Review of RFID Product Authentication Techniques , 2008 .

[24]  Colin D. Walter,et al.  An NFC based consumer-level counterfeit detection framework , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.

[25]  Rupali Bhardwaj,et al.  An Overview on Tools for Peer to Peer Network Simulation , 2010 .

[26]  Aviv Zohar,et al.  Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.

[27]  Tomi Dahlberg,et al.  Digital Supply Chain Transformation toward Blockchain Integration , 2017, HICSS.

[28]  I. Grigg EOS-An Introduction , 2017 .

[29]  A. Poelstra,et al.  On Stake and Consensus , 2015 .

[30]  Paul G. Spirakis,et al.  Weighted random sampling with a reservoir , 2006, Inf. Process. Lett..

[31]  Jae Kwon,et al.  Tendermint : Consensus without Mining , 2014 .

[32]  Nirupama Bulusu,et al.  Securing Pharmaceutical and High-Value Products against Tag Reapplication Attacks Using NFC Tags , 2016, 2016 IEEE International Conference on Smart Computing (SMARTCOMP).

[33]  Elgar Fleisch,et al.  Product specific security features based on RFID technology , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).

[34]  Ethan Buchman,et al.  Tendermint: Byzantine Fault Tolerance in the Age of Blockchains , 2016 .

[35]  András Varga,et al.  An overview of the OMNeT++ simulation environment , 2008, SimuTools.

[36]  R. Monfared,et al.  Blockchain ready manufacturing supply chain using distributed ledger , 2016 .

[37]  Colin D. Walter,et al.  Off-line NFC Tag Authentication , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[38]  Kristjan Košič,et al.  Building an open-source blockchain ecosystem with ark , 2018 .