Securing Physical Assets on the Blockchain: Linking a novel Object Identification Concept with Distributed Ledgers

The use of blockchain technology to track physical assets is not new. However, the state of the art concepts are not applicable due to several limitations. One limitation is the scalability of blockchains with regard to the number of transactions that can be processed by the network. The well-established technology in tracking products is based on RFID chips that can be cloned. This paper provides insights into how objects can be protected and monitored by a varnish with a unique crack pattern, as an example of a Physical Unclonable Function. The perceptual hash of the unique pattern is used to encrypt the associated data to ensure privacy. Instead of logging each event on the blockchain individually, which is not possible due to the limited transaction throughput, OriginStamp is used to preserve data integrity on the blockchain. OriginStamp aggregates events, combines them through hashing and embeds this hash into a Bitcoin transaction. Once the Bitcoin network mines the transaction into a block and confirms it, the timestamp is considered as immutable proof of existence. With this approach, the integrity of tracking data cannot be contested. In the future, the craquelure-based tracking approach could be extended to supply chain integration to secure the origin of products, including prevention of counterfeiting, securing the place of manufacture for trademark law or state surveillance of the agricultural economy.

[1]  Tomi Dahlberg,et al.  Digital Supply Chain Transformation toward Blockchain Integration , 2017, HICSS.

[2]  Stephan Kornmesser,et al.  Theoretizität im Logischen Empirismus und im Strukturalismus – erläutert am Fallbeispiel des Neurobiologischen Konstruktivismus , 2008 .

[3]  Carlisle M. Adams,et al.  Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) , 2001, RFC.

[4]  Nenghai Yu,et al.  Distributed Hash Table , 2013, SpringerBriefs in Computer Science.

[5]  Donald E. Eastlake,et al.  US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) , 2011, RFC.

[6]  Moni Naor,et al.  Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.

[7]  SECURITY ELEMENT FOR MARKING OR IDENTIFYING OBJECTS AND LIVING BEINGS , 2017 .

[8]  Don Tapscott,et al.  Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World , 2016 .

[9]  Shawn Wilkinson,et al.  Storj A Peer-to-Peer Cloud Storage Network , 2014 .

[10]  Emin Gün Sirer,et al.  Service-Oriented Sharding with Aspen , 2016, ArXiv.

[11]  Roel Maes,et al.  Physically Unclonable Functions , 2012, Springer Berlin Heidelberg.

[12]  Alan C. Bovik,et al.  Making a “Completely Blind” Image Quality Analyzer , 2013, IEEE Signal Processing Letters.

[13]  Alex Pentland,et al.  Enigma: Decentralized Computation Platform with Guaranteed Privacy , 2015, ArXiv.

[14]  R. Monfared,et al.  Blockchain ready manufacturing supply chain using distributed ledger , 2016 .

[15]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[16]  Robert Harle,et al.  Location Fingerprinting With Bluetooth Low Energy Beacons , 2015, IEEE Journal on Selected Areas in Communications.

[17]  Cesare Pautasso,et al.  A Taxonomy of Blockchain-Based Systems for Architecture Design , 2017, 2017 IEEE International Conference on Software Architecture (ICSA).

[18]  Frédéric Thiesse,et al.  Extending the EPC network: the potential of RFID in anti-counterfeiting , 2005, SAC '05.

[19]  Narayan Prusty Building Blockchain Projects , 2017 .

[20]  Feng Tian,et al.  An agri-food supply chain traceability system for China based on RFID & blockchain technology , 2016, 2016 13th International Conference on Service Systems and Service Management (ICSSSM).

[21]  Lin Chen,et al.  CoC: Secure Supply Chain Management System Based on Public Ledger , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[22]  Juan Benet,et al.  IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.

[23]  Mitsuaki Nakasumi,et al.  Information Sharing for Supply Chain Management Based on Block Chain Technology , 2017, 2017 IEEE 19th Conference on Business Informatics (CBI).

[24]  R. Whewell Supply Chain in the Pharmaceutical Industry: Strategic Influences and Supply Chain Responses , 2009 .

[25]  Elaine Shi,et al.  On Scaling Decentralized Blockchains - (A Position Paper) , 2016, Financial Cryptography Workshops.

[26]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[27]  Nenghai Yu,et al.  Distributed Hash Table: Theory, Platforms and Applications , 2013 .

[28]  Norman Meuschke,et al.  Decentralized Trusted Timestamping using the Crypto Currency Bitcoin , 2015, ArXiv.

[29]  Roel Maes,et al.  Physically Unclonable Functions , 2013, Springer Berlin Heidelberg.

[30]  Arenberg Doctoral,et al.  Physically Unclonable Functions: Constructions, Properties and Applications , 2012 .

[31]  Iwao Sasase,et al.  A Novel Blockchain-Based Product Ownership Management System (POMS) for Anti-Counterfeits in the Post Supply Chain , 2017, IEEE Access.

[32]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .