A Study on Supply Chain Management System Using Blockchain and IoT Technology

Authors

  • Hai-Shui Yan Doctor of Business Administration, CEO, Shanghai Aurora Information Technology Group Co., Ltd., China
  • Hyung-Ho Kim Professor, Dept. of Air Transport and Logistics, Sehan University, Korea
  • Jun-Won Yang Professor, Dept. of Air Transport and Logistics, Sehan University, Korea

Keywords:

Blockchain, Internet of Things, Security, Privacy-assisted information exchange framework

Abstract

The Internet-of-Things (IoT) expanded rapidly, resulting in many services, software products, and electrical devices integrated with sensors. It is associated with protocols that are currently under development. Blockchain technology serves as the foundation for most IoT-based applications, and it must be adaptable and widely disseminated to guarantee their survival. Blockchain-based IoT has several limitations due to its resource-constrained nature, including security, scalability, traceability, efficiency, and network throughput. The suggested method in this paper is a Privacy-assisted Information Exchange Framework (P-IEF), an integrated security mechanism that detects suspicious activities in sensor nodes and locates them on a blacklist. This approach is a centered digital ledger procedure that ensures the privacy of all nodes and ensures that the data can be validated without modifying any node, and there is no need for a third party to secure data. The simulation analysis shows trust measures and open challenges, and research difficulties examined in IoT environments. The privacy-assisted information exchange framework has achieved a security ratio of 98.25 %, a scalability ratio of 97.15 %, traceability rate of 98.54%, efficiency rate of 99.01 %, and network throughput ratio of 97.19 % outperforms compared with other approaches.

Downloads

Download data is not yet available.

References

H. Liu, Y. Zhang and T. Yang, “Blockchain-enabled security in electric vehicles cloud and edge computing,” IEEE Network, Vol.4, No. 32(3) pp. 78-83, Jun 2018. DOI: 10.1109/MNET.2018.1700344

M. Abdel-Basset, R. Mohamed, K. Sallam and M. Elhoseny, “A novel decision-making model for sustainable supply chain finance under uncertainty environment,” Journal of Cleaner Production, Vol. 1;269:122324, Oct 2020. DOI:https://doi.org/10.1016/j.jclepro.2020.122324

S. Yousuf and D. Svetinovic, “Blockchain technology in supply chain management: Preliminary study,” In2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS) IEEE, Vol.22 (pp. 537-538) Oct 2019. DOI: 10.1109/IOTSMS48152.2019.8939222

Y. Luo, Q. Wei, Q. Ling and B.Huo, “Optimal decision in a green supply chain: Bank financing or supplier financing,” Journal of Cleaner Production, Vol.20;271:122090, Oct 2020. DOI:https://doi.org/10.1016/j.jclepro.2020.122090

Yang, J.-P. . “A Novel Storage Virtualization Scheme for Network Storage Systems”. International Journal on Recent and Innovation Trends in Computing and Communication, vol. 10, no. 1, Jan. 2022, pp. 08-13, doi:10.17762/ijritcc.v10i1.5514.

SK. Sahu, DP. Mohapatra, JK. Rout, KS. Sahoo and AK.Luhach, “An Ensemble-Based Scalable Approach for Intrusion Detection Using Big Data Framework,” Big Data, Vol. 1;9(4):303-21, Aug 2021. DOI:https://doi.org/10.1089/big.2020.0201

DJ. Samuel and F.Cuzzolin, “Unsupervised anomaly detection for a Smart Autonomous Robotic Assistant Surgeon (SARAS) using a deep residual autoencoder,” arXiv preprint arXiv:2104.11008-22. Apr 2021. DOI: 10.1109/LRA.2021.3097244

Chaudhary, D. S. . (2022). Analysis of Concept of Big Data Process, Strategies, Adoption and Implementation. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(1), 05–08. https://doi.org/10.17762/ijfrcsce.v8i1.2065

J. Su, X. Chu and S.Kadry, “Internet-of-Things-Assisted Smart System 4.0 Framework Using Simulated Routing Procedures,” Sustainability, Vol. 12(15):6119, Jan 2020. DOI:https://doi.org/10.3390/su12156119

Saraireh, J., & Joudeh, H. (2022). An Efficient Authentication Scheme for Internet of Things. International Journal of Communication Networks and Information Security (IJCNIS), 13(3). https://doi.org/10.17762/ijcnis.v13i3.3422

K. Seyhan, TN. Nguyen, S. Akleylek and K.Cengiz, “Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey,” Cluster Computing, Vol. 13:1-20, Aug 2021. DOI:https://doi.org/10.1007/s10586-021-03380-7

G. Amudha, “Dilated Transaction Access and Retrieval: Improving the Information Retrieval of Blockchain-Assimilated Internet of Things Transactions,” Wireless Personal Communications, Vol. 6:1-21, Feb 2021. DOI:https://doi.org/10.1007/s11277-021-08094-y

Linda R. Musser. (2020). Older Engineering Books are Open Educational Resources. Journal of Online Engineering Education, 11(2), 08–10. Retrieved from http://onlineengineeringeducation.com/index.php/joee/article/view/41

J. Gao, H. Wang and H. Shen, “Task failure prediction in cloud data centers using deep learning,” IEEE Transactions on Services Computing, Vol. 11, May 2020. DOI: 10.1109/TSC.2020.2993728

F. Wang, N. Yang, PM. Shakeel and V. Saravanan, “Machine learning for mobile network payment security evaluation system,” Transactions on Emerging Telecommunications Technologies, Vol. 28:e4226, Jan 2021. DOI:https://doi.org/10.1002/ett.4226

BS. Rawal, G. Manogaran and M. Hamdi, “Multi-Tier Stack of Block Chain with Proxy Re-Encryption Method Scheme on the Internet of Things Platform,” ACM Transactions on Internet Technology (TOIT), Vol. 22(2):1-20, Oct 2021. DOI:https://doi.org/10.1145/3421508

G. Amudha and P. Narayanasamy, “Distributed location and trust based replica detection in wireless sensor networks,” Wireless Personal Communications, Vol. 102(4):3303-21, Oct 2018. DOI:https://doi.org/10.1007/s11277-018-5369-2

K. Seyhan, TN. Nguyen, S. Akleylek, K. Cengiz and SH.Islam, “Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security,” Journal of Information Security and Applications, Vol. 1;58:102788, May 2021. DOI:https://doi.org/10.1016/j.jisa.2021.102788

XY. Liu, H. Yang, J. Gao and C. Wang, “FinRL: Deep reinforcement learning framework to automate trading in quantitative finance,” Available at SSRN 3955949, Vol. 4, Nov 2021. DOI:https://doi.org/10.48550/arXiv.2111.09395

G. Manogaran, J. Ngangmeni, J. Stewart, DB. Rawat and TN. Nguyen, “Deep Learning-based Concurrent Resource Allocation for Enhancing Service Response in Secure 6G Network-in-Box Users using IIoT,” IEEE Internet of Things Journal. Vol. 12, Oct 2021. DOI: 10.1109/JIOT.2021.3119336

R. Rajakumar, K. Sekaran, CH. Hsu and S.Kadry, “Accelerated grey wolf optimization for global optimization problems,” Technological Forecasting and Social Change, Vol. 1;169:120824, Aug 2021. DOI:https://doi.org/10.1016/j.techfore.2021.120824

AA. Abd EL-Latif, B. Abd-El-Atty, SE. Venegas-Andraca and W.Mazurczyk, “Efficient quantum-based security protocols for information sharing and data protection in 5G networks,” Future Generation Computer Systems, Vol. 1;100:893-906, Nov 2019. DOI:https://doi.org/10.1016/j.future.2019.05.053

S. Dey, S. Pal and V.Saravanan, “Computational Offloading with Deep Supervised Learning for Edge enabled IoT,” InTechnological Advances in Science, Medicine and Engineering Conference 2021, Vol. 18, Jun 2021. DOI: 10.1109/JIOT.2020.2981557

M. Hader, A. El-Mhamedi, A. Abouabdellah, “Blockchain Integrated ERP for a Better Supply Chain Management,” In2021 The 8th International Conference on Industrial Engineering and Applications (Europe), Vol. 8 (pp. 193-197), Jan 2021. DOI:10.1109/ICIEA49774.2020.9102084

C. Jiang and C. Ru, “Application of Blockchain Technology in Supply Chain Finance. In2020 5th International Conference on Mechanical,” Control and Computer Engineering (ICMCCE) , Vol. 25 (pp. 1342-1345), Dec 2020. IEEE. DOI: 10.1109/ICMCCE51767.2020.00294

SR. Niya, D. Dordevic, AG. Nabi and T. Mann, “Stiller B. A platform-independent, generic-purpose and blockchain-based supply chain tracking,” In2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) , Vol. 14 (pp. 11-12), May 2019. IEEE. DOI: 10.1109/BLOC.2019.8751415

Y. Yue and X.Fu, “Research on Medical Equipment Supply Chain Management Method Based on Blockchain Technology,” In2020 International Conference on Service Science (ICSS), Vol. 24 (pp. 143-148), Aug 2020. IEEE. DOI: 10.1109/ICSS50103.2020.00030

M. Hölbl, M. Kompara, A. Kamišalić and L.Nemec Zlatolas, “A systematic review of the use of blockchain in healthcare,” Symmetry. Vol. 10(10):470, Oct 2018. DOI:https://doi.org/10.3390/sym10100470

NN. Ahamed, TK. Thivakaran and P.Karthikeyan, “Perishable Food Products Contains Safe in Cold Supply Chain Management Using Blockchain Technology,” In2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), (Vol. 1, pp. 167-172), Mar 2021. IEEE. DOI: 10.1109/ICACCS51430.2021.9442057

IoT and Blockchain-facilitated supply chain

Downloads

Published

15.10.2022

How to Cite

[1]
H.-S. . Yan, H.-H. . Kim, and J.-W. . Yang, “A Study on Supply Chain Management System Using Blockchain and IoT Technology”, Int J Intell Syst Appl Eng, vol. 10, no. 1s, pp. 178 –, Oct. 2022.