Tamper-Proof Volume Tracking in Supply Chains with Smart Contracts

被引:3
|
作者
Gallersdoerfer, Ulrich [1 ]
Matthes, Florian [1 ]
机构
[1] Tech Univ Munich, Arcisstr 21, D-80333 Munich, Germany
关键词
Blockchain; Volume tracking; Ethereum; Smart contracts; Supply chain; Logistics;
D O I
10.1007/978-3-030-10549-5_29
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Complex supply chains involve many different stakeholders such as producers, traders, manufacturers, and consumers. These entities comprise companies and other stakeholders spanning different countries or continents. Depending on the involved goods, the origin and the responsible harvesting of these elements are essential. Due to their high complexity, these systems enable the introduction of resources with forged identity, tricking the participants of the supply chain into believing that they acquire goods with specific properties, e.g., environmentally friendly wood or resources which are not the result of child labor. We derive requirements from the global world trade of timber and timer-based products, in which the origin of a large portion of certified wood cannot be verified. A set of smart contracts deployed within the Ethereum platform allows for a transparent supply chain with validated sources. The platform enables the tracking of variations of the original good, tracing not only the raw material but also the resulting products. The proposed solution introduces a novel exchange contract and ensures a correct overall volume of assets managed in the supply chain.
引用
收藏
页码:367 / 378
页数:12
相关论文
共 50 条
  • [1] Tamper-proof scrips
    Mitka, Mike
    [J]. JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 2007, 298 (10): : 1153 - 1153
  • [2] TAMPER-PROOF CLOSURES
    DOAR, LH
    [J]. FOOD ENGINEERING, 1982, 54 (04): : 62 - 63
  • [3] Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
    Starnberger, Guenther
    Froihofer, Lorenz
    Goeschka, Karl M.
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 96 - 103
  • [4] Definitions of Tamper-proof Program
    Ma, Guojun
    Gang, Li
    [J]. APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1907 - 1910
  • [5] On Obfuscating Programs with Tamper-proof Hardware
    Ding, Ning
    Gu, Dawu
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 487 - 502
  • [6] A tamper-proof and lightweight authentication scheme
    Hammouri, Ghaith
    Ozturk, Erdinc
    Sunar, Berk
    [J]. PERVASIVE AND MOBILE COMPUTING, 2008, 4 (06) : 807 - 818
  • [7] Smart Contracts for Smart Supply Chains
    Prause, Gunnar
    [J]. IFAC PAPERSONLINE, 2019, 52 (13): : 2501 - 2506
  • [8] A Fragile Software Watermarking for Tamper-Proof
    Zhang, Changle
    Peng, Hong
    Long, Xianzhong
    Pan, Zheng
    Wu, Ying
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 309 - 312
  • [9] On the power of quantum tamper-proof devices
    Bouda, J.
    Mateus, P.
    Paunkovic, N.
    Rasga, J.
    [J]. INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2008, 6 (02) : 281 - 302
  • [10] Machine talk - Economical and tamper-proof
    Schmidt, Andreas H.
    [J]. Mechatronik, 2015, 123 (05): : 49 - 51