scholarly journals Formal Verification of Functional Requirements for Smart Contract Compositions in Supply Chain Management Systems

Author(s):  
Sarra Alqahtani ◽  
Xinchi He ◽  
Rose Gamble ◽  
Papa Mauricio
2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Manoshi Das Turjo ◽  
Mohammad Monirujjaman Khan ◽  
Manjit Kaur ◽  
Atef Zaguia

The manufacture of raw materials to deliver the product to the consumer in a traditional supply chain system is a manual process with insufficient data and transaction security. It also takes a significant amount of time, making the entire procedure lengthy. Overall, the undivided process is ineffective and untrustworthy for consumers. If blockchain and smart contract technologies are integrated into traditional supply chain management systems, data security, authenticity, time management, and transaction processes will all be significantly improved. Blockchain is a revolutionary, decentralized technology that protects data from unauthorized access. The entire supply chain management (SCM) will be satisfied with the consumer once smart contracts are implemented. The plan becomes more trustworthy when the mediator is contracted, which is doable in these ways. The tags employed in the conventional SCM process are costly and have limited possibilities. As a result, it is difficult to maintain product secrecy and accountability in the SCM scheme. It is also a common target for wireless attacks (reply attacks, eavesdropping, etc.). In SCM, the phrase “product confidentiality” is very significant. It means that only those who have been validated have access to the information. This paper emphasizes reducing the involvement of third parties in the supply chain system and improving data security. Traditional supply chain management systems have a number of significant flaws. Lack of traceability, difficulty maintaining product safety and quality, failure to monitor and control inventory in warehouses and shops, rising supply chain expenses, and so on, are some of them. The focus of this paper is on minimizing third-party participation in the supply chain system and enhancing data security. This improves accessibility, efficiency, and timeliness throughout the whole process. The primary advantage is that individuals will feel safer throughout the payment process. However, in this study, a peer-to-peer encrypted system was utilized in conjunction with a smart contract. Additionally, there are a few other features. Because this document makes use of an immutable ledger, the hacker will be unable to get access to it. Even if they get access to the system, they will be unable to modify any data. If the goods are defective, the transaction will be halted, and the customer will be reimbursed, with the seller receiving the merchandise. By using cryptographic methods, transaction security will be a feasible alternative for recasting these issues. Finally, this paper will demonstrate how to maintain the method with the maximum level of safety, transparency, and efficiency.


2021 ◽  
Vol 11 (12) ◽  
pp. 5585
Author(s):  
Sana Al-Farsi ◽  
Muhammad Mazhar Rathore ◽  
Spiros Bakiras

Blockchain is a revolutionary technology that is being used in many applications, including supply chain management. Although, the primary motive of using a blockchain for supply chain management is to reduce the overall production cost while providing the comprehensive security to the system. However, current blockchain-based supply-chain management (BC-SCM) systems still hold the possibility of cyber attacks. Therefore, the goal of this study is to investigate practical threats and vulnerabilities in the design of BC-SCM systems. As a starting point, we first establish key requirements for the reliability and security of supply chain management systems, i.e., transparency, privacy and traceability, and then discern a threat model that includes two distinctive but practical threats including computational (i.e., the ones that threaten the functionality of the application) and communication (i.e., the ones that threaten information exchange among interconnected services of the application). For investigation, we follow a unique approach based on the hypothesis that reliability is pre-requisite of security and identify the threats considering (i) design of smart contracts and associated supply chain management applications, (ii) underlying blockchain execution environment and (iii) trust between all interconnected supply management services. Moreover, we consider both academic and industry solutions to identify the threats. We identify several challenges that hinder to establish reliability and security of the BC-SCM systems. Importantly, we also highlight research gaps that can help to establish desired security of the BC-SCM. To the best of our knowledge, this paper is the first effort that identifies practical threats to blockchain-based supply chain management systems and provides their counter measures. Finally, this work establishes foundation for future investigation towards practical security of BC-SCM system.


2013 ◽  
pp. 1166-1188
Author(s):  
Qiang Yan ◽  
Yingjiu Li ◽  
Robert H. Deng

As RFID-enabled technology is becoming pervasive in enterprise systems and human life, it triggers significant concerns over the malware that can infect, damage, and even destroy RFID-enabled network systems. RFID malware can spread malicious codes or data quickly to a large number of RFID systems via RFID read and write, which are pervasive operations on RFID tags that are transported from one RFID system to another. To address this concern, this chapter uses RFID-enabled supply chain management systems in the EPCglobal network as a case study to demonstrate the important issues in RFID malware protection. This case study shows that although there are fundamental difficulties in preventing RFID malware from entering the systems, the behaviors of RFID malware resemble traditional malware after it enters the systems. Based on this characteristic, the security threats of RFID malware can be effectively controlled.


2010 ◽  
pp. 303-324
Author(s):  
Bhuvan Unhelkar ◽  
Ming-Chien Wu ◽  
Abbass Ghanbary

This chapter investigates opportunities to integrate mobile technologies within an organization’s enterprise architecture (EA), with an emphasis on supply chain management (SCM) systems. These SCM systems exist within the overall EA of the business. SCM systems are further influenced by the increasing modern-day need for information and communications technologies (ICTs) within a business, to bring together all of its disparate applications. The resultant enterprise application integration (EAI) also stands to benefit immensely from the incorporation of mobile technologies within it. Traditionally, supply chain management systems have involved management of the flows of material, information, and finances in a complex web of networks that include suppliers, manufacturers, distributors, retailers, and customers. Thus, these traditional supply chain management systems have a great need for integration under the umbrella of EAI. Mobile technologies can provide time and location independence to these EAIs in terms of information in the supply chain systems, creating the possibility of multiple business processes that traverse diverse geographical regions. This chapter, based on the research conducted by the authors at the University of Western Sydney, discusses the opportunities that arise in supply chain management systems due to the time and location independence offered by mobility, and the resultant advantages and limitations of such integration to the business.


2011 ◽  
pp. 1012-1033
Author(s):  
Bhuvan Unhelkar ◽  
Ming-Chien Wu ◽  
Abbass Ghanbary

This chapter investigates opportunities to integrate mobile technologies within an organization’s enterprise architecture (EA), with an emphasis on supply chain management (SCM) systems. These SCM systems exist within the overall EA of the business. SCM systems are further influenced by the increasing modern-day need for information and communications technologies (ICTs) within a business, to bring together all of its disparate applications. The resultant enterprise application integration (EAI) also stands to benefit immensely from the incorporation of mobile technologies within it. Traditionally, supply chain management systems have involved management of the flows of material, information, and finances in a complex web of networks that include suppliers, manufacturers, distributors, retailers, and customers. Thus, these traditional supply chain management systems have a great need for integration under the umbrella of EAI. Mobile technologies can provide time and location independence to these EAIs in terms of information in the supply chain systems, creating the possibility of multiple business processes that traverse diverse geographical regions. This chapter, based on the research conducted by the authors at the University of Western Sydney, discusses the opportunities that arise in supply chain management systems due to the time and location independence offered by mobility, and the resultant advantages and limitations of such integration to the business.


2011 ◽  
pp. 258-279
Author(s):  
Mahesh Sarma ◽  
David C. Yen

In order to maintain a competitive position in today’s marketplace, companies must demand a greater level of enterprise ef?ciency. In today’s rapidly changing market, experts argue that it is no longer about becoming a powerhouse but simply about remaining competitive. That is why automating and linking the supply chain has become so imperative. Supply chain management systems link all of the company’s customers, suppliers, factories, warehouses, distributors, carriers, and trading partners. These systems integrate all the key business processes across the supply chain of a company. This chapter explains the objectives of sup-ply chain management and how SAP’s supply chain management system helps companies ful?ll these objectives.


Sign in / Sign up

Export Citation Format

Share Document