Next Article in Journal
Electromagnetic Form Factor of Doubly-Strange Hyperon
Next Article in Special Issue
Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA
Previous Article in Journal
Lack of Plasma-like Screening Mechanism in Sedimentation of a Non-Brownian Suspension
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Towards Convergence of IoT and Blockchain for Secure Supply Chain Transaction

1
Department of Computer Science and Engineering, University of Asia Pacific, Dhaka 1205, Bangladesh
2
Shenzhen Key Laboratory for High Performance Data Mining, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China
3
Institute of Automation Research and Engineering, Dhaka 1205, Bangladesh
4
School of Computer Science & Technology, University of Chinese Academy of Sciences, Shijingshan District, Beijing 100049, China
5
Shenzhen College of Advanced Technology, University of Chinese Academy of Sciences, Shenzhen 518055, China
*
Author to whom correspondence should be addressed.
Symmetry 2022, 14(1), 64; https://doi.org/10.3390/sym14010064
Submission received: 30 November 2021 / Revised: 16 December 2021 / Accepted: 16 December 2021 / Published: 3 January 2022
(This article belongs to the Special Issue Symmetric and Asymmetric Encryption in Blockchain)

Abstract

:
Supply chain management (SCM) is essential for a company’s faster, efficient, and effective product life cycle. However, the current SCM systems are insufficient to provide product legitimacy, transaction privacy, and security. Therefore, this research proposes a secure SCM system for the authenticity of the products based on the Internet of Things (IoT) and blockchain technology. The IoT-enabled Quick Response (QR) scanner and the blockchain-integrated distributed system will allow all the SCM stakeholders to begin secure and private transactions for their products or services. Resulting, the consumer will receive an authentic and genuine product from the original producer. A lightweight asymmetric key encryption technique, i.e., elliptic curve cryptography (ECC) and Hyperledger Fabric-based blockchain technology with on-chain smart contracts are applied for distributed IoT devices to make the authentication process faster and lighter. Each SCM stakeholder is registered by the service provider and receives corresponding public and private keys, which will be used for the authentication process of the participants and IoT devices. The authenticated QR scanner records all transactions on the blockchain. Consequently, there will be no human intervention for the SCM transactions. The security and scalability analysis demonstrates that the proposed system is more secure and robust than other state-of-the-art techniques.

1. Introduction

The internet and technology have been developed so rapidly that the whole world is experiencing the fourth industrial revolution (Industry 4.0) [1] in all aspects of humankind, where the Internet of Things (IoT) [2] plays a significant role for its diverse adoption. IoT is a network of interlinked physical objects (e.g., devices, machines, and appliances) installed with sensors, software, and electronics, provided with unique identifiers. IoT sensors also possess the capacity to exchange data over the internet without human intervention. It can create information about the associated objects, examine them and make decisions. It has enormous potential to give various elating services across numerous spaces from industry, healthcare [3], smart home [4], smart cities, social media, and supply chain. IoT devices have revolutionized the supply chain management (SCM) system [5].
SCM is the management of the movement of goods through various parties like manufacturers, distributors, retailers, and customers [3]. It helps to check the traversal of products and information without any complexities. A supply chain involves a series of steps to get a product or service to the customer. The steps include moving and transforming raw materials into finished products, transporting and distributing them to the end-user.
IoT devices can be connected to a product to confirm the product’s authenticity, investigate the origin and quality. Moreover, IoT devices can ensure real-time tracking, traceability, and visibility of a product in the supply chain. A recent survey reveals that Australian retailers have integrated IoT devices into their supply chain. It includes internet-based barcode technology, sensors and scanners, palm-held tablets/smart devices, smartphones, mobile apps, GPS-based location awareness, and Internet-based security and surveillance system [6].
There is no doubt regarding the advantages of the IoT in the supply chain. Despite the benefits, some concerns are related to the IoT integrated supply chain. The IoT devices generate a large amount of data stored in a centralized server, i.e., in a cloud as a plaintext. As a result, there is a chance that the centralized server might act dishonestly and make fallacious use of users’ sensitive data. There is a severe threat related to the privacy and security of user data in the centralized IoT infrastructure [7]. Even most of the existing supply chains are not IoT integrated, and because of human intervention [8], there is a high risk in the privacy and security of product and user’s data.
Besides the above-discussed articles, there are some other investigations where IoT and blockchain [9] are integrated into the supply chain, whereas there are no studies that focus on the incorporation of asymmetric key encryption technique elliptic curve cryptography (ECC), IoT, and supply chain. Moreover, none of the earlier studies which are discussed in Section 2 focuses on key distributions and key agreements for authenticating IoT devices. Blockchain is a decentralized and distributed network of peers that shares the same ledger of transactions connected with the system without any central server. The transaction records in the blockchain ledger are immutable, and therefore, it assures authenticity, transparency, traceability, security, and visibility among supply chain entities. The immutable nature of the blockchain platform ensures the SCM transactions data authenticity and security, but it does not ensure data privacy. Therefore, users’ sensitive data needs to be protected from disclosure. Due to the resource limitations (i.e., small memory, limited battery power, and insufficient processing capability) of the IoT device, conventional PC-based cryptographic solutions are not appropriate for most IoT devices [10]. Therefore, a lightweight cryptographic protocol is required for the system.
This research converges IoT, lightweight asymmetric key cryptography, i.e., ECC, and Hyperledger fabric for secure and trusted supply chain transactions to mitigate the existing supply chain problems. A lightweight key agreement scheme based on ECC has been introduced to ensure the authenticity of IoT devices. Hyperledger fabric assures faster and private supply chain transactions between participating entities. All products or services carry a quick response (QR) code from their production. The proposed system will scan QR codes with an IoT-enabled QR scanner, whereas the transaction data will be stored into the blockchain automatically and securely. Every participant’s (e.g., manufacturer, distributor, and retailer) QR scanner will be registered through the lightweight authentication process in the blockchain network. After the registration and successful mutual authentication between the IoT device of two entities, the product information scanned by the QR scanner is stored in the blockchain. The proposed approach serves as a peer-to-peer, trusted distributed supply chain that introduces the product’s real-time tracking and traceability and guarantees product information authenticity and confidentiality with an authenticated IoT device. Integration of IoT in the blockchain-based supply chain will enhance the supply chain’s flexibility, traceability, transparency, real-time audibility, autonomy, and transaction privacy.
The main contributions of this paper are as follows:
  • IoT and Blockchain are used to reduce human intervention at the time of recording the supply chain transaction;
  • Asymmetric key encryption technique ECC based Key distribution and key agreement are developed in SCM. ECC is used for managing the cryptographic operations and also for lightweight authentication of entities;
  • Hyperleadger fabric based blockchain technology will ensure the transaction data privacy and security;
  • Security and Privacy analysis illustrate the efficiency of the proposed method.
The rest of the article is structured as follows. Related works are analyzed in Section 2. Preliminaries, System Overview, and Model Construction are delineated in Section 3, Section 4 and Section 5, respectively. Section 6 illustrates the Performance Evaluation. Finally, Section 7 concludes this article.

2. Related Work

This section briefly reviews previous works and also discusses their limitations and the novelty of these works.

2.1. Privacy by Design

Security of information with the help of technology design is called privacy by design. This concept can merge privacy at the development and production level. It is better to employ a proactive method for data security before they occur, instead of lingering till the breach happens [11,12]. End-to-end security for the entire lifecycle protection can be achieved by this concept. All data are processed securely and also being destroyed securely when needs are over. Specification of privacy context is necessary to defend user privacy. Recent studies [13,14,15,16,17] determined some privacy terms necessary for cyberspace. They are intruders, receivers, senders. and so on. Pfitzmann and Hansen [15,16,17] illustrate a setting related to privacy, which specifies the affinity among privacy terms. Moreover, privacy by design is important for information security.

2.2. IoT and Blockchain in Supply Chain

Malik [18] proposed TrustChain, which is a three-layered trust management framework for SCM integrated with blockchain. Tsang [19] presented a blockchain and IoT-enabled food traceability system called BIFTS where incorporates IoT, fuzzy logic, and blockchain for complete traceability of perishable food. Shi [20] designed and developed an IoT and blockchain-integrated pharmaceutical supply chain management system to mitigate the concerns of belief, safety, traceability, and inefficiency. Caro [21] proposed a system for the agricultural food supply chain management, which is a comprehensively decentralized traceability system. It incorporates different IoT sensor devices with the supply chain. Abdel-Basset [22] proposed a framework based on RFID technologies for supply chain management that automate the identification process of products, trace and track products globally.
Cui [23] proposed a Hyperledger Fabric-based blockchain framework to trace and track every electronic chip in the supply chain. All the supply chain entities could benefit from this framework since it helps to preserve the supply chain from forged devices. Cocco [24] proposed a blockchain and IoT-based system for Carasau bread’s supply chain management to ensure the product’s transparent and auditable traceability. In their suggested system, every supply chain party can check the condition of the products and the agreement to the prescriptive about the hygienic-sanitary circumstances on the chain. Matteo [25] presented a DL-Tags solution based on IoT and blockchain that allows privacy-preserving, decentralized, and verifiable management of commodities labeled with Smart Tags. All the product consumers and stakeholders can check its authenticity without disclosing their identity. Their recommended solution proves the product’s source and journey throughout the supply chain while preventing label replication and manipulation. Bhutta [26] proposed a supply chain management framework for agricultural food supply that ensures secure traceability, identification, and real-time tracking of transportation using IoT and Blockchain.
Grida (2020) [27] discusses the uncertainty of evaluating the outcomes of the supply chain based on IoT by blending pathogenic set with Vlse Kriterijumska Optimizacija Kompromisno Resenje and Best-Worst schemes in a judgment-making framework employed for this field. Yadav (2020) [28,29] employs a framework for regulating the performance of SCM for agriculture based on IoT and to develop an IoT-based effective system following natural outbreaks for advancing the coordination mechanism in agriculture supply chain management. Zhang (2020) [30] presents a thorough review of existing SCM-related studies.
Table 1 illustrates the summary of the state-of-the-art techniques with the proposed studies. Most of the investigations utilized IoT and blockchain in SCM, and some of them used cryptographic technologies which are not lightweight. None of them showed the authentication of the entities in terms of privacy and security, and only a few of them focused on transaction data confidentiality. These studies utilized IoT devices to track the products’ real-time information, such as product quality and location, without considering security and privacy issues. Some studies employed the transaction privacy module, but it lacks security proof. On the other hand, the proposed framework addresses all the limitations of the studies mentioned earlier, and it is lighter, secure, and faster for supply chain transactions.

3. Preliminaries

This section describes all the notations, which are shown in Table 2 and technologies related to the system.

3.1. Asymmetric-Key Encryption

Asymmetric encryption technique is known as public-key cryptography. This cryptographic system uses key pairs, i.e., public and private keys. Here, the public keys are declared openly, and private keys are kept secret by the key owners. The formation of the before-mentioned keys depends on cryptographic algorithms based on large prime numbers to build one-way cryptographic algorithms [31]. There are different types of asymmetric-key cryptography such as Diffie Hellman, Rivest–Shamir–Adleman (RSA), Elliptic Curve Cryptography (ECC), ElGamal, and so on. However, ECC is the lightweight asymmetric-key cryptography for data encryption and decryption [32].

3.2. Blockchain and Smart Contract

Blockchain is an immutable distributed ledger technology where the transactions are open to every node of the network associated with a peer-to-peer (P2P) design. It permits untrusted participants to interact and broadcast transactions among each other in a secure way and no trusted third party is needed. Figure 1 represents the smart contract and blockchain system. Blockchain is an ordered list and cryptographic hashes are used to identify each one of the blocks. A chain of blocks is created, where each block references the block that came before it. Every block has a group of transactions [9]. Again, an executable code, which operates on the blockchain in order to aid, execute and dictate the terms of an agreement is known as a smart contract. Its goal is to execute the terms of an agreement automatically if the specific requirements are fulfilled. Its capability fully depends on the programming language, which is utilized for expressing the contract but not on the technology. It has private storage, executable code, and account balance. This study used Practical Byzantine Fault Tolerance (PBFT) [33] for consensus protocol. PBFT is a way for a distributed network to reach the consensus set for the blockchain even if some nodes are malicious. It is used in Hyperledger, in the transaction approval process to avoid malicious decisions. When a Hyperledger transaction is made, the transaction details are sent to the nodes in the network. There are might some nodes that will approve the transactions and some nodes that will not. The majority of nodes have to approve the transaction for the transaction to be completed. To keep the system secure, PBFT requires 3 f + 1 nodes in the system, where f is the maximum number of faulty nodes that the system can tolerate. Therefore, for the group of nodes to make any decision, approval from 2 f + 1 nodes is required.

3.3. Elliptic Curve Cryptography

Elliptic curve discrete logarithm problem (ECDLP) [34]: Nowadays, 160 bit ECDLP is often used in cryptosystem where A failed to calculate u, when Q = u P for P , Q E ( F p ) and u Z q * .
Elliptic curve computational Diffie–Hellmen problem [34]: The length 160 bit ECDLP is secure [34] for that reason A failed to calculate u v P , where u P , v P E ( F p ) and u , v Z q * .

4. System Overview

This section discusses the system model, threat model, and security goals.

4.1. System Model

This study envisage blockchain and IoT based data-driven supply chain ecosystem, which is showed in Figure 2. In this system, the registration protocol, consensus mechanism, and authentication protocol are studied in detail. Entities involved in this systems are Manufacturer ( M ), Distributor ( D ), Retailer ( R ), Customer ( C ), and Service Provider ( SP ). Their roles are described in Table 3.
Formally, the proposed system in Figure 2 consist of n number of Manufacturer M i = 1 n , Distributor D i = 1 n , Retailer R i = 1 n , Customer C i = 1 n , and Service Provider SP i = 1 n . Each M , D and R will have n number of IoT devices, which is M I o T i = 1 n , D I o T i = 1 n and R I o T i = 1 n , respectively. Participants M , D , R , and SP perform their task by executing protocols Φ and Γ . Protocol Φ and Γ are used for registration and authentication process, respectively. These protocols can make sure privacy, security, and authenticity of the participants, which is described in Section 5.
The entire system is divided into two parts. They are:
  • Registration
  • Authentication
In the registration process, the M requests for registration to SP and SP approves the request and completes the registration process of M . Similarly, D and R complete the registration process. Each of M , D , and R follow Protocol Φ during the registration process and also receive their public key and private key from SP . All interactions are handled by smart contract and transactions are recorded in the chain 1. Any participant within the network can have the public key of other participants. The registration process and Protocol Φ are elaborately discussed in Section 5. In the authentication process, M , D , and R authenticate each other and their IoT devices by following the protocol Γ . Consider a scenario, where M and D want to participate in the authentication. Based on asymmetric encryption ECC they authenticate each other. Their smart contract handles all the interactions and transactions are recorded in the chain 2. All participants in the authentication portion will also authenticate the public key from chain 1 by their smart contract. The detailed authentication process and Protocol Γ are discussed in Section 5. Lastly, C can buy its product from the R by scanning the QR code of the product by C ’s smartphone but C will not participate in any of the above-mentioned protocols.

4.2. Threat Model

Participants in protocol Φ and Γ do not trust each other except SP . Others are semi-honest adversaries ( A ), who are honest in following the protocol but also interested in the private data of other participants [35]. A can also be a middle man adversary. It can dominate the public channel by intercepting, modifying, and forging messages. Yet A failed to infer information from the private channel. In case of forwarding secrecy, A ’s attack has a minute probability of success against participants.
  • A might get all messages between two entities by initiating a passive attack.
  • A might execute any operation by initiating an active attack.
  • A might forge any message in a key agreement stage.
  • A might retrieve the session key of the entity.

4.3. Security Goals

The privacy-preserving protocol Φ and Γ satisfy the following security requirements of the supply chain. SP is the only trusted entity in the entire system.
  • None of the participants can infer other participants’ privacy.
  • None of the participants can breach other participants’ security.
  • A cannot forge any message in a key agreement stage.
  • A cannot retrieve the session key of the entity.
  • A cannot be successful with an impersonate attack.
  • A cannot be successful in forwarding secrecy.
  • A cannot be successful in a replay attack.
Moreover, A cannot be successful after a passive or an active attack.

5. Model Construction

The section describes the entire system in detail. This scheme mainly consists of two parts, i.e., registration and authentication.

5.1. System Setup

This section only focuses on the system setup. Here, SP selects an elliptic curve E ( F p ) , where F p is a finite field, which is decided by prime p. It also selects a generator P on the curve with order q and a master or secret key SK SP . It publishes the public key PK SP = ( SK SP P ) , P , p, q, h i ( . ) ( i = 1 , 2 , 3 ) where h i : { 0 , 1 } * Z q * , i = 1 , 2 and h 3 : { 0 , 1 } * { 0 , 1 } n . Here, Z q * is a multiplicative group of integers modulo q.

5.2. Registration

This section describes the registration process and protocol Φ in detail, which illustrates the registration process of M , D , and R with SP . All these participants follow protocol Φ at the time of interaction. The registration process of M with SP is described below and D and R ’s registration follow the same protocol. M submits its identity ID M to the SP . The SP generates a nonce r M Z q * , and works out PK M = r M P , X M = h 1 ( ID M PK M ) , and SK M = r M + SK SP X M . Then, the SP sends { PK M , SK M } to M secretly. Figure 3 shows the entire registration process of M .

5.2.1. Blockchain-Based Data Sharing (via Chain 1)

During the registration stage through protocol Φ , the SP generates the hash of the PK of M , D , and R and encrypt them with the SK SP in order to generate a digital signature ( DS ). Now, the SP concats PK s’ of M , D and R , DS and its sign SN SP which are publicly available. The SP commits the concated information in the blockchain by calling the smart contract. Algorithm 1 shows the working process of smart contract for registration, where functions g e n ( ) and r e g ( ) stand for generation of keys and register for writing data into the chain 1. The procedure is described in detail below:
SP utilize Equation (1) for generating the DS M and then ( PK M DS M SN SP ).
DS M = EN ( h ( PK M ) , SK SP )
Similarly, SP generates DS D , DS R and then ( PK D DS D SN SP ), ( PK R DS R SN SP ), respectively. Publicly available information from chain 1 are as follows:
  • Public key of the entities;
  • Verifiable digital signatures of the entities;
  • Sign of the service provider.
Algorithm 1: Working process of smart contract for registration.
Symmetry 14 00064 i001

5.2.2. Security Analysis of Protocol Φ

Proposition 1.
(Security of Protocol Φ). Protocol Φ in Figure 3 is secured in case of adversaries A .
Proof of Proposition 1.
In Protocol Φ : M , D , R , and SP , four entities are involved in three scenario. The actions and processes of all of them are the same. Therefore, one scenario is secured means all of them are secured. This section considers the scenario of Figure 3. The function is F :
F : F ( ID M , r M , P , h 1 ( ) , SK SP ) = ( PK M , SK M )
The view of each M is
v i e w M Φ = ( ID M , PK M , SK M , P , p , q , h i ( . ) ( i = 1 , 2 , 3 ) )
Clearly, none of this information can be used to infer any private data of other participants. Therefore, in case A is a semi-honest adversary, he would not able to infer any private information of other participants from these data. Again, if A is an outsider dishonest adversaries, he might try to take control over the network and try to infer data but that’s not possible as the interactions are happening under the Blockchain network. On the other hand, SP is a trusted entity. Lastly, it is important to discuss the security and privacy issues related to the public ledger of chain 1. Therefore, public view, which also can be seen by A :
v i e w A Φ = ( PK M , PK SP , DS M , SN SP )
Now, PK M , PK SP , DS M and SN SP has no security concerns as they are just addresses. Thus, protocol Φ is secured in presence of semi-honest and dishonest adversaries for Figure 3.    □

5.3. Authentication

This section describes the authentication process and protocol Γ in detail, which illustrates the authentication process of M with D , and D with R . All these participants follow protocol Γ at the time of interaction. The authentication process of M with D is illustrated in this section and others follow the same protocol.

5.3.1. Verification of PK and Corresponding SP

This section describes the verification of participants’ ( M , D , and R ) PK , where any participant can identify the corresponding SP for any PK . Let us consider a scenario where a D attempts to verify the PK of an M and identify its corresponding SP . Figure 4 illustrates the entire process. D retrieves M ’s PK M along with DS M and SN SP from chain 1. It recognizes PK SP from SN SP . It decrypts DS M with PK SP and gets h ( PK M ) SP , which is generated by SP . It generates h ( PK M ) D as H . It compares H and h ( PK M ) SP , if matches then PK M is verified with SP . All participants use this process to verify the PK of other participants in the same process and follow the protocol Γ .

5.3.2. Authentication between M and D

This section is described in three phases and shown in Figure 5. D sends its IoT device ID to M using asymmetric encryption.
1.
Phase 1: M chooses a nonce u Z q * , B 1 = u P , B 2 = h 2 ( u PK D + u h 1 ( ID i o t D PK D ) PK SP ) ID i o t M , B 3 = h 2 ( B 1 PK M PK D ID i o t M ID i o t D ) . Then the message MA 1 = { B 1 , B 2 , B 3 , PK M } is sent to D .
2.
Phase 2: D calculates ID i o t M = B 2 h 2 ( SK D B 1 ) and checks B 3 ? = h 2 ( B 1 PK M PK D ID i o t M ID i o t D ) . If true, D continues to select v Z q * and calculates B 4 = v P , SEK D = h 3 ( B 1 B 4 v B 1 ) , B 5 = h 2 ( v PK M + v h 1 ( ID i o t M PK M ) PK SP ) ID i o t D , and B 6 = h 2 ( ID i o t M ID i o t D B 1 B 4 SEK D ) . Then the message MA 2 = { B 4 , B 5 , B 6 } is sent to M .
3.
Phase 3: M calculates SEK M = h 3 ( B 1 B 4 u B 4 ) , ID i o t D = h 2 ( SK M B 4 ) B 5 , and checks ID i o t D and B 6 ? = h 2 ( ID i o t M ID i o t D B 1 B 4 SEK M ) . If true, then the two IoT devices of M and D are the authenticated on the both side.

5.3.3. Blockchain Based Data Sharing (via Chain 2)

During the authentication stage through protocol Γ , all participants verify the authenticity of other participants’ PK . In the case of Figure 5, M generates the hash of the MA 1 and commits it in the blockchain by calling the smart contract along with its PK M . On the other hand, D generates the hash of the MA 2 , [ [ ID i o t D ] ] PK M and commits it in the blockchain by calling the smart contract along with its PK D . Algorithm 2 shows the working process of smart contract for authentication, where functions a u t h ( ) and r e g ( ) stand for authentication and register for writing data into the chain 2. The procedure is described in detail below:
  • M generates ( PK M H M ) using (2)
    H M = h ( MA 1 )
  • D generates ( PK D H D ) using (3)
    H D = h ( MA 2 [ [ ID i o t D ] ] PK M )
Again, in the case of the registration process of D generates the hash of the MA 1 and commits it in the blockchain by calling the smart contract along with its PK D . On the other hand, R generates the hash of the MA 2 , [ [ ID i o t R ] ] PK D and commits it in the blockchain by calling the smart contract along with its PK R . The procedure is described in detail below:
  • D generates ( PK D H D ) using (4)
    H D = h ( MA 1 )
  • R generates ( PK R H R ) using (5)
    H R = h ( MA 2 [ [ ID i o t R ] ] PK D )
Publicly available information from chain 2 are as follows:
  • Public key of the entities
  • Hash of the shared messages
Algorithm 2: Working process of smart contract for authentication.
Symmetry 14 00064 i002

5.3.4. Security Analysis of Protocol Γ

Proposition 2.
(Security of Protocol Γ). Protocol Γ in Figure 5 is secured in case of adversaries A .
Proof of Proposition 2.
In Protocol Γ : mainly M , D , and R , three entities are involved in two scenario. The actions and processes for both of them are the same. Therefore, one scenario is secured means another one is also secured. This section considers the scenario of Figure 5. The function is F :
F : F ( { ID i o t , PK , SK } { M , D } , EN ( ) , DE ( ) , u , v , P ,
PK SP , h i ( ) ( i = 1 , 2 , 3 ) ) = ( MA 1 , MA 2 )
The view of each M is:
v i e w M Γ = ( ID i o t D , u , P , PK SP , PK D , SEK M )
Here, M can authenticate D by checking B 6 and there are no other available data visible to M from where it can infer further private information. Again, the view of each D is:
v i e w D Γ = ( ID i o t M , v , P , PK SP , PK M , SEK D )
D can authenticate M by checking B 3 and there are no other available data visible to D from where it can infer further private information. On the other hand, it is important to discuss the view outsider dishonest adversaries A . In ideal case its view is:
v i e w A Γ = ( PK M , PK SP , PK D , H M , H D )
In the ideal case A can not infer any information from PK M , PK SP , PK D , H M and H D as PK s’ are addresses and hash values has no backward operations. Considering the threat from the threat model, A has far more ability and visibility than the publicly available data. It is also important to analyze the security of those threats. It is clear that the ID i o t { M , D } are secured by the hash values h 2 ( u PK M + u h 1 ( ID i o t M PK M ) PK SP ) and h 2 ( v PK D + v h 1 ( ID i o t D PK D ) PK SP ) , respectively. The outcomes needs SK SP or SK M and SK SP or SK M to directly or indirectly forge those hash values. These keys’ are private to their respective owners. Again, in the case of Forward Secrecy A breaks and obtains all of the secret keys from M and D such as SK M and SK D . However, A failed to infer past session keys as all of them are generated based on the ECDH issue. Since u , v , P are not precisely calculable, the forward secrecy is preserved. Again for impersonation attack, if A intends to infer any message at the time of key agreement, it requires SK SP , SK M or SK D . Yet according to the premise of A , it cannot get any of them. Therefore, it will fail to build the entire message. Therefore, this invasion will fail. Lastly, in case of a reply attack, all individuals utilize unexplored random numerals v and u every time. A will not be able to crack the ECDH issue depending on (u P , v o l d P ) or ( u o l d P , v P ), despite any message is being replayed. Thus, protocol Γ is secured in presence of semi-honest and dishonest adversaries for Figure 5. □

6. Experimental Analysis

This section describes the test apparatuses and analyzes the performance evaluation of the suggested schema.

6.1. Testbed

Hyperledger Fabric network deployment machine configuration: Memory 66 GB. Processor: Xeon(R) Intel(R), 3.70GHz W-2135 CPU (6 Core). GPU: Attached GPUs: 4. Product Name: NVIDIA GeForce RTX 2080 Ti. Blockchain transaction performance test machine: Memory, 16 GB 2667 MHz DDR4. Processor: 8-Core 2.3 GHz Core i9 Intel. GPU: Graphics 630 1536 MB Intel UHD.

6.2. Score and Scalability Evaluation Metric

This subsection depicts the measures used to analyze the outcomes.

Evaluation Metrics

The outcomes of the suggested framework is evaluated based on execution time ( ET ), average latency ( AL ), and average throughput ( AT ).
  • ET : The total amount of time (in seconds) consumed by a system to perform all transactions for a certain corpus, which is showed in Equation (6) shows the where N is the total number of transactions.
    ET = i = 1 N ( T 2 T 1 )
    T 1 and T 2 represent the time when the transaction was made and the blockchain verified the transaction, respectively.
  • AL : The average latency is the norm of the difference between T 2 and T 1 in a dataset for a bunch of transactions, which is shown in Equation (7).
    AL = i = 1 N ( T 2 T 1 ) N
  • AT : The average throughput is the norm of successful transaction’s number per second over the execution time, which is shown in Equation (8).
    AT = N i = 1 N ( T 2 T 1 ) N

6.3. Result Evaluation

This section demonstrates the result analysis of the system and also detail analysis of protocol Φ and Γ . The proposed system is evaluated in three ways: execution time, average latency, and average throughput. Figure 6 illustrates the performance analysis of Hyperledger Fabric and Ethereum.
This study examines the diversity in performance time consumption by altering the numeral of transactions in Figure 6a with two types of blockchain technology such as Etherium and Hyperledger Fabric. The x-axis exhibits the transactions counts running from 1 to 1000 and the y-axis presents the total time consumption for various groups of transactions in seconds. The graph is represented in linear scale. The execution time is proportional to the number of transactions. In the scenario, Etherium hardly completes 980 transactions. Analysis shows that the Hyperledger Fabric constantly consumes less time than Ethereum. The difference between Ethereum and Hyperledger Fabric in execution time grows larger as the transactions amount increases. In Figure 6b,c, we assessed the latency and throughput, respectively by deviating the count of transactions with Etherium and Hyperledger Fabric. The x-axis of both figures shows the transactions number, which varies from 1 to 1000. The y-axis of Figure 6b shows the average latency in seconds for every set of transactions but on that same axis, Figure 6c shows the average throughput in transaction per second (tps) for individual transaction sets. Analysis of the performance reveals that latency of Hyperledger Fabric is constantly lower and throughput is constantly higher in comparison to Ethereum. Therefore, it proves Hyperledger Fabric is faster in comparison to Ethereum. In summary, the proposed system provides more reliable performance in Hyperledger Fabric than Ethereum in terms of scalability. Another important feature of Hyperledger Fabric is that it is a private network but Ethereum is public. Therefore the transaction privacy can also be achieved by Hyperledger Fabric. Figure 7 illustrates the performance analysis of protocol Φ and Γ on Hyperledger Fabric.
We investigate the execution time of two protocols (i.e., Φ and Γ ) by the number of transactions in Figure 7a with Hyperledger Fabric. The x-axis illustrates transactions counts (varying from 1 to 1000) and the y-axis indicates an individual group’s transaction time. The execution time is proportional to the transaction count on a linear scale. The result analysis of this study shows that Hyperledger Fabric’s execution time is quite practical. When the number of transactions is 100, then the protocol Φ takes 268.55811 s and the protocol Γ takes 339.351912 s. When the number of transactions is 500, then the protocol Φ takes 2258.245325 s and the protocol Γ takes 1687.087315 s. When the number of transactions is 1000, then the protocol Φ takes 3626.718443 s and the protocol Γ takes 3386.043616 s. It is clear from the above Figure 7a that protocol Φ consumes much more time than protocol Γ as the transaction number increases.
Figure 7b assessed the average latency by transaction count with Hyperledger. The x-axis and y-axis show the same parameters as Figure 7a. The result analysis of this study shows that the execution time of Hyperledger Fabric is pretty practical. When the number of transactions is 100, then the protocol Φ consumes 2.71235371 s and the protocol Γ consumes 3.39351912 s. When the number of transactions is 500, then the protocol Φ consumes 4.51649065 s and the protocol Γ consumes 3.37417463 s. When the number of transactions is 1000, then the protocol Φ consumes 3.626718443 s and the protocol Γ consumes 3.386043616 s.
We again assessed the average throughput by altering the transaction counts in Figure 7c with Hyperledger. The x-axis and y-axis show the same parameters as Figure 6c. When the number of transactions is 100, then the protocol Φ executes 0.00372358891 tps and the protocol Γ executes 0.0029467935 tps. When the number of transactions is 500, then the protocol Φ executes 0.000442821685 tps and the protocol Γ executes 0.0005927375 tps. When the number of transactions is 1000, then the protocol Φ executes 0.0002757313576 tps and the protocol Γ executes 0.0002953299 tps.
After the analysis of transaction time, it is important to have a look at execution time. Table 4 shows the execution time analysis. It focuses on each entity’s time consumption. Precisely, there is no previous work whose result can be directly comparable with this proposed system. In the proposed system, entities SP , M , D , and R consume 2.049688 ms, 4.534202 ms, 4.011596 ms, and 4.373648 ms, respectively. ECC’s time consumption of the proposed system shows better performance but the total execution time of the proposed system is a bit higher due to the time expenditure of blockchain.
The performance of the proposed method can be compared with the method of other domains in terms of computational costs and the number of exchanged message. Analysis is showed in Table 5 and Figure 8. The proposed outperforms the methods of other domains also, where it takes 1260 bits for communication costs and only 3 exchanges of messages.

7. Conclusions

Integration of IoT devices in a centralized nature increases the issue of transaction data privacy and security of the supply chain management system. Therefore, this paper proposed a unified solution with the distributed ledger technology, i.e., Hyperledger fabric, IoT, and elliptic curve cryptography, to protect the transaction data from privacy and security breaches. ECC ensured the lightweight cryptographic operations and authentication of IoT devices. Authenticated IoT scanner guarantees an error-free supply chain transaction enabling the trusted immutable ledger among all participants. Rigorous implementation of the proposed system on the Hyperledger fabric network confirmed that the system works smoothly in a multi-party setup. The result and security analysis prove that the proposed system is robust and secure for real-life applications.
In future research, we want to integrate self-sovereign identity (SSI) with the distributed ledger technology for faster and more reliable peer-to-peer authentication processes for all supply chain entities. The decentralized SSI module will guarantee frictionless supply chain transactions where data privacy and security can also be ensured.

Author Contributions

Conceptualization, A.S.M.T.H. and R.U.H.; methodology, A.S.M.T.H., S.S., and R.U.H.; software, S.S. and A.D.; validation, A.S.M.T.H. and Q.J.; formal analysis, A.S.M.T.H. and R.U.H.; investigation, S.S.; resources, S.S.; data curation, S.S.; writing—original draft preparation, S.S. and R.U.H.; writing—review and editing, A.S.M.T.H., R.U.H., A.R., and Q.J.; visualization, S.S.; supervision, R.U.H.; project administration, A.S.M.T.H.; funding acquisition, Q.J. All authors have read and agreed to the published version of the manuscript.

Funding

The National Key Research and Development Program of China: 2021YFF1200104. Additionally, thanks to the Institute of Automation Research and Engineering for their technical and infrastructure support.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. da Silva, F.S.T.; da Costa, C.A.; Crovato, C.D.P.; da Rosa Righi, R. Looking at energy through the lens of Industry 4.0: A systematic literature review of concerns and challenges. Comput. Ind. Eng. 2020, 143, 106426. [Google Scholar] [CrossRef]
  2. Granell, C.; Kamilaris, A.; Kotsev, A.; Ostermann, F.O.; Trilles, S. Internet of things. In Manual of Digital Earth; Springer: Singapore, 2020; pp. 387–423. [Google Scholar]
  3. Akter, S.; Habib, A.; Islam, M.A.; Hossen, M.S.; Fahim, W.A.; Sarkar, P.R.; Ahmed, M. Comprehensive Performance Assessment of Deep Learning Models in Early Prediction and Risk Identification of Chronic Kidney Disease. IEEE Access 2021, 9, 165184–165206. [Google Scholar] [CrossRef]
  4. Bing, K.; Fu, L.; Zhuo, Y.; Yanlei, L. Design of an Internet of Things-based smart home system. In Proceedings of the 2011 2nd International Conference on Intelligent Control and Information Processing, Harbin, China, 25–28 July 2011; Volume 2, pp. 921–924. [Google Scholar]
  5. Langley, C.J.; Novack, R.A.; Gibson, B.; Coyle, J.J. Supply Chain Management: A Logistics Perspective; Cengage Learning: Boston, MA, USA, 2020. [Google Scholar]
  6. De Vass, T.; Shee, H.; Miah, S.J. The effect of “Internet of Things” on supply chain integration and performance: An organisational capability perspective. Australas. J. Inf. Syst. 2018, 22. [Google Scholar] [CrossRef] [Green Version]
  7. Khujamatov, K.; Reypnazarov, E.; Akhmedov, N.; Khasanov, D. IoT based centralized double stage education. In Proceedings of the 2020 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 4–6 November 2020; pp. 1–5. [Google Scholar]
  8. Sabah, S.; Hasan, A.S.M.T.; Daria, A. A Blockchain-based Approach to Detect Counterfeit Drugs in Medical Supply Chain. In Proceedings of the International Conference on Big Data, IoT and Machine Learning (BIM 2021), Cox’s Bazar, Bangladesh, 23–25 September 2021. [Google Scholar]
  9. Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of blockchain systems. Future Gener. Comput. Syst. 2020, 107, 841–853. [Google Scholar] [CrossRef] [Green Version]
  10. Shahroz, M.; Mushtaq, M.F.; Ahmad, M.; Ullah, S.; Mehmood, A.; Choi, G.S. IoT-based smart shopping cart using radio frequency identification. IEEE Access 2020, 8, 68426–68438. [Google Scholar] [CrossRef]
  11. Kawano, Y.; Cao, M. Design of privacy-preserving dynamic controllers. IEEE Trans. Autom. Control 2020, 65, 3863–3878. [Google Scholar] [CrossRef]
  12. Li, C.; Palanisamy, B.; Xu, R. Scalable and privacy-preserving design of on/off-chain smart contracts. In Proceedings of the 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW), Macao, Macao, 8–12 April 2019; pp. 7–12. [Google Scholar]
  13. Sweeney, L. K-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 2002, 10, 557–570. [Google Scholar] [CrossRef] [Green Version]
  14. Kambourakis, G. Anonymity and closely related terms in the cyberspace: An analysis by example. J. Inf. Secur. Appl. 2014, 19, 2–17. [Google Scholar] [CrossRef]
  15. Pfitzmann, A.; Köhntopp, M. Anonymity, unobservability, and pseudonymity—A proposal for terminology. In Designing Privacy Enhancing Technologies; Springer: Berlin/Heidelberg, Germany, 2001; pp. 1–9. [Google Scholar]
  16. Pfitzmann, A.; Hansen, M. A Terminology for Talking About Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management. 2010. Available online: http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf (accessed on 20 October 2021).
  17. Hansen, M.; Smith, R.; Tschofenig, H. CA Privacy terminology and concepts. In Internet Draft, March 2012, Technical Report; Network Working Group; IETF: Fremont, CA, USA, 2011. [Google Scholar]
  18. Malik, S.; Dedeoglu, V.; Kanhere, S.S.; Jurdak, R. Trustchain: Trust management in blockchain and iot supported supply chains. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA, 14–17 July 2019; pp. 184–193. [Google Scholar]
  19. Tsang, Y.P.; Choy, K.L.; Wu, C.H.; Ho, G.T.S.; Lam, H.Y. Blockchain-driven iot for food traceability with an integrated consensus mechanism. IEEE Access 2019, 7, 129000–129017. [Google Scholar] [CrossRef]
  20. Shi, J.; Yi, D.; Kuang, J. Pharmaceutical supply chain management system with integration of iot and blockchain technology. In International Conference on Smart Blockchain; Springer: Berlin/Heidelberg, Germany, 2019; pp. 97–108. [Google Scholar]
  21. Caro, M.P.; Ali, M.S.; Vecchio, M.; Giaffreda, R. Blockchain-based traceability in agri-food supply chain management: A practical implementation. In Proceedings of the 2018 IoT Vertical and Topical Summit on Agriculture-Tuscany (IOT Tuscany), Tuscany, Italy, 8–9 May 2018; pp. 1–4. [Google Scholar]
  22. Abdel-Basset, M.; Manogaran, G.; Mohamed, M. Internet of things (iot) and its impact on supply chain: A framework for building smart, secure and efficient systems. Future Gener. Comput. Syst. 2018, 86, 614–628. [Google Scholar] [CrossRef] [Green Version]
  23. Cui, P.; Dixon, J.; Guin, U.; Dimase, D. A blockchain-based framework for supply chain provenance. IEEE Access 2019, 7, 157113–157125. [Google Scholar] [CrossRef]
  24. Cocco, L.; Mannaro, K.; Tonelli, R.; Mariani, L.; Lodi, M.B.; Melis, A.; Fanti, A. A Blockchain-Based Traceability System in Agri-Food SME: Case Study of a Traditional Bakery. IEEE Access 2021, 9, 62899–62915. [Google Scholar] [CrossRef]
  25. Benčić, F.M.; Skočir, P.; Žarko, I.P. DL-Tags: DLT and smart tags for decentralized, privacy-preserving, and verifiable supply chain management. IEEE Access 2019, 7, 46198–46209. [Google Scholar] [CrossRef]
  26. Bhutta, M.N.M.; Ahmad, M. Secure Identification, Traceability and Real-Time Tracking of Agricultural Food Supply During Transportation Using Internet of Things. IEEE Access 2021, 9, 65660–65675. [Google Scholar] [CrossRef]
  27. Grida, M.; Mohamed, R.; Zaid, A.H. A novel plithogenic MCDM framework for evaluating the performance of IoT based supply chain. Neutrosophic Sets Syst. 2020, 33, 323–341. [Google Scholar]
  28. Yadav, S.; Garg, D.; Luthra, S. Development of IoT based data-driven agriculture supply chain performance measurement framework. J. Enterp. Inf. Manag. 2020, 34, 292–327. [Google Scholar] [CrossRef]
  29. Yadav, S.; Luthra, S.; Garg, D. Internet of things (IoT) based coordination system in Agri-food supply chain: Development of an efficient framework using DEMATEL-ISM. Oper. Manag. Res. 2020. [Google Scholar] [CrossRef]
  30. Zhang, H.; Sakurai, K. Blockchain for iot-based digital supply chain: A survey. In Proceedings of the International Conference on Emerging Internetworking, Data & Web Technologies, Kitakyushu, Japan, 24–26 February 2020; Springer: Cham, Switzerland, 2020; pp. 564–573. [Google Scholar]
  31. Simmons, G.J. Symmetric and asymmetric encryption. ACM Comput. Surv. CSUR 1979, 11, 305–330. [Google Scholar] [CrossRef]
  32. Islam, T.; Youki, R.A.; Chowdhury, B.R.; Hasan, A.S.M. An ECC Based Secure Communication Protocol for Resource Constraints IoT Devices in Smart Home. In Proceedings of the International Conference on Big Data, IoT, and Machine Learning, Cox’s Bazar, Bangladesh, 23–25 September 2021; Springer: Singapore, 2022; pp. 431–444. [Google Scholar]
  33. Hao, X.; Yu, L.; Zhiqiang, L.; Zhen, L.; Dawu, G. Dynamic practical byzantine fault tolerance. In Proceedings of the 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China, 30 May–1 June 2018; pp. 1–8. [Google Scholar]
  34. Wu, F.; Xu, L.; Li, X.; Kumari, S.; Karuppiah, M.; Obaidat, M.S. A lightweight and provably secure key agreement system for a smart grid with elliptic curve cryptography. IEEE Syst. J. 2018, 13, 2830–2838. [Google Scholar] [CrossRef]
  35. Haque, R.U.; Hasan, A.S.M.; Jiang, Q.; Qu, Q. Privacy-preserving K-nearest neighbors training over blockchain-based encrypted health data. Electronics 2020, 9, 2096. [Google Scholar] [CrossRef]
  36. Sidorov, M.; Ong, M.T.; Sridharan, R.V.; Nakamura, J.; Ohmura, R.; Khor, J.H. Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply Chains. IEEE Access 2019, 7, 7273–7285. [Google Scholar] [CrossRef]
  37. Mujahid, U.; Islam, M.N.; Sarwar, S. A new ultralightweight RFID authentication protocol for passive low cost tags: KMAP. Wirel. Pers. Commun. 2017, 94, 725–744. [Google Scholar] [CrossRef]
  38. Fan, K.; Gong, Y.; Liang, C.; Li, H.; Yang, Y. Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Secur. Commun. Netw. 2016, 9, 3095–3104. [Google Scholar] [CrossRef] [Green Version]
  39. Jangirala, S.; Das, A.K.; Vasilakos, A.V. Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment. IEEE Trans. Ind. Inform. 2019, 16, 7081–7093. [Google Scholar] [CrossRef]
Figure 1. The internal structure of a smart contract for on chain transaction.
Figure 1. The internal structure of a smart contract for on chain transaction.
Symmetry 14 00064 g001
Figure 2. IoT-enabled P2P ecosystem of the proposed supply chain management.
Figure 2. IoT-enabled P2P ecosystem of the proposed supply chain management.
Symmetry 14 00064 g002
Figure 3. Registration process of M through protocol Φ .
Figure 3. Registration process of M through protocol Φ .
Symmetry 14 00064 g003
Figure 4. Verification of PK and corresponding SP through protocol Γ .
Figure 4. Verification of PK and corresponding SP through protocol Γ .
Symmetry 14 00064 g004
Figure 5. Authentication process of M and D through protocol Γ .
Figure 5. Authentication process of M and D through protocol Γ .
Symmetry 14 00064 g005
Figure 6. Performance analysis of Hyperledger Fabric and Ethereum. (a) represents the execution time where the x-axis shows the number of transactions and the y-axis shows the time in seconds for each group of transactions. (b) represents the average latency where the x-axis presents the number of transactions, and the y-axis presents the time in seconds for each set of transactions, and (c) represents the average throughput where the x-axis holds the number of transactions, and the y-axis holds the number of transaction per second (tps)) for each set of transactions. (a) Execution time; (b) Average latency; (c) Average throughput.
Figure 6. Performance analysis of Hyperledger Fabric and Ethereum. (a) represents the execution time where the x-axis shows the number of transactions and the y-axis shows the time in seconds for each group of transactions. (b) represents the average latency where the x-axis presents the number of transactions, and the y-axis presents the time in seconds for each set of transactions, and (c) represents the average throughput where the x-axis holds the number of transactions, and the y-axis holds the number of transaction per second (tps)) for each set of transactions. (a) Execution time; (b) Average latency; (c) Average throughput.
Symmetry 14 00064 g006
Figure 7. Performance analysis of protocol Φ and Γ on Hyperledger Fabric. (a) represents the execution time where x-axis shows the number of transactions and the y-axis shows the time in seconds for each group of transactions. (b) represents the average latency where x-axis presents the number of transactions, and the y-axis presents the time in seconds for each set of transactions, and (c) represents the average throughput where x-axis holds the number of transactions, and the y-axis holds the number of transaction per second (tps)) for each set of transactions. (a) Execution time; (b) Average latency; (c) Average throughput.
Figure 7. Performance analysis of protocol Φ and Γ on Hyperledger Fabric. (a) represents the execution time where x-axis shows the number of transactions and the y-axis shows the time in seconds for each group of transactions. (b) represents the average latency where x-axis presents the number of transactions, and the y-axis presents the time in seconds for each set of transactions, and (c) represents the average throughput where x-axis holds the number of transactions, and the y-axis holds the number of transaction per second (tps)) for each set of transactions. (a) Execution time; (b) Average latency; (c) Average throughput.
Symmetry 14 00064 g007
Figure 8. Performance analysis of the proposed scheme with the method of other domains in terms of communication cost and number of the exchanged message. (a) Comparison for communication cost; (b) Comparison for number of exchanged message.
Figure 8. Performance analysis of the proposed scheme with the method of other domains in terms of communication cost and number of the exchanged message. (a) Comparison for communication cost; (b) Comparison for number of exchanged message.
Symmetry 14 00064 g008
Table 1. An overview of existing research on privacy-preserving SCM adopting IoT, cryptography, and Blockchain technologies.
Table 1. An overview of existing research on privacy-preserving SCM adopting IoT, cryptography, and Blockchain technologies.
StudyYearState of the Art Technologies AdoptionSecurity Parameters Covered
CryptographyBlockchainAuthenticationConfidentiality
Light WeightHeavy Weight
Caro [21]2018----
Abdel-Basset [22]2018---
Malik [18]2019----
Tsang [19]2019----
Shi [20]2019-
Cui [23]2019----
Matteo [25]2019---
Cocco [24]2021----
Bhutta [26]2021---
Proposed2021-
Table 2. Notations.
Table 2. Notations.
SignMeaningsSignMeanings
M manufacturer D distributor
R retailer C customer
SP service provider ID identity
PK public key SK private Key
A adversaries p , q two large primes
E ( ) elliptic curve F p finite field
Z q * multiplicative group P a generator
nsecurity parameter h ( ) hash function
i o t IoT device DE ( ) decryption function
r , u , v nonce EN ( ) encryption function
Φ registration protocol Γ authentication protocol
SEK session key MA message
DS digital signature SN SP sign
Table 3. Individual entities and their roles.
Table 3. Individual entities and their roles.
EntitiesRoles
Manufacturerproduces the product and sells it to the D
Distributorpurchase the product from M and sells it to the R
Retailerbuys the the product from D and sells it to the C
Customerare the end user who purchase the product from the R
Service Providerare responsible for registering M , D , and R into the system
Table 4. Execution time analysis.
Table 4. Execution time analysis.
AttributeEntitiesTime (millisecond, ms)
Proposed method SP 2.049688
M 4.534202
D 4.011596
R 4.373648
Table 5. Comparison of communication cost (Co-co) and number of exchanged message (Ex-me).
Table 5. Comparison of communication cost (Co-co) and number of exchanged message (Ex-me).
AttributeCo-coEx-me
Sidorov [36]17605
Mujahid [37]9604
LRMAPC [38]14405
ULRMAPC [38]16325
LBRAPS [39]22405
Proposed12803
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Hasan, A.S.M.T.; Sabah, S.; Haque, R.U.; Daria, A.; Rasool, A.; Jiang, Q. Towards Convergence of IoT and Blockchain for Secure Supply Chain Transaction. Symmetry 2022, 14, 64. https://doi.org/10.3390/sym14010064

AMA Style

Hasan ASMT, Sabah S, Haque RU, Daria A, Rasool A, Jiang Q. Towards Convergence of IoT and Blockchain for Secure Supply Chain Transaction. Symmetry. 2022; 14(1):64. https://doi.org/10.3390/sym14010064

Chicago/Turabian Style

Hasan, A S M Touhidul, Shabnam Sabah, Rakib Ul Haque, Apubra Daria, Abdur Rasool, and Qingshan Jiang. 2022. "Towards Convergence of IoT and Blockchain for Secure Supply Chain Transaction" Symmetry 14, no. 1: 64. https://doi.org/10.3390/sym14010064

APA Style

Hasan, A. S. M. T., Sabah, S., Haque, R. U., Daria, A., Rasool, A., & Jiang, Q. (2022). Towards Convergence of IoT and Blockchain for Secure Supply Chain Transaction. Symmetry, 14(1), 64. https://doi.org/10.3390/sym14010064

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop