**Abbreviations**


### **Appendix A. Statistical Analyses on Research References**

The research references listed in this research are categorized by year of publication, as depicted in Figure A1, where 86% of the research references were published between 2012 and 2021.

**Figure A1.** Research References By Publication Year.

The research references listed in this research are categorized by publisher, as depicted in Figure A2, where 20%, 13%, and 9% of the research references were published by IEEE, Springer, and Elsevier, respectively.

**Figure A2.** Research references by publisher.

### **Appendix B. Security Analysis on NAS**

### *Appendix B.1. Asset Analysis of NAS*

The asset analysis of NFC-Enabled Anti-Counterfeiting System (NAS) is demonstrated in Figure A3.


**Figure A3.** Asset analysis of NAS.

### *Appendix B.2. Threat Analysis of NAS*

The threat analysis of NFC-Enabled Anti-Counterfeiting System (NAS) is demonstrated in Figure A4.


**Figure A4.** Threat analysis of NAS.

### **Appendix C. Proposed System Requirement of dNAS**

*Fundamental System Requirements of dNAS*

The system requirements of the proposed Decentralized NFC-Enabled Anti-Counterfeiting System (dNAS) are demonstrated in Figure A5.


**Figure A5.** System requirements of proposed dNAS.
