SoK: Fighting Counterfeits with Cyber-Physical Synergy Based on Physically-Unclonable Identifiers of Paper Surface
- URL: http://arxiv.org/abs/2408.02221v1
- Date: Mon, 5 Aug 2024 03:53:41 GMT
- Title: SoK: Fighting Counterfeits with Cyber-Physical Synergy Based on Physically-Unclonable Identifiers of Paper Surface
- Authors: Anirudh Nakra, Min Wu, Chau-Wai Wong,
- Abstract summary: Counterfeit products cause severe harm to public safety and health by penetrating supply chains.
Numerous anti-counterfeiting techniques have been proposed, among which the use of inherent, unclonable irregularities of paper surfaces has shown considerable potential as a high-performance economical solution.
This work aims to systematically unify these two separate but connected research areas by comprehensively analyzing the needs of supply chains.
- Score: 13.15096300540772
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Counterfeit products cause severe harm to public safety and health by penetrating untrusted supply chains. Numerous anti-counterfeiting techniques have been proposed, among which the use of inherent, unclonable irregularities of paper surfaces has shown considerable potential as a high-performance economical solution. Prior works do not consider supply chains cohesively, either focusing on creating or improving unclonable identifiers or on securing digital records of products. This work aims to systematically unify these two separate but connected research areas by comprehensively analyzing the needs of supply chains. We construct a generalized paper-based authentication framework and identify important shortcomings and promising ideas in the existing literature. Next, we do a stage-wise security analysis of our consolidated framework by drawing inspiration from works in signal processing, cryptography, and biometric systems. Finally, we examine key representative scenarios that illustrate the range of practical and technical challenges in real-world supply chains, and we outline the best practices to guide future research.
Related papers
- Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - SPOQchain: Platform for Secure, Scalable, and Privacy-Preserving Supply Chain Tracing and Counterfeit Protection [46.68279506084277]
This work proposes SPOQchain, a novel blockchain-based platform that provides comprehensive traceability and originality verification.
It provides an analysis of privacy and security aspects, demonstrating the need and qualification of SPOQchain for the future of supply chain tracing.
arXiv Detail & Related papers (2024-08-30T07:15:43Z) - On the Detection of Reviewer-Author Collusion Rings From Paper Bidding [71.43634536456844]
Collusion rings pose a major threat to the peer-review systems of computer science conferences.
One approach to solve this problem would be to detect the colluding reviewers from their manipulated bids.
No research has yet established that detecting collusion rings is even possible.
arXiv Detail & Related papers (2024-02-12T18:12:09Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Object-Centric Conformance Alignments with Synchronization (Extended Version) [57.76661079749309]
We present a new formalism that combines the ability of object-centric Petri nets to capture one-to-many relations and the one of Petri nets with identifiers to compare and synchronize objects based on their identity.
We propose a conformance checking approach for such nets based on an encoding in satisfiability modulo theories (SMT)
arXiv Detail & Related papers (2023-12-13T21:53:32Z) - Ring-A-Bell! How Reliable are Concept Removal Methods for Diffusion Models? [52.238883592674696]
Ring-A-Bell is a model-agnostic red-teaming tool for T2I diffusion models.
It identifies problematic prompts for diffusion models with the corresponding generation of inappropriate content.
Our results show that Ring-A-Bell, by manipulating safe prompting benchmarks, can transform prompts that were originally regarded as safe to evade existing safety mechanisms.
arXiv Detail & Related papers (2023-10-16T02:11:20Z) - Implementation of Autonomous Supply Chains for Digital Twinning: a
Multi-Agent Approach [43.89334324926175]
We present an autonomous economic agent-based technical framework for autonomous supply chains.
We illustrate this framework with a prototype, studied in a perishable food supply chain scenario, and discuss possible extensions.
arXiv Detail & Related papers (2023-09-09T13:16:52Z) - Decentralizing Supply Chain Anti-Counterfeiting Systems Using Blockchain
Technology [0.0]
This research proposes the Decentralized NFC-Enabled Anti-Counterfeiting System (dNAS)
dNAS is proposed and developed to facilitate trustworthy data retrieval, verification and management.
It provides a secure and immutable scientific data tracking and management platform on which provenance records are validated.
arXiv Detail & Related papers (2021-02-02T12:17:10Z) - Toward Blockchain-Enabled Supply Chain Anti-Counterfeiting and
Traceability [0.0]
Development of autonomous and decentralized solution for supply chain anti-counterfeiting and traceability.
Vulnerabilities of centralized product anti-counterfeiting solutions could possibly lead to system failure.
Key areas of decentralization and feasible mechanisms of developing decentralized and distributed product anti-counterfeiting and traceability ecosystems.
arXiv Detail & Related papers (2021-01-31T14:18:37Z) - SoK: Blockchain Solutions for Forensics [8.185918509343818]
This paper provides an overview and classification of the available blockchain-based digital forensic tools.
We also offer an analysis of the various benefits and challenges of the symbiotic relationship between blockchain technology and the current digital forensics approaches.
arXiv Detail & Related papers (2020-05-26T11:43:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.