Uploaded by Tanzeel's N

39515971

advertisement
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
"Jnana Sangama", Belgavi-590 018, Karnataka, India
A
PROJECT REPORT
On
“FAKE PRODUCT IDENTIFICATION USING
BLOCKCHAIN”
Submitted in Partial Fulfillment of the requirements for the award of the degree of
BACHELOR OF ENGINEERING
IN
COMPUTER SCIENCE AND ENGINEERING
SUBMITTED BY
HARSHITHA G L
1SJ18CS039
LAVANYA V S
1SJ18CS051
MUSHAFFIQ AHMED MUJALE
1SJ18CS059
PAVAN KALYAN Y
1SJ18CS071
Carried out at
B G S R&D Centre,
Dept of CSE,
SJCIT
Under the guidance of
Dr. Seshaiah M,BE, M.TECH,Ph.D
Associate Professor
Dept. of CSE, SJCIT
S J C INSTITUTE OF TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CHIKKABALLAPUR-562 101
2021-2022
DECLARATION
We Harshitha G L(1SJ18CS039), Lavanya V S (1SJ18CS051), Mushaffiq Ahmed
Mujale (1SJ18CS059), Pavan Kalyan Y (1SJ18CS071) Student of VIII semester B.E in
Computer Science and Engineering at S J C Institute of Technology, Chickballapur, hereby
declare that this dissertation work entitled “Fake Product Identification using Blockchain”
has been carried out at B.G.S R&D Centre, Dept. of CSE, SJCIT under the guidance of guide
Dr.Seshaiah M, Associate Professor, Dept. of CSE, SJC Institute of Technology,
Chickballapur and submitted in the partial fulfilment for the award of degree Bachelor of
Engineering in Computer Science and Engineering of Visvesvaraya Technological
University, Belagavi during the academic year 2021-2022. We further declare that the report
had not been submitted to another university for the award of any other degree.
Place:Chickballapur
Date:
HARSHITHA G L
1SJ18CS039
LAVANYA V S
1SJ18CS051
MUSHAFFIQ AHMED MUJALE
1SJ18CS059
PAVAN KALYAN Y
1SJ18CS071
i
ABSTRACT
Blockchain innovations have acquired interest in the course of the most recent years. One
of the most talked about issues is currency exchange, but its application is not limited only to
Digital currency. so it has the potential to influence different business sectors. Blockchain
technology has brought greater transparency and ease in large transactions. We can detect
counterfeit goods using blockchain technology. The question that arises when buying any item in
today's world is whether it is fake or not. And the lack of these things has been shown a huge
impact on economic progress. Therefore, in order to curb all counterfeit goods, it is important to
bring transparency about the goods to the notice of the consumers. The growing presence of
counterfeit and unsafe products in the world is a cause for concern and blockchain technology
has taken the next step towards its complete annihilation. Not only the use of technology will
reduce the production of counterfeit goods, but everyone needs to be aware of this. By producing
and packaging the right items each of those items needs to be given a digital code with its own
identity. The software implementation process in which the product code is scanned using this
application and then verify if the given product is counterfeit or not.
i
ACKNOWLEDGEMENT
With reverential pranam, we express my sincere gratitude and salutations to the feet of
his holiness Paramapoojya Jagadguru Byravaikya Padmabhushana Sri Sri Sri
Dr. Balagangadharanatha Maha Swamiji, and his holiness Paramapoojya Jagadguru
Sri Sri Sri Dr. Nirmalanandanatha Maha Swamiji , Sri Adichunchanagiri Mutt for their
unlimited blessings.
First and foremost we wish to express our deep sincere feelings of gratitude to our
institution, Sri Jagadguru Chndrashekaranatha Swamiji Institute of Technology, for
providing us an opportunity for completing our Project Work successfully.
We extend deep sense of sincere gratitude to Dr. G T Raju, Principal, S J C Institute of
Technology, Chickballapur, for providing an opportunity to complete the Project Work.
We
extend
special
in-depth,
heartfelt,
and
sincere
gratitude
to
HOD
Dr. Manjunatha Kumar B H, Head of the Department, Computer Science and
Engineering, S J C Institute of Technology, Chickballapur, for his constant support and
valuable guidance of the Project Work.
We convey our sincere thanks to Project Guide Dr. Seshaiah M, Associate Professor,
Department of Computer Science and Engineering, S J C Institute of Technology, for
his/her constant support, valuable guidance and suggestions of the Project Work.
We also feel immense pleasure to express deep and profound gratitude to Project Coordinators Prof. PradeepKumar G M and Prof Shrihari M R, Assistant Professors,
Department of Computer Science and Engineering, S J C Institute of Technology, for their
guidance and suggestions of the Project Work.
Finally, we would like to thank all faculty members of Department of Computer Science
and Engineering, S J C Institute of Technology, Chickaballapur for their support.
We also thank all those who extended their support and co-operation while bringing out
this Project Report.
Harshitha G L(1SJ18CS039)
Lavanya V S(1SJ18CS051)
Mushaffiq Ahmed Mujale(1SJ18CS059)
Pavan Kalyan Y (1SJ18CS071)
ii
TABLE OF CONTENTS
Declaration
i
Abstract
ii
Acknowledgement
iii
Table of Contents
iv
List of Figures
vi
List of Tables
viii
CHAPTER NO.
1
CHAPTER TITLE
PAGE NO.
INTRODUCTION
1-5
1.1
Overview
1-2
1.2
Problem Statement
2
1.3
Significance and Relevance of Work
2-3
1.4
Objectives
3
1.5
Methodology
3-4
1.6
Organization of the Report
5
2
LITERATURE SURVEY
6-9
3
SYSTEM REQUIREMENTS AND
SPECIFICTAION
10-15
3.1
System Requirement and Specification
10
3.2
Software Specification
11-13
3.3
Functional Requirements
14
3.4
Non – Functional Requirements
14
3.5
Performance Requirements
15
SYSTEM ANALYSIS
16-17
Existing System
16
4
4.1
iv
4.2
Proposed System
16-17
SYSTEM DESIGN
18-25
5.1
System Architecture
18-22
5.2
Use Case Diagram
23
5.3
Data Flow Diagram
24
5.4
Sequence Diagram
25
IMPLEMENTATION
26-30
Algorithm/Pseudocode
27-30
TESTING
31-35
Methods of Testing
31
7.1.1
Unit Testing
32
7.1.2
Integration Testing
32
7.1.3
Validation Testing
33
7.1.4
Acceptance Testing
33
Test Cases
34-35
8
PERFORMANCE ANALYSIS
36-38
9
CONCLUSION AND FUTURE
ENHANCEMENT
39
BIBILOGRAPHY
40
APPENDIX
41-48
PAPER PUBLICATION DETAILS
49-55
5
6
6.1
7
7.1
7.2
v
LIST OF FIGURES
Figure No.
Name of the Figure
Page No.
Figure 1
Block Diagram of Fake Product Identification
3
Figure 2
Manufacturer Module
12
Figure 3
Distributor Module
14
Figure 4
Retailer Module
15
Figure 5
Consumer Module
16
Figure 6
System Architecture
17
Figure 7
Use Case Diagram
23
Figure 8
Data Flow Diagram
24
Figure 9
Sequence Diagram
25
Figure 10
Block diagram of Performance analysis
36
Figure 11
Graph for ETH consumption in RFID and QR
code
38
SNAPSHOTS
Figure A1
User details storing
41
Figure A2
Remix IDE Initializing
41
Figure A3
Solidity Compilation
42
Figure A4
Metamask pops up after deployment.
42
Figure A5
Gas Estimation for Transaction
43
Figure A6
Ganache Blockchain
43
Figure A7
Blocks Generated
44
Figure A8
Transactions Recorded
44
Figure A9
Login Page
45
Figure A10
Signup Page
45
vi
Figure A11
QR code generation
46
Figure A12
QR code scan and product track display
46
Figure A13
Scanning shipment
47
Figure A14
Invalid image upload to QR code Scanner
47
vii
LIST OF TABLES
TABLE NO.
Table Name
Page No.
Table 1
Manufacturer Test Case
24
Table 2
Distributor Test Case
24
Table 3
Retailer Test Case
25
Table 4
Consumer Test Case
25
Table 5
Comparison between QR code and RFID
38
viii
CHAPTER 1
INTRODUCTION
1.1 Overview
Supply chain counterfeiting is a universal problem that plagues almost every industry.
There are counterfeit electronic components, car parts, consumer goods, pharmaceuticals —
even counterfeit wines. While manufacturers and distributors lose billions of dollars annually
to counterfeit goods, the risks to consumers can be even greater. Faulty counterfeit auto parts
or consumer products can overheat or catch fire, and more than 1 million people each year
lose their lives due to counterfeit drugs.While manufacturers, distributors, shippers and
government agencies are actively working to remove counterfeit goods from the supply
chain, it’s challenging to identify counterfeits. Counterfeit goods cost global brands more
than $232 billion in 2018. The counterfeit drug market alone costs more than $200 billion per
year - enough to bring 13 new drugs to market annually. Losses from counterfeit automotive
parts are estimated to be $2.2 billion per year, not counting those from safety issues and legal
liability. Counterfeit consumer electronics cost more than $100 billion per year, and bogus
computer chips cost U.S. companies $7.5 billion annually, as well as 11,000 jobs.Identifying
counterfeit goods that enter the supply chain can be difficult, if not impossible. The only way
to beat counterfeiters is to apply a fool proof means of authenticating goods from their point
of origin to final delivery. New cloud-based security technology is now available that can
create unique, fool proof digital identifiers for products so that they can be tracked at every
point in the supply chain.
Identification of counterfeit merchandise in cutting-edge market is being a exceptional
assignment for customers and it is very life threatening for the customers while this takes
vicinity in pharmaceutical fields. Other fields like electronics, clothing, fashion-accessories
additionally face a large effect on their emblem because of counterfeit products. E-commerce
has visible exceptional boom through the years from $39 billion in 2017 and it is projected to
upward push to $200 billion via 2026[2]. This comes within the wake of extending
penetration of the net and cell phones. After numerous market surveys it is observed that the
counterfeit merchandise are growing rapidly and the rise of counterfeit products can badly
affect the improvement and economic boom. Additionally because of this the many top
companies have become bad comments and dropping their positions from the logo list.
1
Fake Product Identification using Blockchain
Introduction
Counterfeit merchandise are twins of the real merchandise in the marketplace. Often all
reputed businesses are operating to forestall this system that is dangerous to all people in the
entire international. The various branded or reputed groups are running on contemporary
technology to identify the counterfeited products from the original product inside the market
and to enhance this operating, the IT area can give them fine signals and can assist to prevent
counterfeit items. Among those numerous technologies available inside the it area blockchain
is one of the promising Technologies which may be used for decreasing the counterfeiting of
goods. A blockchain is a kind of dispensed ledger that is designed to prevent tampering.
Primarily based on the allotted consensus Set of rules, clever contracts and encrypted
algorithms [3]. Blockchain generation facilitates to clear up the Problem of counterfeiting of
a product. And on this studies we proposed a product surveillance blockchain device with the
intention to share statistics about merchandise from the manufacturer to the clients. We are
growing such an application that will work on smart phones so one can Be giving all of the
designated data about the products to the client who orders that product and help them to
identify if the product is authenticated or counterfeited
1.2 Problem Statement
The worldwide improvement of an item or innovation consistently accompanies
hazard factors, for example, forging and duplication. Forging items can influence the
organization's name and the client's wellbeing. Presently days discovery of phony item is the
greatest test. Fake items are causing a significant impact on the organization and the client's
wellbeing. Hence, item creators are confronting enormous misfortune.
India and different nations are battling such fake and fake items. In the proposed
framework, the framework produces QR codes utilizing Blockchain innovation. This
innovation stores exchange records in blocks. These squares are secure and difficult to access
and change the data from it. By utilizing a QR code we can recognize the fake item
1.3 Significance and Relevance of Work
A blockchain supply chain can help participants record price, date, location, quality,
certification, and other relevant information to more effectively manage the supply chain. The
availability of this information within blockchain can increase traceability of material supply
chain, lower losses from counterfeit and gray market, improve visibility and compliance over
Dept. of CSE, SJCIT
2
2021-2022
Fake Product Identification using Blockchain
Introduction
outsourced contract manufacturing, and potentially enhance an organization's position as a
leader in responsible manufacturing.
1.4 Objectives
The idea of this project came into existence because of the increase in the counterfeit
products.
The objectives of this project are:
•
The goal of our project is to find whether a given product is fake or original using
Blockchain Technology.
•
To ensure the identification and traceability of real product throughout the supply
chain ,we propose a fully functional Blockchain system to prevent product
counterfeting , for what are creating web interface for the user to scan the information
of the product through the product QR code.
1.5 Methodology
Figure 1 Block Diagram of Fake Product Identification
Business runs on information. The faster it’s received and the more accurate it is, the better.
Blockchain is ideal for delivering that information because it provides immediate, shared and
completely transparent information stored on an immutable ledger that can be accessed only by
Dept. of CSE, SJCIT
3
2021-2022
Fake Product Identification using Blockchain
Introduction
permissioned network members. A blockchain network can track orders, payments, accounts,
production and much more. And because members share a single view of the truth, you can see all
details of a transaction end to end, giving you greater confidence, as well as new efficiencies and
opportunities. After the product is recorded in a network it will create a smart contract and a unique
QR code of the product in which the details of the product is mentioned in an encrypted text form.The
manufacturer will ship the product to the distributor and status is set as shipped; it will not change the
ownership of the product until a request from both parties is approved to buy and sell the productt.
Once the consumers receive the product the Buyers can scan QR code allocated to the item and verify
the authenticity.
SHA-256 Algorithm
Secure Hashing Algorithm (SHA) - 256 is the hash capacity and mining calculation of
the Bitcoin convention, alluding to the cryptographic hash work that yields a 256 pieces in
length esteem. It directs the creation and the executives of addresses, and is likewise utilized
for exchange check. Bitcoin utilizes twofold SHA-256, implying that it applies the hash
capacities two times.
The calculation is a variation of the SHA-2 (Secure Hash Algorithm 2), created by the
National Security Agency (NSA). SHA-256 is likewise utilized in well known encryption
conventions.
Proof of Work (PoW) is the original consensus algorithm in a blockchain network.
The algorithm is used to confirm the transaction and creates a new block to the chain. In this
algorithm, minors (a group of people) compete against each other to complete the transaction
on the network. The process of competing against each other is called mining. As soon as
miners successfully created a valid block, he gets rewarded. The most famous application of
Proof of Work (PoW) is Bitcoin.
Producing proof of work can be a random process with low probability. In this, a lot
of trial and error is required before a valid proof of work is generated. The main working
principle of proof of work is a mathematical puzzle which can easily prove the solution.
Proof of work can be implemented in a blockchain by the Hashcash proof of work system.
Dept. of CSE, SJCIT
4
2021-2022
Fake Product Identification using Blockchain
Introduction
1.6 Organization of the Report
This report is organised into majorly into 5 different sections and each section provides
detailed/ brief description about the project.
The 5 sections mentioned are:
Chapter 1 Introduction: It consists of the overview of the project and identifies the problem
in the existing system. It also explains the significance and relevance of the project to solve
the identified problems.
Chapter 2 Literature Survey: It consists of the brief explanation of the IEEE papers and
some other journal papers which will be referred during the implementation of the project
Chapter 3 System Requirements Specification: It contains the details of both hardware and
software requirements needed to implement the project.
Chapter 4 System Design: It includes defining software and hardware architecture,
components and data to enable a system to satisfy a set of well-specified operational
requirements.
Chapter 5 Implementation: It contains the concept of model and algorithm on which our
model works.
Chapter 6 Testing: It contains methods of testing and test cases to determine whether the
model is working the way it should and producing the expected results.
Chapter 7 System Analysis: It contains the details of existing system and its limitations and
proposed system and its advantages.
Chapter 8 Performance Analysis: It contains quantitative data.
Chapter 9 Conclusion and Future Enhancement: It contains summary of our entire model
and how our model can be updated in future.
Bibliography contains the references to the referred paper that is mentioned in the literature
survey
Dept. of CSE, SJCIT
5
2021-2022
CHAPTER 2
LITERATURE SURVEY
2.1 A Survey on Blockchain Technology: Evolution, Architecture and
Security
Authors: Muhammad Nasir Mumtaz Bhutta, Amir A. Khwaja, Adnan Nadeem, Hafiz
Farooq Ahmad , Muhammad Khurram Khan, Moataz A. Hanif, Houbing Song, Majed
Alshamari , and Yue Cao
This survey paper has covered architecture of cryptocurrencies, smart contracts and
general Blockchain based applications. The paper has provided a perspective to describe the
Blockchain architectures in relation to cryptocurrencies, smart contracts and other
applications. The research advances in consensus are also highlighted with some key
development and application frameworks. A detailed discussion with respect to future and
open research avenues is also performed, which could help to pave the way for researchers to
explore the key challenging areas in the Blockchain field.
Disadvantages
• Doesn’t give idea about hashing and all consensus algorithms
2.2 Product Traceability using Blockchain
Authors: Rishabh Sushil Bhatnagar, Sneha Manoj Jha , Shrey Surendra Singh,
Rajkumar Shende
The conventional SCM systems are widely used in the current market whereas
blockchain is a relatively new system and is yet to be introduced in the industry on a large
scale. The current SCM systems have prevailed so long in the market due to its easy and
cheaper implementation on a large scale. Despite being used on a large-scale platform, these
systems have their flaws which have prevailed since the existence of these systems. The
current system is opaque in nature and is very vulnerable to various frauds and scams due to
poor maintenance of the records of the transactions within the system. Lack of trust between
the participating entities is an issue yet to be resolved. The trust of the customer in the system
is compromised by not providing a quality assured product even though it is a major factor in
the growth of any business. Even with all these flaws, these systems are being used by
various market giants as the prices of the products can be easily exploited with any
credibility.
6
Fake Product Identification using Blockchain
Literature Survey
Disadvantages
• Participation of too many entities, makes it difficult for transactions.
2.3 A Blockchain-based Supply Chain Quality Management Framework
Author : Si Chen , Rui Shi , Zhuangyu Ren , Jiaqi Yan , Yani shi , Jinyu Zhang
In this appropriate paper, they proposed a framework for blockchain based SCQI. This
framework will provide a theoretical basis to intelligent quality management of supply chain
based on the blockchain technology. Furthermore, it provides a foundation to develop
theories about information resource management in distributed, virtual organizations,
especially distributed, cross-organizational and decentralized management theory.
Disadvantages
• Design of complex smart contract system which is much inefficient.
2.4 A Block Chain based Management System for Detecting Counterfeit
Product in Supply Chain
Authors: M.C.Jayaprasanna, .V.A.Soundharya , M.Suhana, S.Sujatha
In this Paper, they have discussed about counterfeit products are growing
exponentially in online and black-market. The block market is a biggest challenge in supply
chain. The government has introduced several laws and regulations against fake products
even though the government cannot control counterfeit products. Therefore, there is a need of
an approach for detecting counterfeit products and providing security techniques to alert both
manufacturer and consumer in supply chain. Manufacturers may use the block chain
management system to store relevant product sales information within the block chain, which
is accessible to all. The total number of sales the seller can sell and the rest left behind by the
seller are transparent. The user can perform vendor-side verification using an encryption
algorithm. Only way to decrypt is to use a private key of the owner. In this paper, we
proposed block chain management system activates the consumer and enterprise vendor to
track and identify the real product using a Smartphone. It also will detect counterfeit products
as well as authenticity of manufacturer for both end user and enterprise vendor.
Disadvantages
• Using RFID (Radio frequency Identification) takes too much time for computing in a
BCBM(Block Chain Based Management System).
Dept. of CSE, SJCIT
7
2021-2022
Fake Product Identification using Blockchain
2.5
A
Blockchain-Based
Literature Survey
Application
System
for
Product
Anti-
Counterfeiting
Authors: Jinhua Ma , Shih-Ya Lin , Xin Chen , Hung-Min Sun
In this particular Paper, Manufacturers can use the system to store relevant
information on product sales in Blockchain which is accessible to everyone. The total amount
of sales that can be sold by the seller and the number of products currently left by the seller
are transparent. The user can use the functions provided by our system to immediately
perform vendor-side verification. The system provides identity verification by using digital
signatures. There are no other means to decrypt the private key of the key owner unless the
key owner accidentally leaks his key. In their system analysis result, the cost of the initial
product record contract will only cost 1.2893394289 US dollars, and the cost of each product
sale process will cost 0.17415436749 US dollars.
Disadvantages
• This proposed system eventhough it uses a ethereum Blockchain which is best for
smart contracts. It uses a digitalsignatures for transactions. Everytime Using a digital
signatures for all transactions becomes clumsy.
2.6 A Blockchain-based decentralized system to ensure the transparency of
organic food supply chain
Authors: B. M. A L. Basnayake, C. Rajapakse
This study is based on the applicability of Blockchain concept to improving
transparency and validity of agricultural supply chain and its process. Since recent past, there
has been a rapid change in the production of food and its raw materials. An efficient method
to bridge the gap between the farmer producing commodities in the market and the end
customer was studied. Blockchain based architecture and its concepts were taken for
implanting trustworthiness and transparency within the users and their transactions. In this
paper as there is a drawback of farmers may not be knowing about the product traceability
once they register.
Disadvantages
• In this blockchain only farmers has the access to start or end transaction at any
moment. As most of the farmers being an illiterates they don’t have much understanding of
blockchains.
Dept. of CSE, SJCIT
8
2021-2022
Fake Product Identification using Blockchain
2.7
User
Interface
of
Literature Survey
Blockchain-Based
Agri-Food
Traceability
Applications
Authors: Atima Tharatipyakul and Suporn Pongnumkul
A Review: Blockchain technology is seen as a way to improve agri-food supply chain
traceability and deliver food quality, safety, and nutrition information to stakeholders.
Limited knowledge on how to design the user interface for the traceability application could
lead to usability issues. As a step towards more usable blockchain-based agri-food
traceability applications, this paper reviewed existing works from a user interface
perspective.
Disadvantages
• Gives an idea about only existing user interface which are inefficient and ambiguous
for users. The design proposed in this system requires high cost.
Dept. of CSE, SJCIT
9
2021-2022
CHAPTER 3
SYSTEM REQUIREMENTS SPECIFICATION
3.1 System Requirements
Hardware Requirements.
Operating Systems: Windows 7 or above.
Hard disk : 20GB
RAM :4GB and above.
Processor: i3 and Above
Software Requirements
Tools : Xampp
Language : Solidity
IDE’s : Visual Studio 2019 and Remix Ethereum IDE (online)
Metamask wallet
Ganache (personal blockchain).
10
Fake Product Identification using Blockchain
System Requirements Specification
3.2 Software Specification
Remix Ethereum IDE
Remix Project is a platform for development tools that use a plugin architecture. It
encompasses sub-projects including Remix Plugin Engine, Remix Libraries, and of course
Remix IDE.
Remix IDE is an open source web and desktop application. It fosters a fast
development cycle and has a rich set of plugins with intuitive GUIs. Remix is used for the
entire journey of contract development with Solidity language as well as a playground for
learning and teaching Ethereum.
Ganache
Ganache is a personal blockchain for rapid Ethereum and Corda distributed
application development. You can use Ganache across the entire development cycle; enabling
you to develop, deploy, and test your dApps in a safe and deterministic environment.
Ganache comes in two flavors: a UI and CLI. Ganache UI is a desktop application
supporting both Ethereum and Corda technology. The command-line tool, ganache-cli
(formerly known as the TestRPC), is available for Ethereum development.
Ganache is used for setting up a personal Ethereum Blockchain for testing your
Solidity contracts. It provides more features when compared to Remix. You will learn about
the features when you work out with Ganache. Before you begin using Ganache, you must
first download and install the Blockchain on your local machine.
Solidity
Solidity is
an object-oriented
programming
language for
implementing smart
contracts on various blockchain platforms, most notably, Ethereum. It was developed by
Christian Reitwiessner, Alex Beregszaszi, and several former Ethereum core contributors.
Programs in Solidity run on Ethereum Virtual Machine.
Solidity is a statically typed programming language designed for developing smart
contracts that run on the Ethereum Virtual Machine (EVM).
Dept. of CSE, SJCIT
11
2021-2022
Fake Product Identification using Blockchain
System Requirements Specification
Solidity uses ECMAScript-like syntax which makes it familiar for existing web
developers; however unlike ECMAScript it has static typing and variadic return types.
Solidity is different from other EVM-targeting languages such as Serpent and Mutan in some
important ways. It supports complex member variables for contracts, including arbitrarily
hierarchical mappings and structs. Solidity contracts support inheritance, including multiple
inheritance with C3 linearization. Solidity introduces an application binary interface (ABI)
that facilitates multiple type-safe functions within a single contract (this was also later
supported by Serpent). The Solidity proposal also includes "Natural Language Specification",
a documentation system for specifying user-centric descriptions of the ramifications of
method-calls.
Metamask
MetaMask is a browser plugin that serves as an Ethereum wallet, and is installed like
any other browser plugin. Once it's installed, it allows users to store Ether and other ERC-20
tokens, enabling them to transact with any Ethereum address.
By connecting to MetaMask to Ethereum-based dapps, users can spend their coins in
games, stake tokens in gambling applications, and trade them on decentralized exchanges
(DEXs). It also provides users with an entry point into the emerging world of decentralized
finance, or DeFi, providing a way to access DeFi apps such as Compound and PoolTogether.
MetaMask’s open platform also plays a key role in promoting Ethereum-based dApp
development for coders and technologists. For developers building a dApp, Metamask is preloaded with fast connections to Ethereum and several test networks via Infura. These built-in
connections allow developers to begin building a new dApp on Ethereum without the need to
set up and run a full network node. This can be helpful for bootstrapped entrepreneurs
looking to build immediately, whether they are creating a simple browser-friendly user
interface (UI) or a full-fledged, mainnet-ready dApp that will support an entirely new
decentralized marketplace.
Additionally, since MetaMask extensions are compatible with popular browsers like
Chrome, Firefox, and Safari, the application makes it easier for developers to create new
applications that are designed to work within traditional browsers. Thus, MetaMask’s role in
Dept. of CSE, SJCIT
12
2021-2022
Fake Product Identification using Blockchain
System Requirements Specification
enabling dApp adoption is two-fold: It provides a portal for end users to access dApps, while
also enabling developers to streamline their path to getting those applications to market.
Ethereum (ETH)
Ethereum is a permissionless, non-hierarchical network of computers (nodes) that
build and come to a consensus on an ever-growing series of "blocks", or batches of
transactions, known as the blockchain. Each block contains an identifier of the chain that
must precede it if the block is to be considered valid. Whenever a node adds a block to its
chain, it executes the transactions in the block in the order they are listed, thereby altering the
ETH balances and other storage values of Ethereum accounts. These balances and values,
collectively known as the "state", are maintained on the node separately from the blockchain,
in a Merkle tree.
Each node communicates with a relatively small subset of the network—its "peers".
Whenever a node wishes to include a new transaction in the blockchain, it sends a copy of the
transaction to each of its peers, who then send a copy to each of their peers, and so on. In this
way, it propagates throughout the network. Certain nodes, called miners, maintain a list of all
of these new transactions and use them to create new blocks, which they then send to the rest
of the network. Whenever a node receives a block, it checks the validity of the block and of
all of the transactions therein and, if it finds the block to be valid, adds it to its blockchain and
executes all of those transactions. Since block creation and broadcasting are permissionless, a
node may receive multiple blocks competing to be the successor to a particular block. The
node keeps track of all of the valid chains that result from this and regularly drops the
shortest one: According to the Ethereum protocol, the longest chain at any given time is to be
considered the canonical one.
Ether (ETH) is the cryptocurrency generated by the Ethereum protocol as a reward to
miners in a proof-of-work system for adding blocks to the blockchain. It is the only currency
accepted to pay for transaction fees, which also go to miners. The block-addition reward
together with the transaction fees provide the incentive to miners to keep the blockchain
growing (i.e. to keep processing new transactions). Therefore, ETH is fundamental to the
operation of the network. Each Ethereum account has an ETH balance and may send ETH to
any other account. The smallest subunit of ETH is known as a Wei, named after
cryptocurrency pioneer Wei Dai, and is equal to 10−18 ETH.
Dept. of CSE, SJCIT
13
2021-2022
Fake Product Identification using Blockchain
System Requirements Specification
3.3 Functional Requirements
A functional requirement defines a function of a system or its component. Where a
function is described as a specification of behavior between inputs and outputs.
• System must be automatically connecting to Wallet.
• System should be able to scan the QR code.
• System Should be able to generate the QR code.
• System Should show error message if the uploaded image is not QR code.
• Auto update of scanned location of the QR code.
• Storing all these details in blockchain nodes.
3.4 Non-Functional Requirements
Software requirement can be non-functional and also be a performance requirement.
Nonfunctional requirements are the characteristics or attributes of the system that can judge
its operation.
The nonfunctional requirements are divided into usability, reliability, performance,
Supportability and safety.
Usability
The system must be easy to learn for manufacturers , retailers , distributors and mainly
for consumers.
Reliability
The reliability of the device essentially depends on the software tools such as
metamask, remix IDE, Ganache used for the system development.
Performance
The system shall allow the system administrator to add additional features. The
system needs to be cost-effective to maintain.
Safety
In case of malfunction, scanning from the manufacturers side should be stopped , and
also it must be notified to others that it is not working.
Dept. of CSE, SJCIT
14
2021-2022
Fake Product Identification using Blockchain
System Requirements Specification
3.5 Performance Requirement
• Linking and correct deduction of gas amount for transaction.
• Block generation for each and every transaction.
•
Automatic hub location generation for transaction.
•
Product code generation automatically once registering the product.
Dept. of CSE, SJCIT
15
2021-2022
CHAPTER 4
SYSTEM ANALYSIS
4.1 Existing System
A supply chain is a coordinated network. Therefore, any SCM system must also
have a cohesive structure that enables functionality and visibility along the product
delivery journey. As such, an SCM system would typically integrate features such as
inventory management, warehouse management, purchase-order processing, demand
forecasting, supplier relationship management, logistics planning, and so on.
Also, most SCM systems are integrated with bookkeeping functionalities to enable
the business to manage its ledger and optimize finances effectively.
Over the years, there’s been increased adoption of cloud-based SCM systems as
software-as-a-service (SaaS). Cloud management of the supply chain allows businesses to
track the entire lifecycle of a project, offering close monitoring and adequate visibility at
each touchpoint. It emerged to fill the gaps with traditional SCM systems, which lack the
360° management enabled by cloud technology. Overall, cloud-based SCM systems are
more scalable and efficient.
4.2 Proposed System
A blockchain supply chain can help participants record price, date, location, quality,
certification, and other relevant information to more effectively manage the supply chain. The
availability of this information within blockchain can increase traceability of material supply
chain, lower losses from counterfeit and gray market, improve visibility and compliance over
outsourced contract manufacturing, and potentially enhance an organization's position as a
leader in responsible manufacturing.
As blockchain gains publicity, large corporations and startups are exploring uses of
the technology outside of the financial services industry. Many organizations are already
experimenting with blockchain innovations to fulfill a range of needs. Provenance, a supply
chain transparency start-up, recently completed a six-month pilot for tracking responsible
16
Fake Product Identification using Blockchain
System Analysis
sourcing of tuna in Indonesia via blockchain. Monegraph, a startup launched in 2014, uses
blockchain to secure the usage and sharing rights of digital media such as video clips or
brand-sponsored content and enable sharing of revenue across the media creators, publishers,
and distributors. Skuchain builds blockchain-based B2B trade and supply chain finance
products targeted towards the $18 trillion global trade finance market that involves numerous
entities including buyers, sellers, logistics providers, banks, customs, and third parties.
Blockchain driven innovations in the supply chain will have the potential to deliver
tremendous business value by increasing supply chain transparency, reducing risk, and
improving efficiency and overall supply chain management.
Advantages
➢ It enables easy traceability of products through QR code scanning and location
tracking.
➢ It enables easy registering of products into blockchain and QR code generation
along with product ID.
➢ No data Immutability will take place so that it provides security to our data. It is a
distributed ledger.
Dept. of CSE, SJCIT
17
2021-2022
CHAPTER 5
SYSTEM DESIGN
Manufacturer Module:
Completion of
Manufacturer
Registration
registration
updating the
Product
Registration
details
Storing
Blockchain
Details
Blockchain
generation
Scanning And
Shipping to
Distributer
Generation of
QR Code
Figure 2 Manufacturer Module
MM is mainly composed of two functions: (i) enrolling the manufacturer’s
information in the blockchain and (ii) checking the authorship for a requesting manufacturer
to enroll the product’s EPC.Alg. 1 shows the pseudo-code of enroll Manufacturer(), which
enrolls the manufacturer’s information required when its product is stored in the blockchain.
Since our POMS requires that only one administrator, e.g. GS1, can enroll the manufacturer’s
information, this condition is checked at step 1. If it is True, then the admin enrolls the
manufacturer’s information in the blockchain.
MM (Manufacturers
Manager)
and PM (Products
Manager).
On
the
one
hand, MM offers functions for managing the information of manufacturers, e.g. enrollment of
a company prefix registered in GS1 and manufacturer’s address. On the other hand, PM is
operated by each manufacturer and offers functions to manage the information of products,
e.g. enrollment of a new product and ownership transfer.In contrast to PM, in MM we assume
the existence of an administrator who manages the manufacturers’ information. To avoid
impersonation, only the administrators can modify any manufacturer’s information. One of
the administrative candidates is GS1, because it manages company prefix. Although this may
18
Fake Product Identification using Blockchain
System Design
break the assumption of fully decentralized system, it is inevitable in order to avoid
impersonators, e.g. counterfeiters, from registering themselves as if they are legitimate
manufacturers. Actually, it might be possible to make our MM decentralized by leveraging
the notion of Namecoin . Namecoin is a decentralized domain name system and avoids
“massive” registration by imposing cost for enrollment. However, if our MM might be
constructed by introducing registering fee like Namecoin, there could be a chance for
counterfeiters to illegally register themselves as genuine companies by paying the appropriate
fees. However, it still might be possible to make MM decentralized. This is one of the open
questions regarding the blockchain-based POMS.
Distributer Module:
Distributer
Registration
Completion of
Storing the
registration
location hub
Scanning Shipment
Received
Processing And
Sending To
Shipment
Blockchain
generation
Transaction
Complete
Figure 3 Distributor Module
In contrast to MM, the contract DM is created by each manufacturer and consists of
four main functions:
1. enrollProduct() : Invoked when a manufacturer M first enrolls its own product
specified by unique EPC and claims its initial ownership;
2. shipProduct() : Invoked when a current owner parts with a product and specifies the
recipient;
3. receiveProduct() : Invoked by the new owner to successfully transfer its ownership
when a product is successfully received;
Dept. of CSE, SJCIT
19
2021-2022
Fake Product Identification using Blockchain
System Design
This describes the receive Product() which is for the receiver to confirm the arrival of
the product. The function checks that the claimed EPC is specified by the current owner and
that the status of EPC is Shipped. If this is True, the ownership is successfully transferred to
the message sender’s address. In addition, the manufacturer of the product gives incentive,
i.e. some ETH, to the message sender as a reward for obeying the protocol.
Since Ethereum requires an execution fee for each transaction, when the current owner sends
a product to the recipient, he/she might be reluctant to issue a transaction ship Product(). To
avoid this kind of situation, the following procedure is introduced. If the ownership transfer
has been successfully completed, a financial reward transfer Reward is paid back to the
previous owner by the product’s manufacturer. The reason why the manufacturer should pay
such reward is that in this way counterfeits can be detected and thus identified thanks to their
cooperation. It is noted that, in order to avoid the case where two parties repeatedly transfer
back and. Selecting appropriate values for transfer Reward and MAXTRANSFER will
depend on the actual investment made by the manufacturer for the implementation of POMS.
However, such topic is outside the scope of our current research, and thus it will not be
considered further.
Retailer Module:
Completion of
Retailer
Registration
registration
Storing the
Scanning Shipment
Recieved
location hub
Verification Of
Product
New
Blockchain
Product Ready To
Sell
Figure 4 Retailer Module
Dept. of CSE, SJCIT
20
2021-2022
Fake Product Identification using Blockchain
System Design
Retailer after the registration is done can see the product details such as the
manufacturer where the manufacturer has stored after the scanning process take place in this
process in back the execution take place where all the product is scanned and the stored
location is sent to the verification of the product where there are many information are stored
in the hub and the following new blockchain is created and the following product is ready to
sell and given to the following consumers.
Consumer Module:
Completion of
Consumer
Registration
registration
Storing the
Scanning Bought
Shipment Recieved
location hub
Verifying The
Product
Figure 5 Consumer Module
Consumers register itself and after the completion of registration scanning of the
particular product take place respectively where all the storage of the location hub take place
and the verification of the product happens as the product gets verified the product is
identified in this process respectively.
Dept. of CSE, SJCIT
21
2021-2022
Fake Product Identification using Blockchain
System Design
5.1 System Architecture
Figure 6 System Architecture
Dept. of CSE, SJCIT
22
2021-2022
Fake Product Identification using Blockchain
System Design
5.2 Use Case Diagram
Figure 7 Use case Diagram
Dept. of CSE, SJCIT
23
2021-2022
Fake Product Identification using Blockchain
System Design
5.3 Data flow diagram
Figure 8 Data Flow Diagram
Dept. of CSE, SJCIT
24
2021-2022
Fake Product Identification using Blockchain
System Design
5.4 Sequence Diagram
Figure 9 Sequence Diagram
A sequence diagram shows object interactions arranged in time sequence. It depicts the
objects involved in the scenario and the sequence of messages exchanged between the objects
needed to carry out the functionality of the scenario. Sequence diagrams are sometimes called
event diagrams or event scenarios. Sequence diagram consists of 5 different blocks namely
Manufacturer, Distributer, Retailer, Consumer, Verification Completes.
Dept. of CSE, SJCIT
25
2021-2022
CHAPTER 6
IMPLEMENTATION
Smart Contracts
Smart contracts are simply programs stored on a blockchain that run when
predetermined conditions are met. They typically are used to automate the execution of an
agreement so that all participants can be immediately certain of the outcome, without any
intermediary’s involvement or time loss. They can also automate a workflow, triggering the
next action when conditions are met.
Smart contracts work by following simple “if/when,then” statements that are written
into code on a blockchain. A network of computers executes the actions when predetermined
conditions have been met and verified. These actions could include releasing funds to the
appropriate parties, registering a vehicle, sending notifications, or issuing a ticket. The
blockchain is then updated when the transaction is completed. That means the transaction
cannot be changed, and only parties who have been granted permission can see the results.
Within a smart contract, there can be as many stipulations as needed to satisfy the
participants that the task will be completed satisfactorily. To establish the terms, participants
must determine how transactions and their data are represented on the blockchain, agree on
the “if/when,then” rules that govern those transactions, explore all possible exceptions, and
define a framework for resolving disputes.
Then the smart contract can be programmed by a developer – although increasingly,
organizations that use blockchain for business provide templates, web interfaces, and other
online tools to simplify structuring smart contracts.
Connecting Ganache, Metamask and Remix IDE.
Ganache is used for setting up a personal Ethereum Blockchain to deploy contracts,
develop your applications, and run tests. It gives you the ability to perform all actions you
would on the main chain without the cost. It provides convenient tools such as advanced
mining controls and a built-in block explorer. Basically Ganache runs local instance of
Ethereum so we don’t need to struggle with Geth command line.
26
Fake Product Identification using Blockchain
Implementation
Remix IDE is a web browser based IDE that allows you to write smart contracts in
Solidity. It also also allows you to test, debug and deploy your smart contracts.You can use
Ganache to deploy your smart contract from Remix by following these steps:
Open Remix IDE in browser by navigating to http://remix.ethereum.org.Create a
sample smart contract in solidity.Compile the smart contract. Once it is compiled successfully
go to deploy and run transactions..So select Web3 provider which prompts you whether you
want to connect to Ethereum node. Clicking OK will gain prompt you to provide the Web3
provider endpoint.Open Ganache. You can see HTTP URL under RPC server. Copy it and
paste it in Remix under Web3 provider endpoint. You should be able to connect to Ganache
with Remix. If you have successfully connected to Ganache then you can see your 10 default
Ganache accounts each with 100 ether added into your remix. Now click on deploy to deploy
the contract to private Ethereum Blockchain using Ganache.Open Ganache and click on
Transactions where your contract creation transaction will be present.
We can check that by deploying your smart contract in Remix IDE with
Ganache/Metamask. As we have already seen how to deploy smart contract using Ganache, let
see how we can do with Metamask.Now your Metamask and Ganache are
connected http://127.0.0.1:7545.Open Remix IDE and choose environment as Injected Web3
to deploy your environment and click on Deploy. This will prompt you with Metamask to
confirm. Click confirm and your smart contract will be deployed in Ganache. Check the
balances of the account in Metamask and Ganache to be same.
Algorithm
There are 4 modules designed inorder to complete
Step 1: Signup to blockchain as manufacturer or distributor or consumer or retailer.
Step 2: login to blockchain
if user is manufacturer
then register product and generate QR code
scan the QR along with location
deduct ETH for each product registration
Dept. of CSE, SJCIT
27
2021-2022
Fake Product Identification using Blockchain
Implementation
record the transaction
Step 3: if user is distributor and retailer
scan the QR along with location
deduct ETH from wallet for each scanning
update the details in blockchain
Step 4: if user is consumer
Verify the received product
By scanning the QR code
if image is QR code and generated by blockchain
than product details are shown
else
product details are not available
Step 6: Logout of the transactions.
Algorithm Written using Solidity
pragma solidity ^0.6.0;
contract SupplyChain {
event Added(uint256 index);
struct State{
string description;
address person;
}
struct Product{
address creator;
string productName;
uint256 productId;
Dept. of CSE, SJCIT
28
2021-2022
Fake Product Identification using Blockchain
Implementation
string date;
uint256 totalStates;
mapping (uint256 => State) positions;
}
mapping(uint => Product) allProducts;
uint256 items=0;
function concat(string memory _a, string memory _b) public returns (string memory){
bytes memory bytes_a = bytes(_a);
bytes memory bytes_b = bytes(_b);
string memory length_ab = new string(bytes_a.length + bytes_b.length);
bytes memory bytes_c = bytes(length_ab);
uint k = 0;
for (uint i = 0; i < bytes_a.length; i++) bytes_c[k++] = bytes_a[i];
for (uint i = 0; i < bytes_b.length; i++) bytes_c[k++] = bytes_b[i];
return string(bytes_c);
}
function newItem(string memory _text, string memory _date) public returns (bool) {
Product memory newItem = Product({creator: msg.sender, totalStates: 0,productName:
_text, productId: items, date: _date});
allProducts[items]=newItem;
items = items+1;
emit Added(items-1);
Dept. of CSE, SJCIT
29
2021-2022
Fake Product Identification using Blockchain
Implementation
return true;
}
function addState(uint _productId, string memory info) public returns (string memory) {
require(_productId<=items);
State memory newState = State({person: msg.sender, description: info});
allProducts[_productId].positions[ allProducts[_productId].totalStates ]=newState;
allProducts[_productId].totalStates = allProducts[_productId].totalStates +1;
return info;
}
function searchProduct(uint _productId) public returns (string memory) {
require(_productId<=items);
string memory output="Product Name: ";
output=concat(output, allProducts[_productId].productName);
output=concat(output, "<br>Manufacture Date: ");
output=concat(output, allProducts[_productId].date);
for (uint256 j=0; j<allProducts[_productId].totalStates; j++){
output=concat(output, allProducts[_productId].positions[j].description);
}
return output;
}
}
Dept. of CSE, SJCIT
30
2021-2022
CHAPTER 7
TESTING
7.1Methods of Testing
Software testing is an investigation conducted to provide stakeholders with
information about the quality of the product or service under test. Software testing can also
provide an objective,independent view of the software to allow the business to appreciate and
understand the risks of software implementation. Test techniques include the process of
executing a program or application with the intent of finding software bugs (errors or other
defects). Software testing involves the execution of a software component or system
component to evaluate one or more properties of interest. In general, these properties indicate
the extent to which the component or system under test.
• meets the requirements that guided its design and development, responds correctly to
all kinds of inputs.
• performs its functions within an acceptable time, is sufficiently usable,
• can be installed and run in its intended environments, and
• Achieves the general result its stakeholder’s desire.
As the number of possible tests for even simple software components is practically
infinite, all software testing uses some strategy to select tests that are feasible for the available
time and resources. As a result, software testing typically (but not exclusively) attempts to
execute a program or application with the intent of finding software bugs (errors or other
defects).
The job of testing is an iterative process as when one bug is fixed; it can illuminate
other, deeper bugs, or can even create new ones.
Software testing can provide objective, independent information about the quality of
software and risk of its failure to users and/or sponsors. Software testing can be conducted as
soon.
31
Fake Product Identification using Blockchain
Testing
Software testing can be conducted as soon as executable software (even if partially
complete) exists. The overall approach to software development often determines when and
how testing is conducted. For example, in a phased process, most testing occurs after system
requirements have been defined and then implemented in testable programs. In contrast,
under an Agile approach, requirements, programming, and testing are often done
concurrently.
The main aim of testing
The main aim of testing is to analyze the performance and to evaluate the errors that
occur when the program is executed with different input sources and running in different
operating environments.
The testing steps are:
• Unit Testing.
• Integration Testing.
• Validation Testing.
• User Acceptance Testing.
7.1.1 UNIT TESTING
Unit testing, also known as component testing refers to tests that verify the
functionality of a specific section of code, usually at the function level. In an object-oriented
environment, this is usually at the class level, and the minimal unit tests include the
constructors and destructors. Which helps in analyzing the Unit testing is a software
development process that involves synchronized application of a broad spectrum of defect
prevention and detection strategies in order to reduce software development risks, time, and
costs. The following Unit Testing shows the functions that were tested at the time of
programming which helps in maintaining the manufacturer, retailer, consumer, provider.
7.1.2 Integration Testing
Integration testing is any type of software testing that seeks to verify the interfaces
between components against a software design. Software components may be integrated in an
iterative way or all together ("big bang"). Normally the former is considered a better practice
since it allows interface issues to be located more quickly and fixed. Integration testing works
to expose defects in the interfaces and interaction between integrated components (modules).
Dept. of CSE, SJCIT
32
2021-2022
Fake Product Identification using Blockchain
Testing
Progressively larger groups of tested software components corresponding to elements of the
architectural design are integrated and tested until the software works as a system.
7.1.3 Validation Testing
At the culmination of integration testing, software is completed assembled as a package.
Interfacing errors have been uncovered and corrected. Validation testing can be defined in
many ways; here the testing validates the software function in a manner that is reasonably
expected by the customer. In software project management, software testing, and software
engineering, verification and validation (V&V) is the process of checking that a software
system meets specifications and that it fulfills its intended purpose. It may also be referred to
as software quality control.
7.1.4 User Acceptance Testing
Performance of an acceptance test is actually the user’s show. User motivation and
knowledge are critical for the successful performance of the system. The above tests were
conducted on the newly designed system performed to the expectations. All the above testing
strategies weredone using the following test case designs. The following are the type
•
Manufacturer
•
Distributer
•
Retailer
•
Consumer
•
Login
Dept. of CSE, SJCIT
33
2021-2022
Fake Product Identification using Blockchain
Testing
7.2Test Cases
Table 1 Manufacturer test case
Test Case
1
Name of Test
Manufacturer
Input
Takes the data from the manufacturer
Expected output
Will generate code
Actual output
Result
Gives the information to the following gives to distributer
Successful
Table 2 Distributer test case
Test Case
2
Name of Test
Distributer
Input
Takes the data from the manufacturer
Expected output
It will access and provide its information respectively
Actual output
Takes the input and provide the information to the next part
Result
Successful
Dept. of CSE, SJCIT
34
2021-2022
Fake Product Identification using Blockchain
Testing
Table 3 Retailer test case
Test Case
3
Name of Test
Retailer
Input
Get the output from the distributer and gets the retailer
Expected output
QR code will be generated and all information will be
given
Actual output
QR code is generated
Result
Successful
Table 4 Consumer test case
Test Case
4
Name of Test
Consumer
Input
Get the output from the retailer and family gives
Expected output
QR code will be generated and all information will be
given
Actual output
QR code is generated and the consumer will get history
Result
Successful
Dept. of CSE, SJCIT
35
2021-2022
CHAPTER 8
PERFORMANCE ANALYSIS
Performance: Several performance requirements were established, checking for inputs,
outputs and working.
Performance Analysis
Input the product
details
Generate Product ID
QR Code generation
Success
Login to the System
Generate Product ID
Scan the shipment
Record the
transaction and
Generate the block
Record the Transaction
Success
Figure 10 Block Diagram of Performance Analysis
36
And scan the
shipment further
Success
Fake Product Identification using Blockchain
Performance Analysis
Environmental: No harm for environmental parameters.s
Social: Feasibility for everyone in day to day life.
Accuracy In general, performance data obtained using sampling techniques are less accurate
than data obtained by using counters or timers. In the case of timers, the accuracy of the clock
must be taken into account. Simplicity. User friendly.
Flexibility: A flexible can be extended easily to collect additional performance data or to
provide different views of the same data. Flexibility and simplicity are often opposing
requirements.
Feasibility Study
The key goal of the feasibility study is to discuss the technological, organizational and
economic feasibility of the application being built. Feasibility is the assessment of whether it
is worth undertaking a project or not.
Technical Feasibility
It is a measure of the particular technological approach and of the availability of
knowledge and technical services. It is one of the first studies that must be performed after
the selection of a project.
Operational Feasibility
Operational viability is primarily concerned with concerns such as if the device will
be used if it is created and implemented and if user reluctance will impact the future
advantages of the technology. It is the ability to utilize, assist and execute a system or
program's required tasks.
Result Analysis
This proposed gives a better edge with least gas cost for each transaction, the QR code
is generated and through the each scan certain amount of gas is deducted. It is user friendly
where the products QR code can be directly scanned through inbuilt Scanner. The ETH that is
used for each transaction is very minimal in this web application. The location updating while
scanning enables easy tracking of product for other peers in the blockchain.
Dept. of CSE, SJCIT
37
2021-2022
Fake Product Identification using Blockchain
Performance Analysis
Used mode for tracking
Gas cost
efficient
SHA with QR code
0.01595334 ETH
Comparatively less compared
to RFID
SHA with RFID
0.14327623 ETH
This takes more transaction
time.
Table 5 comparison between QR code and RFID
Gas cost
QR code
RFID
Figure 11 Graph for ETH consumption in RFID and QR code
Dept. of CSE, SJCIT
38
2021-2022
CHAPTER 9
CONCLUSION & FUTURE ENHANCEMENT
This system is the first blockchain system to propose a fully functional anticounterfeiting system. By paying a very low transaction fee, users of our system no
longer have to worry about the possibility of purchasing a counterfeit product.
Manufacturers can use the system to store relevant information about product sales in
blockchain for everyone to see. The total amount of sales that can be sold by the seller
and the number of products that the seller currently has left are transparent. The user can
use the functions provided by our system to carry out manufacturer verification
immediately. The system provides identity verification using digital signatures. There are
no other means of decrypting the key owner's private key unless the key owner
accidentally loses their key.In our system analysis result, the cost of the initial product
record contract is only $1.2893394289 US, and the cost of each product sales process is
$0.17415436749 US. Both costs are much lower than working with reliable large chain
stores and well-established direct selling stores. Our system can effectively lower the
anti-counterfeiting threshold of branded goods and provide companies with limited
financial resources with an easier approach to reassure consumers that they will not buy
counterfeit goods.
Blockchain technology is still in its general early stages in terms of usage,
therefore more research is required. Future work on this framework may be proof of the
simplicity of the code. The customer can believe that the proper applications and due to
the simplicity of the code, without excessive code, will have additional use. With the
experience gained in this project, it is clear that when assigning a chain of blocks that is
counterfeit-resistant and traceable, then platform improvement is warranted by a move
toward genuine product warranties. This would improve the customer experience by
making the entire supply chain framework more open and transparent. In addition, it is
hoped that a buyers' intellectual framework can be built on cross-line product tracing,
providing more accurate and far-reaching product and seller tracing information to
administrative authorities around the world. Obtaining data of such quality will be
conceivable with estimates of coordinated efforts, for example, administrative support,
framework creation, and data sharing.
39
BIBLIOGRAPHY
[1]
Muhammad Nasir Mumtaz Bhutta, Amir A. Khwaja, Adnan Nadeem, Hafiz Farooq
Ahmad , Muhammad Khurram Khan, Moataz A. Hanif, Houbing Song, Majed
Alshamari , and Yue Cao , “A Survey on Blockchain Technology: Evolution,
Architecture and Security”, IEEE special section on intelligent big data analytics for
internet of things, services and people,2021, pp. 61048 – 61073.
[2]
Rishabh Sushil Bhatnagar, Sneha Manoj Jha , Shrey Surendra Singh, Rajkumar Shende
“Product Traceability using Blockchain”, 2020 2nd International Conference on
Advances in Computing, Communication Control and Networking (ICACCCN).
[3]
Si Chen , Rui Shi , Zhuangyu Ren , Jiaqi Yan , Yani shi , Jinyu Zhang,“ A Blockchainbased Supply Chain Quality Management Framework”, 2017 IEEE 14th International
Conference on e-Business Engineering (ICEBE).
[4]
M.C.Jayaprasanna, .V.A.Soundharya , M.Suhana, S.Sujatha,” A Block Chain based
Management System for Detecting Counterfeit Product in Supply Chain” ,IEEE 2021
Third International Conference on Intelligent Communication Technologies and Virtual
Mobile Networks (ICICV).
[5] Jinhua Ma , Shih-Ya Lin , Xin Chen , Hung-Min Sun,A Blockchain-Based Application
System for Product Anti-Counterfeiting” International Journal Of Scientific &
Technology Research Volume 8, Issue 12, December 2019 issn 2277-8616.
[6]
B. M. A. L. Basnayake, C. Rajapakse,” A Blockchain-based decentralized system to
ensure the transparency of organic food supply chain” ,IEEE 2019 International
Research Conference on Smart Computing and Systems Engineering (SCSE)
[7] Atima Tharatipyakul and Suporn Pongnumkul, “User Interface of Blockchain-Based
Agri-Food Traceability Applications”, IEEE vol 9, 2019,pp.82909-82929.
40
APPENDIX
Appendix A: Screenshots
Figure A1 User details storing
Figure A2 Remix IDE Initializing
41
Fake Product Identification using Blockchain
Appendix
Figure A3 Solidity Compilation
Figure A4 Metamask pops up after deployment.
Dept. of CSE, SJCIT
42
2021-2022
Fake Product Identification using Blockchain
Appendix
Figure A5 Gas Estimation for Transaction
Figure A6 Ganache Blockchain
Dept. of CSE, SJCIT
43
2021-2022
Fake Product Identification using Blockchain
Appendix
Figure A7 Blocks Generated
Figure A8 Transactions Recorded
Dept. of CSE, SJCIT
44
2021-2022
Fake Product Identification using Blockchain
Appendix
Figure A9 Login Page
Figure A10 Signup Page
Dept. of CSE, SJCIT
45
2021-2022
Fake Product Identification using Blockchain
Appendix
Figure A11 QR Code Generation
Figure A12 QR code scan and product track display
Dept. of CSE, SJCIT
46
2021-2022
Fake Product Identification using Blockchain
Appendix
Figure A13 Scanning Shipment
Figure A16 Invalid Image Upload For Scanner
Dept. of CSE, SJCIT
47
2021-2022
Fake Product Identification using Blockchain
Appendix
Appendix B
ETH- Ethereum Token
SC- Smart Contract
PoW- Proof of Work
PoA-Proof of Authority
SHA- Secure Hashing Algorithm
P2P- Peer to Peer
API-Application Programming Interface
DAPP- Decentralized Application
Tx- Transactions
NONCE- Number Used Only once
DLT- Distributed Ledger Technology
DEX- Decentralized Exchange
Dept. of CSE, SJCIT
48
2021-2022
PAPER PUBLICATION DETAILS
Paper Name: Product Anticounterfeiting in Supply Chain using Blockchain Technology.
Journal: International Research Journal of Engineering and Technology (IRJET).
Volume: 09
Issue: 03
Published on: 23 March, 2022.
49
Fake Product Identification using Blockchain
Dept. of CSE, SJCIT
Paper Publication Details
50
2021-2022
Fake Product Identification using Blockchain
Dept. of CSE, SJCIT
Paper Publication Details
51
2021-2022
Fake Product Identification using Blockchain
Paper Publication Details
Paper Name: Blockchain Platform for Product Anticounterfeiting in Supply Chain.
Journal: International Journal of Engineering Science and Invention (IJESI).
Volume: 11
Issue: 06
Published on: 27 June,2022
Dept. of CSE, SJCIT
52
2021-2022
Fake Product Identification using Blockchain
Dept. of CSE, SJCIT
Paper Publication Details
53
2021-2022
Fake Product Identification using Blockchain
Dept. of CSE, SJCIT
Paper Publication Details
54
2021-2022
Fake Product Identification using Blockchain
Dept. of CSE, SJCIT
Paper Publication Details
55
2021-2022
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET)
E-ISSN: 2395-0056
VOLUME: 09 ISSUE: 03 | MAR 2022
P-ISSN: 2395-0072
WWW.IRJET.NET
Product Anticounterfeiting in Supply Chain Using Blockchain
Technology
Dr.Seshaiah Merikapudi1
Assistant Professor
Department of Computer
Science
and Engineering
S J C Institute of Technology
Chickaballapur
Mushaffiq Ahmed
Mujale4
Department of Computer
Science
and Engineering
S J C Institue of Technology
Chickaballapura
Pavan Kalyan Y2
Department of Computer
Science
and Engineering
S J C Institute of Technology
Chickaballapur
Harshitha G L3
Department of Computer
Science and Engineering
S J C Institute of Technology
Chickballapur
Lavanya V S5
Department of Computer
Science
and Engineering
S J C Institute of Technology
Chickaballapura
----------------------------------------------------------------------***-----------------------------------------------------------------------Abstract— Blockchain innovations have noninheritable
interest within the course of the foremost recent years. one
in every of the foremost talked regarding problems is
currency exchange, however its application isn't restricted
solely to Digital currency. thus it's the potential to
influence totally different business sectors. Blockchain
technology has brought bigger transparency and ease in
massive transactions. we are able to sight counterfeit
merchandise mistreatment blockchain technology. The
question that arises once shopping for any item in today's
world is whether or not it's faux or not. and therefore the
lack of those things has been shown an enormous impact
on economic progress. Therefore, so as to curb all
counterfeit merchandise, it's vital to bring transparency
regarding the products to the notice of the customers. The
growing presence of counterfeit and unsafe product within
the world could be a cause for concern and blockchain
technology has taken following step towards its complete
annihilation. Not solely the utilization of technology can
scale back the assembly of counterfeit merchandise,
however everybody must bear in mind of this. By
manufacturing and packaging the correct things every of
these things must tend a digital code with its own identity.
The package implementation method in which the product
code is scanned mistreatment this application then verify if
the given product is counterfeit or not.
Keywords—
Blockchain,
Hashing,
Anticounterfeiting, Transparency.
© 2022, IRJET
|
QR
I. INTRODUCTION
Blockchain is a methodology to store cryptographically
associated records across parties in a common association
to hinder modifying of records. The blockchain was
devised to work with bitcoin trades. A "block" includes a
lot of confirmed trades or records, a timestamp, and a hash
code. The hash still up in the air from the substance in the
square and the previous square (i.e., "chain"). Business
runs on information. The faster it's gotten and the more
exact it is, the better. For is extraordinary for conveying
that information since it gives speedy, shared and
absolutely clear information set away on an unchanging
record that can be gotten to just by permissioned network
people. A blockchain association can follow orders,
portions, records, creation and extensively more. Besides
in light of the fact that people share a singular viewpoint
on the real world, you can see all nuances of a trade
beginning to end, giving you more noticeable sureness, as
well as new efficiencies and expected entryways.
Blockchain can engage more direct and correct beginning
to end continuing in the store organization: Organizations
can digitize genuine assets and make a decentralized super
durable record, taking everything into account, making it
possible to follow assets from creation to movement or use
by end client. This extended store network
straightforwardness gives more noteworthy detectable
quality to the two associations and clients.
codes,
Impact Factor value: 7.529
|
ISO 9001:2008 Certified Journal
|
Page 1045
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET)
E-ISSN: 2395-0056
VOLUME: 09 ISSUE: 03 | MAR 2022
P-ISSN: 2395-0072
WWW.IRJET.NET
Today, in this state of the art time frame, our life is stacked
with advancement. It is no huge amazement that online
shopping is creating by hop and cutoff points as a general
rule. While there may be a couple of negatives of
advancement, one reality stays in salvageable shape that
development has improved on our life. A few decades back,
who can imagine how one can buy anything, while without
going out. Who may have accepted that sending gifts to a
relative or buddy at a far distance would be so profitable,
just by clicking a button. Nevertheless, notwithstanding the
extraordinary improvement of online shopping recently,
world’s electronic business industry is at this point in its
beginning phase. Web shopping addresses shy of what one
percent of the hard and fast shopping in the country, but
has a huge load of potential to shoot up.
Finally, blockchain can streamline definitive cycles and
decrease costs by enabling a feasible survey of store
network data. Processes including manual checks for
consistency or acknowledge purposes that may at this
point require weeks can be accelerated through a scattered
record of every appropriate datum.
Blockchain can drive extended store network
straightforwardness to help with diminishing blackmail for
high worth product like gems and medication drugs.
Blockchain could help associations with perceiving how
trimmings and finished product are gone through each
subcontractor and decrease benefit adversities from phony
and dull market trading, as well as addition trust in endmarket clients by lessening or discarding the impact of
phony things.
Figure 2 Structure of Block in Blockchain
Blockchain has a typical structure where the block
numbering starts from block one, and every block has it is
own unique has values and these hash values are
generated using an SHA-256 algorithm. The SHA-256
algorithm is the most generally used algorithm in
blockchain for hashing and it contains a head node where
the address of the next node is stored and the Transaction
counter stores all the transactions that have happened. The
nonce is also a part of block where it is widely known as
“Number used only once” it is a random number that
usually varies for each transaction moreover it provides
security where one cannot modify the transaction once the
data is entered inti blockchain.
SHA-256 Algorithm
Secure Hashing Algorithm (SHA) - 256 is the hash capacity
and mining calculation of the Bitcoin convention, alluding
to the cryptographic hash work that yields a 256 pieces in
length esteem. It directs the creation and the executives of
addresses, and is likewise utilized for exchange check.
Bitcoin utilizes twofold SHA-256, implying that it applies
the hash capacities two times.
Figure 1 Characteristics of Blockchain
Basically, blockchain possesses a certain characteristics
that provides a huge and wide variety of applications in
order to develop and design a useful products in the
society.
The calculation is a variation of the SHA-2 (Secure Hash
Algorithm 2), created by the National Security Agency
(NSA). SHA-256 is likewise utilized in well known
encryption conventions, for example, SSL,TLS, SSH and
open source working frameworks like Unix/Linux.
Additionally, associations can stay aware of more control
over re-appropriated understanding delivering. Blockchain
gives all parties inside a singular creation network
permission to comparable information, possibly
diminishing correspondence or moving data botches. Less
time can be spent endorsing data and more can be spent
on conveying work and items either dealing with quality,
decreasing expense, or both.
© 2022, IRJET
|
Impact Factor value: 7.529
|
ISO 9001:2008 Certified Journal
|
Page 1046
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET)
E-ISSN: 2395-0056
VOLUME: 09 ISSUE: 03 | MAR 2022
P-ISSN: 2395-0072
WWW.IRJET.NET
Many factors affect a student’s academic performance.
Student achievement depends on teachers, education
programs, learning environment, study hours, academic
infrastructure, institutional climate, and financial issues
[1,2]. Another extremely important factor is the learner’s
behavior. H.K. Ning and K. Downing believe that major
constructs of study behavior, including study skills, study
attitude, and motivation, to have strong interaction with
students’ learning results. Students’ perceptions of the
teaching and learning environments influence their study
behavior. This means if teachers can grasp the bad
attitudes of students, they can make more reasonable
adjustments to change the learning environment for the
students. To conclude whether good or bad behavior for a
particular student is not an easy problem to solve, it must
be identified by the teacher who has worked directly in the
real environment. The teacher can track student behavior
by observing and questioning them in the classroom. This
process is not difficult in a classroom that has few
students, but it is a big challenge for a classroom with a
large number of students. It is valuable to develop an
effective tool that can help teachers and other roles to
collect data of student behavior accurately without
spending too much human effort, which could assist them
in developing strategies to support the learners to
performances could be increased. [2]
Figure 3 Usage of SHA-256 Algorithm in Blockchain
The hash calculation is very secure and its functions aren't
known in the public area. It's utilized by the United States
government to safeguard touchy data, because of its
capacity to confirm a substance of information without
uncovering it because of the utilization of computerized
marks. Moreover, it is likewise used for secret phrase
check, since it helpfully doesn't need the capacity of
precise passwords, as the hash values can be put away and
coordinated with the client section to confirm on the off
chance that it's right or not.
As a matter of fact, it is almost difficult to uncover the
underlying information from a hash esteem itself. In
addition, a savage power assault is incredibly improbable
to succeed on account of the galactic number of possible
blends. Furthermore, it's additionally seriously impossible
that two information values (known as impact) have a
similar hash.
In the have analyzed with respect to counterfeit things are
filling significantly in the online market. The square market
is the biggest test in-store organization. The government
has introduced a couple of guidelines and rules against
fake things regardless of the way that the government can't
deal with counterfeit things. Consequently, a system needs
to be designed for recognizing counterfeit things and
giving security techniques to alert both maker and
purchaser underway organization. Creators may use the
square chain the leader's system to store critical thing
bargains information inside the square chain, which is
accessible to all. The total number of arrangements the
dealer can sell and the rest left behind by the seller are
clear. The client can perform a vendor-side check using an
encryption computation. In this paper, we proposed
blockchain the chiefs system institutes the client and
undertaking merchant to follow and perceive the real thing
using a PDA. It will recognize counterfeit things as well as
the authenticity of the producer for both end client and
adventure vendor. [3]
II. LITERATURE SURVEY
Barcodes were broadly utilized for computerized item
distinguishing proof purposes for a wide scope of ongoing
applications. Holograms are utilized to battle fakes and
lessen phony. Joining the possibility of standardized tags
into Holograms offers two Protections against
counterfeiting. In a paper, the creator presented
recognizable proof by utilizing strategic standardized tags
that increment the wellbeing and dependability of the
item. Client characterized item recognizable proof code
that is remarkable and conveyed to each is changed over to
Product Quick Response (QR) code. QR-produced code is
then changed over into a multidimensional image to give
higher security to the item. The creator has centered on
holographic scanner tags utilizing PC-produced Holograms
are carried out utilizing Matlab. The Barcode interpreting
gives the reproduced from the visualization the item ID
number relegated to the item. At last, it provides an idea
about will assist with expanding security and credibility in
item recognizable proof and to forestall duplicating of
items. Notwithstanding, the creator has thought about just
the PC-created standardized tag utilizing Matlab and has
not thought of imitation of QR code. [1]
© 2022, IRJET
|
Impact Factor value: 7.529
In further reviews, the author proposes an RFID procedure
for perceiving counterfeit things and ensuring thing
authenticity. The author has proposed an RFID system
containing two parts; there are mark approval show and
informational collection modification show. The mark
check show to confirm names without revealing their
critical information and its licenses the client to scrutinize
the tag openly. The RFID mark information use to prevent
the spread of phony things. Meanwhile, the informational
index correction show ensures the rightness of the mark
|
ISO 9001:2008 Certified Journal
|
Page 1047
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET)
E-ISSN: 2395-0056
VOLUME: 09 ISSUE: 03 | MAR 2022
P-ISSN: 2395-0072
WWW.IRJET.NET
status. Finally, the phony structure is outstandingly
safeguarded against phony and the name affirmation show
is satisfactory to do it in RFID-based applications. The
maker has focused the RFID name development simply
applies to expensive things yet doesn't sensible for
sensible things [4]
identification, the end-consumers take photos of an item
packaging, which contains product text information, logos,
and perhaps accreditation marks/logos. These photos will
be sent in a solicitation to the worker for processing and
confirmation. Afterward, the detection result will be
returned to the end-consumer to make a further decision.
In the case of fake product detection, the end-consumer
has the ability to report this counterfeit product to the
government system, such as the Safety Gate - EU's Rapid
Alert System[8]
Author of paper [5] paper disusses how the traditional
cloud storage model runs in a centralized manner, so
single point of failure might lead to the collapses of system.
Th system is a combination of the decentralized storage
system, IPFS, the Ethereum blockchain and the attributebased encryption technology. Based on the Ethereum
blockchain, the decentralized system has keyword search
function on the cipher text solving the problem in
traditional storage systems where cloud server returns
wrong results.
Holograms have been utilized to fight against fakes and to
diminish forgery. Incorporating the possibility of
standardized identifications into holograms give two level
protection from forging. This framework acquaints a
technique with increased security and genuineness in item
distinguishing proof by utilizing holographic standardized
identifications. The unique and client characterized item
distinguishing proof code accommodated every item is
changed over into Quick Response (QR) Code. The QR Code
created is then changed over into a 3D image, hence giving
a prominent security to the item. In this framework,
Holographic standardized tags utilizing Computer created
visualizations are actualized utilizing MATLAB. The
decoding of the barcode recreated from the holograms
gives the corresponding product recognizable proof
number assigned for the product.[9]
In this paper the author proposes a system that provides a
solution to the originality and authenticity of published
and posted online digital content like music, books, etc.
The system utilizes emerging technologies that primarily
include blockchain and (interplanetary file system) IPFS.
The solution is focused on the authenticity of online books,
but the solution in terms of architecture, design, logic,
smart contract code is generic enough to be easily
extended and is used to provide the originality,
authenticity, and integrity to all the other forms of digital
assets. The author considered two scenarios based on the
approval results provided by the author for every
publication requesting an attestation or validation before
uploading the content.[6]
III. PROPOSED METHODS FOR PRODUCT
COUNTERFEITING USING BLOCKCHAIN
The main aim of this paper We propose an associate
degree inimitable and
complete
product
anticounterfeiting system, that relies on Blockchain. In
our theme, makers will use this
method to
store
relevant info on product sales in Blockchain that is
accessible to anyone. the whole quantity of sales that
may be oversubscribed by the
vendor and
therefore
the variety of merchandise presently left
by the
vendor square measure clear to users. The user will use
the functions provided by our system to immediately
perform
vendor-side
verification,
and
this
verification cannot be created
In further surveys we studied that, we propose a
blockchain-based framework. This framework will provide
a theoretical basis for intelligent quality management of
the supply chain based on blockchain technology.
Furthermore, it provides a foundation to develop theories
about information resource management in distributed,
virtual organizations. A fake commercial center can
influence the improvement of a country. Fake items are
fakes or unapproved copies of the genuine item. Fake items
are regularly created with the expectation to exploit the
prevalent estimation of the imitated item. Pretty much
every organization faces a fake danger since it's influencing
an organization's income as well as harms the brand's
standing. While technology offers several solutions to
authenticate the original product, some technological tools,
particularly artificial intelligence help create clones,
blockchain technology creates chaining and tracing. What
is required is consistent up-gradation and development to
remain in front of the forgers. Therefore, it is important
that we have regulations for the marketplace.[7]
This system proposes a solution that relies on machine
learning-based technology which enables end-consumers
to identify and verify products without any special
equipment. By using image and text recognition. For
© 2022, IRJET
|
Impact Factor value: 7.529
ANTI-
Fig 1: Product Anticounterfeiting Block Diagram
|
ISO 9001:2008 Certified Journal
|
Page 1048
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET)
E-ISSN: 2395-0056
VOLUME: 09 ISSUE: 03 | MAR 2022
P-ISSN: 2395-0072
WWW.IRJET.NET
In the above diagram, we show the details of the design of
our system, including a full description of the user
interface of the system. Our goal is to use the Blockchain
features to provide a more complete, convenient, and lowcost
product
anti-counterfeiting
solution
for
manufacturing, sellers, and consumers.
Step-3: User Can Verify The Product
In this stage clients will be given an android application
and buyers can scan QR code allocated to the item utilizing
android application. The Scanner scans the product and
decrypts the encrypted text in a given algorithm and gets
the detail about the product that is the manufacturer and
current owner of the product and can conclude if to
purchase the item or not.
There is no correct resolution before effort his drawback.
As barcodes are derived simply there is no guaranteed
system after either, nor an honest resolution to
differentiate the faux product from original products.
Blockchain technology is one of the promising technologies
that is rising in recent years that may be useful to tackle
such a tangle. Blockchain Technology is accustomed to
monitoring and regulating the merchandise provide chain
within the market thus users will solely get the original
product. The project’s main goal is to deliver folks original
products and facilitate people to spot whether or not the
product they are shopping for is ingenious or faux simply.
The system example is a distributed application (Dapp)
with a supporting blockchain network. The network is
developed on hyper-ledger cloth that is AN open supply
Blockchain development tool and uses DPos/PBFT
agreement rule by default.
IV. CONCLUSION
This paper is the main Blockchain framework that
proposes a completely functional fake item forgery
framework. Without paying any transaction charge, clients
of our framework at this point should not be worried about
the chance of obtaining a counterfeit item. Accordingly, the
proposed framework is valuable for end clients to identify
counterfeit items in the inventory network. End client can
check QR code allotted to an item and can get all the data
like exchange history, current proprietor dependent on
which end client can check if the item is counterfeited or
not.
V. REFERENCES
Execution Stages:
[1] Muhammad Nasir Mumtaz Bhutta, Amir A. Khwaja,
Adnan Nadeem, Hafiz Farooq Ahmad , Muhammad
Khurram Khan, Moataz A. Hanif, Houbing Song, Majed
Alshamari , and Yue Cao , “A Survey on Blockchain
Technology: Evolution, Architecture and Security”, IEEE
special section on intelligent big data analytics for internet
of things, services and people,2021, pp. 61048 – 61073.
Step-1: Product Enrolling in Blockchain Network
The first step is to bring all manufacture into the
blockchain community and acquire their huge product
database. The manufacture authentication is carried out
via registration and giving them a proper identification and
password. producer might be the number one owner of the
item. producer will request the administrator to add a
product on the network on the time QR code will get
assigned to that product. Administrator will join the
product and manufacturer on the network if the requestor
is a authentic manufacturer. After the product is recorded
in a community it will create a smart agreement and a
unique QR code of the product wherein the info of the
product is cited in an encrypted text form. To at ease the
QR code from copying there's a duplicate touchy virtual
photo in QR code.
[2] Rishabh Sushil Bhatnagar, Sneha Manoj Jha , Shrey
Surendra Singh, Rajkumar Shende “Product Traceability
using Blockchain”, 2020 2nd International Conference on
Advances in Computing, Communication Control and
Networking (ICACCCN).
[3] Si Chen , Rui Shi , Zhuangyu Ren , Jiaqi Yan , Yani shi ,
Jinyu Zhang,“ A Blockchain-based Supply Chain Quality
Management Framework”, 2017 IEEE 14th International
Conference on e-Business Engineering (ICEBE)
[4] M.C.Jayaprasanna, .V.A.Soundharya , M.Suhana,
S.Sujatha,” A Block Chain based Management System for
Detecting Counterfeit Product in Supply Chain” ,IEEE 2021
Third
International
Conference
on
Intelligent
Communication Technologies and Virtual Mobile Networks
(ICICV)
Step-2: Retailer Acknowledgement
In the next step the manufacturer will send the
merchandise to the distributor and standing is regarding
as shipped. It’ll not amendment the possession of the
merchandise till missive of invitation from each parties is
approved to shop for and sell the merchandise. As
presently as each parties approve reciprocally, its
possession within the blockchain network are going to be
transferred within the variety of good contract
mechanically once the payment is eminent.
© 2022, IRJET
|
Impact Factor value: 7.529
[5] Jinhua Ma , Shih-Ya Lin , Xin Chen , Hung-Min Sun,A
Blockchain-Based Application System for Product AntiCounterfeiting” International Journal Of Scientific &
Technology Research Volume 8, Issue 12, December 2019
issn 2277-8616.
|
ISO 9001:2008 Certified Journal
|
Page 1049
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET)
E-ISSN: 2395-0056
VOLUME: 09 ISSUE: 03 | MAR 2022
P-ISSN: 2395-0072
WWW.IRJET.NET
[6] B. M. A. L. Basnayake, C. Rajapakse,” A Blockchainbased decentralized system to ensure the transparency of
organic food supply chain” ,IEEE 2019 International
Research Conference on Smart Computing and Systems
Engineering (SCSE)
[7] Atima Tharatipyakul and Suporn Pongnumkul, “User
Interface of Blockchain-Based Agri-Food Traceability
Applications”, IEEE vol 9, 2019,pp.82909-82929.
[8] Shuai Wang , Liwei Ouyang , Yong Yuan, Xiaochun Ni,
Xuan Han and Fei-Yue Wang,“Blockchain-Enabled Smart
Contracts: Architecture, Applications, and Future Trends”,
IEEE Transactions on Systems, Man, and Cybernetics:
Systems ,2019, pp.2266-2277
[9] Shuai Wang , Liwei Ouyang , Yong Yuan, Xiaochun Ni ,
Xuan Han and Fei-Yue Wang,“Blockchain-Enabled Smart
Contracts: Architecture, Applications, and Future Trends”,
IEEE Transactions on Systems, Man, and Cybernetics:
Systems ,2019, pp.2266-2277
[10] Laura Ricci, Damiano Di Francesco Maesa, Alfredo
Favenza and Enrico Ferro, “Blockchains for COVID-19
Contact Tracing and Vaccine Support: A Systematic
Review”, IEEE 2021, pp.37936 - 37950.
[11]Online:
https://coinmarketcap.com/alexandria/glossary/sha-256
[12]Online:https://www.geeksforgeeks.org/blockchaintechnology-introduction/
© 2022, IRJET
|
Impact Factor value: 7.529
|
ISO 9001:2008 Certified Journal
|
Page 1050
International Journal of Engineering Science Invention (IJESI)
ISSN (Online): 2319-6734, ISSN (Print): 2319-6726
www.ijesi.org ||Volume 11 Issue 6 Series I || June 2022 || PP 50-56
Blockchain Platform For Product Anticounterfeiting In
Supply Chain
Dr.Vikas Reddy
Associate Professor
Department of Computer Science and Engineering
S J C Institute of Technology Chickaballapur
Pavan Kalyan Y
Department of Computer Science
and Engineering S J C Institute of Technology Chickaballapur
Dr.Seshaiah Merikapudi
Asscoiate Professor
Department of Computer Science and Engineering
S J C Institute of Technology Chickaballapur
Harshitha G L
Department of Computer Science and Engineering
S J C Institute of Technology Chickballapur
Mushaffiq Ahmed Mujale
Department of Computer Science
and Engineering S J C Institue of Technology Chickaballapura
Abstract— In current years, blockchain has obtained increasing interest and numerous packages have
emerged from this technology. A renowned blockchain software is the cryptocurrency bitcoin, that has Not
simplest been effectively fixing the double-spending problem however also it could verify the legitimacy of
transactional facts without counting on a centralized system to achieve this. Therefore, any application the use
of blockchain technology because the base structure guarantees that the contents of its statistics are tamperevidence. This Paper uses the decentralized blockchain technology technique to make sure that customers do no
longer completely rely upon the traders to determine if products are genuine. We describe a decentralized
blockchain machine with products anti-counterfeiting, in that way producers can use this device to provide real
merchandise without having to control direct-operated stores, that may substantially reduce the value of
product high-quality guarantee.
Keywords— Blockchain, Hashing, QR codes, Anticounterfeiting, Transparency.
-------------------------------------------------------------------------------------------------------------------------------------Date of Submission: 13-06-2022
Date of Acceptance: 27-06-2022
--------------------------------------------------------------------------------------------------------------------------------------I. INTRODUCTION
Identification of counterfeit merchandise in cutting-edge market is being a exceptional assignment for
customers and it is very life threatening for the customers while this takes vicinity in pharmaceutical fields.
Other fields like electronics, clothing, fashion-accessories additionally face a large effect on their emblem
because of counterfeit products. E-commerce has visible exceptional boom through the years from $39 billion in
2017 and it is projected to upward push to $200 billion via 2026. This comes within the wake of extending
penetration of the net and cell phones. After numerous market surveys it is observed that the counterfeit
merchandise are growing rapidly and the rise of counterfeit products can badly affect the improvement and
economic boom. Additionally because of this the many top companies have become bad comments and
dropping their positions from the logo list. Counterfeit merchandise are twins of the real merchandise in the
marketplace. Often all reputed businesses are operating to forestall this system that is dangerous to all people in
the entire international. The various branded or reputed groups are running on contemporary technology to
DOI: 10.35629/6734-1106015056
www.ijesi.org
50 | Page
Blockchain Platform For Product Anticounterfeiting In Supply Chain
identify the counterfeited products from the original product inside the market and to enhance this operating, the
it area can give them fine signals and can assist to prevent counterfeit items. Among those numerous
technologies available inside the it area blockchain is one of the promising Technologies which may be used for
decreasing the counterfeiting of goods. A blockchain is a kind of dispensed ledger that is designed to prevent
tampering. Primarily based on the allotted consensus Set of rules, clever contracts and encrypted algorithms.
Blockchain generation facilitates to clear up the Problem of counterfeiting of a product. And on this studies
paper we proposed a product surveillance blockchain device with the intention to share statistics about
merchandise from the manufacturer to the clients. We are growing such an application that will work on smart
phones so one can Be giving all of the designated data about the products to the client who orders that product
and help them to identify if the product is authenticated or counterfeited.
Background:
A.BLOCKCHAIN OVERVIEW:
Blockchain is a decentralized gadget. It refers back to the collective renovation of a technical solution
that maintains a Continuous document document as a dependable database thru decentralization. It become to
start with used drastically on bitcoin the block era method of blockchain is to gather and verify the records and
then generate a brand new block via. We first describe the blockchain consensus mechanism the use of bitcoin
as an example, its blockchain consensus mechanism is a proof of work algorithm (poor or worse). Every node
competes based on their respective computing energy to remedy a SHA256 math problem this is complex to
solve but easy to verify. The first node that solves this hassle will get the new block accounting right.
Blockchain facts is stored on every node, then the nodes exchange data with each different over the community.
Every node maintains a whole blockchain records. The node will verify the received transactions and encompass
them in the new block based on its own blockchain information, and try to achieve the accounting rights of the
brand new block within the above manner.
Figure 1. Connections Between Blocks In Blockchain
B. BLOCKCHAIN FEATURES:
In these day’s social machine, a large a part of the economic conduct of individuals relies upon on
believe wherein frequently facets interact with a third birthday celebration, as a consequence forming a trust
relationship. Generally, there is a mutual non-consider between those two parties which have lengthy been
primarily based on believe ensures supplied with the aid of 1/3 events, consequently it is critical to take observe
of the characteristics of blockchain technology that assist subvert the inspiration of human transactions that have
been performed for thousands of years.
The use of blockchain you'll create a information report device that does not rely on a trusted third party as a
transaction middleman, and that is overtly shared and reliable at the identical time. The traits of blockchain
technology are defined in detail beneath.
There are few basic properties of blockchain
1.
Decentralization: Inside the conventional centralized machine, a trusted authority is required to validate each
taking place transaction within the network. But, the decentralized surroundings do not support any governing authority or
single entity to manipulate the entire network. All of the nodes in the network collectively control the community, i.e.,
decentralized governance. The transaction in blockchain can consequently be finished among 2 friends (p2p) without the
approval of a valuable enterprise.
2.
Security and Privacy: SHA– 256 cryptography set of rules is used for hashing. Further fixed-duration has output
DOI: 10.35629/6734-1106015056
www.ijesi.org
51 | Page
Blockchain Platform For Product Anticounterfeiting In Supply Chain
value is generated regardless of the input facts length. This makes it hard to hack. Additionally, the components that go into
block generation increase the difficulty degree for hacking. Immutability is every other factor including securing
information. Thus the systemic thing of BCT inherently affords security.
3.
Untraceability: After a block has been determined in the Blockchain, it cannot be tampered with.
Due to the following circumstances, once a block in the Blockchain is altered, it will be immediately detected
and rejected by other nodes.
4.
Transparency: The shape of peer to peer community allows equality among the nodes. Even supposing the shape
will become slightly altered, the members can inspect the kingdom of any transaction, while it's far in the system. Therefore
a consensus is given by using anode with full focus. Similarly, the peers have replicated shared ledgers. Consequently, any
interest or transaction in a blockchain is facilitated with full transparency.
5.
Flexibility: The technology of blockchain is open supply and all of us can use it to regulate it into our very own
version. There are already several flexible blockchain platforms available, and users can also redevelop a new blockchain
platform if they desire to. Blockchain is a limitless generation which means that customers can create more than one
application based totally on a blockchain.
Fig ur e2. Characteristics of Blockchain.
SHA-256 Algorithm
Secure Hashing Algorithm (SHA) - 256 is the hash capacity and mining calculation of the Bitcoin convention,
alluding to the cryptographic hash work that yields a 256 pieces in length esteem. It directs the creation and the
executives of addresses, and is likewise utilized for exchange check. Bitcoin utilizes twofold SHA-256,
implying that it applies the hash capacities two times.
The calculation is a variation of the SHA-2 (Secure Hash Algorithm 2), created by the National Security Agency
(NSA). SHA-256 is likewise utilized in well known encryption conventions, for example, SSL,TLS, SSH and
open source working frameworks like Unix/Linux.
Figure 3 Usage of SHA-256 Algorithm in Blockchain
The hash calculation is very secure and its functions aren't known in the public area. It's utilized by the
United States government to safeguard touchy data, because of its capacity to confirm a substance of
information without uncovering it because of the utilization of computerized marks. Moreover, it is likewise
DOI: 10.35629/6734-1106015056
www.ijesi.org
52 | Page
Blockchain Platform For Product Anticounterfeiting In Supply Chain
used for secret phrase check, since it helpfully doesn't need the capacity of precise passwords, as the hash values
can be put away and coordinated with the client section to confirm on the off chance that it's right or not.
As a matter of fact, it is almost difficult to uncover the underlying information from a hash esteem
itself. In addition, a savage power assault is incredibly improbable to succeed on account of the galactic number
of possible blends. Furthermore, it's additionally seriously impossible that two information values (known as
impact) have a similar hash.
II.
LITERATURE SURVEY
A faux business middle can affect the improvement of a country. Fake items are fake or unapproved copies of the
real object. Fake objects are frequently created with the expectancy to make the most frequent estimation of the imitated
item. Quite plenty every agency faces a fake chance when you consider that it is influencing a corporation's earnings in
addition to harming the logo's status. Whilst the era gives numerous answers to authenticate the original product, a few
technological types of equipment, particularly artificial intelligence help create clones, and blockchain generation creates
chaining and tracing. What is required is regular up-gradation and improvement to remain in the front of the forgers.
Therefore, we must have guidelines for the market.
Existing system:
1.
RFID Based Anti-Counterfeiting System:
The paper entitled 'a contrast survey to observe on RFID primarily based anti-counterfeiting structures' describes radio
frequency identification tag anti-forging as an implemented association that has gotten consideration within the last few
years. This system represents an overview concentrating on the exploration subject as opposed to duplicating gadgets using
radio frequency identification tags on the product. Radio frequency identification (RFID) and remote sensor networks
(WSN) are substantial far-off advances that have a wide assortment of utilization and provide infinite future possibilities,
even as RFID tags are like an actuator that requires a control sign and a wellspring of electricity. RFID perceives regions and
recognizable evidence of classified matters — yet in place of perusing laser mild reflections from published standardized tag
names, it makes use of low-electricity radio frequencies to collect and store statistics. In a stockroom or distribution center,
this gadget is utilized to automate facts assortment. The transceiver scans radio frequencies and sends them to an RFID tag.
The distinguishing statistics are then communicated from a little microchip inserted in the tag and communicated to the
RFID reader. [1]
2.
Fake Product Detection Using AI-Based Technology:
This system proposes an answer that is predicated on device learning-based totally technology which allows stop-consumers
to discover and verify products with no special device. Through the usage of the picture and textual content popularity. For
identification, the give up-clients take pictures of an object packaging, which incorporates product text facts, emblems, and
possibly accreditation marks/emblems. These pics might be sent in a solicitation to the worker for processing and
confirmation. In a while, the detection result can be lowered back to the cease-consumer to make a further decision. Inside
the case of faux product detection, the quit-purchaser can record this counterfeit product to the authorities machine, along
with the protection gate - European's fast alert gadget [2].
3.
Security with holographic bar code using computer-generated holograms:
Holograms had been utilized to fight against fakes and to diminish forgery. Incorporating the possibility of
standardized identifications into holograms supplies two-degree safety from forging. This framework acquaints
a method with multiplied safety and genuineness in object distinguishing evidence employing using holographic
standardized identifications. The particular and patron characterized object distinguishing evidence code
accommodated every object is modified over into a brief reaction (QR) code. The QR code created is then
modified over right into a 3D photo, as a result giving outstanding security to the item. In this framework,
holographic standardized tags using laptop-created visualizations are actualized by making use of MatLab. The
deciphering of The barcode recreated from the holograms gives the corresponding product recognizable
evidence number assigned for the product.[3]
III.
PROPOSED METHODS FOR PRODUCT ANTI-COUNTERFEITING USING
BLOCKCHAIN
There is no proper solution before tackling this issue. As barcodes can be easily copied it is also not a
guarantee system, nor a good solution to differentiate counterfeit products from originals some products.
Blockchain technology is one of the promising technologies emerging in recent years that can help solve such a
problem. Blockchain technology can be used to monitor and regulate the supply chain of products in the market
so that users can only obtain original products. The main goal of the project was to provide people's original
product and help people identify whether the product they buy is original or fake easily. The prototype of the
system will be a distributed application (DApp) with a supporting blockchain network. The network will be
developed on hyper-ledger fabric which is an open-source Blockchain development tool and uses the default
DPoS/PBFT consensus algorithm.
DOI: 10.35629/6734-1106015056
www.ijesi.org
53 | Page
Blockchain Platform For Product Anticounterfeiting In Supply Chain
The basic module of our system;
1.
Manufacturer role: For the seller, the available functions include adding a new seller's address in
contracts, adding the number of products the seller can sell, and retrieving information on sellers so that the
status of recent sales can be retrieved. On the consumer side, it is possible to query the product that the seller has
provided to the consumer, check whether the product has been replaced, or confirm whether the current state of
the product has been verified through the consumer's public key certificate.
2.
The role of the seller: On the consumer side, the seller can use the system functions to encrypt
verification information with a private key, and the consumer can use the seller's public key to check whether
the seller is what it claims to be. After the sale and purchase, the seller specifies the buyer's address in the
contract for the manufacturer to obtain the information. The seller can access information about his products,
such as sales lists and the amount of his remaining inventory.
3.
The role of the consumer: On the part of the seller, the consumer can check whether the seller has a
sales relationship with the manufacturer, and also check whether the seller's inventory has not been sold. On the
manufacturer's side, consumers can prove that their identity matches their address and in the case of a wellpreserved contract address, consumers can get individual purchase records and product status in their product.
Figure 3 Modules and dataflow in Blockchain.
IMPLEMENTATION
Figure 4 System Architecture of Dapp
1)Login process: Before establishing a connection to the system, the user must choose which account to
log into. The user's accounts are linked to the accounts in Geth, as long as Geth is started, the user can
choose the account which is also linked to the serial number of the list of accounts in Geth. Next, the user
has to type the Keystore file, which is an encrypted file that contains the private key. Finally, the user can
type the contract address and click the save button to set the basic information.
DOI: 10.35629/6734-1106015056
www.ijesi.org
54 | Page
Blockchain Platform For Product Anticounterfeiting In Supply Chain
2)Public information about the contract: With the aim of disclosure of information, information about the
sellers is completely public. Our system provides smart contract data search functions, which can return
the list of sellers, the list of consumers, all information about the seller, and the remaining number of
products of each seller. The data storage format in the smart contract.
3) Adding new sellers and number of products: In our system, manufacturers can check seller information,
including adding new seller addresses and also the number of products that can be sold by a specific seller.
The program in the smart contract will first check if the function setter is the producer. If correct, the
program will build a seller structure and set the maximum number of products that can be sold for sellers,
this amount can also be changed later.
4) Exchange provision for specific user products: as customers provide proof of identity and the address to
send the product to. The manufacturer will initially check if the identity is correct and then determine if the
consumer's product information is in the smart contract, then proceed to change the product status to
exchange status. As an observation, this function will check if the setter is the producer. Otherwise, the
function will return without setting the value.
5) Smart Contract: When the transaction between seller and consumer is established, the seller will add the
consumer's address in the smart contract. Each seller has a product structure in the seller structure, the
seller enters the consumer's addresses in the product owner field. Also, the access rights of the seller's
product owner field can only be set by the seller.
6) Identity Verification: Identity Verification is one of the most important components of our system.
Users of our system can use their addresses as their representation. The address is defined within the last
20 bits of the user's public key. Whenever a user wants to make a change to the current status of the
Ethereum contract, the user must sign the transaction with his or her private key to perform a digital
signature. As long as the user's private key is secure, there will be no other means to change the user's
identity
Result and discussion:
The system enhanced security, the system provides decentralization, it provides transparency and it
protects the data which we are given to the system it gives privacy and it increased efficiency.
IV. CONCLUSION
This paper is the first blockchain system to propose a fully functional anti-counterfeiting system.
By paying a very low transaction fee, users of our system no longer have to worry about the possibility of
purchasing a counterfeit product.
Manufacturers can use the system to store relevant information about product sales in blockchain
for everyone to see. The total amount of sales that can be sold by the seller and the number of products that
the seller currently has left are transparent. The user can use the functions provided by our system to carry
out manufacturer verification immediately. The system provides identity verification using digital
signatures. There are no other means of decrypting the key owner's private key unless the key owner
accidentally loses their key.
In our system analysis result, the cost of the initial product record contract is only $1.2893394289
US, and the cost of each product sales process is $0.17415436749 US. Both costs are much lower than
working with reliable large chain stores and well-established direct selling stores. Our system can
effectively lower the anti-counterfeiting threshold of branded goods and provide companies with limited
financial resources with an easier approach to reassure consumers that they will not buy count erfeit goods.
Future work:
Blockchain technology is still in its general early stages in terms of usage, therefore more research
is required. Future work on this framework may be proof of the simplicity of the code. The customer can
believe that the proper applications and due to the simplicity of the code, without excessive code, will have
additional use. With the experience gained in this project, it is clear that when assigning a chain of blocks
that is counterfeit-resistant and traceable, then platform improvement is warranted by a move toward
genuine product warranties. This would improve the customer experience by making the entire supply
chain framework more open and transparent. In addition, it is hoped that a buyers' intellectual framework
can be built on cross-line product tracing, providing more accurate and far-reaching product and seller
tracing information to administrative authorities around the world. Obtaining data of such quality will be
DOI: 10.35629/6734-1106015056
www.ijesi.org
55 | Page
Blockchain Platform For Product Anticounterfeiting In Supply Chain
conceivable with estimates of coordinated efforts, for example, administrative support, framework
creation, and data sharing.
REFERENCES
[1].
[2].
[3].
[4].
[5].
[6].
[7].
[8].
[9].
[10].
[11].
[12].
Muhammad Nasir Mumtaz Bhutta, Amir A. Khwaja, Adnan Nadeem, Hafiz Farooq Ahmad , Muhammad Khurram Khan, Moataz
A. Hanif, Houbing Song, Majed Alshamari , and Yue Cao , “A Survey on Blockchain Technology: Evolution, Architecture and
Security”, IEEE special section on intelligent big data analytics for internet of things, services and people,2021, pp. 61048 – 61073.
Rishabh Sushil Bhatnagar, Sneha Manoj Jha , Shrey Surendra Singh, Rajkumar Shende “Product Traceability using Blockchain”,
2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).
Si Chen , Rui Shi , Zhuangyu Ren , Jiaqi Yan , Yani shi , Jinyu Zhang,“ A Blockchain-based Supply Chain Quality Management
Framework”, 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE)
M.C.Jayaprasanna, .V.A.Soundharya , M.Suhana, S.Sujatha,” A Block Chain based Management System for Detecting Counterfeit
Product in Supply Chain” ,IEEE 2021 Third International Conference on Intelligent Communication Technologies and Virtual
Mobile Networks (ICICV)
Jinhua Ma , Shih-Ya Lin , Xin Chen , Hung-Min Sun,A Blockchain-Based Application System for Product Anti-Counterfeiting”
International Journal Of Scientific & Technology Research Volume 8, Issue 12, December 2019 issn 2277-8616.
B. M. A. L. Basnayake, C. Rajapakse,” A Blockchain-based decentralized system to ensure the transparency of organic food supply
chain” ,IEEE 2019 International Research Conference on Smart Computing and Systems Engineering (SCSE)
Atima Tharatipyakul and Suporn Pongnumkul, “User Interface of Blockchain-Based Agri-Food Traceability Applications”, IEEE
vol 9, 2019,pp.82909-82929.
Shuai Wang , Liwei Ouyang , Yong Yuan, Xiaochun Ni , Xuan Han and Fei-Yue Wang,“Blockchain-Enabled Smart Contracts:
Architecture, Applications, and Future Trends”, IEEE Transactions on Systems, Man, and Cybernetics: Systems ,2019, pp.22662277
Shuai Wang , Liwei Ouyang , Yong Yuan, Xiaochun Ni , Xuan Han and Fei-Yue Wang,“Blockchain-Enabled Smart Contracts:
Architecture, Applications, and Future Trends”, IEEE Transactions on Systems, Man, and Cybernetics: Systems ,2019, pp.22662277
Laura Ricci, Damiano Di Francesco Maesa, Alfredo Favenza and Enrico Ferro, “Block chains for COVID-19 Contact Tracing and
Vaccine Support: A Systematic Review”, IEEE 2021,pp.37936 - 37950.
Online:https://coinmarketcap.com/alexandria/glossary/sha-256
Online:https://www.geeksforgeeks.org/blockchain-technology-introduction/
Dr.Vikas Reddy,Dr.Seshaiah Merikapudi,Pavan Kalyan Y, Harshitha G L, Mushaffiq Ahmed Mujale
et. al. "Blockchain Platform For Product Anticounterfeiting In Supply Chain.” International Journal
of Engineering Science Invention (IJESI), Vol. 11(06), 2022, PP 50-56. Journal DOI- 10.35629/6734
DOI: 10.35629/6734-1106015056
www.ijesi.org
56 | Page
Download