Blockchain-Enabled Supply Chain Management: A Review of Security, Traceability, and Data Integrity Amid the Evolving Systemic Demand
Abstract
:1. Introduction
1.1. Contributions
- The cross-sectoral evaluation of blockchain applications in supply chains: The present study reviews how blockchain is implemented across diverse sectors, such as logistics, healthcare, agriculture, retail (particularly pharmaceuticals), and humanitarian supply chains. It compares strategies and contextual constraints to understand the role of sector-specific dynamics in shaping blockchain adoption.
- The identification of key SCM security risks and blockchain’s mitigation capabilities: this study identifies recurring supply chain security challenges, such as product counterfeiting, traceability breakdowns, and data tampering, and examines how blockchain mechanisms, like decentralization, smart contracts, and cryptographic assurance, address them.
- The analysis of the new security challenges introduced by blockchain itself: In addition to addressing external threats, this paper analyzes security concerns that arise from blockchain’s own architecture. These include the rigidity of smart contracts, oracle dependencies, the lack of interoperability, and issues with off-chain data validation, each of which poses potential operational vulnerabilities.
- The inclusion of humanitarian use cases to expand the existing literature: by integrating disaster relief, refugee logistics, pandemic responses, and donation transparency into the review, this study highlights blockchain’s underexplored potential in high-risk and resource-constrained environments, thereby extending the boundaries of current SCM research.
- The examination of organizational barriers and socio-technical adoption constraints: This review addresses non-technical adoption barriers, such as institutional resistance, skill shortages, regulatory uncertainty, and concerns over privacy and transparency. These are critical for evaluating blockchain’s real-world viability beyond prototypes.
- Thematic mapping between SCM risks and blockchain architectures: A conceptual framework is presented that links classified supply chain risks with corresponding blockchain-based countermeasures. This mapping assists both researchers and practitioners in selecting appropriate blockchain designs for specific operational contexts.
- Positioning blockchain within the context of evolving systemic demands: This paper evaluates how emerging paradigms, like the IoE, edge computing, and quantum threats, are reshaping trust, traceability, and data assurance in supply chains. It emphasizes the need for blockchain systems to adapt to dynamic and future-oriented environments.
- Recommendations and research directions for future blockchain–SCM integration: it outlines key gaps in the literature and suggests future research topics, such as post-quantum cryptography, scalable architecture design, privacy-preserving smart contracts, and real-time integration through edge computing.
- The formal analysis of ZKP principles in an SCM context: This study introduces a structured mathematical framing of zero-knowledge proof (ZKP) properties, completeness, soundness, and zero-knowledge, and analyzes their relevance within supply chain systems. By highlighting how these principles support trust, privacy, and auditability, the work bridges abstract cryptographic logic with practical SCM requirements, such as secure traceability and data confidentiality.
- Conceptual cross-chain architecture for supply chain interoperability: This study introduces a conceptual cross-chain architecture that demonstrates how supply chain stakeholders, such as suppliers, retailers, and auditors, can operate across heterogeneous blockchain platforms, including Hyperledger Fabric and Ethereum. By incorporating ZKP-based validation and oracle-assisted communication via a Chainlink bridge, the model outlines a secure and interoperable structure for coordinating distributed supply chain processes while ensuring data integrity, transparency, and traceability. In this regard, it provides a guiding framework for the design of blockchain-enabled SCM systems.
1.2. Methodology
- The selection of studies and data sources: A wide range of peer-reviewed journal articles, industrial white papers, and case studies were collected from recognized scientific databases, such as IEEE Xplore, Elsevier, Springer, MDPI, Wiley, ACM, and Taylor & Francis, and Emerald. No single publisher was prioritized. Instead, studies were selected based on their relevance to blockchain applications in SCM, particularly those addressing security vulnerabilities, traceability mechanisms, and data integrity concern.
- Timeframe and inclusion criteria: In selecting the references for this study, priority was given to recent and high-impact publications that reflect the evolving landscape of blockchain-enabled supply chain systems. While emerging research was emphasized to ensure relevance, foundational works were also incorporated to provide theoretical completeness and contextual continuity.
- Search strategy and keywords: Keyword-based searches were conducted using combinations of terms such as “blockchain supply chain security”, “blockchain traceability”, “data integrity in blockchain SCM”, “smart contract vulnerabilities”, “cross-chain interoperability”, “privacy-preserving blockchain mechanisms”, “confidential transactions in SCM”, and “blockchain for humanitarian logistics”. These search queries were carefully selected to capture recent advancements and reflect the evolving technological and systemic challenges discussed in the literature.
- The thematic classification of supply chain risks and blockchain-based mitigations: The identified studies were classified based on recurring SCM risk categories, including product counterfeiting and authenticity concerns, data tampering and inconsistency, limited traceability across multi-tier networks, and Internet of Things (IoT)-related security weaknesses. Each risk category was analyzed alongside relevant blockchain-based mechanisms, such as smart contracts for automation and enforcement, cryptographic hashing for data integrity, decentralized consensus protocols for trust-building, and oracles and interoperability standards for external data integration.
- The sectoral assessment of blockchain applications in SCM: Blockchain adoption was analyzed across logistics, agriculture, food, healthcare, and retail supply chains. This stage aimed to extract
- Adoption variations across sectors;
- Context-specific implementation challenges;
- Legal and regulatory concerns;
- Sector-specific use cases demonstrating blockchain’s impact on traceability, security, and data reliability.
- The comparative evaluation of blockchain’s contribution to SCM pillars: this study further assessed how blockchain addresses the core pillars of SCM:
- Security: by enabling tamper resistance, fraud prevention, and secure access control;
- Traceability: through real-time visibility, end-to-end product tracking, and provenance assurance;
- Data integrity: via synchronized, immutable ledgers shared across stakeholders.
- The visualization and synthesis of the findings: To enhance clarity and comparative insight, the results are presented using structured tables, conceptual mappings, and thematic summaries. These visual elements highlight the trade-offs among blockchain technologies across different supply chain layers, offering practical guidance for future research and system design under evolving systemic demands.
2. Key Security Challenges in Traditional Supply Chain Management
2.1. Traceability Deficiencies in Traditional Supply Chains
2.2. Data Integrity Risks
2.3. Counterfeit Products and Record Deficiencies
2.4. Data Security Issues in IoT Integration
- Enables real-time traceability, increasing transparency at every stage of the supply chain.
- Ensures continuous data flows, allowing more accurate inventory management and timely deliveries.
- Reduces human intervention through automated systems, accelerating processes and enhancing operational efficiency.
- Anticipates potential supply chain disruptions or deviations, thereby supporting risk management.
2.5. Supply Chain Attacks Exploiting Trusted Software Channels
3. Enhancing Supply Chain Security Through Blockchain Technology
3.1. Security Advantages of Blockchain in Supply Chains
3.1.1. Immutable Records Ensuring Data Integrity in Supply Chains
3.1.2. Automated and Reliable Transactions
3.1.3. Cryptographic Signatures
3.1.4. Decentralization as a Foundation for Supply Chain Trust and Integrity
3.2. Comparison of Traditional and Blockchain-Based Supply Chains
4. Security Threats and Attack Methods in Blockchain-Based Supply Chain Management
4.1. Traceability and Anti-Counterfeiting Measures
- Incorrect or incomplete data entry: The accuracy of blockchain data depends directly on the reliability of the information provided at entry points. Incorrect or incomplete data entries can lead to flawed records on the blockchain, undermining anti-counterfeiting efforts [54]. For instance, if suppliers or manufacturers deliberately or negligently misreport product origins, consumer deception and market trust erosion become significant risks.
- Oracle vulnerabilities: The reliability of external data sources constitutes a critical vulnerability in blockchain-based supply chains. The transfer of logistical data, quality control reports, and certificates onto the blockchain relies heavily on oracle mechanisms. However, oracles are susceptible to technical attacks and can be manipulated by malicious actors. Additionally, companies may provide false data to achieve competitive advantages, undermining the transparency and reliability of the entire system [55]. Due to blockchain’s immutable nature, transactions based on incorrect data provided through oracles cannot be reversed, posing substantial risks for stakeholders [56]. Although solutions such as multi-source verification and reputation-based validation have been proposed, the absolute security of external data sources remains elusive. It is emphasized that oracle security should be supported not only by technical measures but also by regulatory frameworks [57]. A trust model using blockchain-based supply chain traceability has been proposed to overcome these oracle-related security concerns [58]. For instance, an Italian dairy company employed blockchain technology to combat product counterfeiting but had to implement additional measures to address oracle-related security risks. Independent certification authorities and incentive mechanisms were introduced to enhance the data accuracy and strengthen the system’s reliability.
- Data deletion or modification: The ability to alter historical records in traditional databases significantly increases the risk of manipulation and counterfeiting in supply chains. For example, manufacturers or distributors can retrospectively modify delivery records of products that fail quality standards, misrepresenting these products as safe or compliant. Although blockchain data are immutable, inadequate integration between blockchain and traditional systems or the failure to reflect certain records onto the blockchain continues to pose counterfeiting risks [47,54].
4.2. Data Integrity and Manipulation Threats
- Incorrect data entry: Due to blockchain’s immutability, incorrect or incomplete data entries represent a critical security risk. Once erroneous information is recorded, it becomes permanent and cannot be corrected [54]. This can lead to poor decision-making and operational disruptions within supply chains. Because manual data entry inherently carries risks of user errors or intentional manipulation, effective data validation mechanisms must be rigorously implemented.
- Malicious data injection: This threat involves unauthorized actors deliberately inserting inaccurate or manipulated data into the system. Such attacks can lead to false product movement records and the creation of fraudulent entries within the supply chain. Particularly, unverified data from external sources, such as IoT devices, can lead to the system operating on deceptive information. To mitigate this risk, it is essential to apply data source verification methods and secure data-entry procedures utilizing smart contracts [55,56].
- MitM attacks: These attacks threaten data integrity by intercepting and altering the data transmitted between systems. Systems utilizing unencrypted or weak communication protocols become particularly vulnerable. For example, when delivery information is modified during transit, products may be misdirected, or fraudulent receivers may intervene. To prevent such risks, end-to-end encryption, secure communication protocols, such as TLS and SSL, and robust authentication mechanisms must be enforced. A TLS-based authentication mechanism has been proposed for Industry 4.0 supply chains to mitigate MitM attacks, significantly enhancing security while reducing the communication overhead by 50%. Test results confirmed the proposed method’s resilience against MitM attacks [22].
4.3. Smart Contract Vulnerabilities and Manipulation Threats
- Re-entrancy attacks: Re-entrancy attacks occur when attackers exploit vulnerabilities in smart contracts by invoking a function multiple times before the target contract updates its state [65]. Within the supply chain context, malicious actors can manipulate payment processes or withdraw additional tokens from contracts. This poses a significant threat to secure payments or deliveries managed through smart contracts in supply chains.
- Denial of Service (DoS) attacks: DoS attacks disrupt the operation of smart contracts in blockchain systems, causing resource exhaustion and transaction delays. Attackers may execute transactions that consume excessive gas, preventing smart contracts from functioning properly, or overwhelm the mempool with unnecessary transactions, obstructing transaction verification [66]. In supply chain management, such attacks can disrupt critical processes, like product tracking, payment transactions, and inventory updates, causing delivery delays and inventory inaccuracies. To mitigate these risks, smart contracts should undergo rigorous security audits, gas limits must be optimized, and protections against spam transactions should be implemented.
- Integer overflow/underflow: Smart contracts utilized in supply chain management perform crucial calculations related to inventory tracking, product deliveries, and payments. However, vulnerabilities, such as programming errors and integer overflow or underflow, can lead to significant financial losses [67]. For example, a warehouse smart contract tracking inventory could generate incorrect inventory data due to integer boundary violations, spreading these inaccuracies throughout the supply chain. Attackers could exploit these calculation errors to gain unauthorized access, block order completions, or trigger unintended deliveries [68,69]. Integer boundary violations in Solidity may cause incorrect calculations by the Ethereum Virtual Machine (EVM) [68]. Since traditional tests are insufficient to detect these errors, secure mathematical libraries such as SafeMath or the automated error detection provided in Solidity version 0.8.0 should be utilized. Alternatively, a safer language such as Vyper may be preferred [70,71].
4.4. IoT Integration and Security Vulnerabilities
- DoS/DDoS attacks: Denial of Service (DoS), one of the most prevalent and impactful attacks targeting IoT devices, aims to prevent legitimate users from accessing data and services promptly, typically by isolating devices from the network or exhausting available resources. Distributed Denial of Service (DDoS) attacks differ from DoS attacks in terms of the resources utilized to launch the attack. In DDoS attacks, multiple devices, such as desktop computers, servers, IoT devices, or other network-connected equipment, are simultaneously utilized to perform the attack [72,73,74,75,76], as depicted in Figure 5.
- MitM attacks in IoT network: MitM attacks occur during data transmission between IoT devices and the blockchain network, potentially leading to the theft or alteration of critical supply chain data. In these attacks, the attacker positions themselves between two IoT nodes, intercepts communication, and manipulates data flows by interacting with both parties [77]. IoT components commonly utilized in supply chains, such as RFID devices and smart sensors, are particularly susceptible to these attacks. Attackers can register falsified data onto the blockchain, manipulating the product origin, temperature monitoring, or delivery information. This may result in counterfeit products appearing authentic and severely compromising supply chain security. For instance, in a pharmaceutical supply chain, RFID tags and sensors record temperature data onto the blockchain. An attacker could intervene at the IoT node to inject false temperature data, causing improperly stored drugs to appear safe, potentially posing severe health risks. Implementing secure communication protocols and data encryption methods is essential to mitigate such attacks.
- Spoofing attacks: Spoofing attacks occur when malicious actors impersonate legitimate devices, users, or systems to gain unauthorized access [77]. These attacks utilize various methods, including IP spoofing, email spoofing, and targeting device authentication processes [78]. Attackers may deceive systems by transmitting falsified data packets or impersonating device identities to execute unauthorized operations. Spoofing attacks are especially common in IoT-based systems due to weaknesses in authentication mechanisms [77,78]. In blockchain-based supply chains, these attacks can manifest through the introduction of fake IoT devices or nodes that generate incorrect data. For example, counterfeit RFID readers or sensors integrated into a supply chain network could provide false information about the product location, temperature, or delivery status. Additionally, fake nodes might record inaccurate inventory data on the blockchain, manipulating stock levels or falsely indicating that non-existent products have been delivered. Such attacks compromise system integrity, causing reliability and transparency issues within supply chain processes.
5. Blockchain-Based Supply Chain Security Solutions and Integration Models
5.1. Security Comparison of Permissioned and Permissionless Blockchains
5.2. Data Privacy with Zero-Knowledge Proof (ZKP) and Confidential Transactions
5.3. Cross-Chain Supply Chain Management Systems: Interoperability, Security Risks, and Architectural Design
5.3.1. Comparative Evaluation of Cross-Chain Interoperability
5.3.2. Architectural Model for Cross-Chain Supply Chains and Smart Contract Design
- Security is enforced through cryptographic mechanisms and ZKP-based validation, ensuring that data remain tamper-proof and accessible only to authorized parties during cross-chain operations [91,92]. While platforms like Hyperledger Fabric natively support authentication and access control, this model incorporates additional authentication and access control mechanisms, explicitly illustrated in the center of the architecture, to ensure secure and policy-compliant data exchange at the cross-chain layer. These controls are especially critical at the bridge and ZKP validation stages, where heterogeneous blockchain systems interact and trust boundaries must be enforced.
Algorithm 1. verifyOrder() |
Input: orderID, productID, quantity Output: Boolean if not isAuthorized(caller) then return false endif order ← getOrderDetails(orderID) if order.productID ≠ productID or order.quantity ≠ quantity then return false endif if checkInventory(productID) < quantity then return false endif logAuditTrail(“Order verified”, orderID) return true |
Algorithm 2. logProduction() |
Input: batchID, productID, timestamp Output: Boolean if batchIDExists(batchID) then return false endif if timestamp = null then return false endif productionRecord ← { batchID: batchID, productID:productID, timestamp: timestamp, status: “Completed” } success ← ledger.append(productionRecord) if success = false then return false endif return true |
Algorithm 3. requestOrder() |
Input: productID, quantity Output: Boolean if productID = null or quantity ≤ 0 then return false endif if not isWhitelisted(sender) then return false endif emit OrderRequested( sender, productID, quantity) status[sender] ← “PendingVerification” return true |
Algorithm 4. confirmDelivery() |
Input: orderID, deliveryProof Output: Boolean if orderID = null or deliveryProof = null then return false endif if verifyOracle(deliveryProof)=false then return false endif deliveries[orderID] ← “Confirmed” emit DeliveryConfirmed(orderID) return true |
Algorithm 5. releasePayment() |
Input: orderID, zkProof Output: Boolean if orderID = null or zkProof = null then return false endif if verifyZKP(orderID, zkProof) = false then return false endif amount ← calculateAmount(orderID) recipient ← supplier[orderID] if recipient = null or amount ≤ 0 then return false endif success ← transfer(recipient, amount) if success = false then return false endif emit PaymentReleased(orderID) return true |
6. Sectoral Supply Chain Applications: Areas Secured by Blockchain Technology
6.1. Blockchain Applications in Humanitarian Supply Chains: Real-World Case Study Examples
6.1.1. Blockchain Applications in Disaster Relief Supply Chains: Transparency, Traceability, and Trust
6.1.2. Refugee Logistics and Identity Management
6.1.3. Pandemic and Medical Relief Logistics
6.1.4. Charity and Donation Transparency Platforms
6.1.5. Food Security and Agricultural Aid
6.2. Future Directions and Recommendations
7. Discussions
7.1. Integration of Blockchain into Existing Supply Chains: Practical Complexities
7.2. Privacy vs. Transparency Paradox
7.3. Smart Contracts and Their Operational Limitations
7.4. Cross-Chain Interoperability and Standardization Issues
7.5. Sustainability Concerns and Green Blockchain
7.6. The Human Factor: Organizational Resistance and Skill Gaps
7.7. The Role of Emerging Technologies in Blockchain-Enabled Supply Chains
7.8. Scalability and Sustainability Trade-Offs in Blockchain-Based SCM
7.9. Future Research Directions
- Lightweight and scalable blockchain architectures tailored to supply chain scenarios.
- Legally compliant and adaptable smart contract models.
- Trust-building mechanisms in multi-stakeholder decision-making environments.
- The integration of AI and blockchain for predictive analytics and decision support.
- Real-time data integration through edge computing.
- System architectures capable of maintaining data integrity under IoE-driven data diversity.
- Quantum-resistant cryptographic techniques adapted to the security demands of SCM.
7.10. A Holistic Outlook
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Dudczyk, P.; Dunston, J.K.; Crosby, G.V. Blockchain technology for global supply chain management: A survey of applications, challenges, opportunities and implications. IEEE Access 2024, 12, 70065–70088. [Google Scholar] [CrossRef]
- Aggarwal, M.; Rani, P.; Rani, P.; Sharma, P. Revolutionizing agri-food supply chain management with blockchain-based traceability and navigation integration. Clust. Comput. 2024, 27, 12919–12942. [Google Scholar] [CrossRef]
- Mangala, N.; Naveen, D.R.; Reddy, B.E.; Buyya, R.; Venugopal, K.R.; Iyengar, S.S.; Patnaik, L.M. Secure pharmaceutical supply chain using blockchain in IoT cloud systems. Internet Things 2024, 26, 101215. [Google Scholar]
- Islam, M.D. A survey on the use of blockchains to achieve supply chain security. Inf. Syst. 2023, 117, 102232. [Google Scholar] [CrossRef]
- Tan, Z.; Parambath, S.P.; Anagnostopoulos, C.; Singer, J.; Marnerides, A.K. Advanced persistent threats based on supply chain vulnerabilities: Challenges, solutions and future directions. IEEE Internet Things J. 2025, 12, 6371–6395. [Google Scholar] [CrossRef]
- Roumeliotis, C.; Dasygenis, M.; Lazaridis, V.; Dossis, M. Blockchain and digital twins in smart industry 4.0: The use case of supply chain-a review of integration techniques and applications. Designs 2024, 8, 105. [Google Scholar] [CrossRef]
- Agrawal, B.P.; Aronkar, P.; Palav, M.R.; Badre, S.; Karumuri, V.; Bagale, G.S. Optimizing supply chain management with IoE and AI. In Interdisciplinary Approaches to AI, Internet of Everything, and Machine Learning; IGI Global Scientific Publishing: Hershey, PA, USA, 2025; pp. 423–436. [Google Scholar]
- Wu, H.; Jiang, S.; Cao, J. High-efficiency blockchain-based supply chain traceability. IEEE Trans. Intell. Transp. Syst. 2023, 24, 3748–3758. [Google Scholar] [CrossRef]
- Shoomal, A.; Jahanbakht, M.; Componation, P.J.; Ozay, D. Enhancing supply chain resilience and efficiency through internet of things integration: Challenges and opportunities. Internet Things 2024, 27, 101324. [Google Scholar] [CrossRef]
- Singh, G.K.; Dadhich, M. Supply chain management growth with the adoption of blockchain technology (BoT) and internet of things (IoT). In Proceedings of the 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 12–13 May 2023; pp. 321–325. [Google Scholar]
- Chaker, B.; Damak, C. Integrating blockchain technology for enhanced transparency and security in supply chains. In Strategic Innovations for Dynamic Supply Chains; IGI Global Scientific Publishing: Hershey, PA, USA, 2024; pp. 147–169. [Google Scholar]
- Maurya, V.; Rishiwal, V.; Yadav, M.; Shiblee, M.; Yadav, P.; Agarwal, U.; Chaudhry, R. Blockchain-driven security for IoT networks: State-of-the-art, challenges and future directions. Peer-to-Peer Netw. Appl. 2025, 18, 1–35. [Google Scholar] [CrossRef]
- Shen, Y.; Gao, X.; Sun, H.; Guo, Y. Understanding vulnerabilities in software supply chains. Empir. Softw. Eng. 2025, 30, 1–38. [Google Scholar] [CrossRef]
- Berry, H.S. The importance of cybersecurity in supply chain. In Proceedings of the 11th International Symposium on Digital Forensics and Security (ISDFS), Chattanooga, TN, USA, 11–12 May 2023; pp. 1–5. [Google Scholar]
- Hammi, B.; Zeadally, S. Software supply-chain security: Issues and countermeasures. Computer 2023, 56, 54–66. [Google Scholar] [CrossRef]
- Möller, D.P. Ransomware attacks and scenarios: Cost factors and loss of reputation. In Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices; Springer Nature: Cham, Switzerland, 2023; pp. 273–303. [Google Scholar]
- Cartwright, A.; Cartwright, E. The economics of ransomware attacks on integrated supply chain networks. Digit. Threat. Res. Pract. 2023, 4, 1–14. [Google Scholar] [CrossRef]
- Manning, L.; Kowalsk, A. The threat of ransomware in the food supply chain: A challenge for food defence. Trends Organ. Crime 2023, 26, 1–29. [Google Scholar] [CrossRef]
- Hammi, B.; Zeadally, S.; Jamel, N. Security threats, countermeasures, and challenges of digital supply chains. ACM Comput. Surv. 2023, 55, 1–40. [Google Scholar] [CrossRef]
- Mohamed, A.A.; Al-Saleh, A.; Sharma, S.K.; Tejani, G.G. Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet). Sci. Rep. 2025, 15, 4036. [Google Scholar] [CrossRef] [PubMed]
- Zhou, S.; Li, H.; Fu, X.; Jiao, Y. A novel malware detection model in the software supply chain based on LSTM and SVMs. Appl. Sci. 2024, 14, 6678. [Google Scholar] [CrossRef]
- Kandasamy, V.; Roseline, A.A. Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks. Sci. Rep. 2025, 15, 1697. [Google Scholar] [CrossRef]
- Fereidouni, H.; Fadeitcheva, O.; Zalai, M. IoT and Man-in-the-Middle attacks. Secur. Priv. 2025, 8, e70016. [Google Scholar] [CrossRef]
- Siadati, H.; Jafarikhah, S.; Sahin, E.; Hernandez, T.; Tripp, E.; Khryashchev, D.; Kharraz, A. DevPhish: Exploring social engineering in software supply chain attacks on developers. In Proceedings of the IEEE 15th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), Yorktown Heights, NY, USA, 17–19 October 2024; pp. 517–523. [Google Scholar]
- Lin, I.C.; Kuo, Y.H.; Chang, C.C.; Liu, J.C.; Chang, C.C. Symmetry in blockchain-powered secure decentralized data storage: Mitigating risks and ensuring confidentiality. Symmetry 2024, 16, 147. [Google Scholar] [CrossRef]
- Eghmazi, A.; Ataei, M.; Landry, R.J.; Chevrette, G. Enhancing IoT data security: Using the blockchain to boost data integrity and privacy. IoT 2024, 5, 20–34. [Google Scholar] [CrossRef]
- Chandol, M.K.; Kameswara Rao, M. Blockchain-based cryptographic approach for privacy enabled data integrity model for IoT healthcare. J. Exp. Theor. Artif. Intell. 2025, 37, 53–74. [Google Scholar] [CrossRef]
- Hossain, M.I.; Steigner, T.; Hussain, M.I.; Akther, A. Enhancing data integrity and traceability in industry cyber physical systems (icps) through blockchain technology: A comprehensive approach. arXiv 2024, arXiv:2405.04837. [Google Scholar] [CrossRef]
- Yavaprabhas, K.; Kurnia, S.; Seyedghorban, Z.; Samson, D. Demystifying the impact of blockchain on trust in emerging and established relationships: A case of organic food supply chains. In Proceedings of the 57th Hawaii International Conference on System Sciences (HICSS), Honolulu, HI, USA, 3–6 January 2024; pp. 5898–5907. [Google Scholar]
- Li, J.; Han, D.; Weng, T.H.; Wu, H.; Li, K.C.; Castiglione, A. A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption. Comput. Stand. Interfaces 2025, 91, 103887. [Google Scholar] [CrossRef]
- Naqvi, F.H.; Ali, S.; Haseeb, B.; Khan, N.; Qureshi, S.; Sajid, T.; Aslam, M.I. Design and implementation of smart contract in supply chain management using blockchain and internet of things. Eng. Proc. 2023, 32, 15. [Google Scholar] [CrossRef]
- Jain, Y.K.; Rathore, C.D.S.; Shukla, A.N.; Sing, J.; Gupta, M.; Garg, N. Analyzing the influence of blockchain technology adoption on the supply chain management of the logistics industry. In Proceedings of the International Conference on Communication, Computer Sciences and Engineering (IC3SE), Gautam Buddha Nagar, India, 9–11 May 2024; pp. 948–953. [Google Scholar]
- Sakib, S.N. Blockchain technology for smart contracts: Enhancing trust, transparency, and efficiency in supply chain management. In Achieving Secure and Transparent Supply Chains with Blockchain Technology; IGI Global Scientific Publishing: Hershey, PA, USA, 2024; pp. 246–266. [Google Scholar]
- Raj, P.V.R.P.; Jauhar, S.K.; Ramkumar, M.; Pratap, S. Procurement, traceability and advance cash credit payment transactions in supply chain using blockchain smart contracts. Comput. Ind. Eng. 2022, 167, 108038. [Google Scholar] [CrossRef]
- Muthamilselvan, S.; Shobana, R.; Sujitha, J.; Varsha, K. Ethereum smart contract in supply chain management. In Proceedings of the IEEE International Conference on Power, Energy, Control and Transmission Systems (ICPECTS), Chennai, India, 8–9 October 2024; pp. 1–6. [Google Scholar]
- Yigit, E.; Dag, T. Improving supply chain management processes using smart contracts in the ethereum network written in solidity. Appl. Sci. 2024, 14, 4738. [Google Scholar] [CrossRef]
- Nalayini, C.; Jeevaakatiravan; Imogen, P.V.; Sahana, J. A study on digital signature in blockchain technology. In Proceedings of the Third International Conference on Artificial Intelligence and Smart Energy (ICAIS), Coimbatore, India, 2–4 February 2023; pp. 398–403. [Google Scholar]
- Jasim, L.H.; Mishra, A.; Joshi, S.K.; Sapaev, I.B.; DR, P.; Babu, A.N. Analysing blockchain-based cryptography: Enhancing security, transparency, and practical implementations. In Proceedings of the International Conference for Technological Engineering and its Applications in Sustainable Development (ICTEASD), Necef, Irak, 14–15 November 2023; pp. 39–44. [Google Scholar]
- Mahajan, H.; Reddy, K.T.V. Secure gene profile data processing using lightweight cryptography and blockchain. Clust. Comput. 2024, 27, 2785–2803. [Google Scholar] [CrossRef]
- Qatbi, M.R.S.A.; Rathinam, G. Enhancing supply chain management: A blockchain-based approach for data privacy and transparency in the IoT era. In Proceedings of the 10th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Palembang, Indonesia, 20–21 September 2023; pp. 667–671. [Google Scholar]
- Savadatti, S.G.; Krishnamoorthy, S.; Delhibabu, R. Survey of distributed ledger technology (dlt) for secure and scalable computing. IEEE Access 2025, 13, 8393–8415. [Google Scholar] [CrossRef]
- Yadav, A.S.; Agrawal, S.; Kushwaha, D.S. Distributed ledger technology-based land transaction system with trusted nodes consensus mechanism. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 6414–6424. [Google Scholar] [CrossRef]
- Sharabati, A.A.A.; Jreisat, E.R. Blockchain technology implementation in supply chain management: A literature review. Sustainability 2024, 16, 2823. [Google Scholar] [CrossRef]
- Jahani, M.; Raji, F.; Zojaji, Z. Securing supply chain through blockchain-integrated algorithmic system: Ensuring product quality and counterfeiting tags detection. Clust. Comput. 2025, 28, 1–23. [Google Scholar] [CrossRef]
- Gayialis, S.P.; Kechagias, E.P.; Papadopoulos, G.A.; Masouras, D. A review and classification framework of traceability approaches for identifying product supply chain counterfeiting. Sustainability 2022, 14, 6666. [Google Scholar] [CrossRef]
- Liu, B.; Si, X.; Kang, H. A literature review of blockchain-based applications in supply chain. Sustainability 2022, 14, 15210. [Google Scholar] [CrossRef]
- Santhi, A.R.; Muthuswamy, P. Influence of blockchain technology in manufacturing supply chain and logistics. Logistics 2022, 6, 15. [Google Scholar] [CrossRef]
- Agarwal, U.; Rishiwal, V.; Yadav, M.; Alshammari, M.; Yadav, P.; Singh, O. Exploring blockchain and supply chain integration: State-of-the-art, security issues, and emerging directions. IEEE Access 2024, 12, 143945–143974. [Google Scholar] [CrossRef]
- Hasan, A.S.M.T.; Sabah, S.; Haque, R.U.; Daria, A.; Rasool, A.; Jiang, Q. Towards convergence of IoT and blockchain for secure supply chain transaction. Symmetry 2022, 14, 64. [Google Scholar] [CrossRef]
- Njualem, L.A. Leveraging blockchain technology in supply chain sustainability: A provenance perspective. Sustainability 2022, 14, 10533. [Google Scholar] [CrossRef]
- Gong, Y.; Zhang, Y.; Alharithi, M. Supply chain finance and blockchain in operations management: A literature review. Sustainability 2022, 14, 13450. [Google Scholar] [CrossRef]
- Gokkaya, B.; Karafili, E.; Aniello, L.; Halak, B. Global supply chains security: A comparative analysis of emerging threats and traceability solutions. Benchmarking Int. J. 2025, 32, 917–942. [Google Scholar] [CrossRef]
- Rajchandar, K.; Shameem, A.; Biswas, P.; Geetha, B.T.; Arunkumar, J.R.; Lakineni, P.K. Supply chain management using blockchain: Opportunities, challenges, and future directions. In Proceedings of the Second International Conference on Informatics (ICI), Noida, India, 23 November 2023; pp. 1–6. [Google Scholar]
- Chang, A.J.; El-Rayes, N.; Nesreen; Shi, J. Blockchain technology for supply chain management: A comprehensive review. FinTech 2022, 1, 191–205. [Google Scholar] [CrossRef]
- Ahmadjee, S.; Mera-Gómez, C.; Farshidi, S.; Bahsoon, R.; Kazman, R. Decision Support Model for Selecting the Optimal Blockchain Oracle Platform: An Evaluation of Key Factors. ACM Trans. Softw. Eng. Methodol. 2025, 34, 1–35. [Google Scholar] [CrossRef]
- Hassan, A.; Makhdoom, I.; Iqbal, W.; Ahmad, A.; Raza, A. From trust to truth: Advancements in mitigating the Blockchain Oracle problem. J. Netw. Comput. Appl. 2023, 217, 103672. [Google Scholar] [CrossRef]
- Caldarelli, G. Overview of blockchain oracle research. Future Internet 2022, 14, 175. [Google Scholar] [CrossRef]
- Caldarelli, G. Formalizing oracle trust models for blockchain-based business applications. An Example from the supply chain sector. arXiv 2022, arXiv:2202.13930. [Google Scholar]
- Cao, Y.; Guan, S.; Wang, D.; Wang, Z. BE-AC: Reliable blockchain-based anti-counterfeiting traceability solution for pharmaceutical industry. Clust. Comput. 2024, 27, 8119–8139. [Google Scholar] [CrossRef]
- Kang, Y.; Shi, X.; Yue, X.; Zhang, W.; Liu, S.S. Enhancing traceability in wine supply chains through blockchain: A stackelberg game-theoretical analysis. J. Theor. Appl. Electron. Commer. Res. 2023, 18, 2142–2162. [Google Scholar] [CrossRef]
- Crossland, V.; Dellwo, C.; Bashar, G.; Dagher, G.G. Janus: Toward preventing counterfeits in supply chains utilizing a multi-quorum blockchain. Blockchain Res. Appl. 2023, 4, 100157. [Google Scholar] [CrossRef]
- Sugandh, U.; Nigam, S.; Khari, M.; Misra, S. An approach for risk traceability using blockchain technology for tracking, tracing, and authenticating food products. Information 2023, 14, 613. [Google Scholar] [CrossRef]
- Chen, C.L.; Zhan, W.B.; Huang, D.C.; Liu, L.C.; Deng, Y.Y.; Kuo, C.G. Hyperledger fabric-based tea supply chain production data traceable scheme. Sustainability 2023, 15, 13738. [Google Scholar] [CrossRef]
- Eren, H.; Karaduman, Ö.; Gençoğlu, M.T. Security challenges and performance trade-offs in on-chain and off-chain blockchain storage: A comprehensive review. Appl. Sci. 2025, 15, 3225. [Google Scholar] [CrossRef]
- Darvishi, I.; Asare, B.T.; Musa, A.; Yeboah-Ofori, A.; Oseni, W.; Ganiyu, A. Blockchain technology and vulnerability exploits on smart contracts. In Proceedings of the 2024 11th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 19–21 August 2024; pp. 160–167. [Google Scholar]
- Chaganti, R.; Boppana, R.V.; Ravi, V.; Munir, K.; Almutairi, M.; Rustam, F. A comprehensive review of denial of service attacks in blockchain ecosystem and open challenges. IEEE Access 2022, 10, 96538–96555. [Google Scholar] [CrossRef]
- Sun, T.; Yu, W. A formal verification framework for security issues of blockchain smart contracts. Electronics 2020, 9, 255. [Google Scholar] [CrossRef]
- Dimitrijević, N.; Zdravković, N. A review on security vulnerabilities of smart contracts written in solidity. In Proceedings of the Information Society of Serbia—ISOS, Kopaonik, Serbia, 10–13 March 2024; pp. 89–99. [Google Scholar]
- Dhillon, D.; Diksha; Mehrotra, D. Smart contract vulnerabilities: Exploring the technical and economic aspects. In Blockchain Transformations; Springer: Berlin/Heidelberg, Germany, 2024; pp. 81–91. [Google Scholar]
- Endurthi, A.; Khare, A. Smart contracts resilient against malicious attacks in permission-less blockchain. In Proceedings of the 10th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 15–17 March 2023; pp. 1201–1206. [Google Scholar]
- Kannengießer, N.; Lins, S.; Sander, C.; Winter, K.; Frey, H.; Sunyaev, A. Challenges and common solutions in smart contract development. IEEE Trans. Softw. Eng. 2022, 48, 4291–4318. [Google Scholar] [CrossRef]
- Roelink, O. Benchmarking the zk-Snark, zk-Stark, and Bulletproof Non-Interactive Zero-Knowledge Proof Protocols in an Equivalent Practical Application. Master’s Thesis, University of Twente, Enschede, The Netherlands, June 2024. Available online: https://essay.utwente.nl/100612 (accessed on 28 March 2025).
- El-Hajj, M.; Roelink, B.O. Evaluating the efficiency of zk-snark, zk-stark, and bulletproof in real-world scenarios: A benchmark study. Information 2024, 15, 463. [Google Scholar] [CrossRef]
- Imtiaz, N.; Wahid, A.; Abideen, S.Z.U.; Kamal, M.M.; Sehito, N.; Khan, S.; Virdee Bal, S.; Kouhalvandi, L.; Alibakhshikenari, M. A deep learning-based approach for the detection of various Internet of Things intrusion attacks through optical networks. Photonics 2025, 12, 1–39. [Google Scholar] [CrossRef]
- Srhir, A.; Mazri, T.; Benbrahim, M. Towards secure smart campus: Security requirements, attacks and counter measures. Indones. J. Electr. Eng. Comput. Sci. 2023, 32, 900–914. [Google Scholar] [CrossRef]
- Shukla, P.; Krishna, C.R.; Patil, N.V. IoT traffic-based DDoS attacks detection mechanisms: A comprehensive review. J. Supercomput. 2024, 80, 9986–10043. [Google Scholar] [CrossRef]
- Krishna, R.R.; Priyadarshini, A.; Jha, A.V.; Appasani, B.; Srinivasulu, A.; Bizon, N. State-of-the-art review on IoT threats and attacks: Taxonomy, challenges and solutions. Sustainability 2021, 13, 9463. [Google Scholar] [CrossRef]
- Vats, G.; Sharma, P.K. An exhaustive analysis on security issues concerning IoT using blockchain. In Proceedings of the International Conference on Disruptive Technologies (ICDT), Greater Noida, India, 11–12 May 2023; pp. 1–7. [Google Scholar]
- Ahmad, R.W.; Ko, K.M.; Rashid, A.; Rodrigues, J.J.P.C. Blockchain for food industry: Opportunities, requirements, case studies, and research challenges. IEEE Access 2024, 12, 117363–117378. [Google Scholar] [CrossRef]
- Alhussayen, A.A.; Jambi, K.; Khemakhem, M.; Eassa, F.E. A Blockchain oracle interoperability technique for permissioned blockchain. IEEE Access 2024, 12, 68130–68148. [Google Scholar] [CrossRef]
- Nasir, N.M.; Hassan, S.; Zaini, K.M. Securing permissioned blockchain-based systems: An analysis on the significance of consensus mechanisms. IEEE Access 2024, 12, 138211–138238. [Google Scholar] [CrossRef]
- Ucbas, Y.; Eleyan, A.; Hammoudeh, M.; Alohaly, M. Performance and scalability analysis of Ethereum and Hyperledger Fabric. IEEE Access 2023, 11, 67156–67167. [Google Scholar] [CrossRef]
- Byers, B.; Hunhevicz, J.J.; Honic-Eser, M.; De Wolf, C. Exploring tokenized product passports for circular construction supply chains. In Proceedings of the European Conference on Computing in Construction, Chania, Crete, Greece, 14–17 July 2024; pp. 34–41. [Google Scholar]
- Honar Pajooh, H.; Rashid, M.; Alam, F.; Demidenko, S. Hyperledger fabric blockchain for securing the edge ınternet of things. Sensors 2021, 21, 359. [Google Scholar] [CrossRef] [PubMed]
- Ravi, D.; Ramachandran, S.; Vignesh, R.; Falmari, V.R.; Brindha, M. Privacy preserving transparent supply chain management through Hyperledger Fabric. Blockchain Res. Appl. 2022, 3, 100072. [Google Scholar] [CrossRef]
- Mitani, T.; Otsuka, A. Traceability in permissioned blockchain. IEEE Access 2020, 8, 21573–21588. [Google Scholar] [CrossRef]
- Xue, Y.; Wang, J. Design of a blockchain-based traceability system with a privacy-preserving scheme of zero-knowledge proof. Secur. Commun. Netw. 2022, 2022, 5842371. [Google Scholar] [CrossRef]
- Ishii, D. Mathematical definiton of zero-knowledge proofs: Concepts and examples. Res. Propos. 2025. [Google Scholar] [CrossRef]
- Prasad, S.; Tiwari, N. Zero-knowledge proofs in blockchain-enabled supply chain management. In Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications; Springer Nature: Singapore, 2024; pp. 47–70. [Google Scholar]
- Guo, H.; Yu, X. A survey on blockchain technology and its security. Blockchain Res. Appl. 2022, 3, 100067. [Google Scholar] [CrossRef]
- Samantray, B.S.; Reddy, K.H.K. A novel secure supply chain for smart healthcare systems: An approach to leverage blockchain, Keccak-256, and ZKP for drug safety assurance. Peer-to-Peer Netw. Appl. 2025, 18, 16. [Google Scholar] [CrossRef]
- Zhang, B.; Xu, J.; Wang, X.; Zhao, Z.; Chen, S.; Zhang, X. Research on the construction of grain food multi-chain blockchain based on zero-knowledge proof. Foods 2023, 12, 1600. [Google Scholar] [CrossRef]
- Nithin, G.N.; Pradhan, A.K.; Swain, G. zkHealthChain-blockchain enabled supply chain in healthcare using zero knowledge. In IFIP International Internet of Things Conference; Springer: Cham, Switzerland, 2023; pp. 133–148. [Google Scholar]
- Anita, N.; Vijayalakshmi, M.; Shalinie, S.M. Blockchain-based anonymous anti-counterfeit supply chain framework. Sādhanā 2022, 47, 208. [Google Scholar] [CrossRef]
- Daraghmi, E.Y.; Jayousi, S.; Daraghmi, Y.A.; Daraghma, R.S.M.; Fouchal, H. Smart contracts for managing the agricultural supply chain: A practical case study. IEEE Access 2024, 12, 125462–125479. [Google Scholar] [CrossRef]
- Agostinelli, S.; Arman, A.; De Luzi, F.; Monti, F.; Manglaviti, M.; Mecella, M. Supporting business confidentiality in coopetitive scenarios: The B-CONFIDENT approach in blockchain-based supply chains. J. Ind. Inf. Integr. 2024, 42, 100730. [Google Scholar] [CrossRef]
- Al-Rakhami, M.; Al-Mashari, M. Interoperability approaches of blockchain technology for supply chain systems. Bus. Process Manag. J. 2022, 28, 1251–1276. [Google Scholar] [CrossRef]
- Mao, H.; Nie, T.; Sun, H.; Shen, D.; Yu, G. A survey on cross-chain technology: Challenges, development, and prospect. IEEE Access 2022, 11, 45527–45546. [Google Scholar] [CrossRef]
- Duan, L.; Sun, Y.; Ni, W.; Ding, W.; Liu, J.; Wang, W. Attacks against cross-chain systems and defense approaches: A contemporary survey. IEEE/CAA J. Autom. Sin. 2023, 10, 1647–1667. [Google Scholar] [CrossRef]
- Peng, X.; Zhang, X.; Wang, X.; Li, H.; Xu, J.; Zhao, Z.; Wang, Y. Research on the cross-chain model of rice supply chain supervision based on parallel blockchain and smart contracts. Foods 2022, 11, 1269. [Google Scholar] [CrossRef]
- Wang, Y.; Cheng, T.; Xi, J. SCT-CC: A supply chain traceability system based on cross-chain technology of blockchain. In Proceedings of the Intelligent Computing and Block Chain: First BenchCouncil International Federated Conferences, Qingdao, China, 30 October–3 November 2021; pp. 281–293. [Google Scholar]
- Seven Key Cross-Chain Bridge Vulnerabilities Explained. Available online: https://chain.link/education-hub/cross-chain-bridge-vulnerabilities (accessed on 2 April 2025).
- Polkadot Platform: Whitepaper. Available online: https://polkadot.com/papers (accessed on 2 April 2025).
- Cosmos Platform. IBC Versus Other Interoperability Solutions. Available online: https://ibcprotocol.dev/interoperability-solution-comparison (accessed on 2 April 2025).
- Tortola, D.; Lisi, A.; Mori, P.; Ricci, L. Tethering Layer 2 solutions to the blockchain: A survey on proving schemes. Comput. Commun. 2024, 225, 289–310. [Google Scholar] [CrossRef]
- Augusto, A.; Belchior, R.; Correia, M.; Vasconcelos, A.; Zhang, L.; Hardjono, T. SoK: Security and privacy of blockchain interoperability. In Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2024. [Google Scholar]
- Durán, C.; Yazdi, A.K.; Derpich, I.; Tan, Y. Leveraging blockchain for maritime port supply chain management through multicriteria decision making. Mathematics 2024, 12, 1511. [Google Scholar] [CrossRef]
- Tan, B.Q.; Wang, F.; Kang, J.L.K.; Costa, F. A blockchain-based framework for green logistics in supply chains. Sustainability 2020, 12, 4656. [Google Scholar] [CrossRef]
- Alqarni, M.A.; Alkatheiri, M.S.; Chauhdary, S.H.; Saleem, S. Use of blockchain-based smart contracts in logistics and supply chains. Electronics 2023, 12, 1340. [Google Scholar] [CrossRef]
- Zhang, G.; Zhang, Z. An evolutionary game model of a regional logistics service supply chain complex network in a blockchain environment. Systems 2025, 13, 32. [Google Scholar] [CrossRef]
- Alkhodair, M.; Alkhudhayr, H. Harnessing industry 4.0 for SMEs: Advancing smart manufacturing and logistics for sustainable supply chains. Sustainability 2025, 17, 813. [Google Scholar] [CrossRef]
- Panigrahi, A.; Pati, A.; Dash, B.; Sahoo, G.; Singh, D.; Dash, M. ASBlock: An agricultural based supply chain management using blockchain technology. Procedia Comput. Sci. 2024, 235, 1943–1952. [Google Scholar] [CrossRef]
- Mokgomola, F.; Telukdarie, A.; Munien, I.; Onkonkwo, U.; Vermeulen, A. Blockchain and smart contracts based agricultural supply chain. Procedia Comput. Sci. 2024, 237, 637–644. [Google Scholar] [CrossRef]
- Chen, F.; Zhao, C.; Yang, X.; Luo, N.; Sun, C. A lightweight accountable parallel blockchain architecture based on redactable blockchain for agri-food traceability. Foods 2025, 14, 623. [Google Scholar] [CrossRef]
- Wang, L.; Sun, W.; Zhao, J.; Zhang, X.; Lu, C.; Luo, H. A non-fungible token and blockchain-based cotton lint traceability solution. Appl. Sci. 2024, 14, 1610. [Google Scholar] [CrossRef]
- Morais, R.; Rosado da Cruz, A.M.; Cruz, E.F. Fruit and vegetables blockchain-based traceability platform. Computers 2024, 13, 112. [Google Scholar] [CrossRef]
- Ahuja, R.; Chugh, S.; Singh, R. SeedChain: A secure and transparent blockchain-driven framework to revolutionize the seed supply chain. Future Internet 2024, 16, 132. [Google Scholar] [CrossRef]
- Farooq, M.S.; Riaz, S.; Rehman, I.U.; Khan, M.A.; Hassan, B. A blockchain-based framework to make the rice crop supply chain transparent and reliable in agriculture. Systems 2023, 11, 476. [Google Scholar] [CrossRef]
- Rizzardi, A.; Sicari, S.; Cevallos, M.J.F.; Coen-Porisini, A. IoT-driven blockchain to manage the healthcare supply chain and protect medical records. Future Gener. Comput. Syst. 2024, 161, 415–431. [Google Scholar] [CrossRef]
- Shah, D.; Rani, S.; Shoukat, K.; Kalsoom, H.; Shoukat, M.U.; Almujibah, H.; Liao, S. Blockchain factors in the design of smart-media for e-healthcare management. Sensors 2024, 24, 6835. [Google Scholar] [CrossRef] [PubMed]
- Arvizo, A.I.M.; Sosa, L.A.; Alcaraz, J.L.G.; Cruz-Mejía, O. Beneficiary contracts on a lightweight blockchain architecture using smart contracts: A smart healthcare system for medical records. Appl. Sci. 2024, 13, 6694. [Google Scholar] [CrossRef]
- Abutaleb, R.A.; Alqahtany, S.S.; Syed, T.A. Integrity and privacy-aware, patient-centric health record access control framework using a blockchain. Appl. Sci. 2023, 13, 1028. [Google Scholar] [CrossRef]
- Perumalsamy, S.; Kaliyamurthy, V. Blockchain non-fungible token for effective drug traceability system with optimal deep learning on pharmaceutical supply chain management. Eng. Technol. Appl. Sci. Res. 2025, 15, 19261–19266. [Google Scholar] [CrossRef]
- Azzaoui, A.E.; Chen, H.; Kim, S.H.; Pan, Y.; Park, J.H. Blockchain-based distributed information hiding framework for data privacy preserving in medical supply chain systems. Sensors 2022, 22, 1371. [Google Scholar] [CrossRef] [PubMed]
- Aslam, M.; Jabbar, S.; Abbas, Q.; Albathan, M.; Hussain, A.; Raza, U. Leveraging Ethereum platform for development of efficient tractability system in pharmaceutical supply chain. Systems 2023, 11, 202. [Google Scholar] [CrossRef]
- Mishra, R.; Ramesh, D.; Edla, D.R.; Qi, L. VaccineChain: A checkpoint assisted scalable blockchain based secure vaccine supply chain with selective revocation. J. Ind. Inf. Integr. 2023, 34, 100485. [Google Scholar] [CrossRef]
- Mezquita, Y.; Podgorelec, B.; Gil-González, A.B.; Corchado, J.M. Blockchain-based supply chain systems, interoperability model in a pharmaceutical case study. Sensors 2023, 23, 1962. [Google Scholar] [CrossRef]
- Humayun, M.; Jhanjhi, N.Z.; Niazi, M.; Amsaad, F.; Masoo, I. Securing drug distribution systems from tampering using blockchain. Electronics 2022, 11, 1195. [Google Scholar] [CrossRef]
- Chandrasekaran, S. Isogency hosmer–lemeshow logistic regression-based secured information sharing for pharma supply chain. Electronics 2022, 11, 3170. [Google Scholar] [CrossRef]
- Islam, I.; Islam, M.N. A blockchain based medicine production and distribution framework to prevent medicine counterfeit. J. King Saud Univ.-Comput. Inf. Sci. 2024, 36, 101851. [Google Scholar] [CrossRef]
- Arsheen, S.; Ahmad, K. ImmuneChain: A blockchain-based secure and transparent vaccine supply chain. SN Comput. Sci. 2025, 6, 40. [Google Scholar] [CrossRef]
- Mishra, R.; Ramesh, D.; Mohamm, N.; Mondal, B. Blockchain enabled secure pharmaceutical supply chain framework with traceability: An efficient searchable pharmachain approach. Clust. Comput. 2024, 27, 13621–13641. [Google Scholar] [CrossRef]
- Vitaskos, V.; Demestichas, K.; Karetsos, S.; Costopoulou, C. Blockchain and Internet of Things technologies for food traceability in olive oil supply chains. Sensors 2024, 24, 8189. [Google Scholar] [CrossRef] [PubMed]
- Sharma, I.; Kaur, G.; Dey, B.K.; Majumder, A. Leveraging blockchain and consignment contracts to optimize food supply chains under uncertainty. Appl. Sci. 2024, 14, 11735. [Google Scholar] [CrossRef]
- Adamashvili, N.; Zhizhilashvili, N.; Tricase, C. The integration of the internet of things, artificial intelligence, and blockchain technology for advancing the wine supply chain. Computers 2024, 13, 72. [Google Scholar] [CrossRef]
- Toader, D.C.; Rădulescu, C.M.; Toader, C. Investigating the adoption of blockchain technology in agri-food supply chains: Analysis of an extended UTAUT model. Agriculture 2024, 14, 614. [Google Scholar] [CrossRef]
- Cao, S.; Xu, H.; Bryceson, K.P. Blockchain traceability for sustainability communication in food supply chains: An architectural framework, design pathway and considerations. Sustainability 2023, 15, 13486. [Google Scholar] [CrossRef]
- Ahamed, N.N.; Karthikeyan, P. FLBlock: A sustainable food supply chain approach through federated learning and blockchain. Procedia Comput. Sci. 2024, 235, 3065–3074. [Google Scholar] [CrossRef]
- Zhang, Y.; Wu, X.; Ge, H.; Jiang, Y.; Sun, Z.; Ji, X.; Jia, Z.; Cui, G. A blockchain-based traceability model for grain and oil food supply chain. Foods 2023, 12, 3235. [Google Scholar] [CrossRef] [PubMed]
- Kechagias, E.P.; Gayialis, S.P.; Papadopoulos, G.A.; Papoutsis, G. An Ethereum-based distributed application for enhancing food supply chain traceability. Foods 2023, 12, 1220. [Google Scholar] [CrossRef]
- Agarwal, U.; Rishiwal, V.; Shiblee, M.; Yadav, M.; Tanwar, S. Blockchain-based intelligent tracing of food grain crops from production to delivery. Peer-to-Peer Netw. Appl. 2024, 17, 3722–3749. [Google Scholar] [CrossRef]
- Arvana, M.; Rocha, A.D.; Barata, J. Agri-food value chain traceability using blockchain technology: Portuguese hams’ production scenario. Foods 2023, 12, 4246. [Google Scholar] [CrossRef]
- Nazir, H.; Fan, J. Revolutionizing retail: Examining the influence of blockchain-enabled IoT capabilities on sustainable firm performance. Sustainability 2024, 16, 3534. [Google Scholar] [CrossRef]
- Yu, T.; Guan, Z.; Zhan, J.; Dong, J. Blockchain adoption and contract coordination of poverty alleviation supply chain considering altruistic preference. Comput. Ind. Eng. 2024, 188, 109879. [Google Scholar] [CrossRef]
- Ekinci, E.; Sezer, M.D.; Mangla, S.K.; Kazancoglu, Y. Building sustainable resilient supply chain in retail sector under disruption. J. Clean. Prod. 2024, 434, 139980. [Google Scholar] [CrossRef]
- Rajagopal, M.; Ramkumar, S.; Thimmiaraja, J.; Gobinath, R.; Kumar, K.S. Blockchain-based model for disaster relief supply chain management. In The Role of Blockchain in Disaster Management; Academic Press: Cambridge, MA, USA, 2025; pp. 33–49. [Google Scholar]
- Roushan, A.; Das, A.; Dutta, A.; Bera, U.K. A multi-objective supply chain model for disaster relief optimization using neutrosophic programming and blockchain-based smart contracts. Supply Chain. Anal. 2025, 10, 100107. [Google Scholar] [CrossRef]
- Gao, X.; Chen, Z.; Huang, G.; Hezam, I.M. Blockchain-enabled safeguard mechanism in SCP-based relief supply chain designs in response to long-term disasters. IEEE Access 2024, 12, 133054–133066. [Google Scholar] [CrossRef]
- Inayatulloh; Susanto, B.H.; Setiabudiarto, N.; Teguh, W.; Jariyah, A. Blockchain technology model to increase transparency in the distribution of aid to disaster victims. In Proceedings of the IEEE 2nd International Conference on Electrical Engineering, Computer and Information Technology (ICEECIT), Jember, Indonesia, 22–23 November 2024; pp. 222–226. [Google Scholar]
- Darmawan, B.; Okitasarı, H.; Dwiyanti, V.; Pratama, P.Y.; Haritman, E. Preliminary research: Blockchain system design for post-disaster management in Indonesia. J. Eng. Sci. Technol. 2024, 19, 1268–1279. [Google Scholar]
- Ankit, K.C. Blockchain based donation management in disaster response. J. Innov. Inf. Technol. Appl. (JINITA) 2024, 6, 45–59. [Google Scholar]
- Lotfi, R.; Nasrabadi, A.M.; Ali, S.S.; Mardani, N.; Davoodi, S.M.R.; Aghakhani, S. A viable relief supply chain network design by considering risk and robustness for disaster and crisis management. Cent. Eur. J. Oper. Res. 2024, 1–36. [Google Scholar] [CrossRef]
- Kolhatkar, D.; Jain, O.; Patil, S.; Shelke, P.; Mirajkar, R.; Wawage, P. Blockchain applications in disaster management systems. In Proceedings of the 2023 4th International Conference for Emerging Technology (INCET), Belgaum, India, 26–28 May 2023; pp. 1–7. [Google Scholar]
- Mandal, S.; Kar, A.K.; Gupta, S.; Sivarajah, U. Achieving food supply chain resilience during natural disasters through industry 5.0 enablers-empirical insights based on an FsQCA approach. Inf. Syst. Front. 2023, 1–24. [Google Scholar] [CrossRef]
- Rai, H.; Srivastava, A.K.; Rai, S.; Pattanashetti, D. Blockchain-powered transparency: Tracking and disseminating donations for disaster-stricken regions. In Futuristic Trends in Artificial Intelligence; IIP Series: Chikkamagaluru, India, 2024; pp. 1–15. [Google Scholar]
- Mosallanezhad, B.; Hajiaghaei-Keshteli, M.; Cornejo, N.R.S.; Calvo, E.Z.R. An IoMT platform for an integrated sustainable energy-efficient disaster relief supply chain to prevent severity-driven disruptions during pandemics. J. Ind. Inf. Integr. 2023, 35, 100502. [Google Scholar] [CrossRef]
- Zachariah, M.; Avanesh, N.M.; Raghupathi, K. Application of blockchain technology in disaster risk management. In The Role of Blockchain in Disaster Management; Academic Press: Cambridge, MA, USA, 2025; pp. 87–110. [Google Scholar]
- Das, N.; Basu, S.; Bit, S.D. ReliefChain: A blockchain leveraged post disaster relief allocation system over smartphone-based DTN. Peer-to-Peer Netw. Appl. 2022, 15, 2603–2618. [Google Scholar] [CrossRef] [PubMed]
- Khairuddin, I.E.; Zaini, M.K.; Ghazali, A.K. Decentralized distribution of humanitarian aid for natural disaster relief. Environ. Behav. Proc. J. 2022, 7, 233–239. [Google Scholar] [CrossRef]
- Garazha, A.; Merz, C.; Schwabe, G.; Zavolokina, L. Resilience in times of crisis: Empowering refugees with self-sovereign identity. In Proceedings of the International Conference on Information Systems (ICIS), Bangkok, Thailand, 15–18 December 2024; p. 3135. [Google Scholar]
- Harini, S.; Suraj, K.; Kumar, M.V. Blockchain-based certificate generation and validation system for refugees. In Proceedings of the International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE), Bangalore, India, 16–17 January 2025; pp. 1–5. [Google Scholar]
- Abraha, D.T. Blockchain-based solution for addressing refugee management in the Global South: Transparent and accessible resource sharing in humanitarian organizations. Front. Hum. Dyn. 2025, 6, 1391163. [Google Scholar] [CrossRef]
- Ungar, M.; Seymour, A. Access without borders: A scoping review to identify solutions to creating portable identity, education and health records for refugee children. J. Int. Migr. Integr. 2024, 25, 1989–2017. [Google Scholar] [CrossRef]
- Cheesman, M. Conjuring a blockchain pilot: Ignorance and innovation in humanitarian aid. Geopolitics 2024, 30, 1073–1100. [Google Scholar] [CrossRef]
- Yang, Y.; Ma, C.; Zhou, J.; Dong, S.; Ling, G.; Li, J. A multi-dimensional robust optimization approach for cold-chain emergency medical materials dispatch under COVID-19: A case study of hubei province. J. Traffic Transp. Eng. 2022, 9, 1–20. [Google Scholar] [CrossRef]
- Zeng, W.; Wang, Y.; Liang, K.; Li, J.; Niu, X. Advancing emergency supplies management: A blockchain-based traceability system for cold-chain medicine logistics. Adv. Theory Simul. 2024, 7, 2300704. [Google Scholar] [CrossRef]
- Shivale, N.; Patwal, P.S.; Mahalle, P. Enhanced traceability and transparency in medical supply chain management using blockchain-based customized smart contracts. J. Inf. Syst. Eng. Manag. 2025, 10, 478–489. [Google Scholar]
- Kumar, P.; Singh, R.K.; Shahgholian, A. Learnings from COVID-19 for managing humanitarian supply chains: Systematic literature review and future research directions. Ann. Oper. Res. 2024, 335, 899–935. [Google Scholar] [CrossRef]
- Kumar, V.V.; Sahoo, A.; Balasubramanian, S.K.; Gholston, S. Mitigating healthcare supply chain challenges under disaster conditions: A holistic AI-based analysis of social media data. Int. J. Prod. Res. 2025, 63, 779–797. [Google Scholar] [CrossRef]
- Lathkar, M.; Deshmukh, P.; Patil, A.; Shelke, P. Increasing donation transparency in disaster relief: A Blockchain-based solution. In Proceedings of the ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS), Manama, Bahrain, 28–29 January 2024; pp. 1527–1532. [Google Scholar]
- Sangeetha, V.; Dargar, A.; Jariwala, J.; Rai, R.H.; Agarwala, S. Unified blockchain platform for charitable donations, crowdfunding and CSR. In Proceedings of the International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 15–16 March 2024; pp. 1–6. [Google Scholar]
- Chen, C.L.; Zhan, W.B.; Tsaur, W.J.; Huang, D.C.; Liu, L.C. Constructing a secure charity NFT auction platform using fisco bcos blockchain for enhancing transparency and traceability. IEEE Access 2024, 12, 36924–36941. [Google Scholar] [CrossRef]
- Raipurkar, A.R.; Chandak, M.B.; Sorathia, A.; Mankar, I.; Tapkire, P.; Pophali, P. Blockchain based genuine and transparent charity application. J. Theor. Appl. Inf. Technol. 2024, 102, 1240–1249. [Google Scholar]
- Yang, C.; Lin, C.; Zhao, W.; Cui, J. A novel blockchain-based charitable model combined with insurance. Geneva Pap. Risk Insur.-Issues Pract. 2025, 50, 185–202. [Google Scholar] [CrossRef]
- Migliorini, S.; Gambini, M.; Belussi, A. A blockchain-based platform for ensuring provenance and traceability of donations for cultural heritage. Blockchain Res. Appl. 2025, 100278. [Google Scholar] [CrossRef]
- Novak, M. Crypto altruism: Applying blockchain to charitable and humanitarian activities. Chin. Public Adm. Rev. 2023, 15, 11–23. [Google Scholar] [CrossRef]
- Ellahi, R.M.; Wood, L.C.; Bekhit, A.E.D.A. Blockchain-driven food supply chains: A systematic review for unexplored opportunities. Appl. Sci. 2024, 14, 8944. [Google Scholar] [CrossRef]
- Guixia, X.; Samian, N.; Faizal, M.F.M.; As’ad, M.A.Z.M.; Fadzil, M.F.M.; Abdullah, A.; Seah, W.K.G.; Ishak, M.; Hermadi, I. A framework for blockchain and internet of things integration in improving food security in the food supply chain. J. Adv. Res. Appl. Sci. Eng. Technol. 2024, 34, 24–37. [Google Scholar] [CrossRef]
- Gupta, R.; Shankar, R. Managing food security using blockchain-enabled traceability system. Benchmarking Int. J. 2024, 31, 53–74. [Google Scholar] [CrossRef]
- Hamidoğlu, A.; Gül, Ö.M.; Kadry, S.N. A game-theoretical approach for the adoption of government-supported blockchain application in the IoT-enabled agricultural supply chain. Internet Things 2024, 26, 101163. [Google Scholar] [CrossRef]
- Sharma, R.; Samad, T.A.; Jabbour, C.J.C.; de Queiroz, M.J. Leveraging blockchain technology for circularity in agricultural supply chains: Evidence from a fast-growing economy. J. Enterp. Inf. Manag. 2025, 38, 32–67. [Google Scholar] [CrossRef]
- Wang, S.; Ghadge, A.; Aktas, E. Digital transformation in food supply chains: An implementation framework. Supply Chain. Manag. Int. J. 2024, 29, 328–350. [Google Scholar] [CrossRef]
- Egunjobi, O.O.; Gomes, A.; Egwim, C.N.; Morais, H. A systematic review of blockchain for energy applications. e-Prime-Adv. Electr. Eng. Electron. Energy 2024, 9, 100751. [Google Scholar] [CrossRef]
- Asif, R.; Hassan, S.R. Shaping the future of Ethereum: Exploring energy consumption in Proof-of-Work and Proof-of-Stake consensus. Front. Blockchain 2023, 6, 1151724. [Google Scholar] [CrossRef]
- Pankovska, E.; Sai, A.R.; Vranken, H.; Ransil, A. Electricity consumption of Ethereum and Filecoin: Advances in models and estimates. In Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, Avila, Spain, 8–12 April 2024; pp. 269–277. [Google Scholar]
Cyber Threat | Targeted Asset | Attack Method | Potential Impact |
---|---|---|---|
Phishing [14] | Credentials | Fake Emails, SMS, Websites | Data leakage, unauthorized access |
Insider Threats [15] | Data, Systems, Networks | Unauthorized Access, Data Leakage, Identity Theft, Sabotage | Data loss, operational disruption, financial loss, loss of trust |
DDoS [14] | Network Infrastructure, Services | Botnets, System Overload, Flooding | Service disruption, customer loss, reputational damage |
Ransomware [16,17,18,19] | Data, Systems | Malware, File Encryption, Ransom Demands | Operational downtime, data loss, financial loss |
Zero-Day [14,20] | Software, Hardware | Undiscovered Vulnerabilities, Exploits | Unauthorized access, system manipulation, data breach |
Malware [14,19,21] | Systems, Networks | Viruses, Trojans, Keyloggers | Data theft, financial losses |
Man-in-the-Middle [22,23] | Network Traffic, Communications | Unencrypted Networks, DNS Spoofing, Packet Sniffing | Data theft, privacy violation, system compromise |
Social Engineering [24] | Human Factor, Credentials | Phone Calls, Fake Support | Credential theft, fraud |
References | Focus Area | Advantages |
---|---|---|
[33] | Interaction of verified stakeholders via smart contracts, enhancing trust and transparency. | Increased trust and transparency |
[34] | Blockchain and smart contracts for secure product traceability system. | Data security, accessibility, tamper-resistant |
[35,36] | Ethereum-based smart contracts for transparent, reliable, efficiency and traceable supply chain management. | Transparency and traceability, security, cost and time savings, recycling tracking, cold chain tracking |
Criterion | Traditional Supply Chain | Blockchain-Based Supply Chain |
---|---|---|
Transparency [43] | Limited data sharing between actors; potential lack of trust. | Secure and verifiable ledger accessible to all stakeholders. |
Data Management [44,45] | Uses centralized databases; data can be altered or deleted. | Immutable records prevent data manipulation. |
Traceability [46] | Product histories tracked manually or by separate systems; lack of transparency. | End-to-end traceability throughout supply chain; real-time verification of product histories. |
Data Integrity [43,47] | Centrally managed data; a single error may impact all processes. | Data immutability ensured through cryptographic signatures and hashing algorithms. |
Counterfeiting and Manipulation [47] | Possible entry of counterfeit products; manual verifications required. | Tokenization and digital identities verify product origin and history. |
Security [48] | Vulnerable to cyberattacks; database breaches can lead to extensive data losses. | DLT minimizes central attack risk. |
IoT Integration [49] | Limited data security with IoT devices; risks of data loss and manipulation. | IoT data securely stored in immutable blockchain records. |
Smart Contracts [50] | Manual execution of transactions; reliance on third-party validation. | Automated processes through smart contracts reduce human error. |
Operational Efficiency [51] | Delays due to manual validations and intermediaries. | Automated, reliable, and accelerated transaction processes. |
Costs [43,51] | High dependency on intermediaries and manual processes increases costs. | Reduced operational costs by minimizing intermediary reliance. |
Ref. | Objective | Methodology | Outcome |
---|---|---|---|
[59] | Developing an Ethereum-based blockchain system to prevent counterfeit products | Manufacturers record product details on blockchain, creating a verification mechanism using smart contracts and digital signatures | Provides a low-cost, decentralized anti-counterfeiting solution |
[60] | Preventing counterfeiting and enhancing traceability in wine supply chains | Blockchain-based monitoring systems analyzed using Stackelberg game theory | Blockchain enhances transparency but adoption is influenced by cost and privacy concerns |
[61] | Developing the blockchain-based system Janus to prevent counterfeit drugs from entering the supply chain | Clone-resistant hologram labels and a multi-quorum consensus protocol ensure secure traceability | Creates a transparent tracking system providing load balancing and fairness |
[62] | Enhancing traceability and security in food supply chains through a blockchain-based model | Performance evaluated using simulations on Hyperledger Fabric | Blockchain strengthens food traceability but faces scalability and data privacy constraints |
[63] | Improving security and traceability in tea supply chains using a Hyperledger Fabric-based system | System ensures data integrity and transparency using Hyperledger Fabric, ECDSA, and IPFS; performance assessed by Hyperledger Caliper | System performance successful in terms of transaction latency and volume |
Features and Security Criteria | Permissionless Blockchain | Permissioned Blockchain | ||
---|---|---|---|---|
Governance | Community-driven, open governance (Ethereum Developers). | Consortium-based governance (Linux Foundation). | ||
Permission Structure | Open participation, no access restrictions. | Restricted participation, controlled access. | ||
Application Domains | DeFi, NFTs, gaming, decentralized apps (dApps), public sector. | Supply chain, finance, healthcare, logistics, enterprise applications. | ||
Consensus Mechanisms | Proof-of-stake (PoS), formerly proof-of-work (PoW). | Modular: Raft, Kafka, PBFT, customizable. | ||
Smart Contracts | Solidity language, Ethereum Virtual Machine (EVM), widely decentralized. | Chaincode (smart contracts) written in Go, JavaScript, Java. | ||
Data Privacy and Anonymity | Low privacy, pseudonymous transparency, fully transparent ledger. | High privacy, confidential transactions, channel-based privacy control. | ||
Trust and Immutability | Fully immutable, trustless validation by all network nodes. | Controlled immutability, selective trust, transactions reversible by governance. | ||
Attack Resistance | Risk of 51% attacks, computationally intensive | Reduced risk due to restricted participation | ||
Data Integrity and Security | High (cryptographic validation, decentralized verification). | High (access control, stronger identity authentication). | ||
Scalability | Lower transaction throughput (~15–30 TPS), limited scalability. | Higher transaction throughput (hundreds to thousands TPS), highly scalable. | ||
Authorization and Access | No explicit authorization, open for all users. | Explicit authorization mechanisms, controlled user roles and permissions. | ||
Operational Efficiency | Moderate (due to consensus mechanisms and decentralization). | High (fast transaction validation, lower latency). | ||
Energy Consumption | Higher (especially PoW-based implementations), recently improved (PoS). | Lower, energy-efficient due to simplified consensus. |
ZKP Property | Mathematical Definition | SCM Implication |
---|---|---|
Completeness | Valid supply data (e.g., temperature logs) from honest actors are always accepted. | |
Soundness | False claims (e.g., counterfeit goods) are reliably rejected by the verification. | |
Zero-Knowledge | Business secrets (e.g., pricing, recipes) are protected while still proving validity. |
Protocol | Proof Size (Byte) | Proving Time (ms) | Verification Time (ms) | Trusted Setup Req? | Quantum Resistant | SCM Suitability |
---|---|---|---|---|---|---|
zk-SNARK | (via Rust Language) 192 (15 rounds) 192 (4095 rounds) | (via Go Language) 1299 (15 rounds) 61,512 (4095 rounds) | (via Go Language) 1138 (15 rounds) 5733 (4095 rounds) | Yes | No | High: compact, fast verification, efficient, enterprise-ready, widely deployed, S/T/- |
zk-STARK | 6657 (15 rounds) 55,132 (4095 rounds) | 0.552 (15 rounds) 44,876 (4095 rounds) | 0.052 (15 rounds) 0.452 (4095 rounds) | Setup-free | Yes | Moderate–High: large size, quantum-safe, S/T/I |
Bulletproofs | 737 (15 rounds) 1249 (4095 rounds) | 6756 (15 rounds) 3,614,500 (4095 rounds) | 0.899 (15 rounds) 1,271,200 (4095 rounds) | Setup-free | No | Moderate–High: compact, setup-free, optimal for lightweight SCM, -/T/- |
Ref. | Description | Advantages | Limitations |
---|---|---|---|
[87] | Secure traceability in industrial production using blockchain and ZKP. | Privacy, reliability, transparency, collaboration, auditability. | Cost, data reliability, scalability, standardization needs, blockchain security. |
[91] | BeHSCM model enhancing privacy and security in healthcare supply chains using ZKP-enabled blockchain. | Privacy, authorization, security, automation. | Cost, scalability, integration, regulatory compliance. |
[92] | Multi-chain blockchain model for grain supply chains. | Reduces data redundancy, reliable data sharing, preserves privacy. | Real-world integration difficulties, increased storage demands with large data volumes. |
[93] | Secure data sharing and traceability in healthcare supply chains with blockchain, zk-SNARKs, and RBAC. | Security, privacy, transparency, access control, decentralization, low transaction cost. | Output privacy issues, inability to maintain identity anonymity, high computational cost, scalability challenges. |
[94] | Using zk-SNARKs for protecting privacy in supply chains. | Decentralization, privacy, low cost, high efficiency. | Scalability, lack of incentives, security risks. |
[95] | Data privacy in Quorum networks using ZKP. | Protection of trade secrets, safeguards against data manipulation, reliable transaction model. | High computational requirements, potential performance degradation, complex and costly development. |
System | Oracle Security | Attack Risk | TPS | Delay (ms) | STI Alignment | SCM Suitability |
---|---|---|---|---|---|---|
Chainlink Bridge | Moderate | High (3.1) | 30 | 140 | S/–/T | Moderate |
Polkadot XCMP | High | Medium (2.5) | 1000 | 80 | S/T/I | High |
Cosmos IBC | High | Low (2.2) | 800 | 50 | S/T/I | High |
ZKP-Based Custom Bridge | Very High | Very Low (1.2) | 100 | 180 | S/–/I | Moderate–High |
Sector | Ref. | Security Issue | Blockchain Solutions |
---|---|---|---|
[107] | Data integrity, traceability, vulnerabilities, risk management. | Distributed ledger, cryptography, smart contracts, MCDA-based decision framework. | |
Logistics | [108] | Data security, data integrity. | Cryptography, consensus mechanisms, smart contracts. |
[109] | Fraud and manipulation. | Smart contracts, permissioned blockchain, DLT. | |
[110] | Transaction fraud, data manipulation, traceability. | Smart contracts, DLT. | |
[111] | Data manipulation, counterfeiting, traceability. | Smart contracts, DLT. | |
[95] | Transparency and security in agricultural SCM. | Quorum network, smart contracts. | |
[112] | Product traceability, data security. | Blockchain, MetaMask integration. | |
[113] | Resource and quality monitoring. | Ethereum, smart contracts, cryptography. | |
[114] | Data manipulation, counterfeiting, data storage. | Redactable blockchain, IPFS. | |
[115] | Data manipulation, counterfeiting. | Ethereum-based ERC-721 smart contracts, NFT-based unique identifiers. | |
Agriculture | [116] | Data integrity, traceability, and transparency. | Blockchain-based system, smart contracts. |
[117] | Fake seeds, data manipulation, intermediary fraud, record loss, unfair logistics competition. | Ethereum network, NFT-based traceability, smart contracts, transparent auction system, immutable records. | |
[118] | Data manipulation, counterfeiting, lack of traceability, secure payments, central data storage risks, price manipulation. | Smart contracts, Rice Coin (RC), IPFS. | |
[119] | Patient data, medicine tracking | Hyperledger Fabric, access control, encryption. | |
[120] | Data privacy, integrity, authorization, and traceability. | Hyperledger Fabric, asymmetric encryption, smart contracts, decentralized data storage. | |
Healthcare | [121] | Data manipulation, unauthorized sharing. | Private and permissioned blockchain, smart contracts, PoW, hash functions. |
[122] | Data integrity, unauthorized access, privacy violation. | Permissioned blockchain immutability, digital certificates, smart contracts. | |
[123] | Medicine source tracking. | Ethereum, smart contracts, NFT. | |
[124] | Data privacy and integrity, manipulation, traceability. | Hyperledger Fabric smart contracts, DLT, PBFT, private blockchain network. | |
[125] | Data integrity, authorization, accessibility, MitM attacks. | Ethereum-based blockchain platform, smart contracts, off-chain, MSMA and MSA tokens. | |
[126] | Fake vaccines, data integrity. | dPoW, scalable blockchain. | |
[127] | Lack of interoperability, lack of data standardization, data manipulation, counterfeiting, data storage. | Verifiable credentials, off-chain, standardized data formats. | |
[128] | Drug counterfeiting, manipulation. | DLT, smart contracts, hash functions. | |
Pharmaceutical | [129] | Drug counterfeiting. | Hyperledger Fabric, SI-HLLR, DLT. |
[130] | Counterfeit drug production, manipulation, incorrect distribution points. | Hyperledger Fabric-based private blockchain, chaincode. | |
[131] | Fake vaccines, lack of traceability, data manipulation. | Hyperledger Fabric. | |
[132] | Preventing pharmaceutical counterfeiting and data manipulation. | Ethereum-based consortium blockchain, smart contracts. | |
[133] | Oil counterfeiting, data manipulation, traceability. | Ethereum blockchain, smart contracts. | |
[134] | Data manipulation, food safety, privacy, authorization, smart contract security. | Cryptographic hash functions, chain structure, permissioned blockchain. | |
[135] | Counterfeiting, mislabeling, product safety. | Proof-of-work. | |
[136] | Data manipulation, counterfeiting, imitation. | Immutable records; decentralized, verifiable transactions. | |
[137] | Unauthorized access, data manipulation. | On-chain and off-chain, consensus algorithms. | |
Food | [138] | Data security. | AES-256, PBFT. |
[139] | Data loss, data manipulation, counterfeiting. | Hyperledger Fabric, decentralization, storing hash values in blocks. | |
[140] | Data manipulation, counterfeiting, food safety and quality. | Ethereum-based smart contracts, Ethereum Virtual Machine, PoS. | |
[141] | Grain traceability. | Public blockchain, Ethereum, IPFS, ML-based validation. | |
[142] | Manipulation and counterfeiting, data security, lack of standardization. | Permissioned blockchain, smart contracts. | |
[143] | Data manipulation and counterfeiting, cyber-attacks, erroneous and incomplete records, financial risks. | BIOT, smart contracts, DLT. | |
Retail | [144] | Data manipulation, counterfeiting, traceability. | DLT, blockchain. |
[145] | Cyber-attacks, counterfeiting and data manipulation, fraud. | DLT, smart contracts, immutability. |
Ref. | Application Focus | Blockchain Role | Key Technologies | Technical Challenges | Security Feature | Traceability Feature | Data Integrity Feature |
---|---|---|---|---|---|---|---|
[146] | Disaster relief donation logistics. | Permissioned blockchain for coordination and transparency. | Role-based access control, stakeholder nodes. | Multi-party coordination, fraud prevention. | Role-based stakeholder authentication. | Donor-to-recipient ledger tracking. | Immutable ledger records (platform unspecified). |
[147] | Optimizing disaster supply chain with decision logic. | Smart contracts for execution of supply logic. | Neutrosophic programming, multi-objective modeling, smart contracts. | Logistics optimization under uncertainty. | Smart contract enforcement. | Contract-level transaction flow. | Immutable contract execution logs. |
[148] | SCP design for long-term crises. | Conceptual model only. | System-level protection logic (no blockchain platform). | SCP protection and resource flow resilience. | Conceptual access control. | Abstracted stakeholder mapping. | Not technically validated. |
[149] | Transparency in aid distribution. | Simulated blockchain model. | Voucher–token logic, simulated chain (no platform). | Distribution transparency, agency accountability. | Simulated security model. | Token-based aid tracking. | Basic simulated immutability. |
[150] | Post-disaster resource management. | Node-based decentralized architecture design. | Stakeholder roles, proposed node logic (platform unspecified). | Resource coordination, system decentralization. | Suggested access policies. | Aid path visual representation. | Theoretical immutability. |
[151] | Donation management in disaster response. | Public blockchain for donor verification and fund transparency. | Ethereum, smart contracts, DApp frontend. | Misuse of funds, donation tracking. | Ethereum-based smart contract validation. | Donor-to-project transaction history. | Fully auditable chain records. |
[152] | Relief SC design with risk and robustness analyses. | Optimization model with blockchain suggestion. | Multi-layered SCP model (platform not implemented). | Risk-tolerant SC routing. | Model includes conceptual resilience logic. | Risk-based node flow modeling. | No concrete ledger or system. |
[153] | Blockchain in disaster management systems (review paper). | General overview of disaster BC uses. | Review of 28 studies, various platforms. | Conceptual SC transparency. | Summarized by studies. | Multiple case references. | General overview, not implemented. |
[154] | Food SC resilience in disaster via Industry 5.0 tools. | Smart contracts and IoT for resilient SC. | Industry 5.0 integration, Ethereum-based architecture. | SC adaptability, disruption mitigation. | Smart device integration with smart contracts. | Real-time tracking of food shipments. | Resilient ledger structure. |
[155] | Transparency in donations to disaster zones. | Public DApp for donation campaign tracking. | Polygon (EVM-compatible), smart contract, Metamask frontend. | Campaign-level traceability. | Smart contract + digital wallet validation. | Donation trace from donor to project. | Immutable EVM-based logging. |
[156] | Medical relief SC during pandemics. | IoMT platform integrated with blockchain. | IoT sensors, Blockchain ledger. | Cold-chain distribution integrity. | Sensor validation and access policy. | End-to-end item flow. | Environmental + ledger validation. |
[157] | Disaster risk management and preparedness. | Blockchain to enhance transparency, trust, and coordination in disaster phases. | Smart contracts, decentralized data management, consensus protocol. | Multi-agency coordination, data sharing, system scalability. | Decentralized access control, tamper-resistance. | Multi-agency coordination, data sharing, system scalability. | Immutable ledger of disaster operations. |
[158] | Lightweight disaster relief distribution (DTN). | Blockchain + smartphones in ad hoc networks. | Ethereum, DTN, phone-to-phone syncing. | Communication breakdown resilience. | Smart contract-based verification. | Physical package + contract mapping. | Immutable TX data. |
[159] | Decentralized humanitarian aid governance. | Ethereum-based governance and routing. | Smart contracts, fund traceability, multi-stakeholder system. | Coordination without central control. | Cryptographic address and smart contract control. | Household-level aid path. | Smart contract state proof. |
Ref. | Application Focus | Blockchain Role | Key Technologies | Technical Challenges | Security Feature | Traceability Feature | Data Integrity Feature |
---|---|---|---|---|---|---|---|
[160] | Refugee identity via SSI (Ukraine; Switzerland). | Self-sovereign identity (SSI) wallets for refugees. | GaaP architecture, digital ID. | Scalability, cross-organization integration. | Private key protection, user-controlled access. | Credential issuance and access logs. | Immutable storage of verified ID records. |
[161] | Certificate generation and validation (India). | Smart contract-based digital certificate issuance. | Ethereum, DID. | Legal validity, cross-border interoperability. | On-chain access permissions. | Credential usage logs via transaction history. | Certificates anchored to unalterable contract state. |
[162] | Refugee logistics and identity management. | Decentralized coordination of aid distribution and identity. | Smart contracts, digital ID, DLT platforms. | Lack of infrastructure, corruption in aid processes, ID verification, cross-border aid coordination. | Encrypted digital ID systems and access control. | Blockchain-based tracking of aid/resource allocation across actors. | Immutable storage of identity and aid records using decentralized ledger. |
[163] | Refugee child records across borders. | Interoperable ID/health/education system (conceptual). | Cross-border storage vision. | Portability, lack of global record linkage. | Conceptual only. | Theoretical chain of personal history tracking. | Not realized technically. |
[164] | Biometric aid delivery pilot (camps). | Blockchain-linked biometric wallets for aid verification. | Biometrics, smart wallets. | Pilot lacked metrics, governance gaps. | Identity matched to biometric hash. | Transaction logs of aid interactions. | Immutable record of aid disbursement. |
Ref. | Application Focus | Blockchain Role | Key Technologies | Technical Challenges | Security Feature | Traceability Feature | Data Integrity Feature |
---|---|---|---|---|---|---|---|
[165] | Emergency dispatch with cold-chain control. | Route compliance and environmental monitoring. | GPS, IoT temperature tags. | Spoilage prevention, route compliance. | Smart alerts on threshold violations. | Timestamped route and status logs. | Immutable status history with environmental metadata. |
[166] | Emergency cold-chain medicine logistics. | Smart contracts for condition tracking and alerts. | IoT sensors, HACCP, smart contracts. | Real-time anomaly detection, cold-chain compliance. | Tamper-proof monitoring via smart contract rules. | Real-time sensor logs of shipment status. | Automated validation with immutable logs. |
[167] | Transparency in PPE/medicine supply chains. | Product verification and compliance logging. | QR codes, hybrid consensus. | Counterfeit prevention, visibility gaps. | Anti-counterfeit validation using smart contract logic. | Unique QR-linked transaction chains. | On-chain event logging and proof of delivery. |
[168] | Vaccine supply network design. | Blockchain logging of distribution flow. | Hybrid logistics, optimization. | Route instability, fluctuating demand. | Not explicitly implemented. | Routing histories recorded across stakeholders. | Immutable proof of delivery events. |
[169] | AI + Blockchain for pandemic supply insights. | Forecasting demand from social data with blockchain logging. | AI models, DLT fusion. | Data harmonization, unstructured input data. | Not covered. | External sentiment-derived demand trace. | No integrity mechanism described. |
Ref. | Application Focus | Blockchain Role | Key Technologies | Security | Traceability | Data Integrity | Technical Challenges |
---|---|---|---|---|---|---|---|
[170] | Disaster relief donations. | Ethereum-based donation tracking system. | Smart contracts, ReactJS, Web3.0. | Immutable ETH transactions. | Real-time donation verification. | Ledger permanence for audits. | Device inconsistency, limited to ETH, MetaMask dependency. |
[171] | Unified charity, CSR, crowdfunding. | Smart contract platform with anonymous ring signatures. | Ring signature, blockchain ledger. | Encrypted donor anonymity. | Campaign-level tracking. | Immutable cross-sector ledger. | Interoperability, data privacy, accessibility issues. |
[172] | NFT-based donation platform. | NFT charity auction using Fisco Bcos. | Multi-sig, smart contracts, IPFS. | Verified NFT transactions. | Auction-based donation traceability. | Decentralized file storage. | High gas cost, auction process complexity. |
[173] | NFT and ID-based charity registry. | Ethereum-based donation registry. | NFTs, decentralized ID, smart contracts. | Identity verification via DIDs. | NFT-campaign linkages. | Distributed proof of donation. | System complexity, NFT market volatility. |
[174] | Blockchain + insurance for charities. | Charitable model with fallback insurance layer. | Hybrid blockchain, insurance contract. | Fraud protection through insurance. | Public auditing with Merkle Trees. | Smart contract-based trust mechanism. | Node trust issues, lack of inspection tools. |
[175] | Cultural heritage donation tracking. | Provenance and traceability of donations. | Ethereum, donation logs. | Protection against misappropriation. | Transparent donation lineage. | Distributed donation proof. | Data storage and off-chain linkage limitations. |
[176] | Crypto-altruism overview. | Review of blockchain potential in humanitarian aid. | Programmable contracts, tokens. | Secure token exchange. | Funding flow visibility. | Long-term transparent records. | Trust cost, usability barriers. |
Ref. | Application Focus | Blockchain Role | Key Technologies | Technical Challenges | Security Features | Traceability Features | Data Integrity Features |
---|---|---|---|---|---|---|---|
[177] | Food traceability and anti-fraud. | Immutable ledger to verify origin and condition of food items. | Smart contracts, QR codes, RFID, IoT. | Food fraud, poor visibility, manual inspections. | Verified identities, secure tokens. | Real-time condition + location tracking. | Tamper-proof audit trails and logs. |
[178] | Blockchain-IoT integration for food supply chain. | Enhance reliability, transparency, and trust via consensus blockchain. | Optimized consensus, IoT, real-time logs. | Fragmented data, lack of verifiability, weak network transparency. | Encrypted blocks with consensus trust. | Live product journey tracing. | Synchronized transaction and sensor data. |
[179] | Agricultural PDS traceability systems. | End-to-end traceability for food grain procurement and delivery. | Decentralized storage, process tracking. | Manual PDS inefficiencies, food leakage, governance gaps. | Node-based transaction validation. | One-step forward and backward traceability. | Immutable transaction storage with stakeholder linkage. |
[180] | Blockchain adoption in IoT-based agri systems. | Blockchain-backed water distribution and input optimization. | IoT, smart irrigation + blockchain. | Water waste, input inefficiency, manual logging. | Authorized sensor data use. | Environmental condition traceability. | Sensor-integrated real-time immutable records. |
[181] | Circular agriculture and food sustainability. | Transparency and record-keeping for eco-practices and food flow. | Blockchain + sustainability labels. | Lack of sustainability verification and fraud risk. | Verified eco-credentials. | Tracking origin and environmental footprint. | Continuous environmental compliance logging. |
[182] | Digital transformation framework for food supply chains. | Enabling digital integration via IoT–CC–BDA synergy. | IoT, Cloud Computing, Big Data Analytics. | Fragmented systems, lack of integration, weak data management practices. | Enhanced data governance and infrastructure-level safeguards. | Real-time data visibility across FSC layers. | Structured data pipelines ensuring traceability and integrity. |
Smart Contract Limitation | Implications for Supply Chains | References |
---|---|---|
Immutable code | Inflexible agreements | [34,36] |
Lack of legal enforceability | Legal uncertainty in dispute resolution | [31,36] |
Oracle dependency | Critical reliance on external data sources | [31,34] |
Code vulnerabilities | Risk of operational disruption and reputational damage | [27,36] |
Consensus Mechanism | Energy Consumption (kWh/tx) | TPS (Throughput) | SCM Suitability | Trade-Offs | References |
---|---|---|---|---|---|
PoW (Bitcoin) | High (~800) | ~7 | Low | Extremely secure, but unsustainable and slow. | [80,82,83,108,183,184] |
PoS (Ethereum 2.0) | Low (~0.01) (~0.0087 for 30 tx) | ~15–210 | Moderate to High | Energy-efficient, evolving TPS, some centralization. | [81,82,108,137,183,185] |
PBFT (Hyperledger) | Very Low (~0.0001) | ~1000–2500 | High | High throughput, permissioned, scalable, but limited decentralization. | [81,84,85] |
PoA/Raft | Low | 1000+ | High | Efficient for enterprise, but centralized trust model. | [85,108,137] |
Blockchain Model | TPS | Energy Consumption (kWh/tx) | Estimated VM Count | Data Storage Need | Integration Cost | SCM Suitability |
---|---|---|---|---|---|---|
PoW (Bitcoin) | ~7 | ~800 | 6–8 VMs | High (on-chain) | High | Low |
PoS (Ethereum 2.0) | ~15–210 | ~0.01 | 4–6 VMs | Medium (mixed) | Moderate | Moderate |
PBFT (Hyperledger) | 1000–2500 | ~0.0001 | 3–4 VMs | Low (off-chain) | Moderate | High |
PoA/Raft | 1000+ | Low | 2–3 VMs | Low | Low | High |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Karaduman, Ö.; Gülhas, G. Blockchain-Enabled Supply Chain Management: A Review of Security, Traceability, and Data Integrity Amid the Evolving Systemic Demand. Appl. Sci. 2025, 15, 5168. https://doi.org/10.3390/app15095168
Karaduman Ö, Gülhas G. Blockchain-Enabled Supply Chain Management: A Review of Security, Traceability, and Data Integrity Amid the Evolving Systemic Demand. Applied Sciences. 2025; 15(9):5168. https://doi.org/10.3390/app15095168
Chicago/Turabian StyleKaraduman, Özgür, and Gülsena Gülhas. 2025. "Blockchain-Enabled Supply Chain Management: A Review of Security, Traceability, and Data Integrity Amid the Evolving Systemic Demand" Applied Sciences 15, no. 9: 5168. https://doi.org/10.3390/app15095168
APA StyleKaraduman, Ö., & Gülhas, G. (2025). Blockchain-Enabled Supply Chain Management: A Review of Security, Traceability, and Data Integrity Amid the Evolving Systemic Demand. Applied Sciences, 15(9), 5168. https://doi.org/10.3390/app15095168