Next Article in Journal
Reinforcement Learning-Based Layered Lossy Image Semantic Coding
Previous Article in Journal
A Study on the Features for Multi-Target Dual-Camera Tracking and Re-Identification in a Comparatively Small Environment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Trusted Traceability Service: A Novel Approach to Securing Supply Chains

1
School of Science and Engineering, University of Missouri-Kansas City, Kansas City, MO 64110, USA
2
Department of Electrical and Computer Engineering, University of Texas at San Antonio, One UTSA Circle, San Antonio, TX 78249, USA
3
Henry W. Bloch School of Management, University of Missouri-Kansas City, Kansas City, MO 64110, USA
4
Trulaske College of Business, University of Missouri, Columbia, MO 65211, USA
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(10), 1985; https://doi.org/10.3390/electronics14101985
Submission received: 30 March 2025 / Revised: 7 May 2025 / Accepted: 12 May 2025 / Published: 13 May 2025

Abstract

:
Counterfeit products cause financial losses for both the manufacturer and the enduser; e.g., fake foods and medicines pose significant risks to the public’s health. Moreover, it is challenging to ensure trust in a product’s supply chain, preventing counterfeit goods from being distributed throughout the network. However, fake product detection methods are expensive and need to be more scalable, whereas a unified traceability system for packaged products is not available. Therefore, this research proposes a product traceability system, named Trusted Traceability Service (TTS), using Blockchain and Self-Sovereign Identity (SSI). The TTS can be incorporated across diverse industries because of its generic and manageable four-layer product packaging strategy. Blockchain-enabled SSI empowers distributed nodes, to verify them without a centralized client–server authorization architecture. Moreover, due to its distributed nature, the proposed TTS framework is scalable and robust, with the use of web3.0 distributed application development. The adoption of Fantom, a public blockchain infrastructure, allows the proposed system to handle thousands of successful transactions more cost-effectively than the Ethereum network. The deployment of the proposed framework in both public and private blockchain networks demonstrated its superiority in execution time and number of successful transactions.

1. Introduction

A supply chain is a complex network of organizations, activities, resources, and technologies that work together to produce, distribute, and deliver goods or services to end consumers [1]. It includes various stages, such as sourcing raw materials, manufacturing, transportation, storage, and retail. Effective supply chain management is critical for businesses, to ensure timely product delivery, reduce costs, and satisfy customer demands. However, the supply chain faces several challenges, including the risk of fake products entering the system. Counterfeit goods can infiltrate the supply chain through various channels, including unauthorized suppliers, gray markets, or illegal manufacturing processes [2]. These counterfeit items are deliberately made to resemble genuine products, misleading consumers and violating intellectual property rights [3]. The existence of counterfeit products in the supply chain damages consumer trust, harms brand reputation, and leads to financial losses for legitimate businesses.
The World Health Organization (WHO) highlights that in low- and middle-income countries, approximately one in ten medicines fail to meet quality standards or are counterfeit [4]. Similarly, Homeland Security stresses the negative impact that counterfeit products have on public safety [5]. Additionally, the semiconductor industry association estimates that counterfeit semiconductors cost US-based semiconductor companies over USD 7.5 million annually [6]. These losses are not confined to the semiconductor sector alone; the retail industry experienced global sales losses of nearly EUR 46.6 billion in 2020 due to counterfeit products, according to Statista [7]. Furthermore, a report from the Organization for Economic Co-operation and Development (OECD) indicated that the trade value of counterfeit goods surpassed USD 509 billion in 2016 and continues to grow [8]. These data underscore the significant risks posed by counterfeit goods in the supply chain, threatening the global economy. Consequently, there is an urgent need for a secure and transparent supply chain traceability system to maintain consumer trust and foster economic growth.
Earlier research on supply chain traceability has explored various sectors, including medicine, food, and more, utilizing technologies such as Blockchain, the Internet of Things (IoT), Quick Response (QR) codes, Radio Frequency Identification (RFID), and Near-Field Communication (NFC) [9,10,11,12,13]. However, these systems fail to incorporate essential authentication measures between supply chain entities. Such authentication is vital to ensure that end users can verify the legitimacy of the product’s manufacturer by tracing its journey from the retailer back to the manufacturer. Additionally, existing traceability systems are often tailored to specific industries, neglecting the need for a more integrated, cross-industry approach. This gap is particularly noticeable in the case of packaged products. Moreover, these systems generally lack comprehensive efficiency and security assessments.
This study introduces the Trusted Traceability Service (TTS), a secure, counterfeit-resistant supply chain framework built on blockchain-integrated Self-Sovereign Identity (SSI) to address the aforementioned problems. The proposed TTS framework effectively resolves the identified problems by enabling the verification of the identity and authenticity of all entities in the supply chain and their corresponding identity issuers. The TTS is designed to be scalable and more cost-effective compared to other smart-contract-enabled public blockchains. The underlying blockchain infrastructure for TTS is Fantom, which offers scalability and lower costs than other similar blockchains [14]. Fantom uses the Lachesis consensus mechanism, which is based on asynchronous Byzantine fault tolerance (aBFT)  [15], ensuring that all transactions are stored on the blockchain in a distributed and asynchronous manner. As a result, TTS avoids the scalability issues associated with the Ethereum network. Additionally, this study analyzes the system’s efficiency, security, and privacy concerns.
Consequently, the study investigates whether an SSI-based model can deliver reliable and decentralized traceability in supply chains and whether Fantom can outperform existing blockchain platforms in performance and cost. The key contributions of this paper are outlined below:
  • Establishing a unified supply chain traceability mechanism for packaged products.
  • Incorporating SSI for authentication between the involved supply chain entities in a blockchain-based decentralized environment.
  • Analyzing the potential of the Fantom blockchain by comparing it with other smart-contract-based blockchain platforms.

2. Related Work

A trusted traceability service can identify, monitor, and track a product through the entire supply chain, from its manufacturing to its distribution. Product traceability is a challenge faced by nearly every industry. Numerous researchers have investigated product traceability in recent years, contributing valuable insights and advancements. This section provides a brief overview of their contributions, while also discussing the limitations and shortcomings of these efforts.
A literature review on supply chain risk management by Fan and Stevenson (2018) [16] revealed that 85% of the studies focused on work within a single country, while 52% of papers concentrated on a single industry or related industries. Additionally, 77% of the studies examined took the buyer’s perspective, with only five manuscripts considering the seller’s perspective. Furthermore, only 1% of the reviewed papers employed a mixed methodology, and just seven articles used secondary data. The review suggested that further empirical research is needed to explore the complex interrelationships within supply chains and how risk mitigation strategies can eliminate or create risks further upstream or downstream in supply chains and their partner networks.
A separate study by Eyaa et al. (2014) [17] noted that risk management involves mitigating identified risks and actively determining internal and external risk measures. However, opportunism has been highlighted in the supply chain literature, as situations where firms act in their own self-interest, potentially creating additional risks. Opportunism can manifest in various forms, such as product opportunism (misrepresentation of delivery capabilities, warranties, and product quality), information opportunism (deceptive communication to improve a firm’s image), financial opportunism (delayed payments or distorted prices for personal benefit), and governance opportunism (coercion and manipulation).
Nayyer et al. (2019) [18] further highlighted the risks of opportunism, particularly in the context of unqualified treatments and medicines, such as those found in the anti-malarial drug market. Their study in eight African countries, involving over 200,000 public and private sector outlets, found that only 24% of products were quality-controlled therapies. Patients’ exposure to substandard products can increase antimicrobial treatment resistance. Moreover, weaknesses in COVID-19 treatment policies, driven by individual national demands, have led to opportunities for abuse in the supply chains of essential medicines and equipment. For instance, 96% of overseas purchases of prescription Xanax were identified as counterfeit.
Various researchers have employed different technologies such as centralized databases, 2D barcodes, smartphones, NFC, IoT, QR codes, and RFID to facilitate product tracking [19,20,21,22]. However, a significant limitation of these approaches is their centralized structure, which relies on conventional databases. This centralized design makes them susceptible to data manipulation, as unauthorized modifications can go unnoticed, leading to incorrect information being entered into the system. Moreover, traditional tracking systems typically only enable product traceability at the consumer level, preventing other entities in the supply chain from detecting where counterfeit products might be circulating.
Investigators have increasingly turned to blockchain technology to overcome the traceability challenges of centralized systems. Blockchain is being explored for its decentralized, distributed, secure, transparent, and immutable properties, making it well suited for enhancing supply chain traceability [23,24,25]. For example, Madumidha et al. [26] proposed a theoretical framework for end-to-end traceability in agricultural food supply chains using blockchain and RFID tags. Similarly, Aniellio et al. [27] introduced a product tracking system incorporating blockchain and physically unclonable functions (PUF) to uniquely identify each product. Through the challenge–response mechanism of PUF, end users can verify the authenticity of a product. If the manufacturer is dishonest, the anti-counterfeiting measures will fail. Akhtar et al. [28] also suggested a medical supply chain traceability and counterfeit detection system, where each product is assigned a unique QR code that can be scanned to record traceability data.
To alleviate the blockchain load and address concerns related to confidential security, several researchers have designed innovative data storage models [29,30]. Sabah et al. [31] proposed a blockchain-based approach to detect counterfeit drugs in the pharmaceutical supply chain. Additionally, some investigators [32,33,34] have integrated the Interplanetary File System (IPFS) with blockchain to enable traceability in agricultural supply chains. Bumblauskas et al. [35] utilized IoT and blockchain technologies to track products in real time from the farm to the table. Coco et al. [36] introduced a model based on IPFS, RFID, and blockchain to ensure secure, visible, and auditable traceability in the Italian food product supply chain, allowing each supply chain entity to verify a product’s quality.
Hasan et al. [37] proposed a solution combining blockchain, IoT, and lightweight asymmetric cryptography (such as Elliptic Curve Cryptography) to protect supply chain transaction data from privacy breaches and ensure product traceability. Cocco et al. [38] presented a Self-Sovereign Identity (SSI), Blockchain, and IPFS-based approach for food supply chains to guarantee product quality. In contrast, Ehsan et al. [39], Rahman et al. [40], and Chatterjee et al. [41] suggested a blockchain-based agricultural product supply chain to ensure the integrity and transparency of the system.
Table 1 provides an overview of the latest techniques for product traceability, summarizing the associated research studies. These techniques mainly leverage blockchain, IoT, databases, and IPFS to enable traceability within supply chains. However, none of these studies could identify the specific entities involved in the supply chain nor provide details on the scanning process within their proposed systems. Additionally, their systems are vulnerable to attacks, where an adversary could replicate the QR code. In contrast, the proposed framework addresses all these limitations by incorporating a fully decentralized authentication mechanism for the entities involved in the supply chain, ensuring enhanced traceability and security.
Self-Sovereign Identity (SSI) was chosen for its ability to enable decentralized, user-controlled identity verification, which is crucial for trust and traceability across distributed supply chain actors. Unlike centralized models, SSI allows entities to issue and verify credentials without relying on a central authority. Its relevance to cross-border and multi-party systems is supported by the European Blockchain Services Infrastructure (EBSI) [42] and recent research advocating its use in supply chain ecosystems [43].

3. Preliminaries

This section describes the technologies related to the proposed framework, such as blockchain, self-sovereign identity (SSI), and others. The notations used in this paper for describing the proposed system are given in Table 2.

3.1. Fantom Blockchain and Consensus Protocol

Fantom is a high-performance, scalable, and secure blockchain platform that aims to provide a decentralized infrastructure for next-generation applications [44]. The platform is also designed to be fully compatible with existing smart contract platforms like Ethereum, making it easy for developers to build and deploy decentralized applications. It uses a unique consensus mechanism called "Lachesis" that allows for fast and efficient confirmation of transactions. The Lachesis protocol employs a Directed Acyclic Graph (DAG) algorithm to provide realistic Byzantine fault tolerance. DAG is the reason why the Fantom Blockchain achieves its speed [45].

3.2. Self Sovereign Identity

Self-sovereign identity (SSI) is a framework that empowers individuals or organizations with full control over their digital identities and personal information, allowing them to manage their accounts independently. SSI comprises seven key components [46]. They are described below:
  • Verifiable credentials are digital documents that contain claims or assertions about an individual’s identity, attributes, or other relevant information.
  • The trust triangle is a concept used in the context of SSI systems to establish trust between different entities involved in identity verification and authentication processes. The triangle comprises three key components: the issuer, the holder, and the verifier. Figure 1 shows an overview of the trust triangle.
  • Digital wallets, also known as e-wallets or mobile wallets, are software applications or platforms that allow individuals to store, manage, and use their financial assets and payment information digitally.
  • Digital agents, also known as autonomous agents or intelligent agents, are software programs or systems that are designed to perform tasks or make decisions on behalf of individuals or organizations.
  • Decentralized identifiers D I D s are unique identifiers that are globally unique and resolvable across different networks and platforms. They serve as the foundation for establishing and managing decentralized digital identities.
  • Blockchains are shared databases protected by cryptography. They can provide a reliable foundation for public keys and D I D s. They are not vulnerable to attack or having a single point of failure.
  • Governance frameworks are issued by governance authorities. They provide a set of rules, principles, and mechanisms that govern an SSI ecosystem’s operation, management, and decision-making processes.

3.3. Decentralized Key Management System (DKMS)

The decentralized key management system (DKMS) is a cryptographic approach that enables the use of verifiable credentials in a decentralized manner. Unlike traditional Public Key Infrastructure (PKI) systems that rely on centralized authorities, the DKMS utilizes a new identity concept called Decentralized Identifiers, D I D  [46]. A D I D is generated cryptographically and stored on a distributed ledger, eliminating the risk of a single point of failure. It consists of three components: the D I D URI scheme identifier, the D I D method identifier, and the D I D method-specific identifier. Figure 2 shows an example of a D I D .

3.4. Database Clustering

A database cluster consists of multiple interconnected computer nodes, each running a database server, working together as a single database, such as an IPFS [47]. It addresses the limitations of a single server by enabling distributed and parallel query execution. The cluster provides advantages such as data redundancy, scalability, high availability, and automation. All servers store the same data, ensuring redundancy and availability. Load balancing enables scalability, while regulations and automation streamline processes and reduce manual effort.

4. System Model

4.1. System Overview

This study proposes a Trusted Traceability Service architecture for supply chains. This is a blockchain-based product traceability system that proves a product’s authenticity by providing the supply chain’s traceability information. Entities involved in this proposed system are the Governance Authority ( G A ), Local Government ( L G ), Manufacturer ( M F ), Distributor ( D S ), Retailer ( R T ), and End User ( E U ). The roles of the participants are as follows.
  • Governance Authority G A : Provide verifiable credentials ( V C ) to Manufacturer M F and Local Government ( L G ). G A is the root of trust.
  • Local Government L G : Provide a trade license as a verifiable credential V C to Distributor D S and Retailer R T .
  • Manufacturer M F : Provide verifiable credentials V C to Distributor D S after verification and sell product pallets to the D S .
  • Distributor D S : Provide verifiable credentials V C to Retailer R T after verification. Purchase pallets from the M F and sell cases to the R T .
  • Retailer R T : Purchase cases from the D and sell unit products to the End User E U
  • End User E U : Purchase the unit product from the Retailer R T after checking its authenticity.
In TTS’s, the Governance Authority G A is the root of all trust. The G A provides verifiable credentials V C to the Manufacturer M F and Local Government L G . The L G delivers V C to the Distributor D S and Retailer R T upon satisfying the verification process. Now, the D S needs to show proof of the V C issued by the L G to the M F in order to buy the product pallet from M F . Similarly, the M F verifies itself to the D S by sending the proof of V C issued by the G A . The M F provides the V C to the D S after a successful verification and interactions. Similarly, the R T buys cases from the D S and receives a V C . Here, the R T also asks for proof of the V C , which has been issued by the M F to the D S . The governance framework and trust triangle are shown in Figure 3. All D I D s and public keys ( P K ) are stored in the blockchain. This process is discussed in detail in Section 5.
In the proposed system, the M F produces the product pallets based on four levels of packaging. They are Primary packaging (Unit Product U), Secondary packaging (Box B), Tertiary packaging (Case C), and Pallet (P). Figure 4 shows the four-level packaging of medicines. The primary packaging represents the unit product. The box is called secondary packaging. Tertiary packaging represents the Case. Combinations of many cases are termed a Pallet. At first, the M F sells pallets to the D S . Now, the D S sells cases to the R T . Lastly, the E U buys unit products from the R T . Each packaging level has a unique QR code attached to it. The content of the QR codes is stored off-chain. In this system, off-chain represents a clustered database or an IPFS instead of a single server database. The reason for using an IPFS is to eliminate centralized databases and the possibility of a single point of failure.
At each step of the supply chain, QR codes are scanned and the identity of the seller is verified. The verification of the participants is based on SSI using a D I D , the D I D document, and verifiable credentials. When the M F sells pallets to the D S or the D S sells cases to the R T , a new block is added each time with the transaction details in IPFS. The hash of the transactions is added to the blockchain. In both cases, the DID related to the product QR code is used, so that anybody can check the transactions related to that specific product. Moreover, the E U can verify the M F by scanning the QR code before purchasing the unit product and observing all traceability information and product details. This process is discussed in detail in Section 5. Figure 5 shows a simple overview of the product traceability mechanism.

4.2. Threat Model

In the TTS, all parties are semi-honest adversaries (A) and do not trust each other, except for the Global Authority ( G A ). These adversaries follow the protocol honestly but also want to access the private data of other participants. These adversaries act as middlemen or eavesdroppers and may dominate the shared channels. They might also initiate identity fraud attacks, passive attacks, or active attacks.

4.3. Security Goals

The TTS satisfies the following supply chain protection conditions. The Global Authority ( G A ) is trusted by all parties. Any adversary A, whether an insider, outsider, or middleman within the TTS, will fail to infer any private or sensitive data after initiating attacks such as identity fraud, impersonation, forwarding secrecy attacks, or replay attacks. Furthermore, adversaries A cannot succeed in launching either passive or active attacks.

5. Model Construction

This section explains the detailed model construction and security analysis of the TTS.

5.1. Establishing SSI for TTS

All participants in the system aim to establish secure connections with each other based on Self-Sovereign Identity ( S S I ). This section demonstrates the S S I -based connection between the Manufacturer ( M F ) and the Distributor ( D S ). The process outlined here applies universally to all entities. Both the M F and D S have S S I mobile wallet applications, and their respective edge agent ( E A ) software sets up their cloud agents ( C A ). The E A functions are performed on local devices at the network’s edge, where they are managed by the identity holder, while the C A operates at the cloud edge, hosted by any cloud service provider or platform.
The M F holds a verifiable credential ( V C M F ) issued by the Governance Authority ( G A ), and the D S holds a V C D S issued by the Local Government ( L G ). Both the M F and L G possess a V C issued by the G A . All of these protocols are defined and managed by the G A , which publishes the governance framework that all participants adhere to. The G A is considered a trusted entity by all participants in the system.
In this scenario, the M F intends to sell its product, a Pallet, to the D S . To facilitate this transaction, the M F and D S verify each other’s identity and establish a secure connection, as they have no prior trust relationships. The M F only accepts the V C (identity credentials) issued by the L G for verifying the D S , while the M F authenticates itself to the D S using the V C issued by the G A . Additionally, the L G is automatically authenticated, as its V C is issued by the G A . The entire authentication process is outlined below and visually represented in Figure 6.
Initially, the edge agent ( E A M F ) of the Manufacturer ( M F ) instructs the wallet to generate a new public/private key pair, denoted as P K M F and S K M F , as well as a peer identifier ( D I D M F ) derived from the key pair. The D I D serves as a unique pseudonymous label that establishes the M F ’s relationship with the Distributor ( D S ) in a private, peer-to-peer manner. The M F stores the D I D M F , P K M F , and S K M F in the wallet.
M F scans a Quick Response ( Q R ) code to verify its credentials. This requests proof of the verifiable credential ( V C ) from the Governance Authority ( G A ).
The E A M F seeks authorization from the M F to create the proof. Once the M F has consented, the E A M F creates the proof ( P R M F ).
Next, the E A M F assembles a message ( M 1 ), which contains the M F ’s private service endpoint ( L C A M F ), P K M F , P R M F , and D I D M F . The E A M F then generates a Q R code from the message M 1 , and computes a hash value H 1 h ( M 1 ) . The blockchain records both the D I D M F and H 1 .
Following this, the E A M F sends the Q R code to the M F ’s cloud agent ( C A M F ), instructing it to prepare for handling messages related to P K M F . The C A M F subsequently transmits the Q R code to the D S as part of the connection and verification request. These requests are sent over unsecured channels, and since the data in the Q R code are not sensitive, they do not demand strict security measures.
The Distributor ( D S ), intending to purchase Pallets from the Manufacturer ( M F ), scans the Q R code. Using its mobile/edge wallet software ( E A D S ), it receives the message M 1 . The E A D S retrieves H 1 , D I D G A , and P K G A from the blockchain. It then generates H 1 h ( M 1 ) and compares H 1 with H 1 . If they match, E A D S extracts L C A M F , P K M F , P R M F , and D I D M F from M 1 and stores them. The E A D S verifies the proof P R M F using D I D G A and P K G A . The proof verification follows the Non-Interactive Zero-Knowledge Proof.
Next, the E A D S triggers the wallet to create a new key pair, P K D S and S K D S , along with a peer identifier D I D D S derived from them, storing all elements in the wallet. To obtain proof of its verifiable credential, the D S scans a Q R code linked to the Local Government ( L G ). Before generating the proof, the E A D S requests consent from D S . Once permission is granted, E A D S produces the proof P R D S .
Subsequently, the E A D S assembles the message M 2 , which includes the D S ’s private service endpoint ( L C A D S ), P K D S , P R D S , and D I D D S . The E A D S generates H 2 h ( M 2 ) and encrypts the message M 2 using P K M F , producing [ [ M 2 ] ] e n c ( M 2 , P K M F ) . The blockchain stores both D I D D S and H 2 . The E A D S forwards the encrypted message [ [ M 2 ] ] to the D S ’s cloud agent ( C A D S ), which then sends the encrypted message to the L C A M F .
The Manufacturer’s cloud agent ( C A M F ) obtains the encrypted message and transmits it to the edge agent ( E A M F ) of the M F . The E A M F decrypts the message using S K M F and constructs M 2 . It retrieves H 2 , D I D L G , and P K L G from the blockchain. The E A M F generates H 2 h ( M 2 ) and compares H 2 with H 2 . If they match, the E A M F extracts L C A D S , P K D S , P R D S , and D I D D S from M 2 and stores them. The E A M F then verifies the proof P R D S using D I D L G and P K L G .
The proof verification follows the zero-knowledge proof (ZKP) algorithm. Once verified, both E A M F and E A D S notify the M F and D S that a secure, cryptographic communication channel has been established between them, ensuring privacy. A key advantage for the M F is that the E A M F can refresh its keys and service endpoint as needed. As a result, the M F can access messages through its updated service endpoint or the new public key shared by D S . This ensures that insecure connection details are replaced with secure, eavesdropper-resistant information.
After the connection is successfully verified, the M F issues a verifiable credential ( V C ) to the D S , officially recognizing the D S as an authorized distributor for the M F . Similarly, the D S will proceed to verify, connect, and issue a V C to the Retailer ( R T ).

5.2. Establishing TTS

This section provides a detailed explanation of the traceability process from the Manufacturer ( M F ) to the End User ( E U ). The system introduced primarily manages two types of registries: verification registries and sell registries. The verification registry stores the decentralized identifiers ( D I D ) of the M F , D S , and R T , whereas the sell registry stores the product IDs, the D I D s of both the seller and the buyer, along with a timestamp that records the time of the sale.
During the production phase, the M F generates a distinct QR code for each pallet, case inside the pallet, box inside the case, and individual product inside the box. The generation process is based on the number of pallets ( n P ), cases ( n C ) within each pallet, boxes ( n B ) inside each case, the number of units ( n U ) inside each box, and the unit product details ( U D ). The QR code generation process is outlined in Algorithm 1. Here, h represents a hash function. The QR codes include the IDs for the pallet, case, box, and unit product, respectively.
These IDs are stored off-chain in four separate relational tables, which enable the identification of unit product IDs based on the IDs of the boxes, cases, and pallets. The unit product details ( U D ) are stored off-chain and are linked to the pallet ID ( i d P ).
M F sells the pallets to the D S . M F first selects the sell option, scans the Pallet QR code Q R P , and selects the appropriate D S . This scanning process indicates that the pallet has been issued by the M F to the D S . Algorithm 2 shows the pallet selling process. After the scanning of the Q R P by the M F , the system retrieves the V C M F and its issuer D I D . As the seller claims to be a M F , the system compares the retrieved D I D with the D I D G A . If it matches, then the P K G A is retrieved from the blockchain. The V C M F is verified using the P K G A . After successful verification of the V C M F , the i d P , D I D M F , D I D D S , and the current timestamp t s are stored in the sell registry. In addition, the D I D M F is checked against all unit products of the pallet in the verified registry. Note that, Algorithm 2 is applicable for all buying and selling transactions. In the case of the D S and R T , only the issuing of the V C will change.
Algorithm 1: QR code generation by M F
Electronics 14 01985 i001
Algorithm 2: Pallet issuing by M F
Electronics 14 01985 i002
After receiving the Pallet, the D S selects the verify option and scans the Q R P . Algorithm 3 depicts the verification process of pallets by the D S . Note that this verification process is the same for both the D S and R T . After scanning to see if the Q R P is found in the seller_registry, the seller and buyer D I D s are retrieved, which are D I D M F and D I D D S . The entry in the seller_registry ensures that the product has been issued from the verified M F . From the D I D s, the name of the M F and D S are returned. By this process, the D S is reassured that the pallet has been issued correctly.
Algorithm 3: Pallet issuing verification by D S
Electronics 14 01985 i003
The product authentication by the EU is described in Algorithm 4. Before buying a unit product, the EU scans the QRU. If the idU is not found in the seller registry, this means the product has not been sold yet. After that, the DIDMF is retrieved from the verified registry and the MF name is returned. If the EU wants to buy the unit product, the RT scans the QRU, which confirms the sale. The EU scans the QRU again. Now the idU can be found in the seller registry and the timestamp retrieved. The idP of the idU can be found in the relational table. idP helps in obtaining the UD. From the verified registry DIDMF, the DIDDS and DIDRT are retrieved, and using these DIDs, the names of the MF, DS, and RT are also retrieved. The UD, timestamp, and names of the MF, DS, and RT are returned.
Algorithm 4: Product verification by E U
Electronics 14 01985 i004

5.3. Security Analysis

The security analysis of the proposed system and its corresponding propositions and proof are discussed here.
Proposition 1 
(Security of T T S ). The protocol of the T T S is safeguarded against attacks by A and guarantees the security properties ( S 1 to S 6 ) outlined in Table 1.
Proof 
(Proof of Proposition 1). The T T S involves six entities: G A , L G , M F , D S , R T , and E U . All of these entities are semi-honest adversaries, meaning they try to learn private data from the others but still follow the protocol. Each adversary also starts different types of attacks. This means the protocol involves these six entities, each with a unique view of how they can learn from the others. In the T T S protocol, the V C of the M F and L G can only be seen by the G A . The V C of the D S and R T can only be viewed by the L G . The E U can only buy products and check the product history dashboard. Therefore, the G A , L G , and E U are not considered adversaries. The main adversaries in the T T S protocol are the M F , D S , and R T . These entities follow the same processes and actions. The perspective of the M F on the parameters of the other entities is as follows:
v i e w M F T T S = [ L C A , D I D , P R , P K ] D S
Here, M F can verify D by checking P R D S . There are no other data available to the M F that could help infer additional private information.
Next, the perspective of an individual D S on the parameters of the other entities is as follows:
v i e w D S T T S = [ L C A , D I D , P R , P K ] M F , Q R
The D S can authenticate the M F by verifying P R M F . There are no other data available to the D S that could help infer additional private information.
The perspective of an outsider adversary A, who is not part of the T T S but aims to infer data, is as follows:
v i e w A T T S = D I D M F , D S , R I
Outsider adversaries are only able to view information that is publicly available. None of this information is sufficient to infer any private information of the T T S participants. The A cannot even initiate any kind of hacking attacks, because the T T S is a decentralized system. Therefore, even if A can infer the encrypted data, it will not be of any use, and privacy will prevail. □

6. Experiment and Result Evaluation

In this section, the test environment description is outlined, and the performance of the proposed model is evaluated.

6.1. Testbed

The machine used for testing the Fantom blockchain was powered by an Intel Core i9 processor (Intel Corporation, Santa Clara, CA, USA), which featured a base clock speed of 2.3 GHz and was equipped with 8 cores. Additionally, the processor was capable of boosting its clock speed up to 4.8 GHz, providing enhanced performance during testing. The system used for testing the Fantom blockchain was equipped with 16 GB of 2666 MHz DDR4 RAM, providing seamless performance during blockchain operations. It also included a 2.6 GHz AMD Radeon Pro 5300M graphics card with 4 GB of GDDR6 memory, ensuring efficient handling of graphical tasks. This powerful configuration was designed to deliver optimal performance and support throughout the testing of the Fantom blockchain.

6.2. Evaluation Metrics

This section presents the key metrics utilized to measure the performance of the proposed system, including the execution time ( e t ), average latency ( a l ), average verification time ( v t ), and average throughput ( a t ).

6.3. Execution Time ( e t )

This refers to the total duration, measured in seconds, required for the system to process and finalize all transactions. It is calculated as the sum of the time differences between the start and end of each transaction. The formula for execution time is given in Equation (1), where n represents the total number of transactions, and t 1 and t 2 are the deployment time and the end time of the transaction, respectively.
e t = i = 1 n ( t 2 t 1 )

6.4. Average Latency ( a l )

This is calculated as the mean of the time differences between t 2 and t 1 for a set of transactions, reflecting how long it takes for a transaction to be processed. This is represented by Equation (2), where the sum is divided by the total transaction count n.
a l = i = 1 n ( t 2 t 1 ) n

6.5. Average Throughput ( a t )

This determines the average rate of successful transactions processed each second during the execution phase. It is calculated using the formula in Equation (3), where N represents the total number of successful transactions, and T 1 and T 2 are the start and end times of each transaction.
a t = N i = 1 N ( T 2 T 1 ) N

6.6. Result Evaluation

This section provides an assessment of the proposed system’s performance. The evaluation was based on three metrics: average latency, execution time, and average throughput. A comparative performance analysis of Fantom, Ethereum 2.0, Ethereum, and Hyperledger Fabric is depicted in Figure 7.
Figure 7a illustrates the performance variation based on the time consumption of four distinct blockchain platforms: Ethereum, Ethereum 2.0, Fantom, and Hyperledger Fabric. The x-axis shows the transaction count, ranging between 1 and 1000, whereas the y-axis indicates the total time taken for different transaction groups in seconds. The plot is displayed using a linear scale. From Figure 7a, it is clear that the execution time increased with the number of transactions. Ethereum 2.0 demonstrated the slowest performance, struggling to complete up to 980 transactions, while Ethereum performed similarly, but at a slightly faster rate. The figure shows that Fantom processed transactions faster than the others. This time difference increased with more transactions.
In Figure 7b,c, we examine the impact of varying transaction volumes on the performance of the blockchain platforms, focusing on the latency and throughput. Both figures feature the number of transactions on the x-axis, which ranges from a single transaction to 1000 transactions. Figure 7b provides a visual representation of the average latency in seconds for each transaction set, illustrating how the response times changed as the number of transactions increased. Meanwhile, Figure 7c highlights the average throughput, measured in transactions per second (tps), for each corresponding set of transactions, offering insights into how efficiently the blockchain platforms could process a higher transaction load. The analysis reveals that Fantom achieved the lowest latency and the highest throughput when compared to Hyperledger Fabric, Ethereum, and Ethereum 2.0. This performance comparison demonstrates that Fantom outperformed the other blockchain platforms in terms of speed and efficiency.
In conclusion, the proposed system showcased remarkable improvements in performance across several key metrics, including speed, cost-efficiency, scalability, and security, when deployed on the Fantom blockchain platform. This exceptional performance is primarily attributed to Fantom’s innovative use of the Directed-Acyclic-Graph-based consensus mechanism known as Lachesis, which enables asynchronous Byzantine Fault Tolerance. Unlike traditional blockchain platforms such as Ethereum, Ethereum 2.0, and Hyperledger Fabric, which rely on more conventional consensus models, Lachesis allows for faster transaction processing, greater scalability, and enhanced fault tolerance, ultimately leading to a more robust and efficient system. These advantages make the proposed system on Fantom a compelling alternative for decentralized applications requiring high throughput and low latency.
Figure 8 illustrates the evaluation of the proposed system by assessing the average verification performance as the number of transactions varied across four distinct blockchain platforms, as mentioned above. On the x-axis, the graph depicts the number of transactions, which spans from 1 to 1000. The y-axis indicates the mean time for verification, representing the duration required to authenticate all credentials, including the verifiable credentials of entities within a supply chain. The data clearly show that Fantom consistently exhibited significantly lower average verification times compared to the other blockchain platforms, such as Ethereum, Hyperledger Fabric, and Ethereum 2.0. Notably, Ethereum and Ethereum 2.0 demonstrated an identical verification performance across all transaction sets. This suggests that the verification performance of these two platforms is nearly indistinguishable. In conclusion, the proposed system, built on the Fantom blockchain, consistently delivered superior verification speed, making it a more efficient solution than Ethereum, Hyperledger Fabric, and Ethereum 2.0 for handling supply chain credential verification.
Table 3 shows a comparative analysis of the TTS with previous studies. The comparison is performed based on the number of blockchain technologies utilized, w t , a l , a t , human interaction needed, whether the technology is ideal for all kinds of product supply chains or not, and whether SSI is used or not. Most of the supply chain the studies did not cover blockchain, and even if some of them utilized blockchain, they did not cover a proper analysis, such as e t , a l , and a t . It is clear from the Table 3 that the proposed TTS outperformed all previous studies in terms of e t , a l , and a t . To support the validity of our performance results, each experiment was conducted five times under identical conditions. We report the outcome as the mean ± standard deviation, to reflect the variability across repeated trials. For instance, the TTS implementation on the Fantom network achieved a consistent throughput of 0.008 ± 0.0003 transactions per second and a verification latency of 1.2 ± 0.15 s for 1000 transactions. This statistical framing reinforces our evaluation’s reliability and the system’s stability across repeated executions.

7. Conclusions

This study introduced a comprehensive supply chain network designed for reliable product traceability, ensuring efficient tracking of products from the manufacturer to the end consumer. The use of the Fantom public blockchain network provides a faster, more cost-effective, and secure solution for managing supply chain processes. Additionally, the DKMS (Decentralized Key Management Service) enhances the authentication process, ensuring a more reliable and distributed Self-Sovereign Identity (SSI) system for each entity within the supply chain. The system was tested on various public and private networks. The findings indicate that Fantom led the pack in verification and transaction performance. Compared to Ethereum and Hyperledger Fabric, Fantom offered faster verification and transaction processing, enhancing its viability for supply chain traceability.
Future work will focus on deploying IoT devices at the network’s edge, to enhance data collection and processing. These devices will integrate onboard machine learning and image analysis to improve decision-making. This advancement aims to achieve full automation of the supply chain system, increasing efficiency and accuracy. Further studies will also explore demand forecasting for improved supply chain management.

Author Contributions

Conceptualization, R.U.H., L.W. and A.V.; Methodology, A.S.M.T.H. and R.U.H.; Software, R.U.H.; Validation, R.U.H.; Formal analysis, A.S.M.T.H. and R.U.H.; Investigation, A.S.M.T.H. and R.U.H.; Resources, R.U.H. and A.V.; Data curation, R.U.H. and A.V.; Writing—original draft, R.U.H.; Writing—review and editing, A.S.M.T.H., R.U.H. and L.W.; Visualization, R.U.H.; Supervision, A.S.M.T.H. and L.W.; Project administration, A.S.M.T.H., L.W. and A.V.; Funding acquisition, A.S.M.T.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Serdarasan, S. A review of supply chain complexity drivers. Comput. Ind. Eng. 2013, 66, 533–540. [Google Scholar] [CrossRef]
  2. Putro, P.A.W.; Purwaningsih, E.K.; Sensuse, D.I.; Suryono, R.R. Model and implementation of rice supply chain management: A literature review. Procedia Comput. Sci. 2022, 197, 453–460. [Google Scholar] [CrossRef]
  3. Gayialis, S.P.; Kechagias, E.P.; Papadopoulos, G.A.; Masouras, D. A review and classification framework of traceability approaches for identifying product supply chain counterfeiting. Sustainability 2022, 14, 6666. [Google Scholar] [CrossRef]
  4. Uddin, M. Blockchain Medledger: Hyperledger fabric enabled drug traceability system for counterfeit drugs in pharmaceutical industry. Int. J. Pharm. 2021, 597, 120235. [Google Scholar] [CrossRef]
  5. Homeland Security. Available online: https://www.ice.gov/features/dangers-counterfeit-items (accessed on 12 June 2023).
  6. Semiconductor Industry Association. Detecting and Removing Counterfeit Semiconductors in the US Supply Chain; Semiconductor Industry Association: Washington, DC, USA, 2022. [Google Scholar]
  7. Statista. Available online: https://www.statista.com/statistics/1117921/sales-losses-due-to-fake-good-by-industry-worldwide/ (accessed on 12 June 2023).
  8. OECD. Available online: https://www.oecd.org/newsroom/trade-in-fake-goods-is-now-33-of-world-trade-and-rising.htm (accessed on 12 June 2023).
  9. Casino, F.; Kanakaris, V.; Dasaklis, T.K.; Moschuris, S.; Stachtiaris, S.; Pagoni, M.; Rachaniotis, N.P. Blockchain-based food supply chain traceability: A case study in the dairy sector. Int. J. Prod. Res. 2021, 59, 5758–5770. [Google Scholar] [CrossRef]
  10. Feng, H.; Wang, X.; Duan, Y.; Zhang, J.; Zhang, X. Applying blockchain technology to improve agri-food traceability: A review of development methods, benefits and challenges. J. Clean. Prod. 2020, 260, 121031. [Google Scholar] [CrossRef]
  11. Kumar, R.; Tripathi, R. Traceability of counterfeit medicine supply chain through Blockchain. In Proceedings of the 2019 11th IEEE International Conference on Communication Systems & Networks (COMSNETS), Bengaluru, India, 7–11 January 2019; pp. 568–570. [Google Scholar]
  12. Demestichas, K.; Peppes, N.; Alexakis, T.; Adamopoulou, E. Blockchain in agriculture traceability systems: A review. Appl. Sci. 2020, 10, 4113. [Google Scholar] [CrossRef]
  13. Chen, J.; Huang, Y.; Xia, P.; Zhang, Y.; Zhong, Y. Design and implementation of real-time traceability monitoring system for agricultural products supply chain under Internet of Things architecture. Concurr. Comput. Pract. Exp. 2019, 31, e4766. [Google Scholar] [CrossRef]
  14. Fantom Foundation. Understanding Fantom Transaction Fees. Blog Post. 11 August 2022. Available online: https://blog.fantom.foundation/understanding-fantom-transaction-fees/ (accessed on 3 May 2025).
  15. Nguyen, Q.; Cronje, A.; Kong, M.; Lysenko, E.; Guzev, A. Lachesis: Scalable asynchronous BFT on DAG streams. arXiv 2021, arXiv:2108.01900. [Google Scholar]
  16. Eyaa, S.; Sridharan, R.; Ryan, S. Categorising supply chain opportunism: A framework. In Proceedings of the ANZAM Conference, Sydney, Australia, 3–5 December 2014. [Google Scholar]
  17. Fan, Y.; Stevenson, M. A review of supply chain risk management: Definition, theory, and research agenda. Int. J. Phys. Distrib. Logist. Manag. 2018, 48, 205–230. [Google Scholar] [CrossRef]
  18. Nayyar, G.M.; Breman, J.G.; Mackey, T.K.; Clark, J.P.; Hajjou, M.; Littrell, M.; Herrington, J.E. Falsified and substandard drugs: Stopping the pandemic. Am. J. Trop. Med. Hyg. 2019, 100, 1058–1065. [Google Scholar] [CrossRef] [PubMed]
  19. Qian, J.P.; Yang, X.T.; Wu, X.M.; Zhao, L.; Fan, B.L.; Xing, B. A traceability system incorporating 2D barcode and RFID technology for wheat flour mills. Comput. Electron. Agric. 2012, 89, 76–85. [Google Scholar] [CrossRef]
  20. Conti, M. Food traceability in fruit and vegetables supply chain. In Proceedings of the 2020 IEEE International Symposium on Circuits and Systems (ISCAS), Seville, Spain, 12–14 October 2020; pp. 1–5. [Google Scholar]
  21. Zhao, G.; Yu, H.; Wang, G.; Sui, Y.; Zhang, L. Applied research of IOT and RFID technology in agricultural product traceability system. In Computer and Computing Technologies in Agriculture VIII, Proceedings of the 8th IFIP WG 5.14 International Conference, CCTA 2014, Beijing, China, 16–19 September 2014; Revised Selected Papers 8; Springer International Publishing: Berlin/Heidelberg, Germany, 2015; pp. 506–514. [Google Scholar]
  22. Dong, Y.; Ding, B.; Zhang, G.; Jin, G.; Zhao, X. Quality and safety traceability system based on agricultural product supply chain. Trans. Chin. Soc. Agric. Eng. 2016, 32, 280–285. [Google Scholar]
  23. Sunny, J.; Undralla, N.; Pillai, V.M. Supply chain transparency through blockchain-based traceability: An overview with demonstration. Comput. Ind. Eng. 2020, 150, 106895. [Google Scholar] [CrossRef]
  24. Mistry, I.; Tanwar, S.; Tyagi, S.; Kumar, N. Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges. Mech. Syst. Signal Process. 2020, 135, 106382. [Google Scholar] [CrossRef]
  25. Kouhizadeh, M.; Saberi, S.; Sarkis, J. Blockchain technology and the sustainable supply chain: Theoretically exploring adoption barriers. Int. J. Prod. Econ. 2021, 231, 107831. [Google Scholar] [CrossRef]
  26. Madumidha, S.; Ranjani, P.S.; Vandhana, U.; Venmuhilan, B. A theoretical implementation: Agriculture-food supply chain management using blockchain technology. In Proceedings of the 2019 TEQIP III Sponsored International Conference on Microwave Integrated Circuits, Photonics and Wireless Networks (IMICPW), Tiruchirappalli, India, 22–24 May 2019; pp. 174–178. [Google Scholar]
  27. Aniello, L.; Halak, B.; Chai, P.; Dhall, R.; Mihalea, M.; Wilczynski, A. Towards a supply chain management system for counterfeit mitigation using blockchain and PUF. arXiv 2019, arXiv:1908.09585. [Google Scholar]
  28. Akhtar, M.M.; Rizvi, D.R. Traceability and detection of counterfeit medicines in pharmaceutical supply chain using blockchain-based architectures. In Sustainable and Energy Efficient Computing Paradigms for Society; Springer: Berlin/Heidelberg, Germany, 2021; pp. 1–31. [Google Scholar]
  29. Yang, X.; Li, M.; Yu, H.; Wang, M.; Xu, D.; Sun, C. A trusted blockchain-based traceability system for fruit and vegetable agricultural products. IEEE Access 2021, 9, 36282–36293. [Google Scholar] [CrossRef]
  30. Dong, Y.; Zhang, X.; Xu, J.; Wang, X.Y.; Kong, J.L.; Sun, P.C. Blockchain-based traceability model for grains and oils whole supply chain. Food Sci. 2020, 41, 30–36. [Google Scholar]
  31. Sabah, S.; Hasan, A.T.; Daria, A. A Blockchain-based Approach to Detect Counterfeit Drugs in Medical Supply Chain. In Proceedings of the International Conference on Big Data, IoT, and Machine Learning: BIM 2021, Cox’s Bazar, Bangladesh,, 23–25 September 2021; Springer: Singapore, 2021; pp. 609–621. [Google Scholar]
  32. Salah, K.; Nizamuddin, N.; Jayaraman, R.; Omar, M. Blockchain-based soybean traceability in agricultural supply chain. IEEE Access 2019, 7, 73295–73305. [Google Scholar] [CrossRef]
  33. Shahid, A.; Almogren, A.; Javaid, N.; Al-Zahrani, F.A.; Zuair, M.; Alam, M. Blockchain-based agri-food supply chain: A complete solution. IEEE Access 2020, 8, 69230–69243. [Google Scholar] [CrossRef]
  34. Wang, L.; Xu, L.; Zheng, Z.; Liu, S.; Li, X.; Cao, L.; Li, J.; Sun, C. Smart contract-based agricultural food supply chain traceability. IEEE Access 2021, 9, 9296–9307. [Google Scholar] [CrossRef]
  35. Bumblauskas, D.; Mann, A.; Dugan, B.; Rittmer, J. A blockchain use case in food distribution: Do you know where your food has been? Int. J. Inf. Manag. 2020, 52, 102008. [Google Scholar] [CrossRef]
  36. Cocco, L.; Mannaro, K. Blockchain in agri-food traceability systems: A model proposal for a typical italian food product. In Proceedings of the 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), Honolulu, HI, USA, 9–12 March 2021; pp. 669–678. [Google Scholar]
  37. Hasan, A.T.; Sabah, S.; Haque, R.U.; Daria, A.; Rasool, A.; Jiang, Q. Towards convergence of iot and blockchain for secure supply chain transaction. Symmetry 2022, 14, 64. [Google Scholar] [CrossRef]
  38. Cocco, L.; Tonelli, R.; Marchesi, M. Blockchain and self-sovereign identity to support quality in the food supply chain. Future Internet 2021, 13, 301. [Google Scholar] [CrossRef]
  39. Ehsan, I.; Irfan Khalid, M.; Ricci, L.; Iqbal, J.; Alabrah, A.; Sajid Ullah, S.; Alfakih, T.M. A conceptual model for blockchain-based agriculture food supply chain system. Sci. Program. 2022, 2022, 7358354. [Google Scholar] [CrossRef]
  40. Rahman, M.N.A.; Kadir, M.F.A.; Awang, M.K.; Safei, S.; Saany, S.I.A.; Kamarudin, A.S. Distributed Ledger Model for Agriculture Product Supply Chain. In Human Centred Intelligent Systems: Proceedings of KES-HCIS 2022 Conference; Springer Nature: Singapore, 2022; pp. 161–170. [Google Scholar]
  41. Chatterjee, K.; Singh, A. A blockchain-enabled security framework for smart agriculture. Comput. Electr. Eng. 2023, 106, 108594. [Google Scholar] [CrossRef]
  42. European Commission. European Blockchain Services Infrastructure (EBSI): Architecture and Vision. 2022. Available online: https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/Home (accessed on 3 May 2025).
  43. Cocco, L.; Marchesi, M. Blockchain and self-sovereign identity for supply chain traceability. Future Internet 2022, 14, 44. [Google Scholar] [CrossRef]
  44. Choi, S.M.; Park, J.; Nguyen, Q.; Cronje, A. Fantom: A scalable framework for asynchronous distributed systems. arXiv 2018, arXiv:1810.10360. [Google Scholar]
  45. Kaur, G.; Gandhi, C. Scalability in blockchain: Challenges and solutions. In Handbook of Research on Blockchain Technology; Academic Press: Cambridge, MA, USA, 2020; pp. 373–406. [Google Scholar]
  46. Satybaldy, A.; Nowostawski, M.; Ellingsen, J. Self-sovereign identity systems: Evaluation framework. In Privacy and Identity Management. Data for Better Living: AI and Privacy, Proceedings of the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2. 2 International Summer School, Windisch, Switzerland, 19–23 August 2019; Revised Selected Papers 14; Springer: Berlin/Heidelberg, Germany, 2020; pp. 447–461. [Google Scholar]
  47. Ryu, T.W.; Eick, C.F. A database clustering methodology and tool. Inf. Sci. 2005, 171, 29–59. [Google Scholar] [CrossRef]
Figure 1. Trust triangle for the verifiable credential.
Figure 1. Trust triangle for the verifiable credential.
Electronics 14 01985 g001
Figure 2. A simple example of a D I D .
Figure 2. A simple example of a D I D .
Electronics 14 01985 g002
Figure 3. TTS’s governance framework and trust triangle.
Figure 3. TTS’s governance framework and trust triangle.
Electronics 14 01985 g003
Figure 4. Four-level packaging.
Figure 4. Four-level packaging.
Electronics 14 01985 g004
Figure 5. Product traceability and verification framework.
Figure 5. Product traceability and verification framework.
Electronics 14 01985 g005
Figure 6. Detailed workflow of S S I for TTS.
Figure 6. Detailed workflow of S S I for TTS.
Electronics 14 01985 g006
Figure 7. Performance Analysis of Ethereum, Ethereum 2.0, Hyperledger Fabric, and Fantom.
Figure 7. Performance Analysis of Ethereum, Ethereum 2.0, Hyperledger Fabric, and Fantom.
Electronics 14 01985 g007
Figure 8. Verification performance of TTS.
Figure 8. Verification performance of TTS.
Electronics 14 01985 g008
Table 1. An overview of existing research on product traceability.
Table 1. An overview of existing research on product traceability.
StudyTechnologiesAnalysisSecurity Properties
SSIIPFSLight Weight
Blockchain
IoTScalabilityEfficiencySecurity S 1 S 2 S 3 S 4 S 5 S 6
 [19]-----------
 [21]-----------
 [22]-----------
 [13,26]----------
 [27]-----------
 [32]----------
 [24]----------
 [10,12,20]-----------
 [23,30,35]-----------
 [9,25]-----------
 [29]---------
 [33,34,36]----------
 [38]--------
 [31]--------
 [37]-----
 [39,40]-----------
 [41]-----------
This study
Here, S 1 : authenticity of identity issuer and holder; S 2 : authenticity of interaction; S 3 : availability; S 4 : confidentiality; S 5 : data integrity; S 6 : traceability; ✓ : “supports or secure”; -: “unsupported or insecure”.
Table 2. Notations.
Table 2. Notations.
NotationDescriptionNotationDescription
G A governance authority D S distributor
M F manufacturer R T retailer
P K public key S K private key
E U end-user L G local government
h a s h hash function V C verifiable credential
Table 3. Comparison of TTS with previous studies.
Table 3. Comparison of TTS with previous studies.
Studies X 1 X 2 X 3 X 4 X 5 X 6 X 7
[19]0---5+NoNo
[23]1---5+NoNo
[37]2238.820.0045+YesNo
[29]1-230.25+NoNo
TTS410010.075YesYes
Here, X 1 : number of blockchain technologies used; X 2 : e t ; X 3 : a l ; X 4 : a t ; X 5 : human interaction needed for the ecosystem and traceability; X 6 : an ideal system for supply chain traceability for all kinds of products; X 7 : SSI utilizations; -: represents the system does not support this parameter.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hasan, A.S.M.T.; Haque, R.U.; Wigger, L.; Vatterott, A. Trusted Traceability Service: A Novel Approach to Securing Supply Chains. Electronics 2025, 14, 1985. https://doi.org/10.3390/electronics14101985

AMA Style

Hasan ASMT, Haque RU, Wigger L, Vatterott A. Trusted Traceability Service: A Novel Approach to Securing Supply Chains. Electronics. 2025; 14(10):1985. https://doi.org/10.3390/electronics14101985

Chicago/Turabian Style

Hasan, A S M Touhidul, Rakib Ul Haque, Larry Wigger, and Anthony Vatterott. 2025. "Trusted Traceability Service: A Novel Approach to Securing Supply Chains" Electronics 14, no. 10: 1985. https://doi.org/10.3390/electronics14101985

APA Style

Hasan, A. S. M. T., Haque, R. U., Wigger, L., & Vatterott, A. (2025). Trusted Traceability Service: A Novel Approach to Securing Supply Chains. Electronics, 14(10), 1985. https://doi.org/10.3390/electronics14101985

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop