{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:01:42Z","timestamp":1775246502330,"version":"3.50.1"},"reference-count":28,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T00:00:00Z","timestamp":1715299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Modern supply chain systems face significant challenges, including lack of transparency, inefficient inventory management, and vulnerability to disruptions and security threats. Traditional optimization methods often struggle to adapt to the complex and dynamic nature of these systems. This paper presents a novel blockchain-based zero-trust supply chain security framework integrated with deep reinforcement learning (SAC-rainbow) to address these challenges. The SAC-rainbow framework leverages the Soft Actor\u2013Critic (SAC) algorithm with prioritized experience replay for inventory optimization and a blockchain-based zero-trust mechanism for secure supply chain management. The SAC-rainbow algorithm learns adaptive policies under demand uncertainty, while the blockchain architecture ensures secure, transparent, and traceable record-keeping and automated execution of supply chain transactions. An experiment using real-world supply chain data demonstrated the superior performance of the proposed framework in terms of reward maximization, inventory stability, and security metrics. The SAC-rainbow framework offers a promising solution for addressing the challenges of modern supply chains by leveraging blockchain, deep reinforcement learning, and zero-trust security principles. This research paves the way for developing secure, transparent, and efficient supply chain management systems in the face of growing complexity and security risks.<\/jats:p>","DOI":"10.3390\/fi16050163","type":"journal-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T08:33:03Z","timestamp":1715589183000},"page":"163","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization"],"prefix":"10.3390","volume":"16","author":[{"given":"Zhe","family":"Ma","sequence":"first","affiliation":[{"name":"Ming Hsieh Department of Electrical and Computer Engineering, University of Southern California, Los Angeles, CA 90089, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1457-7046","authenticated-orcid":false,"given":"Xuhesheng","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information and Library Science, The University of North Carolina at Chapel Hill, Chapel Hill, NC 27599, USA"}]},{"given":"Tiejiang","family":"Sun","sequence":"additional","affiliation":[{"name":"Ping An Property & Casualty Insurance Company of China, Ltd., Shenzhen 518017, China"}]},{"given":"Xukang","family":"Wang","sequence":"additional","affiliation":[{"name":"Sage IT Consulting Group, Shanghai 200160, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3707-857X","authenticated-orcid":false,"given":"Ying Cheng","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Law, University of Washington, Seattle, WA 98195, USA"}]},{"given":"Mengjie","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Bristol, Bristol BS8 1QU, UK"}]}],"member":"1968","published-online":{"date-parts":[[2024,5,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"36008","DOI":"10.1109\/ACCESS.2021.3062410","article-title":"Effective management for blockchain-based agri-food supply chains using deep reinforcement learning","volume":"9","author":"Chen","year":"2021","journal-title":"IEEE Access"},{"key":"ref_2","first-page":"328","article-title":"Economic evaluation of the efficiency of supply chain management in agricultural production based on multidimensional research methods","volume":"8","author":"Ableeva","year":"2019","journal-title":"Int. J. Supply Chain Manag."},{"key":"ref_3","first-page":"687","article-title":"Dynamic impact of the structure of the supply chain of perishable foods on logistics performance and food security","volume":"10","author":"Castro","year":"2017","journal-title":"J. Ind. Eng. Manag."},{"key":"ref_4","first-page":"102","article-title":"Heuristic-based metaheuristics to address a sustainable supply chain network design problem","volume":"35","author":"Samadi","year":"2018","journal-title":"J. Ind. Prod. Eng."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"4736","DOI":"10.1080\/00207543.2020.1770893","article-title":"Game theory-based models in green supply chain management: A review of the literature","volume":"59","author":"Agi","year":"2021","journal-title":"Int. J. Prod. Res."},{"key":"ref_6","unstructured":"Alves, J.C., and Mateus, G.R. (2020). Proceedings of the International Conference on Computational Logistics, Enschede, The Netherlands, 28\u201330 September 2020, Springer International Publishing."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ismail, S., and Reza, H. (2022, January 26\u201329). Security Challenges of Blockchain-Based Supply Chain Systems. Proceedings of the 2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA.","DOI":"10.1109\/UEMCON54665.2022.9965682"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"121031","DOI":"10.1016\/j.jclepro.2020.121031","article-title":"Applying blockchain technology to improve agri-food traceability: A review of development methods, benefits and challenges","volume":"260","author":"Feng","year":"2020","journal-title":"J. Clean. Prod."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"20698","DOI":"10.1109\/ACCESS.2019.2897792","article-title":"Food safety traceability system based on blockchain and EPCIS","volume":"7","author":"Lin","year":"2019","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Peng, Z., Zhang, Y., Feng, Y., Zhang, T., Wu, Z., and Su, H. (2019, January 22\u201324). Deep reinforcement learning approach for capacitated supply chain optimization under demand uncertainty. Proceedings of the 2019 Chinese Automation Congress (CAC), Hangzhou, China.","DOI":"10.1109\/CAC48633.2019.8997498"},{"key":"ref_11","unstructured":"Powell, W., Cao, S., Foth, M., He, S., Turner-Morris, C., and Li, M. (2022). Blockchain Driven Supply Chains and Enterprise Information Systems, Springer International Publishing."},{"key":"ref_12","unstructured":"Haarnoja, T., Zhou, A., Hartikainen, K., Tucker, G., Ha, S., Tan, J., Kumar, V., Zhu, H., Gupta, A., and Abbeel, P. (2018). Soft actor-critic algorithms and applications. arXiv."},{"key":"ref_13","unstructured":"Schaul, T., Quan, J., Antonoglou, I., and Silver, D. (2015). Prioritized experience replay. arXiv."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"11856","DOI":"10.1109\/ACCESS.2020.2964880","article-title":"Blockchain implementations and use cases for supply chains-a survey","volume":"8","author":"Gonczol","year":"2020","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Malik, S., Dedeoglu, V., Kanhere, S.S., and Jurdak, R. (2019, January 14\u201317). Trustchain: Trust management in blockchain and iot supported supply chains. Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA.","DOI":"10.1109\/Blockchain.2019.00032"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/s10916-019-1468-1","article-title":"Design of a secure medical data sharing scheme based on blockchain","volume":"44","author":"Cheng","year":"2020","journal-title":"J. Med. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Jevtic, M., Khan, S., Gomes, J., and Svetinovic, D. (2023, January 24\u201326). Blockchain-Based Countermeasures for Luxury Goods Counterfeiting: A Focused Survey. Proceedings of the 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA), Kuwait, Kuwait.","DOI":"10.1109\/BCCA58897.2023.10338871"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Fernando, E. (2019, January 26\u201327). Success factor of implementation blockchain technology in pharmaceutical industry: A literature review. Proceedings of the 2019 6th International Conference on Information Technology, Computer and Electrical Engineering (ICITACEE), Semarang, Indonesia.","DOI":"10.1109\/ICITACEE.2019.8904335"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","article-title":"On blockchain and its integration with IoT. Challenges and opportunities","volume":"88","author":"Reyna","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"12806","DOI":"10.1109\/JIOT.2021.3072611","article-title":"Federated learning meets blockchain in edge computing: Opportunities and challenges","volume":"8","author":"Nguyen","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1109\/MNET.011.2000591","article-title":"Network slicing with MEC and deep reinforcement learning for the Internet of Vehicles","volume":"35","author":"Mlika","year":"2021","journal-title":"IEEE Netw."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Ohm, M., Kempf, L., Boes, F., and Meier, M. (2020). Supporting the detection of software supply chain attacks through unsupervised signature generation. arXiv.","DOI":"10.1145\/3407023.3409183"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Ismail, S., Moudoud, H., Dawoud, D., and Reza, H. (2024). Blockchain-Based Zero Trust Supply Chain Security Integrated with Deep Reinforcement Learning. Preprints, 2024030714. Available online: https:\/\/www.preprints.org\/manuscript\/202403.0714\/v1.","DOI":"10.20944\/preprints202403.0714.v1"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.mar.2013.07.007","article-title":"Is performance measurement and management fit for the future?","volume":"25","author":"Melnyk","year":"2014","journal-title":"Manag. Account. Res."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2410","DOI":"10.1109\/OJCOMS.2023.3313352","article-title":"Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning Approach","volume":"4","author":"Moudoud","year":"2023","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_26","unstructured":"Schulman, J., Wolski, F., Dhariwal, P., Radford, A., and Klimov, O. (2017). Proximal policy optimization algorithms. arXiv."},{"key":"ref_27","unstructured":"Lillicrap, T.P., Hunt, J.J., Pritzel, A., Heess, N.M.O., Erez, T., Tassa, Y., Silver, D., and Wierstra, D.P. (2015). Continuous control with deep reinforcement learning. arXiv."},{"key":"ref_28","unstructured":"Fujimoto, S., Hoof, H., and Meger, D. (2018, January 10\u201315). Addressing function approximation error in actor-critic methods. Proceedings of the International Conference on Machine Learning, Stockholm, Sweden."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/5\/163\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:43:40Z","timestamp":1760107420000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/5\/163"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,10]]},"references-count":28,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["fi16050163"],"URL":"https:\/\/doi.org\/10.3390\/fi16050163","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,10]]}}}