{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T14:01:34Z","timestamp":1776175294508,"version":"3.50.1"},"reference-count":39,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the Key-Area Research and Development Program of Guangdong Province","award":["2019B010137002"],"award-info":[{"award-number":["2019B010137002"]}]},{"name":"Shenzhen Science and Technology Program","award":["KQTD20190929172835662"],"award-info":[{"award-number":["KQTD20190929172835662"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Supply chain management (SCM) is essential for a company\u2019s faster, efficient, and effective product life cycle. However, the current SCM systems are insufficient to provide product legitimacy, transaction privacy, and security. Therefore, this research proposes a secure SCM system for the authenticity of the products based on the Internet of Things (IoT) and blockchain technology. The IoT-enabled Quick Response (QR) scanner and the blockchain-integrated distributed system will allow all the SCM stakeholders to begin secure and private transactions for their products or services. Resulting, the consumer will receive an authentic and genuine product from the original producer. A lightweight asymmetric key encryption technique, i.e., elliptic curve cryptography (ECC) and Hyperledger Fabric-based blockchain technology with on-chain smart contracts are applied for distributed IoT devices to make the authentication process faster and lighter. Each SCM stakeholder is registered by the service provider and receives corresponding public and private keys, which will be used for the authentication process of the participants and IoT devices. The authenticated QR scanner records all transactions on the blockchain. Consequently, there will be no human intervention for the SCM transactions. The security and scalability analysis demonstrates that the proposed system is more secure and robust than other state-of-the-art techniques.<\/jats:p>","DOI":"10.3390\/sym14010064","type":"journal-article","created":{"date-parts":[[2022,1,9]],"date-time":"2022-01-09T23:35:09Z","timestamp":1641771309000},"page":"64","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Towards Convergence of IoT and Blockchain for Secure Supply Chain Transaction"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0929-6499","authenticated-orcid":false,"given":"A S M Touhidul","family":"Hasan","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of Asia Pacific, Dhaka 1205, Bangladesh"},{"name":"Shenzhen Key Laboratory for High Performance Data Mining, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China"},{"name":"Institute of Automation Research and Engineering, Dhaka 1205, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2618-6873","authenticated-orcid":false,"given":"Shabnam","family":"Sabah","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Asia Pacific, Dhaka 1205, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4570-0946","authenticated-orcid":false,"given":"Rakib Ul","family":"Haque","sequence":"additional","affiliation":[{"name":"Institute of Automation Research and Engineering, Dhaka 1205, Bangladesh"},{"name":"School of Computer Science & Technology, University of Chinese Academy of Sciences, Shijingshan District, Beijing 100049, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6128-5001","authenticated-orcid":false,"given":"Apubra","family":"Daria","sequence":"additional","affiliation":[{"name":"Institute of Automation Research and Engineering, Dhaka 1205, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5334-9001","authenticated-orcid":false,"given":"Abdur","family":"Rasool","sequence":"additional","affiliation":[{"name":"Shenzhen Key Laboratory for High Performance Data Mining, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China"},{"name":"Shenzhen College of Advanced Technology, University of Chinese Academy of Sciences, Shenzhen 518055, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8040-0308","authenticated-orcid":false,"given":"Qingshan","family":"Jiang","sequence":"additional","affiliation":[{"name":"Shenzhen Key Laboratory for High Performance Data Mining, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,1,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"106426","DOI":"10.1016\/j.cie.2020.106426","article-title":"Looking at energy through the lens of Industry 4.0: A systematic literature review of concerns and challenges","volume":"143","author":"Crovato","year":"2020","journal-title":"Comput. Ind. Eng."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Granell, C., Kamilaris, A., Kotsev, A., Ostermann, F.O., and Trilles, S. (2020). Internet of things. Manual of Digital Earth, Springer.","DOI":"10.1007\/978-981-32-9915-3_11"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"165184","DOI":"10.1109\/ACCESS.2021.3129491","article-title":"Comprehensive Performance Assessment of Deep Learning Models in Early Prediction and Risk Identification of Chronic Kidney Disease","volume":"9","author":"Akter","year":"2021","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Bing, K., Fu, L., Zhuo, Y., and Yanlei, L. (2011, January 25\u201328). Design of an Internet of Things-based smart home system. Proceedings of the 2011 2nd International Conference on Intelligent Control and Information Processing, Harbin, China.","DOI":"10.1109\/ICICIP.2011.6008384"},{"key":"ref_5","unstructured":"Langley, C.J., Novack, R.A., Gibson, B., and Coyle, J.J. (2020). Supply Chain Management: A Logistics Perspective, Cengage Learning."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"De Vass, T., Shee, H., and Miah, S.J. (2018). The effect of \u201cInternet of Things\u201d on supply chain integration and performance: An organisational capability perspective. Australas. J. Inf. Syst., 22.","DOI":"10.3127\/ajis.v22i0.1734"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Khujamatov, K., Reypnazarov, E., Akhmedov, N., and Khasanov, D. (2020, January 4\u20136). IoT based centralized double stage education. Proceedings of the 2020 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan.","DOI":"10.1109\/ICISCT50599.2020.9351410"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Sabah, S., Hasan, A.S.M.T., and Daria, A. (2021, January 23\u201325). A Blockchain-based Approach to Detect Counterfeit Drugs in Medical Supply Chain. Proceedings of the International Conference on Big Data, IoT and Machine Learning (BIM 2021), Cox\u2019s Bazar, Bangladesh.","DOI":"10.1007\/978-981-16-6636-0_46"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","article-title":"A survey on the security of blockchain systems","volume":"107","author":"Li","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"68426","DOI":"10.1109\/ACCESS.2020.2986681","article-title":"IoT-based smart shopping cart using radio frequency identification","volume":"8","author":"Shahroz","year":"2020","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"3863","DOI":"10.1109\/TAC.2020.2994030","article-title":"Design of privacy-preserving dynamic controllers","volume":"65","author":"Kawano","year":"2020","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Li, C., Palanisamy, B., and Xu, R. (2019, January 8\u201312). Scalable and privacy-preserving design of on\/off-chain smart contracts. Proceedings of the 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW), Macao, Macao.","DOI":"10.1109\/ICDEW.2019.00-43"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"K-anonymity: A model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"ref_14","first-page":"2","article-title":"Anonymity and closely related terms in the cyberspace: An analysis by example","volume":"19","author":"Kambourakis","year":"2014","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Pfitzmann, A., and K\u00f6hntopp, M. (2001). Anonymity, unobservability, and pseudonymity\u2014A proposal for terminology. Designing Privacy Enhancing Technologies, Springer.","DOI":"10.1007\/3-540-44702-4_1"},{"key":"ref_16","unstructured":"Pfitzmann, A., and Hansen, M. (2021, October 20). A Terminology for Talking About Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management. Available online: http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf."},{"key":"ref_17","unstructured":"Hansen, M., Smith, R., and Tschofenig, H. (2011). CA Privacy terminology and concepts. Internet Draft, March 2012, Technical Report, IETF. Network Working Group."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Malik, S., Dedeoglu, V., Kanhere, S.S., and Jurdak, R. (2019, January 14\u201317). Trustchain: Trust management in blockchain and iot supported supply chains. Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA.","DOI":"10.1109\/Blockchain.2019.00032"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"129000","DOI":"10.1109\/ACCESS.2019.2940227","article-title":"Blockchain-driven iot for food traceability with an integrated consensus mechanism","volume":"7","author":"Tsang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Shi, J., Yi, D., and Kuang, J. (2019). Pharmaceutical supply chain management system with integration of iot and blockchain technology. International Conference on Smart Blockchain, Springer.","DOI":"10.1007\/978-3-030-34083-4_10"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Caro, M.P., Ali, M.S., Vecchio, M., and Giaffreda, R. (2018, January 8\u20139). Blockchain-based traceability in agri-food supply chain management: A practical implementation. Proceedings of the 2018 IoT Vertical and Topical Summit on Agriculture-Tuscany (IOT Tuscany), Tuscany, Italy.","DOI":"10.1109\/IOT-TUSCANY.2018.8373021"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1016\/j.future.2018.04.051","article-title":"Internet of things (iot) and its impact on supply chain: A framework for building smart, secure and efficient systems","volume":"86","author":"Manogaran","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"157113","DOI":"10.1109\/ACCESS.2019.2949951","article-title":"A blockchain-based framework for supply chain provenance","volume":"7","author":"Cui","year":"2019","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"62899","DOI":"10.1109\/ACCESS.2021.3074874","article-title":"A Blockchain-Based Traceability System in Agri-Food SME: Case Study of a Traditional Bakery","volume":"9","author":"Cocco","year":"2021","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"46198","DOI":"10.1109\/ACCESS.2019.2909170","article-title":"DL-Tags: DLT and smart tags for decentralized, privacy-preserving, and verifiable supply chain management","volume":"7","year":"2019","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"65660","DOI":"10.1109\/ACCESS.2021.3076373","article-title":"Secure Identification, Traceability and Real-Time Tracking of Agricultural Food Supply During Transportation Using Internet of Things","volume":"9","author":"Bhutta","year":"2021","journal-title":"IEEE Access"},{"key":"ref_27","first-page":"323","article-title":"A novel plithogenic MCDM framework for evaluating the performance of IoT based supply chain","volume":"33","author":"Grida","year":"2020","journal-title":"Neutrosophic Sets Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1108\/JEIM-11-2019-0369","article-title":"Development of IoT based data-driven agriculture supply chain performance measurement framework","volume":"34","author":"Yadav","year":"2020","journal-title":"J. Enterp. Inf. Manag."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Yadav, S., Luthra, S., and Garg, D. (2020). Internet of things (IoT) based coordination system in Agri-food supply chain: Development of an efficient framework using DEMATEL-ISM. Oper. Manag. Res.","DOI":"10.1007\/s12063-020-00164-x"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Zhang, H., and Sakurai, K. (2020, January 24\u201326). Blockchain for iot-based digital supply chain: A survey. Proceedings of the International Conference on Emerging Internetworking, Data & Web Technologies, Kitakyushu, Japan.","DOI":"10.1007\/978-3-030-39746-3_57"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1145\/356789.356793","article-title":"Symmetric and asymmetric encryption","volume":"11","author":"Simmons","year":"1979","journal-title":"ACM Comput. Surv. CSUR"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Islam, T., Youki, R.A., Chowdhury, B.R., and Hasan, A.S.M. (2021, January 23\u201325). An ECC Based Secure Communication Protocol for Resource Constraints IoT Devices in Smart Home. Proceedings of the International Conference on Big Data, IoT, and Machine Learning, Cox\u2019s Bazar, Bangladesh.","DOI":"10.1007\/978-981-16-6636-0_33"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Hao, X., Yu, L., Zhiqiang, L., Zhen, L., and Dawu, G. (June, January 30). Dynamic practical byzantine fault tolerance. Proceedings of the 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China.","DOI":"10.1109\/CNS.2018.8433150"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2830","DOI":"10.1109\/JSYST.2018.2876226","article-title":"A lightweight and provably secure key agreement system for a smart grid with elliptic curve cryptography","volume":"13","author":"Wu","year":"2018","journal-title":"IEEE Syst. J."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Haque, R.U., Hasan, A.S.M., Jiang, Q., and Qu, Q. (2020). Privacy-preserving K-nearest neighbors training over blockchain-based encrypted health data. Electronics, 9.","DOI":"10.3390\/electronics9122096"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"7273","DOI":"10.1109\/ACCESS.2018.2890389","article-title":"Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply Chains","volume":"7","author":"Sidorov","year":"2019","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1007\/s11277-016-3647-4","article-title":"A new ultralightweight RFID authentication protocol for passive low cost tags: KMAP","volume":"94","author":"Mujahid","year":"2017","journal-title":"Wirel. Pers. Commun."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"3095","DOI":"10.1002\/sec.1314","article-title":"Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G","volume":"9","author":"Fan","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"7081","DOI":"10.1109\/TII.2019.2942389","article-title":"Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment","volume":"16","author":"Jangirala","year":"2019","journal-title":"IEEE Trans. Ind. Inform."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/1\/64\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:12:31Z","timestamp":1760364751000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/1\/64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,3]]},"references-count":39,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,1]]}},"alternative-id":["sym14010064"],"URL":"https:\/\/doi.org\/10.3390\/sym14010064","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,3]]}}}