2019
DOI: 10.1147/jrd.2019.2900651
|View full text |Cite
|
Sign up to set email alerts
|

Crypto anchors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 16 publications
0
10
0
Order By: Relevance
“…data feed from the drones, cameras, QR codes, sensors to the smart contract nodes in relation to the raw goods and all the required data to have a complete provenance. provide proof of this verification by flying a drone using FPV goggles 12 and can record the mining of the diamonds and their being tagged with cryptoanchors (Balagurusamy et al 2019). The cost and effort to deploy FPV recordings in conjunction with the inspector's verification is probably justified in the gemstone mining process where regulations are strict.…”
Section: (Insert Figure 1 About Here)mentioning
confidence: 99%
See 2 more Smart Citations
“…data feed from the drones, cameras, QR codes, sensors to the smart contract nodes in relation to the raw goods and all the required data to have a complete provenance. provide proof of this verification by flying a drone using FPV goggles 12 and can record the mining of the diamonds and their being tagged with cryptoanchors (Balagurusamy et al 2019). The cost and effort to deploy FPV recordings in conjunction with the inspector's verification is probably justified in the gemstone mining process where regulations are strict.…”
Section: (Insert Figure 1 About Here)mentioning
confidence: 99%
“…Here the smart contract is a ledger onto itself and physical assets and events should be tokenized or represented virtually. Since these transactions occur and assets exist in the physical layer and not in the virtual blockchain layer, the issues of legitimacy and provenance emerge (Balagurusamy et al 2019). Bridging this gap between and the virtual and physical world exists the connecting layer or "Oracles" (Figure 2).…”
Section: (Insert Figure 1 About Here)mentioning
confidence: 99%
See 1 more Smart Citation
“…The issue of genuineness of sensor hardware is already addressed by various stakeholders. Other than for computer hardware, each class of sensor system tends to require individual anti-counterfeit technologies (Gokce et al, 2018;Balagurusamy et al, 2019); their choice is determined by acceptable costs and the appeal to fraudsters. Sensor data can be made trustworthy through a combination of techniques to create accountability for its accuracy.…”
Section: Sensorsmentioning
confidence: 99%
“…The problem is that these identifiers are not related to something intrinsic of the product, i.e., they are not true product identifiers since they can be modified, copied or transferred to another product. To avoid this problem, crypto anchors were proposed as a tight link between the digital and physical domains [ 14 ]. Silicon physical unclonable functions (PUFs), which exploit the variabilities of the semiconductor manufacturing process [ 15 ], can be treated as crypto anchors for electronic products such as IoT devices.…”
Section: Introductionmentioning
confidence: 99%