2022 IEEE 13th Annual Ubiquitous Computing, Electronics &Amp; Mobile Communication Conference (UEMCON) 2022
DOI: 10.1109/uemcon54665.2022.9965682
|View full text |Cite
|
Sign up to set email alerts
|

Security Challenges of Blockchain-Based Supply Chain Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…BC is a Distributed Ledger Technology (DLT) that can be used as a decentralized database that supports the essential SC system requirements, including visibility, provenance, security, and traceability [5,6]. New technological advancements, such as Big Data, Artificial Intelligence (AI), and Internet of Things (IoT), integrated with BC-based seafoodSCs, can offer significant advantages and create an agile and effective ecosystem [7], revolutionizing how smart cities manage their perishable food supplies and enhance seafood safety measures [8].…”
Section: Introductionmentioning
confidence: 99%
“…BC is a Distributed Ledger Technology (DLT) that can be used as a decentralized database that supports the essential SC system requirements, including visibility, provenance, security, and traceability [5,6]. New technological advancements, such as Big Data, Artificial Intelligence (AI), and Internet of Things (IoT), integrated with BC-based seafoodSCs, can offer significant advantages and create an agile and effective ecosystem [7], revolutionizing how smart cities manage their perishable food supplies and enhance seafood safety measures [8].…”
Section: Introductionmentioning
confidence: 99%
“…For example, a 2017 NotPetya ransomware SC attack, which focused on encrypting and locking data for ransom rather than stealing it [1]. Additionally, the SolarWinds sunburst attack in 2020 compromised numerous companies globally, gaining unauthorized access to sensitive data for thousands of customers [2].. The sprawling interconnections within contemporary SC systems, encompassing a multitude of stakeholders, technologies, and geographies, introduce vulnerabilities that malicious actors can exploit.…”
Section: Introductionmentioning
confidence: 99%
“…These traditional approaches often focus on specific application scenarios and may struggle to adapt to the complex and dynamic nature of modern supply chains [6]. Furthermore, these methods often lack the ability to effectively handle the vast amounts of data generated in modern supply chains, limiting their potential for real-time optimization and risk mitigation [7].…”
Section: Introductionmentioning
confidence: 99%