2019 4th MEC International Conference on Big Data and Smart City (ICBDSC) 2019
DOI: 10.1109/icbdsc.2019.8645610
|View full text |Cite
|
Sign up to set email alerts
|

Smart System Based on DOA & IoT for Products Monitoring & Anti-Counterfeiting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(10 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…At the societal level, most sellers of counterfeit products are tax-evaders, thus causing economic losses. To handle these, the policymakers should educate the consumer about the negative effect and losses due to the consumption of counterfeit products according to the recommendations (Al-Bahari et al. , 2019).…”
Section: Discussionmentioning
confidence: 99%
“…At the societal level, most sellers of counterfeit products are tax-evaders, thus causing economic losses. To handle these, the policymakers should educate the consumer about the negative effect and losses due to the consumption of counterfeit products according to the recommendations (Al-Bahari et al. , 2019).…”
Section: Discussionmentioning
confidence: 99%
“…A call-in numeric token printed on the packaging can be used to register the medicine once it is used the first time [93], but this method may not help authenticate a reused medicine. Al-Bahri et al [94] proposed a complete track and trace system based on a central server on the Internet allowing each medicine to be treated as a digital object with unique identity. This DOA (digital object architecture) realizes a shared platform for all stakeholders to retrieve dedicated information when enough cybersecurity is properly implemented.…”
Section: Technologies For Safety Requirementsmentioning
confidence: 99%
“…These shortcomings are deprived of alternative software solutions for identification, such as Digital Objects Architecture (DOA), Uniform Resource Identifier (URI), Extensible Resource Identifier (XRI), and Internationalized Resource Identifier (IRI) [6][7][8][9]. These systems make it possible to identify any virtual or real object in the public telecommunication network (PTN), regardless of the presence or absence of a network interface [10]. These systems, e.g., hardware identification systems, use various third-party technologies to authenticate physical and digital objects [11].…”
Section: Introductionmentioning
confidence: 99%
“…The choice of the optimal system is determined by the following requirements of identification technologies that take into account its use in the public communication networks [4,10], and [12].…”
Section: Introductionmentioning
confidence: 99%