Skip to main content

A Survey on Counterfeits in the Information and Communications Technology (ICT) Supply Chain

  • Conference paper
  • First Online:
Proceedings of Seventh International Congress on Information and Communication Technology

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 447))

Abstract

One of the major threats to the information and communications technology (ICT) supply chain is the introduction of counterfeit parts and components. Global efforts have been intensified to defend against counterfeiters and counterfeit products due to their detrimental impact on the economy, safety, and security. Among the extensive literature of papers, reviews, books, and articles, this review attempts to include a detailed selection of most significant research work done in the intersection of ICT, supply chains, and counterfeits to provide a reference source for researchers. Citation network and global citation scores have been used to extract and analyze papers and discuss them in different types of clusters (electronic, medical, food, and anti-counterfeiting technologies and approaches). Our review approaches the clustered papers by focusing on (1) their contribution in documenting and modeling the intrusion of counterfeit electronic parts in the ICT supply chain, (2) the proposed counterfeits’ detection and avoidance techniques in the ICT supply chain, and (3) the contribution of ICT in thwarting counterfeits in medical, pharmaceutical, and food supply chains. This review provides a better understanding of the global efforts to address counterfeits in the ICT supply chain, as well as the role of ICT in thwarting counterfeits in other supply chains, which can guide future research to minimize the impact of counterfeits on supply chains.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. CISA Working Group 2 (2021) Information and Communications Technology Supply Chain Risk Management Task Force Threat Evaluation Working Group: Threat Scenarios Version 2.0: https://www.cisa.gov/sites/default/files/publications/ict-scrm-task-force-threat-scenarios-report-v2.pdf

  2. SAE International (2019) SAE AS5553 Counterfeit Electrical, Electronic, and Electromechanical (EEE) Parts; Avoidance, Detection, Mitigation, and Disposition Standards

    Google Scholar 

  3. Frontier Economics Ltd (2017) The Economic Costs of Counterfeiting and Piracy

    Google Scholar 

  4. OECD, European Union Intellectual Property Office (2019) Trends in trade in counterfeit and pirated goods. Illicit Trade, OECD Publishing, Paris

    Google Scholar 

  5. Falagas ME, Pitsouni EI, Malietzis GA, Pappas G (2008) Comparison of PubMed, Scopus, Web of Science, and Google Scholar: strengths and weaknesses. FASEB J 22(2):338–342

    Article  Google Scholar 

  6. Van Eck NJ, Waltman L (2010) VOSviewer: visualizing scientific landscapes [software]. https://www.vosviewer.com

  7. Pecht M, Tiku S (2006) Bogus: electronic manufacturing and consumers confront a rising tide of counterfeit electronics. IEEE Spectr 43(5):37–46

    Article  Google Scholar 

  8. Stradley J, Karraker D (2006) The electronic part supply chain and risks of counterfeit parts in defense applications. IEEE Trans Compon Packag Technol 29(3):703–705

    Article  Google Scholar 

  9. GIDEP. https://www.gidep.org/about/about.htm

  10. ERAI. https://www.erai.com/aboutus_profile

  11. Office of the Assistant Secretary of the Navy (2017) Counterfeit Material Process Guidebook: Guidelines for Mitigating the Risk of Counterfeit Materiel in the Supply Chain. NAVSO P-7000

    Google Scholar 

  12. Wix SD (2017) Suspect/Counterfeit Electronics Overview. Sandia National Lab.(SNL-NM), Albuquerque, NM (United States)

    Google Scholar 

  13. Szakal A, Pearsall K (2014) Open industry standards for mitigating risks to global supply chains. IBM J Res Dev 58(1):1–13

    Article  Google Scholar 

  14. Bodner DA (2014) Enterprise modeling framework for counterfeit parts in defense systems. Procedia Computer Science 36:425–431

    Article  Google Scholar 

  15. Stevenson M, Busby J (2015) An exploratory analysis of counterfeiting strategies. Int J Oper Prod Manag 35(1):110–144

    Article  Google Scholar 

  16. Collier ZA, Linkov I, Keisler JM, Walters S, DiMase D (2014) A semi-quantitative risk assessment standard for counterfeit electronics detection. SAE Int J Aerosp 7(1):171–181

    Article  Google Scholar 

  17. Lambert JH, Keisler JM, Wheeler WE, Collier ZA, Linkov I (2013) Multiscale approach to the security of hardware supply chains for energy systems. Environ Syst Decisions 33(3):326–334

    Article  Google Scholar 

  18. Rostami M, Koushanfar F, Rajendran J, Karri R (2013) Hardware security: threat models and metrics. in 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE. pp 819–823

    Google Scholar 

  19. Chatterjee K, Das D (2007) Semiconductor manufacturers’ efforts to improve trust in the electronic part supply chain. IEEE Trans Compon Packag Technol 30(3):547–549

    Article  Google Scholar 

  20. Guin U, Huang K, Dimase D, Carulli JM, Tehranipoor M, Makris Y (2014) Counterfeit integrated circuits: a rising threat in the global semiconductor supply chain. Proc IEEE 102(8):1207–1228

    Article  Google Scholar 

  21. Guin U, Dimase D, Tehranipoor M (2014) Counterfeit integrated circuits: detection, avoidance, and the challenges ahead. J Electron Test 30(1):9–23

    Article  Google Scholar 

  22. Tehranipoor M, Guin U, Forte D (2015) Counterfeit integrated circuits: detection and avoidance

    Google Scholar 

  23. Guin U, Dimase D, Tehranipoor M (2014) A comprehensive framework for counterfeit defect coverage analysis and detection assessment. J Electron Test 30(1):25–40

    Article  Google Scholar 

  24. Alam M, Chowdhury S, Tehranipoor MM, Guin U (2018) Robust, low-cost, and accurate detection of recycled ICs using digital signatures. in 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). pp 209–214

    Google Scholar 

  25. Dogan H, Forte D, Tehranipoor MM (2014) Aging analysis for recycled FPGA detection. in 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT). pp 171–176

    Google Scholar 

  26. Guo Z, Xu X, Rahman MT, Tehranipoor MM, Forte D (2018) SCARe: an SRAM-based countermeasure against IC recycling. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 26(4): 744–755

    Google Scholar 

  27. Ghosh P, Chakraborty RS (2017) Counterfeit IC detection by image texture analysis. in 2017 Euromicro Conference on Digital System Design (DSD). pp 283–286

    Google Scholar 

  28. Frazier PD, Gilmore ET, Collins IJ, Samotshozo WE, Chouikha MF (2018) A novel counterfeit detection approach for integrated circuit supply chain assurance. Journal of Hardware and Systems Security 2(3):240–250

    Article  Google Scholar 

  29. Huang K, Carulli JM, Makris Y (2013) Counterfeit electronics: a rising threat in the semiconductor manufacturing industry. in 2013 IEEE International Test Conference (ITC). pp 1–4

    Google Scholar 

  30. Kumari P, Talukder BMSB, Sakib S, Ray B, Rahman MT (2018) Independent detection of recycled flash memory: challenges and solutions. in 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). pp 89–95

    Google Scholar 

  31. Sakib S, Kumari P, Talukder B, Rahman M, Ray B (2018) Non-invasive detection method for recycled flash memory using timing characteristics. Cryptography 2(3):17

    Article  Google Scholar 

  32. Ahmadi B, Javidi B, Shahbazmohamadi S (2018) Automated detection of counterfeit ICs using machine learning. Microelectron Reliab 88–90:371–377

    Article  Google Scholar 

  33. Zheng Y, Wang X, Bhunia S (2015) SACCI: scan-based characterization through clock phase sweep for counterfeit chip detection. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 23(5): 831–841

    Google Scholar 

  34. Zheng Y, Basak A, Bhunia S (2014) CACI: dynamic current analysis towards robust recycled chip identification. in Proceedings of the 51st Annual Design Automation Conference. San Francisco, CA, USA: Association for Computing Machinery. pp 1–6

    Google Scholar 

  35. Zheng Y, Yang S, Bhunia S (2016) SeMIA: self-similarity-based IC integrity analysis. IEEE Trans Comput Aided Des Integr Circuits Syst 35(1):37–48

    Article  Google Scholar 

  36. Contreras GK, Rahman MT, Tehranipoor M (2013) Secure Split-Test for preventing IC piracy by untrusted foundry and assembly. in 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS). pp 196–203

    Google Scholar 

  37. Ben Dodo S, Bishnoi R, Mohanachandran Nair S, Tahoori MB (2019) A spintronics memory PUF for resilience against cloning counterfeit. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 27(11): 2511–2522

    Google Scholar 

  38. Chakraborty A, Jayasankaran NG, Liu Y, Rajendran J, Sinanoglu O, Srivastava A, Xie Y, Yasin M, Zuzak M (2020) Keynote: a disquisition on logic locking. IEEE Trans Comput Aided Des Integr Circuits Syst 39(10):1952–1972

    Article  Google Scholar 

  39. Basak A, Zheng Y, Bhunia S (2014) Active defense against counterfeiting attacks through robust antifuse-based on-chip locks. in 2014 IEEE 32nd VLSI Test Symposium (VTS). pp 1–6

    Google Scholar 

  40. Livingston H (2007) Avoiding counterfeit electronic components. IEEE Trans Compon Packag Technol 30(1):187–189

    Article  Google Scholar 

  41. Islam MN, Patii VC, Kundu S (2018) On IC traceability via blockchain. in 2018 International Symposium on VLSI Design, Automation and Test (VLSI-DAT). IEEE

    Google Scholar 

  42. Skudlarek JP, Katsioulas T, Chen M (2016) A platform solution for secure supply-chain and chip life-cycle management. Computer 49(8):28–34

    Article  Google Scholar 

  43. Islam MN, Kundu S (2019) Enabling IC traceability via blockchain pegged to embedded PUF. ACM Transactions on Design Automation of Electronic Systems 24(3):1–23

    Article  Google Scholar 

  44. Guin U, Cui P, Skjellum A (2018) Ensuring proof-of-authenticity of IoT edge devices using blockchain technology. in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. pp 1042–1049

    Google Scholar 

  45. Cui P, Dixon J, Guin U, Dimase D (2019) A blockchain-based framework for supply chain provenance. IEEE Access 7:157113–157125

    Article  Google Scholar 

  46. Negka L, Gketsios G, Anagnostopoulos NA, Spathoulas G, Kakarountas A, Katzenbeisser S (2019) Employing blockchain and physical unclonable functions for counterfeit IoT devices detection. in Proceedings of the International Conference on Omni-Layer Intelligent Systems. Crete, Greece: Association for Computing Machinery. pp 172–178

    Google Scholar 

  47. Livingston H (2010) Securing the DOD supply chain from the risks of counterfeit electronic components. BAE Systems

    Google Scholar 

  48. Yang K, Forte D, Tehranipoor M (2018) ReSC. ACM Transactions on Design Automation of Electronic Systems, 23(3): 1–27

    Google Scholar 

  49. Yang K, Forte D, Tehranipoor M (2015) An RFID-based technology for electronic component and system counterfeit detection and traceability. in 2015 IEEE International Symposium on Technologies for Homeland Security (HST). IEEE. pp 1–6

    Google Scholar 

  50. Anandhi S, Anitha R, Sureshkumar V (2019) IoT enabled RFID authentication and secure object tracking system for smart logistics. Wireless Pers Commun 104(2):543–560

    Article  Google Scholar 

  51. Yang K, Forte D, Tehranipoor MM (2017) CDTA: a comprehensive solution for counterfeit detection, traceability, and authentication in the IoT supply chain. ACM Transactions on Design Automation of Electronic Systems (TODAES), 22(3): Article 42

    Google Scholar 

  52. Dimase D, Collier ZA, Carlson J, Gray RB, Linkov I (2016) Traceability and risk analysis strategies for addressing counterfeit electronics in supply chains for complex systems. Risk Anal 36(10):1834–1843

    Article  Google Scholar 

  53. Li L (2013) Technology designed to combat fakes in the global supply chain. Bus Horiz 56(2):167–177

    Article  Google Scholar 

  54. Metz C (2012) Defense Logistics Agency, America’s Combat Logistics Support Agency Counterfeit Items Detection and Prevention, DLA J-334

    Google Scholar 

  55. Gansler JS, Lucyshyn W, Rigilano J (2014) Addressing counterfeit parts in the DOD supply chain, Center for Public Policy and Private Enterprise, School of Public Policy, University of Maryland, UMD-LM-14–012

    Google Scholar 

  56. Rogers RSM, O’Donnell J (2017) Supply chain security: DFARS – Detection & Avoidance of Counterfeit Electronic Parts, https://smtnet.com/library/files/upload/supply-chain-security.pdf

  57. Aerospace Industries Association (2011) Counterfeit Parts: Increasing Awareness and Developing Countermeasures, https://www.aia-aerospace.org/report/counterfeit-parts-increasing-awareness-and-developing-countermeasures/

  58. Lockheed Martin Counterfeit Prevention: What Makes a Good Control Plan?, https://slidetodoc.com/counterfeit-prevention-what-makes-a-good-control-plan/

  59. DARPA A DARPA Approach to Trusted Microelectronics, https://www.darpa.mil/attachments/Obscurationandmarking_Summary.pdf

  60. Lingle R (2014) In-mold labels use digital watermarking for authentication, https://www.packagingdigest.com/trends-issues/mold-labels-use-digital-watermarking-authentication. Packaging Digest

  61. Digital Watermarking Alliance Authentication of content and objects (includes government IDs), https://digitalwatermarkingalliance.org/digital-watermarking-applications/authentication-of-content-and-objects/

  62. Chan HK, Griffin J, Lim JJ, Zeng F, Chiu ASF (2018) The impact of 3D Printing Technology on the supply chain: Manufacturing and legal perspectives. Int J Prod Econ 205:156–162

    Article  Google Scholar 

  63. CDC Tamper-resistant prescription form requirements, https://www.cdc.gov/phlp/docs/menu-prescriptionform.pdf

  64. Staake T, Michahelles F, Fleisch E, Williams JR, Min H, Cole PH, Lee S-G, McFarlane D, Murai J (2008) Anti-counterfeiting and supply chain security. Springer, Berlin Heidelberg, pp 33–43

    Google Scholar 

  65. Chen C-l, Chen Y-Y, Huang Y-C, Liu C-S, Lin C-I, Shih T-F (2008) Anti-counterfeit ownership transfer protocol for low cost RFID system. WSEAS Transactions on Computers archive 7:1149–1158

    Google Scholar 

  66. Azuara G, Luis Tornos J, Luis Salazar J (2012) Improving RFID traceability systems with verifiable quality. Ind Manag Data Syst 112(3):340–359

    Article  Google Scholar 

  67. Kwok SK, Ting JSL, Tsang AHC, Lee WB, Cheung BCF (2010) Design and development of a mobile EPC-RFID-based self-validation system (MESS) for product authentication. Comput Ind 61(7):624–635

    Article  Google Scholar 

  68. Choi SH, Yang B, Cheung HH, Yang YX (2015) RFID tag data processing in manufacturing for track-and-trace anti-counterfeiting. Comput Ind 68:148–161

    Article  Google Scholar 

  69. Wyld D, Jones M (2007) RFID is no fake: the adoption of radio frequency identification technology in the pharmaceutical supply chain. International Journal of Integrated Supply Management - Int J Integrated Supply Manag, 3

    Google Scholar 

  70. Agrawal TK, Koehl L, Campagne C (2018) A secured tag for implementation of traceability in textile and clothing supply chain. Int J Adv Manuf Tech 99(9):2563–2577

    Article  Google Scholar 

  71. Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24(2):381–394

    Article  MathSciNet  Google Scholar 

  72. Rieback MR, Crispo B, Tanenbaum AS (2006) The evolution of RFID security. IEEE Pervasive Comput 5(1):62–69

    Article  Google Scholar 

  73. Garfinkel SL, Juels A, Pappu R (2005) RFID privacy: an overview of problems and proposed solutions. IEEE Secur Priv 3(3):34–43

    Article  Google Scholar 

  74. Lee YK, Batina L, Singelee D, Preneel B, Verbauwhede I (2010) Anti-counterfeiting, untraceability and other security challenges for RFID systems: public-key-based protocols and hardware. Springer, Berlin Heidelberg, pp 237–257

    Google Scholar 

  75. Santos BLD, Smith LS (2008) RFID in the supply chain: panacea or Pandora’s box? Commun ACM 51(10):127–131

    Article  Google Scholar 

  76. Cai S, Li T, Ma C, Li Y, Deng RH (2009) Enabling secure secret updating for unidirectional key distribution in RFID-enabled supply chains. Springer, Berlin Heidelberg, pp 150–164

    Google Scholar 

  77. Kumar S, Dieveney E, Dieveney A (2009) Reverse logistic process control measures for the pharmaceutical industry supply chain. Int J Product Perform Manag 58(2):188–204

    Article  Google Scholar 

  78. Juels A (2005) Strengthening EPC tags against cloning. in WiSe - 2005 ACM Workshop on Wireless Security. Cologne: Association for Computing Machinery (ACM). pp 67–75

    Google Scholar 

  79. Miles SB, Sarma S, Williams JR (2008) RFID technology and applications. RFID Technology and Applications. Vol. 9780521880930. Cambridge University Press. 1–218

    Google Scholar 

  80. Singh MKM, Li X (2010) Trust in RFID-enabled supply-chain management. Int. J. Secur. Networks 5:96–105

    Article  Google Scholar 

  81. Ting SL, Tsang AHC (2014) Using social network analysis to combat counterfeiting. Int J Prod Res 52(15):4456–4468

    Article  Google Scholar 

  82. Trenfield SJ, Xian Tan H, Awad A, Buanz A, Gaisford S, Basit AW, Goyanes A (2019) Track-and-trace: Novel anti-counterfeit measures for 3D printed personalized drug products using smart material inks. Int J Pharmaceutics 567:118443

    Google Scholar 

  83. Cole R, Stevenson M, Aitken J (2019) Blockchain technology: implications for operations and supply chain management. Supply Chain Management: An Int J 24(4):469–483

    Article  Google Scholar 

  84. Pun H, Swaminathan JM, Hou P (2021) Blockchain adoption for combating deceptive counterfeits. Prod Oper Manag 30(4):864–882

    Article  Google Scholar 

  85. Liu Z, Li Z (2020) A blockchain-based framework of cross-border e-commerce supply chain. International J Information Manag 52:102059

    Google Scholar 

  86. Kennedy ZC, Stephenson DE, Christ JF, Pope TR, Arey BW, Barrett CA, Warner MG (2017) Enhanced anti-counterfeiting measures for additive manufacturing: coupling lanthanide nanomaterial chemical signatures with blockchain technology. J Materials Chemistry C 5(37):9570–9578

    Article  Google Scholar 

  87. Smith AF, Skrabalak SE (2017) Metal nanomaterials for optical anti-counterfeit labels. Journal of Materials Chemistry C 5(13):3207–3215

    Article  Google Scholar 

  88. Toyoda K, Mathiopoulos PT, Sasase I, Ohtsuki T (2017) A novel blockchain-based product ownership management system (POMS) for anti-counterfeits in the post supply chain. IEEE Access 5:17465–17477

    Article  Google Scholar 

  89. Hepp T, Wortner P, Schönhals A, Gipp B (2018) Securing physical assets on the blockchain: linking a novel object identification concept with distributed ledgers. in Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems. Munich, Germany: Association for Computing Machinery. pp 60–65

    Google Scholar 

  90. Boos D, Guenter H, Grote G, Kinder K (2013) Controllable accountabilities: The Internet of Things and its challenges for organisations. Behaviour and Info Tech 32(5):449–467

    Article  Google Scholar 

  91. Acri KML, Lybecker n (2018) Pharmaceutical counterfeiting: contributing factors. Fraser Institute. pp 6–23

    Google Scholar 

  92. Blackstone EA, Fuhr JPJ, Pociask S (2014) The health and economic effects of counterfeit drugs. American health & drug benefits 7(4):216–224

    Google Scholar 

  93. Hall A, Koenraadt R, Antonopoulos GA (2017) Illicit pharmaceutical networks in Europe: organising the illicit medicine market in the United Kingdom and the Netherlands. Trends in Organized Crime 20(3–4):296–315

    Article  Google Scholar 

  94. Tremblay M (2013) Medicines counterfeiting is a complex problem: a review of key challenges across the supply chain. Curr Drug Saf 8(1):43–55

    Article  Google Scholar 

  95. Khan MH, Akazawa M, Dararath E, Kiet HB, Sovannarith T, Nivanna N, Yoshida N, Kimura K (2011) Perceptions and practices of pharmaceutical wholesalers surrounding counterfeit medicines in a developing country: a baseline survey. BMC Health Serv Res 11(1):306

    Article  Google Scholar 

  96. Rosen LS, Jacobs IA, Burkes RL (2017) Bevacizumab in Colorectal Cancer: Current Role in Treatment and the Potential of Biosimilars. Target Oncol 12(5):599–610

    Article  Google Scholar 

  97. Mackey TK, Liang BA, York P, Kubic T (2015) Counterfeit drug penetration into global legitimate medicine supply chains: a global assessment. Am J Tropical Medicine and Hygiene 92(6_Suppl):59–67

    Google Scholar 

  98. Gautam CS, Utreja A, Singal GL (2009) Spurious and counterfeit drugs: a growing industry in the developing world. Postgrad Med J 85(1003):251–256

    Article  Google Scholar 

  99. Stewart MW, Narayanan R, Gupta V, Rosenfeld PJ, Martin DF, Chakravarthy U (2016) Counterfeit Avastin in India: punish the criminals, not the patients. Am J Ophthalmol 170:228–231

    Article  Google Scholar 

  100. Ozawa S, Evans DR, Bessias S, Haynie DG, Yemeke TT, Laing SK, Herrington JE (2018) Prevalence and estimated economic burden of substandard and falsified medicines in low-and middle-income countries: a systematic review and meta-analysis. JAMA Netw Open 1(4):e181662–e181662

    Article  Google Scholar 

  101. Medina E, Bel E, Suñé JM (2016) Counterfeit medicines in Peru: a retrospective review (1997–2014). BMJ Open 6(4):e010387

    Google Scholar 

  102. Venhuis BJ, Oostlander AE, Giorgio DD, Mosimann R, du Plessis I (2018) Oncology drugs in the crosshairs of pharmaceutical crime. Lancet Oncol 19(4):e209–e217

    Article  Google Scholar 

  103. Jackson G, Patel S, Khan S (2012) Assessing the problem of counterfeit medications in the United Kingdom. Int J Clin Pract 66(3):241–250

    Article  Google Scholar 

  104. Chambliss WG, Carroll WA, Kennedy D, Levine D, Moné MA, Douglas Ried L, Shepherd M, Yelvigi M (2012) Role of the pharmacist in preventing distribution of counterfeit medications. J Am Pharm Assoc 52(2):195–199

    Article  Google Scholar 

  105. Ziance RJ (2008) Roles for pharmacy in combatting counterfeit drugs. J Am Pharm Assoc 48(4):e71–e91

    Article  Google Scholar 

  106. Nayyar GML, Breman JG, Mackey TK, Clark JP, Hajjou M, Littrell M, Herrington JE (2019) Falsified and substandard drugs: stopping the pandemic. Am J Trop Med Hyg 100(5):1058–1065

    Article  Google Scholar 

  107. Chaudhry PE, Stumpf SA (2013) The challenge of curbing counterfeit prescription drug growth: Preventing the perfect storm. Bus Horiz 56(2):189–197

    Article  Google Scholar 

  108. Ranieri N, Tabernero P, Green MD, Verbois L, Herrington J, Sampson E, Satzger RD, Phonlavong C, Thao K, Newton PN (2014) Evaluation of a new handheld instrument for the detection of counterfeit artesunate by visual fluorescence comparison. Am J Trop Med Hyg 91(5):920

    Article  Google Scholar 

  109. Mackey T, Liang B (2011) The global counterfeit drug trade: patient safety and public health risks. J Pharm Sci 100:4571–4579

    Article  Google Scholar 

  110. Mackey TK, Liang BA (2013) Improving global health governance to combat counterfeit medicines: a proposal for a UNODC-WHO-Interpol trilateral mechanism. BMC Med 11(1):233

    Article  Google Scholar 

  111. Davison M (2011) Pharmaceutical anti-counterfeiting: combating the real danger from fake drugs. John Wiley & Sons

    Book  Google Scholar 

  112. Hamilton WL, Doyle C, Halliwell-Ewen M, Lambert G (2016) Public health interventions to protect against falsified medicines: a systematic review of international, national and local policies. Health Policy Plan 31(10):1448–1466

    Article  Google Scholar 

  113. Fadlallah R, El-Jardali F, Annan F, Azzam H, Akl EA (2016) Strategies and systems-level interventions to combat or prevent drug counterfeiting: a systematic review of evidence beyond effectiveness. Pharmaceutical Medicine 30:263–276

    Article  Google Scholar 

  114. Cohn JE, von Schoen-Angerer T, Jambert E, Arreghini G, Childs ML (2013) When falsified medicines enter the supply chain: description of an incident in Kenya and lessons learned for rapid response. J Public Health Policy 34:22–30

    Article  Google Scholar 

  115. Cuomo RE, Mackey TK (2014) An exploration of counterfeit medicine surveillance strategies guided by geospatial analysis: lessons learned from counterfeit Avastin detection in the US drug supply chain. BMJ Open 4(12):e006657

    Google Scholar 

  116. Mackey TK, Cuomo R, Guerra C, Liang BA (2015) After counterfeit Avastin®—what have we learned and what can be done? Nat Rev Clin Oncol 12(5):302–308

    Article  Google Scholar 

  117. Kamba PF, Ireeta ME, Balikuna S, Kaggwa B (2017) Threats posed by stockpiles of expired pharmaceuticals in low- and middle-income countries: a Ugandan perspective. Bull World Health Organ 95:594–598

    Article  Google Scholar 

  118. Reynolds L, McKee M (2010) Organised crime and the efforts to combat it: a concern for public health. Glob Health 6(1):21

    Article  Google Scholar 

  119. Ozawa S, Haynie DG, Bessias S, Laing SK, Ngamasana EL, Yemeke TT, Evans DR (2019) Modeling the economic impact of substandard and falsified antimalarials in the Democratic Republic of the Congo. Am J Trop Med Hyg 100(5):1149–1157

    Article  Google Scholar 

  120. Weaver AA, Reiser H, Barstis T, Benvenuti M, Ghosh D, Hunckler M, Joy B, Koenig L, Raddell K, Lieberman M (2013) Paper analytical devices for fast field screening of beta lactam antibiotics and antituberculosis pharmaceuticals. Anal Chem 85(13):6453–6460

    Article  Google Scholar 

  121. Weaver AA, Lieberman M (2015) Paper test cards for presumptive testing of very low quality antimalarial medications. The American Society of Tropical Medicine and Hygiene 92(6_Suppl):17–23

    Google Scholar 

  122. Marini RD, Rozet E, Montes MLA, Rohrbasser C, Roht S, Rhème D, Bonnabry P, Schappler J, Veuthey JL, Hubert P, Rudaz S (2010) Reliable low-cost capillary electrophoresis device for drug quality control and counterfeit medicines. J Pharm Biomed Anal 53(5):1278–1287

    Article  Google Scholar 

  123. Bansal D, Malla S, Gudala K, Tiwari P (2013) Anti-counterfeit technologies: a pharmaceutical industry perspective. Sci Pharm 81(1):1–14

    Article  Google Scholar 

  124. Lybecker KM (2008) Keeping it real: anticounterfeiting strategies in the pharmaceutical industry. Manag Decis Econ 29(5):389–405

    Article  Google Scholar 

  125. Mackey TK, Nayyar GML (2017) A review of existing and emerging digital technologies to combat the global trade in fake medicines. Expert Opin Drug Saf 16:587–602

    Article  Google Scholar 

  126. Taylor D (2014) RFID in the pharmaceutical industry: addressing counterfeits with technology. J Med Syst 38:1–5

    Article  Google Scholar 

  127. Chen C, Zhang F, Barras J, Althoefer K, Bhunia S, Mandal S (2016) Authentication of medicines using nuclear quadrupole resonance spectroscopy. IEEE/ACM Trans Comput Biol Bioinf 13(3):417–430

    Article  Google Scholar 

  128. Kwok SK, Ting SL, Tsang AHC, Cheung CF (2010) A counterfeit network analyzer based on RFID and EPC. Ind Manag Data Syst 110(7):1018–1037

    Article  Google Scholar 

  129. Cozzella L, Simonetti C, Schirripa Spagnolo G (2012) Drug packaging security by means of white-light speckle. Opt Lasers Eng 50(10):1359–1371

    Article  Google Scholar 

  130. Raj R, Rai N, Agarwal S (2019) Anticounterfeiting in pharmaceutical supply chain by establishing proof of ownership. in TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON). IEEE. pp 1572–1577

    Google Scholar 

  131. Kumar A, Choudhary D, Raju MS, Chaudhary DK, Sagar RK (2019) Combating counterfeit drugs: a quantitative analysis on cracking down the fake drug industry by using blockchain technology. in 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE. pp 174–178

    Google Scholar 

  132. Meyliana, Surjandy, Fernando E, Cassandra C, Marjuki (2021) Propose Model Blockchain Technology Based Good Manufacturing Practice Model of Pharmacy Industry in Indonesia. in 2021 2nd International Conference on Innovative and Creative Information Technology (ICITech). pp 190–194

    Google Scholar 

  133. Alzahrani N, Bulusu N (2020) A new product anti-counterfeiting blockchain using a truly decentralized dynamic consensus protocol. Concurrency and Computation: Practice Exp 32(12):e5232

    Google Scholar 

  134. Raja J, Khaled S, Nelson K (2019) Improving opportunities in healthcare supply chain processes via the internet of things and blockchain technology. International Journal of Healthcare Information Systems and Informatics (IJHISI) 14(2):49–65

    Article  Google Scholar 

  135. Singh R, Dwivedi AD, Srivastava G (2020) Internet of Things based blockchain for temperature monitoring and counterfeit pharmaceutical prevention. Sensors 20(14):3951

    Article  Google Scholar 

  136. Sylim PG, Liu F, Marcelo AB, Fontelo PA (2018) Blockchain technology for detecting falsified and substandard drugs in distribution: pharmaceutical supply chain intervention. JMIR Research Protocols, 7(9): e10163

    Google Scholar 

  137. Longo F, Nicoletti L, Padovano A, d’Atri G, Forte M (2019) Blockchain-enabled supply chain: an experimental study. Comput Ind Eng 136:57–69

    Article  Google Scholar 

  138. Jamil F, Hang L, Kim K, Kim D (2019) A novel medical blockchain model for drug supply chain integrity management in a smart hospital. Electronics (Switzerland) 8(5)

    Google Scholar 

  139. Kumar R, Tripathi R (2019) Traceability of counterfeit medicine supply chain through Blockchain. in 11th International Conference on Communication Systems and Networks, COMSNETS 2019. Institute of Electrical and Electronics Engineers Inc. pp 568–570

    Google Scholar 

  140. Tseng J-H, Liao Y-C, Chong B, Liao S-W (2018) Governance on the drug supply chain via Gcoin blockchain. Int J Environ Res Public Health 15(6):1055

    Article  Google Scholar 

  141. Shahbazi Z, Byun Y-C (2020) A procedure for tracing supply chains for perishable food based on blockchain, machine learning and fuzzy logic. Electronics 10(1):41

    Article  Google Scholar 

  142. Tsang YP, Choy KL, Wu CH, Ho GTS, Lam HY (2019) Blockchain-Driven IoT for Food Traceability with an Integrated Consensus Mechanism. IEEE Access 7:129000–129017

    Article  Google Scholar 

  143. Soon JM, Manning L (2019) Developing anti-counterfeiting measures: the role of smart packaging. Food Res Int 123:135–143

    Article  Google Scholar 

  144. Fang Z, Zhao Y, Warner RD, Johnson SK (2017) Active and intelligent packaging in meat industry. Trends Food Sci Technol 61:60–71

    Article  Google Scholar 

  145. Sohail M, Sun D-W, Zhu Z (2018) Recent developments in intelligent packaging for enhancing food quality and safety. Crit Rev Food Sci Nutr 58(15):2650–2662

    Article  Google Scholar 

Download references

Acknowledgements

This material is based upon work supported by the U.S. Department of Homeland Security under Grant Award Number 17STQAC00001-05–00.

Disclaimer

The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security. The authors thank Fred S. Roberts for his helpful input in revising this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weihong Guo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saleh, S., Lei, R., Guo, W., Elsayed, E.A. (2023). A Survey on Counterfeits in the Information and Communications Technology (ICT) Supply Chain. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Proceedings of Seventh International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems, vol 447. Springer, Singapore. https://doi.org/10.1007/978-981-19-1607-6_75

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-1607-6_75

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-1606-9

  • Online ISBN: 978-981-19-1607-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics