Abstract
One of the major threats to the information and communications technology (ICT) supply chain is the introduction of counterfeit parts and components. Global efforts have been intensified to defend against counterfeiters and counterfeit products due to their detrimental impact on the economy, safety, and security. Among the extensive literature of papers, reviews, books, and articles, this review attempts to include a detailed selection of most significant research work done in the intersection of ICT, supply chains, and counterfeits to provide a reference source for researchers. Citation network and global citation scores have been used to extract and analyze papers and discuss them in different types of clusters (electronic, medical, food, and anti-counterfeiting technologies and approaches). Our review approaches the clustered papers by focusing on (1) their contribution in documenting and modeling the intrusion of counterfeit electronic parts in the ICT supply chain, (2) the proposed counterfeits’ detection and avoidance techniques in the ICT supply chain, and (3) the contribution of ICT in thwarting counterfeits in medical, pharmaceutical, and food supply chains. This review provides a better understanding of the global efforts to address counterfeits in the ICT supply chain, as well as the role of ICT in thwarting counterfeits in other supply chains, which can guide future research to minimize the impact of counterfeits on supply chains.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
CISA Working Group 2 (2021) Information and Communications Technology Supply Chain Risk Management Task Force Threat Evaluation Working Group: Threat Scenarios Version 2.0: https://www.cisa.gov/sites/default/files/publications/ict-scrm-task-force-threat-scenarios-report-v2.pdf
SAE International (2019) SAE AS5553 Counterfeit Electrical, Electronic, and Electromechanical (EEE) Parts; Avoidance, Detection, Mitigation, and Disposition Standards
Frontier Economics Ltd (2017) The Economic Costs of Counterfeiting and Piracy
OECD, European Union Intellectual Property Office (2019) Trends in trade in counterfeit and pirated goods. Illicit Trade, OECD Publishing, Paris
Falagas ME, Pitsouni EI, Malietzis GA, Pappas G (2008) Comparison of PubMed, Scopus, Web of Science, and Google Scholar: strengths and weaknesses. FASEB J 22(2):338–342
Van Eck NJ, Waltman L (2010) VOSviewer: visualizing scientific landscapes [software]. https://www.vosviewer.com
Pecht M, Tiku S (2006) Bogus: electronic manufacturing and consumers confront a rising tide of counterfeit electronics. IEEE Spectr 43(5):37–46
Stradley J, Karraker D (2006) The electronic part supply chain and risks of counterfeit parts in defense applications. IEEE Trans Compon Packag Technol 29(3):703–705
Office of the Assistant Secretary of the Navy (2017) Counterfeit Material Process Guidebook: Guidelines for Mitigating the Risk of Counterfeit Materiel in the Supply Chain. NAVSO P-7000
Wix SD (2017) Suspect/Counterfeit Electronics Overview. Sandia National Lab.(SNL-NM), Albuquerque, NM (United States)
Szakal A, Pearsall K (2014) Open industry standards for mitigating risks to global supply chains. IBM J Res Dev 58(1):1–13
Bodner DA (2014) Enterprise modeling framework for counterfeit parts in defense systems. Procedia Computer Science 36:425–431
Stevenson M, Busby J (2015) An exploratory analysis of counterfeiting strategies. Int J Oper Prod Manag 35(1):110–144
Collier ZA, Linkov I, Keisler JM, Walters S, DiMase D (2014) A semi-quantitative risk assessment standard for counterfeit electronics detection. SAE Int J Aerosp 7(1):171–181
Lambert JH, Keisler JM, Wheeler WE, Collier ZA, Linkov I (2013) Multiscale approach to the security of hardware supply chains for energy systems. Environ Syst Decisions 33(3):326–334
Rostami M, Koushanfar F, Rajendran J, Karri R (2013) Hardware security: threat models and metrics. in 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE. pp 819–823
Chatterjee K, Das D (2007) Semiconductor manufacturers’ efforts to improve trust in the electronic part supply chain. IEEE Trans Compon Packag Technol 30(3):547–549
Guin U, Huang K, Dimase D, Carulli JM, Tehranipoor M, Makris Y (2014) Counterfeit integrated circuits: a rising threat in the global semiconductor supply chain. Proc IEEE 102(8):1207–1228
Guin U, Dimase D, Tehranipoor M (2014) Counterfeit integrated circuits: detection, avoidance, and the challenges ahead. J Electron Test 30(1):9–23
Tehranipoor M, Guin U, Forte D (2015) Counterfeit integrated circuits: detection and avoidance
Guin U, Dimase D, Tehranipoor M (2014) A comprehensive framework for counterfeit defect coverage analysis and detection assessment. J Electron Test 30(1):25–40
Alam M, Chowdhury S, Tehranipoor MM, Guin U (2018) Robust, low-cost, and accurate detection of recycled ICs using digital signatures. in 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). pp 209–214
Dogan H, Forte D, Tehranipoor MM (2014) Aging analysis for recycled FPGA detection. in 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT). pp 171–176
Guo Z, Xu X, Rahman MT, Tehranipoor MM, Forte D (2018) SCARe: an SRAM-based countermeasure against IC recycling. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 26(4): 744–755
Ghosh P, Chakraborty RS (2017) Counterfeit IC detection by image texture analysis. in 2017 Euromicro Conference on Digital System Design (DSD). pp 283–286
Frazier PD, Gilmore ET, Collins IJ, Samotshozo WE, Chouikha MF (2018) A novel counterfeit detection approach for integrated circuit supply chain assurance. Journal of Hardware and Systems Security 2(3):240–250
Huang K, Carulli JM, Makris Y (2013) Counterfeit electronics: a rising threat in the semiconductor manufacturing industry. in 2013 IEEE International Test Conference (ITC). pp 1–4
Kumari P, Talukder BMSB, Sakib S, Ray B, Rahman MT (2018) Independent detection of recycled flash memory: challenges and solutions. in 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). pp 89–95
Sakib S, Kumari P, Talukder B, Rahman M, Ray B (2018) Non-invasive detection method for recycled flash memory using timing characteristics. Cryptography 2(3):17
Ahmadi B, Javidi B, Shahbazmohamadi S (2018) Automated detection of counterfeit ICs using machine learning. Microelectron Reliab 88–90:371–377
Zheng Y, Wang X, Bhunia S (2015) SACCI: scan-based characterization through clock phase sweep for counterfeit chip detection. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 23(5): 831–841
Zheng Y, Basak A, Bhunia S (2014) CACI: dynamic current analysis towards robust recycled chip identification. in Proceedings of the 51st Annual Design Automation Conference. San Francisco, CA, USA: Association for Computing Machinery. pp 1–6
Zheng Y, Yang S, Bhunia S (2016) SeMIA: self-similarity-based IC integrity analysis. IEEE Trans Comput Aided Des Integr Circuits Syst 35(1):37–48
Contreras GK, Rahman MT, Tehranipoor M (2013) Secure Split-Test for preventing IC piracy by untrusted foundry and assembly. in 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS). pp 196–203
Ben Dodo S, Bishnoi R, Mohanachandran Nair S, Tahoori MB (2019) A spintronics memory PUF for resilience against cloning counterfeit. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 27(11): 2511–2522
Chakraborty A, Jayasankaran NG, Liu Y, Rajendran J, Sinanoglu O, Srivastava A, Xie Y, Yasin M, Zuzak M (2020) Keynote: a disquisition on logic locking. IEEE Trans Comput Aided Des Integr Circuits Syst 39(10):1952–1972
Basak A, Zheng Y, Bhunia S (2014) Active defense against counterfeiting attacks through robust antifuse-based on-chip locks. in 2014 IEEE 32nd VLSI Test Symposium (VTS). pp 1–6
Livingston H (2007) Avoiding counterfeit electronic components. IEEE Trans Compon Packag Technol 30(1):187–189
Islam MN, Patii VC, Kundu S (2018) On IC traceability via blockchain. in 2018 International Symposium on VLSI Design, Automation and Test (VLSI-DAT). IEEE
Skudlarek JP, Katsioulas T, Chen M (2016) A platform solution for secure supply-chain and chip life-cycle management. Computer 49(8):28–34
Islam MN, Kundu S (2019) Enabling IC traceability via blockchain pegged to embedded PUF. ACM Transactions on Design Automation of Electronic Systems 24(3):1–23
Guin U, Cui P, Skjellum A (2018) Ensuring proof-of-authenticity of IoT edge devices using blockchain technology. in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. pp 1042–1049
Cui P, Dixon J, Guin U, Dimase D (2019) A blockchain-based framework for supply chain provenance. IEEE Access 7:157113–157125
Negka L, Gketsios G, Anagnostopoulos NA, Spathoulas G, Kakarountas A, Katzenbeisser S (2019) Employing blockchain and physical unclonable functions for counterfeit IoT devices detection. in Proceedings of the International Conference on Omni-Layer Intelligent Systems. Crete, Greece: Association for Computing Machinery. pp 172–178
Livingston H (2010) Securing the DOD supply chain from the risks of counterfeit electronic components. BAE Systems
Yang K, Forte D, Tehranipoor M (2018) ReSC. ACM Transactions on Design Automation of Electronic Systems, 23(3): 1–27
Yang K, Forte D, Tehranipoor M (2015) An RFID-based technology for electronic component and system counterfeit detection and traceability. in 2015 IEEE International Symposium on Technologies for Homeland Security (HST). IEEE. pp 1–6
Anandhi S, Anitha R, Sureshkumar V (2019) IoT enabled RFID authentication and secure object tracking system for smart logistics. Wireless Pers Commun 104(2):543–560
Yang K, Forte D, Tehranipoor MM (2017) CDTA: a comprehensive solution for counterfeit detection, traceability, and authentication in the IoT supply chain. ACM Transactions on Design Automation of Electronic Systems (TODAES), 22(3): Article 42
Dimase D, Collier ZA, Carlson J, Gray RB, Linkov I (2016) Traceability and risk analysis strategies for addressing counterfeit electronics in supply chains for complex systems. Risk Anal 36(10):1834–1843
Li L (2013) Technology designed to combat fakes in the global supply chain. Bus Horiz 56(2):167–177
Metz C (2012) Defense Logistics Agency, America’s Combat Logistics Support Agency Counterfeit Items Detection and Prevention, DLA J-334
Gansler JS, Lucyshyn W, Rigilano J (2014) Addressing counterfeit parts in the DOD supply chain, Center for Public Policy and Private Enterprise, School of Public Policy, University of Maryland, UMD-LM-14–012
Rogers RSM, O’Donnell J (2017) Supply chain security: DFARS – Detection & Avoidance of Counterfeit Electronic Parts, https://smtnet.com/library/files/upload/supply-chain-security.pdf
Aerospace Industries Association (2011) Counterfeit Parts: Increasing Awareness and Developing Countermeasures, https://www.aia-aerospace.org/report/counterfeit-parts-increasing-awareness-and-developing-countermeasures/
Lockheed Martin Counterfeit Prevention: What Makes a Good Control Plan?, https://slidetodoc.com/counterfeit-prevention-what-makes-a-good-control-plan/
DARPA A DARPA Approach to Trusted Microelectronics, https://www.darpa.mil/attachments/Obscurationandmarking_Summary.pdf
Lingle R (2014) In-mold labels use digital watermarking for authentication, https://www.packagingdigest.com/trends-issues/mold-labels-use-digital-watermarking-authentication. Packaging Digest
Digital Watermarking Alliance Authentication of content and objects (includes government IDs), https://digitalwatermarkingalliance.org/digital-watermarking-applications/authentication-of-content-and-objects/
Chan HK, Griffin J, Lim JJ, Zeng F, Chiu ASF (2018) The impact of 3D Printing Technology on the supply chain: Manufacturing and legal perspectives. Int J Prod Econ 205:156–162
CDC Tamper-resistant prescription form requirements, https://www.cdc.gov/phlp/docs/menu-prescriptionform.pdf
Staake T, Michahelles F, Fleisch E, Williams JR, Min H, Cole PH, Lee S-G, McFarlane D, Murai J (2008) Anti-counterfeiting and supply chain security. Springer, Berlin Heidelberg, pp 33–43
Chen C-l, Chen Y-Y, Huang Y-C, Liu C-S, Lin C-I, Shih T-F (2008) Anti-counterfeit ownership transfer protocol for low cost RFID system. WSEAS Transactions on Computers archive 7:1149–1158
Azuara G, Luis Tornos J, Luis Salazar J (2012) Improving RFID traceability systems with verifiable quality. Ind Manag Data Syst 112(3):340–359
Kwok SK, Ting JSL, Tsang AHC, Lee WB, Cheung BCF (2010) Design and development of a mobile EPC-RFID-based self-validation system (MESS) for product authentication. Comput Ind 61(7):624–635
Choi SH, Yang B, Cheung HH, Yang YX (2015) RFID tag data processing in manufacturing for track-and-trace anti-counterfeiting. Comput Ind 68:148–161
Wyld D, Jones M (2007) RFID is no fake: the adoption of radio frequency identification technology in the pharmaceutical supply chain. International Journal of Integrated Supply Management - Int J Integrated Supply Manag, 3
Agrawal TK, Koehl L, Campagne C (2018) A secured tag for implementation of traceability in textile and clothing supply chain. Int J Adv Manuf Tech 99(9):2563–2577
Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24(2):381–394
Rieback MR, Crispo B, Tanenbaum AS (2006) The evolution of RFID security. IEEE Pervasive Comput 5(1):62–69
Garfinkel SL, Juels A, Pappu R (2005) RFID privacy: an overview of problems and proposed solutions. IEEE Secur Priv 3(3):34–43
Lee YK, Batina L, Singelee D, Preneel B, Verbauwhede I (2010) Anti-counterfeiting, untraceability and other security challenges for RFID systems: public-key-based protocols and hardware. Springer, Berlin Heidelberg, pp 237–257
Santos BLD, Smith LS (2008) RFID in the supply chain: panacea or Pandora’s box? Commun ACM 51(10):127–131
Cai S, Li T, Ma C, Li Y, Deng RH (2009) Enabling secure secret updating for unidirectional key distribution in RFID-enabled supply chains. Springer, Berlin Heidelberg, pp 150–164
Kumar S, Dieveney E, Dieveney A (2009) Reverse logistic process control measures for the pharmaceutical industry supply chain. Int J Product Perform Manag 58(2):188–204
Juels A (2005) Strengthening EPC tags against cloning. in WiSe - 2005 ACM Workshop on Wireless Security. Cologne: Association for Computing Machinery (ACM). pp 67–75
Miles SB, Sarma S, Williams JR (2008) RFID technology and applications. RFID Technology and Applications. Vol. 9780521880930. Cambridge University Press. 1–218
Singh MKM, Li X (2010) Trust in RFID-enabled supply-chain management. Int. J. Secur. Networks 5:96–105
Ting SL, Tsang AHC (2014) Using social network analysis to combat counterfeiting. Int J Prod Res 52(15):4456–4468
Trenfield SJ, Xian Tan H, Awad A, Buanz A, Gaisford S, Basit AW, Goyanes A (2019) Track-and-trace: Novel anti-counterfeit measures for 3D printed personalized drug products using smart material inks. Int J Pharmaceutics 567:118443
Cole R, Stevenson M, Aitken J (2019) Blockchain technology: implications for operations and supply chain management. Supply Chain Management: An Int J 24(4):469–483
Pun H, Swaminathan JM, Hou P (2021) Blockchain adoption for combating deceptive counterfeits. Prod Oper Manag 30(4):864–882
Liu Z, Li Z (2020) A blockchain-based framework of cross-border e-commerce supply chain. International J Information Manag 52:102059
Kennedy ZC, Stephenson DE, Christ JF, Pope TR, Arey BW, Barrett CA, Warner MG (2017) Enhanced anti-counterfeiting measures for additive manufacturing: coupling lanthanide nanomaterial chemical signatures with blockchain technology. J Materials Chemistry C 5(37):9570–9578
Smith AF, Skrabalak SE (2017) Metal nanomaterials for optical anti-counterfeit labels. Journal of Materials Chemistry C 5(13):3207–3215
Toyoda K, Mathiopoulos PT, Sasase I, Ohtsuki T (2017) A novel blockchain-based product ownership management system (POMS) for anti-counterfeits in the post supply chain. IEEE Access 5:17465–17477
Hepp T, Wortner P, Schönhals A, Gipp B (2018) Securing physical assets on the blockchain: linking a novel object identification concept with distributed ledgers. in Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems. Munich, Germany: Association for Computing Machinery. pp 60–65
Boos D, Guenter H, Grote G, Kinder K (2013) Controllable accountabilities: The Internet of Things and its challenges for organisations. Behaviour and Info Tech 32(5):449–467
Acri KML, Lybecker n (2018) Pharmaceutical counterfeiting: contributing factors. Fraser Institute. pp 6–23
Blackstone EA, Fuhr JPJ, Pociask S (2014) The health and economic effects of counterfeit drugs. American health & drug benefits 7(4):216–224
Hall A, Koenraadt R, Antonopoulos GA (2017) Illicit pharmaceutical networks in Europe: organising the illicit medicine market in the United Kingdom and the Netherlands. Trends in Organized Crime 20(3–4):296–315
Tremblay M (2013) Medicines counterfeiting is a complex problem: a review of key challenges across the supply chain. Curr Drug Saf 8(1):43–55
Khan MH, Akazawa M, Dararath E, Kiet HB, Sovannarith T, Nivanna N, Yoshida N, Kimura K (2011) Perceptions and practices of pharmaceutical wholesalers surrounding counterfeit medicines in a developing country: a baseline survey. BMC Health Serv Res 11(1):306
Rosen LS, Jacobs IA, Burkes RL (2017) Bevacizumab in Colorectal Cancer: Current Role in Treatment and the Potential of Biosimilars. Target Oncol 12(5):599–610
Mackey TK, Liang BA, York P, Kubic T (2015) Counterfeit drug penetration into global legitimate medicine supply chains: a global assessment. Am J Tropical Medicine and Hygiene 92(6_Suppl):59–67
Gautam CS, Utreja A, Singal GL (2009) Spurious and counterfeit drugs: a growing industry in the developing world. Postgrad Med J 85(1003):251–256
Stewart MW, Narayanan R, Gupta V, Rosenfeld PJ, Martin DF, Chakravarthy U (2016) Counterfeit Avastin in India: punish the criminals, not the patients. Am J Ophthalmol 170:228–231
Ozawa S, Evans DR, Bessias S, Haynie DG, Yemeke TT, Laing SK, Herrington JE (2018) Prevalence and estimated economic burden of substandard and falsified medicines in low-and middle-income countries: a systematic review and meta-analysis. JAMA Netw Open 1(4):e181662–e181662
Medina E, Bel E, Suñé JM (2016) Counterfeit medicines in Peru: a retrospective review (1997–2014). BMJ Open 6(4):e010387
Venhuis BJ, Oostlander AE, Giorgio DD, Mosimann R, du Plessis I (2018) Oncology drugs in the crosshairs of pharmaceutical crime. Lancet Oncol 19(4):e209–e217
Jackson G, Patel S, Khan S (2012) Assessing the problem of counterfeit medications in the United Kingdom. Int J Clin Pract 66(3):241–250
Chambliss WG, Carroll WA, Kennedy D, Levine D, Moné MA, Douglas Ried L, Shepherd M, Yelvigi M (2012) Role of the pharmacist in preventing distribution of counterfeit medications. J Am Pharm Assoc 52(2):195–199
Ziance RJ (2008) Roles for pharmacy in combatting counterfeit drugs. J Am Pharm Assoc 48(4):e71–e91
Nayyar GML, Breman JG, Mackey TK, Clark JP, Hajjou M, Littrell M, Herrington JE (2019) Falsified and substandard drugs: stopping the pandemic. Am J Trop Med Hyg 100(5):1058–1065
Chaudhry PE, Stumpf SA (2013) The challenge of curbing counterfeit prescription drug growth: Preventing the perfect storm. Bus Horiz 56(2):189–197
Ranieri N, Tabernero P, Green MD, Verbois L, Herrington J, Sampson E, Satzger RD, Phonlavong C, Thao K, Newton PN (2014) Evaluation of a new handheld instrument for the detection of counterfeit artesunate by visual fluorescence comparison. Am J Trop Med Hyg 91(5):920
Mackey T, Liang B (2011) The global counterfeit drug trade: patient safety and public health risks. J Pharm Sci 100:4571–4579
Mackey TK, Liang BA (2013) Improving global health governance to combat counterfeit medicines: a proposal for a UNODC-WHO-Interpol trilateral mechanism. BMC Med 11(1):233
Davison M (2011) Pharmaceutical anti-counterfeiting: combating the real danger from fake drugs. John Wiley & Sons
Hamilton WL, Doyle C, Halliwell-Ewen M, Lambert G (2016) Public health interventions to protect against falsified medicines: a systematic review of international, national and local policies. Health Policy Plan 31(10):1448–1466
Fadlallah R, El-Jardali F, Annan F, Azzam H, Akl EA (2016) Strategies and systems-level interventions to combat or prevent drug counterfeiting: a systematic review of evidence beyond effectiveness. Pharmaceutical Medicine 30:263–276
Cohn JE, von Schoen-Angerer T, Jambert E, Arreghini G, Childs ML (2013) When falsified medicines enter the supply chain: description of an incident in Kenya and lessons learned for rapid response. J Public Health Policy 34:22–30
Cuomo RE, Mackey TK (2014) An exploration of counterfeit medicine surveillance strategies guided by geospatial analysis: lessons learned from counterfeit Avastin detection in the US drug supply chain. BMJ Open 4(12):e006657
Mackey TK, Cuomo R, Guerra C, Liang BA (2015) After counterfeit Avastin®—what have we learned and what can be done? Nat Rev Clin Oncol 12(5):302–308
Kamba PF, Ireeta ME, Balikuna S, Kaggwa B (2017) Threats posed by stockpiles of expired pharmaceuticals in low- and middle-income countries: a Ugandan perspective. Bull World Health Organ 95:594–598
Reynolds L, McKee M (2010) Organised crime and the efforts to combat it: a concern for public health. Glob Health 6(1):21
Ozawa S, Haynie DG, Bessias S, Laing SK, Ngamasana EL, Yemeke TT, Evans DR (2019) Modeling the economic impact of substandard and falsified antimalarials in the Democratic Republic of the Congo. Am J Trop Med Hyg 100(5):1149–1157
Weaver AA, Reiser H, Barstis T, Benvenuti M, Ghosh D, Hunckler M, Joy B, Koenig L, Raddell K, Lieberman M (2013) Paper analytical devices for fast field screening of beta lactam antibiotics and antituberculosis pharmaceuticals. Anal Chem 85(13):6453–6460
Weaver AA, Lieberman M (2015) Paper test cards for presumptive testing of very low quality antimalarial medications. The American Society of Tropical Medicine and Hygiene 92(6_Suppl):17–23
Marini RD, Rozet E, Montes MLA, Rohrbasser C, Roht S, Rhème D, Bonnabry P, Schappler J, Veuthey JL, Hubert P, Rudaz S (2010) Reliable low-cost capillary electrophoresis device for drug quality control and counterfeit medicines. J Pharm Biomed Anal 53(5):1278–1287
Bansal D, Malla S, Gudala K, Tiwari P (2013) Anti-counterfeit technologies: a pharmaceutical industry perspective. Sci Pharm 81(1):1–14
Lybecker KM (2008) Keeping it real: anticounterfeiting strategies in the pharmaceutical industry. Manag Decis Econ 29(5):389–405
Mackey TK, Nayyar GML (2017) A review of existing and emerging digital technologies to combat the global trade in fake medicines. Expert Opin Drug Saf 16:587–602
Taylor D (2014) RFID in the pharmaceutical industry: addressing counterfeits with technology. J Med Syst 38:1–5
Chen C, Zhang F, Barras J, Althoefer K, Bhunia S, Mandal S (2016) Authentication of medicines using nuclear quadrupole resonance spectroscopy. IEEE/ACM Trans Comput Biol Bioinf 13(3):417–430
Kwok SK, Ting SL, Tsang AHC, Cheung CF (2010) A counterfeit network analyzer based on RFID and EPC. Ind Manag Data Syst 110(7):1018–1037
Cozzella L, Simonetti C, Schirripa Spagnolo G (2012) Drug packaging security by means of white-light speckle. Opt Lasers Eng 50(10):1359–1371
Raj R, Rai N, Agarwal S (2019) Anticounterfeiting in pharmaceutical supply chain by establishing proof of ownership. in TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON). IEEE. pp 1572–1577
Kumar A, Choudhary D, Raju MS, Chaudhary DK, Sagar RK (2019) Combating counterfeit drugs: a quantitative analysis on cracking down the fake drug industry by using blockchain technology. in 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE. pp 174–178
Meyliana, Surjandy, Fernando E, Cassandra C, Marjuki (2021) Propose Model Blockchain Technology Based Good Manufacturing Practice Model of Pharmacy Industry in Indonesia. in 2021 2nd International Conference on Innovative and Creative Information Technology (ICITech). pp 190–194
Alzahrani N, Bulusu N (2020) A new product anti-counterfeiting blockchain using a truly decentralized dynamic consensus protocol. Concurrency and Computation: Practice Exp 32(12):e5232
Raja J, Khaled S, Nelson K (2019) Improving opportunities in healthcare supply chain processes via the internet of things and blockchain technology. International Journal of Healthcare Information Systems and Informatics (IJHISI) 14(2):49–65
Singh R, Dwivedi AD, Srivastava G (2020) Internet of Things based blockchain for temperature monitoring and counterfeit pharmaceutical prevention. Sensors 20(14):3951
Sylim PG, Liu F, Marcelo AB, Fontelo PA (2018) Blockchain technology for detecting falsified and substandard drugs in distribution: pharmaceutical supply chain intervention. JMIR Research Protocols, 7(9): e10163
Longo F, Nicoletti L, Padovano A, d’Atri G, Forte M (2019) Blockchain-enabled supply chain: an experimental study. Comput Ind Eng 136:57–69
Jamil F, Hang L, Kim K, Kim D (2019) A novel medical blockchain model for drug supply chain integrity management in a smart hospital. Electronics (Switzerland) 8(5)
Kumar R, Tripathi R (2019) Traceability of counterfeit medicine supply chain through Blockchain. in 11th International Conference on Communication Systems and Networks, COMSNETS 2019. Institute of Electrical and Electronics Engineers Inc. pp 568–570
Tseng J-H, Liao Y-C, Chong B, Liao S-W (2018) Governance on the drug supply chain via Gcoin blockchain. Int J Environ Res Public Health 15(6):1055
Shahbazi Z, Byun Y-C (2020) A procedure for tracing supply chains for perishable food based on blockchain, machine learning and fuzzy logic. Electronics 10(1):41
Tsang YP, Choy KL, Wu CH, Ho GTS, Lam HY (2019) Blockchain-Driven IoT for Food Traceability with an Integrated Consensus Mechanism. IEEE Access 7:129000–129017
Soon JM, Manning L (2019) Developing anti-counterfeiting measures: the role of smart packaging. Food Res Int 123:135–143
Fang Z, Zhao Y, Warner RD, Johnson SK (2017) Active and intelligent packaging in meat industry. Trends Food Sci Technol 61:60–71
Sohail M, Sun D-W, Zhu Z (2018) Recent developments in intelligent packaging for enhancing food quality and safety. Crit Rev Food Sci Nutr 58(15):2650–2662
Acknowledgements
This material is based upon work supported by the U.S. Department of Homeland Security under Grant Award Number 17STQAC00001-05–00.
Disclaimer
The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security. The authors thank Fred S. Roberts for his helpful input in revising this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saleh, S., Lei, R., Guo, W., Elsayed, E.A. (2023). A Survey on Counterfeits in the Information and Communications Technology (ICT) Supply Chain. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Proceedings of Seventh International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems, vol 447. Springer, Singapore. https://doi.org/10.1007/978-981-19-1607-6_75
Download citation
DOI: https://doi.org/10.1007/978-981-19-1607-6_75
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1606-9
Online ISBN: 978-981-19-1607-6
eBook Packages: EngineeringEngineering (R0)