Blockchain Based Counterfeit Medicine Authentication System

被引:7
作者
Alam, Nazmul [1 ]
Tanvir, Md Rabiul Hasan [1 ]
Shanto, Sadah Anjum [1 ]
Israt, Fateha [1 ]
Rahman, Aysha [1 ]
Momotaj, Sabrina [1 ]
机构
[1] Bangladesh Univ Business & Technol, Dept CSE, Mirpur 2, Dhaka, Bangladesh
来源
11TH IEEE SYMPOSIUM ON COMPUTER APPLICATIONS & INDUSTRIAL ELECTRONICS (ISCAIE 2021) | 2021年
关键词
blockchain; security; smartphone; traceability; counterfeit;
D O I
10.1109/ISCAIE51753.2021.9431789
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
For a few decades, it is a very big challenge to monitor and keep track of genuine medicine in health care. Lacking a trust system and strong monitoring authority, syndicates can make counterfeit medicine easily. With the shifting of life-critical healthcare, it becomes an emergency to ensure substandard drugs. Because counterfeit medicine has a deadly effect on the human body and has disastrous results. To detect the falsified medicine, we proposed a drug tracing system using blockchain technology. Our system is able to detect substandard and anomaly drugs from manufacturer company to patient's hand. Also can verify the defective and expired drugs in the market using smartphones by scanning QR (Quick Response) code. Blockchain security could make the system more transparent and reliable. This paper aims to ensure drug quality, transaction security, and data safety using blockchain technology.
引用
收藏
页码:214 / 217
页数:4
相关论文
共 18 条
[1]  
Bocek Thomas, 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), P772, DOI 10.23919/INM.2017.7987376
[2]   Implementation issues in RFID-based anti-counterfeiting systems [J].
Cheung, H. H. ;
Choi, S. H. .
COMPUTERS IN INDUSTRY, 2011, 62 (07) :708-718
[3]  
Kurki J., 2016, THESIS AALTO U
[4]   On the integration of event-based and transaction-based architectures for supply chains [J].
Li, Zhijie ;
Wu, Haoyan ;
King, Brian ;
Ben Miled, Zina ;
Wassick, John ;
Tazelaar, Jeffrey .
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2017, :376-382
[5]  
Mettler M, 2016, 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), P520
[6]   BDoS: Blockchain Denial-of-Service [J].
Mirkin, Michael ;
Ji, Yan ;
Pang, Jonathan ;
Klages-Mundt, Ariah ;
Eyal, Ittay ;
Juels, Ari .
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, :601-619
[7]   Blockchain [J].
Nofer, Michael ;
Gomber, Peter ;
Hinz, Oliver ;
Schiereck, Dirk .
BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2017, 59 (03) :183-187
[8]  
Pahlavan K, 2000, LECT NOTES COMPUT SC, V1818, P1
[9]  
Paik Michael, 2009, Proceedings of the 2009 International Conference on Information and Communication Technologies and Development (ICTD 2009), P458, DOI 10.1109/ICTD.2009.5426683
[10]  
Pilkington M, 2016, RESEARCH HANDBOOK ON DIGITAL TRANSFORMATIONS, P225