DEVELOPMENT OF A BLOCKCHAIN-BASED ANTI-COUNTERFEITING SYSTEM LEVERAGING PRODUCT INHERENT FEATURES AND LOCATION INFORMATION
DOI:
https://doi.org/10.4314/njt.v44i2.12Keywords:
Concensus algorithm, Counterfeiting, Distributed applications, QR code, Blockchain Technology, Inherent Product FeaturesAbstract
The proliferation of counterfeit items has hurt the economic growth, public health, and safety. This work aims to develop an innovative system that can counter and mitigate the threat posed by local and global counterfeiters whose activities have caused untold health and economic hardship to society. This paper proposes a novel blockchain-based anti-counterfeiting system that makes use of a product's unique characteristics and its geographical location. Prototype system modelling in this study was accomplished using object-oriented software analysis and design techniques, Rapid Unified Process (RUP) and, Rapid Application Development (RAD) methodologies for QR Code and Blockchain applications respectively. Ganache, a private Ethereum blockchain network, was set up to serve as the backend platform. Open-source software such as the Truffe suite and the Solidity compiler were utilised in setting up the Ganache network as well as in compiling and deploying smart contracts written in Solidity. Results proved that the system, when tested on 50 products, shows low energy consumption, high speed of execution at 38.4s on average, QR code scanning time of 9.5ms on average, very high data integrity, and 100% accuracy record when validating whether or not a product is a counterfeit. This work provides a solution for cost-effective and comprehensive anti-counterfeiting measures, featuring key elements such as traceability, immutability, and transparency. The developed system is unparalleled as it combines blockchain technology, unique product inherent features, location information (GPS coordinates), and Track and Trace technologies, to offer a reliable and secure solution to counterfeit trading. This work, therefore, represents a potentially innovative approach to curbing the proliferation of counterfeit products.
References
[1] Yiu, N. C. K. “Toward Blockchain-Enabled Supply Chain Anti-Counterfeiting and Traceability”, Future Internet, 13(4), 2021; 86. https://doi.org/10.3390/fi13040086
[2] OECD/EUIPO (2020), Trade in Counterfeit Pharmaceutical Products, Illicit Trade, OECD Publishing, Paris, https://doi.org/10.1787/a7c7 e054-en.
[3] Keith, W., and Jith, L. Z. “The Evolution of Counterfeit Luxury Consumption”, Research Handbook on Luxury Branding, pp. 265 – 281, 2020 ISBN: 978 1 78643 634 4. https://url-shortener.me/1SCB
[3] Tavares, I. D. “Counterfeiting Of Fake Drugs in Africa: Current Situation, Causes and Countermeasures”, Mondaq, 2020. https://w ww.mondaq.com/nigeria/trademark/988968/counterfeiting-of-fake-drugs-in-africa-current-sit uation-causes-and-countermeasures.
[4] Y. Dabbagh, R. Khoja, L. AlZahrani, G. AlShowaier and N. Nasser, "A Blockchain-Based Fake Product Identification System," 2022 5th Conference on Cloud and Internet of Things (CIoT), Marrakech, Morocco, 2022, pp. 48-52, https://doi.org/10.1109/CIoT53061.202 2.9766493.
[5] Templars ThoughtLab, “Securing Legitimacy: Anti-counterfeiting Strategies for Brand Owners in Nigeria”, 2024, accessed from www.templars-law.com on 27th May 2025.
[6] EIC and SMEs Executive Agency, “Challenges of counterfeiting in Nigeria”, 2024, accessed from https://intellectual-property-helpdesk.ec. europa.eu on 27th May 2025
[7] David N., and Ohanado U. “Leveraging Emerging Technologies for Operational Optimization and Business Model Innovation in African Enterprises”, Nigerian Journal of Technology, vol. 43, no. 4, pp. 829 – 838, Jan. 2025, doi: 10.4314/njt.v43i4.23.
[8] Okide C. P., Ahaneku M. A., Nwawelu U. N., Chijindu V. C., Ezeja, O. M., and Ekengwu B. O. “Deployment of Smart Contracts on Blockchain Technology in Early Mitigation of Distributed Denial of Service in Software Defined Networks”, Nigerian Journal of Technology, vol. 44, no. 1, pp. 105–113, Apr. 2025, doi: 10.4314/njt.v44i1.12.
[9] Ahmed, S. “Enhancing Data Security and Transparency: The Role of Blockchain in Decentralized System”, International Journal of Advanced Engineering, Management and Science, 11(1), 593258, 2025. https://doi.org/ 10.22161/ijaems.111.12
[10] Wood, G. “Ethereum: A Secure Decentralised Generalised Transaction Ledger (EIP-150)”, 2018. https://www.yellowpaper.io.
[11] Khan, U., An, Z. Y., and Imran, A. “A Blockchain Ethereum Technology-Enabled Digital Content: Development of Trading and Sharing Economy Data”, IEEE Access, 8, 217045-217056; 2020. https://doi.org/10.1109/ ACCESS.2020.3041317.
[12] Santiago, C., Ren, S., Lee, C., and Ryu, M. “Concordia: A Streamlined Consensus Protocol for Blockchain Networks”, IEEE Access, 9, 13173-13185; 2021. https://doi.org/10.1109/ ACCESS.2021.3051796.
[13] Zhu, P., Hu, J., Zhang, Y., and Li, X. “A Blockchain Based Solution for Medication Anti-Counterfeiting and Traceability”, IEEE Access, 8, 184256-184272; 2020 vol. 8, pp. 184256-184272, 2020, https://doi.org/10.1109/ ACCESS.2020.3029196
[14] Du, M., Chen, Q., and Ma, X. “MBFT: A New Consensus Algorithm for Consortium Blockchain”, IEEE Access, 8, 87665-87675; 2020. https://doi.org/10.1109/ACCESS.2020. 2993759.
[15] Dwivedi, V., Norta, A., Wulf, A., Leiding, B., Saxena S., and Udokwu, C. “A Formal Specification Smart-Contract Language for Legally Binding Decentralized Autonomous Organizations”, IEEE Access, vol. 9, pp. 76069-76082; 2021. https://doi.org/10.1109/ ACCESS.2021.3081926.
[16] Kannengiesser, N., Lins, S., Sander, C., Winter, K., Frey, H., and Sunyaev, A. “Challenges and Common Solutions in Smart Contract Development”, IEEE Transactions on Software Engineering, 2021 vol. 48, no. 11, pp. 4291-4318. https://doi.org/10.1109/TSE.2021.31168 08.
[17] Zichichi, M., Ferretti, S., and D’Angelo, G. “MOVO: a dApp for DLT-based Smart Mobility”, International Conference on Computer Communications and Networks (ICCCN), 1-6; 2021. https://doi.org/10.1109/ ICCCN52240.2021.9522257.
[18] Gao, J. “Guided, Automated Testing of Blockchain-Based Decentralized Applications” , IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedi-ngs (ICSE-Companion), 138-140; 2019. https:// doi.org/10.1109/ICSE-Companion.2019.00059
[19] Wei, W., Lin, J., Lin, Y., and Liao, H. M. “What Makes You Look Like You: Learning an Inherent Feature Representation for Person Re-Identification”, 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Pg 1-6; 2019 https://doi.org/10.1109/AVSS.2019.8909892.
[20] Wang, S., Li, D., Zhang, Y., and Chen, J. “Smart Contract-Based Product Traceability System in the Supply Chain Scenario”, IEEE Access, 7, 115122-115133; 2019. https://doi. org/10.1109/ACCESS.2019.2935873.
[21] Ma, J., Lin, S., Chen, X., Sun, H., Chen, Y., and Wang, H. “A Blockchain-Based Application System for Product Anti-Counterfeiting”, IEEE Access, 8, 77642-77652; 2020. https://doi.org/ 10.1109/ACCESS.2020.2972026.
[22] Srivatsa, D., Aakash, N., and Sahisnu, S. “A Product Authentication Scheme for Supply Chain system via Smart Contracts using Blockchain Technology and Facial Recogni-tion”, Journal of Physics: Conference Series, 1767. 012057. 2020. https://doi.org/10.1088/ 1742-6596/1767/1/012057
[23] Li, J., Li, D., Xiong, C., and Hoi, S. C. H. “BLIP: Bootstrapping language-image pre-training for unified vision-language understanding and generation”, Proceedings of the 39th International Conference on Machine Learning, 162, 12888–12900; 2021 https://doi. org/10.48550/arXiv.2201.12086
[24] Radford, A., Kim, J. W., Hallacy, C., Ramesh, A., Goh, G., Agarwal, S., and Sutskever, I. “Learning transferable visual models from natural language supervision”, Proceedings of the 38th International Conference on Machine Learning, 139, 8748–8763; 2022. https://doi.o rg/10.48550/arXiv.2103.00020.
[25] Benet, J. “IPFS - Content addressed, versioned, P2P file system”, arXiv preprint, arXiv:1407. 3561. 2014. https://arxiv.org/abs/ 1407.3561
[26] Singh, R., and Sharma, A. “InterPlanetary File System (IPFS): A decentralized storage network”, Materials Today: Proceedings, 47, 2267–2271; 2021. https://doi.org/10.1016/j.mat pr.2021.04.853
[27] Prabhu Shankar, B., Jayavadivel, R., and Viswanath Kani, T. “A Novel Approach For Detect Counterfeit Product Using Color QR Code”, International Journal of Scientific and Technology Research, Vol. 9, No. 01, 2020, http://www.ijstr.org/final-print/jan2020/A-Nov el-Approach-For-Detect-Counterfeit-Product-Using-Color-Qr-Code.pdf
[28] Wahsheh, H. “BarSec Droid”, 2018. [Online]. Available: https://m.apkpure.com/barsec-droid/ barcode_security.heider.bsr
[29] Rafsanjani, A. S., Kamaruddin, N. B., Rusli, H. M., and Dabbagh, M. “QsecR: Secure QR Code Scanner According to a Novel Malicious URL Detection Framework”, in IEEE Access, vol. 11, pp. 92523-92539, 2023, https://ieeexplore. ieee.org/document/10172018
[30] P. Kamnounsing, K. Sumongkayothin, P. Siritanawan and K. Kotani, "Adversarial Halftone QR Code," in IEEE Access, vol. 12, pp. 126729-126737, 2024, https://doi.org/10.1 109/ACCESS.2024.3405408
[31] Chindaudom, A., Siritanawan, P., Sumongkayothin, K., and Kotani, K. “Adversarial QR: An adversarial patch in QR code format”, 2020 Joint 9th International Conference on Informatics, Electronics and Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision and Pattern Recognition (icIVPR), Kitakyushu, Japan, 2020, pp. 1-6, doi: 10.1109/ICIEVicIVPR4867 2.2020.9306675.
[32] Zheng, Z., Xie, S., Dai, H., Chen, X., and Wang, H. “An overview of blockchain technology: Architecture, consensus, and future trends”, Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), 557–564; 2017. https://doi.org/10. 1109/BigDataCongress.2017.85
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Nigerian Journal of Technology

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The contents of the articles are the sole opinion of the author(s) and not of NIJOTECH.
NIJOTECH allows open access for distribution of the published articles in any media so long as whole (not part) of articles are distributed.
A copyright and statement of originality documents will need to be filled out clearly and signed prior to publication of an accepted article. The Copyright form can be downloaded from http://nijotech.com/downloads/COPYRIGHT%20FORM.pdf while the Statement of Originality is in http://nijotech.com/downloads/Statement%20of%20Originality.pdf
For articles that were developed from funded research, a clear acknowledgement of such support should be mentioned in the article with relevant references. Authors are expected to provide complete information on the sponsorship and intellectual property rights of the article together with all exceptions.
It is forbidden to publish the same research report in more than one journal.