DEVELOPMENT OF A BLOCKCHAIN-BASED ANTI-COUNTERFEITING SYSTEM LEVERAGING PRODUCT INHERENT FEATURES AND LOCATION INFORMATION

Authors

  • J. Wosu Department of Electrical and Electronic Engineering, Federal University of Technology Owerri, Imo State, Nigeria
  • G. Chukwudebe Department of Electrical and Electronic Engineering, Federal University of Technology Owerri, Imo State, Nigeria
  • L. Ezema Department of Electrical and Electronic Engineering, Federal University of Technology Owerri, Imo State, Nigeria
  • C. Agubor Department of Electrical and Electronic Engineering, Federal University of Technology Owerri, Imo State, Nigeria
  • E. B. Mfonobong Department of Electrical and Electronic Engineering, Federal University of Technology Owerri, Imo State, Nigeria https://orcid.org/0009-0004-3699-1069
  • M. E. Nwanga Department of Information Technology, Federal University of Technology Owerri, Imo State

DOI:

https://doi.org/10.4314/njt.v44i2.12

Keywords:

Concensus algorithm, Counterfeiting, Distributed applications, QR code, Blockchain Technology, Inherent Product Features

Abstract

The proliferation of counterfeit items has hurt the economic growth, public health, and safety. This work aims to develop an innovative system that can counter and mitigate the threat posed by local and global counterfeiters whose activities have caused untold health and economic hardship to society. This paper proposes a novel blockchain-based anti-counterfeiting system that makes use of a product's unique characteristics and its geographical location. Prototype system modelling in this study was accomplished using object-oriented software analysis and design techniques, Rapid Unified Process (RUP) and, Rapid Application Development (RAD) methodologies for QR Code and Blockchain applications respectively. Ganache, a private Ethereum blockchain network, was set up to serve as the backend platform. Open-source software such as the Truffe suite and the Solidity compiler were utilised in setting up the Ganache network as well as in compiling and deploying smart contracts written in Solidity. Results proved that the system, when tested on 50 products, shows low energy consumption, high speed of execution at 38.4s on average, QR code scanning time of 9.5ms on average, very high data integrity, and 100% accuracy record when validating whether or not a product is a counterfeit. This work provides a solution for cost-effective and comprehensive anti-counterfeiting measures, featuring key elements such as traceability, immutability, and transparency. The developed system is unparalleled as it combines blockchain technology, unique product inherent features, location information (GPS coordinates), and Track and Trace technologies, to offer a reliable and secure solution to counterfeit trading. This work, therefore, represents a potentially innovative approach to curbing the proliferation of counterfeit products.

References

[1] Yiu, N. C. K. “Toward Blockchain-Enabled Supply Chain Anti-Counterfeiting and Traceability”, Future Internet, 13(4), 2021; 86. https://doi.org/10.3390/fi13040086

[2] OECD/EUIPO (2020), Trade in Counterfeit Pharmaceutical Products, Illicit Trade, OECD Publishing, Paris, https://doi.org/10.1787/a7c7 e054-en.

[3] Keith, W., and Jith, L. Z. “The Evolution of Counterfeit Luxury Consumption”, Research Handbook on Luxury Branding, pp. 265 – 281, 2020 ISBN: 978 1 78643 634 4. https://url-shortener.me/1SCB

[3] Tavares, I. D. “Counterfeiting Of Fake Drugs in Africa: Current Situation, Causes and Countermeasures”, Mondaq, 2020. https://w ww.mondaq.com/nigeria/trademark/988968/counterfeiting-of-fake-drugs-in-africa-current-sit uation-causes-and-countermeasures.

[4] Y. Dabbagh, R. Khoja, L. AlZahrani, G. AlShowaier and N. Nasser, "A Blockchain-Based Fake Product Identification System," 2022 5th Conference on Cloud and Internet of Things (CIoT), Marrakech, Morocco, 2022, pp. 48-52, https://doi.org/10.1109/CIoT53061.202 2.9766493.

[5] Templars ThoughtLab, “Securing Legitimacy: Anti-counterfeiting Strategies for Brand Owners in Nigeria”, 2024, accessed from www.templars-law.com on 27th May 2025.

[6] EIC and SMEs Executive Agency, “Challenges of counterfeiting in Nigeria”, 2024, accessed from https://intellectual-property-helpdesk.ec. europa.eu on 27th May 2025

[7] David N., and Ohanado U. “Leveraging Emerging Technologies for Operational Optimization and Business Model Innovation in African Enterprises”, Nigerian Journal of Technology, vol. 43, no. 4, pp. 829 – 838, Jan. 2025, doi: 10.4314/njt.v43i4.23.

[8] Okide C. P., Ahaneku M. A., Nwawelu U. N., Chijindu V. C., Ezeja, O. M., and Ekengwu B. O. “Deployment of Smart Contracts on Blockchain Technology in Early Mitigation of Distributed Denial of Service in Software Defined Networks”, Nigerian Journal of Technology, vol. 44, no. 1, pp. 105–113, Apr. 2025, doi: 10.4314/njt.v44i1.12.

[9] Ahmed, S. “Enhancing Data Security and Transparency: The Role of Blockchain in Decentralized System”, International Journal of Advanced Engineering, Management and Science, 11(1), 593258, 2025. https://doi.org/ 10.22161/ijaems.111.12

[10] Wood, G. “Ethereum: A Secure Decentralised Generalised Transaction Ledger (EIP-150)”, 2018. https://www.yellowpaper.io.

[11] Khan, U., An, Z. Y., and Imran, A. “A Blockchain Ethereum Technology-Enabled Digital Content: Development of Trading and Sharing Economy Data”, IEEE Access, 8, 217045-217056; 2020. https://doi.org/10.1109/ ACCESS.2020.3041317.

[12] Santiago, C., Ren, S., Lee, C., and Ryu, M. “Concordia: A Streamlined Consensus Protocol for Blockchain Networks”, IEEE Access, 9, 13173-13185; 2021. https://doi.org/10.1109/ ACCESS.2021.3051796.

[13] Zhu, P., Hu, J., Zhang, Y., and Li, X. “A Blockchain Based Solution for Medication Anti-Counterfeiting and Traceability”, IEEE Access, 8, 184256-184272; 2020 vol. 8, pp. 184256-184272, 2020, https://doi.org/10.1109/ ACCESS.2020.3029196

[14] Du, M., Chen, Q., and Ma, X. “MBFT: A New Consensus Algorithm for Consortium Blockchain”, IEEE Access, 8, 87665-87675; 2020. https://doi.org/10.1109/ACCESS.2020. 2993759.

[15] Dwivedi, V., Norta, A., Wulf, A., Leiding, B., Saxena S., and Udokwu, C. “A Formal Specification Smart-Contract Language for Legally Binding Decentralized Autonomous Organizations”, IEEE Access, vol. 9, pp. 76069-76082; 2021. https://doi.org/10.1109/ ACCESS.2021.3081926.

[16] Kannengiesser, N., Lins, S., Sander, C., Winter, K., Frey, H., and Sunyaev, A. “Challenges and Common Solutions in Smart Contract Development”, IEEE Transactions on Software Engineering, 2021 vol. 48, no. 11, pp. 4291-4318. https://doi.org/10.1109/TSE.2021.31168 08.

[17] Zichichi, M., Ferretti, S., and D’Angelo, G. “MOVO: a dApp for DLT-based Smart Mobility”, International Conference on Computer Communications and Networks (ICCCN), 1-6; 2021. https://doi.org/10.1109/ ICCCN52240.2021.9522257.

[18] Gao, J. “Guided, Automated Testing of Blockchain-Based Decentralized Applications” , IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedi-ngs (ICSE-Companion), 138-140; 2019. https:// doi.org/10.1109/ICSE-Companion.2019.00059

[19] Wei, W., Lin, J., Lin, Y., and Liao, H. M. “What Makes You Look Like You: Learning an Inherent Feature Representation for Person Re-Identification”, 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Pg 1-6; 2019 https://doi.org/10.1109/AVSS.2019.8909892.

[20] Wang, S., Li, D., Zhang, Y., and Chen, J. “Smart Contract-Based Product Traceability System in the Supply Chain Scenario”, IEEE Access, 7, 115122-115133; 2019. https://doi. org/10.1109/ACCESS.2019.2935873.

[21] Ma, J., Lin, S., Chen, X., Sun, H., Chen, Y., and Wang, H. “A Blockchain-Based Application System for Product Anti-Counterfeiting”, IEEE Access, 8, 77642-77652; 2020. https://doi.org/ 10.1109/ACCESS.2020.2972026.

[22] Srivatsa, D., Aakash, N., and Sahisnu, S. “A Product Authentication Scheme for Supply Chain system via Smart Contracts using Blockchain Technology and Facial Recogni-tion”, Journal of Physics: Conference Series, 1767. 012057. 2020. https://doi.org/10.1088/ 1742-6596/1767/1/012057

[23] Li, J., Li, D., Xiong, C., and Hoi, S. C. H. “BLIP: Bootstrapping language-image pre-training for unified vision-language understanding and generation”, Proceedings of the 39th International Conference on Machine Learning, 162, 12888–12900; 2021 https://doi. org/10.48550/arXiv.2201.12086

[24] Radford, A., Kim, J. W., Hallacy, C., Ramesh, A., Goh, G., Agarwal, S., and Sutskever, I. “Learning transferable visual models from natural language supervision”, Proceedings of the 38th International Conference on Machine Learning, 139, 8748–8763; 2022. https://doi.o rg/10.48550/arXiv.2103.00020.

[25] Benet, J. “IPFS - Content addressed, versioned, P2P file system”, arXiv preprint, arXiv:1407. 3561. 2014. https://arxiv.org/abs/ 1407.3561

[26] Singh, R., and Sharma, A. “InterPlanetary File System (IPFS): A decentralized storage network”, Materials Today: Proceedings, 47, 2267–2271; 2021. https://doi.org/10.1016/j.mat pr.2021.04.853

[27] Prabhu Shankar, B., Jayavadivel, R., and Viswanath Kani, T. “A Novel Approach For Detect Counterfeit Product Using Color QR Code”, International Journal of Scientific and Technology Research, Vol. 9, No. 01, 2020, http://www.ijstr.org/final-print/jan2020/A-Nov el-Approach-For-Detect-Counterfeit-Product-Using-Color-Qr-Code.pdf

[28] Wahsheh, H. “BarSec Droid”, 2018. [Online]. Available: https://m.apkpure.com/barsec-droid/ barcode_security.heider.bsr

[29] Rafsanjani, A. S., Kamaruddin, N. B., Rusli, H. M., and Dabbagh, M. “QsecR: Secure QR Code Scanner According to a Novel Malicious URL Detection Framework”, in IEEE Access, vol. 11, pp. 92523-92539, 2023, https://ieeexplore. ieee.org/document/10172018

[30] P. Kamnounsing, K. Sumongkayothin, P. Siritanawan and K. Kotani, "Adversarial Halftone QR Code," in IEEE Access, vol. 12, pp. 126729-126737, 2024, https://doi.org/10.1 109/ACCESS.2024.3405408

[31] Chindaudom, A., Siritanawan, P., Sumongkayothin, K., and Kotani, K. “Adversarial QR: An adversarial patch in QR code format”, 2020 Joint 9th International Conference on Informatics, Electronics and Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision and Pattern Recognition (icIVPR), Kitakyushu, Japan, 2020, pp. 1-6, doi: 10.1109/ICIEVicIVPR4867 2.2020.9306675.

[32] Zheng, Z., Xie, S., Dai, H., Chen, X., and Wang, H. “An overview of blockchain technology: Architecture, consensus, and future trends”, Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), 557–564; 2017. https://doi.org/10. 1109/BigDataCongress.2017.85

Downloads

Published

2025-07-07

Issue

Section

Computer, Telecommunications, Software, Electrical & Electronics Engineering

How to Cite

DEVELOPMENT OF A BLOCKCHAIN-BASED ANTI-COUNTERFEITING SYSTEM LEVERAGING PRODUCT INHERENT FEATURES AND LOCATION INFORMATION. (2025). Nigerian Journal of Technology, 44(2), 282 – 292 . https://doi.org/10.4314/njt.v44i2.12