Abstract

The Internet is an essential part of daily life with the expansion of businesses for maximizing profits. This technology has intensely altered the traditional shopping style in online shopping. Convenience, quick price comparison, saving traveling time, and avoiding crowds are the reasons behind the abrupt adoption of online shopping. However, in many situations, the product provided does not meet the quality, which is the primary concern of every customer. To ensure quality product provision, the whole food supply chain should be examined and managed properly. In food traceability systems, sensors are used to gather product information, which is forwarded to fog computing. However, the product information forwarded by the sensors may not be similar, as it can be modified by intruders/hackers. Moreover, consumers are interested in the product location, as well as its status, i.e., manufacturing date, expiry date, etc. Therefore, in this paper, data and account security techniques were introduced to efficiently secure product information through the Twofish algorithm and dual attestation for account verification. To improve the overall working, the proposed mechanism integrates fog computing with novel modules to efficiently monitor the product, along with increasing the efficiency of the whole working process. To validate the performance of the proposed system, a comparative simulation was performed with existing approaches in which Twofish showed notably better results in terms of encryption time, computational cost, and the identification of modification attacks.

Highlights

  • Since the last decade, quality products have spread throughout the world

  • Product information is gathered with the help of different sensors [2], whereas sensors are located at different stages of the supply chain such as farming, food processing, food packing, food storage, distribution, retailers, etc

  • Since food products are developed according to consumers’ needs, the food traceability system must be accountable for forwarding accurate product information to fog computing [10]

Read more

Summary

Introduction

Quality products have spread throughout the world. Customers can buy quality product items from different resources using devices, such as mobile phones, laptops, notebooks, personal computers, smart wristwatches, and so on [1]. To achieve the objectives of the system, all sensors are fully autonomic to obtain product information from different locations in the traceability system and forward the information to the fog to maintain integrity and robustness in the system by utilizing historical data. The addition of this security element in the CPS is the motivation for secure food traceability [14]. The integration of novel fog modules with the CPS-based food traceability system for the identification of poor-quality products from the supply chain by maintaining reliable product information to increase the trust level; ii.

Related Work
Proposed Traceability System
Twofish-Algorithm-Based Data Encryption
Utilization of Fog Computing in the Proposed CPS
Simulation Environment
Encryption Time
Trusted Data Identification and Error Estimation
Computational Cost
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call