Blockchain and Related Technologies To Support Manufacturing Supply Chain Traceability
Blockchain and Related Technologies To Support Manufacturing Supply Chain Traceability
Keith Stouffer
Michael Pease
Joshua Lubell
Evan Wallace
Harvey Reed
Vivian L. Martin, Ph.D.
Steve Granata
Andrew Noh
Connor Freeberg
April 2022
Certain commercial entities, equipment, or materials may be identified in this document in order to describe an
experimental procedure or concept adequately. Such identification is not intended to imply recommendation or
endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best
available for the purpose.
There may be references in this publication to other publications currently under development by NIST in accordance
with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies,
may be used by federal agencies even before the completion of such companion publications. Thus, until each
publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For
planning and transition purposes, federal agencies may wish to closely follow the development of these new
publications by NIST.
Organizations are encouraged to review all draft publications during public comment periods and provide feedback to
NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at
https://csrc.nist.gov/publications.
The Information Technology Laboratory (ITL) at the National Institute of Standards and
Technology (NIST) promotes the U.S. economy and public welfare by providing technical
leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test
methods, reference data, proof of concept implementations, and technical analyses to advance the
development and productive use of information technology. ITL’s responsibilities include the
development of management, administrative, technical, and physical standards and guidelines for
the cost-effective security and privacy of other than national security-related information in federal
information systems.
Abstract
As supply chains become more complex and the origins of products become harder to discern,
efforts are emerging that improve traceability of goods by exchanging traceability data records
using blockchain and related technologies. This NIST NCCoE publication explores the issues
that surround traceability, the role that blockchain and related technologies may be able to play
to improve traceability, and several case studies in use today.
Keywords
Disclaimer
Additional Information
For additional information on NIST’s Cybersecurity programs, projects and publications, visit the
Computer Security Resource Center. Information on other efforts at NIST and in the Information
Technology Laboratory (ITL) is also available.
Acknowledgments
The authors would like to acknowledge and thank a number of individuals and organizations
who provided valuable input into this publication, including: Arnaud Brolly, SITA; Daniel Eliot,
MITRE; Chris Fabre, Sky Republic; DUST Identity; Jim Wetzel; Pierre-Yves Benain, SITA;
Sean Hanlen, Guardtime Federal, Inc.; and Ujjwal Guin, Auburn University.
ii
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Table of Contents
1 Introduction ............................................................................................................ 1
1.1 Purpose .......................................................................................................... 1
1.2 Scope.............................................................................................................. 1
1.3 Target audience .............................................................................................. 1
1.4 Foundational practices .................................................................................... 2
1.5 Relationship to other programs and publications ............................................ 2
1.6 Methodology overview .................................................................................... 3
1.7 Summary of insights ....................................................................................... 3
1.8 Organization of this paper ............................................................................... 4
2 Manufacturing Supply Chain Overview and Imperatives ................................... 6
2.1 Introduction ..................................................................................................... 6
2.2 Supply chain risk ............................................................................................. 6
2.3 Relevant NIST Special Publications................................................................ 7
2.4 Product provenance and pedigree .................................................................. 7
2.5 Ecosystem perspective ................................................................................... 8
2.6 Industrial control system example ................................................................... 9
2.7 Traceability challenges ................................................................................. 10
2.8 Decentralized information sharing................................................................. 12
3 Traceability ........................................................................................................... 14
3.1 Potential benefits of improved traceability..................................................... 14
3.2 Applicable domains ....................................................................................... 15
3.3 Metrics .......................................................................................................... 17
4 Technologies Supporting Traceability ............................................................... 18
4.1 Blockchain .................................................................................................... 18
4.2 Cyber-physical anchors ................................................................................ 21
4.3 Other technologies ........................................................................................ 23
4.4 Summary ...................................................................................................... 24
5 Considerations for Adoption of Blockchain ...................................................... 25
5.1 Metrics .......................................................................................................... 25
5.2 Information exchange standards ................................................................... 25
5.3 Minimum viable ecosystem ........................................................................... 25
iii
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
List of Appendices
References ................................................................................................................... 52
Appendix A— Case Study Analysis Models and Lenses......................................... 56
A.1 Cyber supply chain risk management ........................................................... 56
A.2 Technology lenses & adoption curve ............................................................ 57
A.3 Win/win and production possibility frontier .................................................... 60
A.4 Intermediation, disintermediation, classic make/buy ..................................... 61
A.5 Centralized and decentralized ...................................................................... 62
Appendix B— Submitted Case Studies ..................................................................... 65
iv
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
v
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
List of Figures
vi
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
1 Introduction
Manufacturing supply chains are increasingly critical to maintaining the health, security, and the
economic strength of the United States. Recent events and current economic conditions exposed
the impact of disruptions in the security and continuity of the U.S. national manufacturing supply
chain. This in turn, drew critical attention to the need to illuminate and secure the supply chain
from numerous hazards and risks. Further, the U.S. manufacturing supply chain is susceptible to
logistical disruptions, in addition to the effects of nefarious actors seeking fraudulent gain or
attempting to sabotage or corrupt manufactured products. Improving the traceability of goods
and materials that flow through the manufacturing supply chain may help mitigate these risks.
This publication uses supply chain traceability case studies and the outcome of NIST
engagement with an associated community of interest, to assess the current state of supply chain
traceability and offer several research opportunities.
1.1 Purpose
1.2 Scope
This publication covers topics including existing factors that inhibit manufacturing supply chain
traceability, analysis of nascent blockchain-enabled supply chain traceability initiatives in
progress, and recommendations for future research in manufacturing supply chain traceability
enabled by blockchain and related technologies.
The target audience of this publication encompasses the needs and interests of all stakeholders in
the U.S. national manufacturing supply chain. The target audience includes:
• Regulatory agencies: Multiple regulatory offices, across federal, state, local, and tribal
agencies in the U.S. and internationally, operate under legal authority to assure product
safety, and/or prohibit or prosecute fraudulent or malicious supply chain disruptions.
1
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
The target audience of this publication also includes stakeholders in the supply chain for
operational technology (OT) including industrial control systems (ICS) utilized in manufacturing
plants, utility service operations, and other elements of national critical infrastructure including:
This paper builds upon, yet has a different target audience than, related NIST publications
dedicated to supply chain security and risk management.
Related NIST publications establish the foundations of supply chain security and supply chain
risk management. This paper builds on these foundations, adds a blockchain-enabled ecosystem
perspective, and provides recommendations for future research in manufacturing supply chain
traceability. NIST publications related to this publication include Special Publication 800-161
[1], Supply Chain Risk Management Practices for Federal Information Systems and
Organizations, Supply Chain Risk Management control family in Special Publication 800-53,
Security and Privacy Controls for Information Systems and Organizations [2], and Special
Publication 800-37 Revision 2, Risk Management Framework for Information Systems and
Organizations.
2
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
The methodology used for this paper is based on community of interest stakeholder engagement
as described below and illustrated in Figure 1.
3. Select analytic methods for case studies. Seek multiple vantage points to get a
comprehensive perspective. Considerations for the analysis include individual concerns,
challenges, and benefits and extend to the ecosystem perspective for win-win outcomes.
4. Analyze and compare case studies to gain insights. Derive recommendations for future
research directions.
3
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
2. These ecosystems can use blockchain and related technologies to exchange traceability
records to cryptographically assure that traceability records are properly attributed, data is
tamper-evident, and data cannot be deleted. While it is possible to exchange and record
messages without blockchain (or similar cryptographic technology with proofs of data
integrity), critical infrastructures and the supply chains that supply them are under
increasing pressure to assure integrity of goods used.
3. This approach is already being adopted in some areas, and this paper contains seven case
studies and analysis. Each case study is different; however, some common traits emerge
indicating that further research is required in these areas:
a. Identity
c. Barriers to Entry
e. Metrics
Section 2 “Manufacturing Supply Chain Overview and Imperatives” reviews the current state of
supply chain risk analysis and introduces an ecosystem perspective to complement the current
per stakeholder perspective in Supply Chain Risk Management (SCRM) analysis.
Section 3 “Traceability” reviews the desired benefits traceability may offer and example domains
for which traceability is applicable.
Section 5 “Considerations for Adoption of Blockchain” reviews the challenges and risks
associated with establishing a blockchain capability for a subset of the supply chain and the
4
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
resulting ecosystem. Blockchain is one technology with features corresponding to drivers for
supply chain traceability, such as pedigree and provenance for products and records.
Section 6 “Industry Case Studies & Analysis” reviews the methodology for industry
engagement, organizations who submitted case studies, and the summaries of the submitted case
studies. Following are the analyses of the case studies viewed through perspectives or mental
models selected in the methodology. Full description of the analysis methods and full case
studies are found in the Appendices.
Section 7 “Future Research” summarizes indications of future research needed. Future research
is intended to be directional, not specific, and performed by a variety of stakeholders including
but not limited to industry, academia, and government organizations.
Appendices for Case Study Methodologies and Case Study submissions are provided as
supporting documentation of the synthesis of inputs into the future research themes. They
include researcher notes from case study observations and candidate subjects of interest, as well
as resources for the models and lenses employed. These are the data underlying the paper’s
discussions and conclusions.
5
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
2.1 Introduction
In this document, the term supply chain refers to the linked set of resources and processes
between and among multiple levels of enterprises, each of which is an acquirer that begins with
the sourcing of products and services and extends through their life cycle. A manufacturing
supply chain begins with its most fundamental elements of raw materials and basic commodities,
and flows through tiers of added value, product integration, and secondary/tertiary/etc.,
manufacturing. Eventually the supply chain flows through distribution to the point of product
procurement or consumption by private individuals, businesses, governments, and other
institutions. The supply chain is not linear as the word “chain” implies, rather it is more of a
graph or web. The diagram below, Figure 2, shows a simplified view of the supply chain with
one branch to emphasize the web or graph nature. Activities occurring in the end operating
environment (e.g., post-sale), are not depicted but also contribute to the de-facto network of
supply chain management. These include claims, returns, callbacks, and maintenance services,
all of which add to the richness of use cases in supply chain traceability that have potential
implementations in blockchain.
The U.S. national supply chain of manufactured products faces growing risks to its resiliency and
continuity, driven by economic, logistical, and technological factors. Supply chain risks increase
when parties are unstable financially, or during times of economic, cyber, or logistical disruption
to the operations and continuity of key supply chain elements. The global manufacturing supply
chain presents significant economic benefits including low cost and robust competition, while
6
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Exposure to supply chain risk increases when parties lack sufficient visibility and understanding
of development, sourcing, production, distribution, deployment, and eventual disposal of
products moving through all tiers. Actors with insufficient visibility into the supply chain face a
gamut of risks that include production of substandard products, nefarious product counterfeiting,
malicious product tampering, insertion of cybersecurity exploits, and/or loss or compromise of
trade secrets and intellectual property (IP).
NIST Special Publication 800-161, Supply Chain Risk Management Practices for Federal
Information Systems and Organizations [1], and 800-53 Revision 5 [2], Security and Privacy
Controls for Information Systems and Organizations, each include foundational material
covering enterprise supply chain risk management (SCRM) methods. These documents include
measures for enterprises at all tiers of the supply chain to increase their overall visibility across
the entire supply chain, thereby illuminating and reducing threats to manufactured product
quality, authenticity, and fraudulent or nefarious activity. Both documents cover the information
and communications technology and operational technology (ICT/OT) sectors and are written to
an audience of ICT/OT system developers and acquirers.
NIST SP 800-161 [1] recommends that enterprises establish measures to track the provenance of
products flowing through their supply chains. NIST SP 800-161 and NIST SP 800-53 define
provenance as: “...the chronology of the origin, development, ownership, location, and changes
to a system or system component and associated data.” NIST SP 800-53 includes a supply chain
security control covering product acquirer identification of provenance, as follows:
SR-4 PROVENANCE
Control: Document, monitor, and maintain valid provenance of the following systems, system components,
and associated data.
Discussion: Every system and system component have a point of origin and may be changed throughout its
existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a
system or system component and associated data. It may also include personnel and processes used to
interact with or make modifications to the system, component, or associated data. Organizations consider
developing procedures (see SR-1) for allocating responsibilities for the creation, maintenance, and
monitoring of provenance for systems and system components; transferring provenance documentation and
responsibility between organizations; and preventing and monitoring for unauthorized changes to the
provenance records. Organizations have methods to document, monitor, and maintain valid provenance
baselines for systems, system components, and related data. These actions help track, assess, and document
any changes to the provenance, including changes in supply chain elements or configuration, and help
ensure non-repudiation of provenance information and the provenance change records. Provenance
considerations are addressed throughout the system development life cycle and incorporated into contracts
and other arrangements, as appropriate.
7
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
NIST SP 800-53 control SR-4 includes a sub-control [SR-4(4)] that defines pedigree in terms of
the linkage between the visibility of supply chain provenance with product acquirer
determination of trust in product authenticity:
SR-4(4) PROVENANCE | SUPPLY CHAIN INTEGRITY — PEDIGREE
Employ…and conduct…organization-defined analysis…to ensure the integrity of the system and system
components by validating the internal composition and provenance of critical or mission-essential
technologies, products, and services.
Discussion: Authoritative information regarding the internal composition of system components and the
provenance of technology, products, and services provides a strong basis for trust. The validation of the
internal composition and provenance of technologies, products, and services is referred to as the pedigree.
For microelectronics, this includes material composition of components. For software this includes the
composition of open-source and proprietary code, including the version of the component at a given point
in time. Pedigrees increase the assurance that the claims suppliers assert about the internal composition and
provenance of the products, services, and technologies they provide are valid. The validation of the internal
composition and provenance can be achieved by various evidentiary artifacts or records that both
manufacturers and suppliers produce during the research and development, design, manufacturing,
acquisition, delivery, integration, operations and maintenance, and disposal of technology, products, and
services.
NIST SP 800-53 also contains an additional supply chain security control, SR-11, that
emphasizes the importance of product authenticity to enterprises in the supply chain, as follows:
SR-11 COMPONENT AUTHENTICITY
Taken together, the foundational NIST SCRM definitions and recommendations establish the
need and utility for product acquirers throughout the supply chain to establish product
provenance. NIST recommendations compel product acquirers to use provenance as a strong
measure of assurance for the pedigree of products against supply chain-based threats to quality,
authenticity, and fraudulent or nefarious activity. Traceability is the key enabler to assure
provenance and pedigree.
potential semantic gaps in data elements. A semantic gap may occur when a stakeholder multiple
tiers away writes a traceability record that may not be fully understood or recognized
downstream. Ecosystem-wide agreement on traceability information requirements mitigates
semantic gaps in understanding traceability data records.
Another potential gap arising from chained bi-lateral agreements is trust transitivity. This occurs
as a broken “chain of trust” induced by point-to-point exchanges. If Company A sends data to
Company B and B transmits to Company C, the original traceability information from A may not
be transferred to C. At that point C is faced with trusting A by way of having trusted B.
Maintaining traceability information sharing at the ecosystem level can allow participants to
verify data in a variety of traceability situations. Ecosystem-wide use of a trusted means to
exchange traceability data records ensures trust in the traceability data records.
Prior NIST documents treat each supply chain tier as having a “per acquirer” perspective which
provides risk analysis context and highlights the challenge of establishing pedigree and
provenance across multiple tiers. This document builds on that approach with an ecosystem
perspective, and it recognizes the importance of certain acquirers who establish foundational
traceability requirements for a subset (ecosystem) of the supply chain.
Supply chain traceability enables the product acquirer to verify the provenance and subsequently
establish the pedigree of goods and services flowing through ecosystems of potentially
overlapping manufacturing supply chains. Each manufacturing supply chain ecosystem has a set
of end-operating environments, each of which itself drives traceability requirements from those
environments back through multiple tiers of the supply chain. The end-operating environment
establishes risks unique to that environment. These risks drive criticality of traceability of
pedigree and provenance to assure genuine and uncompromised parts as an aspect of risk
mitigation. Establishment of traceability including provenance and pedigree enables component
authentication and non-repudiation.
For example, nuclear power generation plants must ensure that the industrial control systems
(ICS) they use to regulate nuclear fuel and manage handling of spent fuel rods, are secure and
not compromised with fraudulent or malicious components, including actuators and
microelectronics. The end operating environment generates traceability requirements which are
successively conveyed back to upstream stakeholders. Traceability requirements then inform
developmental activities for applicable stakeholders in the ecosystem, who in turn update their
computing resources.
Once traceability requirements are implemented, then live traceability information can flow with
goods from upstream to downstream stakeholders.
9
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
(a) End operating environments (e.g., nuclear power plants) generate traceability
requirements which flow down to multiple tiers of their OT supply chains (e.g., industrial
control systems, mechanical control systems, microelectronics, and devices).
(b) Manufacturing supply chains often provide goods and services to multiple consumers in a
myriad of operating environments, each with unique security and resilience requirements.
Note that the diagram includes the end operating environment as a single construct, to focus on
the supply chain which generates the product that the end operating environments use. In the end
operating environment, there are numerous activities such as maintenance and repair that are not
shown. In the end operating environment, the concept of trust transitivity (introduced above)
applies as well, so that activities such as repair can proceed knowing genuine parts are being
used.
Product manufacturing supply chains are multi-faceted and built on a variety of business,
economic, and technological factors. Manufacturers choose their suppliers, and consumers
choose their sources based on a range of factors that vary from corporate preferences and
existing/ongoing business relationships to more discreet considerations such as the existence of
limited sources of supply and/or unique characteristics of one product versus another.
10
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Manufacturers often consider the composition of their supply chain to be proprietary business
information. In many instances the composition of a manufacturer’s supply chain indicates its
trade secrets and/or telegraphs proprietary IP to outside parties. The inherent desire of parties in a
supply chain to safeguard sensitive business information often overrides their interest in supply
chain illumination for risk reduction purposes. Put simply, manufacturers often are inclined to
tolerate supply chain risk in their greater interest of safeguarding sensitive business information.
For end-to-end traceability, data records must be able to be shared among all parties in the
supply chain, product manufacturers must have high confidence in the existence of robust data
protection measures and must have satisfactory constraints on the sharing of their business
information. Manufacturers’ confidence in data safeguards must be high enough to enable them
to participate in shared technology platforms such as distributed ledgers and blockchains, that
illuminate the supply chain and reduce all parties’ exposure to supply chain risks.
1. An information sharing approach that transcends the typical business-to-business (B2B) bi-
lateral exchanges of information that is exchanged in supply chains. The existing bi-lateral
exchanges are well-supported by existing IT, legal, contractual, and liability methods and
means. In contrast, blockchain and related technologies have potential to share information in
a wider yet trusted scope, but are not yet widely supported in IT, legal, contractual, and
liability methods and means.
4. Cooperation across the supply chain to write and read traceability records, and adoption of
technology, methods, and means to mark and inspect goods and services for linkage with
electronic records.
5. Analysis to ensure that incentives for participants across relevant supply chain ecosystems
are sufficient to motivate adoption of blockchain and related technologies. Sufficient
incentives to write traceability records, combined with a critical mass of early adopters, are
necessary to achieve a Minimum Viable Ecosystem (MVE) [3] for traceability information.
11
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
The hypothesis for this paper is that use of trusted decentralized information sharing
(Decentralized Ledger Technology, blockchain, etc.) by stakeholders across the manufacturing
supply chain, can enable the sharing of traceability data records. A corollary is that blockchain
can enable sharing additional data records which may help to incent sufficient stakeholders to
form an MVE.
For example, in the diagram below, stakeholders separated by multiple tiers can both write and
read traceability records as goods flow toward integrators and end operating environments.
Additional data records could be written to attract stakeholders far away from the integration and
end operating environments, such as retail or sales records as a form of market intelligence. This
may incent broad participation and enable the formation of an MVE. The exchange of
traceability and market intelligence data records require protections of both IP (for traceability)
and privacy (for market intelligence).
In Figure 4, note that the flow of goods and services can include traceability markers (see Cyber-
physical anchors below) which can then be correlated with traceability data records throughout
the ecosystem. Beyond the ecosystem, the traceability records may not be understood due to
semantic and other gaps, see Section 5.4, Multiple Blockchains below and in Section 7, Future
Research Themes.
12
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Figure 4 - Traceability records shared using a trusted data layer across an ecosystem
The Trusted Data Layer could be implemented by blockchain and related technologies, see
Section 3, Traceability.
13
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
3 Traceability
Industry and academic engagement in this inquiry indicates that traceability of goods and
materials flowing through a supply chain could be improved with the exchange of traceability
data records using blockchain or similar distributed ledger technologies. Traceability confers
benefits on the supply chain and is accompanied by challenges to resolve such as IP protections,
and the role of standards and metrics, as discussed below. It is important to note that in addition
to improved exchange of traceability records, this in no way diminishes the need for accurate
data collection and data quality measures, although data collection and data quality
considerations are beyond the scope of this paper.
Section 2.4 of this publication discussed foundational NIST SCRM recommendations that
establish the need and utility for product acquirers throughout the supply chain to establish
product provenance. NIST recommendations inform product acquirers regarding information
about product provenance as a SCRM measure, providing assurance against supply chain-based
threats to product quality, authenticity, and fraudulent or nefarious activity.
Improved supply chain traceability enables producers to provide acquirers with a level of
assurance of product provenance and implied pedigree, up to and including a formal warranty of
provenance and pedigree. Shared technology platforms such as distributed ledgers and
blockchains that illuminate the supply chain are necessary for entities in the supply chain to
realize product assurance enabled by supply chain traceability.
Many supply chains are unique to the entities within them, such that the entities enter into
specific contracts with unique terms for the development, production, and/or delivery of
manufactured products. NIST Internal Report (NISTIR) 8202, Blockchain Technology Overview
[4], defines a smart contract as follows:
A smart contract is a collection of code and data (sometimes referred to as functions and state) that is
deployed using cryptographically signed transactions on the blockchain network…The smart contract is
executed by nodes within the blockchain network; all nodes that execute the smart contract must derive the
same results from the execution, and the results of execution are recorded on the blockchain.
NISTIR 8202 describes the benefits of supply chain entities utilizing smart contracts in multi-
party business transactions, which occur often in supply chains characterized by business or
government/institutional acquisition of manufactured products. Entities at all tiers of these
supply chains participate in smart contracts, including utilizing cryptographically signed
transactions on the blockchain network. In these instances, the blockchain-enabled smart contract
14
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
acts to document product provenance and illuminate the supply chain, thereby serving as a
product acquirer SCRM measure.
The benefit of smart contracts in blockchain is that many blockchains (e.g., Enterprise Ethereum,
Tendermint, Cosmos, and Polkadot) execute the smart contract code within the virtual machine
of each blockchain node during transaction validation. Smart code execution validates the
transaction and prevents subversion by external code running in processes outside the
blockchain. Further, the smart contracts in effect form the backbone of new additional processes
which must be complemented by external code. External distributed apps use the native
blockchain smart contracts in the overall process architecture.
While smart contract practices are maturing and could potentially benefit from standards, in the
absence of standards numerous studies of smart contracts are being published, with a meta-study
[5] (study of smart contract studies) proposing a taxonomy for smart contracts. Table 10 in [5]
identifies numerous smart contract studies related to manufacturing and supply chain.
There are numerous domains for which traceability as described above is applicable. Some of
these domains are substantiated by case studies included in the paper, discussions with the
community of interest, and some by case studies not suitable for public release.
• Parts / components,
o Track physical parts in pedigree and provenance electronic records (e.g., cyber-
physical anchors)
• Pharma
o Track controlled drugs through forward and reverse logistics (MediLedger case
study, Section 6.5)
• Software
• Data
o Digital twins [6] are a digital representation of a physical machine or system, and
the manufacturing process itself.
o Digital twin models (Aerospace and Defense memo 1) are being encouraged to
accelerate developmental processes; however, digital twins are also susceptible to
supply chain vulnerabilities.
1 https://software.af.mil/wp-content/uploads/2021/05/Digital-Building-Code-and-Scorecard-Memo-v15.pdf.
2 https://blog.simbachain.com/blog/bringing-blockchain-enabled-additive-manufacturing-to-battlefields.
3 https://www.afcea.org/content/ai-key-cyber-operations-caveat.
16
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
the time of initial fielding 4, raises questions about assuring provenance and
pedigree of data exchanged between them.
3.3 Metrics
Traceability metrics are a requirement for an MVE to be established and later evolve to meet
dynamic needs of the supply chain. Traceability gaps express whether the ecosystem has met a
traceability requirement or not, and potentially the proportion of completion (coverage). An
MVE will use traceability metrics to motivate participants to marshal the resources and
cooperation needed to achieve traceability goals for that ecosystem. Traceability metrics are
discussed in Section 5, and as a topic for future research.
4 https://www.af.mil/News/Article-Display/Article/2369626/army-air-force-form-partnership-lay-foundation-for-cjadc2-
interoperability/.
17
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Blockchain is the primary data sharing and storage technology to enable traceability as
considered in this paper. In addition to blockchain, the following technologies were also
identified as potentially useful to enable traceability:
• Solid Pods – an internet-based innovation (from Tim Berners Lee) on storage, may offer
an alternative mechanism to the current per stakeholder enterprise repositories. The
relevance is that blockchain can store only small amounts of information, so additional
storage (e.g., full provenance information) may be required for traceability data records
in a blockchain. Full traceability data would need to be stored in a form and manner
agreed upon by the ecosystem stakeholders, which currently would be an off-chain
repository in one of the stakeholder’s enterprise networks. Solid pods may offer a storage
and access means that are suitable for shared access within the ecosystem.
4.1 Blockchain
With increasing demand on manufacturers and global supply chains, blockchain has been
introduced as a viable solution. Blockchain is described in NIST.IR 8202 [4] as a tamper evident
and tamper resistant distributed ledger, which stores all the details of a network's activity. This
enables the data to be trusted by blockchain participants. Blockchains are usually stood up
without a central authority, such as a bank or government. The first blockchains were public (or
permissionless) and in use today as cryptocurrencies. However, the blockchains in consideration
below and through this paper are permissioned and restricted to a well-known and vetted set of
participants.
The trust lies in the validator nodes across the permission blockchain network, which is how the
data is secured and transactions validated on the blockchain [7]. New transactions added to the
blockchain are verified by validator nodes through a consensus algorithm, where it is confirmed
by a quorum of validators in the blockchain (e.g., 2/3 validators in the Byzantine Fault Tolerant
consensus algorithm). The blockchain peer-to-peer network allows its users to post transactions
18
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
which are written to blocks, which are themselves linearly and chronologically linked to other
blocks which make up the shared ledger. Each block contains a set of data, a timestamp, and a
hash [7] from the previous block and is placed next to it, then the process repeats itself, as seen
in Figure 5. Once the blockchain is published, no chain in the network can be altered, creating a
permanent, open record for everyone to access.
The two-step validation process is an added benefit to blockchain’s reliability. The first step
validates the transaction data against pre-defined domain-specific business rules [10]. The
second step requires a consensus agreement by peers on the network to include validated
transactions in the next block, which is then added to the blockchain data. This agreement is
reached through a consensus mechanism [4], preventing bad actors from adding and/or accepting
fraudulent blocks [11]. Another way the blockchain mitigates the effects of potential malicious
activity is by replicating data across all nodes on the network so that it can withstand loss of
nodes due to attack or accident. This in part, allows blockchain to be distributed, replicated, and
maintained as a log of transactions that are well suited for sharing information among diverse
stakeholders, such as in manufacturing supply chains.
19
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Generating digital signatures of product data is a possible method where blockchain can be
utilized to support manufacturing supply chain traceability [12]. The signature stores a digital
fingerprint of various identifiers and metrics. Table 1 shows some examples of information that
could be stored in an individual block. To secure the digital fingerprint, storing the associated
metadata on a blockchain can “track both the existence and ownership of a digital asset at a
certain time” [10].
Blockchain can be used to track several types of digital assets. Figure 6 shows a simple
traceability example where “blockchain can help to secure proof of existence and ownership of
data associated with a specific instance of product that can be critical to solve future engineering
and/or legal issues” [5]. In more complex scenarios, if the source and destination metadata are
included, the product data exchange can be recorded on the blockchain. The resulting unique
data transaction can be easily verified as secure, and the ownership of the transaction is clearly
attributed on the blockchain. Figure 7, Step 5 would raise red flags if the data was manipulated
by the bad actor in Step 4. A bad actor is depicted, implying nefarious intent; however, it is also
possible a good actor may have inadvertently caused a bad event. The blockchain allows
determination of loss or change in either case.
20
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
10]
Posting validated manufacturing traceability data records on the blockchain provides trusted data
across an ecosystem which can be used to determine pedigree and provenance of goods and
services in the supply chain.
The initial concept and usage of public (permissionless) blockchain validates transactions strictly
against data records already stored on the blockchain (e.g., cryptocurrencies). However, using
permissioned blockchains for manufacturing traceability data records requires associating the
traceability data records with goods and services which are external to the blockchain. This
association must be unique and provable. If not, this reduces trust in the shared traceability data.
For example, one scenario might be to mitigate counterfeit and fraudulent products mixed in
with authentic items. Another case is anti-tamper detection to ensure that genuine items are not
manipulated by bad actors. In a complex supply chain across multiple countries, identifying
these inauthentic items is a difficult task. Therefore, it is essential to provide a trusted link
between the physical products and its associated traceability data record on the blockchain.
For associating cyber products, such as documents and software files, techniques such as hash
fingerprints can inform traceability records. The goal is the same, which is to record a provable
and immutable traceability record in a blockchain that can be used to compare against cyber and
physical products later downstream and establish authenticity.
For associating physical products, techniques such as serial numbers, QR Codes, and RFID could
be used since these have been demonstrated to work with many different manufactured goods
21
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
today. However, for physical products which require a higher degree of proof of identification
and resistance to tampering and counterfeiting, alternative technologies are emerging and
discussed next.
Cyber-physical anchors are a product authentication technology [13], which acts as a unique
digital fingerprint for physical objects to be used as an identifier in blockchain records associated
with that good. The cyber-physical anchors are tamper-resistant and non-transferable to another
good or object, and any attempt to modify or destroy the anchor can be detected (tamper-evident)
[14].
Generally, the cyber-physical anchor verification process involves the Reader/User, the Product,
the Cyber-physical anchor, and the Verifier. A simple scenario is depicted in Figure 8. A user
first scans the cyber-physical anchor on the product using a reader device, then it receives the
scan result. Next, the scanned data is sent for verification to a verifier where the verifier
authenticates the data and validates the result.
Preliminary research conducted by IBM, and companies such as DUST Identity and others has
resulted in a framework to enhance security, transparency, efficiency, and resiliency in supply
chain management [13]. Their solutions consist of 3 layers [14]:
• an ecosystem blockchain to digitally store and track traceability data transactions (with
cyber-physical anchor instance and physical goods and services instance association
included), and data ownership and access rights for the ecosystem participants
In summary, a blockchain network used by a supply chain ecosystem allows for users to check
the data records in the blockchain ledger. However, to be useful, the blockchain data record must
include a link to the cyber-physical anchor instance which is associated with the goods and
services instance flowing through the supply chain.
Typically, minimal shared traceability data is stored directly on the blockchain, with links to full
traceability data stored in off-chain storage. The off-chain storage can be a stakeholder system,
or shared storage for the ecosystem, including decentralized storage. Decentralized technologies
continue to rapidly evolve and currently, there are numerous decentralized storage technologies
in related projects under development. One such emerging decentralized storage specification is
the Solid Project led by Professor Berners-Lee [51] [52] [53] 54]. The Solid Project attempts to
change how web applications interact and utilize user’s data, by giving the users ownership of
their data, and enhanced privacy. The importance of considering technology options such as
Solid for data storage is that shared traceability data in an ecosystem needs to be stored
somewhere, and an open-source specification helps preserve accessibility. The Solid
specification is starting to be productized [44], with initial users considering how to use Solid in
their enterprise, such as the National Health Service (NHS) in the United Kingdom (UK) [45].
The description below is not a recommendation to use Solid; however, its decoupled architecture
(app and data decoupling) as an approach may prove useful in traceability ecosystems, whether
Solid per se is used or not.
The Solid Project is user centric. For the purpose of supply chain, the user could be a supply
chain participant or even the whole ecosystem. For example, the ecosystem could choose to store
data in a manner agnostic to any given participant. The Solid Project may inform such an
approach.
15]
Figure 9 - (Left) Current centralized style of web applications vs. (Right) Proposed access-controlled data
pods
23
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
“Solid Linked Data” also known as the Solid Project is a web decentralization project, as shown
in Figure 9. Solid Project envisions a decentralized, user (e.g., supply chain participant or
ecosystem) controlled platform for linked-data applications, rather than the application or a third-
party controlling access. Solid Project is attempting to achieve three goals:
• True data ownership: Users should have the right to decide where their data is stored and
who has access to it. Solid Project decouples data and content from the application.
• Modular design: Since “applications are decoupled from the data they produce, users will
be able to avoid vendor lock-in, seamlessly switching between apps and personal data
storage servers, without losing any data or social connections” [17]
• Reusing existing data: Developers will be able to easily create new applications or
improve existing ones, by reusing existing data that was produced by other applications.
This decentralized structure allows users to have increased control of their data, including access
and storage. To achieve this, they are proposing a “set of conventions and tools for building
decentralized social applications based on Linked Data principles” [17].
Decentralized approaches such as Solid may bring advantages of decentralized data sharing and
storage to manufacturing supply chain ecosystems. For example, traceability data and marketing
intelligence data (ecosystem incentives) could be stored in Solid (or summary) in the future.
Adoption of such approaches provides an alternative to siloed back-office data or highly
centralized data.
4.4 Summary
As supply chains grow to be even more complex, bad products and actors will inevitably enter,
causing economic losses in addition to other disruptions and safety concerns. Some of the
technologies mentioned above are workable solutions to connect the physical domain with the
digital environment, enhancing traceability.
24
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
From the case studies, several key topics regarding adoption were raised and discussed with the
community of interest, summarized below.
5.1 Metrics
Traceability metrics are required to measure progress toward implementing traceability across an
ecosystem. For example, what are the minimum viable traceability data elements which
constitute traceability for any set of goods and services? Present traceability metrics as
implemented in the case studies are generally straightforward, meaning either the
pedigree/provenance data records for the ecosystem are written and read, or not. Another
possible metric of traceability is “time to data,” which measures the speed with which an
operator can acquire the information they need about any given product in the moment that the
information is needed. Time to data is often a crucial measure of the effectiveness of a supply
chain in its ability to deliver information and trust, in addition to physical goods.
Future traceability efforts may be more complex with overlapping needs. For example, an
ecosystem which needs to incrementally add traceability records to improve coverage needs to
first enumerate gaps, then prioritize which traceability records to implement by which participant
in what order will close those gaps and to what extent. The coverage across stakeholders may
need to be prioritized or at a minimum reported, so that the ecosystem governance has good
situational awareness. Metrics could be expressed as either quantitative or qualitative (or both)
measures and are discussed further in Section 7, Future Research Opportunities.
Standards are required for the exchange, and semantic and syntactic understanding of data
records shared beyond typical B2B bi-lateral information exchanges. One of the case studies
(MediLedger) featured a partnership with GS1 US, a standards organization. While use of
standards can accelerate adoption, future standards requirements may be more complex, see
Section 7 Future Research Opportunities. Proprietary or private data may be linked via identifiers
rather than directly stored on the blockchain, enabling flexibility in protecting information, a
consideration in standards for exchanges, for example the Guardtime Federal approach.
Traceability requirements are often established by end operating environments, failure analysis,
and adversarial testing results. Conversely, issuance of traceability data records is performed by
the contributing goods and services supply chain participants. The benefit of writing/reading
traceability data records using blockchain and related technologies, needs to be complemented
with incentives for the contributing supply chain participants to participate (e.g., access to market
intelligence data records). This tradeoff will be unique to each sector and domain.
The purpose of an MVE is to provide a starting point, then subsequently grow and refine the
ecosystem. Of particular concern is to balance the incentives and effort across the ecosystem of
participants who will have differing perspectives (e.g., upstream versus downstream
participants). An MVE must also include an end operating environment(s), the contributing
25
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
goods and services supply chain, associated minimum viable traceability data elements to
constitute traceability, and sufficient incentives like marketing records to incent all participants
to work together. If the MVE cannot be initially established, then the ecosystem cannot function
and maintain coherency.
Once established, the MVE will then incrementally evolve within the constraints and guidance of
the associated governance, informed by traceability metrics. MVEs are adapted to evolving
traceability needs of the end operating environments and other supply chain participants. As
requirements demand increased traceability, this may impact techniques of linking physical
goods with blockchain data records and linking off-chain data with the blockchain data records.
As blockchain enabled supply chain ecosystems are instantiated and grown, driven by metrics
and governance, ecosystems will soon intersect. Intersection means that one or more
stakeholders is included in more than one ecosystem where traceability in one ecosystem needs
to be carried over to the adjacent ecosystem. For example, a secure software supply chain
traceability ecosystem and a secure microelectronic traceability ecosystem (see case studies
below) could both feed into a secure avionics supply chain ecosystem. One or more participants
from the feeder ecosystems may also participate in the assembly ecosystem. In addition, one
upstream supplier (e.g., electronics) may supply to two different feeder ecosystems. Having
consistent approaches, practices, and standards for individual participants as well as entire
ecosystems, will help to assure interoperability and transitive trust across the web of supply
chain ecosystems.
When ecosystems intersect, then the exchange of traceability data records can be facilitated by
either:
(a) The relevant individual intersecting stakeholder’s “copy” the applicable traceability
records from the upstream ecosystem to the dependent downstream ecosystem.
(b) The relevant ecosystem blockchains directly send applicable traceability records from the
downstream ecosystem blockchain to the upstream ecosystem blockchain.
Multiple traceability ecosystems that need to exchange traceability records give rise to another
complexity scale level often referred to as a network of ecosystems. The grouping of ecosystems
into ecosystem networks will be driven by the needs of the relevant end operating environments
and supply chain participants. Figure 10 illustrates ecosystem linkages of exchanging traceability
data records. The connections between ecosystems will arise as (a) individual participants in
each ecosystem supply goods to multiple ecosystems and/or (b) ecosystem participants (and end
operating environments) consuming products from one or more ecosystems. The intersection or
linkage between ecosystems should assure understandability and durability of traceability
records across ecosystems to achieve transitive trust.
26
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Challenges with exchanging traceability data records across ecosystems arise from dissimilar
governance, blockchain and related technology, regulatory environment, and accepted practices.
This is an outgrowth from the current state of unconnected blockchain ecosystems operating
independently from each other. Indications are that the ecosystems will continue to grow and
will soon need to intersect and align traceability records.
Further, use of logistics (shipping) providers in between supply chain steps is an added level of
complexity. While use of logistics can simplify supply chain operations, assuring the traceability
of manufactured goods through logistics may require the participation of logistics providers in
traceability ecosystems. Many logistics providers are already using blockchain data records to
improve their coordination and reduce lost goods, and there may be opportunity to include use of
logistics. See Section 7 Future Research Opportunities.
27
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
goal is to achieve desired supply chain ecosystem traceability while still protecting
proprietary information and IP. The MediLedger and Guardtime Federal case studies are
good examples of this strategy. In the MediLedger case, the ecosystem blockchain stores
minimal traceability identifiers which complement the participant’s legacy B2B ERP
systems. Guardtime Federal’s approach employs hash values and digital signatures on the
blockchain as links to immutable IP data stored elsewhere. In these cases, protection of IP
is accomplished by avoidance of sharing IP information in exchanged traceability data
records. Further, note that marketing or sales intelligence records, as incentive to
participate in the ecosystem, may inadvertently contain proprietary organizational
information, such as what office in what company is purchasing what and how many
goods. Mitigations include de-identifying marketing or sales intelligence records so that
the minimal amount of information which still provides sufficient incentive is recorded,
leaving organizational proprietary information minimized.
• Complementary, and separate from writing and reading traceability data records using an
ecosystem blockchain, ecosystem participants may also want to establish and record IP
ownership (e.g., Digital Rights) using a blockchain. Establishing and protecting IP using
blockchain could be performed using a purpose built blockchain (perhaps distinct from
the ecosystem blockchain) offered as a service to a sector of industry. This is an active
area of research and patent development [47] in industry [48] and academia, and beyond
the scope of this paper.
The interplay between supply chain traceability blockchain records and IP is discussed in Section
7, Future Research Themes.
5.6 Privacy
Privacy, as discussed earlier in the paper, is focused on market or sales intelligence data records
written to the ecosystem blockchain. This is an optional activity as the data records do not
strictly provide or enhance traceability. However, market intelligence records may be needed to
provide incentives to upstream supply chain participants so that they are motivated to write
traceability data records for the benefit of downstream participants, especially those in the end
operating environment. The market intelligence records then provide sufficient incentives to
establish an MVE, and ideally maintain the incentives through incremental growth of the
ecosystem. The term privacy as used here, focuses on Personally Identifying Information (PII).
The privacy risk arises when the market intelligence records (e.g., sales or distribution
information on who is using upstream goods and services) are specific to the extent that
downstream participant information is unnecessarily disclosed to upstream participants.
Mitigations include de-identifying market intelligence records so that the information still
provides sufficient incentive while also protecting PII.
The interplay between supply chain traceability, blockchain records, and privacy is discussed in
Section 7, Future Research Themes.
Supply chain partner identity is required for supporting data exchange regardless of the
28
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
technology utilized (e.g., EDI/VAN, B2B ERP, or blockchain). Blockchain uses public keys (see
Section 4, Technologies Supporting Traceability) which are managed on a per
ecosystem/blockchain basis. Management functions include vetting participants, training
participants how to safeguard their private keys, assuring participants know each other’s derived
public keys, etc. The NIST White Paper, “A Taxonomic Approach to Understanding Emerging
Blockchain Identity Management Systems” [18] describes the components of blockchain enabled
decentralized identity management.
In the case studies below, blockchain identity is established and managed within the pertinent
blockchain ecosystem. This ecosystem-unique identity is sufficient for isolated ecosystems;
however, as discussed above, some blockchains will start to intersect. At this point, if traceability
records (and market intelligence records) are to be exchanged across ecosystem boundaries, then:
(a) Ecosystem identities must be mapped to maintain coherence. For example, if participant
A is included in two ecosystems which start to intersect, the key for A in the first
ecosystem may be different from the key for A in the second ecosystem, unless the
independent governances for the two ecosystems coordinate. When a traceability (or
market intelligence) record is exchanged, the attribution in the exchanged data records
from the first ecosystem should be matched (with proof) to the same participant in the
second ecosystem.
Or,
(b) Participants from both ecosystems must use a common shared identity scheme provided
elsewhere.
Complicating traceability is the path of goods through logistics partners. Thus, traceability needs
to track goods and services not only through supply chain participants, but also tracked through
steps in the logistics process. This may be needed for fine grain provenance information (e.g.,
countries visited) if goods and services are of a sensitive nature.
5 Home - Sovrin
Full disclosure, MITRE is a steward of a test node in the Sovrin Network
6 Sovrin aligns with European Self-Sovereign Identity Consortium (ESSIC) in order to enable a network-of-networks. - Sovrin
29
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
The distinction between global identity networks is establishing trust to attract participants and
build the network. In the case of Sovrin, the constituency is primarily North America, and ESSIC
is primarily European. Further, there is cooperation among identity providers to provide trust
across the internet, via entities such as Trust over IP 8. For example, Evernym (who operates
Sovrin Network) is a Steering Member of Trust over IP.
While the Sovrin and ESSIC efforts help to establish identities for individuals via ID wallets,
institutional ID wallets are still in their infancy with complex topics to solve such as delegation
and replacement of individuals associated with organizational ID wallets.
30
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Industry case studies were used to learn about current and emerging efforts which are using
blockchain and related technologies to improve traceability of manufacturing supply chains. The
community of interest discussions and elicited case studies form the basis of recommended
research in Section 7, Future Research Themes. The case studies are viewed and analyzed
objectively and subjectively with selected mental models (further explained in Section 6.7) to
establish a means of comparison to discover findings of similarities and dissimilarities. Peers,
subject matter experts, stakeholders, industry leaders, each have offered considerable insights to
this process.
This section opens with a summary of each case study, including the goal of the project, who
was involved, and the technologies utilized to address the problem. The full case study
submissions are in Appendix C of this paper. The remainder of the section addresses the
analysis methodology and a summary of its resulting discussion.
The goal of the Field-to-Fork initiative was to improve the yield of gluten-free raw materials as
they are processed through the supply chain from supplier to consumer. Because the product
needed to be gluten free, the process required a purification step. However, the supply chain of
the raw materials was not designed to ensure 100% purity of the raw material, which means the
raw material needed to be processed and filtered to a 100% purity level at the manufacturing site.
Additionally, the supply chain was not designed to capture the transformed state of the material
as it moved through the supply chain. As a result, the current process resulted in a significant
amount of wasted material thus leading the company to research other technologies to improve
the yield of the gluten free product. The research resulted in a process that did not utilize
blockchain, but instead built a material ledger developed with a graph database to capture the
relationships of the material flow.
The Sky Republic case study includes four different Proofs of Concept (PoC) that were
conducted with SITA [49] in 2020. The efforts focused on four different aviation supply chains:
Aircraft MRO Track & Trace, Aircraft MRO Digital Passport, Air Cargo Shipment EDI/IoT
Tracking, and Air Cargo ULD Interlining. Each of the participants within each PoC had their
own process they wanted to improve. For example, in the Aircraft MRO Track & Trace PoC, the
airline wanted to improve detection and mitigation of disruptions and OEM wanted to improve
retrieval of operational and configuration data related to the parts to accelerate repairs. Each of
the four projects aimed to demonstrate that a blockchain-based platform can provide end-to-end
automation, visibility, and transparency for supply chains more efficiently than legacy
technologies and infrastructures. The participants followed a set of guidelines which included:
identify business benefits, define the prototype to be experimented, develop, integrate, and set up
prototypes, experiment with actors utilizing the prototype, and finally, a post-mortem analysis.
As described in the Guardtime Federal questionnaire, each participant submitted a case study for
31
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
a blockchain pilot they conducted to ensure traceability in the Prime’s digital supply chain. The
Prime’s driver behind implementing a blockchain-based solution is that the company’s computer
networks, the software supplier’s networks, and the Prime’s customer, the Department of
Defense (DoD), provide critical information even on unclassified networks. Blockchain offers an
opportunity to layer on additional data integrity to further enhance existing measures. Guardtime
Federal provided the platform for this additional layer and incorporated their own digital
integrity and digital provenance solutions like the KSI® Calendar. The KSI® Calendar acted as a
public, widely witnessed, common anchor that utilized hash functions to verify the provenance
and integrity of the digital supply chain data.
6.5 MediLedger
The MediLedger project was conducted in response to a Food and Drug Administration (FDA)
request for pilots addressing the requirements of the Drug Supply Chain Security Act (DSCSA).
Compliance means that package-level tracing and the interoperability among systems enabling
the tracing will drive technology enhancements. Industry stakeholders have been engaged since
2017 exploring achieving interoperability with blockchain technology. The pilot project tackled
the challenges of interoperable systems tracing a saleable unit and the homogenous case
packaging levels. The report [19] covered the findings of the 23 participating entities from the
pharmaceutical domain. Their ten findings cover a range of concerns including how blockchain
technology can enable transaction verification, authenticity validation, and expediting suspect
investigations while keeping transactions fully obfuscated, i.e., confidential, transactional
privacy, and ensured immutability. Social constructs addressed include governance from the
industry, strong participation and adoption from stakeholders, and pursuit of additional standards
agreements. For the blockchain technology employed, a single blockchain solution for the parties
9 The label of digital thread is useful for the information flow in a product’s lifecycle and supply network [56]
32
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Auburn University’s RFID Lab conducted a proof of concept targeting challenges of tracking
RFID serialized data pertaining to products moving from brand distribution centers to retailers
[20]. The proof of concept employed blockchain technologies and included a step to standardize
data streams. The GS1 Electronic Product Code Information Services (EPCIS) [50] standard
allowed data from numerous company systems to post transactions to the blockchain solution.
Some participants produced data streams for the EPCIS standard while others relied on an AU-
developed translator. Among the findings of the proof of concept are opportunities valued at
$181 billion associated with claims processing, shrink, and counterfeiting.
Additionally, Auburn University and others conducted previous research, which is also relevant,
and described below:
Traceability of IoT Devices [22]: The authors proposed integrating blockchain technology to
authenticate resource-constrained, low-cost edge devices for the Internet of Things (IoT). Static
Random-Access Memory (SRAM) based physically unclonable functions were used to generate
unique and unclonable device IDs. Registered manufacturers can upload a cryptographic hash of
each device ID in a permissioned blockchain instance managed globally. The end-user needs to
read the ID of a new edge device and search the ID hash in the blockchain before registering it in
the IoT infrastructure.
6.7 Methodology
The methodology used for the case studies has two phases. The first is case study knowledge
acquisition, and the second is case study analysis. Throughout the acquisition and analysis of
case study knowledge, considerations for future research topics are captured for further
discussion in Section 7, Future Research Opportunities. Peers, subject matter experts,
stakeholders, industry leaders, each have offered considerable insights to this process.
Two phases were used to illuminate the topic of manufacturing supply chain traceability; based
on the goals of this effort and the current environment of supply chain risk as described in
previous sections and references. The goals of high engagement and building a community of
interest were drawn from the purpose of discussing and ratifying key issues experienced in
practice. For this reason, a broad aperture accompanied by means of synthesis, pointed to
collecting case studies and applying mental models to their combined characteristics.
33
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
The first phase, case study knowledge acquisition, yielded submissions from several
organizations representing a range of stakeholders in supply chain security. Industries
represented were agriculture, aircraft manufacturing, software development, OT/ICT solution
providers, distribution, and retail, pharmaceutical, and industry consortia.
The second phase, analysis of the case studies, produced a discussion with suitable context for
needs and industry perspectives.
The authors sought to engage organizations that represent a variety of industry sectors and sizes
in their effort to collect case studies. Beginning with a series of events in 2020 and continuing
into 2021, the authors engaged an active Community of Interest (COI) whose makeup consists of
individuals and organizations that hold a high degree of blockchain expertise, to elicit
knowledge, to share insights, and to request participation in the case study process.
The authors began by developing a series of questions that were designed to capture an
organization’s experience(s) deploying blockchain and related technologies for manufacturing
supply chain traceability. Once the questions were finalized, a COI meeting was held March 30,
2021, to provide attendees with an overview of the questions, and of the case study collection
process. Attendees who expressed interest in submitting a case study were emailed the list of
questions for response.
Once the authors collected responses, the authors held semi-structured interviews with each
submitting organization to elaborate upon or clarify submitted content. All notes taken by the
authors during these semi-structured interviews were combined and sent back to the interviewee
for review and final sign-off.
Case study content in this publication represents the views and perspectives of the submitting
organizations themselves, and not necessarily that of NIST. The authors’ goal was to hear from
industry and to do a deep dive into the experiences of a few organizations who have deployed
blockchain and related technologies for manufacturing supply chain traceability, their tactics,
their challenges, and their lessons learned.
The full case study submissions and analysis notes can be found in the Appendices C and D.
The second part of the methodology, mental model viewpoints, 10 is built from a selection of
works that describe or organize by simplifying reality to promote understanding. The expectation
is that perspectives that the models or lenses evoke lead to candidate topics worthy as key issues
10
Using mental models to explore has a tradition that can be reviewed starting with Senge [23], with a summary of his titles at
Bui [24]. There are many branches of this network of literature, Google Scholar reports 71,975 citations for the 2006 work,
as of 4 Jun 2021. In this spirit, models from across disciplines were used as means of understanding aspects of the case
studies. An additional motivation is the discovery of intersections as described in Johansson [25] in which deliberate
intersections of disciplines reveal potential for innovation.
34
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
or research areas. The resulting proposed topics may be stated as loosely formed hypotheses,
challenge statements, driving industry characteristics, or simply thought-provoking discussion.
The mental model process is listed below and includes references to summaries and analysis
notes from completing the activities:
a. Select models with promise for illuminating some aspect of manufacturing supply chain
traceability. Selections are summarized in Section_6721 and further explained in Appendix
B.
b. Summarize and use keywords among the case studies to present and characterize the set of
cases. Analysis notes from this activity are found in Appendix D.
c. Step through each of the models selected and qualitatively discuss its application across the
cases. Discussions are summarized in Section 6.7.2.2 and analysis notes are found in
Appendix E.
d. Synthesize observations into candidate future research topics. Candidate topic discussions are
found in Appendix E and the results are integrated in Section 7.
In the first step (select models), the list of potentially useful models would undoubtedly fill many
volumes. The basic description of the models proffered and the reasoning for choice are
addressed in this section. Appendix B contains additional discussion of the models and their
relevance.
NIST Draft Special Publication 800-161 [1], addressing risk in cyber supply chain scenarios,
includes two important, foundational, and descriptive models that together aid in framing the
proceeding discussions across other models. The first perspective orients the acquirer, and the
second perspective frames the assessment process.
These two perspectives are described in Appendix B. They are important to the synthesis of case
studies because they highlight an organization’s risk exposure due to its internal information, its
relationship information, and the importance of being open to advantages in sharing what would
otherwise be guarded, when seeking a safer ecosystem of operations among manufacturers and
suppliers. The trade-off between guarding and sharing data traces to risk management practices
performed within organizations. Supply chain risk and data sharing concerns are expected to
surface in case study submissions and can aid in synthesis across the collection.
Pace Layered Architecture & Adoption Curve
The lenses of Strategic Innovative, Differentiator, and Routine Administrative are loosely based
on Brand’s Pace Layering concepts [26] and Gartner’s Pace Layered Architecture; the
combination of the ideas is described in Isotta-Riches & Randell [27]. These three categories in
turn, dovetail with the technology diffusion model, described in Rogers [28], to provide a model
35
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
The joined perspectives of the lenses (strategic innovative, differentiator, and administrative
routine) and the classic diffusion curve are important to the synthesis of the case studies because
they create a basis for compare-and-contrast exercises. A case study submission may explicitly
state its strategic imperatives, or a reader may be able to discern them. The combined positioning
may enlighten differences and similarities, presenting possible explanations or predictions of
need, such as alleviating barriers to entry.
Gharajedaghi [29] describes casting opposing tendencies in social systems as dimensional, a case
where more of both tendencies creates the win/win scenario: the <and> rather than <or>.
Similarly in economics, the concept of a PPF [30] illustrates how, even when it seems that
production of one thing results in less of another, i.e., <or>, more of both are feasible. This
concept is due to the introduction of technology or other factors that improve the capacity of
production.
The importance of this perspective is to avoid assumptions of mutual exclusivity and encourage
the possibility of two seemingly opposed concepts potentially coexisting. For example, two
opposing concepts that are frequently juxtaposed are sharing data versus protecting data.
Intermediation, Disintermediation, Classic Make/buy
A useful marketing domain concept is the disintermediation effect, often provoked by disruptive
technology or a quality of an environment prone to disruption, and movement through a cycle of
intermediation, disintermediation and reintermediation [31]. For a discussion specific to the
disintermediation portended by blockchain see Quiniou [32]. Space for new products or services
follows and presents manufacturers with new scenarios for make-versus-buy strategic decisions.
This perspective is important to the synthesis of the case studies because new and emerging
forms of services and products related to supply chain traceability are potentially reported.
These may benefit from consideration of their overall impact on the supply chain.
Centralized and Decentralized
This perspective is important to the synthesis of the case studies because aspects of blockchain
tend to be described as decentralized. Additionally, the formation of supply chains can be said to
be decentralized because, in a canonical free market, autonomous buyers and sellers decide to
cooperate. Both ideas are relevant to the discussion.
36
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Even across a few voluntarily provided case studies, a wide variety of activities in supply chain
traceability surfaced. We have settled on a handful of mental models to use as aids in looking
across the case studies for research indicators and precursors to tomorrow’s standardization
needs. Using the models has highlighted potentially market-driven motivations arising from
current supply chain circumstances (e.g., counterfeit products) and classic business drivers for
improved profitability, market share, efficiency, and scale. In this section, each of the five mental
models will be used to structure a conversation spanning the activities of our respondents. Each
conversation concluded with one or more candidate research areas which are provided in
Appendix E.
As a result, research could move to address broader ecosystem views rather than focusing on
whether communities recognize the need for cooperation in contending with supply chain risks
Our respondents easily display the qualities of innovators as well as an appreciation for
technology adoption cycles. The variety of pursuits and experiences in solution and value
seeking included: internally run custom projects with research and development partners,
outsourcing to specialist vendors, and hybrid solutions as the technology expands in use and
incentivizes cooperation. In line with the diffusion model, the strategic minded can forecast
potential market share as the numbers of, and scale of, uses in tandem create profit opportunities.
In turn, reaching larger audiences as well as anticipating needs of new entrants and latecomers
enters the equation of strategic planning.
Traceability technologies can be said to move the PPF such that the Win/Win situation of having
more of both can be realized. For some, this is counter-intuitive because protecting data has
been a traditional method of securing it. As suggested in cases, efforts to share data to protect the
objectives of an ecosystem can encounter a myriad of existing assessments, controls, and
procedures, all enforced at the data owner’s level. The responsibility for data and associated
information can be burdensome as it can reflect IP (such as a bill of materials) or national
security concerns as in export-controlled technology data. While we see from our respondents
their recognition of the value in cooperating to share data across supply lines, there is still the
hard work of determining what information is crucial to the success of traceability efforts.
37
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Opportunities for intermediation are potentially dominant, given the experiences described by
our respondents. These discussions surfaced:
• Intermediation resulting from potential profitability for companies offering supply chain
traceability solutions that include operations.
• An external operator of a blockchain solution can be attractive, where teaming of
companies is variable and commonplace, as in government monopsony conditions.
• Strengthening existing intermediators as their roles in data collection are enhanced, such
as co-ops.
• Willingness to outsource on the part of supply chain participants. As technologies mature
and solution sets become more complete, innovators and the subsequent majority of
interested adopters may see outsourcing as viable to strategy.
Fewer suggestions of disintermediation surfaced. These primarily relate to existing security
measures that are displaced by improved circumstances of traceability. Examples are improved
physical-component identity reducing physical security roles and un-needed administrative
services for tracking and responding to supply chain discrepancies. The degree to which
displacement of currently profitable roles is portended appears overshadowed by the
opportunities to fill solution niches.
Defining decentralization, on its own footing, begs for research into its semantics and
application. Introducing decentralization as a desirable characteristic of traceability solutions
compounds the dilemma.
Our respondents’ businesses have characteristics that can be cast variously as centralized or
decentralized. Farms are both geographically dispersed and regional. Maintenance facilities are
scaled to serve multiple operational units. A dominant buyer is a central figure in a supply chain.
Events with ripple effect have a central point of origin, such as demurrage and other logistics
situations. Responsibility for performance coalesces with the prime contractor. And so on. It is
not clear from our respondents that decentralization, as when used to describe blockchain
solutions, is particularly interesting. Instead, business drivers and strategic commitments attract
attention.
38
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
The future research themes below were synthesized from three activities (see Figure 11) driven
by the methodology described in Section 6, Industry Case Studies & Analysis above including:
• Engagement ranged from large live virtual meetings, down to small group and
individual discussions and asynchronously via email. This activity is called
“Standards and Solution Experts” in the diagram below. The philosophy was to
build on the reality of successes today.
• see Section 6, Industry Case Studies & Analysis and the Appendices capture the
discussions and case studies
• applied the models to the case studies, and extracted take-aways from analysis
• See Section 6, Industry Case Studies & Analysis and the Appendices capture the
discussions and case studies.
39
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
The result is a set of seven broad research areas described below which will address areas of
uncertainty and concern based on traceability activities of supply chain participants today.
The most striking observation is that the case studies indicate a mega-trend toward
participants self-forming ecosystems to share sufficient data records to implement
traceability. Further, some of the ecosystems appear on a path to intersect soon. The path
shows the formation of scale levels of complexity 11, common in natural systems.
o This is most often an enterprise or company which recursively has its own scale
levels. For example, a common information system strategy for an enterprise is to
manage identities internal to and across the enterprise.
o See Figure 4
o This is the scale level of the case studies where a set of participants agree to
cooperate to the extent that they can implement traceability across the ecosystem
(see Section 2.5, Ecosystem Perspective).
o See Figure 8.
o In discussion with some of case study contributors it became clear that some of
these nascent ecosystems will likely need to intersect.
o The goal in connecting and intersecting the identity ecosystems is to further the
reach of identity beyond the original ecosystem. This creates a network of
“global” identity.
The future research topics are organized as themes to support the multi-scale level findings and
listed in Table 2:
40
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Research Opportunity
Identity is core to any ecosystem, and mapping identities across ecosystems is critical to
Identity
enable networks of ecosystems, and for traceability to scale as well. See Section 5.7.
Message Traceability is expressed as data records, and the semantics and syntax must be agreed
Content upon within an ecosystem and understood or mapped across ecosystems (similar to the
Standards “global” identity network discussion above).
In addition to identity and traceability data records, the ecosystem needs participants to
achieve an MVE.
Barriers to Entry
Minimizing barriers to entry is key to maximizing participation which benefits not only the
affected participant, but the ecosystem and network of ecosystems as well.
Supply Chain What are the key aspects of an MVE?
Traceability What types of incentives are beneficial to consider?
Ecosystem How sensitive is the ecosystem to changes?
Ecosystems will start small, and incrementally grow.
Metrics The incremental growth must be driven by metrics which all participants in the ecosystem
agree to use as the basis for development, test, and operations.
Patterns in The implementation of ecosystem identity, traceability records, blockchain, and other aspects
Supply Chain such as off-chain storage will benefit from development of patterns which give future
Traceability ecosystems a jump start to instantiate themselves.
This scale level is where supply chain wide traceability occurs.
Also, many unknowns may surface regarding identity and making the ecosystem-to-
Ecosystem
ecosystem connection.
Scale and
Interoperability As examples: what constitutes the cyber-attack surface of newly interoperating blockchain
ecosystems? What contract requirements are needed to address such types of cyber attacks
including roles and responsibilities?
The seven themes, above, that emerged from the discussions are presented in this section for
consideration for their potential as inputs to research formulation. The following theme
discussions were designed such that they may be restated or developed into hypotheses,
challenge statements, driving industry characteristics, or simply thought-provoking discussion
for a working group. While at the same time there is a cohesion to the set of themes that provides
a sense of completeness as a research agenda, as it progresses from pointed prerequisites
(identity), through emergence of patterns, to anticipation of great scale (ecosystem
interoperability).
7.1 Identity
The theme of identity relates to long standing challenges arising from digital representations in
cyberspace. The digital aspects of accountability and its consequences make the challenges
particularly difficult. Two areas arise: assured links between uncommunicative physical objects
and their data records and likewise, linkage of digital identities to human individuals,
communicating sensors, and organizational entities.
Two aspects of the identity emerging technology field are: 1.) Non-invasive means of marking
physical objects without corrupting them (e.g., cyber-physical anchors), 2.) Privacy respecting
means allowing humans and organizational entities to assert their identities for accountability.
41
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Additionally, identity as linkage to physical objects and human individuals may be very well-
known within an ecosystem but uncertainty may be introduced when mapping across intersecting
ecosystems or by other challenges. Further challenges arise when inspecting parts virtually /
remotely when uncertainties can be introduced. Consider including probabilistic aspects with
identity with potential utilities such as cost functions.
Impacts: Traceability is strengthened when an ecosystem provides: 1.) Provable linkage between
physical goods and data records, 2.) Consistent, repeatable, and understandable means of
establishing and using identity.
7.2 Message content standards
The theme of message content standards encompasses the form and vocabulary for traceability
transactions. What is the minimum set of data elements and the associated message or process
context to support a successful traceability project? Can strategies from previous efforts at design
criteria, such as an hour-glass model [35] serve as guidance? Existing business exchange
standards provide solid footing for incremental improvements, such as the Open Applications
Group Integration Specification (OAGIS), and GS1 EPCIS and Core Business Vocabulary
(CBV) 12.
Context for transactions and requests traversing the supply chain can include: 1.) traceability as
provenance is established and 2.) market intelligence as end operating environments explore
demand. Further, message content should be considered in the context of the supply chain
participant processes that generate and consume these data records. The participants may not
have coordinated processes or messages prior to joining the ecosystem. The act of joining
requires participating in negotiating message content standards. After adopting the ecosystem
messages, increased traceability may have impacts to these processes, and successive iterative
improvements by individual supply chain participants will improve overall ecosystem
traceability.
Impact: Discovering the stable attributes of traceability qualities can potentially improve success
rates and longevity of standards for transaction vocabularies. Pinpointing the necessary and
sufficient alleviates data sharing concerns and avoids translation steps encouraging participation
in supply chain traceability ecosystems.
Our discussions revealed recognition that risks are reduced, and business efficiency can be
improved with cooperation among suppliers, manufacturers, distributors, and end operating
environments. For this reason, removing barriers to entry is particularly of interest in cultivating
successful supply chain traceability ecosystems. Small and niche suppliers can be instrumental in
production scenarios and are courted as sources of innovation. Barriers include:
12 https://www.gs1.org/standards/epcis
42
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
2) the necessity of sophisticated knowledge, expertise, and resources (which may be scarce)
in operating or participating in new solutions, and
Additionally, the quicker that traceability arrangements can be agreed upon, the quicker risk
reduction measures can take effect. Speed to solution can include onboarding procedures for
participants and other ecosystem creation aids such as message content standards and data
sharing agreement templates. Overall, rate of adoption can increase through identification of and
removal of barriers to entry.
Impact: Burdensome supply chain traceability solutions potentially reduce the flow of
innovation and freshness of competition by minimizing participation of start-ups, small, and
niche players.
With cooperation among the supply chain participants comes the emergence of an ecosystem
with scope (or perhaps boundary) commensurate with the participants’ objectives. The
ecosystem draws in levels of commitment from its participants that potentially imply thresholds
for effectiveness. An MVE likely can be characterized in terms both qualitative and quantitative,
such as:
1) degrees of cooperation
2) data sharing
3) connectedness
4) mutual benefit
The governance associated with traceability could have recognizable patterns within its scope of
membership, market share, economic conditions, etc. There are likely dynamics and
complexities that are difficult to characterize. Complexity sciences and study of socio-technical
systems could offer means of quantifying the minimally viable ecosystem, such as with graph
theory metrics and other metadata for modeling and simulation. Existing research contributors
include Chauhan, Frayet, & LeBel [36], Tachizawa & Wong [39], Vernon & Keeling, [38].
Further, consideration should be given to incentives used within an ecosystem, especially when
initializing the MVE. Additionally, roles and responsibilities for ecosystem capabilities need to
be established. This could include outsourcing delivery and sustainment of the ecosystem
blockchain to a third party, and use of industry consortia to negotiate business rules and message
content standards.
Impact: Employing graph theory and exploring connectedness could lead to improved
43
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
7.5 Metrics
For our respondents, measurements in the context of supply chain traceability tended toward
alleviation of business operations pain points and solution performance specifics. The potential
for project management metrics in progress tracking for traceability implementation efforts
which can be applied within a single participant’s scope is also notable. Traceability metric
development drives discovery and measurement of desirable qualities of the MVE, and informs
governance or dashboard displays that relay information about ecosystem operations monitoring
or improvement.
As traceability is implemented across larger regions of the supply chain, metrics will be required
to measure:
2) effectiveness of mitigating supply chain risk associated with individual and combined
traceability efforts.
Impact: Metrics are required to reliably identify traceability gaps, understand sensitivity to them,
and measure progress in addressing those gaps. Measurements of cost and effectiveness could
reveal that traceability is akin to quality measures that tend to pay for themselves in the
avoidance of rework and waste. The more complete traceability is, the more rework and waste is
avoided.
As technology adoption progresses and the business value of supply chain traceability takes
shape with numbers and dollars, emerging patterns make for opportunity to move traceability
from craft to repeatable best practice. As tacit and internal knowledge forms, identifying patterns
is a method of making best practice explicit and further contributes to metrics development and
operational awareness. Patterns in the context of supply chain traceability that would potentially
contribute to repeatable best practice may take form as patterns of use, implementation, and
solution architecture.
1) Patterns of use include collecting conditions that highlight the need for traceability.
Examples could include the phrases such as: As a quality control user, I need to find and
expose introduction of counterfeit components in the supply chain. These patterns of use
start with ecosystem-wide concept development, and drive user stories with individual
stakeholders as they use agile and other methods to update capabilities and how they
interact with the traceability ecosystem.
44
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
3) Architectural patterns arise from the needs of particular ecosystems and how they relate
to the choices from among solutions and the resulting structures. These portend to be
highly strategic, encompassing organizational variations, levels of data visibility (e.g., on
and off chain storage trades), accommodation of industry volumes, membership, and IP
concerns. The glimpse of a potential architectural driver could arise from whether the
ecosystem derives from a strict avoidance of risk or a disciplined business approach to
profit and efficiency. The trade space analysis and success measures are likely different.
Impact: Consistently applied patterns become best practices that can accelerate adoption,
speeding benefit and risk avoidance. Additionally, the pattern that is “supply chain” or is
“supply network” is a driver of scale as ecosystems discover benefit in interoperability. Patterns
may emerge to inform supporting the lifecycle of a product beyond initial delivery.
Implementation patterns that can be expressed as standards can accelerate adoption.
Traceability ecosystems will tend to grow both members, and types of traceability information
tracked, creating new scenarios of scale and interoperability. Such scenarios may relate to
intersections of traceability information needs and to cyber vulnerabilities in expanded surface
area.
As some of these traceability ecosystems grow, they will intersect and need to exchange
traceability information between them. A simple example is where an industrial control
traceability ecosystem and a microelectronic traceability ecosystem both contribute to a nuclear
power ecosystem. In this case, the microelectronics are used in the industrial controls which are
then used in the nuclear power plants (serial exchanges). Other situations could have parallel
exchanges as well.
Once ecosystems intersect and exchange traceability information, either serially or in parallel,
the need for understandability of syntax and semantics arises. The patterns of traceability use
cases may or may not scale along with the activities. New patterns may emerge as the interacting
solutions cope with dynamics of business relationships.
The emergence of great scale among intersecting and interoperable ecosystems introduces a need
for updated definitions of cyber-attack surfaces and exploration of new attack vectors. In one
view, the addition of blockchain solutions layers in complexity impacting characteristics of
system coupling which can lead to trade-offs between resilience and inherent propensity to
cascading attack consequences [57] [58]. Other considerations include:
45
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
• Security and life cycle management concerns associated with dependence on open-source
software [60].
Impact: The mechanics and patterns of linking traceability between blockchain solutions, for
example to accommodate logistics, must ultimately stand up to the demands of multiple end
operating environments and traceability ecosystems. The experience need not be the only
teacher. Experiments, further proofs of concept, modeling and simulation could improve
readiness and cyber resilience. By probing with adaptive models, we may anticipate constitution
of transactions, in scope, identity solutions, content, vocabulary, synchronicity, and perhaps
unforeseen characteristics when market forces and cyber adversaries are on the move.
As an aid in using the themes, Table 3 leads from the themes into specific observations,
applicable literature citations, and probing narratives intended to inform or inspire research
proposals.
Table 3 - References for More Granular Discourse
Theme References
46
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Theme References
47
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Theme References
48
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Theme References
49
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
8 Conclusions
Improving traceability in manufacturing systems holds the promise of mitigating critical risks to
our increasingly interdependent supply chains. Traceability encompasses both pedigree and
provenance assertions about goods and services, and most importantly requires agreement from
the supply chain participants to define and implement a solution. As in many domains of human
activity, traceability agreements can start locally and expand in scope over time.
This paper effort engaged a community of interest (industry, academia, government) who are
actively working traceability challenges, and who offered several case studies. The goal is to
learn what is happening now (as exemplified by case studies), where efforts will go (emerging
trends), and what challenges may be encountered, including these candidate research
opportunities:
1. Identity
3. Barriers to Entry
5. Metrics
The case studies and associated discussion notes are available in full in the appendices, as
researchers may find the source material useful. The cases studies offered a rich variety of
committed supply chain participants addressing traceability using innovative approaches. Several
conclusions arise from the case studies and analysis:
1. The evolutionary path of improving traceability follows the path of forming local
ecosystems to develop and agree on traceability language and establish definitions of
traceability terms in data records exchanged.
b. The tradeoffs between IP protection and privacy are more likely to initially be
settled locally versus supply chain wide, where top-level agreements without
organic lower-level support are likely be over-constrained and difficult to achieve.
c. The benefit of DLT is that the ecosystem can operate redundant nodes to add
resiliency.
d. However, if the ecosystem needs more decentralization due to not entrusting any
one participant with control over the data, then blockchain can be used (ledger +
decentralized control).
3. These traceability ecosystems will soon start to connect and form a network of
ecosystems.
a. This is the trend anticipated in manufacturing supply chains.
The authors of the paper anticipate vigorous and constructive discussion regarding the research
themes, leading to formation of beneficial research efforts. The results of these research efforts
will inform the greater manufacturing supply chain community to:
• enable growth of traceability ecosystems, while reducing barriers to entry
• enable growth of networks of traceability ecosystems as needed
• lead to increase breadth and scope of sharing traceability information for manufacturing
supply chains
Regardless of the numerous research questions to answer, initial observations indicate that an
approach of growing traceability ecosystems enabled by blockchain and related technologies
could contribute significantly to increasing the traceability of manufacturing supply chains.
51
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
References
[1] Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply Chain Risk
Management Practices for Federal Information Systems and Organizations.
(National Institute of Standards and Technology, Gaithersburg, MD), NIST
Special Publication (SP) 800-161. https://doi.org/10.6028/NIST.SP.800-161.
[2] Joint Task Force (2020). Security and Privacy Controls for Information Systems
and Organizations. (National Institute of Standards and Technology,
Gaithersburg, MD). NIST Special Publication (SP) 800-53, Rev. 5, Includes
updates as of September 23, 2020. https://doi.org/10.6028/NIST.SP.800-53r5.
Available at https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final.
[3] Adner, R (2012) The Wide Lens: What Successful Innovators See That Others
Miss (Penguin Group, New York, NY).
[4] Yaga D, Mell P, Roby N, Scarfone K (2018). Blockchain Technology Overview.
(National Institute of Standards and Technology, Gaithersburg, MD), NIST
Internal Report (NISTIR) 8202. https://doi.org/10.6028/NIST.IR.8202.
[5] Khan SN, Loukil F, Ghedira-Guegan C, Benkhelifa E, Bani-Hani A. (2021)
Blockchain Smart Contracts: Applications, Challenges, and Future Trends. Peer-
to-Peer Networking and Applications. pp 1-25. doi:
https://doi.org/10.1007/s12083-021-01127-0.
[6] Thilmany J (2021) Identical Twins. The American Society of Mechanical
Engineers. [Web Site]. Available at https://www.asme.org/topics-
resources/content/identical-twins.
[7] Tian F (2017) A Supply Chain Traceability System for Food Safety Based on
HACCP, Blockchain & Internet of Things. International Conference on Service
Systems and Service Management, (IEEE,7/31/2017), pp 1-6.
https://doi.org/10.1109/ICSSSM.2017.7996119.
[8] Rogaway P, Shrimpton T (2004) Cryptographic Hash-Function Basics:
Definitions, Implications, and Separations for Preimage Resistance, Second-
Preimage Resistance, and Collision Resistance. Fast Software Encryption, 11th
International Workshop (New Delhi, India). pp. 371-388.
https://www.iacr.org/archive/fse2004/30170373/30170373.pdf.
[9] Rusinek M, Zhang H, Radziwill, N (2018) Blockchain for a Traceable, Circular
Textile Supply Chain: A Requirements Approach. Software Quality Professional
21(1):4-24.
[10] Krima S, Hedberg T, Barnard Feeney A (2019) Securing the Digital Threat for
Smart Manufacturing: A Reference Model for Blockchain-Based Product Data
Traceability (National Institute of Standards and Technology, Gaithersburg, MD).
https://doi.org/10.6028/NIST.AMS.300-6.
[11] Dwork C, Naor M (1993) Pricing via Processing or Combatting Junk Mail.
Advances in Cryptography: 12th Annual International Cryptology Conference,
(Santa Barbara, California).
https://web.cs.dal.ca/~abrodsky/7301/readings/DwNa93.pdf.
[12] Hedberg T, Krima S, Camelio J A (2016) Embedding X.509 Digital Certificates
in Three-Dimensional Models for Authentication, Authorization, and Traceability
52
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
53
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
[28] Rogers EM (2004) A Prospective and Retrospective Look at the Diffusion Model.
Journal of Health Communication 9(1):13-19.
https://doi.org/10.1080/10810730490271449.
[29] Gharajedaghi J (2011) Systems thinking: Managing Chaos and Complexity: A
Platform for Designing Business Architecture (Elsevier, Burlington, MA), 3rd Ed.
[30] Lipsey RG (1975) An Introduction to Positive Economics (University Press, New
York, NY: Oxford) 4th Ed, pp. 57-58.
[31] Chircu A M, Kauffman R J (1999) Strategies for Internet Middlemen in the
Intermediation/Disintermediation/Reintermediation Cycle. Electronic Markets
9(1-2):109-117.
[32] Quiniou M (2019) Blockchain: The Advent of Disintermediation (John Wiley &
Sons Incorporated).
[33] Schneider N (2019) Decentralization: An Incomplete Ambition. Journal of
Cultural Economy 12(4):265-285.
https://doi.org/10.1080/17530350.2019.1589553.
[34] Ostrom V “Polycentricity” in Polycentricity and Local Public Economies:
Readings from the Workshop in Political Theory and Policy Analysis. McGinnis
M, Ed. (Ann Arbor, MI: University of Michigan Press, 1999), pp. 50-74.
[35] Beck, M (2019) On the Hourglass Model. Communications of the ACM 62(7):48-
57.
[36] Chauhan, SS, Frayret JM, LeBel L (2009) Multi-Commodity Supply Network
Planning in the Forest Supply Chain. European Journal of Operational
Research 196(2):688-696.
[37] Tachizawa EM, Wong C Y (2015) The Performance of Green Supply Chain
Management Governance Mechanisms: A Supply Network and Complexity
Perspective. Journal of Supply Chain Management 51(3)18-32.
[38] Vernon, MC, Keeling MJ (2009) Representing the UK's Cattle Herd as Static and
Dynamic Networks. Proceedings of the Royal Society B: Biological
Sciences 276(1656):469-476. doi: https://doi.org/10.1098/rspb.2008.1009.
[39] Allison GT, Zelikow P (1999) Essence of Decision: Explaining the Cuban Missile
Crisis (Addison Wesley Longman, Inc. New York, NY), 2nd Ed.
[40] Iowa State College (1957) The Diffusion Process, Special Report 24.
https://lib.dr.iastate.edu/specialreports/24.
[41] Mukherjee N. (2018) Block Propagation, Scaling and Adoption—Maturing
Blockchains. Medium [Web Site]. Available at
https://medium.com/coinmonks/block-propagation-scaling-and-adoption-
maturing-blockchains-99218260b7b8.
[42] Karlsruher Institut für Technologie, DSN Bitcoin Monitoring [Web Site].
Available at https://www.dsn.kastel.kit.edu/bitcoin/videos.html.
[43] European Union Agency for Cybersecurity (2020) Guidelines for Securing the
Internet of Things: Secure Supply Chain for IoT. Available at
https://www.enisa.europa.eu/publications/guidelines-for-securing-the-internet-of-
things.
[44] Bruce, J (2020) Proving the Possible: Introducing the Inrupt Enterprise Solid
Server. Available at https://inrupt.com/enterprise-server-release.
54
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
[45] Cellan-Jones, R (2020) NHS Data: Can Web Creator Sir Tim Berners-Lee Fix It?
BBC News. Available at https://www.bbc.com/news/technology-54871705.
[46] Zidi S, Hamani N, Kermad L (2021) New Metrics for Measuring Supply Chain
Reconfigurability. Journal of Intelligent Manufacturing.
https://doi.org/10.1007/s10845-021-01798-9.
[47] Patent Kinetics (2021) Kim and Inje Blockchain, Smart Contracts, and DRM
Patent Applications. Managing Rights Management [Web Site]. Available at:
https://www.managingrights.com/2021/10/kim-and-inje-blockchain-smart-
contracts-and-drm-patent-applications.html.
[48] Prasad S (2021) The Future of Blockchain in Intellectual Property.
Automation.com [Web Site]. Available at: https://www.automation.com/en-
us/articles/january-2021/the-future-of-blockchain-in-intellectual-property.
[49] SITA [Web site]. Available at https://www.sita.aero.
[50] Electronic Product Code Information Services [Web site]. Available at
https://www.gs1.org/standards/epcis.
[51] SOLID Project [Web site]. Available at https://solidproject.org.
[52] Bingham J, Zagidulin D, Coburn A (2021) Solid Protocol, Version 0.9.00, 2021-
12-17. (W3C Solid Community Group), Available at
https://solidproject.org/TR/protocol#abstract.
[53] W3C Solid Community Group (2021). Solid/Specification [Web site]. Available
at https://github.com/solid/specification.
[54] W3C Solid Community Group (2021) [Web site]. Available at
https://www.w3.org/community/solid/.
[55] Maes R., Verbauwhede I. (2010) Physically Unclonable Functions: A Study on
the State of the Art and Future Research Directions. In: Sadeghi AR., Naccache
D. (eds) Towards Hardware-Intrinsic Security. Information Security and
Cryptography. (Springer, 10/12/2010), pp 3-37. https://doi.org/10.1007/978-3-
642-14452-3_1.
[56] Feeney AB, Simon PF, Vijay S. (2015) A Portrait of an ISO STEP Tolerancing
Standard as an Enabler of Smart Manufacturing Systems. Journal of Computing
and Information Science in Engineering 15(2). https://doi.org/10.1115/1.4029050.
[57] Perrow C (2011) Normal Accidents: Living with High Risk Technologies
(Princeton University Press).
[58] Perrow C (1990) Organizing to Reduce the Vulnerabilities of Complexity.
Journal of Contingencies and Crisis Management 7(3):150-155.
https://doi.org/10.1111/1468-5973.00108.
[59] United States Government Accountability Office (GAO), Weapon Systems
Cybersecurity: Guidance Would Help DoD Programs Better Communicate
Requirements to Contractors, Report to Congressional Committees GAO-21-179,
March 4, 2021. Available at: https://www.gao.gov/products/gao-21-179.
[60] Kamp PH (2014) Quality Software Costs Money---Heartbleed Was Free.
Communications of the ACM 57(8):49-51. https://doi.org/10.1145/2631095.
55
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Section 6.7.2 describes and provides the application of mental models to characteristics of the
case studies. Cases are viewed individually and collectively under the umbrella of chosen mental
models. The body of the paper summarizes key concepts from these models from a variety of
disciplines to present case discussions in a cohesive form. This appendix contains additional
information on the models and lenses employed in the analysis as a complementary resource.
The models and lenses employed are Cyber Supply Chain Risk Management; Technology
Lenses and the Adoption Curve; Win/Win and the PPF; Intermediation, Disintermediation,
Classic Make/Buy; and Centralized versus Decentralized.
NIST Draft Special Publication 800-161 Revision 1 [1] addressing risk in cyber supply chain
scenarios supplies two important, foundational, and descriptive models that together aid in
framing the proceeding discussions across other models. In addition to describing risk as a
function of likelihood and impact, and delving into a comprehensive treatment of risk
management, the NIST authors orient to an organization’s span of control with respect to its
cyber supply chain. The publication presents Figure 12, NIST’s Acquirer Viewpoint, illustrating
the connections between types of suppliers as the acquisition process reaches out successively to
providers. The risk management process is specific to the tasks and interests of a single
organization, in keeping with the need for action at an organizational level. It emphasizes the
progressive loss in clarity across visibility, understanding, and control as the supply chain
expands outward. Consider for example, that at various points on the lines connecting boxes in
Figure 12, there are potentially multi-carrier transportation routes for raw materials, assemblies,
and finished products.
56
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
The publication’s treatment of the risk management process of Frame, Assess, Respond, and
Monitor, places the identification of threat and vulnerability analysis in the Assess step. Data
assets internal to the organization are the object of threats and their exposure the essence of many
vulnerabilities. Several categories of information are cited as in need of risk management
(mitigation of exposure) leading to protective measures. The types of information include
proprietary data, operational data, systems information, product data, payments data, and others.
Relationships are also posed as impactful in threat and vulnerability scenarios involving shared
suppliers, logistics, tier distance, etc. These relationships create an opportunity for improving
visibility while also creating additional data assets. Particularly for the intended federal audience,
this publication’s models of analysis serve as useful means for identifying protective measures,
which include an emphasis on supply chain information sharing related to risk experience across
a sharing community to leverage its collective knowledge. [1] (pp. 38-40).
Allison and Zelikow [39] refined an analytic approach based on the idea of a lens that captures a
particular perspective and context useful in portraying and characterizing historical events. This
section selects three lenses for technology, characterizing each as a layer in its potential value or
impact to an organization.
The lenses Strategic Innovative, Differentiator, and Routine Administrative are loosely based on
Brand’s Pace Layering concepts [26] and Gartner’s Pace Layered Architecture; the combination
of the ideas is described in Isotta-Riches & Randell [27].
Figure 13, Characterizing Value and Impact with Lenses, presents each lens with a short
57
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Viewing a technology or combination of technologies with the Strategic Innovative lens allows
exploration of the potential for market-disrupting improvements that traceability technologies
represent on a wide scale. Operating scenarios with this lens include an experimentation tempo
within research and development functions. Results are quickly parsed for keepers and
implemented on some scale. Brand originally described activities at an extreme pace, with multi-
directional characteristics, as being on the order of changes in fashion [26] and this view is
extended to include experiences in the presence of disruptive technologies potentially used in
innovative ways. These discussions revolve around strategic use of supply chain traceability to
further strategic goals of an organization:
• accounting for classic business model rationales, such as degree of vertical integration,
roles of intermediators and conversely, disintermediation
• casting service providers and suppliers in roles that vary in centralized and decentralized
characteristics
The Differentiator lens refers to the skills and technology tools that establish a competitive edge
for companies and organizations in their domains. These skills and tools set an organization apart
from its competitors and/or adversaries. They may include tactics, techniques, tradecraft, or
technologies specifically developed in the organization and may be subject to professional non-
disclosure agreements or other industrial security measures. These skills and tools are carefully
curated; however, responsiveness is a factor because of competitive or adversarial pressures and
the pace of development quickens as a result. Measurements are devised and introduced as
consistent improvement in quality and/or efficiency is to be demonstrated.
The Routine Administrative lens refers to internal, administrative functions that are fundamental
to the accomplishment of everyday or foundational tasks. A high bar of performance is expected
in these types of tasks, because without them, an organization’s activities would fall short in
accomplishing their objectives. Change comes slowly in this foundational area as these tasks are
often based on the commonly accepted principles of a domain and have withstood the test of
time and careful refinements. They can be barriers to entry, in terms of ability of contenders to
join the domain. Additionally, though at a slow pace, tasks such as these are typically subjected
to continuous process improvement toward maintaining efficiency and effectiveness. Thus,
performance metrics and close cost accounting can be part of managing these kinds of routine
tasks.
58
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
The maturation of an innovation in the direction of a utility and the effect of the innovation on
the competitive environment, lead to motivations across communities to adopt the technology
and its corresponding skills and metrics. The innovation adoption lifecycle (an interesting start
for background is the 1957 Iowa State College special report [40], as pertains to agriculture) may
be a helpful way to conceptualize about movement toward traceability technology in conjunction
with that technology’s maturation. Rogers [28] defines diffusion as:
59
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Gharajedaghi [29] (pp. 30-40) describes casting opposing tendencies in social systems as
dimensional, a case where more of both tendencies creates the win/win scenario: <and> rather
than <or>. Similarly in economics, the concept of a PPF [30] illustrates how, even when it
seems that production of one thing results in less of another, i.e., <or>, more of both are feasible.
This concept is due to the introduction of technology or other factors that improve the capacity of
production. This shifts the frontier revealing an area under the curve that represents efficiency to
be gained at given levels of production. Error! Reference source not found., Win/Win and
PPF, applies these concepts to the employment of blockchain (and are generalizable to other
technologies).
60
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Produc�on
Possibility
High = Win High = Win Fron�er
with
Low = Lose High = Win Blockchain
The win/win and PPF models open possibilities in protecting data and sharing data that create
ecosystem value as employment of blockchain influences risk assessments. This perspective is
important to the synthesis of the case studies because the consideration of additional and/or
reduced sources of risk differ when considering technology. Risk perceptions among the case
study submissions are expected to vary based on industry. Discussion of the variations in
perception and the variation in sources of risk present a means of discovering research worthy
topics obscured by assumption.
This section presents the idea of market mediation and the potential for traceability in creating
new make/buy possibilities for supply chain participants.
For some use cases in supply chain traceability, blockchain technology may create mediation
disequilibrium. For blockchain, the combined benefits of cooperation and decentralized
resilience create a trust bond among participants which acts to eliminate the need for a central
intermediary, perhaps an authoritative source, responsible and accountable for trust in the
system, if one already exists. In the marketing domain, this would be described as a
disintermediation effect, and thus, presents an environment prone to disruption, or movement
through a cycle of intermediation, disintermediation and reintermediation [32]. The disruption
occurs as intermediary roles (such as a service provider or broker) are made obsolete or changed
significantly by actors attracted to or nudged out of the marketplace or industry.
For a discussion specific to the disintermediation portended by blockchain see Quiniou [32].
Quiniou reports the blockchain’s automation becomes a substitute form of mediation. He draws a
61
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
parallel between the disintermediation driven by the enabling technology of the internet, which is
now followed by reintermediation. Those that employed the benefits of directly connecting
members of communities (e.g., buyers and sellers, via the internet) to their advantage are
positioned to grow. Exploiting the substituted automation becomes fertile ground for vertical
integration to achieve further competitiveness or control (pp 52-54).
Likewise, in situations where no intermediaries play a role in the supply chain, one may be
attracted, perhaps for the task of collecting data or supplying sensor readings. New
intermediators whose constructions of control, attraction, and exchange of assets create new
forms of sharing environments that in turn can require new skills, tools, and visibility needs. The
space for these new products or services presents manufacturers with new scenarios for make-
versus-buy strategic decisions.
A classical view of decentralization is simply the shape of a particular network that resembles
(B) in Error! Reference source not found., Visuals of Decentralization, with critique from
Quiniou (p.9) at (B.1) observing that the absence of the circled node severely disables the
network. An observation from Schneider adds that the pattern of nodes and edges in (C) more
closely capture a “…maximally redundant and egalitarian distributed mesh” [33] (p.15). Further,
Mukherjee describes the propagation of block transactions to the destination databases in a
blockchain [41]. A network depiction of the propagation mechanism could look like (D) in the
figure; however, the dynamics of network use are obscured in favor of the conceptual structure.
More realistically, animations of block propagation are presented in DSN Bitcoin Monitoring
[42].
62
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Polycentricity is described by Ostrom [34] in the field of public administration as the naturally
arising interaction of otherwise formally independent decision-making centers (p. 52). Rather
than describe the pattern as decentralized, since it did not begin as centralized, polycentric
became the modifier. “Multinucleated” was also considered (p. 50). This perspective highlights
the semantic confines of describing a condition as something it is not. It also alludes to the
possibility that emergent behavior across previously unrelated centers of activity can result in
systems of interaction. These systems of interaction may be transient or more permanent in
nature. The behaviors of entrepreneurship and supply chain building may have similar qualities
in the private sector.
For this attempt to surface topics of interest, it is perhaps a case study’s characterization of why
(or even if) traceability decentralization is considered to have business value. This contrasts with
an attempt to align an organization’s one or more operational aspects as being suitable for
decentralization. A result may be that resilience to stressors could be a better way to talk about
the expected value of decentralization, e.g., mitigation of risk.
This perspective is important to the synthesis of the case studies because aspects of blockchain
tend to be described as decentralized. Additionally, the formation of supply chains can be said to
be decentralized because, in a canonical free market, autonomous buyers and sellers decide to
cooperate. The subject matter pertaining to a discussion of centralization and decentralization,
i.e., the generalizable ideas, can quickly become entangling. In a comparison of what makes a
blockchain decentralized and what makes the formation of supply chains decentralized, the
ambiguity of the term begins to surface. The decentralized characteristics of blockchain are its
distributed databases and its lack of a center of control since updates are made by consensus. In
supply chain, as buyers and sellers connect to achieve profitable production levels their decisions
are independent, and they operate within agreed-upon norms. With this brief comparison of ways
to interpret decentralization, an invitation to explore the topic arises.
64
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Case Studies in Manufacturing Supply Chain Using Blockchain and Related Technologies
DISCLAIMER:
Traceability in the supply chain requires integrity and trust in the digital data used throughout
the supply chain process. A supply chain’s digital data, no matter if the supply chain is
physical, software, information, or some combination of these three types of supply chains,
necessitates integrity protections at every step throughout the supply chain to ensure the
resultant end item is authentic and free from unauthorized manipulations, disruptions, or
modifications. Confidentiality and availability cybersecurity protections such as encryption
and cloud-based architectures do not guarantee digital integrity of data in a federated supply
chain system that crosses organizational and domain boundaries. Guardtime Federal’s unique
implementation of blockchain establishes a common anchor of trust throughout the supply
chain to assure digital integrity and provenance thereby achieving traceability for physical,
software, and information supply chains.
To assure digital integrity and provenance in the supply chain, Guardtime Federal’s unique
implementation of blockchain technology enables mathematically provable digital integrity
and provenance solutions that rely only on secure hash functions, cryptographically linked to a
public, widely witnessed, common anchor of trust known as the KSI® Calendar. By signing
the fingerprint of digital data using KSI Signatures, digital information is immutably linked to
the KSI Calendar and enables integrity verification of that data at any time in the future across
any organizational or domain boundaries. KSI Signatures and participation in the KSI
65
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Calendar do not require a supplier, manufacturer, or end user to share any of their data with
Guardtime Federal. Data remains completely private from the KSI Calendar and in the control
of the supplier, manufacturer, and end user. Only the supplier, manufacturer, and end user
decide what information is shared with the rest of the supply chain.
Recognizing that the supply chain includes information from defense industry manufacturers
that is proprietary, sensitive, or even classified data, Guardtime Federal developed a purpose-
built security gateway appliance called a Black Lantern®. The Black Lantern gateway is
designed to operate on the boundary of sensitive and classified networks enabling access to the
KSI Calendar for signing and verifying KSI Signatures on classified networks. This gateway
device establishes a common anchor of trust for the supply chain between unclassified and
classified networks. The Black Lantern is designed with the required security protections in
place for accreditation and operations on the boundary of sensitive or classified network
domains. Like the KSI Calendar, a Black Lantern Appliance never receives any customer data
as only the unclassified cryptographic hash of the data is passed through the Black Lantern
gateway to the KSI Calendar.
Technological
Non-Technological
traceability in [the] case of an adverse event and is critical for understanding and mitigating
risks,” a recent Government Accountability Office (GAO) report (March 2021) found that the
Department of Defense (DoD) “does not specifically address how acquisition programs should
include cybersecurity requirements” on their contracts. While the Department of Defense has
developed instructions, policies, and regulations to address supply chain risk management, the
GAO report emphasizes that “contracting for cybersecurity is key.” Without establishing
cybersecurity requirements as contractual acceptance criteria for DoD acquisition programs,
digital integrity and provenance in the supply chain is program dependent or, in some cases,
non-existent as the GAO discovered when they identified multiple contracts that did not have
any cybersecurity requirements on contract. Without contractual cybersecurity requirements,
supply chain traceability is negatively impacted by the lack of sufficient digital integrity and
provenance controls that enable traceability throughout the supply chain.
The DoD continues to make significant investment in its digital transformation and increasing
reliance on digital information for timely and informed decisions made both on the battlefield
and inside the Pentagon. From sensors to artificial intelligence to digital engineering, the
DoD’s Data Strategy, released in September 2020, directs that “it is the responsibility of all
DoD leaders to treat data as a weapon system and manage, secure, and use data for operational
effect.” In order to achieve a data-centric organization, the Data Strategy identifies seven goals
for the DoD related to data. Data trustworthiness as one of the seven goals is achieved when
the “DoD data has protection, lineage, and pedigree metadata bound throughout its lifecycle.”
In other words, trust in data is achieved when provenance and traceability can be irrefutably
verified throughout its supply chain and operations lifecycle. While the agency’s data strategy
was published well after Guardtime Federal started developing digital integrity and
provenance solutions for traceability in the supply chain, DoD’s Data Strategy further
validates and confirms that digital integrity and provenance are critical enablers for making
data trustworthy through the entire supply chain lifecycle.
Lessons Learned:
Integrating digital integrity and provenance technology into established and existing supply
chain processes and infrastructure may seem daunting at first. Guardtime Federal has
integrated digital integrity and provenance technologies into supply chains, and one of our best
practices from these integrations is to focus on those supply chain processes that are most at
risk or require significant resources if a failed part or software vulnerability is identified. By
focusing on those critical systems and processes, the prime manufacturer and their suppliers
can implement traceability with accuracy at those steps in the supply chain process that are
most at risk. Ultimately, a supply chain that has integrated integrity and provenance
technologies into their processes for traceability can realize a return on their investment by
reducing the labor cost required to identify affected systems, compliance and quality control
verifications, and auditing if and when a defect, vulnerability, or counterfeit part is discovered
67
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Lessons Learned:
Another best practice for supply chain traceability is signing the attestation of new or updated
supply chain data as close to the source of that information as possible and verifying the
integrity and provenance as close to use as possible. By signing and verifying information
early and often, this enables a higher fidelity of traceability throughout the supply chain if a
defective part or software vulnerability is discovered. Upon discovering a defect, Guardtime
Federal’s integrity and provenance technology can then be used to determine which step in the
supply chain process introduced the defect or vulnerability and contribute to a root cause
analysis for determining if the defect is a result of unauthorized modification or manipulation
of digital information used to support the supply chain.
Referenced Materials:
NIST Special Publication 800-161: Supply Chain Risk Management Practices for Federal
Information Systems and Organizations—
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-161.pdf
68
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Case Studies in Manufacturing Supply Chain Using Blockchain and Related Technologies
Author(s):
Anonymous
DISCLAIMER:
Prime Contractor development networks and those of software suppliers and Department of
Defense (DoD) customers provide critical information within unclassified networks. Although
there are significant data integrity technologies in use, blockchain technologies offer an
opportunity to layer on additional data integrity to further enhance existing measures. The
challenge is employing an end-to-end data provenance technology from software suppliers
though the supply chain to the end customer platform.
A prime contractor will continually strive to innovate the state-of-the-art technologies used in
platforms, products, and services. Key attributes blockchain technologies offer over existing
data integrity technologies are the immutable ledgers, and cryptographic strength in some
solutions.
A contractor must invest in technology it anticipates the end customer will eventually need
while differentiating itself from competitors by adopting advanced technology early. After
evaluating several promising technologies which utilized blockchains, the prime contractor
opted to partner with Guardtime Federal and their Keyless Signature Infrastructure (KSI®) for
these reasons:
69
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
The prime contractor integrated KSI® into the software development process from the
reception of supplier software deliverables, through the process referenced as Software
Factory, to the transport mechanism of an air vehicle. Verification of the entire
software delivery process for select aircraft data loads was demonstrated, with an
intended follow-on focus of software operational flight programs (OFPs).
Technological
Identifying a starting point for KSI® technology insertion into a network of networks is a
formidable task considering the number of enterprise and program networks operated by the
prime contractor. The first effort was to develop a comprehensive block diagram depicting
how enterprise networks are connected, and then partnering with Guardtime Federal, a plan
was developed to integrate KSI technologies in the prime’s networks. Block diagrams were
used to identify where supplier networks connected to the prime’s enterprise network (on the
left) and interfaced customer networks (on the right). Areas in the network diagram were
identified for subsequent KSI® integrity verification. An attractive feature of KSI®
technology is that each integration builds upon previous integrations. A chain of verification
points as the data file transits through networks establishes a chain of custody called data
provenance.
Next, for initial deployment was to identify which data files or types were most critical
needing additional data integrity. Various types of mission data files were evaluated and
targeted for KSI® technology insertion. Questions posed included: What are the number of
data files? Should all data files of a type be signed or select specific data files to apply KSI®
signatures? The data files, whether unclassified, but especially if classified, must remain
within data network. KSI® uses only hash-function cryptography, allowing verification to rely
only on the security of hash-functions and the availability of a public ledger (commonly
referred to as a blockchain) and not the data file itself. The program data is never in the ledger,
just a hash of the data. Using Guardtime Federal’s unique blockchain technology, the
contractor’s data remains within the prime’s network and is key to why KSI® blockchain
technology is a best fit for DoD applications.
Additional considerations were ease of effort of KSI® integration, hours required to integrate,
and to be non-intrusive to existing development efforts. Even with program and subject matter
expert support for integration, normal production operations cannot be adversely affected. The
KSI® application layer (KAL) tools the prime contractor developed using Guardtime Federal
SDKs had to be flexible to handle multiple use cases. The KAL tools were created to run in
the application layer with limited human interaction and are deployable to all networks, not
70
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
being limited to a single platform or program. The scalability and reusability of KAL tools is
precisely the information protection technology the DoD desires.
Non-Technological
The prime contractor identified software suppliers of significant data files and designed trials
with these suppliers, to use KSI® technology to sign their data prior to delivery to the prime
contractor. The suppliers willing to conduct the trials provided valuable feedback which
matures the Guardtime Federal SDKs and verifies the tools handle all conditions and
architecture types.
Technological
There were no technological issues which couldn’t be overcome by the ingenuity and
familiarity of network architecture by the prime contractor cyber architects. Some solutions
were deemed not desirable because they would require additional hardware or more budget
allocated to integrate prime contractor’s tools into the system, but all technical challenges
encountered had at least one viable solution proposed.
Integration of new technologies into a network infrastructure can be a challenge when the
technology is unfamiliar to those responsible for security and IT. The prime contractor
planned to install a Guardtime Federal-developed hardware appliance called a Black Lantern
onto the prime contractor corporate network. Black Lanterns are a purpose-built gateway
appliance that allows protected or even classified networks to sign and verify data using the
KSI® Calendar as a common trust anchor. Although physically connected between two
networks, Black Lanterns only move cryptographic hash values of the data. To integrate the
71
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Black Lanterns into the prime contractor network, several meetings were held with prime
contractor security and IT SMEs who initially characterized the Black Lantern as a “cross-
domain solution” (CDS) since it connects two networks at different classification levels. The
prime contractor and Guardtime Federal team developed a concept of operations document for
the using the KSI® technology in a classified environment that identified use cases for the
technology and the technical details of Black Lantern operations. By documenting the
capabilities and operations of the Black Lantern, the concept of operations document served as
a source document for terminology and technical details for all subject matter experts to
integrate the Black Lantern and KSI® technology into the prime contractor network.
Non-Technological
Complex programs with separate integrated product teams (IPT) make deployment of KSI®
tools and technologies complex as well. Prime Contractor KSI® project managers must
establish relationships with each IPT and understand their production schedules and staffing,
how their cyber architecture fits within the larger air system, and what budget complexities
exist within each IPT to incorporate KSI® technology even when all other roadblocks are
eliminated.
A challenge for software suppliers may be that they don’t know which blockchain technology
to adopt for their various customers. The prime contractor software suppliers were informed of
the prime contractor-Guardtime Federal partnership and intent for KSI®-signed software
deliveries at a supplier conference in 2020. KSI® technology development at the prime
contractor was aligned with Sustainment imperatives for future growth. All programs and
platforms have access to KSI® technology and customer outreach is informing the DoD of the
benefits of the prime contractor-Guardtime Federal solutions available today.
Military commanders at all levels rely on data from trusted sources and at various
classification levels as the foundation for informed and actionable decisions. Data exfiltration
and, even more so, data manipulation are a threat to undermine the trust of this foundational
data. When implemented to protect the data privacy and support development and operations
in a multi-level security environment, blockchain and distributed ledger technologies are a
72
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
viable solution that support not only the traceability of the manufacturing supply chain but
also the information supply chain for that weapons system through operations. By integrating
the integrity and provenance technologies as intrinsic elements of the weapon system from
development to operations, the data provided by this weapon system becomes a trusted source
with verified integrity and provenance for decisionmakers at all levels.
73
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Case Studies in Manufacturing Supply Chain Using Blockchain and Related Technologies
Author(s):
DISCLAIMER:
This submission deals with case studies related to 4 Proof of Concepts (PoCs) which were
conducted by Société Internationale de Télécommunications Aéronautiques (SITA),
consortium leader and notary, and Sky Republic, platform & application provider, in 2020
• Aircraft Maintenance Repair and Overhaul (MRO) Track & Trace: SITA
(Notary), Cathay Pacific, Haeco, Bolore Logistics, and Safran participated.
• Aircraft MRO Digital Passport: SITA (Notary), Safran, Willis Lease, and Fly
Docs participated.
• Air Cargo Shipment Electronic Data Interchange (EDI)/ Internet of
Things (IoT) Tracking: SITA (Notary), Singapore Airlines, Safran, Bollore Logistics,
SATS, and WFS participated.
• Air Cargo ULD Interlining: SITA (Notary), ULD Care, Cathay Pacific,
Emirates, Lufthansa, and Air New Zealand participated.
As of today, participants with Aircraft MRO PoCs are discussing the productization of the
prototypes and participants of Air Cargo PoCs expressed their willingness to do the same.
All use cases aim at demonstrating that a blockchain-based platform can provide end-to-end
automation, visibility, and transparency for supply chains “faster, better, cheaper” than legacy
technologies [(EDI)and Application Programming Interface (API)] and infrastructures
(messaging networks and control towers).
Beyond these common goals and the willingness to co-innovate with business partners, each
participant expressed specific business pains to be addressed depending on their role in the
supply chain.
Aircraft MRO Digital Passport: record key data and documents of a part related to
manufacturing, usage, maintenance, and change of ownership operations.
75
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
• Airline, OEM: protect part value by ensuring proper level of documentation, accelerate
compliance & audit tasks related to safety regulations and leasing activities, share
operational data and records with partners to maintain better and faster aircrafts.
• Lesser: decrease cost and time necessary to manage and transact assets by reducing
manual tasks and automating record discovery. Increase revenue per asset by
increasing availability.
• Shipper: detect and mitigate disruptions earlier through correlation of EDI and IoT
events to decrease financial impact and provide accurate estimated times of arrival
(ETAs) to customers.
Air Cargo Unit Load Devices (ULDs) interlining: open currently centralized and aging EDI
platform used today exclusively for interlining between airlines:
76
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Technological
Demonstrate the value and feasibility of upgrading current supply chain processes and
systems.
Supply chains do not need commonly marketed blockchain characteristics like immutability or
decentralization as such. In fact, nobody needs a blockchain, but most can benefit from the
end-to-end digital consensus, automation, visibility, transparency, and agility that blockchain-
based applications can provide “better faster cheaper” to supply chains.
Quickly after securing participants on the maturity of the underlying technology, we focused
on designing the right processes and applications that would make a difference for
participants’ businesses without inducing too much technical disruption.
Consider the blockchain platform as the only transacting system instead of a “recording
layer.”
We started the first PoC by considering the blockchain platform as an additional layer to
existing transactional systems and designed a “shadow” process that would be fueled by
reporting business events from existing systems. First, the reporting events were usually
simpler than the original events in terms of data content which limited the value of an end-to-
end system. Second, we used the existing process constrained by the capabilities of existing
systems. By construction, this approach does not unleash the true benefits of leveraging end-
to-end data and events to upgrade the business process.
In the three other PoCs, we designed the ideal process right away reusing parts that were fine
in current systems and fixing the others. We systematically recorded any piece of data or
events in the Sky Contract to build a comprehensive single source of truth. This approach
allowed to automate many advanced capabilities such as SLA computation/settlement or
disruption recovery which are unfeasible when only shadowing existing systems (how to
resync participant’s ERP systems when somebody realizes that a shipment was sent to the
wrong address for example).
Non-Technological
The right environment for co-innovation was set up. SITA volunteered to project manage the
initiatives, induced a consortium spirit, and organized workshops where participants from all
companies could brainstorm and work together face-to-face.
77
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Technological
Interestingly, it took some time and effort for the different entities to define accurately what is
the current process in place (systems involved, format used, manual tasks, etc.)
EDI standards (Spec 2000 for MRO, CargoXml for Air Cargo) cover the most frequently
digitized tasks and records in business processes (order, invoice, etc.). On average, we found a
standardized format for 70% of the events required to automate an end-to-end supply chain
process.
• time zone management for dates and times which were problematic to monitor cross-
continental processes which are common in Aerospace and Air Cargo
Confidentiality management
The correct implementation of appropriate confidentiality rules (who can see prices of an order
or the value of an SLA for example) is a key driver of the design of smart contracts and can be
tricky.
Non-Technological
Numerous persons from numerous entities must be convinced, onboarded, and synchronized
from the decision-making to the funding or the operation of a blockchain solution.
78
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Except for the fourth PoC where trust issues were easy to solve with classical digital
signatures, our projects did not involve a structural change in the current supply chain
ecosystem or procedures.
However, most drivers as explained above dealt with reducing supply chain risks by
implementing unified processes on a new platform.
• ATA Spec 2000 which proposes format standards for MRO events and records
To reference supply chain organizations and locations, we used GS1, SITA, or IATA
identifiers.
For specifying supply chain processes and Sky Contracts behaviors, we slightly expanded
OMG BPMN (Business Process Model and Notation) choreographies. For Sky Contracts data
repositories, we used UML (Unified Modeling Language).
For data exchanges (events, ledgers, etc.) between nodes and applications, we used
representational state transfer application programming interfaces (REST APIs) or gRPC
(gRPC Remote Procedure Calls)/TLS (Transport Layer Security).
79
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
- IoT integration
Lessons Learned:
80
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
B.4 Case Study: Manufacturing Supply Chain Traceability from “Field to Fork”
Case Studies in Manufacturing Supply Chain Using Blockchain and Related Technologies
Author(s): Anonymous
DISCLAIMER:
The opportunity: Improve the yield of a raw material as it is transformed through the supply
chain from field to fork.
The problem: A packaged consumer goods product was designed to have no gluten in the
ingredients. However, the supply chain of the raw materials was not designed to ensure 100%
purity of the raw material. Thus, the raw material needed to be processed and filtered to a
100% purity level at the manufacturing site. This purification step resulted in losses up to 50%
of the raw material. The value of the raw material waste was in the 10’s of millions of dollars.
The current purification process had no visibility to the attributes and manufacturability of the
incoming ingredients. This forced the plant to run generic processing conditions there were not
optimal for the yield of the plant. Having full visibility allows for the plant to develop optimal
recipes (high yield) for the conversion of these raw materials into finished product efficiently.
Data needed to be captured along the supply chain both internal to the company and the
external partners along the way from field to manufacturer. Thus, a real-time tracking system
was needed.
The problem: The raw material was stored in up to 1500 silos and then sent to the purification
process. Once the characteristics of the raw material were captured, a system to optimize the
“blend” and/or optimized recipe for this blend was needed to maximize yield.
The problem: A second layer of defense was needed to release the purified material into a
secondary manufacturing process. A positive release methodology was needed to ensure the
integrity of the chain of custody of the material as it moved throughout the supply chain. This
would consist of not releasing the product from the first stage until it had passed all of its
quality and regulatory measures. Then and only then would it be dispatched to the second
stage.
81
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Technological
Looked at blockchain but not far enough along or broad enough use at the time, but many of
the concepts were fleshed out. First, we understood that we needed a material ledger: the book
of records of the characteristics, chain of custody, and transformation of the raw material from
origin to end. What is a little unique is that the raw material is transformed as it passes from
field to manufacturing and not only the original state, but the transformed state and its
relationship must be maintained to be able to perform a track-and-trace. Again, the goal was to
be able to trace backwards from the transformed material all the way back to its parents and
origin even though blending and mixing that was happening throughout the flow.
The material ledger was developed with a graph data base to capture the relationships of the
material flow.
Positive Release:
A material ledger was developed for this “finished” product as well since it had much of the
same requirements as the original raw material and need a relationship to its source for full
trace.
Some of the data was not available via instruments or networked devices. Tests on the raw
material both in the field and at the manufacturing were manually performed. Data collection
screens in either mobile format or fixed computer terminals were developed for manual entry
of data, tests, etc.
There was some data that was flowing to programmable logic controllers (PLC’s) ( i.e., bin
measurements, weight belts conveyors, etc.) that needed to be captured as well as rail car and
truck receiving information that was being collected in a SQL database. This information
needed to be contextualized in the material ledger.
A “smart” system was needed to take the data about the raw material in its 1,500 different
locations and provide guidance on how to process optimally. An algorithm was developed to
understand the best possible combinations of lots that would create the optimal yield with
minimal waste.
82
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Non-Technological
Understanding the existing operation process and developing the new one that would meet the
people where they were at and ensure their compliance. This project did not wipe the slate
clean and start over; it was trying to use whatever the ecosystem had and only put in elements
that were critical or gaps that needed to be invested in to achieve success.
The existing process from field to fork was not intimately understood by any one person. It
took about 6 months of study, interview, field trips, etc. to map out the current process,
sources of data, gaps in data or gaps in accurate information in order to be able to design the
next generation system that would be able to be fully capable of meeting the track-and-trace
requirements.
Technological
1. Understanding the relationships in the data that was being collected. This was not a
linear process flow. Data was collected by different organizations with different events
and timestamps. Developing the semantic model that was able to contextualize the
overall flow was challenging but resulted in a breakthrough technical approach to
leverage Graph Database technology.
2. Developing manual data entry capability that would align with the contextualization
needed and be as simple for a technician as writing data down on a piece of paper.
4. Understanding the flow of mixtures and what “might” be in the stream and how to
analyze this in a track-and-trace utility. This means both a 1-to-many, many-to-1 and
many-to-many relationships were possible in this process flow.
5. Designing a system that would work for all material flow and track /trace, not just
build for purpose of this project. A generic material ledger, Sankey visualizations and
database were created so that technology could be deployed to other use cases (and has
been since).
83
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Non-Technological
1. Manual entry as good as paper and not slowing down the decisions by digital
intervention, but rather increasing the reliability of manual collected data.
a. Working with the workers to help design a simple and useable UX adoption
was achieved. Adding in validation and preloading as much information as
possible so that they only had to enter the specific test data that was new,
greatly improved accuracy and speed.
Lessons Learned :
Need to meet people and technology where they are at. Add only what is needed and simplify
as much as possible. At first glance, this opportunity would look to be an industrial internet of
things (IIoT) project with lots of new sensors and technology to enable this. We started with
chalkboards as data collection and upgraded to a manual entry screen on a tablet. Still no
sensors. Retrofitting a massive legacy facility would cost millions and not be as reliable as
people. We did a pilot using instrumentation instead of people for a specific measurement and
found that people were more accurate and less expensive, more adaptable than
instrumentation.
Lesson learned… truly behave like it is a balance of people, process, and technology. We tend
to give lip service to that in real life and just work on technology as the solution.
The project over-delivered in value creation in unexpected areas. Having transparency and
visibility along the supply chain, the quality of the raw materials and thus the yield increased.
The supplier saw the manufacturability of the provided raw materials increase when they
delivered a better material. They became a preferred supplier and got more business because
their raw material ran better through the plant. They had no idea what happened to their
material once it was sold. Now they do and are connected in the process. Everybody wins.
Twice the anticipated value was achieved because of this.
The solution was not built for purpose, but for a generic case: track-and-trace. It has been
deployed to additional streams with similar results. The lesson learned is not to design just for
purpose, but generalize, if possible, so that it can be used in broader span and additional
opportunities. Be available to be used for the problem you have not had yet.
will be staggering and/or the system will be irrelevant rather quickly. Creating a system that
can reconfigure quickly, remodel, etc. is critical in this rapidly changing world.
85
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Case Studies in Manufacturing Supply Chain Using Blockchain and Related Technologies
Author(s): Anonymous
DISCLAIMER:
86
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
The Diamond Unclonable Security Tag (DUST) binds physical parts to their digital records
using a persistent identifier composed of microscopic diamond crystals. The form-factor of the
persistent identifier, the DUST Tag, is extremely flexible and allows for the same technology
to be used consistently across the customer’s diverse product lines and through all logistics
hierarchies. Each time a user physically authenticates a part or digitally adds or edits
information about the part (e.g., certification data, service history), that event creates a unique
ledger transaction that can be recorded on both a distributed ledger and additional management
and orchestration services such as those included in the DUST Solution. Replication of key
data to a blockchain and the DUST ledger serves to reinforce and validate transaction data.
Authorized parties can access the blockchain and DUST ledger records to reconcile the data
and validate the integrity of the part.
Technological
The technical approach for this effort was to store each product’s Digital Thread in DUST’s
cloud-based application and on Manufacturer X’s blockchain at the same time. Transactions
(part verifications, metadata, etc.) would be synchronized via a Representational State
Transfer (REST) API integration. When data entered the application, through a web interface
or REST API integration, a real-time transaction would be sent to Manufacturer X’s
blockchain.
87
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Technological
One key technological challenge related to scalability. To solve issues of scaling, DUST
Identity developed a multi-threaded implementation that was sufficient for the volume of data
at the time of implementation, then re-engineered it to use a queue-worker architecture which
improved scalability, throughput, and reliability for the system at larger volumes.
Non-Technological
88
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
• The ENISA Guidelines for Securing the Internet of Things [43] study defines
guidelines for securing the supply chain for IoT. The study was developed to help IoT
manufacturers, developers, integrators, and all stakeholders that are involved in the
supply chain of IoT make better security decisions when building, deploying, or
assessing IoT technologies. DUST Identity utilized these standards when considering
IT infrastructure, data protection, and interface security.
DUST used several standards in implementation of the blockchain technology. The primary
source utilized was Hyperledger Fabric, an open-source community of tools and libraries for
enterprise-grade blockchain deployments that is hosted by The Linux Foundation. Its modular
and versatile design satisfies a broad range of industry use cases and allows components, such
as consensus and membership services, to be plug-and-play. Hyperledger Fabric offers a
unique approach to consensus that enables performance at scale while preserving privacy. This
emphasis on privacy makes it an ideal standard for manufacturing environments that are
highly sensitive to external interference.
When building the API integrations, DUST Identity utilized the OpenAPI Specification (OAS)
which defines a standard, programming language-agnostic interface description for HTTP
APIs. It allows both humans and computers to discover and understand the capabilities of a
service without requiring access to source code, additional documentation, or inspection of
89
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
network traffic.
Existing standards or guidelines that were not used in the planning or implementation,
but could have been helpful:
While there are a number of standards for supply chain risk management and developing
standards for blockchain, there is still a need for better standards relating to part integrity,
ensuring trust, and having clarity about the tradeoffs between security, risk, and usability.
Two standards that were not used in this implementation but could be helpful in the future are:
The lack of defined standards related to the interoperability between different ledger
technologies led to a variety of challenges for the implementation team. For instance, the
Hyperledger Fabric used in this implementation has fundamentally different definitions of
permissions than other technologies such as R3’s Corda. Standards that clearly define
consensus on how certain blockchain technologies interact will be a critical need going
forward.
Lessons Learned:
Participation in the blockchain is a growing strategic priority across supply chain leaders and
innovators, many of whom are also exploring how to link that blockchain data securely to the
parts themselves. Based on DUST Identity’s partnership with Manufacturer X, these are the
most important practices to adopt for any organization engaging in a blockchain
implementation:
90
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Lessons Learned:
1. Whenever entering a project with a large organization that has multiple needs that may
be different across different business units, it is highly advised to ensure there is
opportunity for all business units to collaborate on the architecture and specifications
of the intended implementation. From technical parameters such as data flows to
business goals and downstream value proposition, care should be taken to ensure all
parties are aligned.
3. It is critical that organizations assess technologies for feasibility at scale before starting
PoC or pilot efforts. The key criteria to evaluate before starting any effort is a
solution’s ability to meet the demands of a production environment on scalability,
security, cost, and usability. From the start, Manufacturer X was focused on rolling out
its blockchain solution at scale, which led to a successful effort. We have a
responsibility as a community to encourage organizations to focus on the long run
when considering technologies and pilots and would urge everyone to increase their
efforts in that regard.
Additional Comments:
In order to trust parts at scale, manufacturers require both Data Integrity and Hardware
Integrity. The two elements are indelibly linked in that a trusted system cannot have one
without the other.
Data integrity requires a secure, immutable source of truth to send and receive data between
supply chain partners inside and outside of an organization. This is being addressed today
through technologies like Blockchain. To ensure that data in those ledgers is associated with
the correct part, supply chain organizations must reference a part’s persistent identifier. This is
where data integrity intersects with hardware integrity.
Additional Comments:
Having both data integrity and hardware integrity is impossible with products that rely on
general part IDs, batch level IDs, or serial IDs that can be easily copied. This is because there
is no simple, quick, or secure method to access a part’s persistent identifier. This is also true
for electronics that utilize software-based identifiers since it is difficult to access the part’s
persistent identifier without assembly into another product, as with microelectronics, or
plugging the product in and potentially putting a platform at risk. A unique and unclonable
physical anchor is the only method to trust that the product in your hand is genuine and has not
been tampered with.
Engagement Results: Through the integrated system of Blockchain and DUST, the customer
was able to maintain an ongoing, verifiable record of all activity associated with high-value
components and end products. Going forward, Manufacturer X plans to further integrate this
system with their manufacturing processes, expand to more product lines, and deploy the
Blockchain/DUST solution to their reseller network.
92
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
This appendix contains notes for each case within the context of the analysis method employing
mental models. It is the as-is record of systematically considering each case study from the
viewpoints of the mental models and lenses. See Section 6 for the narratives that resulted from
this raw data. See Section 7 for the themes that surfaced from the narratives in combination with
other sources of information. And see Appendix B for additional descriptions of the mental
models and lenses employed. Section 7.2 contains a cross reference table reflecting the
aggregation of material into themes to satisfy a primary purpose of this paper.
• Company/Business Drivers
o Multiple business pains among participating supply chain actors
o General acceptance that end-to-end processes in typical aircraft MRO and air cargo
scenarios entailed inefficiency or pain points for each participant.
• Supply Chain Risk Management
o Unified processes on a new platform theorized as reducing risk across the ecosystem
o Risk asymmetry could occur; for example, one company decommissions a part at
some low risk, but poses greater risk to the industry marketplace by accidentally
acquiring a substandard part
• Marketplace Positioning Model (Lens and Diffusion)
o Experimental proofs of concept each with a tracking scenario and multiple supply
chain actors and innovation seekers at developmental stages.
o Solution vendor attracted to market for considering blockchain technology and led
proofs of concept to demonstrate value
94
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
95
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
o Federal space concerned with supplier quality and parts authenticity; risks cannot be
abated by lone companies.
o Many “entry points” for integrity loss.
o Risk avoidance through trust structures spanning organizations.
• Marketplace Positioning Model (Lens and Diffusion)
o Attracted to maturing use of traceability technologies, niche innovator seeking
partnerships.
• Win/Win and Production Possibility
o Information sharing rules are in hands of data owners.
• Intermediation and Disintermediation
o Role of vendor: performs as new member of the supply chain, or could present as a
new style of intermediation through the accompanying vendor technology and
expertise
o Similar to MediLedger case
• Centralized and Decentralized
o Hard and formal delivery requirements between vendors and government PMOs
(which are typical) make for centralized, hierarchical acquirers and loosely
constructed, team building among supplier chains.
o The government has many operating models for the notion of “end-operating
environment.” They may have total system performance responsibility (TSPR)
arrangements with contractor or “integrator” functions, or government leads
operations, etc. Think about for “Perspectives from a Prime” case as well, re:
intermediation and/or centralization
• Traceability Consideration
o Will new outsourcing models arise for government traceability solutions? What
would they look like? How would they differ by government domain (military, local
government, treasury…)?
C.4 Large Prime
96
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
o Highly structured and monitored risk and security arrangements due to military
applications (SW&HW) and end-operating environments.
o Information acquisition and processing as a supply chain: A special case? The
grandparent of good data –the database management system.
• Marketplace Positioning Model (Lens and Diffusion)
o Market leader in the defense industrial base with sensitivities to national security.
Government (monopsony conditions) acquisition strategies and contracting
arrangements likely drivers for innovation seeking and pace of adoption.
• Win/Win and Production Possibility
o Traditional constraints on sharing information coupled with many focal points arising
from government program structures complicate outward motion of a PPF for
security and sharing, even with solid technologies.
• Intermediation and Disintermediation
o Interview discussions included intermediation topics related to responsibility for both
contributing to a traceability solution and administering a solution.
o Contractors’ teaming arrangements and IP protections contribute to attractiveness of
an intermediary.
• Centralized and Decentralized
o Inter-blockchain exchanges occurred in their solution setting, suggesting several
interpretations regarding a centralized and decentralized discussion.
o On one hand these exchanges highlight existing decentralized or distributed activities.
On the other hand, attractiveness of an intermediary function (by requirement holders,
i.e., government) reference central authority.
o “Decentralized” is quite overloaded in meaning and application.
• Traceability Consideration
o Free and open-source software plays into the prime’s deliveries (end deliveries to
government and acceptance from suppliers).
o Is a supply chain traceability solution for software products a complete risk reduction
solution? Knowing that software hasn’t changed and where it came from may only
cover a portion of risks specific to software products.
C.5 DUST Identity
• Company/Business Drivers
97
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
98
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
object was not present. Exposure of the data is an interesting proposition. Does the
manufacturer have a business case for following its products to second-hand markets,
for example? The supply chain in MRO scenarios may include the entire life cycle,
but who “owns” that, with assemblies and such that change hands and may be
installed repeatedly in different “end-operating environments?” DUST provided
additional insight:
This is also something that DUST encounters regularly. There is significant
incentive for upstream manufacturers to achieve higher visibility of
downstream and end-usage of their products to better inform business
decisions and potentially participate in downstream value creation.
As for data ownership, that is indeed an excellent question to raise, and we
often see the best solution as the creators of the data owning their data and
monetizing access to that data by other parties. This can be done by every
member of a single product's supply chain, enabling all parties to monetize
their data and share it as a revenue driver.
• Traceability Consideration
o An enabling technology that fills a generic gap in traceability solutions, yet stands on
its own as an identity solution, meeting internal manufacturing needs for example.
o What is foreseeable about large scale growth of traceability solutions and the
resulting large-scale implementations?
• Candidate Research Topic
o Federation of solutions and data standards questions for research.
C.6 MediLedger FDA Pilot Project
• Company/Business Drivers
o Search for legislation-driven solution in the pharmaceutical supply chain, examined a
blockchain system in detail addressing multiple areas raised by a stakeholder group
• Supply Chain Risk Management
o Concerns for transactional privacy and immutability
o Poll found agreement that interoperability includes many trading partners as opposed
to adjacent partners only.
o Exception handling detail explored at the level of change of ownership
• Marketplace Positioning Model (Lens and Diffusion)
o Wide net for participants cast due to impetus from legislation
99
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
101
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Even across a few voluntarily provided case studies, a wide variety of activities in supply chain
traceability surfaced. As mentioned, we selected a handful of mental models, described in
Appendix B, to use as aids in analyzing the case studies for research indicators and precursors to
tomorrow’s standardization needs. Using the mental models has highlighted potentially market-
driven motivations arising from current supply chain circumstances (e.g., counterfeit products)
and classic business drivers for improved profitability, market share, efficiency, and scale. In this
section, each of the five mental models will be used to introduce a conversation spanning the
activities of our respondents. In addition, an "et cetera" section will capture traceability
considerations that are not neat fits in model conversations. Additionally, each conversation
concluded with one or more candidate research areas which are provided here:
An organizational orientation to risk assessment highlights when, in fact, the means to mitigate
some risks must be addressed by a community or domain of stakeholders. As described in most
case-cited situations, risk abatement appears to be an activity of the community as well as an
internal pursuit. Some projects and Proofs of Concept are described as being partnerships
between a solution provider and a single company pursuing business improvement, while others
assembled groups that constitute a supply chain use case.
It may no longer be necessary to conduct further research into whether communities recognize a
need for cooperation in contending with certain risks, but other related questions arise:
102
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
digital asset such as a sensitive file, may be considered as inappropriate for an actual
presence in the traceability solution, other than by proxy, as in a hash generated from
the file.
• As supply chain participants gather to work across their networks, what short-list of
terms would be helpful in reaching consensus quickly? What means of distributing
knowledge of those basic, and few, terms would be valuable? The language itself of
supply chain traceability is showing signs of a developing vernacular. For example,
distinctions between integrity, provenance, trusted, immutable, etc. are arising due to
entry of multiple solutions to specific pain points. The quicker traceability
arrangements can be agreed upon, the quicker risk reduction measures can take effect.
Terms related to quality of service and specificity of risk could be prioritized.
D.2 Marketplace positioning candidates
Our respondents easily display the qualities of innovators as well as an appreciation for
technology adoption cycles. The variety of pursuits and experiences in solution and value
seeking included: internally run custom projects with R&D partners, outsourcing to specialist
vendors, and hybrid solutions as the technology expands in use and incentivizes cooperation. In
line with the diffusion model, the strategic minded can forecast potential market share as the
numbers of and scale of uses in tandem create profit opportunities. In turn, reaching larger
audiences as well as anticipating needs of new entrants and latecomers enters the equation of
strategic planning.
Discussion topics specific to industries or domains provide a sketch of potentially relevant issues
and challenges where a decision to look closer could be fruitful:
• How will the architectures of solutions be influenced by the two dimensions of supply
chain participants and technology components? Structures that crystalize into
architectures also define the boundaries relevant to message content standardization and
sequencing of business process. In the most generic sense, these divisions of labor define
organizational boundaries and thus the discourse relevant to pursuit of standards.
Industry or domain qualities may, or may not, significantly impact what communications
and what shared data are vital to traceability needs. This may also be viewed as: To what
degree can standardization pursuits be successful in this traceability realm, if variation
(due to technologies and industry-specific formations) squeezes the space for
opportunity?
• How does the complexity (in the scientific sense of complex adaptive systems, system of
systems, behavioral economics) of the marketplace impact a proposed way ahead for
even commonly understood elements? Conditions of complexity are characterized by
difficulty of prediction and emergent behaviors. If an examination of the components of
traceability in isolation does not (or cannot) account for what happens in practice, what
can future proofs of concept, experiments, or perhaps modeling and simulation offer to
inform and guide?
103
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
• What can ease a potential for barriers to entry, in the economic sense, that could pinch
small or niche contributors? Barriers to entry that could arise include: degree of
investment needed to meet a minimally competitive level of operations, necessity of
sophisticated knowledge and expertise (which may be scarce) in operating or
participating in new solutions, and disruption to existing operating models. In addition,
why might it be important to be mindful of an active small and niche player community
for any given industry? A result could be ongoing metrics and reporting the degree to
which the pain points addressed by traceability place a drain on productivity, negate
otherwise profitable investments, or impact national security. Start-ups are actively
cultivated by government, military, academia, and venture capitalists for a variety of
reasons. Start-ups, entering a technology cycle at the point where feedback from practical
experience has begun, can position themselves with unique insights for smoothing
implementations and even rough edges of the technology itself. For supply chain, the
historical problem of marking physical objects combined with the traceability problem of
matching a physical item with its digital thread, could be such an area.
• What standardized service levels of agreements, contract clauses in government domains,
or other unanticipated forms of agreement can be constructed that would speed
implementation of traceability across supply chains and networks? Speed of adoption
may be an imperative for some end-operating environments that could be described as
under attack. With improvements in multiple forms of cyber security detection methods,
exposure of threats and their rate of exposure is likely to increase. If an organization
didn’t know they needed traceability yesterday but are acutely aware of it today, time is
of the essence. Generic business models and agreement forms can dramatically shorten
the distance between need and implementation.
D.3 Win/win and the production possibility frontier candidates
Traceability technologies can be said to move the PPF such that the Win/Win situation of having
more of both can be realized. For some, this is counter-intuitive because protecting data has been
a traditional method of securing it. As suggested in cases, efforts to share data to protect the
objectives of an ecosystem can encounter a myriad of existing assessments, controls, and
procedures, all enforced at the data owner’s level. The responsibility for data and associated
information can be burdensome as it can reflect IP (such as a bill of materials) or national
security concerns as in export-controlled technology data. While we see our respondents'
recognition of the value in cooperating to share data across supply lines, there is still the hard
work of determining what information is crucial to the success of traceability efforts.
• What is the minimum set of data elements and associated message or process context to
support a successful traceability project? Can strategies from previous efforts at design
criteria, such as an hour-glass model (reference ACM on Hour-Glass Model) [36], or
existing business exchange standards be leveraged to tackle this challenge. In one case an
existing standards review did result in usable message types.
104
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
• What cryptographical or other means allow data to both be shared and obscured at the
same time? Blockchain and other traceability technology could be improved in ways
unimagined today.
• What other trade-offs between concerns exist that are today analyzed as zero-sum, but
have technologies in the pipeline that would shift the PPF?
D.4 Intermediation and disintermediation, make or buy candidates
Opportunities for intermediation are potentially dominant, given the experiences described by
our respondents. These discussions surfaced:
• Intermediation resulting from potential profitability for companies offering supply chain
traceability solutions that include operations.
• An external operator of a blockchain solution can be attractive, where teaming of
companies is variable and commonplace, as in government monopsony conditions.
• Strengthening of existing intermediators as their roles in data collection are enhanced,
such as co-ops.
• Willingness to outsource on the part of supply chain participants. As technologies mature
and solution sets become more complete, innovators and the following majority of
adopters may see outsourcing as viable to strategy.
Fewer suggestions of disintermediation surfaced. These are primarily relating to existing security
measures that are displaced by improved circumstances of traceability. Examples are improved
identity of physical components reducing physical security roles and un-needed administrative
services for tracking and responding to supply chain discrepancies.
Defining decentralization, on its own footing, begs for research into its semantics and
application. Introducing decentralization as a desirable characteristic of traceability solutions
compounds the dilemma.
105
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Our respondents’ businesses have characteristics that can be cast variously as centralized or
decentralized. Farms are both geographically dispersed and regional. Maintenance facilities are
scaled to serve multiple operational units. A dominant buyer is a central figure in a supply chain.
Events with ripple effect have a central point of origin, such as demurrage and other logistics
situations. Responsibility for performance coalesces with the prime contractor. And so on. It’s
not clear from our respondents that decentralization, as when used to describe blockchain
solutions, is particularly interesting. Instead, business drivers and strategic commitments attract
attention.
For research:
• Is it the case that once the business need arises for cooperation, the differentiators among
potential solutions do not hinge on the quality of decentralization? What are the key
differentiators among solutions (features vs technology’s inherent qualities) that aid in
choosing among or designing a supply chain traceability solution? What determines a
well-fitted solution?
• Do the various forms of connectedness in supply chains mean that graph theory is a
useful source of descriptive and evaluative metrics? Existing research in this vein
includes Chauhan, Frayet, & LeBel [36], Tachizawa & Wong [39], Vernon & Keeling,
[38].
106
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
This listing is the result of compiling the material in Sections 4 and 5. These details provided
inputs for themes in Section 7, alongside other analysis notes in other Appendices.
Declared authenticity of physical objects in data records can only be verified by linking the
physical object to a data record (e.g., cyber-physical anchor); current cyber-physical anchor
technology uses both invasive (adding physical signature) and non-invasive (scanning) methods.
Non-invasive methods hold the promise to expand the scope of objects which can be tracked.
This is an emerging technology field.
Impact: Provable linkage between physical goods and data records are required for traceability.
Data integrity frequently implemented as “immutable ledger,” even linking to off-chain data with
hash pointers to ensure off-chain data has not been tampered; consistent patterns and best
practices will accelerate adoption.
Impact: Data integrity (immutability) of traceability data records, including across blockchains,
is required for traceability.
Pedigree and provenance of data records (and hash linked data and physical objects) can be
assured within a single blockchain effort (ecosystem scoped to agreed participants and shared
blockchain enabled capability).
Further research required to link traceability between blockchain ecosystems. Further research
required to understand the impact of part of a supply chain getting traceability requirements from
multiple operating environments; can the traceability requirements be satisfied for all the
operating requirements?
Impact: Stable ecosystem governance including polycentric is required for traceability across
ecosystems.
107
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Using blockchain and ledgers to bolster sensor-to-shooter data pedigree and provenance of data
exchanged is being explored—can blockchain and ledgers also be used to help force
coordination such as exchanging conditional delegated authorities in rapid tempo operations? In
a joint/coalition environment? While environment is contested?
Impact: Data is part of a “supply chain of decision making” and traceability of data can increase
confidence in using data to make decisions.
As adoption tempo increases and blockchain ecosystems become linked, trusted, and repeatable
methods to analyze trade space of options (e.g., centralized, DLT, blockchain) regarding benefit,
cost, risk, level of effort must be developed and promulgated to achieve the desired effects
including overall (across DoD and partner nation theaters) understanding of residual risks and
vulnerabilities.
Impact: As traceability methods are discovered and championed, repeatable analysis and
methods of practice are required to accelerate adoption.
E.8 Identity
Impact: Consistent, repeatable, and understandable means of establishing and using identity are
required for traceability within and across ecosystems.
Growth of ecosystems
Impact: Establishing an MVE must be a relatively routine process with supporting metrics, and
data and governance patterns.
108
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
Blockchain enabled ecosystems can be linked / bridged by either (a) individual participants write
and read across the ecosystems, or (b) the blockchains mutually interact, potentially providing
higher assurance of provable information exchange.
Impact: Traceability across ecosystems require means and methods to exchange transactions.
E.12 Standards
What is the role of standards to accelerate adoption? Who are the actors (by type)?
NEIM.gov is an interesting example whereby messages of a more specific type can be built on
more generic types. Possibly supports incremental agreement.
Impact: Standards are required to establish traceability (e.g., goods identification). The standard
can be used solely within the ecosystem or across ecosystems.
The interplay between supply chain traceability blockchain records and IP blockchain records
Impact: Traceability records may establish not only supply chain tracing, but also tracing through
logistics, and potentially affirming ownership.
E.15 Metrics
Multiple end operating environments may inform the same segments of supply chain. Further,
blockchain enabled ecosystems may grow in scale and need to interact with each other. As
traceability is implemented across larger regions of supply chain, metrics will be required to
measure coverage of requirements and effectiveness of mitigating SCRM risk associated with
individual and combined traceability efforts.
Impact: Metrics are required to reliably identify traceability gaps and measure progress in
109
NISTIR 8419 BLOCKCHAIN AND RELATED TECHNOLOGIES TO
SUPPORT MANUFACTURING SUPPLY CHAIN TRACEABILITY
addressing gaps. Metrics also required to describe the sensitivity of adding traceability (e.g., if
traceability X is added, then the impact to ecosystem Y risk is Z).
E.16 Data patterns of external repositories (from legacy to Solid, IPFS, etc.)
Support for fusion and analytics (regimen to copy transactions and externally linked data into
fusion/analytics for national security analysis)
Impact: High impact supply chain knowledge is enabled by fusion of attributed, trusted, and
linked data.
110