skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Terahertz-readable laser engraved marks as a novel solution for product traceability
Abstract Counterfeit products pose significant economic, security, and health risks. One approach to mitigate these risks involves establishing product provenance by tracing them back to their manufacturing origins. However, current identification methods, such as barcodes and RFIDs, have limitations that make them vulnerable to counterfeiting. Similarly, nonvolatile memories, physically unclonable functions, and emerging techniques like Diamond Unclonable Security Tag and DNA fingerprinting also have their own limitations and challenges. For a traceability solution to gain widespread adoption, it must meet certain criteria, including being inexpensive, unique, immutable, easily readable, standardized, and unclonable. In this paper, we propose a solution that utilizes ultrashort pulsed lasers to create unique, unclonable, and immutable physical tags. These tags can then be read nondestructively using far-field Terahertz (THz) spectroscopy. The primary objective of this paper is to investigate the feasibility of our proposed approach. We aim to assess the ability to distinguish laser marks with varying depths, evaluate the sensitivity of THz reading to laser engraving parameters, examine the capacity to capture high-information-density marks, and explore the ability to capture subsurface tags. By addressing these aspects, our method holds the potential to serve as a universal solution for a wide range of traceability applications.  more » « less
Award ID(s):
1916756
PAR ID:
10442656
Author(s) / Creator(s):
; ; ; ; ;
Date Published:
Journal Name:
Scientific Reports
Volume:
13
Issue:
1
ISSN:
2045-2322
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. As Blockchain technology become more understood in recent years and its capability to solve enterprise business use cases become evident, technologist have been exploring Blockchain technology to solve use cases that have been daunting industries for years. Unlike existing technologies, one of the key features of blockchain technology is its unparalleled capability to provide, traceability, accountability and immutable records that can be accessed at any point in time. One application area of interest for blockchain is securing heterogenous networks. This paper explores the security challenges in a heterogonous network of IoT devices and whether blockchain can be a viable solution. Using an experimental approach, we explore the possibility of using blockchain technology to secure IoT devices, validate IoT device transactions, and establish a chain of trust to secure an IoT device mesh network, as well as investigate the plausibility of using immutable transactions for forensic analysis. 
    more » « less
  2. null (Ed.)
    Computerized systems and software, which allow optimizing and planning the processes of production, storage, transportation, sale, and distribution of goods, have emerged in the industry. Scheduling systems, in particular, are designed to control and optimize the manufacturing process. This tool can have a significant effect on the productivity of the industry because it reduces the time and cost through well-defined optimization algorithms. Recently, the applicability of blockchain technology has been demonstrated in scheduling systems to add decentralization, traceability, auditability, and verifiability of the immutable information that this technology provides. This is a novel contribution that provides scheduling systems with an additional layer of security. With the latest version of Hyperledger Fabric, the appropriate levels of permission and policies for access to information can be established with significant levels of privacy and security, which prevent malicious actors from trying to cheat or abuse the system. Different alternatives exist to manage all processes associated with the operation of a blockchain network, and among them, providers of blockchain as a service have emerged. Chainstack stands out for its simplicity and scalability features to deploy and operate a blockchain network. Our goal in this work is to create a solution for secure storage of and access to task-scheduling scheme on the consortium blockchain and inter-planetary file system as a proof of concept to demonstrate its potential and usability. 
    more » « less
  3. Consumer Internet of Things (IoT) devices are increasingly common, from smart speakers to security cameras, in homes. Along with their benefits come potential privacy and security threats. To limit these threats a number of commercial services have become available (IoT safeguards). The safeguards claim to provide protection against IoT privacy risks and security threats. However, the effectiveness and the associated privacy risks of these safeguards remains a key open question. In this paper, we investigate the threat detection capabilities of IoT safeguards for the first time. We develop and release an approach for automated safeguards experimentation to reveal their response to common security threats and privacy risks. We perform thousands of automated experiments using popular commercial IoT safeguards when deployed in a large IoT testbed. Our results indicate not only that these devices may be ineffective in preventing risks, but also their cloud interactions and data collection operations may introduce privacy risks for the households that adopt them. 
    more » « less
  4. The year 2024 marks the 30-year anniversary of the quantum cascade laser (QCL), which is becoming the leading laser source in the mid-infrared (mid-IR) range. Since the first demonstration, QCL has undergone tremendous development in terms of the output power, wall plug efficiency, spectral coverage, wavelength tunability, and beam quality. Owing to its unique intersubband transition and fast gain features, QCL possesses strong nonlinearities that makes it an ideal platform for nonlinear photonics like terahertz (THz) difference frequency generation and direct frequency comb generation via four-wave mixing when group velocity dispersion is engineered. The feature of broadband, high-power, and low-phase noise of QCL combs is revolutionizing mid-IR spectroscopy and sensing by offering a new tool measuring multi-channel molecules simultaneously in the μs time scale. While THz QCL difference frequency generation is becoming the only semiconductor light source covering 1–5 THz at room temperature. In this paper, we will introduce the latest research from the Center for Quantum Devices at Northwestern University and briefly discuss the history of QCL, recent progress, and future perspective of QCL research, especially for QCL frequency combs, room temperature THz QCL difference frequency generation, and major challenges facing QCL in the future. 
    more » « less
  5. Internet of Things (IoT) have broad and deep penetration into our society, and many of them are resource-constrained, calling for lightweight security protocols. Physical unclonable functions (PUFs) leverage physical variations of circuits to produce responses unique for individual devices, and hence are not reproducible even by their manufacturers. Implementable with simplistic circuits and operable with low energy, PUFs are promising candidates as security primitives for resource-constrained IoT devices. Arbiter PUF (APUF) and its variants are lightweight in resource requirements but suffer from vulnerability to machine learning attacks. To defend APUF variants against machine learning attacks, in this paper we investigate a challenge input interface, which incurs low overhead. Analytical and experimental studies were carried out, showing substantial improvement of resistance against machine learning attacks when a PUF is equipped with the interface, rendering interfaced APUF variants promising candidates for security critical applications. 
    more » « less