Skip to main content
Erschienen in: The Journal of Supercomputing 7/2021

08.01.2021

A blockchain-based intelligent anti-switch package in tracing logistics system

verfasst von: Chin-Ling Chen, Yong-Yuan Deng, Wei Weng, Ming Zhou, Hongyu Sun

Erschienen in: The Journal of Supercomputing | Ausgabe 7/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, with the rapid development of e-commerce and network technologies, many people do online shopping through the Internet. If a physical product is bought by a client, the store will entrust their logistics to deliver the goods to the client. However, there have been many cases of switched goods which were purchased by clients recently. Some scholars proposed a security mechanism with a subliminal channel for E-cash and digital content previously. Only the designated sender and the designated receiver know the subliminal message which was hidden in the signature. Thus, it can be applied to solve the switched package issue. According to the WTO (World Trade Organization) forum, blockchain-related logistics applications have gradually emerged in recent days. Blockchain technology is essentially a decentralized database maintained by the collective. It has the characteristics of high reliability and high confidentiality and has a good prospect in effectively solving the trust problem between the two parties. In short, blockchain information will be publicly verifiable and cannot be tampered with, which provides solutions for traditional logistics. It realizes trust and cooperation between multiple entities, and create a modernized logistics environment. In this paper, we attach a sensor to monitor the situation of the delivery object and tag on the package to be an IoT object. The proposed scheme is a blockchain-based intelligent anti-switch package in tracing the logistics system. The client can check the GPS (Global Positioning System) location, the temperature, and humidity sensing data of the package any time during the delivery process, and the IoT-related intelligent logistics can be achieved. The proposed scheme also achieves data integrity, resisting replay attack, forward and backward secrecy, non-repudiation, and mutual authentication.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Whitmore A, Agarwal A, Da Xu L (2015) The internet of things: a survey of topics and trends. Inf Syst Front 17(2):261–274CrossRef Whitmore A, Agarwal A, Da Xu L (2015) The internet of things: a survey of topics and trends. Inf Syst Front 17(2):261–274CrossRef
2.
Zurück zum Zitat Ray BR, Abawajy J, Chowdhury M, Alelaiwi A (2018) Universal and secure object ownership transfer protocol for the Internet of Things. Fut Gener Comput Syst 78(2):838–849CrossRef Ray BR, Abawajy J, Chowdhury M, Alelaiwi A (2018) Universal and secure object ownership transfer protocol for the Internet of Things. Fut Gener Comput Syst 78(2):838–849CrossRef
3.
Zurück zum Zitat Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981–1992CrossRef Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981–1992CrossRef
4.
Zurück zum Zitat Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Fut Gener Comput Syst 49:104–112CrossRef Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Fut Gener Comput Syst 49:104–112CrossRef
5.
Zurück zum Zitat Han J, Susilo W, Mu Y (2015) Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans Inf Forensics Secur 10:665–678CrossRef Han J, Susilo W, Mu Y (2015) Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans Inf Forensics Secur 10:665–678CrossRef
6.
Zurück zum Zitat Zhao S, Aggarwal A, Frost R, Bai X (2012) A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun Surv Tutor 14(2):380–400CrossRef Zhao S, Aggarwal A, Frost R, Bai X (2012) A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun Surv Tutor 14(2):380–400CrossRef
7.
Zurück zum Zitat Zhou Z, Huang D, Wang Z (2015) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Comput 64(1):126–138MathSciNetCrossRef Zhou Z, Huang D, Wang Z (2015) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Comput 64(1):126–138MathSciNetCrossRef
8.
Zurück zum Zitat Kim H, Kim CH, Chung JM (2012) A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks. Wirel Commun Mob Comput 12(2):145–157CrossRef Kim H, Kim CH, Chung JM (2012) A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks. Wirel Commun Mob Comput 12(2):145–157CrossRef
9.
Zurück zum Zitat Chen CL, Liao JJ (2011) A fair online payment system for digital content via subliminal channel”. Electron Commerce Res Appl 10:279–287CrossRef Chen CL, Liao JJ (2011) A fair online payment system for digital content via subliminal channel”. Electron Commerce Res Appl 10:279–287CrossRef
10.
Zurück zum Zitat Chen CL, Liu MH (2009) A traceable E-cash transfer system against blackmail via subliminal channel. Electron Commerce Res Appl 8:327–333CrossRef Chen CL, Liu MH (2009) A traceable E-cash transfer system against blackmail via subliminal channel. Electron Commerce Res Appl 8:327–333CrossRef
11.
Zurück zum Zitat Chen CL, Wang KH, Tsaur WJ, Chen JH, Chen CH (2017) An electronic public engineering project bidding protocol via a subliminal channel. J Inf Technol Control 46:470–483 Chen CL, Wang KH, Tsaur WJ, Chen JH, Chen CH (2017) An electronic public engineering project bidding protocol via a subliminal channel. J Inf Technol Control 46:470–483
12.
Zurück zum Zitat Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things. IEEE Internet Things J 5(4):2884–2895CrossRef Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things. IEEE Internet Things J 5(4):2884–2895CrossRef
13.
Zurück zum Zitat Banerjee S, Odelu V, Das AK, Srinivas J, Kumar N, Chattopadhyay S, Choo KKR (2019)A provably secure and lightweight anonymous user authenticated session key exchange scheme for the Internet of Things deployment. IEEE Internet Things J 6(5): 8739–8752 Banerjee S, Odelu V, Das AK, Srinivas J, Kumar N, Chattopadhyay S, Choo KKR (2019)A provably secure and lightweight anonymous user authenticated session key exchange scheme for the Internet of Things deployment. IEEE Internet Things J 6(5): 8739–8752
14.
Zurück zum Zitat Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132–146CrossRef Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132–146CrossRef
15.
Zurück zum Zitat Islam SH, Vijayakumar P, Bhuiyan MZA, Amin R, Balusamy B (2017) A provably secure three-factor session initiation protocol for multimedia big data communications. IEEE Internet Things J 5(5):3408–3418CrossRef Islam SH, Vijayakumar P, Bhuiyan MZA, Amin R, Balusamy B (2017) A provably secure three-factor session initiation protocol for multimedia big data communications. IEEE Internet Things J 5(5):3408–3418CrossRef
19.
Zurück zum Zitat Simplicio MA Jr, Silva MVM, Alves RCA, Shibata TKC (2017) Lightweight and escrow-less authenticated key agreement for the Internet of Things. Comput Commun 98:43–51CrossRef Simplicio MA Jr, Silva MVM, Alves RCA, Shibata TKC (2017) Lightweight and escrow-less authenticated key agreement for the Internet of Things. Comput Commun 98:43–51CrossRef
20.
Zurück zum Zitat Simplicio M., Oliveira B, Barreto P, Margi C, Carvalho T, Naslund M (2011) Comparison of authenticated-encryption schemes in wireless sensor networks. In: Proceedings of the 36th IEEE Conference on Local Computer Networks (LCN), 2011, pp 454–461 Simplicio M., Oliveira B, Barreto P, Margi C, Carvalho T, Naslund M (2011) Comparison of authenticated-encryption schemes in wireless sensor networks. In: Proceedings of the 36th IEEE Conference on Local Computer Networks (LCN), 2011, pp 454–461
21.
Zurück zum Zitat He D, Chen C, Chan S, Bu J (2012) SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 59(11):4155–4163CrossRef He D, Chen C, Chan S, Bu J (2012) SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 59(11):4155–4163CrossRef
22.
Zurück zum Zitat Dakhli Z, Lafhaj Z (2017) Efficient logistics enabled by smart solutions in tunneling. Undergr Space 2:227–233CrossRef Dakhli Z, Lafhaj Z (2017) Efficient logistics enabled by smart solutions in tunneling. Undergr Space 2:227–233CrossRef
23.
Zurück zum Zitat Danielsen JM, Engelseth P, Wang H (2018) Large scale integration of wireless sensor network technologies for air quality monitoring at a logistics shipping base. J Ind Inf Integr 10:20–28 Danielsen JM, Engelseth P, Wang H (2018) Large scale integration of wireless sensor network technologies for air quality monitoring at a logistics shipping base. J Ind Inf Integr 10:20–28
24.
Zurück zum Zitat Luo H, Wang K, Kong XTR, Lu S, Qu T (2017) Synchronized production and logistics via ubiquitous computing technology. Robot Comput-Integr Manuf 45:99–115CrossRef Luo H, Wang K, Kong XTR, Lu S, Qu T (2017) Synchronized production and logistics via ubiquitous computing technology. Robot Comput-Integr Manuf 45:99–115CrossRef
25.
Zurück zum Zitat Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36CrossRef Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36CrossRef
26.
Zurück zum Zitat Han W, Zhu Z (2014) An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int J Commun Syst 27(8):1173–1185CrossRef Han W, Zhu Z (2014) An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int J Commun Syst 27(8):1173–1185CrossRef
27.
Zurück zum Zitat Simmons GJ (1984) The subliminal channel and digital signatures. In: Proceedings of the Eurocrypt’84 workshop on Advances in Cryptology, pp 364–378 Simmons GJ (1984) The subliminal channel and digital signatures. In: Proceedings of the Eurocrypt’84 workshop on Advances in Cryptology, pp 364–378
28.
Zurück zum Zitat Simmons GJ (1993) Subliminal communication is easy using the DSA. In: Proceedings of Eurocrypt’93, pp 218–232 Simmons GJ (1993) Subliminal communication is easy using the DSA. In: Proceedings of Eurocrypt’93, pp 218–232
29.
Zurück zum Zitat Simmons GJ (1998) The history of subliminal channels. IEEE J Sel Areas Commun 16:452–462CrossRef Simmons GJ (1998) The history of subliminal channels. IEEE J Sel Areas Commun 16:452–462CrossRef
30.
Zurück zum Zitat Chang SE, Chen YC, Lu MF (2019) Supply chain re-engineering using blockchain technology: a case of smart contract based tracking process. Technol Forecast Soc Change 144:1–11CrossRef Chang SE, Chen YC, Lu MF (2019) Supply chain re-engineering using blockchain technology: a case of smart contract based tracking process. Technol Forecast Soc Change 144:1–11CrossRef
32.
Zurück zum Zitat Das AK, Goswami A (2015) A robust anonymous biometric-based remote user authentication scheme using smart cards. J King Saud Univ Comput Inf Sci 27:193–210 Das AK, Goswami A (2015) A robust anonymous biometric-based remote user authentication scheme using smart cards. J King Saud Univ Comput Inf Sci 27:193–210
34.
Zurück zum Zitat Odelu V, Das AK, Goswami A (2015) An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card. J Inf Secur Appl 21:1–19 Odelu V, Das AK, Goswami A (2015) An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card. J Inf Secur Appl 21:1–19
35.
Zurück zum Zitat Mishra D, Chaturvedi A, Mukhopadhyay S (2015) Design of a lightweight two-factor authentication scheme with smart card revocation. J Inf Secur Appl 23:44–53 Mishra D, Chaturvedi A, Mukhopadhyay S (2015) Design of a lightweight two-factor authentication scheme with smart card revocation. J Inf Secur Appl 23:44–53
36.
Zurück zum Zitat Chaturvedi A, Das AK, Mishra D, Mukhopadhyay S (2016) Design of a secure smart card-based multi-server authentication scheme. J Inf Secur Appl 30:64–80 Chaturvedi A, Das AK, Mishra D, Mukhopadhyay S (2016) Design of a secure smart card-based multi-server authentication scheme. J Inf Secur Appl 30:64–80
37.
Zurück zum Zitat Madhusudhan R, Hegde M (2017) Security bound enhancement of remote user authentication using smart card. J Inf Secur Appl 36:59–68 Madhusudhan R, Hegde M (2017) Security bound enhancement of remote user authentication using smart card. J Inf Secur Appl 36:59–68
40.
Zurück zum Zitat Marcus MJ (2015) 5G and IMT for 2020 and beyond. IEEE Wirel Commun 22(4):2–3CrossRef Marcus MJ (2015) 5G and IMT for 2020 and beyond. IEEE Wirel Commun 22(4):2–3CrossRef
Metadaten
Titel
A blockchain-based intelligent anti-switch package in tracing logistics system
verfasst von
Chin-Ling Chen
Yong-Yuan Deng
Wei Weng
Ming Zhou
Hongyu Sun
Publikationsdatum
08.01.2021
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 7/2021
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-020-03558-7

Weitere Artikel der Ausgabe 7/2021

The Journal of Supercomputing 7/2021 Zur Ausgabe