Skip to main content
Top
Published in: The Journal of Supercomputing 7/2021

08-01-2021

A blockchain-based intelligent anti-switch package in tracing logistics system

Authors: Chin-Ling Chen, Yong-Yuan Deng, Wei Weng, Ming Zhou, Hongyu Sun

Published in: The Journal of Supercomputing | Issue 7/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In recent years, with the rapid development of e-commerce and network technologies, many people do online shopping through the Internet. If a physical product is bought by a client, the store will entrust their logistics to deliver the goods to the client. However, there have been many cases of switched goods which were purchased by clients recently. Some scholars proposed a security mechanism with a subliminal channel for E-cash and digital content previously. Only the designated sender and the designated receiver know the subliminal message which was hidden in the signature. Thus, it can be applied to solve the switched package issue. According to the WTO (World Trade Organization) forum, blockchain-related logistics applications have gradually emerged in recent days. Blockchain technology is essentially a decentralized database maintained by the collective. It has the characteristics of high reliability and high confidentiality and has a good prospect in effectively solving the trust problem between the two parties. In short, blockchain information will be publicly verifiable and cannot be tampered with, which provides solutions for traditional logistics. It realizes trust and cooperation between multiple entities, and create a modernized logistics environment. In this paper, we attach a sensor to monitor the situation of the delivery object and tag on the package to be an IoT object. The proposed scheme is a blockchain-based intelligent anti-switch package in tracing the logistics system. The client can check the GPS (Global Positioning System) location, the temperature, and humidity sensing data of the package any time during the delivery process, and the IoT-related intelligent logistics can be achieved. The proposed scheme also achieves data integrity, resisting replay attack, forward and backward secrecy, non-repudiation, and mutual authentication.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Whitmore A, Agarwal A, Da Xu L (2015) The internet of things: a survey of topics and trends. Inf Syst Front 17(2):261–274CrossRef Whitmore A, Agarwal A, Da Xu L (2015) The internet of things: a survey of topics and trends. Inf Syst Front 17(2):261–274CrossRef
2.
go back to reference Ray BR, Abawajy J, Chowdhury M, Alelaiwi A (2018) Universal and secure object ownership transfer protocol for the Internet of Things. Fut Gener Comput Syst 78(2):838–849CrossRef Ray BR, Abawajy J, Chowdhury M, Alelaiwi A (2018) Universal and secure object ownership transfer protocol for the Internet of Things. Fut Gener Comput Syst 78(2):838–849CrossRef
3.
go back to reference Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981–1992CrossRef Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981–1992CrossRef
4.
go back to reference Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Fut Gener Comput Syst 49:104–112CrossRef Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Fut Gener Comput Syst 49:104–112CrossRef
5.
go back to reference Han J, Susilo W, Mu Y (2015) Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans Inf Forensics Secur 10:665–678CrossRef Han J, Susilo W, Mu Y (2015) Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans Inf Forensics Secur 10:665–678CrossRef
6.
go back to reference Zhao S, Aggarwal A, Frost R, Bai X (2012) A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun Surv Tutor 14(2):380–400CrossRef Zhao S, Aggarwal A, Frost R, Bai X (2012) A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun Surv Tutor 14(2):380–400CrossRef
7.
go back to reference Zhou Z, Huang D, Wang Z (2015) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Comput 64(1):126–138MathSciNetCrossRef Zhou Z, Huang D, Wang Z (2015) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Comput 64(1):126–138MathSciNetCrossRef
8.
go back to reference Kim H, Kim CH, Chung JM (2012) A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks. Wirel Commun Mob Comput 12(2):145–157CrossRef Kim H, Kim CH, Chung JM (2012) A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks. Wirel Commun Mob Comput 12(2):145–157CrossRef
9.
go back to reference Chen CL, Liao JJ (2011) A fair online payment system for digital content via subliminal channel”. Electron Commerce Res Appl 10:279–287CrossRef Chen CL, Liao JJ (2011) A fair online payment system for digital content via subliminal channel”. Electron Commerce Res Appl 10:279–287CrossRef
10.
go back to reference Chen CL, Liu MH (2009) A traceable E-cash transfer system against blackmail via subliminal channel. Electron Commerce Res Appl 8:327–333CrossRef Chen CL, Liu MH (2009) A traceable E-cash transfer system against blackmail via subliminal channel. Electron Commerce Res Appl 8:327–333CrossRef
11.
go back to reference Chen CL, Wang KH, Tsaur WJ, Chen JH, Chen CH (2017) An electronic public engineering project bidding protocol via a subliminal channel. J Inf Technol Control 46:470–483 Chen CL, Wang KH, Tsaur WJ, Chen JH, Chen CH (2017) An electronic public engineering project bidding protocol via a subliminal channel. J Inf Technol Control 46:470–483
12.
go back to reference Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things. IEEE Internet Things J 5(4):2884–2895CrossRef Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things. IEEE Internet Things J 5(4):2884–2895CrossRef
13.
go back to reference Banerjee S, Odelu V, Das AK, Srinivas J, Kumar N, Chattopadhyay S, Choo KKR (2019)A provably secure and lightweight anonymous user authenticated session key exchange scheme for the Internet of Things deployment. IEEE Internet Things J 6(5): 8739–8752 Banerjee S, Odelu V, Das AK, Srinivas J, Kumar N, Chattopadhyay S, Choo KKR (2019)A provably secure and lightweight anonymous user authenticated session key exchange scheme for the Internet of Things deployment. IEEE Internet Things J 6(5): 8739–8752
14.
go back to reference Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132–146CrossRef Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132–146CrossRef
15.
go back to reference Islam SH, Vijayakumar P, Bhuiyan MZA, Amin R, Balusamy B (2017) A provably secure three-factor session initiation protocol for multimedia big data communications. IEEE Internet Things J 5(5):3408–3418CrossRef Islam SH, Vijayakumar P, Bhuiyan MZA, Amin R, Balusamy B (2017) A provably secure three-factor session initiation protocol for multimedia big data communications. IEEE Internet Things J 5(5):3408–3418CrossRef
19.
go back to reference Simplicio MA Jr, Silva MVM, Alves RCA, Shibata TKC (2017) Lightweight and escrow-less authenticated key agreement for the Internet of Things. Comput Commun 98:43–51CrossRef Simplicio MA Jr, Silva MVM, Alves RCA, Shibata TKC (2017) Lightweight and escrow-less authenticated key agreement for the Internet of Things. Comput Commun 98:43–51CrossRef
20.
go back to reference Simplicio M., Oliveira B, Barreto P, Margi C, Carvalho T, Naslund M (2011) Comparison of authenticated-encryption schemes in wireless sensor networks. In: Proceedings of the 36th IEEE Conference on Local Computer Networks (LCN), 2011, pp 454–461 Simplicio M., Oliveira B, Barreto P, Margi C, Carvalho T, Naslund M (2011) Comparison of authenticated-encryption schemes in wireless sensor networks. In: Proceedings of the 36th IEEE Conference on Local Computer Networks (LCN), 2011, pp 454–461
21.
go back to reference He D, Chen C, Chan S, Bu J (2012) SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 59(11):4155–4163CrossRef He D, Chen C, Chan S, Bu J (2012) SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 59(11):4155–4163CrossRef
22.
go back to reference Dakhli Z, Lafhaj Z (2017) Efficient logistics enabled by smart solutions in tunneling. Undergr Space 2:227–233CrossRef Dakhli Z, Lafhaj Z (2017) Efficient logistics enabled by smart solutions in tunneling. Undergr Space 2:227–233CrossRef
23.
go back to reference Danielsen JM, Engelseth P, Wang H (2018) Large scale integration of wireless sensor network technologies for air quality monitoring at a logistics shipping base. J Ind Inf Integr 10:20–28 Danielsen JM, Engelseth P, Wang H (2018) Large scale integration of wireless sensor network technologies for air quality monitoring at a logistics shipping base. J Ind Inf Integr 10:20–28
24.
go back to reference Luo H, Wang K, Kong XTR, Lu S, Qu T (2017) Synchronized production and logistics via ubiquitous computing technology. Robot Comput-Integr Manuf 45:99–115CrossRef Luo H, Wang K, Kong XTR, Lu S, Qu T (2017) Synchronized production and logistics via ubiquitous computing technology. Robot Comput-Integr Manuf 45:99–115CrossRef
25.
go back to reference Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36CrossRef Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36CrossRef
26.
go back to reference Han W, Zhu Z (2014) An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int J Commun Syst 27(8):1173–1185CrossRef Han W, Zhu Z (2014) An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int J Commun Syst 27(8):1173–1185CrossRef
27.
go back to reference Simmons GJ (1984) The subliminal channel and digital signatures. In: Proceedings of the Eurocrypt’84 workshop on Advances in Cryptology, pp 364–378 Simmons GJ (1984) The subliminal channel and digital signatures. In: Proceedings of the Eurocrypt’84 workshop on Advances in Cryptology, pp 364–378
28.
go back to reference Simmons GJ (1993) Subliminal communication is easy using the DSA. In: Proceedings of Eurocrypt’93, pp 218–232 Simmons GJ (1993) Subliminal communication is easy using the DSA. In: Proceedings of Eurocrypt’93, pp 218–232
29.
go back to reference Simmons GJ (1998) The history of subliminal channels. IEEE J Sel Areas Commun 16:452–462CrossRef Simmons GJ (1998) The history of subliminal channels. IEEE J Sel Areas Commun 16:452–462CrossRef
30.
go back to reference Chang SE, Chen YC, Lu MF (2019) Supply chain re-engineering using blockchain technology: a case of smart contract based tracking process. Technol Forecast Soc Change 144:1–11CrossRef Chang SE, Chen YC, Lu MF (2019) Supply chain re-engineering using blockchain technology: a case of smart contract based tracking process. Technol Forecast Soc Change 144:1–11CrossRef
32.
go back to reference Das AK, Goswami A (2015) A robust anonymous biometric-based remote user authentication scheme using smart cards. J King Saud Univ Comput Inf Sci 27:193–210 Das AK, Goswami A (2015) A robust anonymous biometric-based remote user authentication scheme using smart cards. J King Saud Univ Comput Inf Sci 27:193–210
34.
go back to reference Odelu V, Das AK, Goswami A (2015) An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card. J Inf Secur Appl 21:1–19 Odelu V, Das AK, Goswami A (2015) An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card. J Inf Secur Appl 21:1–19
35.
go back to reference Mishra D, Chaturvedi A, Mukhopadhyay S (2015) Design of a lightweight two-factor authentication scheme with smart card revocation. J Inf Secur Appl 23:44–53 Mishra D, Chaturvedi A, Mukhopadhyay S (2015) Design of a lightweight two-factor authentication scheme with smart card revocation. J Inf Secur Appl 23:44–53
36.
go back to reference Chaturvedi A, Das AK, Mishra D, Mukhopadhyay S (2016) Design of a secure smart card-based multi-server authentication scheme. J Inf Secur Appl 30:64–80 Chaturvedi A, Das AK, Mishra D, Mukhopadhyay S (2016) Design of a secure smart card-based multi-server authentication scheme. J Inf Secur Appl 30:64–80
37.
go back to reference Madhusudhan R, Hegde M (2017) Security bound enhancement of remote user authentication using smart card. J Inf Secur Appl 36:59–68 Madhusudhan R, Hegde M (2017) Security bound enhancement of remote user authentication using smart card. J Inf Secur Appl 36:59–68
40.
go back to reference Marcus MJ (2015) 5G and IMT for 2020 and beyond. IEEE Wirel Commun 22(4):2–3CrossRef Marcus MJ (2015) 5G and IMT for 2020 and beyond. IEEE Wirel Commun 22(4):2–3CrossRef
Metadata
Title
A blockchain-based intelligent anti-switch package in tracing logistics system
Authors
Chin-Ling Chen
Yong-Yuan Deng
Wei Weng
Ming Zhou
Hongyu Sun
Publication date
08-01-2021
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 7/2021
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-020-03558-7

Other articles of this Issue 7/2021

The Journal of Supercomputing 7/2021 Go to the issue

Premium Partner