Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2021

06.05.2021

RETRACTED ARTICLE: Secure access control for manufacturing sector with application of ethereum blockchain

verfasst von: Ajay Kumar, Kumar Abhishek, Bharat Bhushan, Chinmay Chakraborty

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Past local and worldwide international logistic operations have been related with obscure data streams that have thwarted detectability and made obstacles in deregulation. Ethereum based Distributed Ledger Technology and unified advancements were explored for solving the issues looked of Cloud-Based Manufacturers. Nonetheless, past writing has zeroed in on restricted parts of a regular Cloud-Based Manufacturing chain, for example, checking resources and making sure about discernibility, which is generally dismissing information trustworthiness and information access. To conquer such disadvantages, the current study attempts to protected keen agreements dependent on ERC20 interface of controlled Ethereum based Distributed Ledger Technology with significant cycles and capacities to get an all encompassing structure for making sure about Cloud-Based Manufacturing activities. The adequacy was exhibited on the study. So, it was discovered that basic escape clauses in blockchain can be beaten utilizing the prototyped structure. Also, a few blueprints for future examination are plot.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Liu J, Ren A, Zhang L, Sun R, Du X, Guizani M (2019) A novel secure authentication scheme for heterogeneous internet of things. In: ICC 2019–2019 IEEE International Conference on Communications (ICC). IEEE, pp 1–6 Liu J, Ren A, Zhang L, Sun R, Du X, Guizani M (2019) A novel secure authentication scheme for heterogeneous internet of things. In: ICC 2019–2019 IEEE International Conference on Communications (ICC). IEEE, pp 1–6
2.
Zurück zum Zitat Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment, vol 78. Elsevier, New York, pp 1005–1019 Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment, vol 78. Elsevier, New York, pp 1005–1019
3.
Zurück zum Zitat Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing internet of things. IEEE Internet of Things Journal 5:2884–2895CrossRef Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing internet of things. IEEE Internet of Things Journal 5:2884–2895CrossRef
4.
Zurück zum Zitat Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet of Things J 4(5):1250–1258CrossRef Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet of Things J 4(5):1250–1258CrossRef
5.
Zurück zum Zitat Ke PY, Tan L, Aloqaily M, Yang H, Jararweh Y (2021) Blockchain-enhanced data sharing with traceable and direct revocation in iiot. IEEE Transactions on Industrial Informatics Ke PY, Tan L, Aloqaily M, Yang H, Jararweh Y (2021) Blockchain-enhanced data sharing with traceable and direct revocation in iiot. IEEE Transactions on Industrial Informatics
6.
Zurück zum Zitat Mahmood Z, Ning H, Ullah A, Yao X (2017) Secure authentication and prescription safety protocol for telecare health services using ubiquitous iot. Appl Sci 7:1069CrossRef Mahmood Z, Ning H, Ullah A, Yao X (2017) Secure authentication and prescription safety protocol for telecare health services using ubiquitous iot. Appl Sci 7:1069CrossRef
7.
Zurück zum Zitat Yu K, Tan L, Shang X, Huang J, Srivastava G, Chatterjee P (2020a) Efficient and privacy-preserving medical research support platform against covid-19: a blockchain-based approach. IEEE Consumer Electronics Magazine Yu K, Tan L, Shang X, Huang J, Srivastava G, Chatterjee P (2020a) Efficient and privacy-preserving medical research support platform against covid-19: a blockchain-based approach. IEEE Consumer Electronics Magazine
8.
Zurück zum Zitat Yu K, Lin L, Alazab M, Tan L, Gu B (2020) Deep learning-based traffic safety solution for a mixture of autonomous and manual vehicles in a 5g-enabled intelligent transportation system. IEEE Transactions on Intelligent Transportation Systems Yu K, Lin L, Alazab M, Tan L, Gu B (2020) Deep learning-based traffic safety solution for a mixture of autonomous and manual vehicles in a 5g-enabled intelligent transportation system. IEEE Transactions on Intelligent Transportation Systems
9.
Zurück zum Zitat Feng C, Yu K, Aloqaily M, Alazab M, Lv Z, Mumtaz S (2020) Attribute-based encryption with parallel outsourced decryption for edge intelligent iov. IEEE Trans Veh Technol 69:13784–13795CrossRef Feng C, Yu K, Aloqaily M, Alazab M, Lv Z, Mumtaz S (2020) Attribute-based encryption with parallel outsourced decryption for edge intelligent iov. IEEE Trans Veh Technol 69:13784–13795CrossRef
10.
Zurück zum Zitat Guo Z, Shen Y, Bashir AK, Imran M, Kumar N, Zhang D, Yu K (2020) Robust spammer detection using collaborative neural network in internet of thing applications. IEEE Internet of Things Journal Guo Z, Shen Y, Bashir AK, Imran M, Kumar N, Zhang D, Yu K (2020) Robust spammer detection using collaborative neural network in internet of thing applications. IEEE Internet of Things Journal
11.
Zurück zum Zitat Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Futur Gener Comput Syst 49:104–112CrossRef Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Futur Gener Comput Syst 49:104–112CrossRef
12.
Zurück zum Zitat Moosavi SR, Nigussie E, Virtanen S, Isoaho J (2014) An elliptic curve-based mutual authentication scheme for rfid implant systems. In: ANT/SEIT, pp 198–206 Moosavi SR, Nigussie E, Virtanen S, Isoaho J (2014) An elliptic curve-based mutual authentication scheme for rfid implant systems. In: ANT/SEIT, pp 198–206
13.
Zurück zum Zitat Debiao H, Jianhua C, Jin H (2012) An id-based client authentication with key agreement protocol for mobile client–server environment on ecc with provable security. Information Fusion 13:223–230CrossRef Debiao H, Jianhua C, Jin H (2012) An id-based client authentication with key agreement protocol for mobile client–server environment on ecc with provable security. Information Fusion 13:223–230CrossRef
14.
Zurück zum Zitat Liao Y-P., Hsiao C-M. (2014) A secure ecc-based rfid authentication scheme integrated with id-verifier transfer protocol. Ad Hoc Netw 18:133–146CrossRef Liao Y-P., Hsiao C-M. (2014) A secure ecc-based rfid authentication scheme integrated with id-verifier transfer protocol. Ad Hoc Netw 18:133–146CrossRef
15.
Zurück zum Zitat Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112CrossRef Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112CrossRef
16.
Zurück zum Zitat Farash MS, Turkanović M, Kumari S, Hölbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw 36:152–176CrossRef Farash MS, Turkanović M, Kumari S, Hölbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw 36:152–176CrossRef
17.
Zurück zum Zitat Kalra S, Sood SK (2015) Secure authentication scheme for iot and cloud servers. Pervasive and Mobile Computing 24:210–223CrossRef Kalra S, Sood SK (2015) Secure authentication scheme for iot and cloud servers. Pervasive and Mobile Computing 24:210–223CrossRef
18.
Zurück zum Zitat Chang C-C, Wu H-L, Sun C-Y (2017) Notes on secure authentication scheme for iot and cloud servers. Pervasive and Mobile Computing 38:275–278CrossRef Chang C-C, Wu H-L, Sun C-Y (2017) Notes on secure authentication scheme for iot and cloud servers. Pervasive and Mobile Computing 38:275–278CrossRef
19.
Zurück zum Zitat Von Oheimb D (2005) The high-level protocol specification language hlpsl developed in the eu project avispa. In: Proceedings of APPSEM 2005 workshop, pp 1–17 Von Oheimb D (2005) The high-level protocol specification language hlpsl developed in the eu project avispa. In: Proceedings of APPSEM 2005 workshop, pp 1–17
20.
Zurück zum Zitat Abadi M, Blanchet B, Comon-Lundh H (2009) Models and proofs of protocol security: a progress report. In: International conference on computer aided verification. Springer, pp 35–49 Abadi M, Blanchet B, Comon-Lundh H (2009) Models and proofs of protocol security: a progress report. In: International conference on computer aided verification. Springer, pp 35–49
21.
Zurück zum Zitat Chaudhry SA, Farash MS, Naqvi H, Kumari S, Khan MK (2015) An enhanced privacy preserving remote user authentication scheme with provable security. Security and Communication Networks 8:3782–3795CrossRef Chaudhry SA, Farash MS, Naqvi H, Kumari S, Khan MK (2015) An enhanced privacy preserving remote user authentication scheme with provable security. Security and Communication Networks 8:3782–3795CrossRef
22.
Zurück zum Zitat Maitra T, Obaidat MS, Amin R, Islam SH, Chaudhry SA, Giri D (2017) A robust elgamal-based password-authentication protocol using smart card for client-server communication. Int J Commun Syst 30:e3242CrossRef Maitra T, Obaidat MS, Amin R, Islam SH, Chaudhry SA, Giri D (2017) A robust elgamal-based password-authentication protocol using smart card for client-server communication. Int J Commun Syst 30:e3242CrossRef
23.
Zurück zum Zitat Dhillon PK, Kalra S (2018) Multi-factor user authentication scheme for iot-based healthcare services. Journal of Reliable Intelligent Environments 4:141–160CrossRef Dhillon PK, Kalra S (2018) Multi-factor user authentication scheme for iot-based healthcare services. Journal of Reliable Intelligent Environments 4:141–160CrossRef
24.
Zurück zum Zitat Xue K, Hong P, Ma C (2014) A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J Comput Syst Sci 80:195–206MathSciNetCrossRefMATH Xue K, Hong P, Ma C (2014) A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J Comput Syst Sci 80:195–206MathSciNetCrossRefMATH
25.
Zurück zum Zitat Feng Y, Wang W, Weng Y, Zhang H (2017) A replay-attack resistant authentication scheme for the internet of things. In: 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), vol 1. IEEE, pp 541–547 Feng Y, Wang W, Weng Y, Zhang H (2017) A replay-attack resistant authentication scheme for the internet of things. In: 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), vol 1. IEEE, pp 541–547
26.
Zurück zum Zitat Nikooghadam M, Jahantigh R, Arshad H (2017) A lightweight authentication and key agreement protocol preserving user anonymity. Multimedia Tools and Applications 76:13401–13423CrossRef Nikooghadam M, Jahantigh R, Arshad H (2017) A lightweight authentication and key agreement protocol preserving user anonymity. Multimedia Tools and Applications 76:13401–13423CrossRef
27.
Zurück zum Zitat Kumari S, Khan MK, Li X (2014) An improved remote user authentication scheme with key agreement. Computers & Electrical Engineering 40:1997–2012CrossRef Kumari S, Khan MK, Li X (2014) An improved remote user authentication scheme with key agreement. Computers & Electrical Engineering 40:1997–2012CrossRef
28.
Zurück zum Zitat Alkuhlani AMI, Thorat S (2017) Lightweight anonymity-preserving authentication and key agreement protocol for the internet of things environment. In: International conference on intelligent information technologies. Springer, pp 108– 125 Alkuhlani AMI, Thorat S (2017) Lightweight anonymity-preserving authentication and key agreement protocol for the internet of things environment. In: International conference on intelligent information technologies. Springer, pp 108– 125
29.
Zurück zum Zitat He D, Zeadally S (2014) An analysis of rfid authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet of Things Journal 2:72–83CrossRef He D, Zeadally S (2014) An analysis of rfid authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet of Things Journal 2:72–83CrossRef
30.
Zurück zum Zitat Kalra S, Sood SK (2011) Elliptic curve cryptography: survey and its security applications. In: Proceedings of the international conference on advances in computing and artificial intelligence, pp 102–106 Kalra S, Sood SK (2011) Elliptic curve cryptography: survey and its security applications. In: Proceedings of the international conference on advances in computing and artificial intelligence, pp 102–106
31.
Zurück zum Zitat Wu S-T, Chiu J-H, Chieu B-C (2005) Id-based remote authentication with smart cards on open distributed system from elliptic curve cryptography. In: 2005 IEEE international conference on electro information technology. IEEE, pp 5–pp Wu S-T, Chiu J-H, Chieu B-C (2005) Id-based remote authentication with smart cards on open distributed system from elliptic curve cryptography. In: 2005 IEEE international conference on electro information technology. IEEE, pp 5–pp
32.
Zurück zum Zitat Tian X, Wong DS, Zhu RW (2005) Analysis and improvement of an authenticated key exchange protocol for sensor networks. IEEE Communications letters 9:970–972CrossRef Tian X, Wong DS, Zhu RW (2005) Analysis and improvement of an authenticated key exchange protocol for sensor networks. IEEE Communications letters 9:970–972CrossRef
33.
Zurück zum Zitat Abi-Char PE, Mhamed A, Bachar E-H (2007) A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: The 2007 international conference on next generation mobile applications, services and technologies (NGMAST 2007). IEEE, pp 235– 240 Abi-Char PE, Mhamed A, Bachar E-H (2007) A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: The 2007 international conference on next generation mobile applications, services and technologies (NGMAST 2007). IEEE, pp 235– 240
34.
Zurück zum Zitat Kumar A, Kumar A, Nerurkar P, Ghalib MR, Shankar A, Wen Z, Qi X (2020) Empirical analysis of bitcoin network (2016-2020). In: 2020 IEEE/CIC international conference on communications in China (ICCC Workshops). IEEE, pp 96–101 Kumar A, Kumar A, Nerurkar P, Ghalib MR, Shankar A, Wen Z, Qi X (2020) Empirical analysis of bitcoin network (2016-2020). In: 2020 IEEE/CIC international conference on communications in China (ICCC Workshops). IEEE, pp 96–101
35.
Zurück zum Zitat Kumar A, Abhishek K, Kumar Singh A, Nerurkar P, Chandane M, Bhirud S, Patel D, Busnel Y (2020) Multilabel classification of remote sensed satellite imagery. Transactions on Emerging Telecommunications Technologies: e3988 Kumar A, Abhishek K, Kumar Singh A, Nerurkar P, Chandane M, Bhirud S, Patel D, Busnel Y (2020) Multilabel classification of remote sensed satellite imagery. Transactions on Emerging Telecommunications Technologies: e3988
36.
Zurück zum Zitat Kumar A, Abhishek K, Nerurkar P, Ghalib MR, Shankar A, Cheng X (2020) Secure smart contracts for cloud-based manufacturing using ethereum blockchain. Transactions on Emerging Telecommunications Technologies: e4129 Kumar A, Abhishek K, Nerurkar P, Ghalib MR, Shankar A, Cheng X (2020) Secure smart contracts for cloud-based manufacturing using ethereum blockchain. Transactions on Emerging Telecommunications Technologies: e4129
37.
Zurück zum Zitat Kumar A, Abhishek K, Ghalib MR, Nerurkar P, Shah K, Chandane M, Bhirud S, Patel D, Busnel Y (2020) Towards cough sound analysis using the internet of things and deep learning for pulmonary disease prediction. Transactions on Emerging Telecommunications Technologies: e4184 Kumar A, Abhishek K, Ghalib MR, Nerurkar P, Shah K, Chandane M, Bhirud S, Patel D, Busnel Y (2020) Towards cough sound analysis using the internet of things and deep learning for pulmonary disease prediction. Transactions on Emerging Telecommunications Technologies: e4184
38.
Zurück zum Zitat Nerurkar P, Patel D, Busnel Y, Ludinard R, Kumari S, Khan MK (2020) Dissecting bitcoin blockchain: empirical analysis of bitcoin network (2009–2020). Journal of Network and Computer Applications: 102940 Nerurkar P, Patel D, Busnel Y, Ludinard R, Kumari S, Khan MK (2020) Dissecting bitcoin blockchain: empirical analysis of bitcoin network (2009–2020). Journal of Network and Computer Applications: 102940
39.
Zurück zum Zitat Kumar A, Abhishek K, Rukunuddin Ghalib M, Nerurkar P, Bhirud S, Alnumay W, Ananda Kumar S, Chatterjee P, Ghosh U (2020) Securing logistics system and supply chain using blockchain. Applied Stochastic Models in Business and Industry Kumar A, Abhishek K, Rukunuddin Ghalib M, Nerurkar P, Bhirud S, Alnumay W, Ananda Kumar S, Chatterjee P, Ghosh U (2020) Securing logistics system and supply chain using blockchain. Applied Stochastic Models in Business and Industry
40.
Zurück zum Zitat Nerurkar P, Bhirud S, Patel D, Ludinard R, Busnel Y, Kumari S (2020) Supervised learning model for identifying illegal activities in bitcoin. Applied Intelligence: 1–20 Nerurkar P, Bhirud S, Patel D, Ludinard R, Busnel Y, Kumari S (2020) Supervised learning model for identifying illegal activities in bitcoin. Applied Intelligence: 1–20
41.
Zurück zum Zitat Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer Science & Business Media Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer Science & Business Media
42.
Zurück zum Zitat Li X, Niu J, Kumari S, Liao J, Liang W, Khan MK (2016) A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Security and Communication Networks 9:2643–2655CrossRef Li X, Niu J, Kumari S, Liao J, Liang W, Khan MK (2016) A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Security and Communication Networks 9:2643–2655CrossRef
43.
Zurück zum Zitat Islam SH, Biswas G (2011) A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J Syst Softw 84:1892–1898CrossRef Islam SH, Biswas G (2011) A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J Syst Softw 84:1892–1898CrossRef
Metadaten
Titel
RETRACTED ARTICLE: Secure access control for manufacturing sector with application of ethereum blockchain
verfasst von
Ajay Kumar
Kumar Abhishek
Bharat Bhushan
Chinmay Chakraborty
Publikationsdatum
06.05.2021
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2021
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01108-3

Weitere Artikel der Ausgabe 5/2021

Peer-to-Peer Networking and Applications 5/2021 Zur Ausgabe

Premium Partner