Skip to main content
Log in

RETRACTED ARTICLE: Secure access control for manufacturing sector with application of ethereum blockchain

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

This article was retracted on 27 October 2022

This article has been updated

Abstract

Past local and worldwide international logistic operations have been related with obscure data streams that have thwarted detectability and made obstacles in deregulation. Ethereum based Distributed Ledger Technology and unified advancements were explored for solving the issues looked of Cloud-Based Manufacturers. Nonetheless, past writing has zeroed in on restricted parts of a regular Cloud-Based Manufacturing chain, for example, checking resources and making sure about discernibility, which is generally dismissing information trustworthiness and information access. To conquer such disadvantages, the current study attempts to protected keen agreements dependent on ERC20 interface of controlled Ethereum based Distributed Ledger Technology with significant cycles and capacities to get an all encompassing structure for making sure about Cloud-Based Manufacturing activities. The adequacy was exhibited on the study. So, it was discovered that basic escape clauses in blockchain can be beaten utilizing the prototyped structure. Also, a few blueprints for future examination are plot.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Change history

References

  1. Liu J, Ren A, Zhang L, Sun R, Du X, Guizani M (2019) A novel secure authentication scheme for heterogeneous internet of things. In: ICC 2019–2019 IEEE International Conference on Communications (ICC). IEEE, pp 1–6

  2. Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment, vol 78. Elsevier, New York, pp 1005–1019

    Google Scholar 

  3. Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing internet of things. IEEE Internet of Things Journal 5:2884–2895

    Article  Google Scholar 

  4. Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet of Things J 4(5):1250–1258

    Article  Google Scholar 

  5. Ke PY, Tan L, Aloqaily M, Yang H, Jararweh Y (2021) Blockchain-enhanced data sharing with traceable and direct revocation in iiot. IEEE Transactions on Industrial Informatics

  6. Mahmood Z, Ning H, Ullah A, Yao X (2017) Secure authentication and prescription safety protocol for telecare health services using ubiquitous iot. Appl Sci 7:1069

    Article  Google Scholar 

  7. Yu K, Tan L, Shang X, Huang J, Srivastava G, Chatterjee P (2020a) Efficient and privacy-preserving medical research support platform against covid-19: a blockchain-based approach. IEEE Consumer Electronics Magazine

  8. Yu K, Lin L, Alazab M, Tan L, Gu B (2020) Deep learning-based traffic safety solution for a mixture of autonomous and manual vehicles in a 5g-enabled intelligent transportation system. IEEE Transactions on Intelligent Transportation Systems

  9. Feng C, Yu K, Aloqaily M, Alazab M, Lv Z, Mumtaz S (2020) Attribute-based encryption with parallel outsourced decryption for edge intelligent iov. IEEE Trans Veh Technol 69:13784–13795

    Article  Google Scholar 

  10. Guo Z, Shen Y, Bashir AK, Imran M, Kumar N, Zhang D, Yu K (2020) Robust spammer detection using collaborative neural network in internet of thing applications. IEEE Internet of Things Journal

  11. Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Futur Gener Comput Syst 49:104–112

    Article  Google Scholar 

  12. Moosavi SR, Nigussie E, Virtanen S, Isoaho J (2014) An elliptic curve-based mutual authentication scheme for rfid implant systems. In: ANT/SEIT, pp 198–206

  13. Debiao H, Jianhua C, Jin H (2012) An id-based client authentication with key agreement protocol for mobile client–server environment on ecc with provable security. Information Fusion 13:223–230

    Article  Google Scholar 

  14. Liao Y-P., Hsiao C-M. (2014) A secure ecc-based rfid authentication scheme integrated with id-verifier transfer protocol. Ad Hoc Netw 18:133–146

    Article  Google Scholar 

  15. Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112

    Article  Google Scholar 

  16. Farash MS, Turkanović M, Kumari S, Hölbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw 36:152–176

    Article  Google Scholar 

  17. Kalra S, Sood SK (2015) Secure authentication scheme for iot and cloud servers. Pervasive and Mobile Computing 24:210–223

    Article  Google Scholar 

  18. Chang C-C, Wu H-L, Sun C-Y (2017) Notes on secure authentication scheme for iot and cloud servers. Pervasive and Mobile Computing 38:275–278

    Article  Google Scholar 

  19. Von Oheimb D (2005) The high-level protocol specification language hlpsl developed in the eu project avispa. In: Proceedings of APPSEM 2005 workshop, pp 1–17

  20. Abadi M, Blanchet B, Comon-Lundh H (2009) Models and proofs of protocol security: a progress report. In: International conference on computer aided verification. Springer, pp 35–49

  21. Chaudhry SA, Farash MS, Naqvi H, Kumari S, Khan MK (2015) An enhanced privacy preserving remote user authentication scheme with provable security. Security and Communication Networks 8:3782–3795

    Article  Google Scholar 

  22. Maitra T, Obaidat MS, Amin R, Islam SH, Chaudhry SA, Giri D (2017) A robust elgamal-based password-authentication protocol using smart card for client-server communication. Int J Commun Syst 30:e3242

    Article  Google Scholar 

  23. Dhillon PK, Kalra S (2018) Multi-factor user authentication scheme for iot-based healthcare services. Journal of Reliable Intelligent Environments 4:141–160

    Article  Google Scholar 

  24. Xue K, Hong P, Ma C (2014) A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J Comput Syst Sci 80:195–206

    Article  MathSciNet  MATH  Google Scholar 

  25. Feng Y, Wang W, Weng Y, Zhang H (2017) A replay-attack resistant authentication scheme for the internet of things. In: 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), vol 1. IEEE, pp 541–547

  26. Nikooghadam M, Jahantigh R, Arshad H (2017) A lightweight authentication and key agreement protocol preserving user anonymity. Multimedia Tools and Applications 76:13401–13423

    Article  Google Scholar 

  27. Kumari S, Khan MK, Li X (2014) An improved remote user authentication scheme with key agreement. Computers & Electrical Engineering 40:1997–2012

    Article  Google Scholar 

  28. Alkuhlani AMI, Thorat S (2017) Lightweight anonymity-preserving authentication and key agreement protocol for the internet of things environment. In: International conference on intelligent information technologies. Springer, pp 108– 125

  29. He D, Zeadally S (2014) An analysis of rfid authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet of Things Journal 2:72–83

    Article  Google Scholar 

  30. Kalra S, Sood SK (2011) Elliptic curve cryptography: survey and its security applications. In: Proceedings of the international conference on advances in computing and artificial intelligence, pp 102–106

  31. Wu S-T, Chiu J-H, Chieu B-C (2005) Id-based remote authentication with smart cards on open distributed system from elliptic curve cryptography. In: 2005 IEEE international conference on electro information technology. IEEE, pp 5–pp

  32. Tian X, Wong DS, Zhu RW (2005) Analysis and improvement of an authenticated key exchange protocol for sensor networks. IEEE Communications letters 9:970–972

    Article  Google Scholar 

  33. Abi-Char PE, Mhamed A, Bachar E-H (2007) A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: The 2007 international conference on next generation mobile applications, services and technologies (NGMAST 2007). IEEE, pp 235– 240

  34. Kumar A, Kumar A, Nerurkar P, Ghalib MR, Shankar A, Wen Z, Qi X (2020) Empirical analysis of bitcoin network (2016-2020). In: 2020 IEEE/CIC international conference on communications in China (ICCC Workshops). IEEE, pp 96–101

  35. Kumar A, Abhishek K, Kumar Singh A, Nerurkar P, Chandane M, Bhirud S, Patel D, Busnel Y (2020) Multilabel classification of remote sensed satellite imagery. Transactions on Emerging Telecommunications Technologies: e3988

  36. Kumar A, Abhishek K, Nerurkar P, Ghalib MR, Shankar A, Cheng X (2020) Secure smart contracts for cloud-based manufacturing using ethereum blockchain. Transactions on Emerging Telecommunications Technologies: e4129

  37. Kumar A, Abhishek K, Ghalib MR, Nerurkar P, Shah K, Chandane M, Bhirud S, Patel D, Busnel Y (2020) Towards cough sound analysis using the internet of things and deep learning for pulmonary disease prediction. Transactions on Emerging Telecommunications Technologies: e4184

  38. Nerurkar P, Patel D, Busnel Y, Ludinard R, Kumari S, Khan MK (2020) Dissecting bitcoin blockchain: empirical analysis of bitcoin network (2009–2020). Journal of Network and Computer Applications: 102940

  39. Kumar A, Abhishek K, Rukunuddin Ghalib M, Nerurkar P, Bhirud S, Alnumay W, Ananda Kumar S, Chatterjee P, Ghosh U (2020) Securing logistics system and supply chain using blockchain. Applied Stochastic Models in Business and Industry

  40. Nerurkar P, Bhirud S, Patel D, Ludinard R, Busnel Y, Kumari S (2020) Supervised learning model for identifying illegal activities in bitcoin. Applied Intelligence: 1–20

  41. Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer Science & Business Media

  42. Li X, Niu J, Kumari S, Liao J, Liang W, Khan MK (2016) A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Security and Communication Networks 9:2643–2655

    Article  Google Scholar 

  43. Islam SH, Biswas G (2011) A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J Syst Softw 84:1892–1898

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bharat Bhushan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on Blockchain for Peer-to-Peer Computing

Guest Editors: Keping Yu, Chunming Rong, Yang Cao, and Wenjuan Li

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12083-022-01398-1

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, A., Abhishek, K., Bhushan, B. et al. RETRACTED ARTICLE: Secure access control for manufacturing sector with application of ethereum blockchain. Peer-to-Peer Netw. Appl. 14, 3058–3074 (2021). https://doi.org/10.1007/s12083-021-01108-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01108-3

Keywords

Navigation