Abstract
In recent years, with the rapid development of e-commerce and network technologies, many people do online shopping through the Internet. If a physical product is bought by a client, the store will entrust their logistics to deliver the goods to the client. However, there have been many cases of switched goods which were purchased by clients recently. Some scholars proposed a security mechanism with a subliminal channel for E-cash and digital content previously. Only the designated sender and the designated receiver know the subliminal message which was hidden in the signature. Thus, it can be applied to solve the switched package issue. According to the WTO (World Trade Organization) forum, blockchain-related logistics applications have gradually emerged in recent days. Blockchain technology is essentially a decentralized database maintained by the collective. It has the characteristics of high reliability and high confidentiality and has a good prospect in effectively solving the trust problem between the two parties. In short, blockchain information will be publicly verifiable and cannot be tampered with, which provides solutions for traditional logistics. It realizes trust and cooperation between multiple entities, and create a modernized logistics environment. In this paper, we attach a sensor to monitor the situation of the delivery object and tag on the package to be an IoT object. The proposed scheme is a blockchain-based intelligent anti-switch package in tracing the logistics system. The client can check the GPS (Global Positioning System) location, the temperature, and humidity sensing data of the package any time during the delivery process, and the IoT-related intelligent logistics can be achieved. The proposed scheme also achieves data integrity, resisting replay attack, forward and backward secrecy, non-repudiation, and mutual authentication.
Similar content being viewed by others
References
Whitmore A, Agarwal A, Da Xu L (2015) The internet of things: a survey of topics and trends. Inf Syst Front 17(2):261–274
Ray BR, Abawajy J, Chowdhury M, Alelaiwi A (2018) Universal and secure object ownership transfer protocol for the Internet of Things. Fut Gener Comput Syst 78(2):838–849
Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981–1992
Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Fut Gener Comput Syst 49:104–112
Han J, Susilo W, Mu Y (2015) Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans Inf Forensics Secur 10:665–678
Zhao S, Aggarwal A, Frost R, Bai X (2012) A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun Surv Tutor 14(2):380–400
Zhou Z, Huang D, Wang Z (2015) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Comput 64(1):126–138
Kim H, Kim CH, Chung JM (2012) A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks. Wirel Commun Mob Comput 12(2):145–157
Chen CL, Liao JJ (2011) A fair online payment system for digital content via subliminal channel”. Electron Commerce Res Appl 10:279–287
Chen CL, Liu MH (2009) A traceable E-cash transfer system against blackmail via subliminal channel. Electron Commerce Res Appl 8:327–333
Chen CL, Wang KH, Tsaur WJ, Chen JH, Chen CH (2017) An electronic public engineering project bidding protocol via a subliminal channel. J Inf Technol Control 46:470–483
Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things. IEEE Internet Things J 5(4):2884–2895
Banerjee S, Odelu V, Das AK, Srinivas J, Kumar N, Chattopadhyay S, Choo KKR (2019)A provably secure and lightweight anonymous user authenticated session key exchange scheme for the Internet of Things deployment. IEEE Internet Things J 6(5): 8739–8752
Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132–146
Islam SH, Vijayakumar P, Bhuiyan MZA, Amin R, Balusamy B (2017) A provably secure three-factor session initiation protocol for multimedia big data communications. IEEE Internet Things J 5(5):3408–3418
Global Trade and Blockchain Forum. https://www.wto.org/english/res_e/reser_e/workshop_blockchain_21219_e.htm/, April 27, 2020
Blockchain in Supply Chain Management. https://consensys.net/blockchain-use-cases/supply-chain-management/, April. 27, 2020
Who will win the race to blockchain supply chain supremacy? https://www.ibm.com/blockchain/industries/supply-chain, April. 27, 2020
Simplicio MA Jr, Silva MVM, Alves RCA, Shibata TKC (2017) Lightweight and escrow-less authenticated key agreement for the Internet of Things. Comput Commun 98:43–51
Simplicio M., Oliveira B, Barreto P, Margi C, Carvalho T, Naslund M (2011) Comparison of authenticated-encryption schemes in wireless sensor networks. In: Proceedings of the 36th IEEE Conference on Local Computer Networks (LCN), 2011, pp 454–461
He D, Chen C, Chan S, Bu J (2012) SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 59(11):4155–4163
Dakhli Z, Lafhaj Z (2017) Efficient logistics enabled by smart solutions in tunneling. Undergr Space 2:227–233
Danielsen JM, Engelseth P, Wang H (2018) Large scale integration of wireless sensor network technologies for air quality monitoring at a logistics shipping base. J Ind Inf Integr 10:20–28
Luo H, Wang K, Kong XTR, Lu S, Qu T (2017) Synchronized production and logistics via ubiquitous computing technology. Robot Comput-Integr Manuf 45:99–115
Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36
Han W, Zhu Z (2014) An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int J Commun Syst 27(8):1173–1185
Simmons GJ (1984) The subliminal channel and digital signatures. In: Proceedings of the Eurocrypt’84 workshop on Advances in Cryptology, pp 364–378
Simmons GJ (1993) Subliminal communication is easy using the DSA. In: Proceedings of Eurocrypt’93, pp 218–232
Simmons GJ (1998) The history of subliminal channels. IEEE J Sel Areas Commun 16:452–462
Chang SE, Chen YC, Lu MF (2019) Supply chain re-engineering using blockchain technology: a case of smart contract based tracking process. Technol Forecast Soc Change 144:1–11
Li CT, Wu TY, Chen CL, Lee CC, Chen CM (2017) An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system. Sensors. https://doi.org/10.3390/s17071482
Das AK, Goswami A (2015) A robust anonymous biometric-based remote user authentication scheme using smart cards. J King Saud Univ Comput Inf Sci 27:193–210
Speranza MG (2018) Trends in transportation and logistics. Eur J Oper Res 264:830–836
Odelu V, Das AK, Goswami A (2015) An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card. J Inf Secur Appl 21:1–19
Mishra D, Chaturvedi A, Mukhopadhyay S (2015) Design of a lightweight two-factor authentication scheme with smart card revocation. J Inf Secur Appl 23:44–53
Chaturvedi A, Das AK, Mishra D, Mukhopadhyay S (2016) Design of a secure smart card-based multi-server authentication scheme. J Inf Secur Appl 30:64–80
Madhusudhan R, Hegde M (2017) Security bound enhancement of remote user authentication using smart card. J Inf Secur Appl 36:59–68
Store, deliverer, and package graphics. http://616pic.com/, April. 27, 2020
Blockchain center, logistics, and client graphics. https://zh.pngtree.com/, April. 27, 2020
Marcus MJ (2015) 5G and IMT for 2020 and beyond. IEEE Wirel Commun 22(4):2–3
Acknowledgements
This study is supported by the Ministry of Science and Technology (MOST), Taiwan, Republic of China, under the Grants of MOST 108-2221-E-324-013.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chen, CL., Deng, YY., Weng, W. et al. A blockchain-based intelligent anti-switch package in tracing logistics system. J Supercomput 77, 7791–7832 (2021). https://doi.org/10.1007/s11227-020-03558-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-020-03558-7