Skip to main content
Log in

A blockchain-based intelligent anti-switch package in tracing logistics system

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In recent years, with the rapid development of e-commerce and network technologies, many people do online shopping through the Internet. If a physical product is bought by a client, the store will entrust their logistics to deliver the goods to the client. However, there have been many cases of switched goods which were purchased by clients recently. Some scholars proposed a security mechanism with a subliminal channel for E-cash and digital content previously. Only the designated sender and the designated receiver know the subliminal message which was hidden in the signature. Thus, it can be applied to solve the switched package issue. According to the WTO (World Trade Organization) forum, blockchain-related logistics applications have gradually emerged in recent days. Blockchain technology is essentially a decentralized database maintained by the collective. It has the characteristics of high reliability and high confidentiality and has a good prospect in effectively solving the trust problem between the two parties. In short, blockchain information will be publicly verifiable and cannot be tampered with, which provides solutions for traditional logistics. It realizes trust and cooperation between multiple entities, and create a modernized logistics environment. In this paper, we attach a sensor to monitor the situation of the delivery object and tag on the package to be an IoT object. The proposed scheme is a blockchain-based intelligent anti-switch package in tracing the logistics system. The client can check the GPS (Global Positioning System) location, the temperature, and humidity sensing data of the package any time during the delivery process, and the IoT-related intelligent logistics can be achieved. The proposed scheme also achieves data integrity, resisting replay attack, forward and backward secrecy, non-repudiation, and mutual authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Whitmore A, Agarwal A, Da Xu L (2015) The internet of things: a survey of topics and trends. Inf Syst Front 17(2):261–274

    Article  Google Scholar 

  2. Ray BR, Abawajy J, Chowdhury M, Alelaiwi A (2018) Universal and secure object ownership transfer protocol for the Internet of Things. Fut Gener Comput Syst 78(2):838–849

    Article  Google Scholar 

  3. Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981–1992

    Article  Google Scholar 

  4. Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Fut Gener Comput Syst 49:104–112

    Article  Google Scholar 

  5. Han J, Susilo W, Mu Y (2015) Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans Inf Forensics Secur 10:665–678

    Article  Google Scholar 

  6. Zhao S, Aggarwal A, Frost R, Bai X (2012) A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun Surv Tutor 14(2):380–400

    Article  Google Scholar 

  7. Zhou Z, Huang D, Wang Z (2015) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Comput 64(1):126–138

    Article  MathSciNet  Google Scholar 

  8. Kim H, Kim CH, Chung JM (2012) A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks. Wirel Commun Mob Comput 12(2):145–157

    Article  Google Scholar 

  9. Chen CL, Liao JJ (2011) A fair online payment system for digital content via subliminal channel”. Electron Commerce Res Appl 10:279–287

    Article  Google Scholar 

  10. Chen CL, Liu MH (2009) A traceable E-cash transfer system against blackmail via subliminal channel. Electron Commerce Res Appl 8:327–333

    Article  Google Scholar 

  11. Chen CL, Wang KH, Tsaur WJ, Chen JH, Chen CH (2017) An electronic public engineering project bidding protocol via a subliminal channel. J Inf Technol Control 46:470–483

    Google Scholar 

  12. Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things. IEEE Internet Things J 5(4):2884–2895

    Article  Google Scholar 

  13. Banerjee S, Odelu V, Das AK, Srinivas J, Kumar N, Chattopadhyay S, Choo KKR (2019)A provably secure and lightweight anonymous user authenticated session key exchange scheme for the Internet of Things deployment. IEEE Internet Things J 6(5): 8739–8752

  14. Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132–146

    Article  Google Scholar 

  15. Islam SH, Vijayakumar P, Bhuiyan MZA, Amin R, Balusamy B (2017) A provably secure three-factor session initiation protocol for multimedia big data communications. IEEE Internet Things J 5(5):3408–3418

    Article  Google Scholar 

  16. Global Trade and Blockchain Forum. https://www.wto.org/english/res_e/reser_e/workshop_blockchain_21219_e.htm/, April 27, 2020

  17. Blockchain in Supply Chain Management. https://consensys.net/blockchain-use-cases/supply-chain-management/, April. 27, 2020

  18. Who will win the race to blockchain supply chain supremacy? https://www.ibm.com/blockchain/industries/supply-chain, April. 27, 2020

  19. Simplicio MA Jr, Silva MVM, Alves RCA, Shibata TKC (2017) Lightweight and escrow-less authenticated key agreement for the Internet of Things. Comput Commun 98:43–51

    Article  Google Scholar 

  20. Simplicio M., Oliveira B, Barreto P, Margi C, Carvalho T, Naslund M (2011) Comparison of authenticated-encryption schemes in wireless sensor networks. In: Proceedings of the 36th IEEE Conference on Local Computer Networks (LCN), 2011, pp 454–461

  21. He D, Chen C, Chan S, Bu J (2012) SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 59(11):4155–4163

    Article  Google Scholar 

  22. Dakhli Z, Lafhaj Z (2017) Efficient logistics enabled by smart solutions in tunneling. Undergr Space 2:227–233

    Article  Google Scholar 

  23. Danielsen JM, Engelseth P, Wang H (2018) Large scale integration of wireless sensor network technologies for air quality monitoring at a logistics shipping base. J Ind Inf Integr 10:20–28

    Google Scholar 

  24. Luo H, Wang K, Kong XTR, Lu S, Qu T (2017) Synchronized production and logistics via ubiquitous computing technology. Robot Comput-Integr Manuf 45:99–115

    Article  Google Scholar 

  25. Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36

    Article  Google Scholar 

  26. Han W, Zhu Z (2014) An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int J Commun Syst 27(8):1173–1185

    Article  Google Scholar 

  27. Simmons GJ (1984) The subliminal channel and digital signatures. In: Proceedings of the Eurocrypt’84 workshop on Advances in Cryptology, pp 364–378

  28. Simmons GJ (1993) Subliminal communication is easy using the DSA. In: Proceedings of Eurocrypt’93, pp 218–232

  29. Simmons GJ (1998) The history of subliminal channels. IEEE J Sel Areas Commun 16:452–462

    Article  Google Scholar 

  30. Chang SE, Chen YC, Lu MF (2019) Supply chain re-engineering using blockchain technology: a case of smart contract based tracking process. Technol Forecast Soc Change 144:1–11

    Article  Google Scholar 

  31. Li CT, Wu TY, Chen CL, Lee CC, Chen CM (2017) An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system. Sensors. https://doi.org/10.3390/s17071482

    Article  Google Scholar 

  32. Das AK, Goswami A (2015) A robust anonymous biometric-based remote user authentication scheme using smart cards. J King Saud Univ Comput Inf Sci 27:193–210

  33. Speranza MG (2018) Trends in transportation and logistics. Eur J Oper Res 264:830–836

    Article  MathSciNet  Google Scholar 

  34. Odelu V, Das AK, Goswami A (2015) An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card. J Inf Secur Appl 21:1–19

    Google Scholar 

  35. Mishra D, Chaturvedi A, Mukhopadhyay S (2015) Design of a lightweight two-factor authentication scheme with smart card revocation. J Inf Secur Appl 23:44–53

    Google Scholar 

  36. Chaturvedi A, Das AK, Mishra D, Mukhopadhyay S (2016) Design of a secure smart card-based multi-server authentication scheme. J Inf Secur Appl 30:64–80

    Google Scholar 

  37. Madhusudhan R, Hegde M (2017) Security bound enhancement of remote user authentication using smart card. J Inf Secur Appl 36:59–68

    Google Scholar 

  38. Store, deliverer, and package graphics. http://616pic.com/, April. 27, 2020

  39. Blockchain center, logistics, and client graphics. https://zh.pngtree.com/, April. 27, 2020

  40. Marcus MJ (2015) 5G and IMT for 2020 and beyond. IEEE Wirel Commun 22(4):2–3

    Article  Google Scholar 

Download references

Acknowledgements

This study is supported by the Ministry of Science and Technology (MOST), Taiwan, Republic of China, under the Grants of MOST 108-2221-E-324-013.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yong-Yuan Deng, Wei Weng or Ming Zhou.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, CL., Deng, YY., Weng, W. et al. A blockchain-based intelligent anti-switch package in tracing logistics system. J Supercomput 77, 7791–7832 (2021). https://doi.org/10.1007/s11227-020-03558-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-020-03558-7

Keywords

Navigation