Skip to main content
Log in

A secure vehicle theft detection framework using Blockchain and smart contract

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Nowadays, vehicle theft has been increased drastically all over the world. The prevention of vehicle theft is essential to enhance vehicle security. A large number of vehicles have been stolen for the lack of essential foundation and administration of a secure platform. Several existing systems were developed to protect the vehicle from unauthorized access. But, they suffer from various limitations such as data security, the possibility of cybercriminals activities, leakage of personal information, and centralized System. We propose a vehicle theft detection framework using a decentralized and secure platform to increase the security level of the vehicle. Blockchain and smart contracts are used to provide the security of the stored data on the ledger and authenticate a genuine user automatically with greater accuracy. In this paper, we present 2-Step Authentication (2SA) and unauthorized access detection algorithms. The 2SA ensures the secure accessibility of the application by providing the randomly token chosen by the user. The proposed framework can provide vehicle security and owner’s privacy. In this proposed framework, more than one person can drive the vehicle authorizing by the vehicle owner without hampering stored data in the vehicle device.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9.
Fig. 10.
Fig. 11.
Fig. 12.
Fig. 13

Similar content being viewed by others

References

  1. Ghasempour A (2019) Internet of things in smart grid: architecture, applications, services, key technologies, and challenges. Inventions 4:22. https://doi.org/10.3390/inventions4010022

    Article  Google Scholar 

  2. Dey M, Arif MA, Mahmud MA (2017) Anti-theft protection of vehicle by GSM & GPS with fingerprint verification, 2017 International conference on electrical, computer and communication engineering (ECCE), Cox's Bazar 916-920. https://doi.org/10.1109/ECACE.2017.7913034

  3. Liu B, Liu N, Chen G, Dai X, Liu M (2018) A low-cost vehicle anti-theft system using obsolete smartphone. Mob Inf Syst 2018:16–16. https://doi.org/10.1155/2018/6569826

    Article  Google Scholar 

  4. Kiruthiga N, Latha L, Thangasamy S (2015) Real time biometrics based vehicle security system with GPS and GSM technology. Procedia Comput Sci 47:471–479. https://doi.org/10.1016/j.procs.2015.03.231

    Article  Google Scholar 

  5. Liu Z, He G (2005) Research on Vehicle Anti-theft and Alarm System Using Facing Recognition International Conference on Neural Networks and Brain. Beijing. 925–929. https://doi.org/10.1109/ICNNB.2005.1614771

  6. Jaccard JJ, Nepal S (2014) A survey of emerging threats in cyber security. J Comput Syst Sci 80(5):973–993. https://doi.org/10.1016/j.jcss.2014.02.005

    Article  MATH  Google Scholar 

  7. Gendrullis T, Novotny M, Rupp A (2008) A real-world attack breaking A5/1 within hours. Cryptographic hardware and embedded systems-CHES 2008. CHES 2008. Lect Notes Comput Sci 5154:266–282. https://doi.org/10.1007/978-3-540-85053-3_17

    Article  Google Scholar 

  8. Ko E, Kim T, Kim H (2017) Management platform of threats information in IoT environment. J Ambient Intell Humaniz Comput 9(4):1167–1176. https://doi.org/10.1007/s12652-017-0581-6

    Article  Google Scholar 

  9. Rui H, Huan L, Yang H, YunHao Z (2020) Research on secure transmission and storage of energy IoT information based on Blockchain. Peer-to-Peer Netw Appl 13:1225–1235. https://doi.org/10.1007/s12083-019-00856-7

    Article  Google Scholar 

  10. Alotaibi B (2019) Utilizing Blockchain to Overcome Cyber Security Concerns in the Internet of Things: A Review. In: Utilizing Blockchain to overcome cyber security concerns in the internet of things: a review, in IEEE sensors journal, 19(23), 10953–10971. https://doi.org/10.1109/jsen.2019.2935035

    Chapter  Google Scholar 

  11. Hong S (2020) P2P networking based internet of things (IoT) sensor node authentication by Blockchain. Peer-to-Peer Netw Appl 13:579–589. https://doi.org/10.1007/s12083-019-00739-x

    Article  Google Scholar 

  12. Dimitrov DV (2019) Blockchain applications for healthcare data management. Healthcare Informatics Res 25(1):51–56. https://doi.org/10.4258/hir.2019.25.1.51

    Article  Google Scholar 

  13. Chang Y, Iakovou E, Shi W (2019) Blockchain in global supply chains and cross border trade: a critical synthesis of the state-of-the-art, challenges and opportunities. Int J Prod Res:1–18. https://doi.org/10.1080/00207543.2019.1651946

  14. Singh PK, Singh R, Nandi SK, Nandi S (2019) Managing Smart Home Appliances with Proof of Authority and Blockchain. Commun Comput Inf Sci:221–232. https://doi.org/10.1007/978-3-030-22482-0_16

  15. Zhu X, Wang D (2019) Research on Blockchain Application for E-Commerce. Finance and Energy IOP Conf. Ser.: Earth Environ Sci. 252:042126

    Google Scholar 

  16. Zhang Y, Wen J (2017) The IoT electric business model: using blockchain technology for the internet of things. Peer-to-Peer Network Appl 10:983–994. https://doi.org/10.1007/s12083-016-0456-1

    Article  Google Scholar 

  17. Li H, Pei L, Liao D, Sun G, Xu D (2019) Blockchain meets VANET: an architecture for identity and location privacy protection in VANET. Peer-to-Peer Netw. Appl 12:1178–1193. https://doi.org/10.1007/s12083-019-00786-4

    Article  Google Scholar 

  18. Qian M, Gao H, Liu W (2018) Android Based Vehicle Anti-Theft Alarm and Tracking System in Hand-Held Communication Terminal. 2018 IEEE international conference on consumer electronics-Taiwan (ICCE-TW) Taichung. 1-2. https://doi.org/10.1109/ICCE-China.2018.8448426

  19. Wei J, Chiu C, Huang F, Zhang J, Cai C (2019) A cost-effective decentralized vehicle remote positioning and tracking system using BeiDou navigation satellite system and Mobile network. J Wireless Com Network 2019:112. https://doi.org/10.1186/s13638-019-1436-y

    Article  Google Scholar 

  20. Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Netw Appl 13:1643–1655. https://doi.org/10.1007/s12083-020-00918-1

    Article  Google Scholar 

  21. Wang S, Ouyang L, Yuan Y, Ni X, Han X, Wang FY (2019) Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans Syst Man, Cybernetics: Syst 49(11):2266–2277. https://doi.org/10.1109/tsmc.2019.2895123

    Article  Google Scholar 

  22. Dashora C, Sudhagar PE, Marietta J (2019) IoT based framework for the detection of vehicle accident. Cluster Comput 23:1235–1250. https://doi.org/10.1007/s10586-019-02989-z

    Article  Google Scholar 

  23. Hlebiv O (2018) Ethereum Smart-Contract Storage https://applicature.com/blog/blockchain-technology/ethereum-smart-contract-storage. Accessed 30 Apr 2020

  24. Solidity: Introduction to Smart Contracts (2017) https://solidity.readthedocs.io/en/v0.4.21/introduction-to-smart-contracts.html. Accessed 30 Mar 2020

  25. Solomon MG (2020) Ethereum Smart Contracts: Tips for Handling Data in Solidity https://www.dummies.com/personal-finance/ethereum-smart-contracts-tips-for-handling-data-in-solidity/. Accessed 30 Mar 2020

  26. Felker D (2018) Self Destructing Smart Contracts In Ethereum. https://articles.caster.io/blockchain/self-destructing-smart-contracts-in-ethereum/. Accessed 5 Jun 2020

  27. Remix, Ethereum-IDE: Welcome to remix documentation (2019) http://remix.ethereum.org/. Accessed 15 May 2020

  28. Liu J, Liu Z (2019) A survey on security verification of Blockchain smart contracts. IEEE Access 7:77894–77904. https://doi.org/10.1109/access.2019.2921624

    Article  Google Scholar 

  29. Karbasi AH, Shahpasand S (2020) A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks. Peer-to-Peer Netw Appl 13:1423–1441. https://doi.org/10.1007/s12083-020-00901-w

    Article  Google Scholar 

  30. Zheng B, Zhu L, Shen M et al (2018) Scalable and privacy-preserving data sharing based on Blockchain. J Comput Sci Technol 33:557–567. https://doi.org/10.1007/s11390-018-1840-5

    Article  MathSciNet  Google Scholar 

  31. Ko E, Kim T, Kim H (2017) Management platform of threats information in IoT environment. J Ambient Intell Humaniz Comput 9(4):1167–1176. https://doi.org/10.1007/s12652-017-0581-6

    Article  Google Scholar 

  32. Jaccard JJ, Nepal S (2014) A survey of emerging threats in cybersecurity. J Comput Syst Sci 80(5):973–993. https://doi.org/10.1016/j.jcss.2014.02.005

    Article  MathSciNet  MATH  Google Scholar 

  33. Paik HY, Xu X, Bandara HMND, Lee SU, Lo SK (2019) Analysis of data Management in Blockchain-Based Systems: from architecture to governance. IEEE Access 7:186091–186107. https://doi.org/10.1109/access.2019.2961404

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sourav Banerjee.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Das, D., Banerjee, S. & Biswas, U. A secure vehicle theft detection framework using Blockchain and smart contract. Peer-to-Peer Netw. Appl. 14, 672–686 (2021). https://doi.org/10.1007/s12083-020-01022-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-01022-0

Keywords

Navigation