Abstract
Nowadays, vehicle theft has been increased drastically all over the world. The prevention of vehicle theft is essential to enhance vehicle security. A large number of vehicles have been stolen for the lack of essential foundation and administration of a secure platform. Several existing systems were developed to protect the vehicle from unauthorized access. But, they suffer from various limitations such as data security, the possibility of cybercriminals activities, leakage of personal information, and centralized System. We propose a vehicle theft detection framework using a decentralized and secure platform to increase the security level of the vehicle. Blockchain and smart contracts are used to provide the security of the stored data on the ledger and authenticate a genuine user automatically with greater accuracy. In this paper, we present 2-Step Authentication (2SA) and unauthorized access detection algorithms. The 2SA ensures the secure accessibility of the application by providing the randomly token chosen by the user. The proposed framework can provide vehicle security and owner’s privacy. In this proposed framework, more than one person can drive the vehicle authorizing by the vehicle owner without hampering stored data in the vehicle device.
Similar content being viewed by others
References
Ghasempour A (2019) Internet of things in smart grid: architecture, applications, services, key technologies, and challenges. Inventions 4:22. https://doi.org/10.3390/inventions4010022
Dey M, Arif MA, Mahmud MA (2017) Anti-theft protection of vehicle by GSM & GPS with fingerprint verification, 2017 International conference on electrical, computer and communication engineering (ECCE), Cox's Bazar 916-920. https://doi.org/10.1109/ECACE.2017.7913034
Liu B, Liu N, Chen G, Dai X, Liu M (2018) A low-cost vehicle anti-theft system using obsolete smartphone. Mob Inf Syst 2018:16–16. https://doi.org/10.1155/2018/6569826
Kiruthiga N, Latha L, Thangasamy S (2015) Real time biometrics based vehicle security system with GPS and GSM technology. Procedia Comput Sci 47:471–479. https://doi.org/10.1016/j.procs.2015.03.231
Liu Z, He G (2005) Research on Vehicle Anti-theft and Alarm System Using Facing Recognition International Conference on Neural Networks and Brain. Beijing. 925–929. https://doi.org/10.1109/ICNNB.2005.1614771
Jaccard JJ, Nepal S (2014) A survey of emerging threats in cyber security. J Comput Syst Sci 80(5):973–993. https://doi.org/10.1016/j.jcss.2014.02.005
Gendrullis T, Novotny M, Rupp A (2008) A real-world attack breaking A5/1 within hours. Cryptographic hardware and embedded systems-CHES 2008. CHES 2008. Lect Notes Comput Sci 5154:266–282. https://doi.org/10.1007/978-3-540-85053-3_17
Ko E, Kim T, Kim H (2017) Management platform of threats information in IoT environment. J Ambient Intell Humaniz Comput 9(4):1167–1176. https://doi.org/10.1007/s12652-017-0581-6
Rui H, Huan L, Yang H, YunHao Z (2020) Research on secure transmission and storage of energy IoT information based on Blockchain. Peer-to-Peer Netw Appl 13:1225–1235. https://doi.org/10.1007/s12083-019-00856-7
Alotaibi B (2019) Utilizing Blockchain to Overcome Cyber Security Concerns in the Internet of Things: A Review. In: Utilizing Blockchain to overcome cyber security concerns in the internet of things: a review, in IEEE sensors journal, 19(23), 10953–10971. https://doi.org/10.1109/jsen.2019.2935035
Hong S (2020) P2P networking based internet of things (IoT) sensor node authentication by Blockchain. Peer-to-Peer Netw Appl 13:579–589. https://doi.org/10.1007/s12083-019-00739-x
Dimitrov DV (2019) Blockchain applications for healthcare data management. Healthcare Informatics Res 25(1):51–56. https://doi.org/10.4258/hir.2019.25.1.51
Chang Y, Iakovou E, Shi W (2019) Blockchain in global supply chains and cross border trade: a critical synthesis of the state-of-the-art, challenges and opportunities. Int J Prod Res:1–18. https://doi.org/10.1080/00207543.2019.1651946
Singh PK, Singh R, Nandi SK, Nandi S (2019) Managing Smart Home Appliances with Proof of Authority and Blockchain. Commun Comput Inf Sci:221–232. https://doi.org/10.1007/978-3-030-22482-0_16
Zhu X, Wang D (2019) Research on Blockchain Application for E-Commerce. Finance and Energy IOP Conf. Ser.: Earth Environ Sci. 252:042126
Zhang Y, Wen J (2017) The IoT electric business model: using blockchain technology for the internet of things. Peer-to-Peer Network Appl 10:983–994. https://doi.org/10.1007/s12083-016-0456-1
Li H, Pei L, Liao D, Sun G, Xu D (2019) Blockchain meets VANET: an architecture for identity and location privacy protection in VANET. Peer-to-Peer Netw. Appl 12:1178–1193. https://doi.org/10.1007/s12083-019-00786-4
Qian M, Gao H, Liu W (2018) Android Based Vehicle Anti-Theft Alarm and Tracking System in Hand-Held Communication Terminal. 2018 IEEE international conference on consumer electronics-Taiwan (ICCE-TW) Taichung. 1-2. https://doi.org/10.1109/ICCE-China.2018.8448426
Wei J, Chiu C, Huang F, Zhang J, Cai C (2019) A cost-effective decentralized vehicle remote positioning and tracking system using BeiDou navigation satellite system and Mobile network. J Wireless Com Network 2019:112. https://doi.org/10.1186/s13638-019-1436-y
Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Netw Appl 13:1643–1655. https://doi.org/10.1007/s12083-020-00918-1
Wang S, Ouyang L, Yuan Y, Ni X, Han X, Wang FY (2019) Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans Syst Man, Cybernetics: Syst 49(11):2266–2277. https://doi.org/10.1109/tsmc.2019.2895123
Dashora C, Sudhagar PE, Marietta J (2019) IoT based framework for the detection of vehicle accident. Cluster Comput 23:1235–1250. https://doi.org/10.1007/s10586-019-02989-z
Hlebiv O (2018) Ethereum Smart-Contract Storage https://applicature.com/blog/blockchain-technology/ethereum-smart-contract-storage. Accessed 30 Apr 2020
Solidity: Introduction to Smart Contracts (2017) https://solidity.readthedocs.io/en/v0.4.21/introduction-to-smart-contracts.html. Accessed 30 Mar 2020
Solomon MG (2020) Ethereum Smart Contracts: Tips for Handling Data in Solidity https://www.dummies.com/personal-finance/ethereum-smart-contracts-tips-for-handling-data-in-solidity/. Accessed 30 Mar 2020
Felker D (2018) Self Destructing Smart Contracts In Ethereum. https://articles.caster.io/blockchain/self-destructing-smart-contracts-in-ethereum/. Accessed 5 Jun 2020
Remix, Ethereum-IDE: Welcome to remix documentation (2019) http://remix.ethereum.org/. Accessed 15 May 2020
Liu J, Liu Z (2019) A survey on security verification of Blockchain smart contracts. IEEE Access 7:77894–77904. https://doi.org/10.1109/access.2019.2921624
Karbasi AH, Shahpasand S (2020) A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks. Peer-to-Peer Netw Appl 13:1423–1441. https://doi.org/10.1007/s12083-020-00901-w
Zheng B, Zhu L, Shen M et al (2018) Scalable and privacy-preserving data sharing based on Blockchain. J Comput Sci Technol 33:557–567. https://doi.org/10.1007/s11390-018-1840-5
Ko E, Kim T, Kim H (2017) Management platform of threats information in IoT environment. J Ambient Intell Humaniz Comput 9(4):1167–1176. https://doi.org/10.1007/s12652-017-0581-6
Jaccard JJ, Nepal S (2014) A survey of emerging threats in cybersecurity. J Comput Syst Sci 80(5):973–993. https://doi.org/10.1016/j.jcss.2014.02.005
Paik HY, Xu X, Bandara HMND, Lee SU, Lo SK (2019) Analysis of data Management in Blockchain-Based Systems: from architecture to governance. IEEE Access 7:186091–186107. https://doi.org/10.1109/access.2019.2961404
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Das, D., Banerjee, S. & Biswas, U. A secure vehicle theft detection framework using Blockchain and smart contract. Peer-to-Peer Netw. Appl. 14, 672–686 (2021). https://doi.org/10.1007/s12083-020-01022-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-020-01022-0