Advertisement

A Survey of Authentication Protocols in Logistics System

  • Chin-Ling Chen
  • Dong-Peng Lin
  • Chin-Feng Lee
  • Yong-Yuan Deng
  • Somya AgrawalEmail author
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 156)

Abstract

E-commerce has developed rapidly in recent years. Many services and applications integrate IOT technologies are offered. Logistics is a representative application which focuses on rapid delivery, integrity of goods, and the privacy of personal information. This study surveys logistics environment and lists security requirements of past scheme. The goal of this study ensures these security issues should be considered in logistics applications. It will make people conversant with the basic environment and needs of logistics system.

Keywords

Mutual authentication Privacy Logistics system Security Integrity 

Notes

Acknowledgements

This research was partially supported by the Ministry of Science and Technology of the Republic of China under the Grants MOST 106-2221-E-324-006-MY2.

References

  1. 1.
    Speranza, M.G.: Trends in transportation and logistics. Eur. J. Oper. Res. 264, 830–836 (2018)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Xue, L., Hu C.: Application of RFID technology in agricultural byproduct logistics and food security supervising. In: 2014 Fifth International Conference on Intelligent Systems Design and Engineering Applications, pp. 226–229. IEEE (2014)Google Scholar
  3. 3.
    Ding, L.-H., Wang, J., Liu, L.: Privacy-preserving temperature query protocol in cold-chain logistics. In: 2015 7th International Conference on Intelligent Human-Machine Systems and Cybernetics, vol. 1, pp. 113–116. IEEE (2015)Google Scholar
  4. 4.
    Geng, Y., Li, J.: A research of electronic commerce logistics model based on cloud logistics and warehousing, In: 2012 International Symposium on Management of Technology (ISMOT), pp. 631–635. IEEE (2012)Google Scholar
  5. 5.
    Liu, S., Wang, J.: A security-enhanced express delivery system based on NFC. In: 2016 13th IEEE International Conference on Solid-State and Integrated Circuit Technology, pp. 1534–1536 (2016)Google Scholar
  6. 6.
    Cui, J., She, D., Ma, J., Wu, Q., Liu, J.: A new logistics distribution scheme based on NFC. In: 2015 International Conference on Network and Information Systems for Computers, pp. 492–495 (2015)Google Scholar
  7. 7.
    Aijaz, A., Bochow, B., Dotzer, F., Festag, A., Gerlach M., Kroh, R., Leinmuller, T.: Attacks on inter vehicle communication systems—an analysis. In: Proceedings of the WIT 2006, pp. 189–194 (2006)Google Scholar
  8. 8.
    Cho, J.-S., Jeong, Y.-S., Park, S.: Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Comput. Math Appl. 69, 58–65 (2015)CrossRefGoogle Scholar
  9. 9.
    Wazid, M., Das, A.K., Kumar, N., Odelu, V., Reddy, A.G., Park, K., Park, Y.: Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks. IEEE Access (5), 14966–14980 (2017)CrossRefGoogle Scholar
  10. 10.
    Liu, M.-M., Yu-Pu, H.: Equational security of a lattice-based oblivious transfer protocol. J. Netw. Intell. 2(3), 231–249 (2017)Google Scholar
  11. 11.
    Sun, Y., Zheng, W.: An identity-based ring signcryption scheme in ideal lattice. J. Netw. Intell. 3(3), 152–161 (2018)MathSciNetGoogle Scholar
  12. 12.
    Chen, C.-M., Huang, Y., Wang, E.K., Wu, T.-Y.: Improvement of a mutual authentication protocol with anonymity for roaming service in wireless communications. Data Sci. Pattern Recognit. 2(1), 15–24 (2018)Google Scholar
  13. 13.
    Li, J., Zhang, L.: Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol. Inf. Sci. 414, 187–202 (2017)CrossRefGoogle Scholar
  14. 14.
    Zhang, X., Li, H., Yang, Y., Sun, G., Chen, G.: Lipps: logistics information privacy protection system based on encrypted QR code. In: IEEE Trustcom/BigDataSE/ISPA, pp. 996–1000. IEEE (2016)Google Scholar
  15. 15.
    Zhao, S., Aggarwal, A., Frost, R., Bai, X.: A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun. Surv. Tutor. 14(2), 380–400 (2012)CrossRefGoogle Scholar
  16. 16.
    Das, A.K., Goswami, A.: A robust anonymous biometric-based remote user authentication scheme using smart cards. J. King Saud Univ. Comput. Inf. Sci. 27, 193–210 (2015)CrossRefGoogle Scholar
  17. 17.
    Gope, P., Amin, R., Hafizul Islam, S.K., Kumar, N., Bhalla, V.K.: Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Futur. Gener. Comput. Syst. 83, 629–637 (2018)CrossRefGoogle Scholar
  18. 18.
    Whitmore, A., Agarwal, A., Da, X.L.: The internet of things: a survey of topics and trends. Inf. Syst. Front. 17(2), 261–274 (2015)CrossRefGoogle Scholar
  19. 19.
    Chen, C.-M., Linlin, X., Tsu-Yang, W., Li, C.-R.: On the security of a Chaotic maps-based three-party authenticated key agreement protocol. J. Netw. Intell. 1(2), 61–66 (2016)Google Scholar
  20. 20.
    Chen, C.-M., Wang, K.-H., Wu, T.-Y., Wang, E.K.: On the security of a three-party authenticated key agreement protocol based on Chaotic maps. Data Sci. Pattern Recognit. 1(2), 1–10 (2017)Google Scholar
  21. 21.
    Wu, T.-Y., Chen, C.-M., Wang, K.-H., Pan, J.-S., Zheng, W., Chu, S.-C., Roddick, J.F.: Security analysis of Rhee et al.’s public encryption with keyword search schemes: a review. J. Netw. Intell. 3(1), 16–25 (2018)Google Scholar
  22. 22.
    Sharma, V., Vithalkar, A., Hashmi, M.: Lightweight security protocol for chipless RFID in Internet of Things (IoT) applications. In: 2018 10th International Conference on Communication Systems & Networks (COMSNETS), pp. 468–471 (2018)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Chin-Ling Chen
    • 1
    • 2
  • Dong-Peng Lin
    • 3
  • Chin-Feng Lee
    • 3
  • Yong-Yuan Deng
    • 2
  • Somya Agrawal
    • 3
    Email author
  1. 1.Department of Computer Science and Information EngineeringChaoyang University of TechnologyTaichung CityROC
  2. 2.School of Information EngineeringChangchun Sci-Tech UniversityChangchunChina
  3. 3.Department of Information ManagementChaoyang University of TechnologyTaichung CityROC

Personalised recommendations