Skip to main content

ORIGINAL RESEARCH article

Front. Phys.

Sec. Social Physics

Volume 13 - 2025 | doi: 10.3389/fphy.2025.1540716

A Signature-Based Secure Interaction Scheme for Logistics Management Systems in the Internet of Things

Provisionally accepted
Zhenbo Zhang Zhenbo Zhang 1*Xingken Liu Xingken Liu 1lijiahui Gong lijiahui Gong 2Zhaoyu Zhuang Zhaoyu Zhuang 3
  • 1 Guangzhou College of Technology and Business, Foshan, China
  • 2 Wuhan Huaxia Institute of Technology, Wuhan, China
  • 3 Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences (CAS), Shenzhen, Guangdong Province, China

The final, formatted version of the article will be published soon.

    The rapid growth of e-commerce has been significantly driving the logistics industry's development, while the speed of information technology transformation has laid a solid foundation for this progress. The Internet of Things (IoT), recognized as a representative of next-generation information technology, has injected new vitality into intelligent logistics management through its powerful data collection and transmission capabilities. The importance of user access control mechanisms has become increasingly evident in logistics management systems. Therefore, this paper proposes a signature-based authenticated scheme for logistics management systems. In this scheme, the user's password, biometrics and smart card are used as the three authentication factors. During the login and authentication phase, registered users and devices in the logistics management system can securely and efficiently complete mutual authentication and key agreement. To verify the security performance of the proposed scheme, an simulation analysis is performed using the Scyther tool. Furthermore, performance evaluation demonstrates that the proposed scheme not only significantly enhances the security of the logistics management system but also maintains low costs.

    Keywords: Internet of Things, security, signature-based, Logistics Management Systems, authentication

    Received: 06 Dec 2024; Accepted: 20 Mar 2025.

    Copyright: © 2025 Zhang, Liu, Gong and Zhuang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

    * Correspondence: Zhenbo Zhang, Guangzhou College of Technology and Business, Foshan, China

    Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

    Research integrity at Frontiers

    Man ultramarathon runner in the mountains he trains at sunset

    94% of researchers rate our articles as excellent or good

    Learn more about the work of our research integrity team to safeguard the quality of each article we publish.


    Find out more