skip to main content
10.1145/3243046.3243049acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Ubiquitous System to Monitor Transport and Logistics

Published:25 October 2018Publication History

ABSTRACT

In the management of transport and logistics, which includes the delivery, movement and collection of goods through roads, ports and airports, participate, in general, many different actors. The most critical aspects of supply chain systems include time, space and interdependencies. Besides, there are several security challenges that can be caused both by unintentional and intentional errors. With all this in mind, this work proposes the combination of technologies such as RFID, GPS, WiFi Direct and LTE/3G to automate product authentication and merchandise tracking, reducing the negative effects caused either by mismanagement or attacks against the process of the supply chain. In this way, this work proposes a ubiquitous management scheme for the monitoring through the cloud of freight and logistics systems, including demand management, customization and automatic replenishment of out-of-stock goods. The proposal implies an improvement in the efficiency of the systems, which can be quantified in a reduction of time and cost in the inventory and distribution processes, and in a greater facility for the detection of counterfeit versions of branded articles. In addition, it can be used to create safer and more efficient schemes that help companies and organizations to improve the quality of the service and the traceability of the transported goods.

References

  1. European Rapex Reports. Available at http://ec.europa.eu/consumers/safety/rapex/ {retrieved: August, 2018}Google ScholarGoogle Scholar
  2. C investment hot. U.S. companies have begun to attack the more than $117 billion in excess inventory and $83 billion in lost sales. Material Handling Management, 2004.Google ScholarGoogle Scholar
  3. R Angeles, RFID Technologies: Supply-Chain Applications and Implementation Issues. Information Systems Management 22(1), pp. 51--65, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  4. D. Simchi-Levi, Designing and managing the supply chain, Mcgraw-Hill College, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Christopher, Logistics And Supply Chain Management: Creating Value-Adding Networks, Pearson Education, 2005.Google ScholarGoogle Scholar
  6. B. M. Beamon, Supply Chain Design and Analysis: Models and Methods, International Journal of Production Economics 55(3), pp. 281--294, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  7. H.L. Lee, S. Whang, Higher supply chain security with lower cost: Lessons from total quality management, International Journal of production economics 96(3), pp.289--300, 2005.Google ScholarGoogle Scholar
  8. D. Turker, C. Altuntas, Sustainable supply chain management in the fast fashion industry, An analysis of corporate reports, European Management Journal 32(5), pp. 837--849, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  9. .K. Srivastava, Green supply chain management: a state-of-the-art literature review, International Journal of Management Reviews 9(1), pp. 53--80, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  10. D.C. Ranasinghe, S. Devadas, P.H. Cole, A Low Cost Solution to Cloning and Authentication Based on a Lightweight Primitive, Networked RFID Systems and Lightweight Cryptography, Part IV, Springer, pp. 289--309, 2008.Google ScholarGoogle Scholar
  11. P. Caballero-Gil, C. Caballero-Gil, J. Molina-Gil, C. Hernandez-Goya, Self-Organized Authentication Architecture for Mobile Ad-hoc Networks, 6th International Symposium on Modeling and Optimization in Mobile, Ad-Hoc, and Wireless Networks, pp. 217--224, 2008.Google ScholarGoogle Scholar
  12. Package Buddy, Available at play.google.com, {retrieved: August, 2018}.Google ScholarGoogle Scholar
  13. Package Tracker Pro, Available at play.google.com, {retrieved: August, 2018}.Google ScholarGoogle Scholar
  14. M. Bouet, A.L. Dos Santos, RFID Tags: Positioning Principles and Localization Techniques, Wireless Days, pp. 1--5, 2008.Google ScholarGoogle Scholar
  15. B. King, X. Zhang, Securing the pharmaceutical supply chain using RFID, International Conference on Multimedia and Ubiquitous Engineering, pp 26--28, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. QR Code Generator, https://www.the-qrcode-generator.com/, {retrieved: August, 2018}Google ScholarGoogle Scholar
  17. C. Caballero-Gil, P. Caballero-Gil, A. Peinado-Dominguez, J. Molina-Gil, Lightweight Authentication for RFID Used in VANETs,Lecture Notes in Computer Science 6928, pp. 493--500, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    PE-WASUN'18: Proceedings of the 15th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks
    October 2018
    121 pages
    ISBN:9781450359610
    DOI:10.1145/3243046

    Copyright © 2018 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 25 October 2018

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate70of240submissions,29%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader