Abstract
Using existing technology, nowadays it is possible to solve, or at least to reduce, most of the possible negative effects caused by the mismanagement of the supply chain process. In such industry, automation in product monitoring and control, inventory, customer relationship management, fleet tracking, etc., is a typical issue dealt by the companies who offer solutions for the individual problems. Transportation and logistics involves the delivery, movement and collection of goods through roads, and in the international case also through ports and airports. Consequently, it usually includes many actors, what complicates their management, efficiency and effectiveness. Therefore, time, boundaries, and interdependencies are the main difficulties in a chain supply. Besides, it raises several security challenges due to unintentional errors or intentional attacks. This paper presents a secure system to control the goods from their manufacture until their delivery to the end customer, which makes the work easier for custom authorities and all people responsible for goods in transit. In particular, we describe an innovative solution for the management of the complete supply chain process, which makes use of many different current IoT technologies such as RFID, EPC, Wi-Fi, GPS, QR codes, etc. in a safe and efficient way.
Research supported by the MINECO of Spain and the FEDER Fund under projects TIN2011- 25452 and IPT-2012-0585-370000, and the FPI scholarships BES-2009-016774 and ACIISI-BOC-60.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
European Rapex Report (2011), http://ec.europa.eu/consumers/safety/rapex/docs/2011_rapex_report_en.pdf
Giusto, D., Iera, A., Morabito, G., Atzori, L.: The Internet of Things. Springer (2010)
Shapiro, J.M.: Smart Cities: Quality of Life, Productivity, and The Growth Effects of Human Capital. Review of Economics and Statistics, v88, 324–335 (May 2, 2006)
Brewer, A., Button, K.J., Hensher, D.A.: Handbook of logistics and supply-chain management. Emerald Group Pub. Limited (2001)
Bose, I., Pal, R.: Auto-ID: managing anything, anywhere, anytime in the supply chain. Commun. ACM 48(8), 100–106 (2005), doi:10.1145/1076211.1076212, Key: citeulike:1414242
Pena, V.A., Zumelzu, L.: Cadena de Suministros: sus niveles e importancia. Informe (2006)
Christopher, M.: Logistics And Supply Chain Management: Creating Value-Adding Networks. Pearson Education (2005)
Beamon, B.M.: Supply Chain Design and Analysis: Models and Methods. International Journal of Production Economics 55(3), 281–294 (1998)
Borgstrm, B.: Exploring efficiency and effectiveness in the supply chain. A conceptual analysis. In: 21st IMP-Conference, Rotterdam, Netherlands (2005)
Calderón, J.L., Lario, F.C.: Simulación de Cadenas de Suministro: Nuevas Aplicaciones y Áreas de Desarrollo. Información Tecnológica 18(1), 137 (2007)
Package Buddy, https://play.google.com/store/apps/details?id=com.psyrus.packagebuddy
Harrison J.: Cost of Poor Quality. American Society for Quality (1987) ISBN 978-0-8247-7743-2
Schonberger, R. J: Japanese Manufacturing Techniques: Nine Hidden Lessons in Simplicity. Free Press (1982) ISBN 0-02-929100-3
Ranasinghe, D.C., Devadas, S., Cole, P.H.: A Low Cost Solution to Cloning and Authentication Based on a Lightweight Primitive. In: Networked RFID Systems and Lightweight Cryptography, Part IV, pp. 289–309. Springer, Heidelberg (2008), doi:10.1007/978-3-540-71641-9_17 ISBN 978-3-540-71640-2
Caballero-Gil, C., Caballero-Gil, P., Peinado-Domínguez, A., Molina-Gil, J.: Lightweight Authentication for RFID Used in VANETs. In: Moreno-Díaz, R., Pichler, F., Quesada-Arencibia, A. (eds.) EUROCAST 2011, Part II. LNCS, vol. 6928, pp. 493–500. Springer, Heidelberg (2012)
Rheinland, T.: Case Study: Supply Chain Security Analysis. Report (2007)
Conde-Lagoa, D., Costa-Montenegro, E., González-Castaño, F.J., Gil-Castiñeira, F.: Secure eTickets Based on QR-Codes with User-Encrypted Content. Consumer Electronics. Digest of Technical Papers.pp. 257-258 (2010)
Takeda, A.: A New Authentication Method with Distributed Hash Table for P2P Network. In: AINAW 2008 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops, pp. 483–488. IEEE Computer Society, Washington, DC (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Caballero-Gil, C., Molina-Gil, J., Caballero-Gil, P., Quesada-Arencibia, A. (2013). IoT Application in the Supply Chain Logistics. In: Moreno-Díaz, R., Pichler, F., Quesada-Arencibia, A. (eds) Computer Aided Systems Theory - EUROCAST 2013. EUROCAST 2013. Lecture Notes in Computer Science, vol 8112. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-53862-9_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-53862-9_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-53861-2
Online ISBN: 978-3-642-53862-9
eBook Packages: Computer ScienceComputer Science (R0)