522 research outputs found
Implementation of Middleware for Internet of Things in Asset Tracking Applications: In-lining Approach
ThesisInternet of Things (IoT) is a concept that involves giving objects a digital identity and limited
artificial intelligence, which helps the objects to be interactive, process data, make decisions,
communicate and react to events virtually with minimum human intervention. IoT is intensified
by advancements in hardware and software engineering and promises to close the gap that exists
between the physical and digital worlds. IoT is paving ways to address complex phenomena,
through designing and implementation of intelligent systems that can monitor phenomena,
perform real-time data interpretation, react to events, and swiftly communicate observations. The
primary goal of IoT is ubiquitous computing using wireless sensors and communication
protocols such as Bluetooth, Wireless Fidelity (Wi-Fi), ZigBee and General Packet Radio
Service (GPRS).
Insecurity, of assets and lives, is a problem around the world. One application area of IoT is
tracking and monitoring; it could therefore be used to solve asset insecurity. A preliminary
investigation revealed that security systems in place at Central University of Technology, Free
State (CUT) are disjointed; they do not instantaneously and intelligently conscientize security
personnel about security breaches using real time messages. As a result, many assets have been
stolen, particularly laptops. The main objective of this research was to prove that a real-life application built over a generic
IoT architecture that innovatively and intelligently integrates: (1) wireless sensors; (2) radio
frequency identification (RFID) tags and readers; (3) fingerprint readers; and (4) mobile phones,
can be used to dispel laptop theft. To achieve this, the researcher developed a system, using the
heterogeneous devices mentioned above and a middleware that harnessed their unique
capabilities to bring out the full potential of IoT in intelligently curbing laptop theft.
The resulting system has the ability to: (1) monitor the presence of a laptop using RFID reader
that pro-actively interrogates a passive tag attached to the laptop; (2) detect unauthorized
removal of a laptop under monitoring; (3) instantly communicate security violations via cell
phones; and (4) use Windows location sensors to track the position of a laptop using Googlemaps.
The system also manages administrative tasks such as laptop registration, assignment and withdrawal which used to be handled manually. Experiments conducted using the resulting
system prototype proved the hypothesis outlined for this research
From truth to trust: the impact of blockchain traceability on trust in product authenticity
In the global marketplace, customers are increasingly unaware of the source, provenance, and authenticity of products. Early research has shown that the introduction of blockchain technology into the supply chain area can make it more transparent and trustworthy. As a platform that supports distributed, cryptographically secure, auditable transactions, blockchain has expanded from the domain of digital cryptocurrency into the domain of physical asset provenance and ownership tracking and tracing. This research examines blockchain support of trust in product authenticity adopting a two-paper dissertation format. In the first conceptual paper, I develop a conceptual framework on blockchain technology\u27s unique features and characteristics and how it can boost trust in product authenticity. The second paper adopts the conceptual framework to test through a vignette experiment the effects of blockchain traceability, product identification, and the interaction between them on trust in product origin authenticity. Academics can use this research to develop new instruments to inform practice about how blockchain can boost trust in product authenticity. Results from this study can inform managers considering investments into blockchain solutions and unique product identification as a customer product authenticity, brand protection, or anti-counterfeiting strategy
Global traceability
The use of Ultra High Frequency (UHF) Radio Frequency Identification (RFID) in supply
chain management (SCM) systems was a big source for optimism. However, the expected
rapid industry adoption of RFID did not take place. This research explores some of the
existing challenges and obstacles to RFID adoption, such as the lack of consistent UHF
spectrum regulations for RFID or the absence of standards that promote integration with
Automatic Identification and Data Capture (AIDC) media. As a conclusion, in this project
we suggest some solutions to these challenges in the use of multi-frequency RFID tags that
can be read at more that one frequency or novel migration strategies and standards that
would help expand the industry.Outgoin
An Innovative Strategy Based on Secure Element for Cyber–Physical Authentication in Safety-Critical Manufacturing Supply Chain
This research has been founded by the European Union’s Horizon 2020 Research and Innovation program under grant agreement No. 871518, a project named, A COmprehensive cyber-intelligence framework for resilient coLLABorative manufacturing Systems, COLLABS [55].The accurate tracking of every production step and related outcome in a supply chain is a stringent requirement in safety-critical sectors such as civil aviation. In such a framework, trusted traceability and accountability can be reliably and securely managed by means of blockchain-based solutions. Unfortunately, blockchain cannot guarantee the provenance and accuracy of the stored information. To overcome such a limitation, this paper proposes a secure solution to strongly rely on the tracking information of the physical assets in the supply chain. The proposed solution exploits Hardware Security Modules (HSMs) to provide required cryptographic primitives through a Near-Field Communication (NFC) connection. In our approach, each transfer of the assets is authenticated, verified, and recorded in the blockchain through the HSM. Transaction entries are signed, thus providing a guarantee of ownership and authenticity. The proposed infrastructure has been subject of an exhaustive security analysis and proved resilient against counterfeiting attempts, stakeholder repudiations, and misleading information.Horizon 2020 Framework Programme
871518 H202
- …