UIR Middleware: A Smart Transport Application Example

  • Yassir Rouchdi
  • Khalid El YassiniEmail author
  • Mohammed Boulmalf
  • Kenza Oufaska
Conference paper
Part of the Lecture Notes in Intelligent Transportation and Infrastructure book series (LNITI)


This paper discusses a smart medicament transportation application, combining Radio Frequency Identification technology to insure luggage traceability, along with Wireless Sensors Network, which guarantees an optimal transportation/Conditioning environment. It discusses ESN middleware architecture and explains its security and privacy issues, including discussions about resolving these problems by applying Role based access Control model as an authentication tool, regulating back-end application’s access to data. Moreover, it presents the proposed architecture of our three layers middleware UIR, explaining how Complex event processing manages both RIFD and WSN events, shows RBAC rules application and gives details on the implementation process.




  1. 1.
    Rouchdi, Y., El Yassini, K., Oufaska, K.: Complex event processing and role-based access control implementation in ESN middleware. In: Innovations in Smart Cities and Applications, LNNS, vol. 37, pp. 966–975. Springer (2018)Google Scholar
  2. 2.
    United States Government Accountability Office: Information Security Radio Frequency Identification Technology in the Federal Government. United States Government Accountability Office (2005)Google Scholar
  3. 3.
    Su, X., Chu, C., Prabhu, B.S., Gadh, R.: On the creation of automatic identification and data capture infrastructure via RFID and other technologies. Taylor & Francis Group (2007)Google Scholar
  4. 4.
    Bell, S.: RFID Technology and Applications, pp. 6–8. Cambridge University Press, London (2011)Google Scholar
  5. 5.
    Catherine O’Connor, M.:Rfid is the key to car clubs success. RFID J. (2011)Google Scholar
  6. 6.
    Bornhövd, M.C., Lin, T., Haller, S., Schaper, J.: Integrating automatic data acquisition with business processes—experiences with SAP’s auto-ID infrastructure. In: Proceedings of the 30st International Conference on Very Large Data Bases (VLDB), pp. 1182–1188. Toronto (2004)Google Scholar
  7. 7.
    Rouchdi, Y., El Yassini, K., Oufaska, K.: UIR-middleware. Int. J. Sci. Res. (IJSR) 7(2), 1492–1496 (2018)Google Scholar
  8. 8.
    Ferraiolo, R., Kuhn, D.F., Sandhu, D.R.: The NIST model for role-based access control: toward a unified standard. In: 5th ACM Workshop Role-Based Access Control, pp. 47–63 (2000)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Yassir Rouchdi
    • 1
    • 2
  • Khalid El Yassini
    • 1
    Email author
  • Mohammed Boulmalf
    • 2
  • Kenza Oufaska
    • 2
  1. 1.IA Laboratory, Faculty of Sciences MeknesMoulay Ismail UniversityMeknesMorocco
  2. 2.TIC LaboratoryInternational University of RabatRabatMorocco

Personalised recommendations