Internet of Things Applications in Bulk Shipping Logistics: Problems and Potential Solutions

  • Xin Song
  • Lei Huang
  • Stefan Fenz
Part of the Communications in Computer and Information Science book series (CCIS, volume 312)

Abstract

Internet of Things (IoT) technology can be used to significantly increase the efficiency of bulk shipping logistics operations. In this paper we provide an overview of common IoT shipping logistics applications, outline their main problems (lack of standards, costs, and security), and provide potential solutions to these problems. The research results support researchers as well as practitioners at designing and deploying efficient bulk shipping logistics systems.

Keywords

Internet of Things shipping logistics RFID security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Sarma, A.C., Girao, J.: Identities in the Future Internet of Things. Wireless Personal Communications 49(3), 353–363 (2009)CrossRefGoogle Scholar
  2. 2.
    Song, X., Huang, L., Wang, Q.: The Research of Internet of Things in Railway Transportation. In: Asia-Pacific Conference on Information Network and Digital Content Security, pp. 369–373 (2010)Google Scholar
  3. 3.
    Yan, B., Huang, G.W.: Application of RFID and Internet of Things in Monitoring and Anti-counterfeiting for Products. In: International Seminar on Business and Information Management (ISBIM 2008) (December 2008)Google Scholar
  4. 4.
    Huang, P.: RFID Technology in the Port Logistics Application. Logistics Engineering and Management (11) (2009)Google Scholar
  5. 5.
    Li, D.: RFID Technology in the Port Informatization Construction Application. China New Technologies and Products (20) (2009)Google Scholar
  6. 6.
    Juels, A.: RFID Security and Privacy: a Research Survey. IEEE Journal on Selected Areas in Communications (24) (2006)Google Scholar
  7. 7.
    Garfinkel, S.L., Juels, A., Pappu, R.: RFID Privacy: an Overview of Problems and Proposed Solutions. IEEE Security & Privacy (3) (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Xin Song
    • 1
  • Lei Huang
    • 1
  • Stefan Fenz
    • 2
  1. 1.School of Economics and ManagementBeijing Jiaotong UniversityBeijingChina
  2. 2.Institute of Software Technology & Interactive SystemsVienna University of TechnologyViennaAustria

Personalised recommendations