Abstract
Situations in which the civil supply of goods is threatened or affected by attacks, natural catastrophes, major accidents or criminal activities are in-creasing. Furthermore the unique identification of goods as well as the traceability up to the manufacturer gain in importance. Currently, the question is how to get more security in the flow of commodity in a feasible manner, without constraining them with additional inspections. Therefore the partners of the joint research project “Trans4Goods - Security in supply chains in the scope of surface transport of goods by secure information patterns on the freight” (“ www.trans4goods.org ”) determine feasible approaches.
Referring to a pharmaceutical supply chain, an IT-system concept shall be developed bundling capture and communication systems in a web portal solution. Additionally, local AutoID-data carriers (currently: 2D-Codes, RFID) which are attached to goods, packaging and carrier are examined as new technological solution for tracking security relevant data electronically in real-time concerning dimension and weight, means of transportation, temperature, location as well as the method of control. To assure data integrity and thus prevent manipulation suitable encryption methods are researched.
Innovative depth image sensor concepts are tested on the level of freight, whose measured data alone or in combination with the data of the AutoID carrier from the different object levels allow a station history related analysis of the data model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
EPCglobal, The EPCglobal Architecture Framework, EPCglobal Final Version 1.4 (2010)
EPCglobal, EPC Information Services (EPCIS), EPCIS Specification Ver-sion 1.0.1 (2007)
Chang, F., Dean, J., Ghemawat, S., et al.: Bigtable: A Distributed Storage System for Structured Data. ACM Transactions on Computer Systems (TOCS) 26, Article No.: 4 (2008)
Aigner, M., Plos, T., Feldhofer, M., et al.: Building Radio frequency IDenti-fication for the Global Environment (BRIDGE). Report on first part of the security WP: Tag security, D4.2.1 (2007)
Chae, H.-J., Yeager, D.-J., Smith, J.-R., et al.: Maximalist Cryptography and Computation on the WISP UHF RFID Tag, University of Massachusetts, Amherst. Intel Research Seattle, Seattle (2007)
Pendl, C., Pelnar, M., Hutter, M.: Elliptic Curve Cryptography on the WISP UHF RFID Tag. In: Institute for Applied Information Processing and Communications (IAIK) (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Borstell, H., Cao, L., Richter, K., Schäfer, C. (2012). Security in Supply Chains in the Scope of Surface Transport of Goods by Secure Information Patterns on the Freight – Trans4Goods. In: Aschenbruck, N., Martini, P., Meier, M., Tölle, J. (eds) Future Security. Future Security 2012. Communications in Computer and Information Science, vol 318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33161-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-33161-9_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33160-2
Online ISBN: 978-3-642-33161-9
eBook Packages: Computer ScienceComputer Science (R0)