1 / 22

Su Jin Kim, Guofeng Deng, Sandeep K.S. Gupta School of Computing and Informatics

Intelligent Networked Containers for Enhancing Global Supply Chain Security and Enabling New Commercial Value. Su Jin Kim, Guofeng Deng, Sandeep K.S. Gupta School of Computing and Informatics Arizona State University Tempe, Arizona, US. Mary Murphy-Hoye Intel Corp. Chandler, Arizona, US.

hide
Download Presentation

Su Jin Kim, Guofeng Deng, Sandeep K.S. Gupta School of Computing and Informatics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Intelligent Networked Containers for Enhancing Global Supply Chain Security and Enabling New Commercial Value Su Jin Kim, Guofeng Deng, Sandeep K.S. Gupta School of Computing and Informatics Arizona State University Tempe, Arizona, US Mary Murphy-Hoye Intel Corp. Chandler, Arizona, US Sponsor: http://impact.asu.edu

  2. Tempe, Fulton Schoolof Computing and Informatics

  3. IMPACT (Intelligent Mobile Pervasive Autonomic Computing & Technologies) LAB Research Goals • Enable Context-Aware Pervasive Applications • Dependable Distributed Sensor Networking Projects • Wireless Solution for Smart Sensors Biomedical Applications (NSF - ITR) • Context-Aware Middleware for Pervasive Computing (NSF – NMI) • Thermal Management Datacenters (SFAZ, NSF) • Location Based Access Control (CES) • Identity Assurance (NSF, CES) • Mobility-Tolerant Multicast (NSF) • Ayushman – Infrastructure Testbed for Sensor Based Health Monitoring (Mediserve Inc.) Group • Faculty: Dr. Sandeep K. S. Gupta • 1 PostDoc + 7 PhD + 2MS + 1 UG Department of Computer Science & Engineering, Tempe, Arizona http://impact.asu.edu Sponsors

  4. Thermal Management for Data Centers Pervasive Health Monitoring Criticality Aware-Systems Mobile Ad-hoc Networks ID Assurance • Goal: • Increasing computing capacity for datacenters • Energy efficiency • Features: • Online thermal evaluation • Thermal Aware Scheduling • Sponsor: • Goal: • Protect people’s identity & consumer computing from viral threats • Features: • PKI based • Non-tamperable, non-programmable personal authenticator • Hardware and VM based trust management • Sponsor: • Goal: • Container Monitoring for Homeland Security • Dynamic Supply Chain Management • Features: • Integration of RFID and environmental sensors • Energy management • Communication security • Sponsor: • Goal: • Protocols for mobile ad-hoc networks • Features: • Energy efficiency • Increased lifetime • Data aggregation • Localization • Caching • Multicasting • Sponsor: Intelligent Container IMPACT: Research Use-inspired research in pervasive computing & wireless sensor networking • Goal: • Pervasive Health monitoring • Evaluation of medical applications • Features: • Secure, Dependable and Reliable data collection, storage and communication • Sponsor: • Goal: • Evaluation of crisis response management • Features: • Theoretical model • Performance evaluation • Access control for crisis management • Sponsor: Medical Devices, Mobile Pervasive Embedded Sensor Networks BOOK: Fundamentals of Mobile and Pervasive Computing, Publisher: McGraw-Hill  Dec. 2004

  5. Agenda • Motivation • Intelligent Networked Container • Our approaches • System Architecture • Functional Architecture • Prototype Implementation • Experimental Study of currently available technologies • Lessons learned • Future Work

  6. Motivation • Global nature of today’s economy • Global trade is increasing by 10% annually. • 90% of the world’s trade is transported in Cargo Containers. • More than 10 million cargo containers enter U.S. ports each year. • Homeland Security • Only 5 % can be inspected because of today’s limited time and money. • Vulnerability to terrorism and theft • DHS (Department of Homeland Security) began several research programs. • Container Security Device (CSD), Advanced Container Security Device (ACSD), and Marine Asset Tag Tracking System (MATTS) • Additional commercial benefits • Provide End-to-End Visibility from a supplier to consumer for dynamic supply chain and chain of custody. • Verification of currently available technologies • To prove the viability using currently available technologies

  7. Functional Requirements of CSD, ACSD, and MATTS

  8. Our approaches • Using RF technologies • In marine environments, high interference from metal and dense materials in and around the containers and no line of sight • Wireless Sensor Networks (WSN): Sensing and monitoring of containers • Radio Frequency Identification (RFID): Automatic and unique identification, multi-level tracking (e.g. products, packages, pallets, containers, etc) • Dynamic Networked Containers • Dynamic network among containers located in close proximity • Interact with neighboring containers • Enhance the security of cargo containers

  9. Hierarchical Network Structure • Server • At shipper’s control center • Communication with gateways via the External Container Network • External Container Network • To support the communication between gateways and interface between the server and a gateway • Internal Container Network • To support the communication between devices within a container (e.g. a gateway, a RFID reader, and sensors)

  10. Scalability and Flexibility in Dynamic Container Networks External Container Network • A container forms and participates in networks with their neighbors dynamically. Internal Container Network • The network inside a container is isolated from the dynamic changes outside a container.

  11. Functional Architecture

  12. Gateway Implementation Stargate USB Memory Card MICAz mote 2.4 GHz USB 51-pin Stargate (Gateway) Ethernet • Crossbow Stargate Gateway • Single-board embedded Linux computing designed for sensor networking applications • Low-power device • Various interfaces RS232 PCMCIA Compact Flash 802.11 Compact Flash card

  13. RFID Reader-Mote Implementation • SkyeTek M9 UHF RFID Reader • Small form factor, cost-efficient, energy-efficient and high-performance RFID reader • Converter • Two-way communications • Voltage conversion between the M9 reader (5V) and MicaZ mote (3V) Reader-Mote MICAz mote 2.4 GHz Converter UART RS232 M9 UHF RFID Reader

  14. Testing Scenario Container Setup (Frequency, power) Command Setup (Frequency, power) or Start/Stop Read Command Data PDA: Monitors data from the gateway and setup variables Gateway: Data collection, Database management, control etc. Reader-mote module: Reads tag IDs and reports fresh readings Tag IDs Notification of door-opening/closing actions Initialization Door-Opening Sensor: detects door-opening/closing action using a light sensor Data MicaZ/TelosB mote(s): Report sensed data periodically

  15. Tests • Tested in a standalone container over several months in Chandler, Arizona, US • Tested in a container yard in a 3×3 stacked container configuration in South Kearny, New Jersey, US • Tested during a 5-day shipment from Singapore to Kaohsiung, Taiwan

  16. Experimental Study: RFID Read Ranges • According to the SkyeTek document, a M9 UHF RFID reader can approximately read 138 inches with the maximum output power (27 dBm). However, the average read ranges by our experiments are much smaller. • In Singapore and Taiwan, the government regulation of output power level is 0.5 watts ERP. In this case, the RFID read range is 10-18 inches.

  17. Experimental Study: Energy Consumption • ACSD requires 10 years and MATTS requires 1 year lifetime. • Unlike the gateway and motes, the RFID reader needs to operate only 760 hours per year for loading/unloading operations. • Using sleep mode, the energy consumption can be reduced. • For our 5-day test from Singapore to Taiwan, we used a large (car-size) battery.

  18. Experimental Study: Lifetime of MicaZ motes • MicaZ mote with MTS310 Sensor board • Broadcasts a packet every 10 sec with its voltage level • Uses the power saving mode (switching off radio and sensor board after readings) • 2 new AA batteries • The base station (4 meters away) collects packets • The mote lasts about 46 days 46 days

  19. Lessons learned • Several constraints and difficulties with today’s technology • Cost requirement of MATTS and ACSD is $50 US per transit. • RF technologies have been rapidly decreasing in cost. • Lifetime requirement of MATTS is 1 year. • Highly energy efficient devices as well as management (sleep mode, adjusted frequency of reading/sensing/reporting) are required. • The RFID read ranges are not large enough to cover a container. • Multiple readers, targeted antenna and tag design can be used.

  20. Future Work • Additional Investigation to improve the life-time and RFID read ranges • Secure and reliable communication • Decision making for alerting • Efficient maintenance of dynamic networks

  21. Backup slides

  22. Government Regulations for UHF RFID ERP (Effective Isotropic Radiated Power) EIRP (Effective Radiated Power) ERP (dB) = EIRP (dB) – 2.15dB

More Related