An End-to-End Bidirectional Authentication System for Pallet Pooling Management Through Blockchain Internet of Things (BIoT)

An End-to-End Bidirectional Authentication System for Pallet Pooling Management Through Blockchain Internet of Things (BIoT)

Wen Long, C. H. Wu, Y. P. Tsang, Qiyang Chen
Copyright: © 2021 |Pages: 25
DOI: 10.4018/JOEUC.290349
Article PDF Download
Open access articles are freely available for download

Abstract

Pallet pooling is regarded as a sustainable and cost-effective measure for the industry, but challenging to advocate due to weak data and pallet authentication.In order to establish trust between end-users and pallet pooling services, we propose an end-to-end, bidirectional authentication system for transmitted data and pallets based on blockchain and Internet-of-things (IoT) technologies. In addition, secure data authentication fosters the pallet authenticity in the whole supply chain network, which is achieved by considering the tag, location, and object-specific features. To evaluate the object-specific features, the scale invariant feature transform (SIFT) approach is adopted to match key-points and descriptors between two pallet images. According to the case study, it is found that the proposed system provides a low bandwidth blocking rate and a high probability of restoring complete data payloads. Consequently, positive influences on end-user satisfaction, quality of service, operational errors, and pallet traceability are achieved through the deployment of the proposed system.
Article Preview
Top

1. Introduction

In contemporary logistics and supply chain management, pallet pooling is a novel pallet management strategy to facilitate sustainability, cost-effectiveness, and better pallet quality. Extended from the concept of vendor-managed inventory (VMI) and sharing economy, the pallet pooling strategy is developed to manage the stock and quality of pallets on behalf of the pallet users. In contrast, the pallet pooling service providers (PPSP) are responsible for disseminating, collecting, and repairing the pallets to minimise the logistics operations' industrial wastes. End users in pallet pooling, including supply chain parties and logistics service providers, can order pallets from a shared pool managed by the pallet pooling company, where the pallets are in good condition, and arrive at the nominated facility just-in-time. In addition, the reverse logistics on pallets throughout the supply chain can be effectively managed to support the reuse and recycling of pallets and reduce corresponding industrial waste. Apart from merely ensuring the pallets are in good condition, some customs regulations, such as pest control, should be fulfilled, in which the pallets are required to be wholly heat-treated or fumigated. Since managing a bulk of pallets by the end-users effectively and sustainably is relatively complicated, the development of pallet pooling in the logistics network has become significant nowadays. Ultimately, the pallet users can get rid of managing the pallets by themselves, and resources on the pallet management can be released to the core business activities of the end-users. Although pallet pooling is regarded as a promising strategy in modern supply chains, effective identification, verification, and authentication of pallets are still under-exploration such that the trustworthiness from the end-users to pallet pooling is questionable. Due to the lack of a secure authentication protocol to manage pallet pools, the trust between end-users and pallet pooling system is difficult to establish, and the problems of fraudulent pallets and malicious nodes in the network are difficult to prevent. The effective implementation of the pallet pooling strategy should be built on secure and reliable data exchange and pallet authentication to eliminate the challenges above and system vulnerability. On the one hand, the access control of the IoT devices representing the pallets should be established to avoid the communication of unauthorised IoT nodes in the blockchain-based system. On the other hand, the pallet authenticity should be guaranteed to circulate the pallets through the identification and verification process between end-users. Consequently, pallet pooling companies are urged to formulate a secure pallet authentication system to create a trustworthy end-user ecosystem.

A typical authentication process using Internet of Things (IoT) requires that objects, including users and products, be identified and verified. As shown in Figure 1, the identification clarifies the identity (ID) information of objects accessed by other users. The verification builds the association between ID and product-specific features to avoid false and fake authentication. The identification and verification information is maintained for the authentication process, which refers to the validation of tag-based and location-based data and the product-specific features. For instance, end-users under the pallet pooling service systems should be able to authenticate their on-hand pallets based on the above identification and verification information. Therefore the pallet quality and specifications are ensured.

Figure 1.

Relationship between product identification, verification, and authentication

JOEUC.290349.f01

Complete Article List

Search this Journal:
Reset
Volume 36: 1 Issue (2024)
Volume 35: 3 Issues (2023)
Volume 34: 10 Issues (2022)
Volume 33: 6 Issues (2021)
Volume 32: 4 Issues (2020)
Volume 31: 4 Issues (2019)
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing