Professional Documents
Culture Documents
Computers in Industry
journal homepage: www.elsevier.com/locate/compind
A R T I C L E I N F O A B S T R A C T
Article history: Ports globally face considerable challenges ranging from efficiency in operations to security threats.
Received 24 May 2011 These call for research on innovative solutions with minimal reliance on manual interventions and
Accepted 2 August 2011 controls. This paper discusses the design and operation of an intelligent model of a port. The model is
Available online 31 August 2011
designed based on the challenges, experiences and operations of the port of Mombasa. Radio Frequency
Identification (RFID) technology is central to the model in enabling intelligence. The embedded
Keywords: intelligence includes: what is entering or has entered the port; what is in the port; what is leaving or has
Intelligent port
left the port; legal (authorized) and illegal (un-authorized) transactions and movements; and, health and
Intelligent port simulations
Intelligent logistics
risk status of the cargo. Remedial measures are instituted upon observation of violations or deviations
RFID together with alert generation on violations or whenever set thresholds are exceeded that are then sent
RFID simulations to relevant persons or agencies as defined in the system. The basis of the intelligent model, design,
working operations and supporting technologies are presented. Simulations of the model are undertaken
for movement of goods from arrival at the port to release using four simulations. Details of the simulation
design and results are presented. An evaluation of the model and how it addresses the challenges
currently being experienced are provided. Finally, the benefits of implementation, limitations and likely
direction of the future are enumerated.
ß 2011 Elsevier B.V. All rights reserved.
0166-3615/$ – see front matter ß 2011 Elsevier B.V. All rights reserved.
doi:10.1016/j.compind.2011.08.004
796 J.K. Siror et al. / Computers in Industry 62 (2011) 795–810
automated systems with limited functionality and features to for Mobile/General Packet Radio Service (GSM/GPRS) and satellite
adequately address the risks. communication where there is no network coverage for Secure
Tradelanes have also been designed using supporting software
The model is based on RFID, a technology with the capacity to such as Service Oriented Architecture (SOA) based IBM’s Electronic
provide intelligence necessary to meet the ever increasing Procedure Code Information Services (EPCIS) for ocean-going
demands for better services in an environment of increasing containers [20].
volumes of trade and current challenges. The technology has been Smart logistics has had several definitions that include a system
selected as it is capable of enabling intelligent operations and thus that enables:
enable transition of ports to intelligent based. The technology will
continue to play an important role in automated handling of goods Humans to be free from control activities that can be delegated to
and tracking due to its ability to operate well in a variety of visually smart products and services [21];
and environmentally challenging conditions such as snow, ice, fog, Instant and electronic generation of information and requisitions
paint, grime, inside containers, in vehicles, warehouses and ports [22];
[2]. The principal advantages of non-contact, non-line-of-sight Visibility, and postponing of decisions to the last moment while
characteristics enable it to be used in intelligent tracking and allowing adequate reaction to disturbances; and
handling of goods. Association of data properties such as location, location history
This paper discusses an intelligent port model that is based on with individual items to enable reaction to changes in the
the experiences of the port of Mombasa. The model employs environment [23,24].
modern technologies including RFID which plays a major role in
providing a comprehensive and secure system for goods moving in,
within and out of the port. The rest of the paper is structured as Yang et al. [25] discusses a device which when embedded
follows: In Section 2 we discuss related works, Section 3 the model into a product would acquire lifecycle data. Nikitakos et al.
design, Section 4 simulation, and finally, in Section 5 we provide presents a study of Digital Shipping based on the Greek
the conclusion. experience, the conclusions of which were that digital shipping
revolves around dominant business models that include
2. Related works electronic port services [26], the study however did not provide
a design, deployment or the details of how such an electronic
RFID is a technology that uses radio frequency waves to port would operate. It is thus evident from literature that smart
transfer data between a reader and a tag on the item to be and intelligent systems will define the operational frameworks
identified, tracked, or located. It comprises an antenna, tag and a of future systems, and especially supply chain operations. Little
Radio Frequency (RF) module (reader) with a decoder (transceiv- literature has however been focussed on the design, modelling,
er) [3]. RFID is regarded as one of the technologies that will play a deployment and use of smart and intelligent systems in customs
major role in improving performance, increasing integration and administrations despite the dire need. The key drivers towards
decision structures to enable a paradigm shift to the Internet of the future direction of intelligent systems are not only the
Things [4,5]. The technology has created opportunities for benefits realized from increased automation, but inability of
innovative technologies in manufacturing and logistics [6]. It is manual and semi-automated systems in handling increased
a technology that provides agility, adaptability, and flexibility demands for speed in an environment of increasing volumes of
which best value supply chains leverage for strategic supply chain trade and risk of goods to theft, smuggling and terrorist
management [7]. RFID is a technology that enables innovation, activities.
speed and flexibility which are considered as the key factors to Global supply chains are hyper-connected models of efficiency
competitive advantage [8]. RFID has been successfully used in and risk. The global import/export market exceeds US$6 trillion,
manufacturing, supply chain management and logistics since the with 15 million containers continually being transported on
mid-1980s and its use is growing rapidly as costs come down and 46,000 vessels through 4000 global ports. Each link and node in
benefits are widely recognized [9]. Value of RFID in supply chain the supply chain is subject to a variety of threats such as from
management include process automation, creating competitive fraud to terrorism. While under great pressure to maintain
advantage by realizing supply chain efficiencies, closed loop security, port operators are penalized for supply chain interrup-
tracking leading to innovation and achieving supply chain tions. Among them are estimated 20-plus freighters owned or
visibility [10]. Other benefits include operational efficiency and controlled by al Qaeda [27]. Terrorism is recognised as a complex
performance of the logistics processes, rectifying inefficiencies in risk that is difficult to eliminate, the goal is thus to minimise it as
workflows, enabling a framework for collaboration, planning, much as possible [28]. This complicates the task of enhancing
monitoring and execution while optimally adapting in real-time security as it always impacts negatively on speed of clearance.
to operate under unplanned occurrences [11–13]. Ryumduck and Delays on the other hand will lead to supply chain interruptions.
Jeyr [14] have discussed an active monitoring model for the According to experts more catastrophic terrorism is expected
workflow of RFID logistics management where the system where transportation assets may be turned into weapons.
reduced substantially time for inventory investigation and Vulnerability to freight-oriented terrorism is multi-faceted,
moving in and out of materials. reflecting the diversity, ubiquity, and openness of freight
RFID technology is driving innovation in logistics and supply transportation systems; availing terrorists an immense array of
chains of the future through embedding intelligence in items, choices. Freight systems were designed and are operated for
pallets and containers moving in the supply chain thus defining the economic efficiency and profit, but not for security. There is thus
future of logistics [15–17]. The conclusions of a study by need for technological development and research to provide tools,
Jedermann et al. [18] predicted that use of RFID-Tags on transport technologies, and processes capable of addressing these complex
items will be standard in logistics. Models of cases with secure challenges [29,30]. The looming challenges of the future make it
container closures attached, as well as sell retrofit secure container vital for port administrations to consider intelligent handling
kits for converting existing containers to be RFID-enabled have methods. Manual and semi-manual methods of goods are totally
already been made [19]. RFID based Tamper Resistant Embedded inadequate in dealing with the current challenges and would
Controller (TREC) that integrates GPS, sensors, and General System ultimately collapse. Any effort to enhance speed in such a set-up
J.K. Siror et al. / Computers in Industry 62 (2011) 795–810 797
would be at the expense of security. It is thus important for what is in the port;
researchers to provide models for intelligent logistics and what is leaving or has left the port;
particularly those that address the needs of customs and port all legal (authorized) and illegal (un-authorized) transactions
administrations as there is little literature despite the key roles and/or movements and initiate remedial measures;
they play on the overall efficiency and security of the supply chain. Generate alerts on violations and report/escalate them to
Additionally, customs and port administrations are exposed to the relevant officers or agencies accordingly;
highest risks and stand to be a major bottleneck in the supply Continuously monitor the health status of sensitive or perishable
chain process. There is thus need for intelligent systems built on a cargo;
framework of speed, efficiency and effectiveness and with the Provides intelligence information or initiates remedial measures
required level of security. Considerable academic literature is where required or applicable; and
however available on use of RFID for the wider supply chain Provide alerts when the required thresholds in a given area, yard
logistics. For ordinary supply chain, all the participating players or context are exceeded.
are interested in the goods arriving at the destination, and once
done; the transaction is completed and considered a success.
Customs administrations have however a wider role that includes 3.2. Technology framework
restricting or prohibiting entrance of certain commodities to their
administration. Only legitimate goods should enter and pass The key technology for enabling intelligent operations in this
through their administration. Additionally, they are required to model is RFID. The operation of the model relies on RFID
ensure that traders pay correct taxes and duties. This would infrastructure in the port which is composed of readers, active
include detecting those who falsely declare, under-declare or tags and communication infrastructure. The standards governing
report the theft of their goods so as to evade payment of taxes. The active RFID Cargo tracking devices is ISO/IEC 18000-7 [33] for air
task is further complicated by existence of corrupt government interface. The devices operate in the 433 MHz band. Communica-
officials who through bribery abet tax evasion and unscrupulous tion between interrogator and tag is Master–Slave type with the
behaviour by traders. interrogator initiating communication then listens for response
The Kenyan customs administration has piloted two RFID based from a tag. Related standards include ISO 17363 which provides
systems to track transit goods from the port of Mombasa to the the definition for the seals and tags with air interface parameters
frontier offices [31,32] where considerable benefits have been conforming to ISO/IEC 18000-7. ISO 17363 [34] defines four
realised. The Relevant Time Tracking System (RTS) is one of the categories of devices for tracking freight containers namely
piloted systems and relies on RFID infrastructure installations at Container License Plate Tag, Container electronic seal and Item
the port and at critical points along the transport corridor. The Tag. ISO 18185 standards deals with Electronic Seals for Freight
infrastructure would then provide cargo status information Containers and has seven parts with Part 1 dealing with
through interrogation of the Electronic Seals from the Outdoor communication protocol and Part 7 the physical layer. ISO
RFID readers as the trucks pass these key points. The Real Time 18185-7 Type A [35] defines the physical layer of Electronic Seals
Location and Tracking System (RTLS) was the second system operating at 433 MHz band. It has dual frequency operation with
piloted, however, unlike RTS, it does not depend on external the physical layer operating at 433 MHz for long range Link and
infrastructure. RTLS system entail fitting the truck with Automatic Low Frequency (LF) short-range link operating at 123–125 kHz and
Vehicle Location (AVL) that integrate GPS receiver (for providing using On-Off-Keying (OOK) modulation schemes. Six-byte combi-
location information), RFID Reader (for reading status of the nation uniquely identifies a tag with the first two being Tag
Electronic Seals), and GSM/GPRS communication so as to provide Manufacturer ID and last four bytes being the Tag Serial Number.
real time cargo information to the control room. The benefits have Interrogators issue commands to the tag which may be broadcast
however been limited due to the predominant manual processes in or specific. The commands include collection of tag IDs, sleep,
the port. More benefits can be realised if intelligence is ingrained in password, read/write memory and table related commands. Some
the entire operations of the port, from arrival of cargo, handling, of the commands such as for writing are guarded through
and verification to release from the port. It is thus necessary for password protection. The long range links are used for replying
research to be undertaken on the likely models for employment by to the interrogation from a reader. In our model, these devices shall
customs administrations desiring to have a higher level intelli- be used for the following.
gence in their ports. This paper seeks to addresses this gap by
proposing an RFID Based Intelligent Model hereafter named 3.2.1. Cargo shipment tag/electronic seals
Kipkalya Intelligent Customs Port Model (K-ICPM). The model is In our model, the cargo arriving will have been secured at the
based on RFID; a technology that has emerged as one that will play manufacturers’ premises or port of origin and tracked the entire
a leading role in intelligent and smart systems. The model journey. The tracking device would usually be an Active RFID tag
addresses the security of goods from the time of offloading from such as Electronic Seals, Container Security Tag and Sensor Tag
the ship, movement within the port to eventual release and exit which are shipment tags described in ISO 17363/18185 and ISO
from the port. 18000-7 for the air interface. The devices operate at 433.92 MHz
and 123–125 kHz for the Low Frequency (LF) short range
3. Model design operation. The industry available types that conform to these
standards are such as Evigia EV3-CST, Identec i-Q310 CST, Savi ST-
3.1. Introduction 675, Savi SR-662 and Hi-G-Tek 18.7 Secure Series [36–39], some of
which have been used in the US military for tracking containerised
KICPM intelligent customs port model is proposed. The model cargo [40].
defines a port that uses smart or intelligent systems to accomplish
the following: 3.2.2. Asset or item tags
To enable advanced level of intelligence, the cargo contents are
Have intelligence on: also tagged. The tags used would depend on the nature and
what is expected to arrive at the port; requirement of the goods. This may vary from cheap general cargo
what is entering or has entered the port; in cartons or pallets, in which case simple passive tags can be used.
798 J.K. Siror et al. / Computers in Industry 62 (2011) 795–810
For sensitive cargo, active RFID Asset Tags with sensors for Collection, EPCIS Capture, EPCIS Query, EPCIS Accessing Applica-
advanced monitoring would be required. Industry available tion and EPCIS Repository in describing the processes and
advanced tags with sensors include Evigia EV3-AT, Identec i- functions of the model (see Fig. 2).
Q310 ATR and Savi ST-616 or ST-618 [36–39]. The advanced tags
conform to ISO 18000-7 standard and are usually more suitable for 3.3. Design subsystems
pallets, drums, cartons and perishable goods. The attachments of
the tags are by use of attachment ties, magnetic mount, mounting Our proposed intelligent model is composed of the following
bracket or kits and Pressure Sensitive Tape. five subsystems. They are namely:
3.2.3. License plate tag Central Processing and Control Centre (CPCC)
These are active RFID tags designed for tracking motor vehicle Location Movement Control and Management (LMCM)
or trailer units. This is applicable for cargo in the form of motor Sensitive Goods Control and Monitoring (SGCM)
vehicle or trailers. These tags can also be used for tracking Cargo Handling Control and Management (CHCM)
equipment used for lifting cargo out of the port. Verification Control and Release Management (VCRM)
Capturing Application, and the means by which the result is module is thus responsible for evaluating every movement of
returned including authenticating the requesting systems. containers whenever they are loaded onto a truck and moved. The
Module role spans all the other modules and provides the technology for detecting movements can be by monitoring change
interface to other systems. It acts as EPCIS Accessing Application in of parameters such as Radio Signal Strength Indicator (RSSI) from
getting relevant information such as Import Declaration Forms the readers in the vicinity of the cargo as it is moved away. Such a
(IDF) databases, electronic shipping manifests, electronic packing movement would result in the cargo getting out of range from
lists for cargo destined to the port. The information is then used to other readers and within range of others. Other technologies are
avail information on what is expected to arrive at the port. Through such as active RFID location markers and reference tags, where any
querying of the customs systems, CPCC always has access to movement will be reported by the nearest reference tags to the
information on clearing status of cargo in providing information on readers and thus identified [43]. LMCM as an EPCIS Accessing
authorized and un-authorized movements to LMCM. Application will query EPCIS repository resident in CPCC for all
events relating to change in its key indicators related to cargo
3.3.2. Location movement control and management (LMCM) movement. Once received, the information is used to monitor
LMCM unit is responsible for processing of location information cargo movement and raise alerts where the movement has not
of all the cargo in the port and establishing whether the been authorized. At the time of obtaining information on the key
movements are authorized or not. All RFID tag reads from the indicators, it also obtains information on authorization informa-
RFID infrastructure covering the entire port is relayed to CPCC. The tion resident in CPCC via access to customs application. LMCM is
800 J.K. Siror et al. / Computers in Industry 62 (2011) 795–810
responsible for providing an inventory and location of all cargo and equipped Container Security Tag with multiple sensors to monitor
distributions within the port. Thus, LMCM acts as both EPCIS internal environment. Thus, the cargo inside would be expected to
Accessing Application when obtaining information from CPCC and have asset tags embedded with sensors such as for light, humidity,
EPCIS Repository for inventory and location information. temperature and sound for environmental monitoring. The asset
tags are such as Evigia EV3-AT, Identec i-Q310 ATR and Savi ST-616
3.3.3. Sensitive goods control and monitoring (SGCM) or ST-618 for individual items, pallets, or drums monitoring. While
This unit is responsible for monitoring perishable goods or high all the RFID events will have been received by CPCC and stored in
risk cargo. This category of goods usually require special handling its repository, SGCM will constantly be querying relevant
as they are susceptible to damage or dangerous consequences such information from it as an EPCIS Accessing Application. Where
as explosion if handled carelessly. This category of goods will be violations are observed or anticipated spoilage or danger, SGCM
generates alerts and messages to relevant agencies for corrective thus result in generation of alerts through analysis of sensor
action. Processed information will be available for querying by data. Thus, the sensors will aid in the process of identification of
CPCC and update of its own repository. Thus, SGCM acts as EPCIS violations, besides the other external measures. Communication
Accessing Application when obtaining information from CPCC and from devices is transmitted to the communication centre using
EPCIS Repository when availing information concerning the status wireless technologies with multiple access points for a complete
of sensitive goods in the port. coverage of the whole port connected to a fibre backbone. The
system will contain the status of all containers in the port; any
3.3.4. Cargo handling control and management (CHCM) required movement or transfers within the port; and those
This will be responsible for guiding forklift and truck drivers released. The system will additionally provide details of the
through navigational tools (with detailed map of the port) on the equipment that will be used for the particular function such as
route to use to pick or offload the cargo. Cargo trucks utilising the the crane that will be used to load, the truck that will be used to
port would be required to have purchased and installed a carry. Trucks and equipment used for loading of cargo will be
compliant navigational system in their truck (be it a dedicated expected to have RFID Readers and Navigational tools. However,
navigation system or an advanced Mobile Device) with wireless those without are supplied with portable units for guiding them
capability and navigational features, where upon reaching the port to the loading point and providing the necessary information to
is linked to the port system for navigation. Container Security Tag the intelligent system. The units will then be surrendered back
such as Savi ST-675 [39] operate on two frequencies, namely upon exit from the port.
433.92 MHz for long range (over 100 m) and LF or 123–125 kHz
with a range of up to 3.6 m. LF will be used for identification of the 3.4.2. Verification
container picked. Thus, when wrong goods are picked, RFID tag
events resulting from interaction between the interrogating reader 3.4.2.1. Risk profiles. The risk assessment of the cargo is under-
on the forklift and the Tag using LF channel will result in event data taken by the Enhanced Automated Targeting and Profiling System
being transmitted to CPCC. CPCC will immediately generate an and results send to the port system indicating the channel that the
alert that will be picked by CHCM. Upon receiving the alert, CHCM cargo is to be cleared through, which would vary between Direct
will generate an alert to the driver through their mobile device. The Release (Green Channel), Non Intrusive Inspection (Yellow
RFID readers installed on every forklift, crane or trucks will Channel) and Physical Verification (Red Channel). According to
continuously send their events through the RFID infrastructure to the model design, an average 90% of the cargo should be cleared
CPCC. After processing, the EPCIS information will be picked by through the Green Channel, about 20% on the Yellow Channel and
CHCM, undertake further processing, generate and store status less than 1% on the Red Channel. However, of the 20% going
information on the loadings. The order of containers to be lifted is through the yellow channel, after scanning up-to five percent may
dynamically adjusted depending on the current location of the be required to pass through the Red Channel in addition
forklift and location of the containers to be loaded. Other depending on the results of the process. Initially, the percentages
parameters that are used include traffic congestion in a particular may be disproportionate, but as the data is built up and the
area. The Mobile devices will make use of wireless technology for accuracy increases, the efficiency of the system increases.
receiving updates and traffic information for re-routing where However, the actual figures would be guided by compliance level
necessary. CHCM will thus be an EPCIS Accessing Application with that usually depends on the effectiveness of risk management
respect to details of what is to be loaded and events relevant to tools utilised.
loading and handling; and, an EPCIS Repository for information on
the loadings in the port. 3.4.2.2. Non intrusive inspection. Non intrusive inspections are
undertaken for risky cargo. Scanning systems are integrated with
3.3.5. Verification control and release management (VCRM) the port system for automated uploading of relevant information.
This unit monitors the goods and ensures that only those goods By using RFID readers installed at the entrance to the scanning
that have been legitimately cleared leave the port. Any violations area, the identity of the container is automatically deduced and
are immediately detected and appropriate action taken. After EPCIS repository queried by use of EPCIS Accessing Application on
completion of the process without violations local goods are relevant information regarding the cargo and contents. The
allowed to be removed, while transit goods are released for container would then be scanned using X-ray, Gamma Ray
tracking to frontier offices. technology and at times neutron assisted for automated detection
of drugs, explosives or metals. A comparison is then automatically
3.4. Supporting technology undertaken between the scanned results and with the declared
contents. The process may however require further analysis by
3.4.1. Tracking system experts where complex analysis is required.
Active RFID readers with omni-directional antennas will be
installed in a matrix to provide coverage for the entire port. The 4. Simulations and tools
reader array will also be used to provide location information
using appropriate schemes such as triangulation among others. 4.1. Tools
The Electronic Seals used on the containerized cargo will be
expected to support at least two frequencies, UHF and LF. UHF Five simulation tools from two providers were used for the
will be used for long range communication with the field readers simulations. The tools include Rifidi project quoted in literature as
for location or monitoring by LMCM or SGCM. LF will be used for one that provides open source integrated development environ-
short range communication for CHCM in providing information ment for RFID that enables full tests without incurring any
on what has been loaded, offloaded or is being carried. Thus, investment [44,45]. The other is RFID Anywhere by Sybase which
cranes, trucks and forklifts will be mounted with LF Readers to though is a commercial tool is available for use in simulations. The
facilitate this functionality. Motion, tilt, light, vibration, tem- tool has been used by Correos Spanish postal service which handles
perature and humidity sensors embedded in the shipment tags over 5 billion postal deliveries each year, serving over 19 million
or inside the container will aid detection of advanced intrusions homes and 2 million companies a day and has the largest
such as removal by cutting container sides. Such attempts will successful RFID project in Europe. Other users include Cesar
802 J.K. Siror et al. / Computers in Industry 62 (2011) 795–810
v. As per the simulation, the Tags were initially 30 in the Docks, For all the violations, the system automatically generated alerts
then they kept decreasing as per the execution cycles i.e. 30-24- and messages signifying the anomaly.
18-12-6-3, while the tags in the Container Terminal kept
increasing from 0-6-12-18-27 and similarly between the 4.2.3. Rifidi prototyper simulation
Container Terminal and Verification Area where the numbers This simulation was done using Rifidi Prototyper to test the
for Container Terminal would start decreasing, while the ones business logic of the supporting system and was undertaken as
for Verification kept increasing, and finally between Verifica- follows:
tion Area and the Gate. Fig. 7 provides a screen capture of the
simulation application running. i. Draft of a blueprint representing the port was drawn;
At any stage of the process, the inventory position of the tags ii. A new prototype was created using the blueprint;
was available from the system. Scenarios depicting anomalies and iii. Alien 9800 readers were next created to represent
violations were next tested. These included: readers installed at the Docks, Container Terminal, General
Terminal, Verification, Scanning, Motor Vehicle Yard and the
A tag being created and configured to appear at a subsequent Gate;
location without originating from Docks, which is usually an iv. Several tags were next created to represent the cargo. The tags
anomaly created were Gen 2 EPC, SSCC type;
Items being taken to the wrong yard v. The readers were then position in the different locations to
Items disappearing from the port create hotspots;
Fig. 6. Display of results for docks, yard, verification, port gate and alerts.
804 J.K. Siror et al. / Computers in Industry 62 (2011) 795–810
Table 3 were sent by either or both Electronic Mail and SMS to the parties
Simulation data configuration for intelligent port.
configured to receive the specific alerts.
Docks Container Scanning Gate
terminal 4.2.4. Rifidi tag streamer simulation
Tags Wait Tags Delay Tags Wait Tags Wait An experiment was undertaken to simulate arrival of goods to
T0 30 0 0 10 0 0 0 0
the port, movement to the yard, verification area and finally exit
T10 25 0 5 0 0 0 0 0 from the port. The simulation was undertaken to reflect actual
T20 20 0 5 0 5 0 0 0 scenario where attempts of stealing or bypassing procedures
T30 15 0 5 0 5 0 5 0 would be undertaken and how the system can be designed to curb
T40 10 0 10 0 10 0 5 0
that. The following business logic was used to guide the
T50 5 0 10 0 15 0 5 0
T60 3 0 7 0 20 0 5 0 simulation:
T70 2 0 3 0 25 0 5 0
T80 1 0 3 0 25 0 5 0 - Tags with prefix AA01 and AA02 represent high risk containers
that should undergo verification. The movement of the cargo
according to the business rules and logic is thus Docks-Yard-
vi. Simulation was next moved from edit mode to run mode (See Verification-Gate.
Fig. 8); - Tags with prefix AA03 and AA04 are low risk containers that are
vii. The tags were moved according to the usual workflow and directly released without verification. The movement of the
system response observe to confirm that that reports cargo according to the business rules and logic is thus Docks-
generated and messages were working as design. Yard-Gate.
- If cargo represented by prefix AA01 and AA02 arrives at the gate
without having passed through verification, an alert is creating
Several queries were run on the inventory position and location
for the violation; namely cargo has bypassed a mandatory
and the system responded by providing the correct information for
verification process.
each.
- Any violation should result in generation of alerts and where
Scenarios depicting anomalies and violations were next
applicable transmission via Short Messaging and e-mail to the
undertaken to test the alert processing. Scenarios tested included
relevant officers or agencies as defined in the business rules.
the following:
Batch 0 - One Batch of Tags, with a prefix of AA01 and AA02 to Tags that were required to undergo verification but
designate goods subject to verification. This represented attempted to bypass are those which used this scenario
category of goods requiring verification. The movement was and had prefixes of AA01 and AA02. Alerts were required
thus Docks-Yard-Verification-Gate. This was configured to to be generated for every cargo with prefix of AA01 and
generate 2 tags of each prefix per second, have an execution AA02.
period of 1000 ms. A random waiting period of between 200 Scenario 2 - This was done to simulate the movements of goods
and 500 ms was created between the generations of one prefix from Docks to Yard, without proceeding further for the purpose
to the other. of creating inventory against the Yard locations.
Batch 1 - Second Batch of Tags, are used to simulate low Risk Scenario 3 - This was done to simulate goods movement from
category of goods usually given Direct Release as they do not Docks–Yard and remain there for building inventory at the
have to undergo any form of verification. The movement of this Yard.
category of goods is thus Dock, to Yard, to Exit Gate bypassing Scenario 4 - This was done to simulate goods movement from
Verification Area. One group of tags generated in this batch is Docks–Yard-Verification and remain there for building inven-
used to simulate this. These were generated with the prefix tory at the Verification area.
AA03 andAA04. One other group of tags were generated to Test Unit
simulate a violation where those not qualifying for Direct First - Scenario 0 with Batch 0
Release (DR) are treated in a similar manner, these had a prefix Second - Scenario 1 with Batch 1
of AA01 and AA02. Third - Scenario 2 with Batch 2
Batch 2 - The tags generated by this batch were used to Fourth - Scenario 3 with Batch 3
simulate violations. The tags were generated in two groups. Fifth - Scenario 4 with Batch 4.
The first group were those with a prefix of AA01 and AA02, The simulation was then run and for the five test units and
execution period of 1000 ms, one tag was generated for each results analysed according to the defined business logic, a
prefix and a random waiting period of between 200 and portion of the sample code of the simulation is provided in
300 ms. The second group were those with a prefix of AA03 and Appendix B.
AA04, an execution period of 900 ms and a random waiting
period of between 300 and 700 ms. 4.3. Querying and reporting
Batchs 3 and 4 - Were created for inventory purposes. Batch 3
created tags that would end at the Yard and had all the prefixes, A supporting application was developed to manage the
while Batch 4 was for tags that were to end at the verification simulation and process simulation data. The program was
area with the prefixes of AA01 and AA02. developed using Eclipse Studio with Java programming language,
Scenarios on an Ubuntu 8.04 operating system with MySQL database for
Scenario 0 - Normal operations - High Risk Goods storage, retrieval for modelling the system. Linux based shell
Movements through Docks, Yard, Verification to Exit Gate. scripts were developed to support querying location, status and
Scenario 1 - Normal operations - Low Risk Goods, violation for inventory status of the cargo via SMS. The following are the Short
High Risk Goods. Messaging processes:
Movements through Docks, Yard, Exit Gate.
Tags not required to undergo Verification had the prefixes of All users of the system are first registered and details stored in a
AA03 and AA04. MySQL database;
806 J.K. Siror et al. / Computers in Industry 62 (2011) 795–810
for by the model, however, a description of how these challenges 4.7. Likely direction of the future
could be dealt with is provided below.
With the complexity of the challenges and opportunities,
Locating containers for loading by truck drivers or new coupled with increasing volumes of trade, risks, demand for
equipment driversThere has been no system to guide the better and faster services; the future of all logistics and
drivers to the location of the container to be loaded, which has particularly for customs administrations lies in adoption of
often resulted in unnecessary jams inside the port for trucks intelligent technologies. The speed of adoption will be deter-
moving about without clear direction. KICPM, CHCM system mined by the flexibility of the individual customs administra-
will provide a navigational system to guide trucks or forklifts tions, the maturity of RFID technology in other areas of
to the location for loading using the best path, thus intelligence; and standardization in the new areas as well.
eliminating element of confusions in movements within the Provision for installation of intelligent devices into the contain-
port. ers and packages to facilitate intelligent tracking will be a
Container theftsThe continuous surveillance and raising alerts by common feature in future. While it may not practical for all
LMCM whenever un-authorized movements are detected will containers to have intelligent devices as a permanent feature,
curb attempts for container thefts. And since the process will be it is more practical for provisions to be made (such as slots)
electronic, collusions as has been the case in past by the players with battery or external power supply connections for powering
will not be possible. the devices. At the beginning of journeys, the units would be
Theft of container contentsSensors embedded in the Electronic slotted in and used to track until the end of the journey or
Seals or inside the containers will detect any intrusion attempts, tracking portion where it is then removed for re-use. Containers
passing the information to the central sensors via SGCM. These may also be enhanced to provide sensing of cutting of the
are such as vibration, light, humidity, tilt and motion sensors for sides for highly secure containers. The container industry
intrusion through the sides of the container; otherwise the may change to provide for the different levels of security and
Electronic Seal will detect any attempts through the container features working alongside the traditional containers. Inbuilt
doors. environmental sensors would become standard for refrigerated
Spoilage of cargoSensors embedded in the Electronic Seals or containers.
inside the container would continuously monitor the environ- Further research is expected in customs related fields where
ment of the cargo passing the information to SGCM, thus where its face has slowly been changing from what has been
certain thresholds are not maintained alerts would be immedi- historically the most rigid, bureaucratic institutions using
ately produced leading to intervention measures being executed. archaic systems and technology averse to those employing
The sensors would be such as light, humidity, temperature, gases and embracing cutting edge technologies. These will revolve
among others. around the challenges of security and use of intelligent
Smuggling through faking container numbersThis is usually technologies.
done by repainting a container with a number for another Some of the areas requiring research are the following:
container being cleared but having low value goods. After
going through all the processes of clearing, a separate How the challenge of using fake tag ID numbers to facilitate
container having high value goods or prohibited items to be disguising of illegal goods as they pass through intelligent
smuggled out is painted with a similar container number and customs administrations can be dealt with, should it ever
removed out of the port. This is however suspected to be arise. This may lead to the formation of security companies
undertaken with collusion from the port officers. Since the patterned around the concept of anti-virus/firewall companies
identification of the container in the intelligent system is by disseminating information on compromised tag IDs;
use of the unique ID on the RFID based Electronic Seal and Need to expand and harmonise the standards to take care of
details contained in the seal, such as a violation would not convergence of technologies and to eliminate duplications.
happen undetected. Thus, any attempt to repaint the container Current ISO 18000-7 does not include sensors whereas in the
numbers and move the container would still raise alerts and industry, most of the devices conforming have sensors embed-
expose the scheme. ded. There is thus need to speed up development of standards so
that it does not become an impediment to advancement of the
industry.
4.6. Limitations and assumptions Currently there are many standards governing RFID devices and
in some areas overlap. As technology advances more, the
All containers will be tagged with Electronic Seals from the port overlaps may become more. Thus, while ISO 18000-7 was
of origin. For cargo arriving without tracking devices, to enable dealing with item management, ISO 18000-7 is predominantly
intelligent tracking, portable units could be attached on arrival at used for secure cargo tracking and already some of the devices
the port. The device would then be used to facilitate intelligent provide for Real Time Location Tracking, while there is a separate
monitoring and control till the time of release when they would standard dealing with Real Time Location Systems ISO 24730.
be removed. There is thus need to harmonise so that there are no potential
Goods requiring monitoring against spoilage such as fresh conflicts.
produce, medicines, or fish products would be having the
necessary environmental sensors inside the container for 5. Conclusion
monitoring that is passed to the RFID reader installed. The RFID
reader would then pass sensor information for use by the In this paper we have presented an RFID based model of an
intelligent port system. intelligent port. The design of the model that includes architecture,
Generation of alerts to signify violations will require resources devices to support the model with their relevant standards have
for dealing with the issues. Thus, where environmental condi- been described. The function and the workings of the sub-systems
tions such as temperature violations for frozen goods are that make up the model have been described. The simulations with
generated, need for checks and rectification of the problem will details of the business logic, simulations tools and how the
require to be undertaken. simulations were undertaken have been provided. The results of
808 J.K. Siror et al. / Computers in Industry 62 (2011) 795–810
the four simulations and how the model addresses the current the model addresses it, and how they can incorporate it in the
challenges of Mombasa port have been enumerated. Limitations, automation of their ports. The model is flexible enough to allow a
assumptions and likely direction of the future have been briefly phased implementation approach. It is also important for
discussed. academicians with research interests on intelligent ports where
The importance of the study is first for custom administration of the KICPM model can be a beginning point in considering other
the world and particularly for East Africa in planning future enhancements.
solutions and strategies for the port. Planned new ports in the
region can be done at an intelligent framework so as to lower the Acknowledgement
costs of future implementations where changes would have been
required. Other ports of the world may also learn from the Assistance from Chinese Scholarship Council and Kenya
challenges being experienced by the port of Mombasa and how Revenue Authority is hereby acknowledged.
Alerts
Previous location skipped by cargo
// Arrival at Yard with Docks skipped
statements.add(esperService.getProvider().getEPAdministrator().createEPL(
"insert into alerts " +
"select 2 as alert_type, tag_ID as tag_ID " +
"from yard as w " +
"where not exists (select * from docks_recent as d where d.tag_ID = w.tag_ID)"));
reader.setConnection("127.0.0.1", 20000);
reader.setUsername("alien");
reader.setPassword("password");
reader.open();
reader1.setConnection("127.0.0.1", 30000);
reader1.setUsername("alien");
reader1.setPassword("password");
reader
1.open();
………………..
switch(readernos)
{
case 0: locations = "Docks";
tagList = reader.getTagList();
break;
case 1: locations = "Yard";
tagList = reader1.getTagList();
break;
case 2: locations = "Verification";
tagList = reader2.getTagList();
break;
case 3: locations = "Gate";
tagList = reader3.getTagList();
break;
}
// Reading the tags
Tag tagList[] = reader.getTagList();
// Writing to database
rs.moveToInsertRow();
rs.updateString(2, getTagID());
rs.updateInt(5, getAntenna());
rs.updateString(6,locations);
rs.insertRow();
References [4] ITU, The Internet of Things, Executive Summary, International Telecommunica-
tion Union (ITU), ITU Internet Reports 2005, 2005.
[5] U. Sandner, J. Leimeister, H. Krcmar, Business Potentials of Ubiquitous Computing.
[1] D. Widdowson, The changing role of customs: evolution or revolution? World Managing Development and Application of Digital Technologies, Springer, Berlin,
Customs Journal 1 (1) (2007). 2006.
[2] C.M. Roberts, Radio frequency identification (RFID), Computers & Security 25 (1) [6] P. Valckenaers, B. Germain, P. Verstraete, J. Van Belle, H. Van Brussel, Intelligent
(2006) 18–26. products: agere versus essere, Computers in Industry 60 (3) (2009) 217–228.
[3] J. Cain, K. Lee, Integrating Sensors and Actuators into RFID Tags, RFID Technology [7] D. Ketchen, W. Rebarick, G. Hult, D. Meyer, Best value supply chains: a key
and Applications 61. competitive weapon for the 21st century, Business Horizons 51 (3) (2008) 235–243.
810 J.K. Siror et al. / Computers in Industry 62 (2011) 795–810
[8] D. Robb, B. Xie, T. Arthanari, Supply chain and operations practice and perfor- [31] J.K. Siror, S. Huanye, W. Dong, W. Jie, Use of RFID based real time location tracking
mance in Chinese furniture manufacturing, International Journal of Production system to curb diversion of transit goods in east africa, in: Proceedings of the 4th
Economics 112 (2) (2008) 683–699. International Conference on Ubiquitous Information Technologies & Applications,
[9] E.W.T. Ngai, K.K.L. Moon, F.J. Riggins, C.Y. Yi, RFID research: an academic literature 2009. ICUT’09., 2009, pp. 1–7.
review (1995–2005) and future research directions, International Journal of [32] J.K. Siror, H. Sheng, W. Dong, J. Wu, Application of RFID technology to curb
Production Economics 112 (2) (2008) 510–520. diversion of transit goods in Kenya, INC, IMS and IDC, 2009, in: Fifth International
[10] M. Tajima, Strategic value of RFID in supply chain management, Journal of Joint Conference on NCM’09, 2009, 1532–1539.
Purchasing and Supply Management 13 (4) (2007) 261–273. [33] ISO, ISO 18000-7 Information Technology—Radio Frequency Identification (RFID)
[11] H.K.H. Chow, K.L. Choy, W.B. Lee, A dynamic logistics process knowledge-based for Item Management—Part 7: Parameters for Active RFID Air Interface Commu-
system—an RFID multi-agent approach, Knowledge-Based Systems 20 (4) (2007) nications at 433 MHz, 2008.
357–372. [34] ISO, ISO/FDIS 17363, Supply Chain Applications of RFID—Freight Containers, 2007.
[12] J.C.Q. Dias, J.M.F. Calado, A.L. Osorio, L.F. Morgado, Intelligent transport system [35] ISO, ISO/FDIS 18185-7, Freight Containers—Electronic Seals—Part 7: Physical
based on RFID and multi-agent approaches, Pervasive Collaborative Networks Layer, 2006.
283 (2008) 533–540. [36] Evigia, Evigia, Available online: www.evigia.com.
[13] S.F. Tzeng, W.H. Chen, F.Y. Pal, Evaluating the business value of RFID: evidence [37] Higtek, Hi-G-Tek, Available online: www.higtek.com.
from five case studies, International Journal of Production Economics 112 (2) [38] Identec, Identec Solutions, Available online: http://www.identecsolutions.com/.
(2008) 601–613. [39] Savi, Savi, Available online: www.savi.com.
[14] O. Ryumduck, P. Jeyh, A development of active monitoring system for intelligent [40] C. Swedberg, DOD Tests, Buys New ISO 18000-7 Tags from Four Companies,
RFID logistics processing environment, in: Advanced Language Processing and Available online: http://www.rfidjournal.com/article/view/5317.
Web Information Technology, 2008. ALPIT’08, 2008, 358–361. [41] Dash7, Available online: www.dash7.org.
[15] R. Craddock, E.S. Stansfield, Sensor fusion for smart containers, in: IEE Seminar on [42] EPCGlobal, The EPCglobal Architecture Framework, EPCglobal Final Version 1.3,
Signal Processing Solutions for Homeland Security, 11th October 2005, London, Approved 19 March 2009.
UK, 2005, p. 12. [43] Savi, RTLS Location Markers & Reference Tags, Available online: http://www.
[16] A. Suenbuel, J. Schaper, T. Odenwald, Towards a comprehensive integration and savi.com/products/rfid/rfid-rtls.php.
application platform for large-scale sensor networks, Lecture Notes in Computer [44] J. Worapot, Y. Li, A.-I. Somjit, Business process analysis and simulation for the RFID
Science 3598 (2005) 232. and EPCglobal network enabled supply chain: a proof-of-concept approach,
[17] T. Kiziltoprak, R. Schumann, A. Hahn, J. Behrens, Distributed Process Control by Journal of Network and Computer Applications – JNCA 34 (3) (2011) 949–957. ,
Smart Containers, Springer, 2007, pp. 8–30. doi:10.1016/j.jnca.2010.04.003.
[18] R. Jedermann, C. Behrens, D. Westphal, W. Lang, Applying autonomous sensor [45] C. Floerkemeier, E. Fleisch, RFID applications: interfacing with readers, Software,
systems in logistics—combining sensor networks, RFIDs and software agents, IEEE 25 (3) (2008) 67–70.
Sensors and Actuators A132 (2006) 370–375. [46] Sybase, Sybase, Available online: www.sybase.com.
[19] C. Swedberg, Pelican RFID—Enables its Cases, Available online: http://www. [47] Esper, Esper, Available online: http://esper.codehaus.org/about/esper/esper.html.
rfidjournal.com/article/articleview/3987/1/1/. [48] Rifidi, Rifidi Edge Server, Available online: http://wiki.rifidi.org/index.php/Edge_
[20] S. Schaefer, Secure trade lane: a sensor network solution for more predictable and Server_Architecture.
more secure container shipments, in: Companion to the 21st ACM SIGPLAN [49] Spring, Springsource, Available online: http://static.springsource.org/spring/docs/
symposium on object-oriented programming systems, languages, and applica- 3.0.x/spring-framework-reference/html/.
tions, ACM, Portland, Oregon, USA, (2006), pp. 839–845. [50] Rifidi, Rifidi, Available online: www.rifidi.org.
[21] D. Uckelmann, A Definition Approach to Smart Logistics, Springer, 2008,, p. 284.
[22] G. Schuh, S. Gottschalk, T. Hohne, P. Attig, Further Potentials of Smart
Logistics. Manufacturing Systems and Technologies for the New Frontier, Joseph Siror is a graduate with BSc (Electrical Engineering) and MBA from
2008, pp. 93–96. University of Nairobi, and PhD in Engineering from Shanghai Jiao Tong University.
[23] A. Holmstrom, R. Kajosaari, K. Framling, E. Langius, Roadmap to tracking based His research interests are in the area of RFID and its applications in logistics. He has
business and intelligent products, Computers in Industry 60 (3) (2009) 229–233. worked in several organizations as a Telecommunications Engineer, Manager and
[24] G.G. Meyer, K. Framling, J. Holmstrom, Intelligent products: a survey, Computers then deputy head of ICT in Kenya Revenue Authority. He is currently a Director in
in Industry 60 (3) (2009) 137–148. charge of Science, Technology, Innovation and Communication at National
[25] X. Yang, P. Moore, S. Chong, Intelligent products: from lifecycle data acquisition to Economic and Social Council (NESC); Kenya’s top advisory body to the Government
enabling product-related services, Computers in Industry 60 (3) (2009) 184–194. based in the Office of the President of Kenya.
[26] N. Nikitakos, M. Lambrou, Chapter 12 digital shipping: the Greek experience,
Research in Transportation Economics 21 (2007) 383–417.
[27] Unisys, Security—Secure Commerce and In-Transit Visibility, Available online: Huanye Sheng is a Professor of Computer Science and Engineering at Shanghai Jiao
http://www.unisys.com/unisys/theme/index.jsp?id=16000014. Tong University, China. His research interests include RFID technology, logistics and
[28] N. Bakir, A Brief Analysis of Threats and Vulnerabilities in the Maritime Domain. supply chain management.
Managing Critical Infrastructure Risks: Decision Tools and Applications for Port
Security, 2007, p. 17.
[29] M. Wolfe, Freight Transportation Security and Productivity, 2002. Dong Wang is an Associate Professor of Computer Science and Engineering at
[30] J. Helmick, Port and maritime security: a research perspective, Journal of Trans- Shanghai Jiao Tong University, China. His research interests include RFID
portation Security 1 (1) (2008) 15–28. technology, logistics and supply chain management.