WIT Press


A Data System For The Security And Tracking Of Goods Containers

Price

Free (open access)

Paper DOI

10.2495/DATA080241

Volume

40

Pages

9

Page Range

249 - 257

Published

2008

Size

340 kb

Author(s)

P. J. Munday

Abstract

This paper discusses the need for security of goods in shipping containers against the threat of theft, smuggling and contamination. It shows the need to have integrity and tracking sensors within the container, and to regularly report status and location to control centres. This paper describes work done within the PASR2005 SECCONDD activity towards an international interface standard for secure container data. It discusses the types of communications required from the container’s sensor system, namely: a) long range reporting over the GSM cellular radio system – to be done periodically or when a significant event occurs, and b) short range reporting over a radio link in the 2.4GHz licence-free band. The paper outlines the types of data that need to be sent in the different cases, and discusses the recommended protocols for encoding, protection and communication of the data. These are based around standard protocols, e.g. Transport Layer Security and IEEE 802.15.4, but adapted where necessary to make transmission of the sensor data efficient, secure and reliable in the shipping container environment. There is a particular issue in a large port where there may be hundreds of shipping containers in radio range of an interrogator device, and where a special radio channel access protocol is required. The paper shows how the system can be implemented in a cost effective, low power device. The paper discusses how the data on location and security status of containers can be used by the relevant trade organisations and law enforcement agencies, e.g. for security risk assessment. Keywords: containers, security, tracking, authentication, protocol layers, radio channel access, public key infrastructure, risk assessment, tamper protection.

Keywords

containers, security, tracking, authentication, protocol layers, radio channel access, public key infrastructure, risk assessment, tamper protection.