Version 1
: Received: 20 December 2023 / Approved: 21 December 2023 / Online: 21 December 2023 (14:02:16 CET)
How to cite:
Hameed, S.; ashraf, H.; Jhanjhi, N. Secure Logistics Monitoring System Based on Wireless Sensor Network. Preprints2023, 2023121641. https://doi.org/10.20944/preprints202312.1641.v1
Hameed, S.; ashraf, H.; Jhanjhi, N. Secure Logistics Monitoring System Based on Wireless Sensor Network. Preprints 2023, 2023121641. https://doi.org/10.20944/preprints202312.1641.v1
Hameed, S.; ashraf, H.; Jhanjhi, N. Secure Logistics Monitoring System Based on Wireless Sensor Network. Preprints2023, 2023121641. https://doi.org/10.20944/preprints202312.1641.v1
APA Style
Hameed, S., ashraf, H., & Jhanjhi, N. (2023). Secure Logistics Monitoring System Based on Wireless Sensor Network. Preprints. https://doi.org/10.20944/preprints202312.1641.v1
Chicago/Turabian Style
Hameed, S., humaira ashraf and NZ Jhanjhi. 2023 "Secure Logistics Monitoring System Based on Wireless Sensor Network" Preprints. https://doi.org/10.20944/preprints202312.1641.v1
Abstract
With the emergence of Advance Logistics, the logistics industry has witnessed significant advancements, leading to a greater reliance on intelligent technologies. These technologies play a crucial role in gathering and transmitting logistics data, but they also introduce security and privacy risks to logistics management systems. The sharing of customer-sensitive information among stakeholders for efficient operations becomes vulnerable to unauthorized access, thus compromising privacy. This, amongst others, is a critical problem that needs to be addressed. The unique features of a cryptographic hash function, including immutability, efficient verification, and anonymity, make it a transformative technology that has the potential to address the mentioned challenges in various sectors. This disruptive technology offers solutions by ensuring data integrity, enabling quick verification, and preserving privacy. The findings suggest that employing Cryptographic Hash Functions to share customer data among logistics partners offers robust protection against cyber-attacks. The proposed system guarantees asset security, and as demonstrated by the case study evaluation, exhibits strong resilience in safeguarding against various security and privacy threats. Although this study is significant, it does have limitations. One of these limitations is the considerable overlap between logistics research and supply chain management (SCM). While our focus was on logistics tasks, we did not extensively delve into the broader context of SCM
Keywords
SCM; logistics; wireless network
Subject
Computer Science and Mathematics, Computer Science
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
The commenter has declared there is no conflict of interests.
Comment:
I commend the authors for their insightful exploration of cryptographic hash functions as a solution to security challenges in Advanced Logistics. Their work not only highlights the transformative potential of these functions but also provides a clear and concise path towards enhancing data protection in logistics operations. The transparent acknowledgment of the study's limitations demonstrates intellectual honesty, contributing to the overall credibility of their valuable research.
Kudos to the authors for their impactful contribution to the field.
Commenter:
The commenter has declared there is no conflict of interests.
Commenter:
The commenter has declared there is no conflict of interests.
Kudos to the authors for their impactful contribution to the field.
Commenter:
The commenter has declared there is no conflict of interests.
Good day,
Thanks a lot. We appreciate your positive feedback and appreciation.
Thank you again.
Commenter:
The commenter has declared there is no conflict of interests.