Active Product Modeling for Chemical Security Management Based on Smart Object Concept
نویسندگان
چکیده
Nowadays the management of the security of goods and persons is a stake mattering in industries. In general, product’s security level is the matter of each individual product and it often depends on products’ interactions within vicinity. An efficient security management needs to be based on distributed security model supported by each individual products. Ambient and communication technologies bring new visions in creating reliable security systems, where products are transformed into smart products. Thus, each product acts as an active brick of the whole security system by means of embedded security functions as monitoring, controlling, decision making and alarming actions according to security and dependency rules. We propose the Active Product concept that provides product reactive behaviors to changes and inappropriate storage conditions, based on the security rules it is compelled. In our approach a product as for example a chemical container can be aware of its handling and storage conditions, and of changes in its environment and can be sensitive to products which surround it. Using wireless sensors attached to products, we create a network of interactive and communicating products to manage an Active Security System in an Ambient Intelligent Environment where human operators and hazardous chemical products are interacting securily in warehoursing and handling area. This article describes the concept Active Product by mean of smart object functionalities applied to hazardous industrial product and it proposes an internal structure model and associated capabilities of Active Product entity dedicated to security management.
منابع مشابه
Transmission switching cost modeling and determination candidate Lines for participation in joint energy and reserve markets
There is a great resolution calling for smart grids in recent years. Introduction of new technologies, that make the network flexible and controllable, is a main part of smart grid concept and a key factor to its success. Transmission network as a part of system network has drawn less attention. Transmission switching as a transmission service can release us from load shedding and remove the co...
متن کاملDesigning Decision Maker in a Smart Home for Energy Consumption Optimization Using Fuzzy Modeling
existed electricity grids deliver produced power to the consumer passing through transmission and distribution grids. According to high losses of these grids in transmission level and inexistence of bilateral interaction for simultaneous information exchange, a concept of smart grids were made by capabilities such as consciously participation of consumers in the smart electricity grids, an amou...
متن کاملPlanning and Operation of the Active and Reactive sources Constrained to Voltage Security in the Reconfigurable Smart Distribution Network
One of the most important objectives of smart distribution networks (SDNs) is to achieve a secure and reliable network. This can be realized by optimal operation in the presence of active power sources such as the distributed generations (DGs), reactive power sources such as switched capacitor bank (SCB), active loads such as the demand response program (DRP), and various network management str...
متن کاملAmbient Intelligence: Awareness Context Application in Industrial Storage
WSNs are designed to efficiently collect data and monitor environments, among other applications. This article describes the concept and realization of an Active Security System for security management of warehousing of chemical substances using WSNs. We present an approach to modeling and simulating cooperation between intelligent products that are equipped with a platform of sensor networks a...
متن کاملCryptoNET: Security Management Protocols
In this paper we describe several network security protocols used by various components of CryptoNET architecture. The protocols are based on the concept of generic security objects and on wellestablished security standards and technologies. Distinctive features of our security protocols are: (1) they are complete in terms of their functionality, (2) they are easy to integrate with applications...
متن کامل