still exists. Both scenarios are ended in the same
manner when each container is stored in terminal in a
stack. Human interaction elimination and sufficient
time resource optimisation can be achieved using
remote and autonomous monitoring of the
environment by each container individually. This
security measure eliminates human visual inspection
procedure from the process and transforms it into
system inspection. It is safe to assume, that each
container interaction with a human operator increases
the risk level of the procedure in the whole conception
of intelligent and autonomous container initiative.
4 CONCLUSIONS
Analytical research of resources and other study
opportunities in container terminals all around
Europe showed that existing container security
screening equipment and procedures for intermodal
cargo terminals does not assess the available ICT
resources and their higher efficiency in solving the
problems of terrorism. Attention is drawn to the lack
of embedded cargo detection systems in the key parts
of the transport chain. Particularly in the
transportation of containers between several ports. It
implies the presumption that only new technological
components integration into a single ITC
infrastructure is the only solution to achieve higher
security level and to ensure the competitive position
in the global market for separate larger and even
smaller logistics companies. New containers revision
and screening intelligent mechanisms must be
developed for container terminals and can be
integrated into the existing CSI concept.
Additional regulations, procedures and legal
measures must be placed in case of possible detection
with a high probability level. Therefore, a suggestion
is made, that the adoption of new methods and their
full integration, up to the working standards, is
possible only when there is a certain degree of trust in
the new technologies from all actors of the transport
chain. For instance, new systems integration must be
done in a step-by-step manner. It could be done
locally in a single port for experimental reasons using
single company’s IT infrastructure for containers
security investigation up to the working standards.
This mixture could present practioners’ with all the
relevant adoption information that is now so crucial
to the working environment of the entire transport
chain operation. Disregarding the probability of
ineffective usage of new methods may result in
further stagnation in the area of new standard
development within the CSI objective and could
cause even further stagnation in the development of
the intelligent container concept.
DISCLOSURE STATEMENT
Authors acknowledge that there is no financial
interest or benefit arising from the direct applications
of this research.
ACKNOWLEDGEMENTS
This research is/was funded by the European
Regional Development Fund according to the
supported activity ‘Research Projects Implemented
by World-class Researcher Groups’ under Measure
No. 01.2.2-LMT-K-718-01-0081.
REFERENCES
Scholliers, J., Permala, A., Toivonen, S., Salmela H., 2016.
Improving the Security of Containers in Port Related
Supply Chains. Transportation Research Procedia, vol.
14, p. 1374-1383.
CSI: Container Security Initiative. U.S. Customs and
Border Protection, 2018.
OECD Guidelines on the Protection of Privacy and
Transborder Flows of Personal Data. 2013.
Mark S.S.H., 2019. Chapter 8: Perspectives on Security of
Nuclear Material in Transport. Nuclear Safeguards,
Security, and Nonproliferation (Second Edition), p.
231-253.
Chung-Yee L., Dong-Ping S., 2017. Ocean container
transport in global supply chains: Overview and
research opportunities. Transportation Research Part
B: Methodological, vol. 95, p. 442-474.
Rizzo, F., Barboni, M., Faggion, L., Azzalin, G., Sironi, M.,
2011. Improved security for commercial container
transports using an innovative active RFID system.
Journal of Network and Computer Applications, vol.
34(3), p. 846-852.
Carlo, H.J., Vis, I.F.A., Roodbergen, K. J., 2014. Storage
yard operations in container terminals: Literature
overview, trends, and research directions. European
journal of Operations research, vol. 235, p. 412-430.
Masini, B.M., Bazz, A., Zanella, A. 2018. A Survey on the
Roadmap to Mandate on Board Connectivity and
Enable V2V-Based Vehicular Sensor Networks,
Sensors, vol. 19(7), p. 2207.
Xuerong, C., Jingzhen, L., Juan, L., Jianhang, L., Tingpei,
H., Haihua, C., 2019. Improved Vehicle Ranging
Method for the IEEE 802.11p. Procedia Computer
Science, vol. 147, p. 389-393.
VEHITS 2019 - 5th International Conference on Vehicle Technology and Intelligent Transport Systems
512