3rd EAI International Conference on Management of Manufacturing Systems

Research Article

Application of innovative smart wearable device in industry 4.0

Download121 downloads
  • @INPROCEEDINGS{10.4108/eai.6-11-2018.2279105,
        author={Marko Periša and Rosana Elizabeta Sente and Ivan Cvitić and Peter Kolarovszki},
        title={Application of innovative smart wearable device in industry 4.0},
        proceedings={3rd EAI International Conference on Management of Manufacturing Systems},
        publisher={EAI},
        proceedings_a={MMS},
        year={2018},
        month={12},
        keywords={industrial wireless network smart warehouse identification technology},
        doi={10.4108/eai.6-11-2018.2279105}
    }
    
  • Marko Periša
    Rosana Elizabeta Sente
    Ivan Cvitić
    Peter Kolarovszki
    Year: 2018
    Application of innovative smart wearable device in industry 4.0
    MMS
    EAI
    DOI: 10.4108/eai.6-11-2018.2279105
Marko Periša1,*, Rosana Elizabeta Sente1, Ivan Cvitić1, Peter Kolarovszki2
  • 1: University of Zagreb, Faculty of Transport and Traffic Sciences
  • 2: GS1 Slovakia
*Contact email: marko.perisa@fpz.hr

Abstract

The development of innovative information and communication technologies (ICT) and their implementation can contribute to greater efficiency of all logistic process elements. Industry 4.0 concept is focused on the implementation of ICT in logistic processes. Specific elements (warehouse, human, information) can be implemented in smart environment for efficient conduction of logistic processes. By defining workers requirements, analysis of ICT (sensors, RFID, NFC, Zigbee, IWN) and analysis of current ICT solutions (applications and devices), conceptual informing system architecture was proposed. The proposed architecture is based on IoT concept whose elements can provide object identification (packages, pallets, products) processes, automatization and data processing and storage. The concept uses Cloud Computing, IoT and specific sensor technologies depending on the simulation scenarios for the purpose of data collection, processing and storage. Security threats are shown as well as protection methods suggestions.