IoT-Enhanced Transport and Monitoring of Medicine Using Sensors MQTT and Secure Short Message Service
IoT-Enhanced Transport and Monitoring of Medicine Using Sensors MQTT and Secure Short Message Service
ABSTRACT Since its inception more than a decade ago, Internet of Things (IoT) technology has been
guiding people in the development of a world full of smart solutions in which all devices and physical
objects, represented as ‘‘things,’’ are interlinked with sensors using the Internet. In some areas, the delivery
of medications to patients or receivers at their destinations remains highly outdated and informal. In smart
medicine delivery, the medicine needs to maintain its original state while facing multiple environmental
factors, such as temperature fluctuations, humidity, etc. This paper presents an effective implementation of
IoT (Internet of Things) for monitoring the transportation of medicines and vaccines, along with temperature
control facilitated through mobile applications and sensor networks. The system employs mobile applications
as the user interface, utilizes Arduino, MQTT (Message Queuing Telemetry Transport) for communication,
incorporates a temperature sensor, and employs a mini portable cooling box. Designed for the generalized
delivery of medicines/vaccines from sender to receiver, the system also suggests CRC-32 as an optimal
algorithm for error detection instead of complex hash functions such as MD5 and SHA, ensuring better
performance, smooth operation, and data integrity. In addition, elliptic curve-based shared keys are used for
protected data transmission. The accuracy of the proposed system is 89.88%, and the value of the F1-score is
0.686, which is greater than the threshold of 0.5, hence conclusively validating the authenticity and reliability
of the proposed system.
INDEX TERMS Arduino, Internet of Things, web server, medicine, vaccine, temperature sensor.
TABLE 1. A case study of cost analysis of medicine waste. This paper presents a robust and user-friendly system
developed for monitoring the transportation of medicine,
ranging from distributors, pharmacies, or individuals as
senders to recipients, whether individuals or pharmacies.
Additionally, the system includes a temperature control
feature for refrigerating the medicines during transit. The
proposed solution encompasses both hardware and software
components, providing a straightforward user interface for
ease of use. Furthermore, to ensure message integrity and
facilitate error detection during communication, this paper
will implement a seamless mechanism aimed at enhancing
in transportation. The Internet of Things (IoT) is radically system efficiency and optimizing battery usage. A careful
altering the transportation industry [9]. Smart transportation selection of the most suitable checksum mechanism for the
systems are enhancing the mobility of both people and proposed solution will be made among CRC-32, MD5, and
goods, contributing to the overall improvement of the SHA-1 [15].
economy, general well-being, security, and environmental This manuscript is organized in different sections, which
sustainability. IoT and sensor networks collaboratively exert are I-Introduction, II-Related Work, III-Proposed Model, VI-
significant influence on the healthcare system, offering Limitations and Challenges, V-New Temperature Detection
solutions that facilitate patient care through continuous Methods, IV-Results and Discussion, VII-Conclusion and
monitoring of physiological changes and physical activity. Future Work.
Because of these technologies, vital data such as heartbeat,
blood pressure, and sugar levels are consistently recorded A. CONTRIBUTIONS
and transmitted directly to relevant healthcare professionals, The chosen issue, addressing the secure transportation
even when the patient is not physically present in the doctor’s of medicines, is unique, and the proposed framework is
office [10]. genuinely innovative with the following key contributions:
Moreover, the healthcare industry operates not only across
1) The solution utilizes advanced technologies like sen-
different cities but also spans international borders, employ-
sors, microcontrollers, resource efficient MQTT proto-
ing aeroplanes and ships to facilitate the swift transportation
col, and cellular networks to ensure the safe delivery of
of medicines [11]. In the healthcare sector, mere trans-
medicines.
portation alone is insufficient to meet the intended purpose;
2) Elliptic curve-based shared secret keys are generated
the safety of medicines during travel is equally critical.
for multi-party protected communication.
In contrast to the large fridges and deep freezers traditionally
3) The system ensures equal access to monitoring data for
utilized in pharmacies for medicine management, there are
all stakeholders involved in medicine transportation,
now compact and intelligent fridges/cooling containers that
preventing deception due to adverse environmental
can be conveniently carried along with the medicines during
conditions like temperature variations.
a journey [12]. GPS trackers play a crucial role in monitoring
4) The proposed system has the potential to save lives
the movement of delivery vehicles. The industry has adeptly
by preventing expired medicines and reducing phar-
leveraged these innovative technologies, integrating them
maceutical losses by incorporating sensing and backup
seamlessly to achieve their objectives promptly and securely.
hardware.
However, a significant gap persists in fully monitoring
the transportation of medicines and remotely managing the
temperature of the system. This gap has led to a dramatic II. RELATED WORK
increase in the wastage of medicines, posing a severe risk A preliminary system for a drone-based shipment was devel-
to people’s lives through the consumption of expired drugs. oped by Gatteschi et al. [16]. In this study, the architectural
The utilization of expired medicines or vaccines creates a framework of the program is initially explored, focusing on
substantial risk of fatalities among consumers. Table 1 shows hardware specifications. Subsequently, a software framework
the impact of medicine expiry and its wastage on human is outlined to manage and respond to shipment requests.
lives and the economy. Visually assessing whether a medicine The study particularly addresses challenges associated with
or vaccine has been exposed to detrimental temperature fully autonomous parcel deliveries, proposing potential
extremes is impractical. In many cases, there is no significant solutions to preemptively mitigate issues within this specific
change, even after harmful exposure. Stakeholders involved application scope. Given the urgency often associated with
in medicine and vaccine transportation remain unaware of medication deliveries and the feasibility of drones for small
the medicine’s condition. Key factors such as temperature, and lightweight packages, the system is customized for
humidity, the transporting vehicle, the container or box drug consignments. However, it is crucial to acknowledge
housing the medicine, and the associated hardware have a that the system model could potentially adapt to various
direct impact on the medicine’s state. other scenarios. While proficient for short-range deliveries,
tolerance, addressing network bottleneck challenges through CRC codes are ubiquitously employed for detecting data
bloXroute implementation. transmission and errors. The common examples of CRCs
Stringent international regulations govern shipping and include CRC-16-CDMA2000 deployed in 3G mobile net-
storage temperatures in the cold chain, crucial for works, CRC-CCITT utilized for Bluetooth, CRC-24 applied
ensuring the quality and safety of goods, particularly in Long-Term Evolution (LTE), CRC-32 utilized in Ethernet
temperature-sensitive items like medications and food. and High-Level Data Link Control (HDLC) protocols, and
Incorrect handling of these items poses risks to public CRC-40-GSM employed in the GSM control channel. If the
health and the economy. Vivaldi et al. [25] proposed a probability of undetected error is given by the expression 1
novel solution to address temperature-related challenges with n as the degree of the CRC polynomial (CRC length)
during medical supplies transportation, a modified RFID and k as the number of errors, then the probability of error
tag with a copper-doped ionic liquid was employed to detection of CRC-40>CRC-32>CRC-24>CRC-16, which
detect temperature thresholds, unaffected by humidity implies an increase in computing complexity in the same
changes. This tag permanently changed upon surpassing order.
the ionic liquid’s melting point, adjustable through dopant
1 k
concentration. The introduction of copper ions facilitated PunDetectErr(CRC-n) ≈ 1 − 1 − n (1)
melting and freezing point adjustments, providing a 2
cost-effective solution for identifying cold chain breakdowns CRC-32 is selected due to its significant error detection
in transporting temperature-sensitive goods. The modified property and lower computational complexity than CRC-40.
RFID tags enable non-contact acquisition of information It is energy efficient compared with MD5 and the family of
from multiple packages simultaneously, offering a versatile SHA message authentication protocols, and it is also highly
and economical means of monitoring the cold chain. efficient in terms of hardware and software implementation.
As far as CRC encoding is concerned, it is done by
multiplying a message polynomial M (x) with the term x n ,
A. CONCLUSION OF LITERATURE REVIEW
followed by division by a generator polynomial g(x) of degree
Examining the existing literature reveals a significant
n. The resulting remainder, represented as r(x) = M (x) · x n
technology gap in the secure transportation of medicines,
mod g(x), constitutes the CRC check bits. The addition of
with minimal attention dedicated to this critical area. Our
these check bits to M (x) · x n generates a codeword: M (x) ·
evaluation underscores the opportunity to guarantee the safe
x n + r(x). CRC decoding conventionally involves dividing
and secure transit of medicines by harnessing state-of-the-
the received message by the shared generator polynomial
art sensing and information and communication technologies,
g(x) and then comparing the coefficients of the obtained
including sensors, micro-controllers, MQTT, 5G, etc. that are
remainder with CRC check bits. A mismatch in bits indicates
neglected in prevailing solutions.
an error [27]. Algorithm 1 shows the simplicity and ease of
the code to be implemented on the hardware. Similarly, it is
III. PROPOSED MODEL
The proposed model is given in Figure 2, which clearly Algorithm 1 CRC32 Calculation Algorithm
depicts the flow of the system, overall, the designed archi- 1: Input: data: Input data for CRC32 calculation
tecture is capable of delivering medicine/vaccine safely and 2: procedure GenerateCRCTable
securely to the end users with use of the latest tools and tech- 3: for i ← 0to255 do
nologies such as IoT devices, sensors, smart fridge, MQTT, 4: crc ← i
client application, database and remote server. MQTT is a 5: for j ← 0to7 do
lightweight, open-standard protocol designed for efficient 6: crc ← (crc ≫ 1) ⊕
machine-to-machine communication in resource-constrained (CRC32_POLYNOMIAL & (−(crc & 1)))
IoT environments over ordered, lossless, and bi-directional 7: crc32_table[i] ← crc
connections, typically utilizing TCP/IP or potentially QUIC
8: function CalculateCRC32(data, length)
(Quick UDP Internet Connections) [26]. MQTT QoS (Qual-
9: crc ← 0xFFFFFFFF ▷ Initial CRC32 value
ity of Service) levels 0, 1, and 2 refer to the different levels
10: for i ← 0tolength − 1 do
of message delivery guarantees between the MQTT broker
11: crc ← (crc ≫ 8) ⊕ crc32_table[(crc ⊕
and the client. QoS 0 provides the lowest assurance of
data[i]) & 0xFF]
delivery, as the message is sent with the expectation that
it may be lost or delivered multiple times. QoS 1 requires 12: return crc ⊕ 0xFFFFFFFF ▷ Final XOR operation
the sender to receive an acknowledgment (ACK) from the
receiver, which may lead to potential duplicate deliveries. believed that symmetric key cryptography is more efficient
QoS 2 uses a four-step handshake process to ensure the in terms of large or frequent data encryption as compared
message is delivered exactly once, eliminating the possibility to public key cryptography, which requires more resources
of duplicates. QoS 0 is preferred due to the low-resource and infrastructure and consumes more energy. In the realm
environment. of IoT, traditional asymmetric cryptography methods like
RSA pose challenges due to resource-intensive computations. facilitating secret key exchange between two parties, A and
To address this, we propose lightweight alternatives, such B, based on an agreed-upon group G and a fixed group
as Elliptic Curve Diffie-Hellman (ECDH) with AES-256. element g. A group is a mathematical set of elements with
ECDH outperforms DH and RSA in terms of key length and defined operations that combine two elements to produce a
performance. In fact, the ECC 160-bit key security is equal third element within the group. For secret key sharing in the
to the 1024-bit key security of RSA and DH. The Diffie- DH protocol, each party generates a private random number.
Hellman (DH) key exchange is a mathematical protocol If A generates a and broadcasts ga , and B generates b and
Algorithm 2 Tripartite Diffie-Hellman With Weil Pairing application. Additionally, two GPS sensors are integrated to
1: Input: Elliptic curve E, independent base points P and Q provide real-time location updates to both the sender and
2: Initialize: Secret keys a, b, and c for User-A, User-B, and User- receiver. Similar to the redundancy in temperature sensors,
C
3: Compute and broadcast public keys:
dual GPS sensors are employed to bolster system efficiency
4: User-A: (Pa , Qa ) = (a · P, a · Q) and reliability. This comprehensive sensing and notification
5: User-B: (Pb , Qb ) = (b · P, b · Q) system ensures the secure and well-monitored transport of
6: User-C (Container): (Pc , Qc ) = (c · P, c · Q) medicines or vaccines.
7: Compute shared secret and symmetric key using the Every piece of data throughout the entire process will
HMAC-based Extract-and-Expand Key Derivation Func-
tion (HKDF) [34]
be meticulously recorded. The Arduino, equipped with
8: User-A: both temperature and GPS sensors, will transmit this data
9: SharedSecretABC = F(a, Pb , Qc ) = F(a, Qb , Pc ) = to a remote server via an LTE module using the secure
e(Pb , Qc )a HTTP protocol, functioning as a gateway. Subsequently,
10: SymmetricKey = HKDF(SharedSecretABC ) the module forwards the data to an MQTT broker, which,
11: User-B:
12: SharedSecretABC = F(b, Pa , Qc ) = F(b, Qa , Pc ) =
in turn, pushes the information to the remote server via
e(Pa , Qc )b the HTTP protocol; the basic operations of MQTT are
13: SymmetricKey = KDF(SharedSecretABC ) given in Algorithm 3. Both the sender and the receiver will
14: Container-C: have access to relevant data through their respective mobile
15: SharedSecretABC = F(c, PA , QB ) = F(c, Qa , Pb ) = applications. For instance, the receiver’s application will
e(Pa , Qb )c
16: SymmetricKey = HKDF(SharedSecretABC )
display comprehensive details, including GPS coordinates
and temperature records. To maintain a historical record and
preserve all shipment details, the data will be stored in a
database.
But such security solutions, while computationally secure,
may be vulnerable to breaches with powerful adversaries, Algorithm 3 MQTT Algorithm
while information-theoretic cryptography solutions will offer 1: Initialize: Broker:=ServerIP, Publisher:=Fridge,
resilience in the future [36]. Subscriber:=Sender, Receiver, Topic:=Medicine Fridge
To initiate the process, the system involves two key actors: State
2: Connect to Broker:
the sender and the receiver. This process revolves around Connect
3: Publisher −−−−→ Broker
the reliable shipment of medicines or vaccines. The sender, Connect
4: Subscriber −−−−→ Broker
typically a service provider, initiates the shipment by creating 5: Publish a Message:
an order and placing the medicine into a smart fridge or a Publish(topic, message)
6: Publisher −−−−−−−−−−−−−→ Broker
container designed to maintain a specific temperature range. 7: Broker stores and forward messages to subscribers
The screen layouts used for start shipment and user selection 8: Subscribe to a Topic:
are shown in Figures 5 and Figure 6 respectively. The smart Subscribe(topic)
9: Subscriber −−−−−−−−−→ Broker
fridge, secured with a password, requires a PIN code for 10: The broker adds a subscriber to the list for a specified topic
access; this code is securely delivered to the customer via 11: Receive Published Messages:
email upon order creation. The smart fridge, managed by 12: Broker forwards message to subscribers in the topic
an Arduino, is equipped with temperature and GPS sensors 13: Unsubscribe from a Topic:
Unsubscribe(topic)
to ensure optimal conditions during transportation. Despite 14: Subscriber −−−−−−−−−−−→ Broker
these precautions, the challenge to medicine’s reliability 15: The broker removes subscribers for a specified topic
16: Disconnect:
arises during transit, where the fridge encounters fluctuating Disconnect
17: Publisher −−−−−−→ Broker
temperatures due to variations throughout the day, differing Disconnect
18: Subscriber −−−−−−→ Broker
climates in various areas, and the immediate environmental
conditions impacting the fridge’s performance.
During the transportation of medicine, temperature sensors Upon the completion of the shipment, the end user can
play a pivotal role in overseeing and broadcasting the tem- issue a command to unlock the fridge through the application,
perature levels, promptly alerting the Arduino system to any utilizing the secure PIN code sent to it via email at the
fluctuations. If the temperature falls below the required range initiation of the shipment. The screen shown in Figure 7 is
for the medicine, the Arduino instructs the fridge to initiate used for authentication purposes that demand this PIN. This
cooling, safeguarding the medicine from expiration due to meticulous data recording and secure access system ensures
adverse conditions. This dual-sensor approach enhances the transparency, accountability, and reliability throughout the
safety measures, with a primary temperature sensor taking entire shipment process. Mobile security of different mobiles
the lead and a secondary sensor serving as a reliable backup. and business applications can also be ensured through
In the event of a failure in the primary sensor, an immediate different suggestions and recommendations, such as MVP,
notification is sent to the service provider, who can remotely app right management, and inspection (anti-virus McAfee,
activate the backup temperature sensor through the client CLAMAV, Bit Defender) [37]. Algorithm 4 lays out the
A. IMPLEMENTATION
The system is implemented using different hardware and soft-
ware components. A brief description of these components is
given in Table 2.
components. Its use not only saves battery power but also
improves the system’s overall performance and durability.
circumstances. According to Figure 8 taken from the data Furthermore, taking into account the amount of data produced
generated by the system, the temperature remained within by Arduino, it is around 100,000 bytes per day. In order to
range for the majority of days. In 20 days, only once did it finalize the best algorithm for the given system, Figure 9
go below 2 degrees Celsius and once slightly above 8 degrees depicts the performance of CRC-32, MD5, and SHA-1
Celsius. over 20 days. Hence, it is evident that CRC exhibited
significantly faster execution times with minimal impact on
B. INTEGRITY TEST resources such as the battery. In contrast, running the other
After running MD5, CRC32, and SHA-1 using 1GB of data two algorithms resulted in higher resource consumption and
produced by the system on the fully charged Arduino, we got slightly increased hardware demands.
the results shown in Table 3. In the context of hashing for low-level devices, the
The findings indisputably show that CRC32 is the evidence presented above strongly supports the conclusion
most efficient solution for low-level devices and hardware that CRC32 is the most advantageous choice. Its efficiency
TABLE 4. Confusion matrix table. To measure the performance of the system, another
important coefficient is used. The Matthews Correlation
Coefficient (MCC) is a statistical measure designed to
evaluate the effectiveness of a binary categorization system.
It accounts for true positives, true negatives, false positives,
and false negatives and gives an equitable metric even when
the groups are of varying sizes [41]. The Equation 2 formula
in terms of speed, resource utilization, and minimal impact defines the MCC:
on hardware makes it a standout solution for applications (TP ∗ TN − FP ∗ FN )
where these factors are paramount. Choosing CRC32 not MCC = √
(TP + FP)(TP + FN )(TN + FP)(TN + FN )
only ensures effective hashing but also enhances the overall
performance and resource management of low-level devices. (2)
Where TP is the number of true positives, TN is the number
C. DATA COMMUNICATION TEST of true negatives, FP is the number of false positives, and FN
The test is conducted to verify the bidirectional commu- is the number of false negatives.
nication between the server application and the device By putting in the values we got from Table 5 in MCC
microcontroller via Cloud MQTT. Over 20 days, we initiated Equation 2, we get a value of 0.65, as shown in the
20 shipments to assess the system’s performance, subjecting mathematical expression 3.
it to diverse situations and circumstances. Throughout the (93 ∗ 662 − 15 ∗ 70)
20-day trial, not a single packet was missed when the network MCC = √ = 0.65
(93 + 15)(93 + 70)(662 + 15)(662 + 70)
was accessible, with successful encoding and decoding
(3)
occurring on both ends. Whenever there is network unavail-
ability, data packets are stored locally and subsequently The MCC score falls between −1 and +1, with +1
pushed to the server once connectivity is restored. This representing excellent prediction, 0 representing no better
process ensures data integrity and resilience. As depicted than random prediction, and −1 representing complete
in Figure 10, the data is then transmitted to Cloud MQTT, disagreement between forecast and observation. Overall,
becoming accessible to the devices. a higher MCC value indicates greater classifier performance.
Based on this, our system produced 0.65, which is more than
D. NOTIFICATION ALERT TEST half way better than 0 and closer to +1.
Over the 20-day shipment period, the testing focus was The purpose of the notification alert test is to check the
primarily on the crucial aspects of the application, with a validity of the proposed framework when the container is
particular emphasis on notification alerts. The significance of moved from one location to another. We could not test for
these alerts lies in their pivotal role in ensuring the medicine’s longer distances but for a short distance that is from lab to
reliability. They serve as a real-time update mechanism, home and home to lab; on average, the distance is 35-40
keeping users informed about the current state of the medicine kilometers. It is tested in hot summers where temperatures
during transit. Throughout the trial of these 20 shipments, may vary from 40Co - 47Co and cellular service may
a comprehensive assessment of 840 temperature records also be disrupted in some areas or may become weak in
was conducted. While the system was expected to generate overcrowded passages due to rush hours. Close investigations
108 temperature alerts, it exceeded expectations by producing reveal that moisture and humidity, the aging of sensors, and
a total of 163 alerts. This robust performance underscores the inappropriate sensor placement may cause FNR and FPR.
effectiveness and responsiveness of the notification system in So, the following actions are recorded for reducing FNR and
providing timely and accurate information. FPR:
Now for data analysis, we will use the confusion matrix
(Table 4). It is a useful tool for determining the variables that 1) ADVANCED FILTERING ALGORITHMS
impact accuracy and precision. Advanced filtering algorithms, such as Kalman filters or low-
Now we need to calculate accuracy [38], error rate, pass filters, can be explored to smooth temperature data and
precision [38], true positive rate [39], false positive rate [39], reduce the impact of short-term fluctuations [42], [43].
true negative rate, prevalence, and F-score [40] from Table 4,
and the results are given in Table 5. 2) REDUNDANCY AND CROSS-VALIDATION
The aforementioned calculations were conducted to com- Redundancy and cross-validation for temperature sensors are
prehensively assess various aspects of the system through an also suggested, with redundant sensors deployed and consen-
analysis of the data using a confusion matrix, widely regarded sus algorithms developed to cross-validate readings [44].
as one of the best methods for evaluating system performance.
Upon running the confusion matrix, it was determined that the 3) PERIODIC REVIEW, AND MAINTENANCE
accuracy of the notification alerts is 0.89, indicating that this Periodically reviewing and updating the error detection
classifier is accurate 89% of the time. algorithm based on system performance and evolving
requirements, regularly updating shared keys for secure data pin. It has good accuracy, which is +/-0.5◦C (at -10 to
transmission, employing best practices for key management, 85◦C) [45], [46].
and implementing protocols for detecting and mitigating 2) TMP1826 is a OneWire sensor, that is also compatible
security breaches to ensure the authenticity of transmitted with Arduino libraries. It offers high precision and a
data may also reduce FNR and FPR. OneWire interface for simplified wiring [47].
3) Infrared thermopile sensors such as the
MLX90616ESF-HCA use the Seebeck effect to mea-
V. USING NEW TEMPERATURE DETECTION METHODS
sure temperature and can be interfaced with Arduino
The proposed solution does not introduce or invent any novel using protocols like I2C. They offer non-contact
methods for temperature detection. Instead, it leverages state- temperature measurements and are suitable for mea-
of-the-art temperature sensing technology to conduct tem- suring surface temperatures. Some models offer digital
perature measurements. This concise explanation assists in
outputs [48].
making informed decisions when selecting the most suitable
These sensors are not traditional semiconductor-based but
approach for the given scenario. For instance, the LM35
provide digital output and can be easily interfaced with
temperature sensor is conventionally semiconductor-based
Arduino microcontrollers. It is important to consider the
and can be interfaced with Arduino; there are others that
specific requirements of an application, such as temperature
are not semiconductor-based but provide high precision and
range, accuracy, and interfacing preferences, along with
can be interfaced with Arduino. The most relevant are given
checking datasheets and Arduino libraries for compatibility
below.
and ease of integration.
1) The DS18B20 is a OneWire temperature sensor
with a wide temperature range, high accuracy, and VI. LIMITATIONS AND CHALLENGES
programmable resolution. It supports multiple sensors 1) The proposed solution is based on cellular networks;
on a single bus and communicates over a single digital communications may be disrupted if the service is
not available in any region, and information about [4] D. Oladimeji, K. Gupta, N. A. Kose, K. Gundogan, L. Ge, and F. Liang,
medicines exposure to hostile environmental factors ‘‘Smart transportation: An overview of technologies and applications,’’
Sensors, vol. 23, no. 8, p. 3880, Apr. 2023.
cannot be obtained. Multiple service providers may [5] World Summit on the Information Society Outcome Documents, Int.
be required to ensure the robustness of the proposed Telecommun. Union, Geneva, Switzerland, 2005.
system. [6] G. Mao, Y. Hui, X. Ren, C. Li, and Y. Shao, ‘‘The Internet of Things for
2) sensors may behave poorly and may report inaccu- smart roads: A road map from present to future road infrastructure,’’ IEEE
Intell. Transp. Syst. Mag., vol. 14, no. 6, pp. 66–76, Nov. 2022.
rate readings due to moisture, aging of the sensor [7] S. Chakraborty, T. Chakravorty, and V. Bhatt, ‘‘IoT and AI driven
hardware, electromagnetic interference, voltage fluctu- sustainable practices in airlines as enabler of passenger confidence,
ations, direct contact with the heating surface, and an satisfaction and positive WOM : AI and IoT driven sustainable practice
in airline,’’ in Proc. Int. Conf. Artif. Intell. Smart Syst. (ICAIS), Mar. 2021,
abrupt change in temperature. pp. 1421–1425.
3) MQTT supports three QoS levels (0, 1, 2), but higher [8] S. Aslam, M. P. Michaelides, and H. Herodotou, ‘‘Internet of Ships:
QoS levels come with increased overhead and may A survey on architectures, emerging applications, and challenges,’’ IEEE
impact performance, especially in low-bandwidth or Internet Things J., vol. 7, no. 10, pp. 9714–9727, Oct. 2020.
[9] W. D. Hoyer, M. Kroschke, B. Schmitt, K. Kraume, and V. Shankar,
high-latency environments. ‘‘Transforming the customer experience through new technologies,’’
J. Interact. Marketing, vol. 51, pp. 57–71, Aug. 2020.
VII. CONCLUSION AND FUTURE WORK [10] A. El Attaoui, S. Largo, A. Jilbab, and A. Bourouhou, ‘‘Wireless medical
An innovative system has been introduced to monitor medi- sensor network for blood pressure monitoring based on machine learning
for real-time data classification,’’ J. Ambient Intell. Humanized Comput.,
cation distribution and regulate the temperature of medicines vol. 12, no. 9, pp. 8777–8792, Sep. 2021.
during transportation, addressing the issue of medicine [11] A. Musamih, K. Salah, R. Jayaraman, J. Arshad, M. Debe, Y. Al-Hammadi,
waste and potential harm caused by environmental factors. and S. Ellahham, ‘‘A blockchain-based approach for drug traceability in
The system uses electronic sensors, GPS, and temperature healthcare supply chain,’’ IEEE Access, vol. 9, pp. 9728–9743, 2021.
[12] E. N. Mambou, S. M. Nlom, T. G. Swart, K. Ouahada, A. R. Ndjiongue,
sensors to reduce errors and cater to those who may not and H. C. Ferreira, ‘‘Monitoring of the medication distribution and the
be computer professionals. The cloud-based system allows refrigeration temperature in a pharmacy based on Internet of Things
supervisors to remotely connect and monitor data, ensuring (IoT) technology,’’ in Proc. 18th Medit. Electrotech. Conf. (MELECON),
Apr. 2016, pp. 1–5.
medicines are consistently maintained within a reasonable
[13] BBC news. (2017). South Sudan Vaccination Error Kills 15 Children.
temperature range. The system also proactively notifies users [Online]. Available: https://www.bbc.com/news/world-africa-40135814
of temperature fluctuations, providing real-time awareness [14] AirCargo News. (2019). Failures in Temperature-Controlled Logistics
of the medicine’s status. This technology demonstrates Cost Biopharma Industry Billions. [Online]. Available: https://www.
aircargonews.net/sectors/pharma-logistics/failures-in-temperature-
the effectiveness of IoT in integrating digital devices and controlled-logistics-cost-biopharma-industry-
transforming the global landscape into a real-time display. billions/
Despite the security mechanisms used by MD5 and SHA, [15] H. Zhuoyu and L. Yongzhen, ‘‘Design and implementation of efficient hash
CRC excels in speed, making it a recommended choice for functions,’’ in Proc. IEEE 2nd Int. Conf. Power, Electron. Comput. Appl.
(ICPECA), Jan. 2022, pp. 1240–1243.
enhanced performance. Statistical measures like accuracy [16] V. Gatteschi, F. Lamberti, G. Paravati, A. Sanna, C. Demartini, A.
and F1-score confirm the credibility and effectiveness of the Lisanti, and G. Venezia, ‘‘New frontiers of delivery services using
proposed solution. drones: A prototype system exploiting a quadcopter for autonomous drug
shipments,’’ in Proc. IEEE 39th Annu. Comput. Softw. Appl. Conf., vol. 2,
In the future, we want to enhance the proposed solu- Jul. 2015, pp. 920–927.
tion with blockchain-based technology that can make the [17] S. K. Nanda, S. K. Panda, and M. Dash, ‘‘Medical supply chain integrated
real-time readings of sensors and the state of the medicine with blockchain and IoT to track the logistics of medical products,’’
container immutable. Blockchain technology offers a promis- Multimedia Tools Appl., vol. 82, no. 21, pp. 32917–32939, Sep. 2023.
[18] Ü. Kartoğlu, E. Nelaj, and D. Maire, ‘‘Improving temperature monitoring
ing solution for data protection and distributed sharing as in the vaccine cold chain at the periphery: An intervention study using a
it is a decentralized and distributed ledger technology that 30-day electronic refrigerator temperature logger (fridge-tag® ),’’ Vaccine,
ensures transparency, security, and immutability of data. vol. 28, no. 24, pp. 4065–4072, May 2010.
Blockchain’s immutability makes it difficult to alter data, [19] J. Lloyd, P. Lydon, R. Ouhichi, and M. Zaffran, ‘‘Reducing the loss of
vaccines from accidental freezing in the cold chain: The experience of
providing a robust layer of protection against unauthorized continuous temperature monitoring in Tunisia,’’ Vaccine, vol. 33, no. 7,
modifications or tampering. pp. 902–907, Feb. 2015.
[20] C. Sykes, ‘‘Time- and temperature-controlled transport: Supply chain
REFERENCES challenges and solutions,’’ Pharmacy Therapeutics, vol. 43, no. 3, p. 154,
2018.
[1] M. Majid, S. Habib, A. R. Javed, M. Rizwan, G. Srivastava,
T. R. Gadekallu, and J. C.-W. Lin, ‘‘Applications of wireless sensor [21] I. Konovalenko and A. Ludwig, ‘‘Comparison of machine learning
networks and Internet of Things frameworks in the industry revolution classifiers: A case study of temperature alarms in a pharmaceutical supply
4.0: A systematic literature review,’’ Sensors, vol. 22, no. 6, p. 2087, chain,’’ Inf. Syst., vol. 100, Sep. 2021, Art. no. 101759.
Mar. 2022. [22] J. Loisel, S. Duret, A. Cornuéjols, D. Cagnon, M. Tardet,
[2] I. Azimi, A. M. Rahmani, P. Liljeberg, and H. Tenhunen, ‘‘Internet E. Derens-Bertheau, and O. Laguerre, ‘‘Cold chain break detection
of Things for remote elderly monitoring: A study from user-centered and analysis: Can machine learning help?’’ Trends Food Sci. Technol.,
perspective,’’ J. Ambient Intell. Humanized Comput., vol. 8, no. 2, vol. 112, pp. 391–399, Jun. 2021.
pp. 273–289, Apr. 2017. [23] S. Balachandar and R. Chinnaiyan, ‘‘Reliable pharma cold chain
[3] V. S. Naresh, S. S. Pericherla, P. S. R. Murty, and S. Reddi, ‘‘Internet monitoring and analytics through Internet of Things edge,’’ in Emergence
of Things in healthcare: Architecture, applications, challenges, and of Pharmaceutical Industry Growth With Industrial IoT Approach.
solutions,’’ Comput. Syst. Sci. Eng., vol. 35, no. 6, pp. 411–421, 2020. Amsterdam, The Netherlands: Elsevier, 2020, pp. 133–161.
[24] X. Liu, A. V. Barenji, Z. Li, B. Montreuil, and G. Q. Huang, ‘‘Blockchain- [46] ANSpecified. (2024). DHT11 Vs DHT22 Vs LM35 vs DS18B20 Vs
based smart tracking and tracing platform for drug supply chain,’’ Comput. BME280 Vs BMP180. Accessed: Mar. 7, 2024. [Online]. Available:
Ind. Eng., vol. 161, Nov. 2021, Art. no. 107669. https://randomnerdtutorials.com/dht11-vs-dht22-vs-lm35-vs-ds18b20-vs-
[25] F. Vivaldi, B. Melai, A. Bonini, N. Poma, P. Salvo, A. Kirchhain, bme280-vs-bmp180/
S. Tintori, A. Bigongiari, F. Bertuccelli, G. Isola, and F. Di Francesco, [47] T Instruments. (May 2023). TMP1826 1-Wire® , 4±0.2◦ C Accurate
‘‘A temperature-sensitive RFID tag for the identification of cold Temperature Sensor With 2Kb EEPROM. Accessed: Mar. 7, 2024.
chain failures,’’ Sens. Actuators A, Phys., vol. 313, Oct. 2020, [Online]. Available: https://www.ti.com/lit/ds/symlink/tmp1826.pdf?ts=
Art. no. 112182. [Online]. Available: https://www.sciencedirect.com/ 1709754722978&ref_url=https%253A%252F%252Fwww.ti.
science/article/pii/S0924424720301606 com%252Fproduct%252FTMP1826
[26] B. Mishra and A. Kertesz, ‘‘The use of MQTT in M2M and IoT systems: [48] Melexis. (Aug. 2012). MLX90616ESF-HCA Infra Red Thermometer in to-
A survey,’’ IEEE Access, vol. 8, pp. 201071–201086, 2020. 39 for High Temperature Thermometer Guns. Data Sheet. Accessed:
[27] E. Dubrova, M. Näslund, and G. Selander, ‘‘CRC-based message Mar. 7, 2024. [Online]. Available: https://www.melexis.com/en/
authentication for 5G mobile technology,’’ in Proc. IEEE Trust- product/MLX90616/Thermal-Infrared-Thermopile-Sensor-High-
com/BigDataSE/ISPA, vol. 1, Aug. 2015, pp. 1186–1191. Temperature-Measurements
[28] S. Ricci, P. Dzurenda, J. Hajny, and L. Malina, ‘‘Privacy-enhancing group
signcryption scheme,’’ IEEE Access, vol. 9, pp. 136529–136551, 2021.
[Online]. Available: https://api.semanticscholar.org/CorpusID
[29] A. Menezes. (2005). An Introduction to Pairing-Based Cryptography.
[Online]. Available: https://api.semanticscholar.org/CorpusID
[30] B. Buchanan. (Apr. 30, 2023). Elliptic Curve Integrated Encryp-
tion Scheme (ECIES): Encrypting Using Elliptic Curves, ASecuri-
tySite: When Bob Met Alice. Accessed: Mar. 10, 2024. [Online]. DAVID SAMUEL BHATTI received the Ph.D.
Available: https://medium.com/asecuritysite-when-bob-met-alice/elliptic- degree in computer science (information security)
curve-integrated-encryption-scheme-ecies-encrypting- from the School of Electrical Engineering and
using-elliptic-curves-dc8d0b87eaa Computer Science (SEECS), National University
[31] W. J. Buchanan. (2024). Tripartite Diffie–Hellman Algorithm With
of Sciences and Technology (NUST), Islamabad,
BN256. Accessed: Feb. 7, 2024. [Online]. Available: https://asecuritysite.
Pakistan, in 2020. He is currently an Assistant
com/keyexchange/go_bn256
[32] P. Dzurenda, S. Ricci, J. Hajny, and L. Malina, ‘‘Performance analysis and Professor with the University of Central Punjab
comparison of different elliptic curves on smart cards,’’ in Proc. 15th Annu. (UCP), Lahore, Pakistan. His research interests
Conf. Privacy, Secur. Trust (PST), Aug. 2017, pp. 365–36509. include networks, mobiles, and smartphones secu-
[33] A. Joux, ‘‘A one round protocol for tripartite Diffie–Hellma,’’ in Algorith- rity. His expertise extends to secure routing
mic Number Theory. Berlin, Germany: Springer, 2000, pp. 385–393. protocols, secret key establishment, and device authentication, particularly
[34] H. Krawczyk and P. Eronen, ‘‘HMAC-based extract-and-expand key in low-resource devices like wearable, body-worn, and wireless body area
derivation function (HKDF),’’ IBM Res. Nokia, Internet Eng. Task network (WBAN) devices. His current research interests include the design
Force (IETF), NY, USA, Tech. Rep. 5869, 2010. [Online]. Available: of security protocols using probabilistic data structures. The aim is to
https://www.rfc-editor.org/rfc/rfc5869 optimize time and space complexity in low-resource devices, enhancing their
[35] W. J. Buchanan. (2024). Ecdh With Golang and Kryptology. Accessed: efficiency, and robustness in the realm of information security.
Mar. 10, 2024. [Online]. Available: https://asecuritysite.com/ecdh/go_ecdh
[36] D. S. Bhatti and S. Saleem, ‘‘Ephemeral secrets: Multi-party secret key
acquisition for secure IEEE 802.11 mobile ad hoc communication,’’ IEEE
Access, vol. 8, pp. 24242–24257, 2020.
[37] D. S. Bhatti, N. A. Saqib, and Z. Anwar, ‘‘SCEAMS: Secure corporate
environment adhered to mobile & smartphones,’’ in Proc. 6th Int. Conf.
Innov. Comput. Technol. (INTECH), Aug. 2016, pp. 561–566.
[38] R. Yacouby and D. Axman, ‘‘Probabilistic extension of precision, MUHAMMAD MUEED HUSSAIN received the
recall, and F1 score for more thorough evaluation of classification B.S.C.S. degree from Virtual University and the
models,’’ in Proc. 1st Workshop Eval. Comparison NLP Syst., 2020, M.Phil. degree in computer science from the Insti-
pp. 79–91. tute of Management Sciences, Pakistan. He is
[39] D. van Ravenzwaaij and J. P. A. Ioannidis, ‘‘True and false positive rates
currently a Renowned AI and IoT Researcher
for different criteria of evaluating statistical evidence from clinical trials,’’
with expertise in information security, wireless
BMC Med. Res. Methodol., vol. 19, no. 1, pp. 1–10, Dec. 2019.
[40] C. Goutte and E. Gaussier, ‘‘A probabilistic interpretation of precision,
networks, and software programming. With over
recall and F-score, with implication for evaluation,’’ in Proc. Eur. Conf. Inf. ten years of experience, he is also a Senior
Retr. Santiago de Compostela, Spain: Springer, Mar. 2005, pp. 345–359. Software Engineer with Invensify Ltd. He focuses
[41] D. Chicco and G. Jurman, ‘‘The advantages of the Matthews correlation on securing communication protocols, optimizing
coefficient (MCC) over F1 score and accuracy in binary classification wireless network performance, and developing robust software solutions.
evaluation,’’ BMC Genomics, vol. 21, no. 1, pp. 1–13, Dec. 2020.
[42] X. Zhang, H. Liang, J. Feng, and H. Tan, ‘‘Kalman filter
based high precision temperature data processing method,’’
Frontiers Energy Res., vol. 10, Apr. 2022. [Online]. Available:
https://www.frontiersin.org/articles/10.3389/fenrg.2022.832346, doi:
10.3389/fenrg.2022.832346.
[43] Y. Zhang, R. Wang, S. Li, and S. Qi, ‘‘Temperature sensor denoising
algorithm based on curve fitting and compound Kalman filtering,’’ BEOMKYU SUH received the B.S. and M.S.
Sensors, vol. 20, no. 7, p. 1959, Mar. 2020. [Online]. Available: degrees in computer engineering from Chungnam
https://www.mdpi.com/1424-8220/20/7/1959 National University, Daejeon, South Korea, in
[44] R. H. Dodier, ‘‘Unified prediction and diagnosis in engineering systems 2022 and 2024, where he is currently pursuing
by means of distributed belief networks,’’ Ph.D. dissertation, Dept. Civil, the Ph.D. degree. His research interests include
Environ., Architectural Eng., Univ. Colorado, Boulder, CO, USA, 1999. wireless sensor networks and deep reinforcement
[45] D. Yulizar, S. Soekirno, N. Ananda, M. A. Prabowo, I. F. P. Perdana, and learning.
D. Aofany, ‘‘Performance analysis comparison of DHT11, DHT22 and
DS18B20 as temperature measurement,’’ in Proc. 2nd Int. Conf. Sci. Educ.
Sci., 2022, pp. 37–45, doi: 10.2991/978-94-6463-232-3_5.
ZULFIQAR ALI received the Ph.D. degree in KI-IL KIM received the M.S. and Ph.D. degrees in
computer science from the National University computer science from Chungnam National Uni-
of Computer and Emerging Sciences, Islamabad. versity, Daejeon, South Korea, in 2002 and 2005,
He is currently an accomplished Assistant Pro- respectively. He is currently with the Department
fessor. With extensive teaching experience, he is of Computer Science and Engineering, Chung-
also with the National University of Technology. nam National University. He has been with the
His research interests include AI, optimization, Department of Informatics, Gyeongsang National
and networks, particularly in computational intel- University, since 2006. His research interests
ligence and swarm intelligence. He received include machine learning for networks, wire-
a Research Exchange Fellowship with Arizona less/mobile networks, fog computing, MANET,
State University, in 2014. Apart from his teaching roles, he actively con- QoS for wireless, and wireless sensor networks.
tributes to conferences, including the Frontiers of Information Technology.
He has supervised research projects and published extensively in reputable
journals. His commitment to academic excellence is evident in his continuous
contributions to the field of computer science.