Yirui Jiang
1
,
Trung Hieu Tran
2
,
Leon Williams
3
1
Centre for Design Engineering, School of Water, Energy and Environment, Cranfield University, Bedfordshire, UK
2
Centre for Design Engineering, School of Water, Energy and Environment, Cranfield University, Bedfordshire, UK
3
Centre for Design Engineering, School of Water, Energy and Environment, Cranfield University, Bedfordshire, UK
Abstract
Baggage mishandling has received much attention by airport operators. Traditional baggage tracking methods (e.g., manual, barcode, and radio-frequency identification) have not been able to deal with the challenge of baggage mishandling due to their unreliable and inefficient performance. Baggage data comprises sensitive personal information, linking individuals to their personal details and travel history, with the potential to expose security vulnerabilities. This paper proposes a smart baggage tracking system based on surveillance and blockchain technology for mitigation of baggage mishandling at airports. Surveillance including a network of airport cameras is used to recognize and monitor locations of baggage and passengers. Blockchain technology is utilized to manage and process baggage and passenger databases, guaranteeing the security, privacy, and transparency of baggage information. Surveillance-captured images of baggage and passengers undergo processing through computer vision algorithms to determine the current whereabouts of baggage, subsequently synchronized and updated within the blockchain storage. Additionally, a user interface is developed to present real-time baggage tracking information. Preliminary experiments have demonstrated the applicability of the smart baggage tracking system for airports.
Keywords
Baggage Mishandling,Blockchain,Internet of Things,Smart Airport,Smart Aviation,Surveillance,Tracking System
How to Cite
Jiang, Y., Tran, T. H., & Williams, L. (2026). A Surveillance-and-Blockchain-based Tracking System for Mitigation of Baggage Mishandling at Smart Airports. Asia Journal of Social Innovation and Development, 2(1), 19. Retrieved from https://ajsid.org/index.php/pub/article/view/31
📄4. Kalakou, S., V. Psaraki-Kalouptsidi, and F. Moura, Future airport terminals: New technologies promise capacity gains.Journal of Air Transport Management, 2015. 42: p. 203-212.
📄5. Butler, V. and R.W. Poole, Rethinking checked-baggage screening. 2002, Reason Public Policy Institute Los Angeles, CA.
📄6. Koldkjær, K.P., RFID for Baggage Handling and Tracking. Whitepaper, Lyngsoe Systems, 2017.
📄7. Albers, S. and V. Rundshagen, European airlines′ strategic responses to the COVID-19 pandemic (January-May, 2020).Journal of air transport management, 2020. 87: p. 101863.
📄8. Martin-Domingo, L. and J.C. Martín, Airport mobile internet an innovation. Journal of Air Transport Management, 2016. 55: p. 102-112.
📄9. Halpern, N., et al., Segmentation of passenger preferences for using digital technologies at airports in Norway. Journal of Air Transport Management, 2021. 91: p. 102005.
📄10. Gures, N., H. Inan, and S. Arslan, Assessing the self-service technology usage of Y-Generation in airline services. Journal of Air Transport Management, 2018. 71: p. 215-219.
📄11. Velayudhan, D., et al., Recent advances in baggage threat detection: A comprehensive and systematic survey. ACM Computing Surveys, 2022. 55(8): p. 1-38.
📄12. Alabsi, M.I. and A.Q. Gill, A review of passenger digital information privacy concerns in smart airports. IEEE Access, 2021. 9: p. 33769-33781.
📄13. Zhang, R., et al., Analysis of message attacks in aviation data-link communication. IEEE Access, 2017. 6: p. 455-463.
📄14. Cui, L., et al., Security and privacy in smart cities: Challenges and opportunities. IEEE access, 2018. 6: p. 46134-46145.
📄15. Mohammed, C.M. and S.R. Zeebaree, Sufficient comparison among cloud computing services: IaaS, PaaS, and SaaS: A review. International Journal of Science and Business, 2021. 5(2): p. 17-30.
📄16. Rajapaksha, A. and N. Jayasuriya, Smart airport: A review on future of the airport operation. Global Journal of Management and Business Research, 2020. 20(3): p. 25-34.
📄17. Viorescu, R., 2018 reform of eu data protection rules. European Journal of Law and Public Administration, 2017. 4(2): p. 27-39.
📄18. Dove, E.S., The EU general data protection regulation: implications for international scientific research in the digital era. Journal of Law, Medicine & Ethics, 2018. 46(4): p. 1013-1030.
📄19. Tikkinen-Piri, C., A. Rohunen, and J. Markkula, EU General Data Protection Regulation: Changes and implications for personal data collecting companies. Computer Law & Security Review, 2018. 34(1): p. 134-153.
📄20. Bodkhe, U., et al., Blockchain for industry 4.0: A comprehensive review. IEEE Access, 2020. 8: p. 79764-79800.
📄21. Koenig, F., P.A. Found, and M. Kumar, Innovative airport 4.0 condition-based maintenance system for baggage handling DCV systems. International Journal of Productivity and Performance Management, 2019. 68(3): p. 561-577.
📄22. Rizos, C., et al. Experimental results of Locata: A high accuracy indoor positioning system. in 2010 International Conference on Indoor Positioning and Indoor Navigation. 2010. IEEE.
📄23. Versichele, M., Sensing and making sense of crowd dynamics using bluetooth tracking: an application-oriented approach. 2014, Ghent University.
📄24. Abedi, N., A. Bhaskar, and E. Chung, Tracking spatio-temporal movement of human in terms of space utilization using Media-Access-Control address data. Applied Geography, 2014. 51: p. 72-81.
📄25. Shahbano, M. Abdullah, and K. Inayat, Robust baggage detection and classification based on local tri-directional pattern.International Journal of Internet Technology and Secured Transactions, 2022. 12(2): p. 91-102.
📄26. Zheng, L., Y. Yang, and A.G. Hauptmann, Person re-identification: Past, present and future. arXiv preprint arXiv:1610.02984, 2016.
📄27. Chen, Y.-C., et al., Person re-identification by camera correlation aware feature augmentation. IEEE transactions on pattern analysis and machine intelligence, 2017. 40(2): p. 392-408.
📄28. Gheissari, N., T.B. Sebastian, and R. Hartley. Person reidentification using spatiotemporal appearance. in 2006 IEEE computer society conference on computer vision and pattern recognition (CVPR'06). 2006. IEEE.
📄29. Ma, B., Y. Su, and F. Jurie. Bicov: a novel image representation for person re-identification and face verification. in British Machive Vision Conference. 2012.
📄30. Karanam, S., Y. Li, and R.J. Radke. Sparse re-id: Block sparsity for person re-identification. in Proceedings of the IEEE conference on computer vision and pattern recognition workshops. 2015.
📄31. Cho, Y.-J. and K.-J. Yoon. Improving person re-identification via pose-aware multi-shot matching. in Proceedings of the IEEE conference on computer vision and pattern recognition. 2016.
📄32. Wei, L., et al. Person transfer gan to bridge domain gap for person re-identification. in Proceedings of the IEEE conference on computer vision and pattern recognition. 2018.
📄33. Wang, X., Intelligent multi-camera video surveillance: A review. Pattern recognition letters, 2013. 34(1): p. 3-19.
📄34. Ye, M., et al., Person reidentification via ranking aggregation of similarity pulling and dissimilarity pushing. IEEE Transactions on Multimedia, 2016. 18(12): p. 2553-2566.
📄35. To, K., Reimagining the future of aviation with blockchain. Stern School of Business New York, 2020.
📄36. Comitz, P. and A. Kersch. Aviation analytics and the Internet of Things. in 2016 Integrated Communications Navigation and Surveillance (ICNS). 2016. IEEE.
📄37. Makhdoom, I., et al., Blockchain's adoption in IoT: The challenges, and a way forward. Journal of Network and Computer Applications, 2019. 125: p. 251-279.
📄38. Wang, X., et al., Survey on blockchain for Internet of Things. Computer Communications, 2019. 136: p. 10-29.
📄39. Lu, Y., The blockchain: State-of-the-art and research challenges. Journal of Industrial Information Integration, 2019. 15: p. 80-90.
📄40. Monrat, A.A., O. Schelén, and K. Andersson, A survey of blockchain from the perspectives of applications, challenges, and opportunities. IEEE Access, 2019. 7: p. 117134-117151.
📄41. Nguyen, D.C., et al., Integration of blockchain and cloud of things: Architecture, applications and challenges. IEEE Communications surveys & tutorials, 2020. 22(4): p. 2521-2549.
📄42. Novo, O., Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE internet of things journal, 2018. 5(2): p. 1184-1195.
📄43. Javaid, M., et al., Blockchain technology applications for Industry 4.0: A literature-based review. Blockchain: Research and Applications, 2021. 2(4): p. 100027.
📄44. Marchesi, L., et al., A blockchain architecture for industrial applications. Blockchain: Research and Applications, 2022. 3(4): p. 100088.
📄45. Pal, S., A. Dorri, and R. Jurdak, Blockchain for IoT access control: Recent trends and future research directions. Journal of Network and Computer Applications, 2022. 203: p. 103371.
📄46. Manavalan, E. and K. Jayakrishna, A review of Internet of Things (IoT) embedded sustainable supply chain for industry 4.0 requirements. Computers & industrial engineering, 2019. 127: p. 925-953.
📄47. Kumar, M., et al., Enablers to achieve zero hunger through IoT and blockchain technology and transform the green food supply chain systems. Journal of Cleaner Production, 2023. 405: p. 136894.
📄48. Ahmad, R.W., et al., The role of blockchain technology in aviation industry. IEEE Aerospace and Electronic Systems Magazine, 2021. 36(3): p. 4-15.
📄49. Tang, X., et al. Pyramidbox: A context-assisted single shot face detector. in Proceedings of the European conference on computer vision (ECCV). 2018.
📄50. Wang, D., C. Otto, and A.K. Jain, Face search at scale. IEEE transactions on pattern analysis and machine intelligence, 2016. 39(6): p. 1122-1136.
📄51. Liu, J., et al., Targeting ultimate accuracy: Face recognition via deep embedding. arXiv preprint arXiv:1506.07310, 2015.
📄52. Cao, Q., et al. Vggface2: A dataset for recognising faces across pose and age. in 2018 13th IEEE international conference on automatic face & gesture recognition (FG 2018). 2018. IEEE.
📄53. Yang, S., et al. Wider face: A face detection benchmark. in Proceedings of the IEEE conference on computer vision and pattern recognition. 2016.
📄55. Ren, S., et al., Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems, 2015. 28.
📄56. Redmon, J., et al. You only look once: Unified, real-time object detection. in Proceedings of the IEEE conference on computer vision and pattern recognition. 2016.
📄57. Lin, T.-Y., et al. Focal loss for dense object detection. in Proceedings of the IEEE international conference on computer vision. 2017.
📄58. He, K., et al. Mask r-cnn. in Proceedings of the IEEE international conference on computer vision. 2017.
📄59. Jiang, P., et al., A Review of Yolo algorithm developments. Procedia Computer Science, 2022. 199: p. 1066-1073.
📄60. Redmon, J. and A. Farhadi, Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767, 2018.
📄62. Bai, Y., et al., Learning high-level image representation for image retrieval via multi-task dnn using clickthrough data. arXiv preprint arXiv:1312.4740, 2013.
📄63. Zhang, J. and Y. Peng, SSDH: Semi-supervised deep hashing for large scale image retrieval. IEEE Transactions on Circuits and Systems for Video Technology, 2017. 29(1): p. 212-225.
📄64. Abeyratne, R. and R. Abeyratne, Blockchain and aviation. Aviation in the Digital Age: Legal and Regulatory Aspects, 2020: p. 109-120.
📄66. Hassan, T., et al., Tensor pooling-driven instance segmentation framework for baggage threat recognition. Neural Computing and Applications, 2022: p. 1-12.
📄67. Marchesi, L., M. Marchesi, and R. Tonelli, Abcde–agile block chain dapp engineering. Blockchain: Research and Applications 1 (1), 100002(2020). 2020.
📄68. Fahmideh, M., et al., Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions. ACM Computing Surveys, 2022. 55(6): p. 1-44.
📄69. Six, N., N. Herbaut, and C. Salinesi, Blockchain software patterns for the design of decentralized applications: A systematic literature review. Blockchain: Research and Applications, 2022. 3(2): p. 100061.