Open HSI menu
Subscribe Login

Home / Articles and Press Releases / Article / PPE and the Internet of Things

CATEGORIES

  • Latest Issue
  • Above The Neck Protection
  • Chemical Protection
  • Confined Space
  • Construction
  • Emergency Procedures
  • Energy, Oil and Mining Industries
  • Eye Protection
  • Fall Protection
  • Gas Detection
  • Hand Protection
  • Hazardous and Explosive Atmospheres
  • Health and Safety Awareness
  • Hearing Protection
  • Heat and Flame
  • Lighting and ATEX
  • Noise Monitoring
  • Personal Protective Equipment
  • Respiratory Protection
  • Safety Footwear
  • Safety Technology
  • Safety Training
  • Slips, Trips and Falls
  • Wellbeing at Work
  • Working at Height
  • Working Rights

MORE

  • Press Releases
  • Events
  • Videos
  • Webinars
  • Magazines

COMPANY

  • About
  • Advertising
  • Newsletter
  • Contact
Open HSI menu
Subscribe

Home / Articles and Press Releases / Article / PPE and the Internet of Things

CATEGORIES

  • Latest Issue
  • Above The Neck Protection
  • Chemical Protection
  • Confined Space
  • Construction
  • Emergency Procedures
  • Energy, Oil and Mining Industries
  • Eye Protection
  • Fall Protection
  • Gas Detection
  • Hand Protection
  • Hazardous and Explosive Atmospheres
  • Health and Safety Awareness
  • Hearing Protection
  • Heat and Flame
  • Lighting and ATEX
  • Noise Monitoring
  • Personal Protective Equipment
  • Respiratory Protection
  • Safety Footwear
  • Safety Technology
  • Safety Training
  • Slips, Trips and Falls
  • Wellbeing at Work
  • Working at Height
  • Working Rights

MORE

  • Press Releases
  • Events
  • Videos
  • Webinars
  • Magazines

COMPANY

  • About
  • Advertising
  • Newsletter
  • Contact

CATEGORIES

  • Article
  • Press Release
  • Above The Neck Protection
  • Chemical Protection
  • Confined Space
  • Construction
  • Emergency Procedures
  • Energy, Oil and Mining Industries
  • Eye Protection
  • Fall Protection
  • Gas Detection
  • Hand Protection
  • Hazardous and Explosive Atmospheres
  • Health and Safety Awareness
  • Hearing Protection
  • Heat and Flame
  • Lighting and ATEX
  • Noise Monitoring
  • Personal Protective Equipment
  • Respiratory Protection
  • Safety Footwear
  • Safety Technology
  • Safety Training
  • Slips, Trips and Falls
  • Wellbeing at Work
  • White Papers
  • Working at Height
  • Working Rights

Article

PPE and the Internet of Things

By Grzegorz Owczarek, Artur Hłobaż, Joanna Szkudlarek - CIOP

| Read Bio

Published: August 28th, 2019

Share this article

In 1999, when the whole world was getting ready for the so-called “millennium bug”, which feared thought to paralyse individual computers as well as entire networks due to a faulty calendar date format, Kevin Ashton coined the term “the Internet of Things” (IoT) in which physical objects could directly or indirectly obtain, store, send, or process data, mostly via computer networks.1

Twenty years on, no conclusive definition of IoT has been widely adopted, despite a vast body of publications on the subject.2 One way to describe the IoT concept is to acknowledge a great proliferation of interconnected smart products with advancements in the field of sensor technology and Internet connectivity.3 In this approach, the Internet has been extended to encompass physical objects capable of communicating with each other. Thus, the Internet as a technology is here thought to form a sphere that could also accommodate a multiplicity of smart devices, and as such it is termed the Internet of Things.

In another approach, the IoT concept is grounded in machines and devices equipped with sensors and actuators for executing actions. In this context, these interconnected physical objects delineate areas for Internet activity, such as collecting data, remote monitoring, decision-making algorithms, process optimisation, etc. 4

Ppe and the internet of things

Irrespective of the approach to defining the IoT, the concept is founded on four basic elements:

  • Objects equipped with sensors and actuators
  • A computer network connecting the objects
  • Data exchange and processing systems
  • Modules (e.g. computer applications) for generating information and making inferences

The above elements constitute prerequisites for the IoT as physical objects themselves, even those possessing the most technologically advanced sensors and actuators, but without connectivity (computer networks) and without systems enabling data exchange and processing, cannot function in the Internet sphere. On the other hand, the presence of physical objects in the Internet sphere would be pointless if they did not generate information (by means of applications).

Within the IoT, objects are expected to be enabled with four basic functionalities:5

  • Monitoring
  • Control
  • Optimisation
  • Autonomy

The first two functionalities are associated with sensors installed in physical objects. The application of actuators and information-generating and inference modules can greatly enhance the functionality of such objects. Furthermore, monitoring, control, and optimisation may ensure levels of autonomy unattainable without the cooperation of all elements comprising the IoT. Thus, the IoT is a concept that presupposes the simultaneous presence of certain components and defines some of their functionalities. Thus, the IoT can be conceived of as an ecosystem in which objects communicate with one another, with or without human participation. The main application areas of this ecosystem are thought to be6:

  • Environment and water management
  • Industry and manufacturing
  • Transport and energy
  • Cities, buildings, and homes
  • Health and living
Ppe and the internet of things

Simply speaking, the elements that may obtain, collect, send, or process data using a computer network (the constitutive components of the IoT) may be present in all areas of human life, that is, at home, at work, during travel, and indeed, wherever humans may find themselves, the only precondition being access to a network ensuring connectivity between those devices. This is schematically presented in Figure 1.

The author of the IoT probably did not anticipate the vast number of devices that would be consistent with his novel concept, which has been growing rapidly over the past years. According to Gartner’s predictions,7 the global sales of IoT devices are going to reach 25 billion by 2050, which means a more than eightfold increase on 2013 (approx. 3.0 billion).8 According to sales data from the manufacturers of mobiles devices, in 2015 Apple sold 78.1 million smart devices for daily activity and vital sign monitoring, a major increase from 28.8 million the year before.9

Smart PPE systems

Smart personal protective equipment (PPE) systems have also been defined in different ways. According to the current definition by the European Committee for Standardization (CEN)10, these are products containing smart textiles or having built-in electronic elements to facilitate the user’s integration with the work environment. Another definition, very similar to the one above,11 further specifies the design and functioning of such devices as individual PPE products or sets thereof incorporating smart and/or active materials or sensors and microelectromechanical systems enabling additional, specific functions, and especially active interaction between the user and the environment.

Thus, the definition of smart PPE systems depends not only on technological advancement, but also on assumptions concerning the materials and features that such products must possess. While the CEN’s definition12 mentions only “smart textiles” (a term that could be substituted, more broadly, with “active materials”), it is a critical part of the definition referring to materials or technology.

Ppe and the internet of things

Given that smart PPE has become a familiar notion in the occupational and health literature (OSH), and being aware of the evolution of its definition with scientific developments, we hereby propose the term “smart PPE systems,” which consist of personal protective products with integrated sensors and other hardware and software components enabling the transmission and storage of data from those sensors. If those data further lead to the generation of information triggering user interaction, the system should be deemed “smart.”

Data and information circulation in smart PPE systems

An example illustrating the circulation of data and information in a work environment is presented in figure 2 opposite. It describes a system consisting of sensors integrated with PPE products.

The constitutive elements of the system are:

  • An electronic identifier (a chip card)
  • A sensor module integrated with PPE enabling the monitoring of such parameters as the heart rate, skin temperature, breathing rate, motion (presence or absence of movement), and position
  • A computer with software controlling the system
  • An alarm module alerting the user to health hazards or restricted locations
  • A computing cloud

In the example given above, the user has an electronic identifier, such as a chip card containing his or her ID data. In order to initialise the system, the user must log in by means of, e.g. his or her name, position, function, etc. to enable the software to correlate the data received by the sensors with a given person. Those data are sent on-line to the cloud via electronic modules. Thus, sensors should be understood as elements containing both detectors and data transmission systems. Once in the cloud, the data are sent to a computer with software operating the system. The software also contains applications that generate information about the user’s health and location. That information is redirected to the cloud, where it may trigger an alarm (in the case of a health hazard or a restricted location). Information about alarms is also sent via the cloud to a computer which records the history of such alarms.

Data may also be stored in identifiers and electronic modules. Given that electronic identifiers fulfil the function of an ID card, the safety of the data recorded in them is largely the responsibility of the users. Indeed, users should be aware of the fact that in the event of a loss or unauthorised sharing of the identifier, a third party may log into the system. In the case of modules enabling data transmission to the cloud, it is recommended that they do not record data, and in particular personal details, for the sake of data security. Modules transmitting data to the cloud are typically integrated with the PPE, either permanently or not. In the latter case, such modules may be external to the sensors and placed in a specially designed pouches or pockets. The permanent local storage or personal data would pose the risk of unauthorised access (e.g., by technical staff or cleaning personnel, etc.).

“modules transmitting data to the cloud are typically integrated with the PPE, either permanently or not”

The above example of data and information circulation in a work environment shows that in order to ensure the security of the data and information generated by the system, one should implement independent security solutions for the three layers of the IoT architecture, that is, the perception, transport, and application layers.

Ppe and the internet of things

Perception layer security means preventing access of unauthorised persons to all physical elements of the system presented in Figure 2, that is, computers, electronic identifiers, sensors, etc. In this case, authorised personnel includes:

  • Smart PPE systems
  • Work supervisor
  • System maintenance specialist
  • Data administrator

Importantly, users, who obviously have access to the sensors and alarm modules integrated with PPE, should not be able to modify their function. Any and all activities linked to the operation, maintenance, and calibration of those modules may be performed only by the designated person responsible for those areas. Identifiers should be accessible not only to the users, but also to the maintenance and supervising personnel. Access to the computer with software operating the system should be restricted to the maintenance and security staff, as well as the data administrator. Last but not least, only the administrator should be able to access the data in the cloud.

In the transport layer, data security should be ensured by encrypting data and information transmission in all the instances shown in the diagram. The encryption of data transmission is the responsibility of the maintenance personnel.

In the application layer, protection involves encrypted access points to all applications available in the cloud and on the computer (using a login, password, fingerprint verification, etc.). In this layer, it is the data administrator who is responsible for data security and who should verify passwords (for strength), login procedures, and the status of the resources stored in the memory of the computer supporting the system and in the computing cloud.

Suggestions

Integrity, confidentiality and accessibility must be ensured for all data. Integrity means that the collected data are complete and collected with sufficient accuracy to generate the desired information while providing appropriate processing methods. According to the principle of confidentiality, the collected data / information should be only available to the authorised personnel. Finally, accessibility means that authorised persons should have access to the data / information whenever necessary.

“integrity, confidentiality and accessibility must be ensured for all data”

In order to ensure the safety of the data generated, stored and transmitted by smart PPE systems operating within the implemented security architecture, it is crucial for the employer to fulfil the following conditions.

Fulfilling the legal requirements

The procedures for generating, storing and transmitting data should comply with the applicable regulations (GDPR). The employer should appoint an administrator responsible for the security of personal data as well as a supervisor overseeing the work of smart PPE users and a maintenance officer responsible for the entire smart PPE system.

Training and keeping workers informed

Smart PPE users should be informed about procedures for data generation, storage, and transmission. They should also be trained in the use of smart PPE systems and data access protocols.

Ppe and the internet of things

Obtaining consent from workers

Smart PPE users should express informed consent for their personal data to be processed.

Securing access

Access to the various components of the smart PPE system should be enabled only for authorised personnel.

Preventing data leaks

To prevent data leaks, it is not recommended for monitored data to be sent to the employer’s servers or computing clouds. Ideally, the data should be recorded locally on the device used by the worker. Data may be sent only in justified cases. Under no circumstances should one post data (in particular sensitive data) on social networks.

Deleting data that are no longer needed

At the end of work, all inessential data that were collected by smart PPE systems should be deleted, if possible, automatically.

System control and supervision

The efficient operation of smart PPE systems, both in technical terms (including penetration tests, sensor inspections, etc.), as well as in terms of compliance with procedures for the verification of passwords and personnel authorised to access the various elements of the system, is an indispensable element of data and information security.

Ppe and the internet of things

Figure 3 shows a schematic diagram of the seven elements listed above, crucial to the secure circulation of the data and information generated, stored and transmitted by smart PPE systems.

To efficiently implement the above-mentioned best practices, it is essential to follow general data protection and cyber-security recommendations applicable to all systems, and to smart PPE systems in particular. Of key importance is also a good understanding of the applicable regulations pertaining to the protection and flow of personal data.


VIEW PERSONAL PROTECTIVE EQUIPMENT

References

  1. K. Ashton: That ‘Internet of Things’ Thing, http://www.rfidjournal.com/articles/ view?4986) [access: 15 III 2019]
  2. J. Wielki, “Internet Rzeczy i jego wpływ na modele biznesowe współczesnych organizacji gospodarczych [The Internet of Things and its effects on the business models of contemporary business organizations]”, Zeszyty Naukowe Uniwersytetu Ekonomicznego w Katowicach, Nr 281/2016, pp. 2018-2019
  3. J. Heppelmann, M. Porter, “How Smart, Connected Products Are Transforming Competition”, Harvard Business Review, November 2014
  4. R. Dobbs, et al., “No Ordinary Disruption”, Public Affairs, New York, 2015
  5. J. Wielki, “Internet Rzeczy i jego wpływ na modele biznesowe współczesnych organizacji gospodarczych [The Internet of Things and its effects on the business models of contemporary business organizations]”, Zeszyty Naukowe Uniwersytetu Ekonomicznego w Katowicach, Nr 281/2016, pp. 2018-2019
  6. O. Vermesan, P. Friess „Internet of Things – From Research and Innovation to Market Deployment”, River Publishers 2014
  7. Gartner, Inc. – an analytical and advisory company established in the United States in 1979, specialized in the strategic use of technologies and technology management
  8. Data from Gartner, Inc., November 2014
  9. Data based on https://www.dobreprogramy. pl/macminik/Rynek-mobilnych-gadzetow-sierozwija,70723.html [access 15 III 2019]
  10. CEN/TR 16298:2011, Textiles and textile products. Smart textiles. Definitions, categorisation, applications and standardization needs
  11. Own definition, CIOP-PIB
  12. CEN/TR 16298:2011, Textiles and textile products. Smart textiles. Definitions, categorisation, applications and standardization needs

Share this article

ABOUT THE AUTHOR

Grzegorz Owczarek, Artur Hłobaż, Joanna Szkudlarek - CIOP

The Chartered Insurance Operations Professional (CIOP) designation process helps provide a pathway for insurance industry leaders and professionals to meet head-on the challenges associated with significantly improving and advancing the operational capabilities of their firms. The CIOP designation does this through a rigorous belief in the power of knowledge as a shaper of performance, a builder of professionalism, a creator of ideas, and an inciter of innovation and change.

Visit Website

POPULAR POSTS BY Grzegorz Owczarek, Artur Hłobaż, Joanna Szkudlarek - CIOP

Istock 94287325620copy 0 0 1124 2000 - hsi -

Article

PPE and the Internet of Things

Istock 1019172426 0 2 1687 3000 - hsi -

Press Release

The IoT and PPE

Get email updates

Sign up for the HSI newsletter

Keep up-to-date through the power of email with Europe's largest audited safety magazine - delivering the latest news and products to satisfy all your occupational safety needs.
  • This field is for validation purposes and should be left unchanged.

FEATURED ARTICLES

Article

 Thameslink Traffic Management Programme

Press Release

‘Working At Height’ Remains Biggest Danger

Press Release

“Uncertainty and Ignorance” Risks More Asbestos Deaths

Advertisement

SOCIAL MEDIA

HSI on Facebook

https://www.facebook.com/HSIMagazine/

Advertisement

SOCIAL MEDIA

HSI on Twitter

hsimagazine HSI Magazine @hsimagazine ·
15h

👀 Did you spot @ionscience featured on the front cover of our recent issue? It is great to have them featured throughout issue 98, advertising their Tiger XT range!

🗞️ Subscribe today!
https://www.hsimagazine.com/subscribe/#subscription-columns

#hsimagazine #IONScience #gasdetection #VOCgas #magazine #subscribe

Reply on Twitter 1622595979374481408 Retweet on Twitter 1622595979374481408 Like on Twitter 1622595979374481408 Twitter 1622595979374481408

Advertisement

SUBSCRIBE

Stay up to date with our newsletter

    • Keep up-to-date with Europe’s largest audited safety magazine

 

    • Delivering the latest news and products to satisfy all your occupational safety needs

 

This field is for validation purposes and should be left unchanged.

Subscribe

SUBSCRIBE TO HSI MAGAZINE

5 reasons to subscribe to our digital and print package

  • Stay up to date from anywhere in the world, with instant access to the latest issue straight from your phone, tablet or laptop.
  • Trust that you’re getting the best content from our range of internationally accredited authors.
  • Get full access to our archives and see how occupational safety has evolved with us over the years.
  • Enjoy our monthly newsletter curated with up-to-the-minute news and a selection of editor’s top picks.
  • Hot off the press and straight to your door – look forward to your own glossy copy of HSI, delivered five times a year
Subscribe View Subscription levels

STAY SAFE & INFORMED

Subscribe to the best health & safety articles, news, products and regulations

Find out more

Stay up to date with our newsletter

  • This field is for validation purposes and should be left unchanged.

ABOUT

  • About HSI International
  • Advertise
  • Contact Us

YOUR ACCOUNT

Sign In Register Account Subscribe to HSI

RESOURCES

Request Media Pack

CONNECT

ACCREDITATIONS

Copyright Bay Publishing 2023. All Rights reserved.

Designed & Built by:
  • Terms & Conditions
  • Privacy Policy
  • Cookie Policy
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT