Analysis of Internet of things implementation barriers in the cold supply chain: An integrated ISM-MICMAC and DEMATEL approach

Integrating Internet of Things (IoT) technology inside the cold supply chain can enhance transparency, efficiency, and quality, optimize operating procedures, and increase productivity. The integration of the IoT in this complicated setting is hindered by specific barriers that require thorough examination. Prominent barriers to IoT implementation in a cold supply chain, which is the main objective, are identified using a two–stage model. After reviewing the available literature on IoT implementation, 13 barriers were identified. The survey data were cross–validated for quality, and Cronbach’s alpha test was employed to ensure validity. This study applies the interpretative structural modeling technique in the first phase to identify the main barriers. Among these barriers, “regulatory compliance” and “cold chain networks” are the key drivers of IoT adoption strategies. MICMAC’s driving and dependence power element categorization helps evaluate barrier interactions. In the second phase of this study, a decision-making trial and evaluation laboratory methodology was employed to identify causal relationships between barriers and evaluate them according to their relative importance. Each cause is a potential drive, and if its efficiency can be enhanced, the system benefits as a whole. The findings provide industry stakeholders, governments, and organizations with significant drivers of IoT adoption to overcome these barriers and optimize the utilization of IoT technology to improve the effectiveness and reliability of the cold supply chain.


Introduction
Recent developments in Internet of Things (IoT) technology have the potential to significantly change several industries via the introduction of data-driven insights, increased connectivity, and a replacement of long-established ways of doing things.The supply chain (SC) is a network of related entities that includes every procedure step, from the procurement of raw materials or components to the consummation of the finished good.Supply chains in the modern day have developed into intricate value networks and are now an important differentiator for businesses.A growing number of barriers make it harder than ever to track items and goods as they go through the value chain and confirm where they came from [1].Cold SC (CSC) is a procedure that includes May  activities regulated by temperature and a specialized logistical infrastructure designed to maintain product quality and temperature consistency throughout its entire transit, beginning with the point of origin in manufacturing or procurement and ending with its eventual delivery to the final consumer [2].Everything from preparing, storing, transporting, and monitoring temperature-sensitive goods from their providing areas to their receiving locations involves a sequence of activities in CSC.Food, flowers, medicines, and chemicals are examples of temperature-sensitive items because of their perishable nature [3].To increase sales and profits, companies are creating a cold chain in transportation by reducing costs, reducing delivery times, improving product quality, and offering personalized goods.The Internet of Things (IoT) is a network that links physical items to the Internet and allows them to broadcast data to intelligently identify themselves and enable their location, tracking, monitoring, and management with the assistance of radio frequency identification tags, sensors, actuators, and positioning systems [4].IoT allows previously inaccessible physical and everyday items to separately gather and share data via the use of built-in sensors and network connection.IoT emerged from networked devices, which started at MIT's Auto-ID Center in the nineties, according to Center Director Kevin Ashton, who purportedly developed the concept of IoT at the turn of the millennium.The current concept of IoT is supported by the addition of GPS devices, smartphones, social networks, cloud computing, and data analytics to existing networks [5].IoT plays a significant part in Industry 4.0, which encompasses a variety of innovative and revolutionary technologies, cyber-physical systems, IoT, and cloud computing [6].It links objects, sensors, actuators, and other smart technologies, allowing immediate access to physical commodity data to support new services with high efficiency and productivity [7].IoT deployment may boost the likelihood of reliably transferring flow from source to sink, which is the potential of the cold chain network to withstand increased rivalry among enterprises [8].
Improved operating processes, reduced risk and expense, greater visibility and transparency, and greater adaptability and flexibility across the supply chain are merely a few of the many advantages of incorporating IoT into the supply chain [9].IoT technology may drastically boost the monitoring and control of CSCs, particularly in areas such as medication, food, and logistics where temperature-sensitive commodities are moved and preserved [10].
This study conducts an exhaustive analysis of the barriers that hinder the successful implementation of the IoT in cold supply chains.Integrated interpretive structural modeling and decision-making trial and evaluation laboratory (ISM-DEMATEL) is an extensively used technique for decision-making and analysis in complex systems.ISM is beneficial for building hierarchical links among factors and analyzing the structure of complex systems, whereas DEMATEL delivers a quantitative assessment of the intensity and direction of interactions between factors [11] [12].Both approaches allow for a combination of qualitative and quantitative research, with DEMATEL specifically addressing the feedback loops.They are straightforward and obvious, making them easier to explain and grasp by decision-makers [13] [14] [15].
The increasing volume of international trade and consumer spending has spurred the rapid growth of supply chains for perishable commodities.The logistics for "cold chain" items, such as perishables and frozen foods, constantly evolve.Global revenue for the sector is forecasted to reach USD 277.69 billion by 2023, growing at a CAGR (cumulative aggregate gross revenue) of 7.24 percent between 2018 and 2023 [16].
A simplified and technology-enhanced logistics method for CSC IoT implementation is illustrated in Fig 1 .The figure depicts IoT sensors installed across the CSC to track moisture, temperature, and other important factors, including refrigerated vehicles, warehouses, and storage facilities.The chosen parameters were controlled and monitored using a network of sensors and data-collecting microcontrollers [17].To provide immediate insight into the state of products in transit, data collected from these sensors are wirelessly connected and relayed in real-time to a centralized system [18].In sectors such as pharmaceuticals and food, where maintaining the proper temperature is crucial to product quality and safety, IoT devices make sure that temperature-sensitive commodities are stored and transported within a designated temperature range [19] [20].By considering traffic, weather, and supply quality, IoT may help enhance delivery routes [21].This guarantees that the perishable goods arrive on schedule and in the best possible shape.IoT sensors can monitor inventory levels to minimize overstocking or understocking of temperature-sensitive products, which lowers spoilage and perishable goods losses [22].Well-organized logistics and transportation systems significantly affect product quality.Adopting a high-quality logistics system, especially for perishable items, involves frequent temperature monitoring, real-time product quality assessment, and shelf life determination [23].
The objectives of the study are to apprehend the following: 1. To identify the dominant barriers of IoT implementation in cold supply chains.
2. To Investigate the influential relationship among barriers using ISM and DEMATEL technique.
3. To identify the most significant barriers and underlying causes and effects hindering the enhancement of IoT implementation.
Several studies have delved into barriers within specific countries and contexts; however, these investigations are not without their limitations.Some have explored sectors unrelated to the CSC, and while certain studies have focused on IoT adoption in this context, they often fall short of establishing connections among identified barriers or evaluating their respective effects on the overall system.Moreover, the exploration of IoT implementation barriers in CSCs represents a significant gap in the literature, May 29, 2024 3/33 with no prior comprehensive studies identified in this specific domain.The lack of scholarly attention to this crucial aspect of CSC underscores the need for an in-depth investigation.Our research is a pioneering effort to bridge this gap by employing an integrated ISM-DMATEL approach.The literature gap is particularly evident in the scarcity of empirical examinations and theoretical frameworks dedicated to understanding the intricacies of IoT implementation in CSCs.The unique challenges posed by the CSC environment, characterized by stringent temperature control requirements and perishable goods logistics, warrant further exploration.
To address these gaps, this study contributes to the literature in the following ways: 1.An in-depth analysis of research on essential barriers to CSC IoT adoption, considering various perspectives, including supply chain stages, environmental effects, socio-economic scenery, and data complexity.
2. A survey-based approach was employed to gather data and expert opinions regarding these barriers.
3. The utilization of the ISM method to determine the interdependencies among the selected barriers.
4. The MICMAC strategy was applied to comprehensively analyze the fundamental constructs, thereby offering valuable insights into their significance.

5.
The DEMATEL approach was used to validate causal relationships among the components within the model.6. Key barriers that play a fundamental role in efficiently managing the cold chain are highlighted, offering insights to overcome challenges in IoT adoption.
7. Systematic identification and ranking of barriers based on their influence on the system addresses the current lack of comprehensive assessments in the literature.The rest of the paper is arranged as follows: "Literature review" provides a comprehensive literature review of IoT implementation in CSCs, including implementation challenges and comparable methodologies utilized in the present era; "Methodology" presents the research methodology that was used for the study; "Numerical illustration for results interpretation" covers the data analysis, along with the application of ISM-DEMATEL to the obtained barriers; "Discussions" describes the results of the implementation of ISM-DEMATEL techniques and discusses the results.Finally, the study concludes with conclusions, limitations, and recommendations for future work in "Conclusions and future works."

Internet of Things (IoT)
The IoT is among the most revolutionary technological developments brought about by the digital era [24].The Internet of Things is anticipated to become the most popular form of internet traffic in the next years, with a predicted CAGR of 40 in the commercial sector [25].The economy, communication patterns, and technology development are all expected to be profoundly affected [26].First invented in 1999 by Kevin Ashton and many other scholars at the Massachusetts Institute of Technology, IoT has gained broad interest because it can provide comfort, efficiency, and competitive benefits to the corporate sector [27].The IoT is an essential idea in the coming period.Numerous smart buildings and smart houses are built using IoT technologies [28].The IoT presents a new opportunity to reduce risks, manage complexity, and produce concrete economic benefits by increasing transparency and flexibility across the supply chain [29].The physical components that link IoT include wireless devices such as portable computers, smartphones, wearable gadgets, RFID tags, RFID readers, and wireless sensors.Users may interact with the IoT network using a variety of devices, including cellphones, implanted RFID transponders, wirelessly connected PCs, and wearable technology [30].The popularity and success of IoT have skyrocketed in recent years.Industry leaders, technologists, and consumers recognize the importance of IoT, which has led to an industrial revolution and automated operations in organizations and homes [31].Humanto-thing communication and autonomous coordination among "things" is possible even when they are kept at a facility or transported from one entity in the supply chain to another.Increased supply chain visibility, responsiveness, and adaptability to a variety of SCM challenges are all made possible by IoT [32] [5].

IoT in CSC
IoT, often known as the third wave of IT, has revolutionized supply chain management (SCM) and other sectors.This helps expand the supply chain function by offering technical assistance for greater visibility, stability, and intelligent management [33] [34].Ben-Daya et al. [5] analyzed the existing literature to learn more about the IoT and how it influences SCM.IoT has transformed supply chain management by improving efficiency, allowing predictive maintenance, and enabling real-time reactions to change circumstances, improving operational efficiency, waste reduction, and overall customer happiness [35] [35].Bahl [36] explores how supply chain management has been transformed by IoT technology, which offers real-time data insights, improves visibility, and allows proactive decision-making to satisfy consumer expectations in a changing marketplace and optimize operations.In addition, the majority of research has concentrated on the steps in the supply chain pertaining to food production, distribution, and processing.Kamble et al. [37] proposed an integrated ISM-DEMATEL model to identify the most significant barriers to the widespread deployment of IoT technologies in the food retail supply chain.The two most significant barriers to the widespread use of IoT were a lack of government regulation and insufficient network infrastructure.Nguyen et al. evaluated the reliability of a cold chain network by considering both flow and time factors simultaneously, with the ultimate goal of determining the network reliability for actual products.Shashi [38] revealed two primary themes: the existing cold chain system's known or unknown limits, as well as the use of digital enablers based on the IoT.
Numerous deployment strategies, constraints, and barriers in cold chain monitoring applications have been discussed [39].Sallam et al. [34] analyzed future developments in the field of supply chain management and offers a thorough analysis of the IoT applications in this area, including problems, possibilities, and best practices.The feasibility of implementing modern technologies such as IoT to enhance cold SC was May 29, 2024 5/33 assessed by Gupta et al. [40].To enhance service quality, the organization must invest additional funds for maintenance.Umamaheswari et al. [41] suggested smart cold storage that uses cutting-edge supply chain technology and the IoT to boost productivity and reduce wait times at all levels.Luo et al. [42] presented a smart monitoring system that stores data on defined servers to monitor cold chain items in real time while cutting costs, enhancing network capacity, and simplifying protocols.Cold chain transit is easy to track using this strategy.Afreen and Bajwa [43] implemented a system that utilizes the IoT to track and notify users of changes in cold storage conditions such as humidity, temperature, light, and gas concentration in real-time., alerting workers when these variables exceed safe thresholds.Goodarzian et al. [44] proposed a model for improving the precision, swiftness, and fairness of vaccine injection and implemented an inaugural responsive green-cold vaccine supply chain network in response to the COVID-19 pandemic.Intelligent control technology, cellular networks, wireless communication technology, temperature and humidity sensors, IoT, and database technology all come together to form a cold chain management system [45].Ceken and Abdurahman [46] presented an IoT-based cold chain logistics system that controls and monitors the cold chain's ambient temperature in real time and estimates perishable item shelf life to help all stakeholders make better decisions.The paper by Tsang et al. [22] presented an IoTbased risk monitoring solution to handle product quality and safety concerns in the cold chain.Using this technology, the cold chain can be monitored in real-time, and risks can be assessed to ensure the safety of workers.Hernandez and Yamaura [47] suggested that IoT-enabled devices may reduce pharmaceutical waste caused by temperature changes.It also demonstrated consistency in IoT implementation, including infrastructure, security, and device management.Owing to perishable food and cross-regional transit, cold chain systems encounter several challenges in the perishable food supply chains.Atyam et al. explained the complexity and problems associated with modern supply chain management, the importance of IoT in monitoring items, and how IoT and blockchain might improve supply chain performance.Kumar et al. [48] highlighted the need of efficient cost management and waste reduction as key performance indicators and also emphasized the possibility of boosting operational efficiency and optimizing resource utilization via the integration of the IoT.IoT-enabled smart monitoring and control systems could provide long-term solutions to energy consumption and managerial reluctance in the cold supply chain [49].This study of Zhang et al. [50] addressed these difficulties by creating a perishable food supply chain model utilizing real-time IoT data and two supply hubs to increase performance.Future cold supply networks can become more resilient and sustainable if IoT technologies are used.This advancement is expected to result in less waste and decreased operational expenses, therefore benefiting both businesses and consumers [40] [51].

IoT implementation barriers
IoT deployment is challenging because of device and data security, interoperability issues, scalability, trust, privacy concerns, financial issues, lack of qualified personnel, and compliance with data privacy laws.First, it is necessary to identify the barriers that hinder IoT implementation in CSC in order to overcome these challenges.Table 1 lists the barriers to implementing the IoT in CSC.

Methodology related literature
ISM is a computer-based learning method that assists individuals or groups in creating a visual representation of intricate connections between several aspects of a complex situation.The fundamental idea is to use the practical skills and knowledge of specialists to dissect a complex system into many sub-systems and construct a multi-level structural

07
Cultural and ethical consideration Cultural norms and expectations must be addressed when adopting IoT devices that monitor behaviors and data.IoT devices that monitor and enhance work processes may affect employees differently by culture.Technological developments may not benefit all workers.As IoT automation reduces human control, workers may fear they will be outdated.

Acceptance and adoption
IoT implementation may involve organizational training and cultural changes; therefore, resistance to change and acceptance may be a significant obstacle.Several parties in the CSC may not understand IoT's potential benefits, generating resistance.Worker resistance to the current system may hinder adoption.

Data integration and management issue
Constructing a cohesive and efficient system might be difficult due to possible communication difficulties across different IoT devices and platforms.The IoT is the source of a lot of data.Without proper data management and analytics tools, it is very challenging to deal with this massive amount of data, let alone analyze it and derive any meaningful conclusions from it.[42]  model [11].Raut et al. [75] employed the ISM approach to establish the interconnections among drivers, enabling a comprehensive knowledge of the relative connections among the critical success factors and defining their dependency when implementing sustainability.
The DEMATEL technique has been used extensively to identify critical barriers in various vital processes, which were created to support methodical evaluations and organized decision-making processes.The effect connections map shows the relational linkages, with numbers denoting the degree of influence and arrows denoting the direction of influence.It is a comprehensive tool for assessing the interrelations between system variables and emphasizing the core-driving components [12].Manoharan et al. [76] presented the DEMATEL model, which aids in comprehending the importance of drivers and barriers, creating matrices or digraphs to represent complex causal interactions, and identifying the relationships between these factors.The barrier analysis techniques employed in recent studies are presented in Table 2. Highlighted the key challenges where academics and practitioners may concentrate their strategic efforts to overcome implicit concerns while deploying IoT Techniques in manufacturing.

[79]
Bayesian Best-Worst Method Discovered barriers to implementing the circular economy in the manufacturing sector.
Recommended a more realistic PFS performance, allowing several uses.

[80]
Bayesian Best-Worst Method Identified multiple barriers to implementing the IoT in the food industry Major barrier to the IoT in the food industry is the absence of an adequate internet infrastructure.

[81] ISM-DEMATEL
Examined the identified obstacles that impede the implementation of electronic waste management practices in India.
Key challenges pertaining to e-waste recycling are a lack of public knowledge and rules about the matter.8 [84] ISM-DEMATEL Analysed the challenges associated with waste recycling in India For India's trash recycling infrastructure to grow, significant barriers such as a lack of funds, input material, and subsidies have to be overcome.
The literature investigation discusses every element of the CSC, covering transportation, cold storage, procurement, and occupational security across the cold chain.IoT supports SCM by enhancing visibility and stability, but problems include regulatory limitations and poor infrastructure.Most studies focus on distinct problems and seek to solve these challenges using the solutions provided.In the combined ISM-MICMAC-DEMATEL approach, ISM-MICMAC is used to construct hierarchical relationships among barriers and analyze the structure of systems, while DEMATEL delivers a numerical evaluation of the strength and direction of interactions between factors.Numerous barrier analysis strategies have been employed in modern methods, which are also used to analyze obstacles.The choice between these tactics varies depending on individual circumstances, available data, and decision-makers' preferences.Thirteen barriers, and from the different barrier analysis techniques utilized in recent approaches, ISM-DEMATEL was chosen to analyze these barriers.

Methodology
Research initiation involves several key stages, including the design of surveys, meticulous data collection, selection procedures, and rigorous reliability testing, as illustrated in Fig 2 .Subsequently, the second phase unfolds with a process flow diagram outlining the development of the ISM model.The third phase is characterized by a process flow diagram that delineates the systematic steps employed in constructing the DEMATEL model.

Barriers identification
This involves identifying and recognizing the possible obstacles or challenges inside the system.These obstacles may be technical, organizational, or connected to other system operation elements.Using literature research and expert comments, potential barriers to the system were identified, as described in Table 1.

Survey development and data selection procedure
Thirty experts participated in the survey.The diagonal values in the ISM method are zero.Only one side of the diagonal value is used to create the initial reachability matrix.All 13 rows and 13 columns of the matrix were surveyed, with the exception of diagonal values.This verification process guaranteed that the data provided by the respondents were valid.After determining that the impact of barrier 1 on barrier 2 is V, an expert must conclude that the impact of barrier 2 on barrier 1 is A. If O and X are diagonal, their opposing sides must be the same.These checks will improve the quality of the survey, even if the initial reachability matrix ultimately determines the entire system.
The DEMATEL impact factor survey, which is likewise associated with the ISM survey, is also measured on a scale from 0 to 4. The next issue concerns the impact factor, which must be greater than or equal to 1 if the effect of barrier 1 on barrier 2 is V.A value of 0 is required for the influence factor if it is O.A positive number is also required for X.Therefore, this cross-checking method will enhance the quality of the survey.
Twelve reasonable answers were selected for each question, and twelve 13×13 matrices were constructed.The average of these matrices was calculated to determine the average matrix.For the ISM, the structural self-interaction matrix is also prepared using the value that appears most often in these logical replies.
Table 3 provides a brief overview of the various characteristics of the expert panel.Quantification of each category offers vital information regarding the makeup of the group.A table of this type assists in visually representing and examining the distribution of expertise.The organized survey data from these 30 experts helps the comprehensibility of the information, which is essential for generating the outcome.The sex distribution comprised 26 males and 4 females.Thirteen panelists are below 30, 8 fall in the 30-40 range, 5 are aged 41-50, and 4 are 51 years and above.Regarding experience in their respective fields, 10 experts had less than five years, 7 possessed 5-10 years, 10 had 10-15 years, and 6 held 15 years and above.The domain of expertise includes eight in academics (Industrial Engineering), five in System Integration, four in Data Analysts, six in Data Security, and seven in cold chain executives.
The survey was conducted using Google Forms, and the recruitment period was from 27 Sep 2023 to 11 Oct 2023.Participants were selected based on their expertise in supply chain, system integration, data analysis, data security, and cold chain.The survey consisted of 312 questions, focusing on the influential relationships among the barriers.Confidentiality of participant responses was strictly maintained.All the collected data were anonymized and stored.Only the research team had access to the raw data, and the findings were reported in aggregate form to ensure the anonymity of the participants.This study adhered to the ethical principles outlined in the Declaration of Helsinki.
Participants were provided with informed consent forms detailing the purpose of the study, their rights as participants, and the procedures for data handling.Participation in the survey was voluntary, and participants had the right to withdraw at any time without penalties.This study was approved by the Ethics Review Board of the Research & Extension Center, Khulna University of Engineering & Technology, Bangladesh, to conduct this survey research.

Establish relationships between barriers
Once possible obstacles are discovered, it is essential to understand how these barriers are interrelated or impact each other.This step helps in understanding the complexity of the system and how different challenges may be connected.To determine which pairs of barriers require further investigation, a contextual relationship between them is established.

Cronbach's alpha testing
The reliability coefficient Cronbach's alpha can be used to evaluate the internal consistency of the survey or test items.Many psychological and educational surveys and assessments have used Cronbach's alpha for their formulation and testing.This aids researchers and practitioners in ensuring that their measuring equipment accurately measures the idea in question.Cronbach's alpha reliability is a measure of how well a sum or average of k measurements holds, where k measures might be anything from May 29, 2024 11/33 k raters to alternate forms to items on a questionnaire or exam.We used a 156-item questionnaire (k = 156) to measure implementation barrier influence, with each item scored on a 0-4 Likert scale.A Cronbach's alpha value should exceed 0.7 since a value equal to or more than 0.7 falls within an acceptable range [85].
The variance of the total score (270.52) and the sum of the item variances (67.88) provide this dependability measure.The survey dataset had an acceptable degree of internal consistency, as indicated by a Cronbach's alpha value of 0.7534.This measuring tool reliably captures the targeted construct because the coefficient is greater than the generally recognized requirement of 0.7.

Interpretative structural model (ISM)
The initial development of ISM can be attributed to J. Warfield in 1973 who examined intricate socioeconomic systems [84].This method may help individuals or teams better grasp a topic by organizing their understanding of it into a network diagram.The following is a detailed description of how ISM works [13] [14].

Step 1: Developing structural self-interaction matrix (SSIM)
The pair-wise connection between barriers in the system can be observed by employing SSIM.The following four symbols indicate a unique set of relationships: • V: Barrier i influences barrier j; • A: Barrier j influences barrier i; • X: Barriers i and j influence each other; • O: Barriers i and j have no relationship.

Step 2: Developing reachability matrix
The SSIM generates a reachability matrix; four symbols are converted to 0s and 1s to implement the SSIM in the initial reachability matrix.matrix.
Specific rules of replacement are as follows: • If D(i, j) of SSIM is shown with the symbol "V," D(i, j) = 1 and D(j, i) = 0 should be assigned in the initial reachability matrix; • If D(i, j) of SSIM is shown with the symbol "A," D(i, j) = 0 and D(j, i) = 1 should be assigned in the initial reachability matrix; • If D(i, j) of SSIM is represented by an "X," then D(i, j) = 1 and D(j, i) = 1 should be placed in the initial reachability matrix, • If D(i, j) of SSIM is represented by an "O," then D(i, j) = 0 and D(j, i) = 0 should be assigned.

Step 3: Developing final reachability matrix
A transitivity test is then performed on the initial reachability matrix.ISM presupposes, as a given, that contextual relations are transitive.If barrier A is connected to barrier B, and B is related to barrier C, then barrier A must also be related to barrier C.

Step 4: Developing level partition
Level partitioning refers to categorizing or classifying distinct levels inside the information system.This involves dividing the system into levels or hierarchies to better understand its structure at various levels.The resultant final reachability matrix is segmented into several hierarchical levels.

Step 5: Developing conical form
The conical form describes structuring or organizing an information system in an arrangement that resembles a conical shape, indicating a hierarchical structure.Subsequently, a conical form of the reachability matrix was created.

Step 6: Developing ISM model
A directed graph was constructed using a reachability matrix to eliminate transitive linkages.By exchanging the nodes of the variables for statements, they converted into an ISM from the resultant digraph.

Step 7: Reviewing to check for inconsistency
After establishing the level partition, conical shape, and ISM model, it's important to examine the full system to detect and resolve discrepancies.This step verifies that the system was consistent and functions smoothly without conflicting factors.The generated ISM model is reviewed for conceptual coherence, and any necessary revisions were implemented.

MICMAC analysis
The multiplication of impact matrix applied to classification (MICMAC) study seeks to create a graph to categorize various barriers.The MICMAC algorithm is based on the multiplication characteristics of matrices [86].
The ISM framework requires the construction of a conical matrix to depict the interrelationships of a system's components.For each element, the driving and dependence powers were calculated by adding the values in the rows and columns, respectively.These elements were further classified according to the effectiveness of their driving and dependent power in the MICMAC analysis.Factors were grouped into four categories: autonomous, dependent, linkage, and independent [87].4. Group IV (Independent factors): Involves factors that significantly impact the outcomes of sustainable energy initiatives but are not significantly influenced by other variables.These factors can be utilized to manipulate other elements, thereby contributing to the preservation of sustainable energy objectives.

DEMATEL
The DEMATEL method transforms the complex web of interrelations between barriers into a clear structural model of the system by categorizing them into two groups: causes and effects.This is a practical method for ranking the relative importance of different aspects of a complex system to inform strategic decisions over the long run and identify potential development areas [88].It is extensively implemented across numerous domains, such as SCM, traceability, smart cities, healthcare, and consumer behavior [89].The following is a detailed description of how DEMATEL works [15] [37].

Step 1: Computation of average matrix
The expert panel that filled out the survey was asked to provide an integer value between 0 and 4 to represent the degree of influence they saw between any two barriers, using five different integer scales as "very high influence (4)", "high influence (3)", "moderate influence (2)", "low influence (1)", and "no influence (0)".A respondent's estimate of how much variable i influences variable j is denoted by the x ij symbol.For i = j, 0 is assigned to each diagonal element.
For every respondent, we may generate a non-negative n × n matrix using the formula where k means that there were a total of responders with 1 ≤ k ≤ H and the total number of factors is denoted by n.In this case, the H responder matrices are denoted by X 1 , X 2 , X 3 , ..., X H .
The average matrix can be created as

Step 3: Calculation of the total relation matrix
The total relation matrix T is represented as where I is the identity matrix.
May 29, 2024 14/33 The transpose value of the j th column, denoted by [C j ] ′ , and the sum of the values of the j th column, C j , shows the effect of the j th attribute on the other attributes.The influence of the i th row, denoted by r i , indicates the cause of the i th attribute on other attributes.The sum (R i + C i ) represents the cumulative effects experienced and exerted by factor i. This signifies the degree of importance of element i in the overall system.The difference (R i − C i ) indicates the net effects of factor i on the system.If the difference between D i and R i is positive, the influence factor i may be considered as a net cause.Conversely, if the difference between D i and R i is negative, then factor i can be regarded as a net receiver.

Step 5: Calculation of the threshold value
Determination of the threshold value is necessary to construct an interrelationship map.The interrelationship map only displays equations with penetration matrix values greater than the threshold value.The mean of the elements inside the entire penetration matrix is computed using Equation 6.

Step 6: Drawing interrelationship map
An interrelationship map is created to comprehensively analyze the final solution, considering the values of R i + C i and R i − C i for each attribute in relation to the threshold value.

Step 7: Calculation of the final ranking of attributes
The interrelationship map derives a potential framework and hierarchy of these factors.This is achieved by organizing the values of R i + C i in descending order.

Numerical illustration for results interpretation 4.1 ISM-MICMAC application
ISM and MICMAC techniques are strong ways to create a hierarchy and reveal contextual interactions between IoT adoption barriers, especially regarding the CSC.The principal aim of utilizing MICMAC is to evaluate the importance of the dimensions that affect a system.Using this methodology, researchers can examine the complex interrelationships and dependencies between different components and identify important factors that have a major impact on the system as a whole.The ISM-MICMAC technique has two main phases that have been applied in various settings such as supply chains, industry, and healthcare.A hierarchical structure of the chosen IoT adoption barriers was first constructed using the ISM.The relative importance and hierarchy of each barrier were then determined by methodically examining cause-and-effect interactions.
After the dimensions are established, professionals evaluate the correlations, resulting in the development of a binary relation matrix that is then converted into a reachability matrix.The hierarchy of the barriers is displayed in this matrix, highlighting their key and consequential functions within the CSC framework.The MICMAC technique is used in the next step to further explore the relationships and interactions among the various IoT adoption barriers that have been identified.The emphasis is on understanding the dynamic behavior of barriers and classifying them according to their reliance and driving forces.Identifying driving barriers with high influence but low dependence and dependent barriers with high influence but low driving power is made easier using MICMAC analysis.With this categorization, the role of each barrier in the bigger picture and the vital links between them can be better understood.

Structural self-interaction matrix (SSIM) development
Experts' judgments on the relationships between the 13 identified barriers are used to inform the SSIM's development, which involves using four symbols to depict these interactions in a pairwise fashion, as described in subsubsection 3.2.1.In Table 4, SSIM depicts the element intrinsic linkages and internal dynamics.
Data security and privacy Cultural The symbols V, A, X, and O represent the specific sort of connection between the two components (i, j) being examined.The notation "V" indicates that element i will exert influence on element j. "A" signifies that element i will be impacted by element j.The symbol "X" denotes a bidirectional link, indicating that elements i and j will mutually impact each other.There is no relationship or connection between the elements of the symbol"O".
Table 5 lists IoT adoption barriers using abbreviations for convenience.Each abbreviation provides a concise overview of the main barriers that each one represents.Researchers and stakeholders seeking to overcome and resolve these obstacles in the rapidly evolving field of IoT technology will find the table invaluable.

Reachability matrix formation
The four symbols in Table 4 are converted to 0s and 1s to implement SSIM in the first reachability matrix using the rules described in subsubsection 3.2.2.A square matrix is prepared in Table 6 with binary values that show whether the parts influence one other.The observed barriers are interconnected and have complicated relationships, which can be better understood using the reachability matrix.

Final reachability matrix formation
Transitivity was used to create the final reachability matrix, as shown in Table 7.Following the completion of the analytical phase of the ISM technique, the final reachability matrix, which contains the discovered hierarchical linkages among the system parts, is produced.The final reachability matrix determines the "driving and dependency power", providing insight into the dynamics of the system.Analyzing "driving and dependency power," Table 7 classifies parameters into "dependent, autonomous, linkage, and independent" categories.The barriers that display a significant driving force and dependence are categorized as belonging to the linking group; none of them are classified as autonomous, non-dependent, or dependent.

Level partition
Barriers are broken down into three distinct sets: the reachability set, which contains the factor and all other factors it influences; the antecedent set, which contains the factor and all other factors that influence it; and the intersubsection set, which contains all the factors in both sets.Table 8 provides an overview of the final reachability matrix's detailed reachability set, antecedent set, and inter-subsection set of IoT implementation barriers in CSC.All the barriers were categorized into levels.

Conical matrix
The conical matrix in Table 9 displays the transitivity interactions between adoption barriers.Identifying indirect linkages between components reveals the domino impact of system effects.A more complete picture of the system dynamics and structure is achieved using this matrix, which assists in understanding the wider effect of changing May 29, 2024 17/33 one element on other elements.The conical shape of the final reachability matrix is illustrated in Figure 3.
The hierarchical relationships among the different system parts are better understood using a conical matrix (Table 9), which is a tool for creating conical structures.This conical form clarifies the architecture of the system by visually depicting the hierarchical connections.

MICMAC analysis
MICMAC analysis is a useful tool for determining the drive and dependence power of barriers.This analysis was conducted using barriers to divide the structure into separate groups.
There are four distinct categories of barriers described in Fig 4: Autonomous barriers: These barriers were located in the first quadrant.They were not very strong in driving or being dependent.Dependent barriers: These barriers are shown in Quadrant-II.The driving power of the subject was weak, whereas the dependence power was strong.Linkage barriers: These are inside Quadrant-III and exhibit strong driving and dependent power.In general, the instability of these barriers arises from the interconnectedness of their actions since any action done on one barrier might have consequences for others and could affect the barrier itself.Independent barriers: These are shown in Quadrant-IV and exhibit strong driving power but weak dependence power.

Average matrix formation
Each expert on the panel completed a survey with an integer value between 0 and 4 to indicate the level of impact they noticed between every given pair of obstacles.Using the matrix format of the survey data, the average matrix is determined using Equation 1 in Table 10.

Total relation matrix formation
The total relation matrix is formulated using Equation 3 in Table 12.The values in the matrix indicate the degree of relation between the pairs of factors.A higher value suggests a stronger relationship.

Identification of cause and effect
Table 13 provides information on the degree of influence of various factors related to IoT adoption on cold SC barriers.Each row represents a specific factor, and each column provides different metrics or totals.The row total and column total were calculated using Equation 4 and Equation 5. Causes have R i − C i values greater than 0, whereas the effects have smaller R i − C i values., where the threshold value calculated using Equation 6 is 0.099.Once the threshold value is determined, an interrelationship map is produced.In this map, the values above the threshold reflect the influence of barrier i on barrier j.By contrast, when the value is lower than the threshold value, barrier i is influenced by barrier j.The arrows demonstrate the influence, demonstrating an important link among the barriers.
Values positioned above the neutral horizontal line are categorized as belonging to the cause group, while values positioned below the neutral horizontal line are categorized as belonging to the effect group.Where Full form of these abbreviations described in Table 5.

Discussions
Numerous interconnected barriers to extensive IoT implementation in cold SC were analyzed in this study.Data from the survey were double-checked to ensure accuracy.The Cronbach's alpha test was used to ensure that the survey results were acceptable and valid.A reliable measurement is ensured by this coefficient, which evaluates the internal consistency of the survey questions.After it was confirmed that the alpha value was above the acceptable range, the subsequent stage of the process was initiated.
To ascertain this, The ISM-MICMAC-DEMATEL method is constructed to determine important barriers, which are divided into three subsections: subsection 4.1 for ISM, subsection 4.1.6for MICMAC and the other subsection 4.2 for DEMATEL.May 29, 2024 22/33 The ISM model was created to determine the hierarchy levels of IoTBs so that CSC practitioners could see their dependence links and focus on the largest adoption barriers to IoT deployment.This study identified five hierarchical layers to explain the linkages between the chosen IoTBs.The implementation barrier at higher levels exhibits greater susceptibility to the effect of other factors, while components situated at lower levels strongly influence other factors.
Variables classified as high levels, namely Levels 1 and 2, are prone to being influenced by other variables.We identified acceptance, adoption, and reliability issues at the top of the hierarchy, driven by the four hierarchies below.At the second level, we identified two barriers: high implementation cost and ROI uncertainty caused by the three hierarchical layers below it.In the third tier, six interconnected barriers have mutual effects.These barriers include a lack of skilled workforce, data security and privacy, technological infrastructure, scalability challenges, cultural and ethical considerations, data integration and management, and extreme environments.Conversely, components categorized as low levels, namely Levels 4 and 5, can influence the other factors more.The IoT adoption barriers in Level 4 are cold chain networks and Level 5 is regulatory compliance.These factors serve as foundational elements in a broader network of relationships.
The analysis of barriers identifies regulatory compliance as an important factor that hinders the implementation of the IoT.The implementation of government regulations that promote the adoption of IoT will result in a significant transformation of the supply chain system.Infrastructure, environmental factors, a trained workforce, cultural-ethical considerations, scalability, and other factors influence the cold chain network.Most of the supply chain stages are apprehensive about implementing IoT, as is typical with every new technology.An efficient technological infrastructure is necessary for the successful deployment of the IoT across supply chains, which involves a vast network of linked devices and systems.Adoption of the IoT depends on this infrastructure, which allows integration, data transfer, and communication among components in the supply chain ecosystem.Industries may face challenges with scalability and performance if the infrastructure is insufficient for the IoT.To oversee such a vast and complex system, experts with the necessary level of expertise are required.Reducing the challenges associated with IoT adoption requires secure network cloud data.Preventing spyware and attacks is crucial since the number of connected devices and sensitive data is growing.As the nature of threats evolves, more sophisticated security measures and solutions designed for IoT systems may be required.A massive investment is necessary to hire experts, educate current employees, and build infrastructure.Industries are hesitant to implement IoT due to concerns about the potential lack of return on investment.In order to feel certain about the ROI, small companies need to be presented with a handful of positive examples.
According to the MICMAC analysis, independent barriers are cold chain networks and regulatory compliance; dependent barriers are ROI uncertainty and high implementation costs.The other seven were linkage barriers, and no autonomous barriers existed.Among the many types of barriers, linkage and independent barriers exhibit significant driving forces, making them crucial barriers.
The interdependence of the barriers is depicted in the interrelationship map.Regulatory compliance, lack of skilled workforce, data security and privacy, technological infrastructure, scalability challenges, cultural and ethical considerations, data integration and management issues, extreme environment issues, and cold chain networks are in the cause group.High implementation cost, acceptance and adoption, reliability issues, and ROI uncertainty are in the effect group.Regulatory compliance and cold chain networks were identified as the most important causes, with respective values of 1.8719 and 1.2308.These two barriers drive more in a larger context; thus, improving performance may promote system development.Reliability issues, acceptance and adoption, and May 29, 2024 23/33 high implementation costs are the most important effects influenced by other barriers.These effects were quantified with values of -1.7808, -1.4118, and -94707, respectively.According to the final ranking of attributes, the most important criteria are technological infrastructure, data security and privacy, and data integration and management.The criterion for extreme environments is of the least importance.
To overcome the barriers associated with data integration and management, it is essential to implement standardized software that enables communication between devices on the same system.Priority should be given to privacy and security during IoT implementation, and it is difficult to develop and investigate a gateway that connects devices using multiple protocols.Faculty and industry must collaborate to resolve this challenge.Significant investment and research are needed for solving security and data integration challenges at the ground level.

Managerial and practical implications
Given that the implementation of IoT is in its early stages, the results presented in this paper offer valuable guidance for practitioners.This study has revealed several implications for both managerial and practical considerations, providing insights that can inform decision-making in this evolving field.
• This article guides innovative supply chain methods that use new technologies such as IoT.This study provides crucial barriers to understanding supply chain strategies by considering IoT while creating a coordinating system.Managers can also learn about the most prevalent IoT technological difficulties.With additional insight, managers can quickly improve processes, fix issues, and make decisions more informedly.
• This research can help CSC managers plan IoT programs to protect perishable goods from packaging and processing to storage, transportation, and distribution by providing precise temperature and humidity data with a data integration system.IoT sensors may warn of temperature changes or equipment breakdown.Managers schedule proactive maintenance to prevent breakdowns and product spoilage.Highquality goods and adequate regulations may benefit from this research.
• This study promotes new efforts to provide supply chain stakeholders with a single platform to exchange information to establish a strong system.This study's focus on efficient information transmission made cold SC more trustworthy.IoT devices collect sufficient data to enable managers to observe patterns and trends.Analytics can optimize processes, routes, and resource use.
• This study suggests that IoT technology might enhance cold SC product quality, customer demand, and services.If this study is used well, management may replace conventional supply chain linkages with real-time data interchange via radio frequency identification tags, readers, and other embedded electronic devices.
• The findings of this study can convince managerial staff to invest in GPS, RFID tags, readers, and other monitoring technologies.Managers will hire suitable candidates to maximize the use of IoT technology using this knowledge.The conclusions of this study may also motivate higher management to expand staff training and development.

Unique theoretical contribution
To guarantee a long-term, IoT-based CSC system, this study examined the challenges associated with using the IoT in CSC.Thirteen obstacles were identified with the assistance of stakeholders.According to the results of this study, various stakeholders in CSC require distinct responses.As the transport management system (TMS) is the most influential party, it follows that TMS should take the initiative and rely on policies to guide its actions.These stakeholders initiate the HIC, TI, SC, DIM, EE, and CCN barriers.
Additionally, any and all obstacles may serve as a roadmap for different groups of people engaged in logistics, product processing, quality inspection, and secure packaging.To sum up the theoretical contribution, this study found two kinds of barriers-cause and effect-based on stakeholder theory that prevents the implementation of IoT in CSC systems.The specific barriers to the effective deployment of IoT in CSC may be better understood by exploring each of these categories.Combining insights from management, engineering, logistics, and information systems into a comprehensive plan.This approach facilitates the identification of problems as a whole and the development of comprehensive solutions.This study also used a socio-technical systems approach to examine social-technical interactions inside the CSC.Human traits, organizational culture, and socioeconomic context influence the process of identifying and removing barriers.This model demonstrated how obstacles in one part of a system may affect other parts of the system and how the removal of certain obstacles can cause other benefits to trickle down.

Conclusions and future works
The primary purpose of this study was to identify and examine the barriers that hinder IoT implementation in cold SC.Our research sought to identify and examine the barriers preventing the IoT from being widely used.As a result of IoT's infancy, CSC partners are unaware of their technological requirements and the benefits that accompany them; consequently, they are hesitant to implement it.Significant findings and insights were derived from the ISM-MICMAC-DEMATEL analysis, which clarified the connection between implementation barriers and their effect on CSC.ISM provides hierarchical linkages, but the impact of IoTBs on each other has not been quantified.The DEMATEL method was employed to identify the most crucial IoTBs and overcome the limitations of ISM, which prioritizes the interactions between the selected barriers more than ISM.According to the research results, there are two primary factors that practitioners in CSCs should focus on regulatory compliance and cold chain networks, which serve as a catalyst for advancement by focusing on the barriers hindering development.With MICMAC's element classification based on driving and dependence powers, the interconnections inside a complicated system may be fully understood, and decisions can be made more effectively.According to the DEMATEL attribute ranking, the three most important factors preventing the widespread adoption of the IoT are data integration and management (DIM), technological infrastructure (TI), and data security and privacy (DSP).While these barriers do pose a serious threat to the system, it is vital to remember that they could not be the main causes influencing the dependability and efficiency of IoT deployment as a whole.Regardless of whether they are not the most crucial barriers discovered by DEMATEL analysis, practitioners aiming for long-term viability in IoT deployment should prioritize resolving the most important causes.Challenges with regulatory compliance and cold chain networks are likely to be among these root reasons, as are other essentials for the successful implementation of IoT.The long-term success and stability of IoT deployments may be assured if practitioners concentrate on fixing these underlying issues.On the other hand, where there is a need for rapid or immediate improvement to enhance IoT implementation, it can be practical to tackle the most important obstacles found by DEMATEL first.Although these obstacles may not solve the root problems, they may improve some parts of the IoT deployment, which can May 29, 2024 25/33 lead to rapid success and show stakeholders how beneficial the technology could be.The efficient implementation of IoT in CSC depends on government rules and a strong cold chain structure.Government engagement may solve data privacy, security, integration, and reliability issues, boosting industry confidence and IoT adoption.Securing and tackling these barriers properly leads to higher reliability in the IoT implementation.
The total system becomes more expensive due to the scalability issues and harsh environmental issues.The most important thing to remember is that the long-term advantages will be worth it, even if the initial investment in the IoT is expensive.It will increase the acceptance and adoption of the IoT implementation in CSC.
Practitioners must pay special attention to the highlighted barriers to the adoption of IoT.Hence, this study highlights the present barriers and provides the groundwork for future developments that might revolutionize the use of the IoT in cold SC.Although our research has shed light on significant insights into IoT implementation barriers within CSCs, it is imperative to acknowledge certain limitations and outline avenues for future exploration.Our primary constraint lies in the indirect nature of our investigation as we could not directly observe industry-specific barriers.Instead, we thoroughly examined existing IoT studies on CSCs.Another limitation of this research is the lack of digital archives, such as Scopus and the ACM Digital Library, in the systematic literature review.However, we selected respectable scientific archives, such as IEEE Xplore, Springer, Elsevier, Taylor & Francis, Wiley Online Library, ResearchGate, and Science Direct.These repositories provide high-quality research.The references of selected publications were traced using all relevant studies using the backward snowballing method.Identifying thirteen major IoT implementation barriers is the foundation, but it is essential to recognize that additional barriers may surface during real-world implementation.To mitigate potential bias, we sought input from thirty experts.However, the evaluation by these topic experts introduced a degree of subjectivity to our study's final conclusions.Enhancing the robustness of our findings involves soliciting inputs from an extensive array of industry firms.Increased participation would validate our identified barriers and enrich the diversity of perspectives, thereby improving the overall quality of our study.Furthermore, our study's focus on CSC prompts the need for broader investigations into other sectors, such as the food supply chain, agriculture, and perishable goods.Conducting additional research in these areas will provide a more comprehensive contextual understanding and allow for the generalization of our findings beyond the specific case at hand.Additionally, alternative methods should be explored to test the hypotheses regarding the interrelationships among IoT barriers.Although our research has made valuable contributions, addressing these limitations and pursuing future avenues of exploration will undoubtedly refine and extend the scope of our understanding of IoT implementation challenges in various industries.

Fig 1 .
Fig 1. IoT implementation in the cold supply chain.

6 [ 82 ]
DEMATEL-ISM Identified what circumstances affected the flight crew's TSA protocol Different levels of hierarchy, mutual impact, and the cause-and-effect link are shown for the flight crew's TSA creation and management.7 [83] Fuzzy-ISM-DEMATEL Identified barriers to implementing sustainable purchasing practices over the internet Improved DEMATEL, ISM, and rough set theory into a unified framework.

Fig 2 .
Fig 2. Flowchart depicting the research methodology, encompassing phases such as data collection and validation, implementation of ISM-MICMAC, and execution of the DEMATEL procedure.

1 .
Group I (Autonomous factors): Comprises autonomous factors characterized by minimal interdependencies.2. Group II (Dependent factors): Encompasses dependent factors exhibiting a substantial reliance but limited generative capacity. 3. Group III (Linkage factors): Consists of linkage factors possessing a robust propelling force and reliability.

.2 Step 2 :
Calculation of the normalized direct-relation matrix Normalize direct-relation matrix D by D = A × S, where

3. 4 . 4 Step 4 :
Calculation of cause and effect values R and C values, representing the sum of the values in the rows and columns, are now used in the calculations.Where,

Fig 3 .
Fig 3. Conical form of the final reachability matrix.

Fig 6 .
Fig 6.Digraph showing the influential relationship between the barriers.

Table 1 .
Barriers to IoT implementation in the cold supply chainIntegrating the IoT into an already established supply chain might be challenging.On the other hand, it's likely that some of the more recent IoT technologies won't be compatible with more established networks and software.IoT devices can't be deployed and used effectively without the right infrastructure in place.Scalability is a challenge for numerous sectors.It may be difficult to implement IoT throughout a complex supply chain.Cold supply networks need strict data monitoring and traceability.Implementing and running these systems need accurate data.Coordinating many linked devices and data becomes more difficult as IoT networks grow.

Table 2 .
Various barrier analysis methodologies used in recent approaches

Table 3 .
Demographic profile of the selected experts

Table 5 .
Barrier abbreviation Table

Table 6 .
Initial reachability matrix Barriers RC HIC LSW DSP TI SC CEC AA DIM RI ROI EE CCN

Table 8 .
Final level partitionElements (M i ) Reachability Set R(M i ) Antecedent Set A(N i )

Table 12 .
Total relation matrix

Table 13 .
Degree of influencesIoT implementation in cold SC barriers (R i ) Row Total (C i ) Column Total R i + C i R i − C i Identify Developing interrelationship mapA digraph illustrating the influential relationship between the barriers is shown in Fig 6