You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

18 June 2020

The Use of the Blockchain Technology and Digital Watermarking to Provide Data Authenticity on a Mining Enterprise

and
1
Department of Cyber-Physical Systems Information Security, HSE Tikhonov Moscow Institute of Electronics and Mathematics, National Research University Higher School of Economics, 123458 Moscow, Russia
2
Laboratory of Cyber-Physical Systems, V. A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences, 117997 Moscow, Russia
3
Department of Complex Information Security of Computer Systems, Tomsk State University of Control Systems and Radioelectronics, 634050 Tomsk, Russia
*
Author to whom correspondence should be addressed.
This article belongs to the Section Internet of Things

Abstract

Prompt development of information technology has made an essential impact on many industries. There appeared a concept “Industry 4.0” symbolizing the fourth industrial revolution. The given concept is closely connected with such promising technologies as the Internet of Things, blockchain, fog computing, Big Data. In the present research, the sphere of the mining industry is examined. We discuss the possibility to increase the efficiency of mining enterprises at the expense of the development of common information space based on modern digital technologies. We analyze security problems at the level of data flow between the participants of the production process on a mining enterprise. We define the problem of providing the reliability of data on the production course on mining enterprise in the conditions of the possible connection loss between the control center and separate technological units. We offer a new approach to the solution of the given problems, based on the technology of blockchain and digital watermarking. The computing experiment is conducted presenting a possibility to implement the offered approaches on common models of microcontrollers.

1. Introduction

The prevailing direction of the development of the world mining industry in the immediate future is considered to be open-cut mining of deposits as it allows one to ensure the best economic indicators. The share of open-cut mining in ore mines, opencast mines and open-casts is over 80% of world mining production. In Russia, 91% of iron ores, more than 70% of nonferrous metal ores, more than 60% of coal is extracted by open-cut mining. At the same time, all over the world the depth and scales of open-cut mining are increasing [1,2,3,4].
The increase of open-cut mining efficiency can be reached in two ways:
  • at the expense of application of new types of mining service machines and transport equipment;
  • at the expense of the implementation of common information space with modern digital technology at mining enterprises.
The first way allows increasing the efficiency of open-cut mining at the level of the primal production process. The second way allows regulating the activity of divisions and employees, increasing the speed of decision-making, automating the data flow in the enterprise, and considerably increasing the efficiency of automation.
The key element of common information space of a mining enterprise is the automated decision support systems. They process Big Data flow coming from various sources. The timely information on the current condition of the enterprise is necessary for the correct operation of such systems at all levels.
The development of common information space of a mining enterprise is a major problem including a number of aspects and subtasks. Our research is concentrated on such aspect of the general problem as protection of data on the production course. Primarily, this refers to the data on the actions of technological units.
In the case of the industry under consideration, the problem of data protection has a number of distinctive features which define the urgency of our paper. The main feature consists in the fact that on an opencast mine, there is not always a connection with the service units because of the features of the landscape. Therefore, the control unit can receive the distorted information on the actions of technological units, or during some time not to receive it at all. On the one hand, it negatively affects the quality of management. Because of the connection loss, the automated systems not always can correctly direct the service support transport to a certain excavator or clearly define if a support service machine belongs to a certain group. On the other hand, it allows unfair workers to hide the actions violating industrial regulations. For example, in the case of big enterprises, where is a set of working sites, the problem of friend-or-foe identification is urgent. Technological transport machines can come to the wrong working sites for loading.
Thus, the main objective of this paper is to solve the problem of providing the reliability of data on the production course on a mining enterprise in the conditions of possible connection loss between the control center and separate technological units. As a whole the given research brings the following contribution:
  • the problems of security at the level of data flow between the participants of the production process on a mine are analyzed and the key problems requiring the immediate solution are selected.
  • the approach to transaction reliability provision in the common information space of a mine, based on the blockchain technology is offered. A transaction is understood as any significant event, occurred to technological units in the course of their work. The format of transactions is defined and the list of transactions for two basic types of technological units is generated.
  • the approach of digital watermarks to providing the authentication of the sensor data generated by service support transport is offered. This approach is supplemented blockchain and ensures the additional data binding to the conditions of their generating.
The rest of the given article is structured as follows. The review of previous research on the topic is presented in Section 2. Section 3 is devoted to the ways of the solution of the problems arising at the development of common information space at a mining enterprise. The results of some computing experiments and their discussion are presented in Section 4. The conclusion sums up the research.

3. Methodology

In the present research, we offer approaches to the solution of the problems arising at the development of common information space of a mining enterprise. An automatic distributed dispatch system with the function of friend-or-foe identification of support service vehicles based on blockchain and digital watermarking can be a practical implementation of the given approaches.
The given system would allow identifying support service machines in the conditions of a bad connection, connecting them among themselves by a radio channel, exchanging the current condition of technological machines, and transmitting the required data to the central unit through a chain of technological units.

3.1. Data Flow Arising During Open-Cut Mining at a Mining Enterprise

Open-cut technologies include four basic technological stages:
  • preparation of rock for the extraction;
  • extraction-and-loading;
  • mined rock transporting;
  • unloading and storing of mined rock [4].
Each of the listed stages has a certain data flow between participants of the manufacturing process which are to be processed in a uniform information system of the mining enterprise.
The preparation of rock for extraction consists in the change of their natural condition to provide effective development of a mineral deposit. There are three basic ways of doing this:
  • protection from freezing;
  • hydraulic slackening or softening;
  • mechanical or explosive scarifying.
The mechanical or explosive scarifying of hard rock is the most widespread on opencasts. To execute the technological process of scarifying, a higher number of support service machines and the more complex management of data flow are required at all levels of the enterprise; therefore we examine the circulation of data flow on an example of mechanical scarifying. As a rule, mechanical scarifying is carried out by specialized excavating technological cyclic machines also referred to as draglines.
Before the beginning of the preparation process of rock to the extraction, the crews receive a development program of the site where the plan of work is specified as well as the transportation type. The transportation type of mined rock in the scarifying site defines the load on the data flow of the enterprise in the higher degree. There are two possible ways of mined rock transportation from the site: Rehandling and transportation by support service vehicles.
When following the first way, the dragline crew is engaged in the transfer of mined rock without any interaction with the dispatcher.
In the case of the second model, the dispatcher assigns support service vehicles to a dragline. The dragline crew in this case directly co-operates with the drivers of support service vehicles, bypassing the dispatcher. The inquiry on the fulfillment of technological service operations by the excavating machine crews is carried out through the dispatcher.
The stage of rock preparation for the extraction is followed by extraction-and-loading. This includes rock extraction directly from the solid and the extraction of mined rock from the muck pile, its loading onto vehicles or transporting to a dumping site. The extraction and mined rock loading are carried out by one support service machine.
On opencasts as the extracting and loading equipment, the following is used: rotating electric machines (single-bucket excavators, earth loaders, earth-moving scrapers) and continuous action machine (chain bucket excavators and rotary bucket excavators).
The mined rock loading is performed into autodump trucks, side-tipping dump cars and belt conveyors.
At this stage, the dispatcher coordinates the support service vehicles and the dragline. There are two possible ways of the organization of the loading process:
  • to assign the support service vehicles to specific excavating machines;
  • to assign the support service vehicles in the course of the work in an adaptive way.
In the case, if the support service vehicles are assigned to the dragline, the crews co-operate directly bypassing the dispatcher. In the case of the model of adaptive assignment, the operator assigns the support service vehicles and monitors its condition.
Figure 1 shows the data flows in both cases.
Figure 1. The data flow arising during the preparation of rock to the extraction and during the extraction-and-loadings: (a) in case of permanent assigning of support service machines to excavating machines; (b) in case of adaptive assigning of support service machines to excavating machines.
The given data flows directly influence the timeliness and efficiency of functioning of all services on the mining enterprise.
If the support service unit is out of the connection zone, the dispatcher cannot monitor its condition and send commands to realize the manufacturing process. Because of that, productivity decreases, downtime occur and material and time funds are wasted.
Besides the lack of support, the operator cannot constantly monitor the quality of the technological process, and unfair crews of support service machines frequently use this. They can exploit the technological machine in the forbidden modes for the purpose of reduction of labor input of the process of excavation. An example of it is the removal of stuck rock from the walls of a bucket by hitting it on solid objects. It can cause hard-alloy teeth breaking and the subsequent replacement would be required.
Extraction-and-loading is followed by transporting the mined rock. It is carried out in various ways depending on the mining and geological conditions of the mining technological tasks, physical and technological properties of transported rock.
Open-cut transport is designed for transporting of mined rock from mine faces to disposal points. It is a link in the technological process. The efficiency of field development depends on the accurate work of open-cut transport. The labor input of transporting is rather high, and the expenditures for actual transport and the connected tender work are 45–50%, and in some cases 65–70% of the total production cost [38,39].
At the given stage, the dispatcher monitors the current condition of support service vehicles: current spaced coordinates, fuel reserve, velocity, quantity of transported cargo, output per shift, load unloading site. On the basis of these data, the dispatcher can redistribute the places of unloading and work of accompanying services.
The corresponding data flow is shown in Figure 2.
Figure 2. The data flow arising on the stage of mined rock transportation.
The last technological stage examined here, unloading and storing of mined rock is executed. At this stage, the dispatcher makes the decision on the unloading of support service vehicles in unloading terminals, proceeding from the current load, and whether the support service machines are available. The occurring data flow is shown in Figure 3.
Figure 3. The generalized scheme of data flow at a stage of unloading and mined rock storing.
At all stages of extraction of resources, the information from a number of sensors and sensor nodes is constantly gathered so that the enterprise dispatcher timely made decisions. A lot of data is gathered, for example, the data about fuel residual to call a fuel-servicing truck at the right time, the data about the cargo weight transported by support service vehicles. A generalized diagram of data flow is shown in Figure 4.
Figure 4. The generalized diagram of data flow.
The presented diagram shows what data flow can be processed in common information space of a mining enterprise. We will describe possible approaches to the solution of data protection problems in the presented information field.

3.2. Providing of Transactions Reliability in Common Information Space of a Mining Enterprise by Means of Blockchain

The present subsection presents a new approach directed on remote quality control of exploitation of service machines in the conditions of a mining enterprise. This approach would allow us to define facts of unfair exploitation of service machines and to carry out the authentic transfer of the corresponding data in the conditions of complex terrain. For this purpose, we offer to equip each technological unit with an onboard recorder that records all transactions made by the technological unit.
The term “transactions” is used to refer to any significant event which has occurred to technological units in the course of their work. We will select two types of such events: exceptional situations and work situations. The situations which do not occur in a regular environment of a technological unit are referred to as exclusive situations. Work situations represent the completion of any technological operation with certain parameters. If in the course of completion of the given operation, the registered parameters go beyond admissible limits, such a situation is considered exclusive.
The technological process of excavation in the conditions of open-cut mining is characterized by cyclic consecutive change of working conditions of a mining machine in the following order: excavating/digging (1); transportation to unloading (2); unloading (3); transportation to excavating/digging (4). The technological processes for a dragline and service support transport are presented by means of connected graphs in Figure 5a,b accordingly. Each point of the connected graph represents a certain condition of the technological process. The interconnection between the conditions is presented by repeating transitions between the points of the state graph which characterizes the technological condition of draglines and service support transport. The state graph describes the technological process of excavation and contains the directed graph on points 1-2-3-4-1. The “Idling” condition is connected by edges to all other conditions as the forced idle time of a mining machine is possible at any moment.
Figure 5. State graph: (a) of a transport machine; (b) of a dragline.
Table 1 and Table 2 show the basic transactions for support service vehicles and draglines accordingly.
Table 1. Transactions for support service vehicles.
Table 2. Transactions for draglines.
To store the transactions reliably, we will use a distributed ledger of the blockchain type. Various stationary objects of the infrastructure and mobile technological units will act as nodes of the corresponding network. Mobile technological units refer to various support service vehicles, maintenance machines, fuel-servicing trucks. Thus, the given blockchain is private. It covers the production of a specific enterprise or can be extended to a group of the enterprises territorially removed from each other but linked by a uniform telecommunication network.
The coordination of the ledger content will be carried out by the blockchain principle. Each node connects to the given process at the connection with any next nodes. Such an approach will allow each node of the network to have an authentic copy of the ledger even in the absence of reliable communication channels in separate sites of the network.
As an algorithm of consensus achievement, we offer to use a classical Proof-of-work algorithm. It is generally suitable irrespective of the features of a certain mine or a group of mines. An alternative variant is a newer Proof-of-authority algorithm. It ensures the essentially smaller power consumption in comparison with Proof-of-work. However, Proof-of-authority cannot be used within the limits of our problem in all cases. It is highly suitable in those mines which differ with greater connectivity of the network of the service support units. By this the following is meant. Even if the problems with connection are present on separate sites of the network, nevertheless the network does not break up into the isolated fragments. Moreover, if this network is considered as a graph, the given graph does not contain bridges. If the features of a certain mine do not guarantee the fulfillment of this feature, Proof-of-work should be used. However, the given property usually stays invariable during the long production time of the mine; therefore, a certain solution can be chosen with a view on long-term use. Naturally, for several mines connected in one network, one common decision should be chosen.
Figure 6 illustrates the process of the coordination of the distributed ledger content.
Figure 6. The coordination of the distributed ledger content.
The dispatching node has a special function here. It carries out the analysis of the transactions made by technological units and the decision-making on the management of the technological process. Around the dispatching node, a zone of confident reception is selected. All nodes which are in the given zone can co-operate with each other directly. The data flows of such nodes are marked by blue color. The nodes outside of the zone of confident reception transfer information through the intermediary nodes. Corresponding data flows are marked by red color. The lack of communication line between close located nodes corresponds to a situation when the connection is lost because of features of the terrain of the area.
It is necessary to note, that the given diagram contains one potential problem. It is designed for a fully connected network that does not contain isolated nodes. However, the features of the mining production process described in Section 3.1 prove that such nodes are possible. In this case, the method of the coordination of the register content should be specified.
We suggest solving the given problem by means of organizational measures. Generally, the time of the complete lack of connection of a separate technological unit does not exceed several minutes. Therefore, it is enough to reduce the time ranges between the movement of mobile units when it is possible. First of all, it is a question of repair transport. And those service support units which could usually lose connection for some time are now always accessible by any other service support unit. The requirement to maximum time during which the service support unit can remain without connection is a limitation of our approach. However, this requirement is met at all mines known to us; therefore, the given simple solution is effective.
Now, let us describe the format of transactions in more detail. They include identification data and the data produced by sensors of technological units. These data depend on the type of a technological unit.
The most numerous type of technological units on a mining enterprise is truck transport. It ensures the delivery of mined rock from the extraction site to the loading site. A large number of transport machines allow one to ensure uninterrupted operation of the given process. The monitors and sensors of the truck transport allow one to read the following basic types of data: current co-ordinates, current velocity, the mass of transported cargo, fuel residual, the pressure in tires, angles of inclination and acceleration, the control of the gear shifter.
The scarifying of hard rock is carried out by means of draglines. For the given type of technological units, first of all, it is necessary to monitor the following data: current co-ordinates, bearing angle, angles of orientation and acceleration, angular velocity of the platform, current technological condition, the type and quantity of the executed duty cycles, time characteristics of cycles. Mainly, on the basis of the values of linear acceleration, angular velocity and spatial co-ordinates, the exploitation quality of an excavator is monitored, and the duty cycles, productivity, the current condition, and time characteristics are calculated.
Figure 7 shows an example of the formation of a block of transactions at the level of a separate technological unit.
Figure 7. Formation of a block of transactions.

3.3. Providing of Authentication of Sensor Data Produced by Support Service Vehicles, by Means of Digital Watermarking

As an additional level of protection, in the present research, it is offered to use digital watermarks. The purpose is the binding of the data produced by technological units to the source of its origin.
Earlier, we presented the data structure describing the format of transactions registered in the system. The elements of the data entering into this structure could be divided into two types: non-modifiable and modifiable. The elements of the data of the first type cannot be changed, they are produced automatically and irrespective of external factors. They include the record identifier, the machine identifier, etc. The data elements of the second type represent indications of various sensors. They could be altered; however, these alterations should be reversible.
We propose to use the modifiable data elements for the embedding of reversible digital watermarks. The corresponding model is presented in Figure 8.
Figure 8. The model of digital watermark embedding into the data produced by technological units.
In the given model, a digital watermark is formed on the basis of non-modifiable data elements and a confidential key. They are combined using a simple mixing transformation, then the result of the combination is hashed. The received hash-code is also a digital watermark. It is embedded in modifiable data elements using a reversible function of embedding.
The verification of digital watermarks is carried out on the side of the dispatcher after the technological units completed the work. It is advisable to use this approach when a small number of units of equipment participate in the technological process. In this case, digital watermarks would be an additional way of protection of the generated distributed register from attempts to compromise it.

4. Computing Experiment and the Discussion of the Results

4.1. Purpose of the Experiment

To implement the offered solutions in a mining enterprise, it is required to equip support service units with additional hardware modules which implement functions of preprocessing and protection of transmitted data. As a matter of fact, it is a question of IoT-system development. In this connection, it is necessary to pay considerable attention to questions of energy-efficiency. For the Internet of Things systems, the decrease of power consumption is one of the key problems that many researchers are engaged with. For example, in [40] the effect of enciphering algorithms on synchronization and energy consumption in IoT applications is investigated. Similar questions are discussed in [41] as well.
Among the offered solutions, the most resource-consuming is blockchain technology which is based on repeated execution of fulfillment of hashing operation. The digital watermark embedding is simpler in terms of computing and does not require a considerable quantity of operations. Therefore, the given section is devoted to the computing experiments connected to blockchain technology.
The purpose of the given experiments consists in the determination of the possibility of technical realization of the approach described in Section 3.2 and based on blockchain. For this purpose, we study the hardware capabilities of modern microprocessor control units (MCU) on the basis of which modern intelligent electronic devices are built, such as sensor nodes, data acquisition systems and data processing systems, and control systems.
The software architecture of intelligent devices has the following feature. The control microprogram functions in a multithreading or pseudo-multithreading mode organized by operating systems or specialized libraries (continuations, coroutines, finite state machines, Duff’s devices). Such an architecture solution is connected to the necessity of constant multithreading task execution and processing of great volumes of data.
MCU should possess computing capacity sufficient for the work of an operating system and software. In the studied case, the key task is to calculate the hash-values according to the SHA-256 algorithm. The acceptable time of fulfillment of the given task should not exceed 1 ms. The specified time is explained by the feature of multithreading (pseudo-multithreading) program operation.
The task planner in the majority of operating systems for MCU functions with the discreteness of 1 ms.
If the time of hash-value calculation exceeds 1 ms, the operating system task planner would have to interrupt (displace) the current calculation operation, carry out the next task and after its completion to return to the initial task. The features of the hashing algorithm realization would cause the increased load of operating memory in MCU, and in the worst case, the data can be garbled.

4.2. Organization of the Experiment

The experiment on research of hardware speed is organized as follows.
First, two common MCU architecture are chosen:
  • ARM Cortex;
  • Atmel AVR 8.
The given architectures are widely popular with the developers of radio equipment. MCU of the Atmel AVR architecture are used in simple radio-electronic devices. They have an 8-bit core and are used to carry out simple tasks that do not require numerous calculations. Also, they are often used as a co-processor.
ARM Cortex architecture is in great demand with developers thanks to a wide range of accessible families and the lineup differing with functional, performance and price. ST microelectronics Company produces 12 basic families of microcontrollers with ARM architecture (STM32L0/L1/L4/L5/F0/F1/F2/F3/F2/F4/F7/H7).
Secondly, eight models of MCU were chosen that have the specified architecture.
Cortex-M architecture (manufactured by ST microelectronics):
  • STM32F722ZE,
  • STM32F407VET6,
  • STM32F303CCT6,
  • STM32F103C8T6,
  • STM32F100RBT6B,
  • STM32F051R8T6,
  • STM32F030F4P6.
AVR 8 architecture (manufactured by Microchip):
  • Xmega32A4U;
  • AtMega328.
The nomenclature of the tested MCU is determined by the features which are inherent in each series. The microcontrollers of series L0, L1, L4 and L5 have small energy-consumption and are focused on application in the systems with high requirements to energy-saving, therefore, were not examined. MCU of series F0, F1, F3, F4 and F7 have sufficient performance and functionality, good operating characteristics as well as good availability. These MCU families are optimum for application in data-processing systems and the development of control systems. Series F2 and H7 are superfluous for the examined problem.
Further, for the immediate experiment, the integrated development environment and libraries of cryptographic functions corresponding to them were chosen:
  • IAR Embedded Workbench for ARM, libraries STM32 STM32CryptographicV3.1.1 / STM32 CryptographicV3.0.0;
  • AVR Studio, AVR-Crypto-Lib library.
At last, the volume of hash information is accepted as equal to 1500 bytes, considering the minimum length of a Jumbo frame for the Ethernet network (standard IEEE 802.3).
The procedure of the experiment included the following steps.
Step 1. 
Project adjustment, installation of necessary libraries, insertion of the unified tested code. Installation of various strategies (levels) of the program optimization (optimization on velocity, optimization on the size of the controlling microprogram).
Step 2. 
Adjustment of the clock system for the maximum operating frequency for each model of the microcontroller.
Step 3. 
Adjustment of hardware blocks for calculation of execution time of the SHA-256 hash algorithm:
  • for STM32 microcontroller, a DWT counter (Data Watchpoint and Trace unit) was used, as well as a TIM2timer, and input-output ports;
  • AVR microcontrollers were tested in a simulator (the integrated development environment AVR Studio rather than IAR Embedded Workbench allows to precisely evaluate the execution time of the microprogram).
Step 4. 
Program start through the programmator:
  • STlink-v3 debugger for STM32microcontroller;
  • a simulator for an AVR microcontroller.
Step 5. 
Data collection of execution time of the program:
  • for microcontrollers STM32F407VET6, STM32F303CCT6, STM32F103C8T6, STM32F100RBT6B directly from the DWT counter;
  • for STM32F051R8T6 microcontroller directly from TIM2 timer-counter;
  • for STM32F030F4P6 microcontroller indirectly by means of DS Logic logic analyzer (through gauging of the installation time and logic state reset of input-output ports);
  • for single-crystal AVR microcomputer by means of the simulator.
The received results are shown in Table 3, Table 4 and Table 5.
Table 3. Results of testing of Cortex-M MCU architecture with STM32 CryptographicV3.0.0 library (SHA-256 algorithm).
Table 4. Results of the test of MCU with Cortex-M architecture with the STM32 CryptographicV3.1.1 library (SHA-256 algorithm).
Table 5. Results of the test of MCU with AVR 8 architecture (SHA-256 algorithm).
The analysis of the results of the carried out experiment allows us to draw the following conclusions.
  • The efficiency of the libraries CryptographicV3.0.0 and CryptographicV3.1.1 differs in productivity on average by a factor of 1.5, except MCU STM32F407. CryptographicV3.0.0 library has the best results for MCU STM32F407 with optimization on velocity.
  • CryptographicV3.1.1 library has considerably better optimization on velocity and the size of the program than CryptographicV3.0.0 with the MCU of younger families (F0, F1, F3).
  • The productivity gain at different strategies of program optimization starts to be developed with MCU STM32F103. For this MCU, the optimization on velocity and the size of the microprogram allows us to raise the performance by a factor of 1.3. With STM32F303MCU, the optimization strategy on velocity gives a considerable gain of performance (by a factor of 1.83), thus the size of the program on average increases only by 7–10%.
  • The conditions of optimum speed meet the requirements of MCU starting with the families M32F3, STM32F4 and higher.
  • MCU with AVR 8 architecture does not meet the set requirements of the performance.
Along with the hash function in the blockchain, the digital signature algorithms are used. They are essentially less often addressed; however, they are enough resource-consuming themselves. Therefore, it was expedient to evaluate the operation speed of such algorithms as well. For experiments we chose the RSA and ECDSA algorithms, presented in STM32 CryptoLib library of v3.0.0 version and STM32 CryptoLib library of v3.11 version. The experiment was carried out on three MCU models which showed the greatest efficiency in the previous experiment: STM32F722, STM32F407, STM32F303.
The results received for the RSA algorithm, are brought in Table 6 and Table 7.
Table 6. Results of testing of Cortex-M MCU architecture with STM32 CryptographicV3.0.0 library (RSA algorithm).
Table 7. Results of the test of MCU with Cortex-M architecture with the STM32 CryptographicV3.1.1 library (RSA algorithm).
As a result of the experiment, the following is determined:
  • RSA algorithm is labor-consuming enough and requires a considerable amount of processor time.
  • The feature of the RSA algorithm realization in the CryptoLib library does not allow dividing the signing process into several stages.
Thus, RSA has proved to be a slow algorithm that insufficiently effectively functions on middle-level MCU STM32.
The next experiment was devoted to the ECDSA algorithm. The results received for the given algorithm, are brought in Table 8 and Table 9.
Table 8. Results of testing of Cortex-M MCU architecture with STM32 CryptographicV3.0.0 library (ECDSA algorithm).
Table 9. Results of the test of MCU with Cortex-M architecture with the STM32 CryptographicV3.1.1 library (ECDSA algorithm).
As a result of the experiment, the following is determined:
  • The run time of the given algorithm is lower than the RSA has; however, the productivity gain is not proportional, the productivity gain fluctuates in the range from 5 to 12%.
  • The feature of realization of the ECDSA algorithm in the CryptoLib library allows dividing the signing process into several stages.
Therefore, out of the two examined options, the ECDSA algorithm is preferable.
Thus, MCU of series STM32F303 and STM32F4 possess the necessary performance to build on their basis the hardware modules realizing the blockchain-based approach offered in Section 3.2. The given approach allows us to ensure the reliability of transactions in the common information space of a mining enterprise in the conditions of possible loss of connection between the control center and separate service support units.
Practical realization of the given approach and its implementation as a part of common information space of a mining enterprise will be made during further studies.

5. Conclusions

The given paper is devoted to the problem of providing the reliability of data on the production course on a mining enterprise in the conditions of possible loss of connection between the control center and separate service support units. This is a part of a larger-scale task of the development of the common information space of a mining enterprise. To solve the given task, we offered several new approaches to the protection of the data generated by service support machines. Our first approach ensures the reliability of transactions in the common information space of a mining enterprise by means of blockchain technology. We used private blockchain with the consensus algorithm of the Proof-of-work type. Besides, we have presented the case when it is expedient to use the Proof-of-authority type of algorithm differing by higher energy-efficiency. To describe the actions made by support service machines, we used the concept of a transaction. We defined the format of a transaction and formed a list of transactions for two basic types of service support machines. A limitation of the given approach is the short duration of connection loss between service support units. Our second approach ensures the authentication of the sensor data developed by service support machines by means of digital watermarks. This approach supplements the blockchain and ensures additional data binding to the conditions of their generating. We introduced the division of data elements as a part of each transaction on edited and not edited ones. We have suggested forming a digital watermark on the basis of not edited data elements and a secret key and embedding it into the edited data elements. At last, we conducted a computing experiment with common models of microcontrollers. During the given experiment, we implemented the basic cryptographic algorithms necessary for the building of the blockchain and evaluated the efficiency of their work when using various strategies of optimization. The results of the experiment confirmed the realizability of our approaches.
The further work will consist in the development of the offered approaches and their implementation in mining enterprises. Besides, the results of the conducted research can be used for data protection in other areas. For example, a promising direction is the protection of transactions in vehicular ad-hoc networks.

Author Contributions

Conceptualization, O.E.; Methodology, O.E.; Software, Y.M.; Visualization, Y.M.; Writing—original draft, O.E. and Y.M.; Writing—review & editing, O.E. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Russian Science Foundation, grant number 19-71-00106.

Acknowledgments

We are very grateful to the anonymous referees for their constructive comments and helpful suggestions to improve the quality of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. International Energy Agency. IEA Coal Information 2018; International Energy Agency: Paris, France, 2018; ISBN 9789264301221. [Google Scholar]
  2. International Energy Agency. Energy Prices & Taxes 2018; International Energy Agency: Paris, France, 2018. [Google Scholar]
  3. Dudley, B. BP Statistical Review of World Energy 2018; BP Statistical Review: London, UK, 2018. [Google Scholar]
  4. National Research Council. Coal: Research and Development to Support National Energy Policy; National Academies Press: Washington, DC, USA, 2007; ISBN 0309110238. [Google Scholar]
  5. Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 10 May 2020).
  6. Fernández-Caramés, T.M.; Fraga-Lamas, P. A review on the use of blockchain for the internet of things. IEEE Access 2018, 6, 32979–33001. [Google Scholar] [CrossRef]
  7. Yu, B.; Wright, J.; Nepal, S.; Zhu, L.; Liu, J.; Ranjan, R. IoTChain: Establishing trust in the internet of things ecosystem using blockchain. IEEE Cloud Comput. 2018, 5, 12–23. [Google Scholar] [CrossRef]
  8. Fernández-Caramés, T.M.; Fraga-Lamas, P. A review on the application of blockchain to the next generation of cybersecure industry 4.0 smart factories. IEEE Access 2019, 7, 45201–45218. [Google Scholar] [CrossRef]
  9. Zhu, X.; Badr, Y.; Pacheco, J.; Hariri, S. Autonomic identity framework for the internet of things. In Proceedings of the 2017 International Conference on Cloud and Autonomic Computing (ICCAC), Tucson, AZ, USA, 19 May 2017; pp. 69–79. [Google Scholar]
  10. Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and its role in the internet of things. In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland, 17 August 2012; pp. 13–16. [Google Scholar]
  11. Qi, Q.; Tao, F. Digital twin and big data towards smart manufacturing and industry 4.0: 360 degree comparison. IEEE Access 2018, 6, 3585–3593. [Google Scholar] [CrossRef]
  12. Wohlgemuth, W.; Triebfürst, G. ARVIKA: Augmented reality for development, production and service. In Proceedings of the DARE 2000 on Designing Augmented Reality Environments, Elsinore, Denmark, 12–14 April 2000; pp. 151–152. [Google Scholar]
  13. Blanco-Novoa, O.; Fernández-Caramés, T.M.; Fraga-Lamas, P.; Vilar-Montesinos, M.A. A practical evaluation of commercial industrial augmented reality systems in an industry 4.0 shipyard. IEEE Access 2018, 6, 8201–8218. [Google Scholar] [CrossRef]
  14. Fernández-Caramés, T.M.; Fraga-Lamas, P.; Suárez-Albela, M.; Vilar-Montesinos, M. A fog computing and cloudlet based augmented reality system for the industry 4.0 shipyard. Sensors 2018, 18, 1798. [Google Scholar] [CrossRef]
  15. Fernández-Caramés, T.M.; Fraga-Lamas, P.; Suárez-Albela, M.; Díaz-Bouza, M.A. A fog computing based cyber-physical system for the automation of pipe-related tasks in the Industry 4.0 shipyard. Sensors 2018, 18, 1961. [Google Scholar] [CrossRef] [PubMed]
  16. Robla-Gómez, S.; Becerra, V.M.; Llata, J.R.; Gonzalez-Sarabia, E.; Torre-Ferrero, C.; Perez-Oria, J. Working together: A review on safe human-robot collaboration in industrial environments. IEEE Access 2017, 5, 26754–26773. [Google Scholar] [CrossRef]
  17. Saberi, S.; Kouhizadeh, M.; Sarkis, J.; Shen, L. Blockchain technology and its relationships to sustainable supply chain management. Int. J. Prod. Res. 2019, 57, 2117–2135. [Google Scholar] [CrossRef]
  18. Fu, Y.; Zhu, J. Big production enterprise supply chain endogenous risk management based on blockchain. IEEE Access 2019, 7, 15310–15319. [Google Scholar] [CrossRef]
  19. Kshetri, N. 1 Blockchain’s roles in meeting key supply chain management objectives. Int. J. Inf. Manag. 2018, 39, 80–89. [Google Scholar] [CrossRef]
  20. Li, M.; Hu, D.; Lal, C.; Conti, M.; Zhang, Z. Blockchain-enabled secure energy trading with verifiable fairness in industrial internet of things. IEEE Trans. Ind. Inform. in press. [CrossRef]
  21. Lu, H.; Huang, K.; Azimi, M.; Guo, L. Blockchain technology in the oil and gas industry: A review of applications, opportunities, challenges, and risks. IEEE Access 2019, 7, 41426–41444. [Google Scholar] [CrossRef]
  22. Pan, J.; Wang, J.; Hester, A.; AlQerm, I.; Liu, Y.; Zhao, Y. EdgeChain: An edge-IoT framework and prototype based on blockchain and smart contracts. IEEE Internet Things J. 2018, 6, 4719–4732. [Google Scholar] [CrossRef]
  23. Seitz, A.; Henze, D.; Miehle, D.; Bruegge, B.; Nickles, J.; Sauer, M. Fog computing as enabler for blockchain-based IIoT app marketplaces-A case study. In Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, Valencia, Spain, 15–18 October 2018; pp. 182–188. [Google Scholar]
  24. Cebe, M.; Erdin, E.; Akkaya, K.; Aksu, H.; Uluagac, S. Block4Forensic: An integrated lightweight blockchain framework for forensics applications of connected vehicles. IEEE Commun. Mag. 2018, 56, 50–57. [Google Scholar] [CrossRef]
  25. Rathee, G.; Sharma, A.; Iqbal, R.; Aloqaily, M.; Jaglan, N.; Kumar, R. A blockchain framework for securing connected and autonomous vehicles. Sensors 2019, 19, 3165. [Google Scholar] [CrossRef]
  26. Qian, Y.; Jiang, Y.; Hu, L.; Hossain, M.S.; Alrashoud, M.; Al-Hammadi, M. Blockchain-based privacy-aware content caching in cognitive internet of vehicles. IEEE Netw. 2020, 34, 46–51. [Google Scholar] [CrossRef]
  27. Wang, C.; Bai, Y.; Mo, X. Data secure transmission model based on compressed sensing and digital watermarking technology. Wuhan Univ. J. Nat. Sci. 2014, 19, 505–511. [Google Scholar] [CrossRef]
  28. Chong, S.; Skalka, C.; Vaughan, J.A. Self-identifying data for fair use. J. Data Inf. Qual. 2015, 5, 1–30. [Google Scholar] [CrossRef]
  29. Panah, A.S.; van Schyndel, R.; Sellis, T.; Bertino, E. In the shadows we trust: A secure aggregation tolerant watermark for data streams. In Proceedings of the 2015 IEEE 16th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Boston, MA, USA, 14–17 June 2015; pp. 1–9. [Google Scholar]
  30. Lipuš, B.; Žalik, B. Robust watermarking of airborne LiDAR data. Multimed. Tools Appl. 2018, 77, 29077–29097. [Google Scholar] [CrossRef]
  31. Rubio-Hernan, J.; De Cicco, L.; Garcia-Alfaro, J. Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems. Trans. Emerg. Telecommun. Technol. 2018, 29, e3209. [Google Scholar] [CrossRef]
  32. Ferdowsi, A.; Saad, W. Deep learning for signal authentication and security in massive internet-of-things systems. IEEE Trans. Commun. 2018, 67, 1371–1387. [Google Scholar] [CrossRef]
  33. Wang, B.; Kong, W.; Li, W.; Xiong, N.N. A dual-chaining watermark scheme for data integrity protection in Internet of Things. CMC Comput. Mater. Contin. 2019, 58, 679–695. [Google Scholar] [CrossRef]
  34. Evsutin, O.; Meshcheryakov, R.; Tolmachev, V.; Iskhakov, A.; Iskhakova, A. Algorithm for embedding digital watermarks in wireless sensor networks data with control of embedding distortions. In Proceedings of the International Conference on Distributed Computer and Communication Networks, Moscow, Russia, 23–27 September 2019; pp. 574–585. [Google Scholar]
  35. Zhaofeng, M.; Weihua, H.; Hongmin, G. A new blockchain-based trusted DRM scheme for built-in content protection. J. Image Video Proc. 2018, 2018, 91. [Google Scholar] [CrossRef]
  36. Zhao, B.; Fang, L.; Zhang, H.; Ge, C.; Meng, W.; Liu, L.; Su, C. Y-DWMS: A digital watermark management system based on smart contracts. Sensors 2019, 19, 3091. [Google Scholar] [CrossRef] [PubMed]
  37. Xu, Y.; Zhang, C.; Zeng, Q.; Wang, G.; Ren, J.; Zhang, Y. Blockchain-enabled accountability mechanism against information leakage in vertical industry services. IEEE Trans. Netw. Sci. Eng. in press. [CrossRef]
  38. Patterson, S.R.; Kozan, E.; Hyland, P. Energy efficient scheduling of open-pit coal mine trucks. Eur. J. Oper. Res. 2017, 262, 759–770. [Google Scholar] [CrossRef]
  39. Department of Resources, Energy and Tourism, Australian Government. Analyses of Diesel Use for Mine Haul and Transport Operations; Australian Government: Canberra, Australia, 2013. [Google Scholar]
  40. Maitra, S.; Yelamarthi, K. Rapidly deployable IoT architecture with data security: Implementation and experimental evaluation. Sensors 2019, 19, 2484. [Google Scholar] [CrossRef]
  41. Satamraju, K.P. Proof of concept of scalable integration of internet of things and blockchain in healthcare. Sensors 2020, 20, 1389. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.