A Secure Trajectory Planning Method for Connected Autonomous Vehicles at Mining Site

: Recently, with the assistance of 5G networks and the Internet of Things, specialized applications of autonomous driving to mining sites have been explored, with the goal of realizing the unmanned operation of mining systems and enhancing the safety of the mining industry. After receiving the loading task, the autonomous driving system will generate a feasible trajectory for the mining truck. It requires that the trajectory be generated in advanced within a limited-time high-latency network. In addition, the secure trajectory planning for mining sites involves factors in the complex environment and an unstable network. Thus, a secure trajectory planning method for autonomous trucks at mining sites is proposed. It simpliﬁes the planning by decoupling the planning into front-end path searching and back-end trajectory generation. First, the planner enhances the Hybrid A* search algorithm to ﬁnd the hauling path within the boundary of the mining site, and then, it post-processes the path with a well-designed symmetric optimization-based method. Then, considering the interaction with other autonomous trucks, a topology-guided search method for secure decision making is proposed, considering the possibility of cybersecurity. The proposed method was validated in real scenarios of the mining environment. The results verify that the planner can generate the secure trajectory under network delay 2.0 s conditions.


Introduction
Recently, autonomous vehicles have been applied for transporting ore at mining sites [1][2][3].The aim is to improve productivity by decreasing labor costs and accidents and increasing working time.Trajectory planning is the core technology of autonomous vehicles.Since the haul roads at mining sites have typical characteristics of a large curvature and large planning area, which bring network latency to the planning module, it is of great significance to investigate a trajectory planning method suitable for the off-road environment of mining sites, as shown in Figure 1.
Symmetry 2023, 15, x FOR PEER REVIEW 2 of 21 interpolation using quartic (degree 4) B-spline curves, which relaxed the curvature change rate.Usami et al. [11] introduced a two-lane path planning algorithm for autonomous vehicles in a two-and-a-half-dimensional environment.The method extended path planning to two-and-a-half dimensions and designed cross-slopes in high-curvature regions of the path.The cross-slopes guaranteed that vehicles would not need to slow down in high-curvature regions.Zhang et al. [12] proposed a hybrid trajectory planning method, including path planning and speed planning, in a highly constrained environment.For path planning, the method employed a heuristic A* graph search algorithm [13] to obtain the global path and then introduced a multiple-stage sampling algorithm for optimization.For speed planning, the method utilized an optimizationbased method to construct the speed profile.In addition, numerous methods have been proposed for autonomous parking, which conforms to the truck operation at mining sites.Dolgov et al. [13] proposed a practical search method for autonomous driving.The first stage generated the global path using a heuristic search algorithm with non-holonomic constraints; the second stage used conjugate gradient (CG) descent to post-process the global path.Chen and Wu [14] introduced a trajectory planning method by solving an optimal control problem.The Gaussian pseudo-spectral method was applied to obtain the parking trajectory.By utilizing a homotopic method, the obstacle avoidance was transformed into constraints, and the solution was set as the initial guess for offline planning.
Figure 1.The network flow of autonomous mining trucks at a mining site.
Oliveira et al. [15] proposed a sharpness-continuous Dubins-like planner for heavyduty vehicles, which replaced the clothoid segments to achieve sharpness continuity based on a smoother kinematic model [16].Due to the existence of obstacles at the mining site, it is difficult to generate the hauling path only using the curve-based method (e.g., Numerous studies have been conducted in the field of trajectory planning over the past few decades, including path planning [4] and motion planning [5,6].Two comprehensive surveys of these methods and strategies can be found in [7,8].However, most of them deal with autonomous driving for the on-road environment and cannot be adapted to a mining site with an unstable network. As for the secure trajectory planning at mining sites, Maekawa and Noda employed a path generation method for autonomous driving utilized in mining operations.The method applied Dijkstra's algorithm and cubic B-spline curves [9] to generate collision-free paths and then adjusted the control points of the B-spline curves for continuous curvature and safety.Similar to the previous study, Suzuki and Usami [10] proposed an algorithm for generating collision-free two-lane paths for autonomous driving at mining sites.It used the A* algorithm to generate the initial path and then performed interpolation using quartic (degree 4) B-spline curves, which relaxed the curvature change rate.Usami et al. [11] introduced a two-lane path planning algorithm for autonomous vehicles in a two-and-ahalf-dimensional environment.The method extended path planning to two-and-a-half dimensions and designed cross-slopes in high-curvature regions of the path.The crossslopes guaranteed that vehicles would not need to slow down in high-curvature regions.Zhang et al. [12] proposed a hybrid trajectory planning method, including path planning and speed planning, in a highly constrained environment.For path planning, the method employed a heuristic A* graph search algorithm [13] to obtain the global path and then introduced a multiple-stage sampling algorithm for optimization.For speed planning, the method utilized an optimization-based method to construct the speed profile.In addition, numerous methods have been proposed for autonomous parking, which conforms to the truck operation at mining sites.Dolgov et al. [13] proposed a practical search method for autonomous driving.The first stage generated the global path using a heuristic search algorithm with non-holonomic constraints; the second stage used conjugate gradient (CG) descent to post-process the global path.Chen and Wu [14] introduced a trajectory planning method by solving an optimal control problem.The Gaussian pseudo-spectral method was applied to obtain the parking trajectory.By utilizing a homotopic method, the obstacle avoidance was transformed into constraints, and the solution was set as the initial guess for offline planning.
Oliveira et al. [15] proposed a sharpness-continuous Dubins-like planner for heavyduty vehicles, which replaced the clothoid segments to achieve sharpness continuity based on a smoother kinematic model [16].Due to the existence of obstacles at the mining site, it is difficult to generate the hauling path only using the curve-based method (e.g., the continuous curvature steer) without resorting to the search method.To the best of our knowledge, most of the previous studies dealing with the trajectory planning problem at mining sites incurred high computational costs, and they tended to ignore the interactions between autonomous vehicles.Thus, an online trajectory planning method is proposed in this study for autonomous mining trucks (AMTs) at mining sites.It considers the interaction between AMTs based on a hierarchical structure consisting of two modules: path searching (front-end) and trajectory generation (back-end).The front-end finds the haul path while adhering to nonholonomic constraints.The back-end conducts the decision making and generates a feasible speed profile based on the global transport task and surrounding environment information.
The contributions of this study can be summarized as follows: (1) Considering the network condition of the mining site and AMTs, this study provided an improved Hybrid A* (IHA*) with a comprehensive evaluation function and dynamic expanding step.In addition, this study established a dynamic time interval and a symmetric switching corridor in the optimization, thereby enhancing the quality of the haul path and the success rate of finding solutions.(2) A topology-guided maneuver decision-making algorithm was proposed for the secure planning under cyberattack, which enables maintaining a safe headway with other AMTs and find the maneuver sequence in a cheap way.Within a limited distance, the nonlinear programming (NLP) method is able to minimize the arriving time and obtain the speed profile based on the maneuver sequence.
The rest of this study is organized as follows.Section 2 presents the problem description.Section 3 provides an IHA* algorithm and the optimization-based method for post-processing the haul path.Section 4 illustrates the decision-making process and the generation of speed profile.Last, Section 5 shows the experiment results, and Section 6 concludes this study.

Secure Trajectory Planning Problem
Figures 1 and 2 depict the workflow of AMTs, which arrive at the reporting point and receive their loading tasks from the cloud platform.The cloud platform specifies the loading task according to the operating state of the mining transportation system.If the network has latency or cybersecurity, the planning module may fail to generate a feasible trajectory before the AMT reaches the entrance of the loading area.In such situations, the AMT will stop and wait, and the engine will idle.It is only when a planned trajectory is available that the AMT will accelerate from zero, which consumes considerable fuel and decreases the operation efficiency.Figure 2a provides an illustration of a haul road at an actual mining site, which serves as the study scenario to explore the trajectory planning problem.The mining areas and haul roads are depicted in gray and yellow, respectively, with a width of 400 m and a length of 600 m. success rate of finding solutions.(2) A topology-guided maneuver decision-making algorithm was proposed for the secure planning under cyberattack, which enables maintaining a safe headway with other AMTs and find the maneuver sequence in a cheap way.Within a limited distance, the nonlinear programming (NLP) method is able to minimize the arriving time and obtain the speed profile based on the maneuver sequence.The rest of this study is organized as follows.Section 2 presents the problem description.Section 3 provides an IHA* algorithm and the optimization-based method for post-processing the haul path.Section 4 illustrates the decision-making process and the generation of speed profile.Last, Section 5 shows the experiment results, and Section 6 concludes this study.

Secure Trajectory Planning Problem
Figures 1 and 2 depict the workflow of AMTs, which arrive at the reporting point and receive their loading tasks from the cloud platform.The cloud platform specifies the loading task according to the operating state of the mining transportation system.If the network has latency or cybersecurity, the planning module may fail to generate a feasible trajectory before the AMT reaches the entrance of the loading area.In such situations, the AMT will stop and wait, and the engine will idle.It is only when a planned trajectory is available that the AMT will accelerate from zero, which consumes considerable fuel and decreases the operation efficiency.Figure 2a provides an illustration of a haul road at an actual mining site, which serves as the study scenario to explore the trajectory planning problem.The mining areas and haul roads are depicted in gray and yellow, respectively, with a width of 400 m and a length of 600 m.Compared to path planning in a public road scenario, path planning in a mining site scenario presents several distinct challenges: (1) the obstacles at mining site are irregular, with some areas being vast while others are narrow; (2) the minimum turning radius of the AMT is large, and the planner is required to generate a smoother path than that on public roads; (3) the large planning area results in much longer paths, which require significant computational effort; (4) the planner should be capable of interacting with other AMTs to avoid collisions, especially in the event of a cyberattack.

Vehicle Kinematic Modeling
Table 1 presents the main parameters of the dump truck.The dynamic model for the truck can be simplified based on the three-degree-of-freedom model.However, compared to the passenger car, it is difficult to calibrate and validate the model for the following reasons: (1) there is no dedicated testbed for dump trucks to accurately estimate their Compared to path planning in a public road scenario, path planning in a mining site scenario presents several distinct challenges: (1) the obstacles at mining site are irregular, with some areas being vast while others are narrow; (2) the minimum turning radius of the AMT is large, and the planner is required to generate a smoother path than that on public roads; (3) the large planning area results in much longer paths, which require significant computational effort; (4) the planner should be capable of interacting with other AMTs to avoid collisions, especially in the event of a cyberattack.

Vehicle Kinematic Modeling
Table 1 presents the main parameters of the dump truck.The dynamic model for the truck can be simplified based on the three-degree-of-freedom model.However, compared to the passenger car, it is difficult to calibrate and validate the model for the following reasons: (1) there is no dedicated testbed for dump trucks to accurately estimate their inertia; (2) due to significant load variation and tire wear, it is difficult to estimate the cornering stiffness.Moreover, due to the limitation of road curvature at mining site, the speed of trucks is limited to low values.Thus, the kinematic motion model [17] is suitable to be used in this study, which is formulated as shown below.
x and .
y denote the derivatives of central point (x, y) of the vehicle, respectively; v and a denote the velocity and acceleration, respectively; and θ and δ denote the orientation angle and steering angle, respectively.

Generation of Path
The method for generating the haul path is introduced in this section.Given the boundary information, the position, and the orientation of the loading points, the planner initially generates an initial path.To ensure smoothness and completeness, the path is then converted into a trajectory and refined using an optimization-based method, which minimizes the penalties related to travel distance, smoothness, and collision cost.

Secure Path Generation
Due to the large planning area of the mining site, previous search algorithms are unable to meet real-time requirements with a short expansion step.If the step is too large, the algorithms may become trapped in a narrow planning area because they cannot generate a safe sub-node using the defined motion primitives.
To generate a safe path, the potential field of the planning space is computed by the Voronoi field [18] based on the boundary information.Then, a heuristic searching algorithm is employed to search the path between the start position and goal position [13].

Comprehensive Evaluation Function
The evaluation function is defined by a linear combination of the trajectory cost function g(n), heuristic function h(n), and obstacle function o(n): g(n) denotes the cost of the path from the start position to node n, where n p refers to the parent node of n, and d step (n) is the expanding distance [12] for generating the next node candidates.The parameter α is the heuristic factor, which determines the weight of the heuristic function.A small α can result in a heavy computation burden during the search process, while a large α can accelerate the searching process by exploring the nodes close to the goal.However, an excessively large α may lead to longer path lengths.To strike a balance between computation efficiency and optimality results in the search process, the heuristic factor α is assigned a constant value of 1.1 based on simulation experiments.The heuristic function h(n) denotes the cost of the path from node n to the goal, which is defined as follows: where h RS denotes the length of the Reeds-Shepp (RS) curve from the current node to the goal.It considers the kinematic constraints by setting the maximum curvature in the RS curve.The essential reason for adopting the RS model rather than the continuous curvature steer method is that the RS model can achieve higher computational efficiency and the shortest path length, which can reflect the heuristic value more accurately [19].
Compared to the conventional Hybrid A*, IHA* removes the heuristic function related to the path length of A*, specifically, the holonomic-with-obstacles path [20].This decision is based on the complex mining environment and truck-shovel operations, where loading positions and road boundaries may change in real time.The planner recalculates the path length using A* for each task.The obstacle function o(n) is defined as follows: The obstacle function evaluates the cost from node n to the closest obstacle.d thr denotes the threshold of obstacle clearance and d obs (n) the shortest collision distance between node n and the closest obstacle.In this study, the shortest collision distance was directly obtained by the Voronoi field.

Dynamic Expanding Step
According to the distribution of obstacle in the planning area, IHA* adjusts the expanding step to find the search results.The expanding step, denoted as d step (n), for each node is dynamically adjusted based on the surrounding information.
where d dy is the dynamic expanding step, and d min and d max represent the minimum and maximum expanding steps, respectively.It should be noted that many previous studies determined the expanding step based on the truck's center of mass.While such an approach might be suitable for passage cars, it is less appropriate for dump trucks with their larger size, which can be up to four times wider than a passage car.In this case, each corner of the dump truck, such as the left, middle, and right, has a different relative distance to the boundary of the driving area or obstacles, as shown in Figure 3. where  mo x , mo y  , and mo step () dn represent different motion primitives (left, straight and right) and their corresponding expanding step sizes.In this study, the motion primitive with dobs(n) less than dlim will be abandoned according to engineering experience.This study introduces a bi-directional search strategy that expands simultaneously from both the endpoint to the starting point.The extension node serves as a sub-target point, and when the forward search is extended to this sub-target node, it connects the The larger the relative distance, the larger the expansion step size.Thus, this study employs a point mass model to explore three motion primitives based on the expanding steps at three different corners.This approach of using adaptive expansion step sizes enhances computational efficiency while ensuring the quality of the planned path.The state transition from point (x n , y n , θ n ) to (x n+1 , y n+1 , θ n+1 ) is defined as follows: where ∆x mo , ∆y mo , and d mo step (n) represent different motion primitives (left, straight and right) and their corresponding expanding step sizes.In this study, the motion primitive with d obs (n) less than d lim will be abandoned according to engineering experience.

Bi-Directional Search
This study introduces a bi-directional search strategy that expands simultaneously from both the endpoint to the starting point.The extension node serves as a sub-target point, and when the forward search is extended to this sub-target node, it connects the front and back paths.It should be noted that employing a greedy search strategy in reverse search can rapidly expand nodes toward the starting point due to the narrow nature of stopping endpoints.Consequently, the cost evaluation for sub-target nodes solely encompasses the trajectory cost function, as shown in Equation (3).

Secure Path Post-Processing
The raw path generated by IHA* can be suboptimal though it meets all constraints.There are several reasons to improve the path quality:

•
The discontinuities of the curvature profile could lead to jitters if directly provided to the low-level control module.

•
The relatively longer length of the raw path could result in increased fuel consumption.

•
Although IHA* avoids collision during expansion, the resulting path may be close to the boundary of the haul road.
Thus, post-processing is implemented using an optimization-based (OP) method to refine the path.The details of the OP method are described as follows: for the raw path defined by N points (p 0 , p 1 , . .., p N ), it is interpolated with a B-spline [9] and converted into a trajectory (s 0 , s 1 , . .., s N ) with the desired speed.Each trajectory point includes state variables (x, y, θ, v, ∆t) and control variables (a, δ), which can be obtained by the purepursuit [21] and constant velocity method [22].Therefore, at the beginning, the acceleration a is set as zero, and the time interval ∆t is set as a uniform value of 0.1 s.The steering angle δ for the i th point is calculated by: where l f is the front wheel length of the truck.Instead of using a fixed time interval during the refinement [23,24], the method adds the schedule of dynamic time allocation.In other words, the time intervals between two adjacent points differ from each other.This approach enhances the flexibility of the optimization method.The path generated and its corresponding control variables will be used as input for the OP method.

Optimization Function
The optimization variables z ∈ R 7N consist of vehicle states (x, y, θ, v, ∆t) and control variables (a, δ) at each step n.The overall objective function f total is defined as the sum of consistency, safety, dynamical feasibility, and optimality.
where f ref denotes the reference cost, and f c and f d denote the collision and control derivatives costs, respectively.ds denotes the cost of the path length.Additionally, w ref , w c , w d , and w s are the weights of the reference, collision, control derivatives and path length costs, respectively.The reference cost evaluates the difference between the raw path P* and the final haul path.Its function aims to maintain path consistency.The relative distance between P i and P * i is defined as follows: Different from an on-road environment, the mining site owns numerous irregular boundaries rather than polygonal obstacles.The boundary of the haul road cannot be represented by a specific shape.Thus, this study establishes a collision cost function as a soft constraint to guarantee the path safety: where Similarly, the control derivatives cost f d is formulated as: where u denotes the control variables {a, δ}, and ∆t i−1 is the time interval between the i−1th and ith path points.The trajectory is represented as a set of N discrete points set.The travel time t total of the optimized path is calculated as follows: By minimizing the derivatives of control variables, the smoothness and feasibility of the path can be significantly improved [25].The relative distance ∆s is defined as follows:

Nonholonomic Constraints
The trajectory must be generated while adhering to the nonholonomic constraints during optimization.Based on the kinematic model in Equation ( 1), the nonholonomic constraints are formulated as follows: .
where ∆t i denotes the time interval between i and i + 1, and u i represents the control variables (a, δ) at time i.It is important to ensure that the velocity along the trajectory does not exceed the maximum value v max defined by the global task.Additionally, the control variables and their change rates should be constrained within the permitted range to ensure dynamical feasibility: During the loading and unloading process, AMTs need to conduct backward maneuvers to reach specific positions and orientations.In the IHA* algorithm, the RS curve [26] is utilized to accelerate the search efficiency.The parking path is obtained by connecting the start and goal points with the RS curve, as shown in Figure 4.The AMT must decrease the speed to zero when switching gears at the switchingback point.According to the transportation rules of the mining site, reversing will be the last motion if the trajectory includes reverse motion.Thus, the kinematic constraints including corresponding velocity vsw and acceleration asw at the sw-th point (switchingback point) are defined as follows: The proposed optimization method resolved the switching point problem by constraining the control input and its change rate (i.e., steer and acceleration).In addition, the AMT can stop in the switching symmetric corridor and reverse flexibly in the narrow loading area with continuous curvature.The derived speed profile is used as the reference by the low-level control module.By solving Equation ( 10) numerically, collocation points representing the haul path can be derived.Although the generation of curves is constrained by the minimum turning radius, the curvature discontinuity is usually ignored in the expanding of the RS curve, which poses challenges to the control module.The actuators (e.g., steer and brake) of the dump truck are all hydraulically controlled, which leads to a large delay (about 2 s) from command sending to state response.Zhang [20] smoothed the forward driving and reverse driving path, respectively, which fixed the switching point at the original position.In such a case, the optimality of the path might be compromised [27].In this study, the planner sets up a corridor where the switching-back point can be adjusted to guarantee the continuous curvature and short path length.By referring to the minimum turning radius, the upper and lower bounds of the switching symmetric corridor can be defined: where (x s , y s ), (x g , y g ), and (x sw , y sw ) denote the coordinates of P s , P g and P sw , respectively.(x slf , y slf ) and (x srf , y srf ) represent the coordinates of P slf and P srf where the vehicle conducts the quarter circular motion of left turn or right turn with the minimum turning radius in the forward direction from P s , respectively.Similarly, (x glf , y glf ) and (x grf , y grf ) represent the coordinates of the positions from P g (see Figure 5).The AMT must decrease the speed to zero when switching gears at the switchingback point.According to the transportation rules of the mining site, reversing will be the last motion if the trajectory includes reverse motion.Thus, the kinematic constraints including corresponding velocity vsw and acceleration asw at the sw-th point (switchingback point) are defined as follows:

Interactive Speed Planning Considering Cyberattack
The proposed optimization method resolved the switching point problem by constraining the control input and its change rate (i.e., steer and acceleration).In addition, the AMT can stop in the switching symmetric corridor and reverse flexibly in the narrow loading area with continuous curvature.The derived speed profile is used as the reference by the low-level control module.By solving Equation (10) numerically, collocation points representing the haul path can be derived.

Interactive Speed Planning Considering Cyberattack
Generally, the speed module provides a feasible speed profile for the AMT to travel along the haul path.As aforementioned, interactions exist among AMTs during transportation.According to the state of the other AMTs, the ego AMT should decide whether to yield or accelerate when approaching a merging area.However, in the face of network attacks, planning algorithms need to improve their reliability to ensure safe driving.Thus, a dynamic speed planning strategy is developed, considering the interactions with other AMTs.It adopts a hierarchical structure [28] including maneuver decision making and speed profile generation.The AMT must decrease the speed to zero when switching gears at the switching-back point.According to the transportation rules of the mining site, reversing will be the last motion if the trajectory includes reverse motion.Thus, the kinematic constraints including corresponding velocity v sw and acceleration a sw at the sw-th point (switching-back point) are defined as follows: The proposed optimization method resolved the switching point problem by constraining the control input and its change rate (i.e., steer and acceleration).In addition, the AMT can stop in the switching symmetric corridor and reverse flexibly in the narrow loading area with continuous curvature.The derived speed profile is used as the reference by the low-level control module.By solving Equation (10) numerically, collocation points representing the haul path can be derived.

Interactive Speed Planning Considering Cyberattack
Generally, the speed planning module provides a feasible speed profile for the AMT to travel along the haul path.As aforementioned, interactions exist among AMTs during transportation.According to the state of the other AMTs, the ego AMT should decide whether to yield or accelerate when approaching a merging area.However, in the face of network attacks, planning algorithms need to improve their reliability to ensure safe driving.Thus, a dynamic speed planning strategy is developed, considering the interactions with other AMTs.It adopts a hierarchical structure [28] including maneuver decision making and speed profile generation.

Topology-Guided Secure Maneuver Decision Making
The haul path generated in Section 2 only considers static objects.This study constructs a temporal-spatial (T-S) graph [29] that captures the topological relation among AMTs.The priorities strategies exist for road allocation among AMTs:

•
AMTs must follow the sequence of loading tasks based on the task orders issued by the cloud platform.First come, first serve.

•
When interacting with other AMTs, the AMT with a higher priority will maintain its original trajectory, whereas the lower one is required to adjust its trajectory.
By limiting the distance (represented by time to collision (TTC) [30]) between the vertices of AMT trajectories in the T-S graph, collision can be avoided when the network has latency.According to the reaction time and braking time of the system [29,31], the TTC is set as 3.5 s.
As shown in Figure 6, truck V1 must decide whether to overtake in the merging area.The topological relationships between AMTs are depicted in the T-S graph shown in Figure 7. Taking truck V2 as an example, points A1 and B1 represent the maneuvers of accelerating and yielding, respectively.has latency.According to the reaction time and braking time of the system [29,31], the TTC is set as 3.5 s.
As shown in Figure 6, truck V1 must decide whether to overtake in the merging area.The topological relationships between AMTs are depicted in the T-S graph shown in Figure 7. Taking truck V2 as an example, points A1 and B1 represent the maneuvers of accelerating and yielding, respectively.By setting the desired arrival time at the goal position, the planner connects the corresponding point of each maneuver to generate the edge sequence of the trajectory profile.For example, the edge sequence (B1-B2-C1-C2-G1) represents the situation where V1 first yields to V2 and then overtakes V3 before reaching the goal.It should be noted that the connecting vectors must satisfy the monotonicity.
T s ss ss (21) where Tego(si+1) and Tego(si) denote the timestamp of the ego vehicle's trajectory at station si+1 and si.In this study, Dijkstra's algorithm [32] is applied to search the optimal graph vertices along the t-axis.By setting the desired arrival time at the goal position, the planner connects the corresponding point of each maneuver to generate the edge sequence of the trajectory profile.For example, the edge sequence (B1-B2-C1-C2-G1) represents the situation where V1 first yields to V2 and then overtakes V3 before reaching the goal.It should be noted that the connecting vectors must satisfy the monotonicity.
T s ss ss (21) where Tego(si+1) and Tego(si) denote the timestamp of the ego vehicle's trajectory at station si+1 and si.In this study, Dijkstra's algorithm [32] is applied to search the optimal graph vertices along the t-axis.By setting the desired arrival time at the goal position, the planner connects the corresponding point of each maneuver to generate the edge sequence of the trajectory profile.For example, the edge sequence (B1-B2-C1-C2-G1) represents the situation where V1 first yields to V2 and then overtakes V3 before reaching the goal.It should be noted that the connecting vectors must satisfy the monotonicity.
where T ego (s i+1 ) and T ego (s i ) denote the timestamp of the ego vehicle's trajectory at station s i+1 and s i .In this study, Dijkstra's algorithm [32] is applied to search the optimal graph vertices along the t-axis.
To ensure the consistency of the reference velocity profile, a cost function C t is designed to facilitate the search for the maneuver sequence.
where C ref (•) denotes the cost of the edge, m p denotes the parent node of m, v k denotes the velocity of the k-th node, v ref,k denotes the reference velocity derived from the path post-processing, N e denotes the number of path points on one edge, w ref is the reference bias weight, and C vd (•) denotes the average velocity deviation between the edge and its parent edge.The proposed method supports three or more than vehicles with lower priority considered as obstacles.
When connecting the graph vertices and extending to the goal, the edge with a lower cost is preferred for maneuver decision making.After several iterations, Dijkstra's algorithm finds the optimal edge sequence, which will be used as the decision result.Instead of searching for a complete trajectory denoting the maneuver sequence [24,33], this study decreases the dimensions of the searching algorithm, allowing for a more costeffective way to find the maneuver.

Speed Profile Generation
The speed profile generation is formulated as a time-optimal control problem.This study utilized the T-S graph and nonlinear programming (NLP) to solve this problem.The generated maneuver sequence can be represented as the bound constraints in the NLP method.By minimizing the arrival time t f and control inputs a, the NLP method can be established.The objective function is formulated as a linear combination of acceleration, jerk, and arrival time t f with their respective weights: Similar to the trajectory optimization described in Section 3, the variable constraints for velocity v, acceleration a, and jerk are set as shown below: where s res denotes the resolution of unit distance (i.e., 1 m) in the T-S graph.Compared to the optimization method in Section 3, the maneuver sequence is established as the constraint, which can be classified as following, yielding, and overtaking.For the following, the trajectory of the preceding vehicle is used as the lower The maneuver constraint is set as: where T ego and T j denote the trajectories of the ego and j th vehicle, respectively; and t lat is the latency compensation.Regrading yielding, the maneuver constraints are defined as follows: where s ns denotes the start position, while s ne denotes the end position of the overlap between two AMTs' trajectories.In this scenario, the AMT slows down until the neighboring AMT has passed the merging area.Regarding overtaking, the maneuver constraints are defined as follows: T ego (s ns ) < T j (s ns ) + t lat and T ego (s ne ) < T j (s ne ) + t lat (32) In such a case, the AMT accelerates to pass the merging area before the neighboring AMT arrives at s ne .Based on the constraints above, the optimizer follows the execution order of the maneuver sequence.Finally, the optimization problem is solved using the interior point optimization method [34].With the trajectory generated in Section 3 serving as the initial guess, the planner can find the solution in real time.In the next section, the performance of the planner will be investigated via experiments.

Experiment Analysis
To validate the proposed method, the experiments were conducted at the Bayan Obo rare earth mineral deposit, as shown in Figure 8.The proposed method was implemented in C++ language code running on a PC with an Inter i7-6820EQ processor at 2.8 GHz and 16 GB of RAM, running the Ubuntu system.The AMT used is a TL 90 equipped with RTK-GPS, as shown in Figure 8b.
In such a case, the AMT accelerates to pass the merging area before the neighboring AMT arrives at sne.Based on the constraints above, the optimizer follows the execution order of the maneuver sequence.Finally, the optimization problem is solved using the interior point optimization method [34].With the trajectory generated in Section 3 serving as the initial guess, the planner can find the solution in real time.In the next section, the performance of the planner will be investigated via experiments.

Experiment Analysis
To validate the proposed method, the experiments were conducted at the Bayan Obo rare earth mineral deposit, as shown in Figure 8.The proposed method was implemented in C++ language code running on a PC with an Inter i7-6820EQ processor at 2.8 GHz and 16 GB of RAM, running the Ubuntu system.The AMT used is a TL 90 equipped with RTK-GPS, as shown in Figure 8b.The autonomous truck equipped with 5G antenna, RTK-GPS.
The detailed parameters in the experiments are shown in Table 2. Altogether, four types of experiments were conducted.The first was to verify the effectiveness of path generation.The second dealt with the parking scenario and investigated the scheme of switching-back point.The third experiment examined the performance of the speedplanning module, considering the interaction with other AMTs.Lastly, the experiments were conducted in a real mining site.Pure pursuit and the PID algorithm were adopted for longitudinal and lateral controllers at a frequency of 20 Hz, respectively.The detailed parameters in the experiments are shown in Table 2. Altogether, four types of experiments were conducted.The first was to verify the effectiveness of path generation.The second dealt with the parking scenario and investigated the scheme of switching-back point.The third experiment examined the performance of the speedplanning module, considering the interaction with other AMTs.Lastly, the experiments were conducted in a real mining site.Pure pursuit and the PID algorithm were adopted for longitudinal and lateral controllers at a frequency of 20 Hz, respectively.

Evaluation of Path Generation at Mining Site
The scenarios were set for path planning with the same start point but different goal points in three mining areas with about 1 s network latency.According to the road boundary information, the planner generated the haul paths for the truck.For comparison, a series of benchmark methods were selected, including two basic planners (RRT* [35] and HA*) and two optimization-based planners (conjugate gradient (CG) and the proposed optimal control problem (OCP) solver in [34]).IHA*, RRT*, HA* and their combinations with the OP method (represented by IHA*-OP, HA*-OP, and RRT*-OP, respectively) were first compared.To further investigate the performance of the proposed optimization method, HA*-CG, HA*-OP, IHA*-OP, and IHA*-OCP were compared as well.The results are presented in Figures 9 and 10 and Table 3.
kinematic constraints.The paths generated by RRT* have a larger length randomness, which poses challenges to the control module for tracing [17] generated by HA* and IHA* have a similar length, whereas HA* costs much than IHA*.The reason can be attributed to its setting of the fixed expansi contrast, IHA* achieves better performance in terms of both maximum cu computation time.It can be observed in Figure 9 that all the generated paths are collision-free with kinematic constraints.The paths generated by RRT* have a larger length and certain randomness, which poses challenges to the control module for tracing [17].The paths generated by HA* and IHA* have a similar length, whereas HA* costs much more time than IHA*.The reason can be attributed to its setting of the fixed expansion step.By contrast, IHA* achieves better performance in terms of both maximum curvature and computation time.
To investigate the effectiveness of OP, the ablation experiments were conducted to examine the performance of HA*-OP, RRT*-OP, and IHA*-OP.It can be identified that OP supports shorten the initial path length and decrease the maximum curvature of the planned path, as shown in Figure 10a,b.To investigate the effectiveness of OP, the ablation experiments were conduct examine the performance of HA*-OP, RRT*-OP, and IHA*-OP.It can be identified th supports shorten the initial path length and decrease the maximum curvature o planned path, as shown in Figure 10a,b.
For example, the maximum curvature of the path generated by HA* in mining 1 is 0.160 m −1 , and it decreases to 0.033 m −1 after implementing the OP method computation time, owing to the undesirable quality of generated paths by HA* and R the OP method takes more time to post-process the raw planning results.Furtherm comparison between OP and the other two optimization-based planners (CG and was conducted.From Figure 10c, it can be observed that IHA*-OP outperforms IHA  For example, the maximum curvature of the path generated by HA* in mining area 1 is 0.160 m −1 , and it decreases to 0.033 m −1 after implementing the OP method.For computation time, owing to the undesirable quality of generated paths by HA* and RRT*, the OP method takes more time to post-process the raw planning results.Furthermore, a comparison between OP and the other two optimization-based planners (CG and OCP) was conducted.From Figure 10c, it can be observed that IHA*-OP outperforms IHA*-CG and IHA*-OCP in terms of path length.Although the maximum curvatures by IHA*-OP and IHA*-OCP are almost equivalent, IHA*-OP achieves more desirable computational efficiency.As for IHA*-CG, it costs less computation time than IHA*-OP and IHA*-OCP by implementing optimization using a gradient descent strategy.However, its path length and maximum curvature results are not optimal.

Switching-Back Point Adjustment
As aforementioned, parking often occurs in the loading operation.In such a scenario, AMTs must reverse before arriving at the loading position.The gear changes are inevitable, which requires the planner to generate a feasible path and provide it to the control module.
The paths generated by HA*, RRT*, IHA*, and their combinations with OP, CG, and OCP are shown in Figure 11, and the resulting orientations θ are shown in Figure 11b.Compared to RRT*, HA* and IHA*, all the methods with OP decreases the path length and relax the change rate of θ.Although HA* outperforms IHA* in terms of path length, its resultant path is closer to the boundary of the driving area, leading to increased driving risk.Compared to CG and OCP, OP could dynamically adjust the switching-back point and enhance the quality of the generated path.Table 4 shows that IHA*-OP achieves the shortest path length and computation time.In addition, it should be noted that the reversing path by OP, as illustrated in Figure 11, is also the shortest.It conforms to the parking behavior at the loading position since long-distance reversing driving would be potentially risky for AMT.Furthermore, the proposed IHA*-OP was implemented on the cloud platform of the mining site in practice.In real operation, when one AMT (as shown in Figure 3) reaches the reporting point, it will request the loading task from the cloud platform.After   The trajectories and speed profiles of AMTs are shown in Figure 14.It can be identified that AMT-1 decreases its speed and maintains a safe time headway.At 90 m, AMT-2 deviates from the haul path and steers to the loading point.Thus, AMT-1 accelerates to the desired speed and maintains the speed along the haul path.At about 100 m, it starts to decrease the speed and finally stops at the goal.The trajectories and speed profiles of AMTs are shown in Figure 14.It can be identified that AMT-1 decreases its speed and maintains a safe time headway.At 90 m, AMT-2 deviates from the haul path and steers to the loading point.Thus, AMT-1 accelerates to the desired speed and maintains the speed along the haul path.At about 100 m, it starts to decrease the speed and finally stops at the goal.

Scenario 1: Car Merging
A merging scenario was set as follows.AMT-1 is loaded with ore runs at the exit trajectory.AMT-2 is at the position 45 m ahead of AMT-1 and runs at 3.2 m/s along the desired trajectory.The trajectories of the two AMTs are shown in Figure 14.With the cyberattack, AMT-2 will lose the connection to AMT-1.Such a scenario was designed to examine the car-meeting performance of the proposed method.
AMT-1 needs to decide whether to yield or accelerate for passing.According to the T-S graph, two options exist: the first is to yield and decrease the speed, corresponding to Trajectory-1; the second is to accelerate for passing, corresponding to Trajectory-2.Compared to the first option, the second one achieves a shorter travel time.Thus, the planner decides to pass the merging area without deceleration.Trajectory-2 would be selected as the optimal speed profile.

Scenario 1: Car Merging
A merging scenario was set as follows.AMT-1 is loaded with ore runs at the exit trajectory.AMT-2 is at the position 45 m ahead of AMT-1 and runs at 3.2 m/s along the desired trajectory.The trajectories of the two AMTs are shown in Figure 14.With the cyberattack, AMT-2 will lose the connection to AMT-1.Such a scenario was designed to examine the car-meeting performance of the proposed method.
AMT-1 needs to decide whether to yield or accelerate for passing.According to the T-S graph, two options exist: the first is to yield and decrease the speed, corresponding to Trajectory-1; the second is to accelerate for passing, corresponding to Trajectory-2.Compared to the first option, the second one achieves a shorter travel time.Thus, the planner decides to pass the merging area without deceleration.Trajectory-2 would be selected as the optimal speed profile.

Conclusions
In this study, a secure trajectory planning method for connected autonomous vehicles at the mining site has been proposed, which contributes to the systematic secure planning framework of the mining site.By considering the operational characteristics of the mining site and AMTs comprehensively, this study improved the Hybrid A* to find the raw path in real time.Next, by resorting to a topology-guided method, the planner formulated the secure decision making as the graph vertexes searching problem, which generated the maneuver sequence in a cheap way.Based on the maneuver sequence, the planner found the time-optimal speed profile by using the NLP while considering the cyberattack simultaneously.Last, the validation results via a series of experiments demonstrate that the proposed method can generate feasible trajectories in real time.

Future Work
The study also has limitations which can be addressed in future work.The proposed method conducts the secure decision making based on the priority rules to resolve the cyberattack problem.The whole system based on the cloud platform adopts the idea of centralized control.In order to enhance the system robustness, the distributed model prediction control (MPC) for multi-AMT cooperation via V2V is supposed to be incorporated in the trajectory planning.

Figure 1 .
Figure 1.The network flow of autonomous mining trucks at a mining site.

Figure 2 .
Figure 2. Illustration of trajectory planning.(a) An autonomous mining truck in operation.(b) Top view of mining site (600 × 400).

Figure 2 .
Figure 2. Illustration of trajectory planning.(a) An autonomous mining truck in operation.(b) Top view of mining site (600 × 400).

Figure 3 .
Figure 3. Dynamic expanding step considering the large size of AMT.
y min = min(y s , y sw , y max = max(y s , y sw ,

Figure 6 .
Figure 6.Illustration of merging area at mining site.

Figure 7 .
Figure 7. Schematic diagram of AMT merging in T-S graph.

Figure 6 .
Figure 6.Illustration of merging area at mining site.

Figure 6 .
Figure 6.Illustration of merging area at mining site.

Figure 7 .
Figure 7. Schematic diagram of AMT merging in T-S graph.Figure 7. Schematic diagram of AMT merging in T-S graph.

Figure 7 .
Figure 7. Schematic diagram of AMT merging in T-S graph.Figure 7. Schematic diagram of AMT merging in T-S graph.

Figure 8 .
Figure 8. Experiment environment.(a) The actual environment of mining site at Bayan Obo.(b) The autonomous truck equipped with 5G antenna, RTK-GPS.

Figure 8 .
Figure 8. Experiment environment.(a) The actual environment of mining site at Bayan Obo.(b) The autonomous truck equipped with 5G antenna, RTK-GPS.

Figure 11 .
Figure 11.Result of switching-back point adjustment.(a) Adjustment of switching-back point; (b) Orientation θ of optimized paths.

Figure 11 .
Figure 11.Result of switching-back point adjustment.(a) Adjustment of switching-back point; (b) Orientation θ of optimized paths.

Figure 13 .
Figure 13.Desired paths and speed profile of two AMTs in the car-following scenario.

Figure 13 .
Figure 13.Desired paths and speed profile of two AMTs in the car-following scenario.

Figure 14 .
Figure 14.Desired paths and speed profile of two AMTs in the merging scenario.

Table 1 .
Main parameters of dump truck.

Table 3 .
Comparison of generated paths for three mining areas.

Table 4 .
The comparison of path length and computation time.
5.3.Validation of the Proposed Method in Real Environment

Table 4 .
The comparison of path length and computation time.

Table 5 .
Simulation parameters and task parameters.