Autonomous Haulage Systems in the Mining Industry: Cybersecurity, Communication and Safety Issues and Challenges
Abstract
:1. Introduction
2. Literature Review
2.1. Relation between Cybersecurity and Safety in AHS
2.2. Relation between Communications and Safety in AHS
- Assist workers in hazardous environments that pose health risks, such as excessive heat, dust, poisonous smoke, or hydrogen sulfide (H2S).
- Fulfill labor shortages.
- Provide an opportunity to increase health and safety.
- Outperform humans in terms of performance.
- Localization services, especially for AHS vehicles that require high precision and low latency.
- Data collection and analysis to minimize downtime that is a critical factor in extending the lifetime of an operation along with aiding in optimizing operations and achieving proactive maintenance.
- Health and safety are paramount in mining industry; sensing technology may assist in gathering data from the field to monitor both employee and equipment health, especially in areas where toxic gases are present (e.g., H2S). Furthermore, proximity sensors are designed to prevent and detect obstacles along with dangerous conditions while trucks are driving in an autonomous mode, which is essential in mining operations.
3. Open Issues
4. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
Abbreviations
CPS | Cyber-physical Systems |
AHS | Autonomous Haulage System |
OT | Operating Technology |
ATs | Autonomous Trucks |
EMV | Equipped Manual Vehicle |
ICS | Industrial Control Systems |
AHT | Autonomous Haulage Trucks |
RoT | Root of Trust |
IT | Information Technology |
AI | Artificial Intelligence |
H2S | Hydrogen Sulfide |
GPS | Global Positioning System |
WNs | Wireless Networks |
WSNs | Wireless Sensor Networks |
LTE | Long-Term Evolution |
DSRC | Dedicated Short Range Communications |
WAVE | Wireless Access for the Vehicular Environment |
pLTE | private LTE |
QoS | Quality of Service |
References
- de Vass, T.; Shee, H.; Miah, S. IoT in Supply Chain Management: Opportunities and Challenges for Businesses in Early Industry 4.0 Context. Oper. Supply Chain Manag. Int. J. 2021, 14, 148–161. [Google Scholar] [CrossRef]
- Carreras Guzman, N.H.; Wied, M.; Kozine, I.; Lundteigen, M.A. Conceptualizing the key features of cyber-physical systems in a multi-layered representation for safety and security analysis. Syst. Eng. 2020, 23, 189–210. [Google Scholar] [CrossRef] [Green Version]
- Lee, E.A.; Seshia, S.A. Introduction to Embedded Systems: A Cyber-Physical Systems Approach; Mit Press: Cambridge, MA, USA, 2017. [Google Scholar]
- Roth, M. Komatsu’s Autonomous Haulage System Sests Record for Surface Material Moved. 2018. Available online: https://www.mining.com/web/frontrunner-autonomous-haulage-system-sets-new-record-latest-industry-milestone/ (accessed on 30 April 2021).
- Parreira, J. An Interactive Simulation Model to Compare an Autonomous Haulage Truck System with a Manually-Operated System, Autonomous Haulage Truck, Simulation Model. 2013. Available online: https://open.library.ubc.ca/collections/24/items/1.0074111 (accessed on 30 April 2021).
- Labbe, R. Securing Autonomous Systems, Mining and Metals Information Sharing and Analysis Centre, Canadaian Institute of Mining, AHS, Cybersecurity. 2019. Available online: https://store.cim.org/en/securing-autonomous-systems (accessed on 30 April 2021).
- Varghese, A.; Tandur, D. Wireless requirements and challenges in Industry 4.0. In Proceedings of the 2014 international conference on contemporary computing and informatics (IC3I), Mysore, India, 27–29 November 2014; pp. 634–638. [Google Scholar]
- Li, X.; Li, D.; Wan, J.; Vasilakos, A.V.; Lai, C.F.; Wang, S. A review of industrial wireless networks in the context of industry 4.0. Wirel. Netw. 2017, 23, 23–41. [Google Scholar] [CrossRef]
- Ren, K.; Wang, Q.; Wang, C.; Qin, Z.; Lin, X. The security of autonomous driving: Threats, defenses, and future directions. Proc. IEEE 2019, 108, 357–372. [Google Scholar] [CrossRef]
- Cheng, H.Y.; Jeng, B.S.; Tseng, P.T.; Fan, K.C. Lane detection with moving vehicles in the traffic scenes. IEEE Trans. Intell. Transp. Syst. 2006, 7, 571–582. [Google Scholar] [CrossRef]
- Joshua, A.M.; Adrian, B.; Eduardo, N.; Steven, S. Robotics and the Handbook. In Springer Handbook of Robotics; Springer: Berlin/Heidelberg, Germany, 2016; pp. 1–6. [Google Scholar]
- Alani, M.M.; Alloghani, M. Industry 4.0 and Engineering for a Sustainable Future; Springer: Berlin/Heidelberg, Germany, 2019. [Google Scholar]
- Chattopadhyay, A.; Lam, K.Y. Security of autonomous vehicle as a cyber-physical system. In Proceedings of the 2017 7th International Symposium on Embedded Computing and System Design (ISED), Durgapur, India, 18–20 December 2017; pp. 1–6. [Google Scholar]
- Kim, S.; Won, Y.; Park, I.H.; Eun, Y.; Park, K.J. Cyber-physical vulnerability analysis of communication-based train control. IEEE Internet Things J. 2019, 6, 6353–6362. [Google Scholar] [CrossRef]
- He, H.; Maple, C.; Watson, T.; Tiwari, A.; Mehnen, J.; Jin, Y.; Gabrys, B. The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligen. In Proceedings of the 2016 IEEE Congress on Evolutionary Computation (IEEE CEC), Vancouver, BC, Canada, 24–29 July 2016; pp. 1015–1021. [Google Scholar]
- Lezzi, M.; Lazoi, M.; Corallo, A. Cybersecurity for Industry 4.0 in the current literature: A reference framework. Comput. Ind. 2018, 103, 97–110. [Google Scholar] [CrossRef]
- Al-Ali, R.; Heinrich, R.; Hnetynka, P.; Juan-Verdejo, A.; Seifermann, S.; Walter, M. Modeling of dynamic trust contracts for industry 4.0 systems. In Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings, Madrid, Spain, 24–28 September 2018; pp. 1–4. [Google Scholar]
- Zeng, K.C.; Liu, S.; Shu, Y.; Wang, D.; Li, H.; Dou, Y.; Wang, G.; Yang, Y. All your GPS are belong to us: Towards stealthy manipulation of road navigation systems. In Proceedings of the 27th USENIX Security Symposium (USENIX Security 18), Baltimore, MD, USA, 15–17 August 2018; pp. 1527–1544. [Google Scholar]
- Nccic, I.C. Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies Industrial Control Systems Cyber Emergency Response Team. 2016. Available online: https://ics-cert.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf (accessed on 30 April 2021).
- Petit, J.; Stottelaar, B.; Feiri, M.; Kargl, F. Remote attacks on automated vehicles sensors: Experiments on camera and lidar. Black Hat Eur. 2015, 11, 995. [Google Scholar]
- Kyrkou, C.; Papachristodoulou, A.; Kloukiniotis, A.; Papandreou, A.; Lalos, A.; Moustakas, K.; Theocharides, T. Towards artificial-intelligence-based cybersecurity for robustifying automated driving systems against camera sensor attacks. In Proceedings of the 2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Limassol, Cyprus, 6–8 July 2020; pp. 476–481. [Google Scholar]
- Abdo, H.; Kaouk, M.; Flaus, J.M.; Masse, F. A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie–combining new version of attack tree with bowtie analysis. Comput. Secur. 2018, 72, 175–195. [Google Scholar] [CrossRef] [Green Version]
- Sisinni, E.; Saifullah, A.; Han, S.; Jennehag, U.; Gidlund, M. Industrial internet of things: Challenges, opportunities, and directions. IEEE Trans. Ind. Inform. 2018, 14, 4724–4734. [Google Scholar] [CrossRef]
- Kiziroglou, M.E.; Boyle, D.E.; Yeatman, E.M.; Cilliers, J.J. Opportunities for sensing systems in mining. IEEE Trans. Ind. Inform. 2016, 13, 278–286. [Google Scholar] [CrossRef] [Green Version]
- Raza, S.; Faheem, M.; Guenes, M. Industrial wireless sensor and actuator networks in industry 4.0: Exploring requirements, protocols, and challenges—A MAC survey. Int. J. Commun. Syst. 2019, 32, e4074. [Google Scholar] [CrossRef]
- Brown, G. Private LTE Networks-Qualcomm. Qualcomm 2017, 1–11. Available online: https://www.qualcomm.com/media/documents/files/private-lte-networks.pdf (accessed on 3 June 2021).
- Ratasuk, R.; Mangalvedhe, N.; Ghosh, A. LTE in unlicensed spectrum using licensed-assisted access. In Proceedings of the 2014 IEEE Globecom Workshops (GC Wkshps), Austin, TX, USA, 8–12 December 2014; pp. 746–751. [Google Scholar]
- Ng, H.H.; Vasudha, R.; Hoang, A.T.; Kwan, C.; Zhou, B.; Cheong, J.; Quek, A. BESAFE: Design and implementation of a DSRC-based test-bed for connected autonomous vehicles. In Proceedings of the 2018 21st International Conference on Intelligent Transportation Systems (ITSC), Maui, HI, USA, 4–7 November 2018; pp. 3742–3748. [Google Scholar]
- Chehri, A.; Fortier, P. Autonomous Vehicles in Underground Mines, Where We Are, Where We Are Going? In Proceedings of the 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), Antwerp, Belgium, 25–28 May 2020; pp. 1–5. [Google Scholar]
- Khadka, A.; Karypidis, P.; Lytos, A.; Efstathopoulos, G. A benchmarking framework for cyber-attacks on autonomous vehicles. Transp. Res. Procedia 2021, 52, 323–330. [Google Scholar] [CrossRef]
- Stottelaar, B.G. Practical Cyber-Attacks on Autonomous Vehicles. Master’s Thesis, University of Twente, Enschede, The Netherlands, 2015. [Google Scholar]
- Conway, G. The Evolving Role of Communications for the Digital Mine. Eng. Min. J. 2020, 221, 54–55. [Google Scholar]
- Arjoune, Y.; Faruque, S. Smart jamming attacks in 5G new radio: A review. In Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 6–8 January 2020; pp. 1010–1015. [Google Scholar]
Papers | Used Techniques/Technologies | Security and Safety Challenges Addressed | Advantages | Disadvantages |
---|---|---|---|---|
[6] | Combination of existing standards, e.g., ISO 27000, ISA99 | Existing solutions are focused on safety aspects of AHS applications only | Utilizing well-established standards in different environments | Proposed solution is still immature and has yet to be evaluated in AHS environment |
[12] | Combine pre-existing standards to address the complexity of OT environment | Same forms of attacks that occur in the IT world can be observed in the industrial arena. Lack of standardized approach | Some standards are mature and proven to be effective | Standards do not take into consideration the wireless environment within AHS setups. Adopting some practices could be risky as they are not environment specific |
[13,14] | AHTs is a CPS | textbfFocus on specific application rather than standardized specifications that were designed to support general purposed devices | CPS can benefit from a wide range of existing applications in other areas | Manipulating the CPS without systems’ owner knowledge, e.g., MITM attack. Loss of integrity that could result in loss of lives |
[15] | Security by design | Physical, network, and computation are three fields that may be exploited | Enforce, Authentication, Authorization, Network Enforced Policy, and Secure Analytics as measures to reinforce security | Approaching cybersecurity problems in an industrial ad hoc manner can lead to misleading findings because generalized attack studies lack the specifics of security objectives |
[17] | OT–IT data sharing | Address how to access/share data between different environments | Dynamic trust zone where decisions are dynamically made by defining and analyzing flows, then intelligently determine whether the flow is permitted | Raises concerns about data privacy and confidentiality, especially in a multivendor environment |
[9] | Superior signals extraction to identify targeted GPS attacks | The GPS data must be protected to avoid GPS-based collisions and ATs deviation from the target positions | Practical techniques can figure out vital characteristics of the network such as signal strength | Secure GPS strategies are not considered in intended AHS and need to be investigated further, especially in terms of spoofing and jamming |
[21] | Defense Strategies (removable near-infrared-cut filters, and photochromic lenses) | Camera attacks (a blurred camera’s outputs break a safety standard and increase fatal accidents as well) | Photochromic lenses and removable near-infrared cut filters offer sufficient protection from a variety of angles | There are no concrete solutions for camera protection in ATs. Camera attacks can cause inaccurate detections of obstacles, lanes, or traffic signs |
[22] | Bowtie analysis and attack tree analysis | Cybersecurity impacts safety of mining equipment | Produce an exhaustive representation of risk scenarios. To measure the risk of safety threats, quantitative and qualitative data are required | Data are usually privately owned by manufacturers and are not always available for analysis, which would pose a challenge to conduct such a study |
Papers | Used Techniques/Technologies | Security and Safety Challenges Addressed | Advantages | Disadvantages |
---|---|---|---|---|
[8] | Wi-Fi technology is essential in AHS mining and Industry 4.0 | AHS trucks require constant communication with central command and with each other | Presented new advantages for the business, such as low cost and easy deployment | Vulnerabilities such as Wi-Fi De-Auth, which is DoS attacks on critical operations. The authors of [7] explain how the current wireless standards alone are not adequate to address Industry 4.0 requirements |
[24] | WSNs to increase safety | Monitor safety of equipment and operators when applicable in mining environment | Collect real-time data in the field and send the data to command centers to monitor persons and equipment in high-risk areas. A proximity sensor is designed to identify and avoid hazards while trucks are in autonomous mode, particularly in mining operations | WSN protocols are based on the 802.15.4 standard with a low energy usage objective. 802.14.5 protocols support security in the industrial environment, e.g., WilressHART, while ensuring confidentiality might be a challenge due to the limited battery life of sensor nodes that affects their ability to encrypt with more secure algorithms |
[26] | Use of pLTE as medium of communication in the mine | Lack of topology and coverage issues | Private organizations can (in some countries) deploy and operate LTE networks without relying on licensed service providers. Additionally, pLTE networks allow organizations to guarantee coverage, especially in mines, and the potential to increase the capacity of uplink/downlink traffic for better video streaming | The lack of ASH-based research addressing potential new threats/attacks and their impact on the safety of mines |
[29] | DSRC for autonomous mining vehicles | Applying several routing protocols under DSRC/WAVE standards for autonomous vehicles in underground mines | The first to address the usage of DSRC/Wave in the underground mine topology with the Rayleigh fading channel for emergency message dissemination protocols. It also provides a cooperative collision warning in underground mining environment | The lack of research into potential attacks and communication protection in underground mining using DSRC technology |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gaber, T.; El Jazouli, Y.; Eldesouky, E.; Ali, A. Autonomous Haulage Systems in the Mining Industry: Cybersecurity, Communication and Safety Issues and Challenges. Electronics 2021, 10, 1357. https://doi.org/10.3390/electronics10111357
Gaber T, El Jazouli Y, Eldesouky E, Ali A. Autonomous Haulage Systems in the Mining Industry: Cybersecurity, Communication and Safety Issues and Challenges. Electronics. 2021; 10(11):1357. https://doi.org/10.3390/electronics10111357
Chicago/Turabian StyleGaber, Tarek, Yassine El Jazouli, Esraa Eldesouky, and Ahmed Ali. 2021. "Autonomous Haulage Systems in the Mining Industry: Cybersecurity, Communication and Safety Issues and Challenges" Electronics 10, no. 11: 1357. https://doi.org/10.3390/electronics10111357