• Advertise
  • Contact Us
  • About Us
  • Supplier Directory
  • Login
  • Subscribe
  • Logout
  • My Profile

  • CORONAVIRUS
  • LOGISTICS
    • Air Cargo
    • All Logistics
    • Express/Small Shipments
    • Facility Location Planning
    • Freight Forwarding/Customs Brokerage
    • Global Gateways
    • Global Logistics
    • Last Mile Delivery
    • Logistics Outsourcing
    • LTL/Truckload Services
    • Ocean Transportation
    • Rail & Intermodal
    • Reverse Logistics
    • Service Parts Management
    • Transportation & Distribution
  • TECHNOLOGY
    • All Technology
    • Artificial Intelligence
    • Cloud & On-Demand Systems
    • Data Management (Big Data/IoT/Blockchain)
    • ERP & Enterprise Systems
    • Forecasting & Demand Planning
    • Global Trade Management
    • Inventory Planning/ Optimization
    • Product Lifecycle Management
    • Sales & Operations Planning
    • SC Finance & Revenue Management
    • SC Planning & Optimization
    • Sourcing/Procurement/SRM
    • Supply Chain Visibility
    • Transportation Management
  • GENERAL SCM
    • Business Strategy Alignment
    • Education & Professional Development
    • Global Supply Chain Management
    • Global Trade & Economics
    • HR & Labor Management
    • Quality & Metrics
    • Regulation & Compliance
    • SC Security & Risk Mgmt
    • Sustainability & Corporate Social Responsibility
  • WAREHOUSING
    • All Warehouse Services
    • Conveyors & Sortation
    • Lift Trucks & AGVs
    • Order Fulfillment
    • Packaging
    • RFID, Barcode, Mobility & Voice
    • Robotics
    • Warehouse Management Systems
  • INDUSTRIES
    • Aerospace & Defense
    • Apparel
    • Automotive
    • Chemicals & Energy
    • Consumer Packaged Goods
    • E-Commerce/Omni-Channel
    • Food & Beverage
    • Healthcare
    • High-Tech/Electronics
    • Industrial Manufacturing
    • Pharmaceutical/Biotech
    • Retail
  • REGIONS
    • Asia Pacific
    • Canada
    • China
    • Europe
    • Latin America
    • Middle East/Africa
    • North America
  • THINK TANK
  • PODCASTS
  • VIDEOS
  • WHITEPAPERS
Home » Blogs » Think Tank » Ramping Up Cybersecurity in the Age of Robots and Autonomous Vehicles

Think Tank
Think Tank RSS FeedRSS

Technology / Supply Chain Visibility / SC Planning & Optimization / Inventory Planning/ Optimization / Cloud & On-Demand Systems / Data Management (Big Data/IoT/Blockchain) / SC Security & Risk Mgmt / All Warehouse Services / Robotics / Order Fulfillment / Warehouse Management Systems / High-Tech/Electronics

Ramping Up Cybersecurity in the Age of Robots and Autonomous Vehicles

August 21, 2017
Robert J. Bowman, SupplyChainBrain

Much of the concern over the hacking of autonomous vehicles has centered on the development of passenger cars. But it's just as likely to occur in an industrial setting. It's not a paranoid fantasy to imagine a rogue actor gaining control of a robotic arm or vehicle within the plant or warehouse, causing severe damage to products or even human workers. Even more likely is the possibility of countless "smart" devices being hacked for proprietary information or commercial sabotage. Welcome to the Internet of (Vulnerable) Things.

The fact that such an incident has yet to happen doesn’t mean it never will, says Jeff Christensen, vice president of product with Seegrid, the maker of self-driving vision-guided vehicles. He says cyberthieves could potentially use their power to wreak havoc in the plant, or steal product within distribution centers.

The most serious threat is, of course, to the human worker. “At the vehicle level, first and foremost, safety is always the number-one driver for every decision that you make,” Christensen says.

One vital preventive measure is to make sure that the control systems for autonomous equipment are isolated from any network that can be hacked, especially from remote locations. Safety devices should feature built-in redundancy and be hard-wired to the braking system. “They don’t even go through the software that navigates the truck,” Christensen says. “If somebody walks in front of the truck, it will stop whether the software is compromised or not.”

The next step is to design the autonomous vehicle so that it lacks a “joystick mode” by which it could be remotely piloted. The navigation system should be installed on the vehicle itself. The truck must have the capability to validate any commands that it’s given, in order to ensure that they fall within the scope of its operation. The actions required to carry out a command need to be facilitated solely by onboard systems.

Here’s one variant of modern-day networking that shouldn’t necessarily be placed in the cloud. From an applications perspective, control systems should generally remain within the local network firewall, and housed on-premise. Says Christensen: “Network security for the facility should be leveraged for industrial automation systems just like everything else.”

Industrial robots should be equipped with similar onboard control systems. Safety features for devices such as manipulator arms and spot welders should be separated from the device’s execution software. In the case of caged robots, a physical fence serves as the safety barrier. But with the increasing deployment of robots alongside human workers, designers must take extra care to build units that incorporate robust fail-safe features.

The application of drones in manufacturing and distribution environments raises yet another safety and security threat, Christensen notes. Merely cutting the motor in response to an attempted hack is no solution; the device could cause serious injury to workers when it crashes to the ground. Commercial drones need to be equipped with an automatic “fly home” mechanism that kicks in when they travel past their range of remote control, or become unsure of what they’re supposed to be doing.

The easiest access for hackers targeting supply-chain operations arises from the surge in mobile and connected devices. They are growing “exponentially,” says Christensen, and operators must be aware of the high potential for infiltration. “Every one of those is a new door or window in your house,” he says.

When it comes to connected devices, the likelihood of penetration by hackers is virtually 100 percent. As security experts are fond of saying these days, it’s not a matter of whether; it’s a matter of when. All devices must be designed with the same fallback level of protection, Christensen says, so that any compromised unit will be immediately disabled and become incapable of sending malicious messages to autonomous robots or vehicles.

Connected devices are, of course, a necessity in today’s industrial world, a reality that requires operators to fight potential hackers both offensively and defensively. Offensive means tightening down the firewall and monitoring all devices on a constant basis. Defensive means having in place effective measures to deploy when the inevitable attack occurs.

“Eventually companies will miss,” says Christensen. “So we need defensive measures. Every device needs to be verifying its own command before executing.”

Next: Cybersecurity and machine learning.

Comment on This Article

RELATED CONTENT

RELATED VIDEOS

Wake up to Coronavirus Updates and the latest Supply Chain News!

Subscribe to our Daily Newsletter

Timely, incisive articles delivered directly to your inbox.

Popular Stories

  • Coronavirus-watch-Armada

    Virus Update: Biden Unveils National Strategy; Pfizer Says It’s Willing to Sell Vaccine to States

    Coronavirus
  • Car Industry

    A Year of Poor Planning Led to Carmakers’ Massive Chip Shortage

    Technology
  • Can Employers Require Employees to Get the COVID-19 Vaccine? Part 1

    Watch: Can Employers Require Employees to Get the COVID-19 Vaccine? Part 1

    Coronavirus
  • U.S. Vaccine Rollout Hindered by Faulty Coordination, Messaging

    WHO Fumes at Western Drugmakers As China Fills Vaccine Void

    Coronavirus
  • COVID-19 Vaccine

    Vaccine Disparities Raise Alarm as COVID-19 Variants Multiply

    Coronavirus

Digital Edition

Scb home issue 27

2020 Supply Chain Innovator of the Year

VIEW THE LATEST ISSUE

Case Studies

  • LSP Saves Customer $1.5 Million a Year With MPO Global Inbound Management

  • Auto Supplier Wows Key Client Using riskmethods Supply Chain Savvy

  • Integrating Shipping and Compliance Saves Conglomerate Millions

  • How a Consumer Goods Giant Upped Its On-Time Delivery Performance

  • LSP Wows Global Client, Quickly Advances to Become End-to-End Provider

Visit Our Sponsors

6 River Systems ArcBest Armada
aThingz BluJay Burris Logistics
DSC Logistics DCSA (Digital Container Shipping Association) DHL Resilience360
Genpact GEP Honeywell Intelligrated
Infor Logility Magnitude Software
MPO Old Dominion Oliver Wight
OpenSky Ports America Purolator
QAD Precision Red Classic Riskmethods
TGW Systems Transportation Insights Watson Land Company
Westfalia Technologies Workjam Yang Ming
  • More From SCB
    • Featured Content
    • Video Library
    • Think Tank Blog
    • SupplyChainBrain Podcast
    • Whitepapers
    • Webinars
  • Digital Offerings
    • Digital Issue
    • Subscribe
    • Manage Your Subscription
    • Newsletters
  • Resources
    • Events Calendar
    • SCB's Great Supply Chain Partners
    • Supplier Directory
    • Case Study Showcase
    • Supply Chain Innovation Awards
    • 100 Great Partners Form
  • SCB Corporate
    • Advertise on SCB.COM
    • About Us
    • Privacy Policy
    • Contact Us
    • Data Sharing Opt-Out

All content copyright © 2016 - 2018 Keller International Publishing Corp All rights reserved. No reproduction, transmission or display is permitted without the written permissions of Keller International Publishing Corp

Design, CMS, Hosting & Web Development :: ePublishing