• Advertise
  • Contact Us
  • About Us
  • Supplier Directory
  • SCB YouTube
  • Login
  • Subscribe
  • Logout
  • My Profile
  • LOGISTICS
    • Air Cargo
    • All Logistics
    • Express/Small Shipments
    • Facility Location Planning
    • Freight Forwarding/Customs Brokerage
    • Global Gateways
    • Global Logistics
    • Last Mile Delivery
    • Logistics Outsourcing
    • LTL/Truckload Services
    • Ocean Transportation
    • Rail & Intermodal
    • Reverse Logistics
    • Service Parts Management
    • Transportation & Distribution
  • TECHNOLOGY
    • All Technology
    • Artificial Intelligence
    • Cloud & On-Demand Systems
    • Data Management (Big Data/IoT/Blockchain)
    • ERP & Enterprise Systems
    • Forecasting & Demand Planning
    • Global Trade Management
    • Inventory Planning/ Optimization
    • Product Lifecycle Management
    • Sales & Operations Planning
    • SC Finance & Revenue Management
    • SC Planning & Optimization
    • Sourcing/Procurement/SRM
    • Supply Chain Visibility
    • Transportation Management
  • GENERAL SCM
    • Business Strategy Alignment
    • Education & Professional Development
    • Global Supply Chain Management
    • Global Trade & Economics
    • HR & Labor Management
    • Quality & Metrics
    • Regulation & Compliance
    • SC Security & Risk Mgmt
    • Supply Chains in Crisis
    • Sustainability & Corporate Social Responsibility
  • WAREHOUSING
    • All Warehouse Services
    • Conveyors & Sortation
    • Lift Trucks & AGVs
    • Order Fulfillment
    • Packaging
    • RFID, Barcode, Mobility & Voice
    • Robotics
    • Warehouse Management Systems
  • INDUSTRIES
    • Aerospace & Defense
    • Apparel
    • Automotive
    • Chemicals & Energy
    • Consumer Packaged Goods
    • E-Commerce/Omni-Channel
    • Food & Beverage
    • Healthcare
    • High-Tech/Electronics
    • Industrial Manufacturing
    • Pharmaceutical/Biotech
    • Retail
  • THINK TANK
  • WEBINARS
    • On-Demand Webinars
    • Upcoming Webinars
    • Webinar Library
  • PODCASTS
  • VIDEOS
  • WHITEPAPERS
Home » Blogs » Think Tank » Ramping Up Cybersecurity in the Age of Robots and Autonomous Vehicles

Think Tank
Think Tank RSS FeedRSS

Ramping Up Cybersecurity in the Age of Robots and Autonomous Vehicles

August 21, 2017
Robert J. Bowman, SupplyChainBrain

Much of the concern over the hacking of autonomous vehicles has centered on the development of passenger cars. But it's just as likely to occur in an industrial setting. It's not a paranoid fantasy to imagine a rogue actor gaining control of a robotic arm or vehicle within the plant or warehouse, causing severe damage to products or even human workers. Even more likely is the possibility of countless "smart" devices being hacked for proprietary information or commercial sabotage. Welcome to the Internet of (Vulnerable) Things.

The fact that such an incident has yet to happen doesn’t mean it never will, says Jeff Christensen, vice president of product with Seegrid, the maker of self-driving vision-guided vehicles. He says cyberthieves could potentially use their power to wreak havoc in the plant, or steal product within distribution centers.

The most serious threat is, of course, to the human worker. “At the vehicle level, first and foremost, safety is always the number-one driver for every decision that you make,” Christensen says.

One vital preventive measure is to make sure that the control systems for autonomous equipment are isolated from any network that can be hacked, especially from remote locations. Safety devices should feature built-in redundancy and be hard-wired to the braking system. “They don’t even go through the software that navigates the truck,” Christensen says. “If somebody walks in front of the truck, it will stop whether the software is compromised or not.”

The next step is to design the autonomous vehicle so that it lacks a “joystick mode” by which it could be remotely piloted. The navigation system should be installed on the vehicle itself. The truck must have the capability to validate any commands that it’s given, in order to ensure that they fall within the scope of its operation. The actions required to carry out a command need to be facilitated solely by onboard systems.

Here’s one variant of modern-day networking that shouldn’t necessarily be placed in the cloud. From an applications perspective, control systems should generally remain within the local network firewall, and housed on-premise. Says Christensen: “Network security for the facility should be leveraged for industrial automation systems just like everything else.”

Industrial robots should be equipped with similar onboard control systems. Safety features for devices such as manipulator arms and spot welders should be separated from the device’s execution software. In the case of caged robots, a physical fence serves as the safety barrier. But with the increasing deployment of robots alongside human workers, designers must take extra care to build units that incorporate robust fail-safe features.

The application of drones in manufacturing and distribution environments raises yet another safety and security threat, Christensen notes. Merely cutting the motor in response to an attempted hack is no solution; the device could cause serious injury to workers when it crashes to the ground. Commercial drones need to be equipped with an automatic “fly home” mechanism that kicks in when they travel past their range of remote control, or become unsure of what they’re supposed to be doing.

The easiest access for hackers targeting supply-chain operations arises from the surge in mobile and connected devices. They are growing “exponentially,” says Christensen, and operators must be aware of the high potential for infiltration. “Every one of those is a new door or window in your house,” he says.

When it comes to connected devices, the likelihood of penetration by hackers is virtually 100 percent. As security experts are fond of saying these days, it’s not a matter of whether; it’s a matter of when. All devices must be designed with the same fallback level of protection, Christensen says, so that any compromised unit will be immediately disabled and become incapable of sending malicious messages to autonomous robots or vehicles.

Connected devices are, of course, a necessity in today’s industrial world, a reality that requires operators to fight potential hackers both offensively and defensively. Offensive means tightening down the firewall and monitoring all devices on a constant basis. Defensive means having in place effective measures to deploy when the inevitable attack occurs.

“Eventually companies will miss,” says Christensen. “So we need defensive measures. Every device needs to be verifying its own command before executing.”

Next: Cybersecurity and machine learning.

Comment on This Article

Data Management (Big Data/IoT/Blockchain) Cloud & On-Demand Systems Inventory Planning/ Optimization Supply Chain Planning & Optimization Supply Chain Visibility Technology Supply Chain Security & Risk Mgmt All Warehouse Services Robotics Order Fulfillment Warehouse Management Systems High-Tech/Electronics

RELATED CONTENT

RELATED VIDEOS

Subscribe to our Daily Newsletter!

Timely, incisive articles delivered directly to your inbox.

Popular Stories

  • A GIANT EXCAVATOR BEARING THE JOHN DEERE LOGO SITS IN A FIELD IN DAPPLED SUNLIGHT

    EVs Finally Land at North America’s Biggest Machinery Conference

    Technology
  • TWO HANDS IN SHIRT CUFFS SHAKE AGAINST A BACKGROUND OF A US FLAG

    Podcast | Leaving China: Is ‘Friend-Shoring’ the Answer?

    Sourcing/Procurement/SRM
  • DEEPLY CRACKED EARTH UNDER A BLUE CLOUDY SKY

    It’s Time to Embed Climate Considerations Into Supply Chain Strategies

    Sourcing/Procurement/SRM
  • kristin-toth.jpg

    Watch: What Goes Around, Comes Around: Circularity in the Supply Chain

    Reverse Logistics
  • A SEATED PERSON HOLDS A SMARTPHONE, SHOPPING

    Retail Consumer Data: The Key to Personalization, or Privacy Violation?

    Regulation & Compliance

Digital Edition

Scb q1 2023 cover

2023 Supply Chain Management Resource Guide: Packing for a Difficult Year

VIEW THE LATEST ISSUE

Case Studies

  • New Revenue for Cloud-Based TMS that Embeds Orderful’s Modern EDI Platform

  • Convenience Store Client Maximizes Profit and Improves Customer Service

  • A Digitally Native Footwear Brand Finds Rapid Fulfillment

  • Expanding Apparel Brand Scales Seamlessly with E-Commerce Technology

  • How a Global LSP Scaled its Security Program and Won More Business

Visit Our Sponsors

Orderful Yang Ming Alithya
Barcoding Blue Yonder BNSF Logistics
CoEnterprise Data Capture Deposco
E2open GAINSystems Generix
Geodis GEP GreyOrange
Here Holman Logistics Honeywell Intelligrated
IFM Infor Inmar
Keelvar Kinaxis Korber
Lean Solutions Group 2H Liberty SBF Locus Robotics
Logility LogistiVIEW Lucas Systems
MCA Connect MPO Nvidia
Old Dominion OpenText ORTEC
Overhaul Parsyl PMMI
QIMA Redwood Logistics Ryder E-commerce by Whiplash
Saddle Creek Logistics Schneider Dedicated Setlog Holding AG
Ship4WD Shipwell Shyft
Sourcemap Tecsys TGW Systems
Thomson Reuters Tive Trailer Bridge
Vecna Robotics Verity
Verusen
  • More From SCB
    • Featured Content
    • Video Library
    • Think Tank Blog
    • SupplyChainBrain Podcast
    • Whitepapers
    • On-Demand Webinars
    • Upcoming Webinars
  • Digital Offerings
    • Digital Issue
    • Subscribe
    • Manage Your Subscription
    • Newsletters
  • Resources
    • Events Calendar
    • SCB's Great Supply Chain Partners
    • Supplier Directory
    • Case Study Showcase
    • Supply Chain Innovation Awards
    • 100 Great Partners Form
  • SCB Corporate
    • Advertise on SCB.COM
    • About Us
    • Privacy Policy
    • Contact Us
    • Data Sharing Opt-Out

All content copyright ©2023 Keller International Publishing Corp All rights reserved. No reproduction, transmission or display is permitted without the written permissions of Keller International Publishing Corp

Design, CMS, Hosting & Web Development :: ePublishing