DCS; Industrial control system
NameDescriptionContent
NEW CENTER
Current Location:

Practical IIoT and Wireless Network Practices for Modern Mining

From:automation | Author:H | Time :2024-11-27 | 291 Browse: | Share:
Practical IIoT and Wireless Network Practices for Modern Mining
Practical IIoT and Wireless Network Practices for Modern Mining

Automation, IIoT and wireless technologies are fundamental to current mining and metals companies. These technologies are evolving quickly, producing an exciting time of growth in data collection and data sharing, expanding capability, increasing efficiency, and supporting sustainability. However, strong cybersecurity controls and governance are crucial. 

Modern metals and mining companies are sophisticated and often highly automated businesses with long histories. Current macroeconomic trends and business pressures increasingly demand that operations respond to technology advances, including faster and more reliable communications. The Industrial Internet of Things (IIoT), edge and cloud computing, 5G wireless communications, and other new technology promise increased functionality, but also require new approaches to security and daily governance to protect the investments needed to support them.

Here we share practical considerations about how wireless technology combined with good cybersecurity practices can support modern industrial facilities. Our examples come from mining and metals operations but apply to modern industrial operations of all types. Our focus is on wireless communication and IIoT, where practices are less mature, use and functionality are expanding quite rapidly, and security practices need to keep up with the growing risks that the sheer volume of additional endpoints will create.


Need for near-real-time data

With sustainability increasingly guiding the central decision-making processes, production functions, and the wider enterprise, businesses expect communication and processing to happen efficiently and with the lowest possible carbon production. This translates to producing with minimum energy consumption and with the least impact on water demands and water quality. Shareholders and the wider public are demanding sound environmental, social, and governance (ESG) and best practices for energy efficiency.

The efficiency of these processes can only happen with the right data. Tracking production to a level of trace metal specificity is being increasingly requested for the related Scope 1, 2 and 3 reporting needs of the downstream production and purification companies. Companies can address requirements for such near-real-time data to support business needs separately or by a combination of wired and wireless solutions. 

Communication can happen over hardware spread across the premise, or it can move wirelessly to the cloud for bulk data storage. IIoT devices deployed at industry sites communicate with field gateways/edge devices via an edge network (typically a wireless network). Data is collected from sensors and systems, analyzed at the edge hub level for real-time integration, or sent to a central cloud-based service. This data is aggregated with other data and delivered for advanced data analytics, such as digital twin, virtual reality, and value chain optimization (Figure 1).


Figure 1: A common IIoT deployment architecture at a mining site. Source: MMID


The edge network is critical communication infrastructure that enables fleet automation, decision automation, and optimization of production processes in the pit. Through the edge network, companies manage operations and maintenance with integrated planning and live fleet updates from drills, haul trucks, shovels, sensors and unmanned aerial vehicles or drones. 

Edge compute capacity is commonly achieved by deploying compute/storage hardware at the industry site data center close to the operation site. Data collected from IIoT devices can be processed quickly, and real-time integration with operational management systems takes care of hygiene, water management, energy and power quality, and product and assay management. Without IIoT, these processes would normally be manual, slower, and less accurate. With edge computing, the data reaches decision makers more quickly. Many workflows are therefore shortened, resulting in better decision making and overall plant efficiency.


Wireless trends in metals and mining

The use of wireless communication is already large and growing in mining and metals operations, often because the work is dangerous or spread over large areas. Steel is manufactured with very hot smelting processes, for example, and many operations use robotics for productivity and safety. There is a growing interest in autonomous robotic operations, including the management of in-process inventory, because these products are heavy and hard to handle. 

In secondary steelmaking, requirements for speed and custom-made production volumes and grades are increasingly affecting efficiency, as these processes are added (through intelligent real-time scheduling) on top of brownfield applications and existing architectures, producing new safety scenarios and challenges. This strains existing wireless communications infrastructure.

Mines generally have similar challenges to efficiency, as well as multiple production- and safety-critical systems that are reliant on a consistent wireless connection. Mining continues to increase its levels of automation, and this includes the need for data connections to traditional (crewed) heavy mobile equipment (HME) and to autonomous or remote-controlled HME such as drills, haul trucks, excavators and dozers.

The following mine systems are typically reliant on some kind of wireless connection:

  • operations and fleet management

  • remote HME operations

  • collision avoidance for mobile equipment

  • asset health monitoring and reporting

  • ore and grade control, drill patterns

  • high-precision GPS for GPS corrections

  • geotechnical monitoring

  • fatigue monitoring of personnel

  • underground remote equipment operation

  • electrical power equipment monitoring and control

  • leaching field monitoring

  • condition-based monitoring of intelligent instruments and control elements.

When it comes to cybersecurity, every industrial sector has its own requirements, but mining and metals companies are benefiting from the work of the ISA Global Cybersecurity Alliance to advance cybersecurity readiness and awareness in manufacturing and critical infrastructure facilities and processes. Secure communication is key, because mining and metals information also involves business information as products change hands across the value chain. 

Another more local example of the need for secure communications happens when contractors who manage the pit fleet are moving material at the right grade from the pit to the owners of the plant: If trusted information is available for decision making, sites can realize the highest potential value of the ore based on specific productivity key performance indicators and other requirements. 


Updating a 10-year-old wireless data network

Consider the situation facing a mining operation with a 10-year-old wireless data network. At this point, it is likely at its bandwidth capacity, which limits new technologies and upgrades to existing systems (e.g., collision avoidance, turn-by-turn dispatch directions). Besides the environmental challenges of dust, vibration, and other dynamics affecting operation of the current network, there is a risk of increased system failure as the network ages, demands for performance and data rate increase, and spare parts availability diminishes over time. Likely after 10 years, parts are no longer commercially available and must be procured through third-party sellers. 

To mitigate the risk of unplanned system failure and therefore outage of several production- and safety-critical systems, management would have determined that the current wireless system must be upgraded or replaced with fit-for-purpose wireless technology that meets current and future bandwidth and cybersecurity needs. The new network must adapt to the current complexity of mine topography and evolve as the mine is further developed, either in an open pit or deeper and deeper underground. 

Execution of the upgrade (modernization versus migration) also needs to accommodate new and updated wireless technologies to improve safety, such as systems for driver safety and collision avoidance, upgraded fleet management, and improved production and processing capabilities. Ideally systems are “future ready” for some of the expected innovation currently in pilot stages at the mine to prevent regret costs. 

Given these requirements, the mine site has five options: run the existing network to failure; upgrade the current mesh network with no changes; replace it with a hybrid mesh/LTE network; replace it with a hybrid mesh/LTE network “as a service”; or install a site-specific 5G network. Here are considerations for each choice. 


Run the existing network to failure

Pro: Low cost up front. Cons: Potential incidents because the current network supports safety-critical systems; increased maintenance on the existing network with no replacement components commercially available; estimated three-week production impacts due to network failure.


Replace with latest version of current mesh network hardware with no change

A typical wireless infrastructure provider offers fixed wireless and Wi-Fi to broadband service providers and enterprises to provide Internet access. An example of this is a Canopy network. Pros: Replacement systems support safety-critical systems and are often downward compatible; components are readily available; the overall system is supported by the vendor of choice; and the solution provides the easiest cutover without much additional training. Cons: Inflated cost, and the system may not provide as much bandwidth as a hybrid mesh/LTE solution.


Replace with a hybrid mesh/LTE network

Pro: The replacement system supports safety-critical systems and avoids production impacts from a network failure; addition of LTE provides additional bandwidth; components are readily available; and the system is supported by the vendor. Cons: Highest cost option; added complexity; unfamiliarity of LTE would require training and SLA setting with the vendor.


Replacement with a mesh OR hybrid mesh/LTE 'as a service'

Like many platforms, hardware as a service is also available. Pros: Lower up-front cost and in greenfield sites, often a plus; good option when capital is scarce; there is a replacement system to support safety-critical systems; and the approach avoids production impacts from failure. Cons: Requires a long(er) term support contract and expense; network as a service relies on a service agreement between the customer and vendor for network maintenance and managing a business-critical system. (For this it is best if the vendor is intimate with the challenges in OT and IT for the specific industry.)


Upgrade to site-specific 5G network

Pro: Site-specific 5G networks are up to 20 times faster than traditional LTE networks; the added speed allows the benefit of additional connections. Con: Additional connections means additional cybersecurity implications that must be addressed.


Additional actions/considerations for choosing among the five options:

  • Give network components due consideration (for likely types of scenarios) and make sure the design receives a third-party review if safety and production rely on it.

  • Identify all details to be included in the design. 

  • Conduct a constructability review for an initial state and a future state, as mines evolve over time.

  • Calculate the current bandwidth requirements of all mine equipment and systems, and estimate bandwidth requirements for anticipated future technologies to produce a target bandwidth with a suitable safety margin.

  • Perform a proof-of-concept test for each option or case under consideration to ensure the system functions as advertised in your environment. Test physical and electromagnetic functions, performance under additional security, performance beyond vendor default, and performance when adding potential overhead of various additional protocols (safety, functionality, or integration). 

Consider the following major priorities when comparing the solutions: 

  • maximizing your bandwidth return relative to cost

  • having a proven, established enterprise solution ready for mine deployment

  • fulfilling cybersecurity requirements, default and specific to risk profile (such as for autonomous mining)

  • having straightforward scope/implementation requirements to minimize schedule delays of the rollout

  • having a low operating cost relative to the capital cost, but more importantly to the total cost of ownership

  • minimizing reliance on the vendor for support for servicing as well as achieving a service level in response to the specific needs for the site. The Information Technology Infrastructure Library (ITIL) foundation provides a good framework to consider the details of service functions in IT and OT.


IIoT security considerations

IIoT devices leverage wireless technologies such as LTE, 5G and Wi-Fi. They also leverage cloud technologies for analytics and storage, and low-power-consumption technologies for operational longevity. These technologies allow IIoT devices to be widely adopted in mining sites supporting autonomous mining or other processes. However, IIoT devices often have significant cybersecurity vulnerabilities to security threats.

Cyber threat actors frequently exploit security vulnerabilities in IIoT devices. A mining company faces different threat actors depending on its profile. Many mining companies have assets worth multiple billions of dollars, and many of these assets operate critical infrastructure, such as water and power supplies. Mining companies have exploration knowledge about future mining assets that, for example, influences decisions about adjacent infrastructure investments. Hence, various motivations attract intense interest from different cyber threat groups, including nation states, cyber terrorists or even disgruntled employees.

Either external or internal threat actors can exploit a wide range of vulnerabilities in IIoT solutions, and the impact can seriously damage physical assets and risk the health and safety of people. For example, bad actors can hack the sensors used to monitor tailings dam water levels and maliciously change readings to be lower than the actual ones. This can delay or prevent an emergency response to a spill of the tailings water, resulting in damage to the environment and potential loss of human life. 

Another example of an IIoT cyber threat target is the sensors used for stockpile slope monitoring. Sensors are commonly used to monitor the angle or stability of large stockpiles of different materials. If the stockpile slopes cannot be monitored correctly due to hackers intentionally changing the sensor data in the monitoring system, the stockpiles can collapse. This can cause production delays, financial loss, equipment damage, and loss of human life. 

Common IIoT device vulnerabilities include:

  • Hardware devices that are unmanaged: No device registration, tracking, compliance monitoring, or access control. 

  • Hardware and software versions that are out of date combined with versions of operating systems and applications that are no longer supported, leaving significant exposure.

  • No endpoint protection, which makes the devices vulnerable to malware infection.

  • Communication channels that are unencrypted or have no or weak authentication or are using unsecured protocols. 

  • Network IIoT devices connected to untrusted networks or the IIoT exposed to the Internet without proper security protections.

  • Unprotected data in transit and storage, exposing sensitive or critical data either at rest or in transit.

  • Unsecured IIoT services running either on premise or in the cloud.

  • Increased exposure of critical IIoT through connected and converged IT/OT infrastructure. 

  • Software as a service (SaaS) with no segregation of customer data and unsecured cloud services. Vendor implementations have varying levels of security and are often open (not secure) by default.

  • The supply chains are not well secured due to history and missing government practices on how third-party-supplied software/firmware/hardware should be secured. 

  • The lack of physical access control for installed IIoT devices.

Protecting the IIoT environment is only possible by minimizing IIoT vulnerabilities and reducing potential risks. Cybersecurity is not just a technology challenge. It is also a business issue that must be addressed comprehensively through people, processes and technology. Every organization should consider following the National Institute of Standards and Technology (NIST) Security Framework. This framework provides guidance on balancing the effort to mitigate risks and provides processes where previously none existed. 


Considering standards

Automation, IIoT, and wireless technologies are fundamental to current mining and metals companies. These technologies are evolving quickly, producing an exciting time of growth in data collection and data sharing, expanding capability, increasing efficiency, and supporting sustainability. At the same time, it is important to ensure strong cybersecurity controls and governance to keep functionality in place, safely. Companies can increase production and reduce costs through the deployment of connected technologies, but they can also lose significant value due to cyberattacks. 

At first view, smaller companies seem less vulnerable to cyberrisks. They have lower profiles. However, they also have smaller budgets for protection and less to work with when it comes to the increasingly complex capability areas that cannot be fully performed through contractors. This is where standards can help ensure best-practice implementation of technology and cybersecurity protections at reduced cost.

Some internal function needs to exist for setting and auditing the best practices supporting mining and metals companies of the future. Our companies are continuously evolving their autonomous processes across the supply chain, supported by IIoT and sound cybersecurity practices. Simple steps like network segregation and training can provide additional protection.

We in ISA MMID believe it is worth sharing some of our experiences to motivate members using the standards ISA offers in this space (Figure 2). From our personal experience, we believe we need to find the balance between production gains, risk exposure, and implementation cost. This can be tricky, but with a regular inventory of the risks and some good cybersecurity practices and related frameworks, most companies can solve these challenges.

Figure 2: ISA standards related to mining and metals.


ISA’s Mining & Metals Division

The Mining & Metals Industries Division (MMID) is one of ISA’s technical divisions. It focuses on leveraging automation functionality and technology solutions to enhance mining processes and metal production.

Who is best served by this division? Professionals concerned with economically and environmentally sound practices related to the extraction of metal ores, coal, cement, sand, gravel, and other minerals—and the handling, separation, processing, fabrication, related processes, and research and development for the production of finished mineral or metal products. The division also covers the iron and steelmaking industries, aluminum processing and other light metals, and the production and manufacturing of metals products. Find out more by visiting the division’s page on ISA Connect.


  • GE SR745-W2-P1-G1-HI-A-L-R-E Feeder protection relay
  • GE IS230TNDSH2A Discrete Output Relay Module Brand
  • GE Fanuc IS200TDBSH2ACC Mark VI Terminal Board Brand
  • GE PMC-0247RC-282000 350-93750247-282000F Disk Drive
  • GE PMC-0247RC-282000 350-93750247-282000F Disk Drive
  • GE VMIVME-1150 Serial Communications Controller
  • GE VMIVME-5576 Fiber-Optic Reflective Memory with Interrupts
  • GE VMIC Isolated Digital Output VMIVME-2170A
  • GE MULTILIN 760 FEEDER MANAGEMENT RELAY 760-P5-G5-S5-HI-A20-R-E
  • GE IS200AEPAH1BKE IS215WEPAH2BB Printed circuit board
  • GE IS210BPPCH1A Mark VIe I/O Pack Processor Card
  • GE IS220PRTDH1A 336A4940CSP6 High-Performance RTD Input Module
  • GE IS220PDIAH1BE 336A5026ADP4 Discrete Input Module
  • GE IS420ESWBH3A IONET Switch Module
  • GE 516TX 336A4940DNP516TX 16-port Ethernet switch
  • GE EVMECNTM13 Embedded control module
  • GE EVPBDP0001 EVPBDP032 control module
  • GE Hydran M2-X Enhanced Monitoring with Extended Sensor Life
  • GE UR6CH Digital I/O Module
  • GE IC695CPU315-CD Central processing unit
  • GE 531X305NTBAMG1 DR Terminal Board
  • GE 531X305NTBALG1 NTB/3TB Terminal Board 531X Series
  • GE 531X305NTBAJG1 NTB/3TB Terminal Board.
  • GE 531X305NTBAHG1 NTB/3TB Terminal Board 531X
  • GE 531X305NTBAEG1 is a PCB that functions as a DR terminal board.
  • General Electric 531X305NTBACG1 NTB/3TB Terminal Board 531X
  • GE Digital Energy D20 Analog Input Module
  • GE 94-164136-001 main board Control board
  • GE 269 PLUS-D/O-100P-125V Digital motor relay
  • GALIL DMC-9940 High-performance motion controller
  • FUJI NP1BS-08 base plate
  • FUJI NP1Y32T09P1 Transistor drain type digital output module
  • FUJI NP1Y16R-08 Digital Output Module
  • FUJI NP1X3206-A High-speed digital input module
  • FUJI NP1AYH4I-MR current output module
  • FUJI NP1S-22 Power module redundancy
  • FUJI RPXD2150-1T servo drive module
  • FUJI FVR008E7S-2UX Ac frequency converter
  • FUJI Ac frequency converter FVR008E7S-2
  • FUJI FVR004G5B-2 Small general-purpose frequency converter
  • FUJI A50L-2001-0232 Industrial control module
  • FUJI A50L-001-0266#N High-performance servo amplifier
  • Honeywell FS7-2173-2RP Gas sensor
  • Honeywell 10106/2/1 Digital Input Module in Stock
  • FRCE SYS68K CPU-40 B/16 PLC core processor module
  • Foxboro FBM I/O cards PBCO-D8-009
  • Foxboro AD916AE Digital Control System (DCS) Module
  • GE SR750-P5-G5-S5-HI-A20-R-E Multilin Relay
  • FOXBORO H90 H90C9AA0117S Industrial Computer Workstation
  • FOXBORO RH928AW | I/A Series Relay Output Module
  • Foxboro N-2AX+DIO Multi-functional input/output module
  • Foxboro RH924WA FCP280 Fiber Optic Network Adapter
  • FOXBORO H92 Versatile Hardware Component In
  • Foxboro FBM218 P0922VW HART® Communication Redundant Output Interface Module
  • Foxboro E69F-TI2-J-R-S E69F Series Current-To-Pneumatic Signal Converter
  • Foxboro E69F-BI2-S Converter
  • Foxboro H92A049E0700 The host of the DCS control station
  • Foxboro H90C9AA0117S Industrial computer workstation
  • Foxboro RH101AA High-performance industrial control module
  • Foxboro P0922YU FPS400-24 I/A Series Power supply
  • FOXBORO P0973LN Chassis-based managed switch with independent power supply
  • FOXBORO P0926PA Input/output module
  • Fanuc A06B-6050-H402 3 AXIS ANALOG AC SERVO DRIVE
  • FOXBORO L0130AD L0130AE-0H Power module group
  • FOXBORO 0399085B 0303440C+0303458A Combination Control Module
  • FOXBORO SY-0399095E (SY-0303451D+SY-0303460E) Process control board
  • FOXBORO 0399071D 0303440C+0303443B Input/Output (I/O) Module
  • FOXBORO RH924UQ Redundant Controller module
  • FFOXBORO E69F-TI2-S current pneumatic converter
  • FOXBORO FBM219 RH916RH Discrete I/O Module
  • FOXBORO FBM227 P0927AC Module
  • FOXBORO 0399144 SY-0301059F SY-1025115C/SY-1025120E I/O module
  • FOXBORO SY-60399001R SY-60301001RB Industrial Control Module
  • FOXBORO 0399143 SY-0301060R SY-1025115C SY-1025120E Combined control board
  • FOXBORO 873EC-JIPFGZ electrodeless conductivity analyzer
  • FOXBORO P0916PH (High-density HART I/O Module)
  • FOXBORO 870ITEC-AYFNZ-7 Intelligent Electrochemical Transmitters
  • FOXBORO Compact FBM240. Redundant with Readback, Discrete
  • FOXBORO FBM208/b, Redundant with Readback, 0 to 20 mA I/O Module
  • FOXBORO FBM201e Analog Input (0 to 20 mA) Interface Modules
  • FOXBORO P0916WG Terminal cable
  • FOXBORO P0926MX 2-Port Splitter
  • FOXBORO AD908JQ High-Frequency Module
  • FOXBORO AD916CC Processor module
  • Foxboro DCS FBM206 Pulse Input Module
  • FOXBORO FBM216 HART® Communication Redundant Input Interface Module
  • Foxboro p0903nu 1×8 unit sub-component module
  • Foxboro P0911SM Industrial control module
  • Foxboro CM902WM I/O module
  • Foxboro CM902WL Power module
  • Foxboro P0972VA Industrial Control Module
  • Foxboro Z-Module Control Processor 270 (ZCP270)
  • Foxboro PO916JS 16-channel terminal block module
  • Foxboro PO911SM High-performance digital/analog input/output module
  • Foxboro P0972PP-NCNI Network Interface Module
  • FOXBORO P0971QZ controller module
  • FOXBORO P0971DP Thermal resistance input/output module
  • FOXBORO P0970VB Cable connector
  • FOXBORO P0970EJ-DNBX Dual-node bus expansion module
  • FOXBORO P0970BP Redundant power supply system
  • FOXBORO P0970BC-DNBI DeviceNet bus interface module
  • FOXBORO P0961FX-CP60S Main control CPU module
  • FOXBORO P0961EF-CP30B Network Interface Unit
  • FOXBORO P0961CA Optical fiber local area network module
  • FOXBORO P0961BD-GW30B gateway processor module
  • FOXBORO P0961BC-CP40B/I/A Series high-performance control processor module
  • FOXBORO P0960JA-CP40 High-performance control processor
  • FOXBORO P0926TM Control module
  • FOXBORO P0916BX Termination Assembly
  • FOXBORO P0916AE P0916AG P0916AW Thermal resistance input type DCS card module
  • FOXBORO P0916AC FOXBORO distributed control system (DCS) compression terminal assembly
  • FOXBORO P0912CB High-performance interface module
  • FOXBORO P0911VJ Thermal resistance input output module
  • FOXBORO P0911QH-A High-precision module
  • FOXBORO P0911QB-C P0911QC-C Thermal resistance input/output module
  • FOXBORO P0904BH P0904FH P0904HB Distributed Control system (DCS) module
  • FOXBORO P0903ZP P0903ZQ Embedded System Debugging Module
  • Foxboro P0903ZL P0903ZN Industrial power module
  • Foxboro P0903ZE I/A Series Fieldbus Isolator Module
  • FOXBORO P0903NW Industrial Control Module
  • FFOXBORO P0903NQ Industrial power module
  • FFOXBORO P0903AA Control Module
  • FOXBORO P0400DL Digital output module
  • FOXBORO P0400BJ Digital output module
  • FOXBORO GW30 industrial control module
  • FOXBORO FBM231 Communication Output Module
  • FOXBORO Fieldbus Communications Module, FCM10Ef
  • FOXBORO Fieldbus Communications Module, FCM10E