Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

FRESH

Thursday, April 24, 2025
Logistics

Can industrial control system concepts enhance trucking cybersecurity?

When the general public sees a semi-truck on the road, most just think about the exterior — a cab, a trailer, a driver and 18 wheels. They don’t often stop to wonder about what else it takes to make the truck run.

Truck drivers, mechanics and other professionals in the trucking industry are well aware of the complexity inside the truck. An engine control unit, telematics devices, a vehicle network, cabin controls and more are all essential components of the larger system that allow the truck to operate.

To IT professionals, it sounds a lot like an industrial control system (ICS), an umbrella term to describe how various control components, systems and instrumentations work together to achieve an objective in industrial automation. Supervisory control and data acquisition systems (SCADA) — a subset of ICS — are used for remote monitoring, typically referring to geographically large systems such as water, power and gas. This is also a lot like the systems within a truck, digitally communicating with a source across vast distances.

“In ICS there are active and passive components as well as inputs and outputs,” said Chloe Callahan, IT operations manager of Peninsula Truck Lines Inc. “This is the same in our networks. In trucking, we have active components that can be and are automated. In order to automate, some logic needs to exist with values triggering some action.”

If unsecured, cybersecurity threats can take hold — and if you don’t know the systems in place, it’s impossible to secure them.

Last year, Callahan was introduced to the idea of ICS/SCADA in the framework of the trucking industry after learning about the topic at the National Motor Freight Traffic Association’s (NMFTA’s) Digital Solutions Conference, which made her want to understand more.

Now, she is encouraging other IT professionals to explore how concepts in ICS/SCADA can be applicable in trucking, joining NMFTA’s Antwan Banks, director of cybersecurity, to share parallels between ICS and trucking during NMFTA’s monthly cybersecurity webinar series, leading up to its October Digital Solutions Conference in Houston. The conference will bring together cybersecurity, trucking and supply chain professionals to discuss emerging cybersecurity threats and related issues faced by the transportation and logistics industries.

Callahan shared insight into how ICS/SCADA concepts can be applied to the trucking industry:

Parallels between ICS and trucking

1. Threat modeling. 

A threat model includes the identification and prioritization of potential threats. To defend your assets, you need to know which assets you have, Callahan said. The same is true with trucking: To protect them, you need to know your systems.

“When identifying, think about active and passive components. Keep track of active and inactive assets. Have visibility to your environment,” Callahan advised.

2. Security for unmanned sites.

There are many unmanned sites and devices that are exclusively remotely controlled in an ICS, and this exposes the potential for unwanted input. 

Though trucks are “manned” with drivers in the vehicle, they don’t have control over the vehicle networks. Callahan recommends thinking about a truck’s sensors and actuators, electronic control units, ELDs, aftermarket additions, gateways, OEM segments, ports, and HMIs as something that can receive malicious input.

3. Protocols.

Protocols are standards for communication — and ICS protocols are insecure by design as they lack authentication, authorization and encryption. This is because the software development life cycle is not as standard, and the life cycle of the technology is long.

This, too, is true for trucks, as life spans of 10 to 15 years are not uncommon. Callahan recommends IT professionals learn about the common truck protocols, including SAE J1708 and 1587, which are older; J1939, which succeeded them; Controller Area Network; and SAE 2497, bidirectional, serial communication on Powerline Controller.

4. Unique hardware.

The hardware that makes up ICS systems is unique, proprietary and potentially old. 

“We keep our trucks on the road for as long as we can eke out. A question you may ask could be, ‘Are there any firmware or security updates for anything computerized on the trucks?’” Callahan said.

While the Cybersecurity and Infrastructure Security Agency provides advisories when vulnerabilities are found in ICS, Callahan said the agency does not yet furnish updates for the trucking community.

“It’s truly up to us to be aware of the parts comprising our fleets,” Callahan said.

5. Standards and guidance.

The National Institute of Standards and Technology (NIST) provides guidelines for many security scenarios. The NIST 800-82 Guide to Industrial Control Systems Security guideline is clearly for ICS. Additionally, the NIST has a cybersecurity framework for IT. 

Callahan recommends becoming knowledgeable about both to improve overall security.

“Don’t reinvent the wheel and think so hard outside the box. Think back to threat modeling. The attack vectors still include the simple ones like social engineering as well as more advanced ones,” Callahan said.

6. Safety.

Human safety is paramount in both ICS and trucking. In fact, ICS and operational technology are primarily concerned with safety, Callahan said. There is an entire system called a Safety Instrumented System, which is a redundant system that is only concerned with avoiding failures and maintaining safety.

“In trucking, we are obviously concerned with the operation of a heavy vehicle on roadways with others all around a driver and/or passenger in the cab. What redundant systems or instrumentation do we have? Should we be more concerned?” Callahan asked.

NMFTA’s cybersecurity webinar explores further concepts in cross-training ICS in fleet management, covering the parallels further in depth, explaining the Purdue Model and offering resources to learn more.

To listen to the full “Cross-Training with ICS” webinar, click here.

Click here to find out more about NMFTA’s October Digital Solutions Conference on trucking cybersecurity.

The post Can industrial control system concepts enhance trucking cybersecurity? appeared first on FreightWaves.

Related Posts

Load More Posts Loading...No More Posts.