Preprint
Article

This version is not peer-reviewed.

IOTA-Based Distributed Ledger in the Mining Industry: Efficiency, Sustainability and Transparency

A peer-reviewed article of this preprint also exists.

Submitted:

05 January 2024

Posted:

08 January 2024

You are already at the latest version

Abstract
The paper proposes a traceability framework based on methodological approach for the deployment of IOTA-Based Distributed Ledger in the mining industry, as a first step of certification and labelling of the sustainable material production. The methodology is evaluated in real-world implementation in scope of the DIG_IT project. The implementation provides significant amount of heterogeneous data originating from different processes and sources during the operation in mines, such as vehicles operations, mining and raw material extraction, workers physical parameters, environmental parameters, sensors (field, biometric, assets), market (supply chains, commodity prices), weather data, etc. Most of these datasets, especially the data about the emission, needs integrity and the ability to be audited by the public community, government and the stakeholders. The methodology for establishing the transparency for the mining operations, the requirements, technical architecture, General Data Protection Regulation (GDPR) assessment, Distributed Ledger Technology (DLT) infrastructure, as well as end-to-end traceability, are proposed and evaluated with the actual deployment. The approach advocates end to end security for the increased traceability and data integrity based on Distributed Ledger Technology. Namely, W3C Decentralised Identities and Public Key Infrastructure (PKI) should be deployed from the data source to the cloud and anchored onto the Blockchain. The approach showed promising results with the regulations compliance made possible, making the data available and advertised publicly for the emission compliance.
Keywords: 
;  ;  ;  ;  ;  

1. Introduction

Raw material extraction is essential to meet the growing demands of industrialisation and technological advancement. These raw materials, such as metals, minerals, and fossil fuels, form the backbone of modern economies, powering various sectors like construction, manufacturing, energy production, and transportation. They are crucial for the production of goods and infrastructure, making them indispensable for economic development and societal progress. However, sustainable and responsible extraction practices are increasingly important to balance resource availability with environmental conservation and social considerations.
In addition, the escalating need for a wide range of raw materials, including lithium, cobalt, nickel, rare earth elements, and copper, has been catalysed by the global pursuit of carbon neutrality [1]. The extraction of these raw materials plays a pivotal role in enabling the transition to low-carbon technologies. For instance, lithium-ion batteries, which heavily rely on lithium, cobalt, and nickel, power electric vehicles and store renewable energy, ensuring grid stability and sustainability [2]. The heightened demand for these critical minerals has led to a significant upswing in mining activities [3,4], and now, the sustainable sourcing and responsible extraction of these raw materials has become imperative [5]. Transparent disclosure of mining practices, environmental impact assessments, and social responsibility initiatives will hold mining companies accountable for their actions [6]. By embracing process transparency, the mining industry can mitigate the negative impacts of raw material extraction, foster responsible mining practices, and contribute to global carbon neutrality goals [7,8]. This requires new methods and approaches that enable efficient monitoring of the mining industry, ensuring process transparency to address the challenges effectively.
The transparency of the processes in the mining industry is a challenge. Even when the data about certain operations and environmental pollution are presented, proving the authorities and local community that the data recorded is true and has not been changed is difficult. The main issue is to make sure that the final form of the data presented does not pose discrepancies that might be caused by the data controller or the data processor.
In this paper, a novel approach for ensuring data integrity and public auditability in the mining industry by using IOTA-based distributed ledger is presented. The provenance of data recorded through such a system will ensure that the data is immutable and traceable. To the best of current knowledge, this is the first attempt to define the methodology and to evaluate the approach in a live environment. The utilization of the IOTA Tangle as a verifiable data registry has proven to be effective for security control purposes. This marks a significant step in applying new technologies to practical, real-world challenges.
This paper presents a comprehensive approach to enhance traceability and accountability within the mining industry through blockchain technology. The approach has been validated within the DIG_IT [9] project funded by the European Commission that aims to address sustainable use of resources, by developing technology for monitoring of mining operations. The project facilitates Blockchain network to set up monitoring of sustainability compliance of raw material production, as a first step of certification for labelling sustainable material extraction.
However, it is not only transparency and sustainability that are crucial. GDPR compliance, along with technically feasible autonomous monitoring, is essential for ensuring the sustainable extraction of raw materials in the mining industry. More specifically, the methodology proposed in this manuscript for traceability in mining industry contributes with:
  • Definition of solution for achieving end to end traceability in the mining industry.
  • Evaluation of the solution in real-world deployment by using IOTA framework technologies and data collections from the mining operations.
  • Exercising certification and labelling of sustainable material production.
The paper is organized as follows: Section 2 presents the Related Work, which delves into current research within the existing literature. This section identifies gaps in the field that the proposed approach aims to address, offering a comprehensive overview of how the current study contributes to and differs from existing knowledge. The problem definition can be found in Section 3. This section comes up with main challenges such as end-to-end security concerns, complex data collection, and ethical considerations. The proposed IOTA-based Traceability Approach is given in Section 4, which introduces the main solution proposed, leveraging Decentralised Identities and encryption mechanisms to ensure data integrity and confidentiality. The approach is evaluated in Section 5 together with methodology and application of proposed approach within the DIG_IT Project. Other topics presented in this section are encompassing architecture, end-to-end traceability deployment, encryption for datasets, and permanent DLT storage nodes. This model is extended to include certification and labelling of sustainable material production within the mining sector. In Section 6, the paper discussess the broader implications of the research and outlines potential directions for future work. Conclusiones can be found in Section 7.

2. Related Work

This section reviews the domain of effective monitoring of environmental sustainability in the mining industry by using Distributed Ledger Technology. In general, the scalability and energy consumption are among the foremost concerns, as Blockchain networks, particularly proof-of-work-based systems, can be resource-intensive [10]. While most of the Blockchain strive to move to more energy and price efficient algorithms, the application of these algorithms in real-world use cases for sustainable mining industry is very scarce. In [11] it is suggested to use Proof-of-Stake Blockchain technology to impose sustainable management of natural resources in two use cases deforestation and groundwater management. The paper proposes tokenized approach with incentive made to land managers for changing land cover to forest or for maintaining forest. The main methodology in this paper is based on the innovative monitoring capacity using remote sensing data and analysis and Blockchain to establish an effective reward/penalty system and improve compliance involving pre-minted “Global Forest Coins (GFC)”; and promote behaviour inconsistent with sustainable development objectives (coercion and corruption) through a decentralised design. This study describes the Blockchain infrastructure, without going into the technical details, deployment issues, and security implications which could be a main point of failure of data traceability and integrity. Similar tokenisation incentivised models are examined in [12].
In [13], a system architecture for mining machine inspections using off-the-shelf mobile devices and integrating IoT and blockchain technologies is proposed. This study is very relevant to this research, but the proposed approach is focused on the collection of the data from the inspector carrying the device, considered as a trusted source of data. This means that real time monitoring is not possible unless in cases when the inspector is doing in field measurements.
Blockchain research and application for raw material extraction for mining is underdeveloped in comparison to other supply chain traceability, such as textile [14], food [15], pharma [16]. Currently most of the research and policy work is focused on the analysis of how the distributed blockchain technology can counter specific supply chain and operations management challenges [17,18]. OECD reports provide recommendations and due diligence guidance for responsible supply chain of minerals [19].
The paper presented in [20] describes a traceability system based on blockchain technology for storage and query of product information in supply chain of agricultural products. Authors provide performance analysis and practical application. The results show that the system improves the query eficiency and the security of private information, guarantees the authenticity and reliability of data in supply chain management, and meets actual application requirements. In [21], authors present a efficient traceability system for managing products in the fishery supply chain. Negligence in products’ traceability can result in food fraud that may adversely affect the consumer’s health.
Regarding the usage of IOTA ledger, authors in [22] hightlights main features of the IOTA 2.0. IOTA Tangle initial version faced issues with centralization and scalability. IOTA 2.0 addresses these by removing the centralized coordinator and introducing improvements to enhance decentralization and scalability, along with providing a technical overview and future research directions for IoT applications. The work presented in [23] leverages IOTA Tangle as part of Microgrid Transactive Energy Systems, demostrating that this technology can be cost-effective for any domain.
Through Blockchain-based systems, each stage of mineral production can be recorded and tracked, ensuring that minerals are ethically sourced and free from conflict zones. Nevertheless, the actual implementation of these approaches in practice is lacking and does not meet a reasonable number of deployments to be considered as a practice.

3. Problem Definition

In the modern landscape of mining operations, data collection plays a pivotal role in enhancing efficiency, safety, and overall productivity. Mines, whether surface or underground, are complex ecosystems where a multitude of variables interact dynamically. The extraction of valuable resources, the monitoring of equipment health, the assessment of environmental impacts, and the safeguarding of personnel all demand a comprehensive understanding of real-time conditions. To be able to monitor an environmental emission against legislation compliance, this process requires assurance that a certain event happened, as well as that what is exhibited as a sustainable behaviour is not actually a form of a “greenwashing” [24]. In the sections below the key problems are identified and described.

3.1. End to end security

The main technological challenge that may play a key role in providing trustworthiness of the operation, processes, and traceability of the data in the mining sectors is posed by the complexity of establishing end to end security and integrity of the data. Once the data is written in the Ledger it cannot be changed, and it cannot be guaranteed that the correct data are entered in the Blockchain, and if the data are trustworthy. This is why end to end traceability is important. To collect the data in the mining sector, it is necessary to use a vast amount of heterogeneous devices, some of them very constrained in resources, running different software, and having different incompatibilities and restrictions, which limits the options what can be deployed on the device to impose security from the device end.
The blockchain traceability is achieved by hashing a specific dataset. Hashing is a cryptographic one-way function that creates a digital fingerprint of defined length from an arbitrary dataset. The same hash algorithm will always lead to the same hash output for the same input data. A data hash stored on a blockchain provides just as many guarantees in terms of data immutability as if the actual dataset itself is stored. The hash however does not give away any information, since it cannot be inverted to reproduce its original data. The result of the hashing operation at any given time could be then compared with the retroactive hash saved during the creation of the dataset. This process validates that data are not changed during the time, and that the data processor maintains, the data as is. In the case of the Blockchain, as highlighted, the point where the data entered the Ledger is very important – if the erroneous or false data is written, they remain false in the Ledger and there is no reasonable method to change it. Thus, it is of the highest importance that the source is trusted and that, in case of the industry mining use case, the security between the data source or the data provider and the Ledger is encrypted, robust and could be trusted. Achieving such an approach is not possible only via the Blockchain.

3.2. Data collection

The data collection within mining operations use diverse methodologies and technologies employed to capture, transmit, and analyse crucial information, which is why there are multiple points of failure if the integrity of the data is to be questioned. Below is outlined different means of the data collection from devices that could occur during raw material extraction monitoring, with the main problems defined:
  • Direct Connection: In a direct connection approach, data from mines is transmitted directly to the cloud without intermediaries. This can be done using sensors, data loggers, or IoT (Internet of Things) devices installed at the mine site. These devices collect data such as temperature, humidity, gas levels, equipment status, suspended metals, and more. The collected data is then transmitted over the Internet to cloud servers. Direct connections are often used for real-time monitoring and data analysis. The issue of data integrity in a direct connection approach primarily revolves around the potential for data tampering during transmission. Since data is sent directly from the mine's sensors or IoT devices to the cloud without intermediaries, there's a risk of unauthorised access or manipulation during transit. Hackers or malicious actors could intercept and alter the data as it travels over the internet, leading to inaccurate or misleading information being stored in the cloud. Ensuring the integrity of data becomes crucial to maintaining the trustworthiness of the insights and decisions derived from the collected data.
  • Gateway: A gateway is a device that acts as an intermediary between the mine's local network and the cloud. It collects data from various sensors and devices within the mine and then transmits that data to the cloud. Gateways can perform data aggregation, preprocessing, and compression before sending the data to the cloud, which can help optimise bandwidth usage and reduce latency. Gateways also enhance security by acting as a buffer between the mine's internal network and the external cloud. While gateways enhance security by acting as intermediaries between the local network and the cloud, their integrity can also be compromised, it can potentially manipulate or filter the data before transmitting it to the cloud.
  • Edge Computing: involves processing data closer to the source, at the "edge" of the network, rather than sending all the data to the cloud. In the context of mines, edge devices or edge servers process and analyse data locally before selectively sending relevant insights or summarised data to the cloud. This approach reduces the amount of data transmitted to the cloud and can be especially useful when dealing with large volumes of data generated by sensors and devices in real-time. The integrity of data in edge computing is susceptible to risks associated with local processing. If edge devices or servers are not adequately secured, they can become targets for tampering or unauthorised access. Additionally, errors in local processing algorithms could result in incorrect data summaries or insights being sent to the cloud.
  • Message Queues: Message queuing systems allow data to be placed in a queue and then transferred to the cloud as cloud resources become available. This approach helps manage data flow and ensures that data is not lost even if the cloud servers are temporarily unavailable. Malicious actors gain access to the queue system, they could manipulate the order of messages or introduce false data into the queue, affecting the integrity of the transmitted data.
  • Batch Uploads: Instead of transmitting data continuously, batch uploads involve collecting data over a period of time and then sending it to the cloud in larger chunks. This approach can be useful for conserving bandwidth and reducing data transmission costs. It is suitable for scenarios where real-time analysis is not crucial and data can be processed in batches. In the case of batch uploads, data integrity concerns arise during the period of data collection and storage prior to transmission. If data is not properly stored, protected, and validated during the collection phase, inaccuracies or corruption could occur before the batch is uploaded to the cloud.

3.3. Ethical and GDPR requirements

Second to the technical issues, there are other non-functional limitations related to data privacy and sensitivity of the data that are written in the Blockchain. Blockchain and distributed ledger technologies offer the opportunity of replacing intermediation-based transactions, but at the potential expense of a substantial loss of individuals’ control over their data, which remain visible in the chain by all blockchain participants, which contradicts the GDPR principle of data minimisation, and constitutes a severe obstacle for the exercise of the right to deletion by data subjects [25]. The General Data Protection Regulation (GDPR) is a comprehensive data protection and privacy regulation that was implemented in the European Union (EU) on May 25, 2018. It replaced the Data Protection Directive 95/46/EC and is designed to strengthen and harmonise data protection laws across the EU member states. GDPR also has implications for organisations outside the EU that process the personal data of EU citizens. Accordingly, Blockchain for data-driven applications could use the sensitive dataset, as some of the data could represent personal data. The reason for this is the process of data hashing is seen as a pseudonymisation [26], and pseudonymised personal data are not compliant by the GDPR [27]. Encryption is also seen as a pseudonymisation method, and data encrypted are not compliant by the GDPR if there are any theoretical means to trace back to an individual using different methods. Accordingly, as a conclusion any data that ends up in the Blockchain must be anonymised before the hash of the data is created and recorded on the Blockchain.

4. Distributed Ledger Technology-based traceability approach

The goal of this section is to elaborate on the main technical, and non-technical solutions for the identified problems and provide methodological approach of the data collection and preservation in the DLT network for the public transparency and auditability in the mining industry.

4.1. End to end security

Distributed Ledger Technology represents a larger group of mechanisms combined together and protected with reliable, public, private key signature technology, connected to a Blockchain [28]. End-to-end traceability, a critical aspect of ensuring trust and accountability within complex operations like those in the mining sector, can be effectively realised through the synergistic integration of Public Key Infrastructures (PKIs) within the framework of Blockchain technology. Such an end-to-end approach is necessary to be applied in the data provenance of the mining sector and represent viable solutions with the existing technologies. Therefore, the implementation of the public-private key infrastructure requires libraries on the client (device), which signs the data that ends up in the Blockchain. In this paradigm, Blockchain serves as a decentralised and tamper-proof ledger, ensuring the immutability and transparency of transactions.

4.2. Decentralised Identities

Instead of relying on centralised authorities to validate and manage identities, DIDs leverage blockchain's distributed and immutable nature to grant individuals and entities complete control over their identity data. Coupled with Private Key Infrastructure, an additional layer of security is added through the utilisation of cryptographic keys. Each device possesses a pair of cryptographic keys: a public key, which is shared openly, and a private key, which remains securely held by the owner. Each DID is unique and cryptographically secure, empowering devices to authenticate and authorise themselves and sign the payload they are producing. PKI ensures secure communication and digital signatures, enhancing data integrity and authenticity. When combined, DIDs and PKI create a robust foundation for data integrity on the blockchain as follows:
  • Immutable Identity Verification: DIDs enable entities to substantiate their identity on the Blockchain without disclosing sensitive information. This ensures that only authorised parties gain access to data, maintaining the privacy of users while facilitating seamless transactions.
  • Secure Access Control: With PKI, private keys act as digital signatures, permitting only authorised individuals to access and interact with specific data. This controlled access ensures data remains accurate and unaltered.
  • Tamper-Proof Records: Every data update linked to the DID can be documented on the blockchain. This establishes an auditable trail that cannot be modified, providing a reliable source of truth for data integrity.
  • Data Provenance and Traceability: DIDs and PKI enable the tracking of data origins and changes over time. This proves particularly valuable for the mining industry and raw material supply chain management.
  • Fraud Prevention and Reduction: The decentralised nature of DIDs and the security of PKI significantly diminish the risk of identity fraud and unauthorised data access.
  • Smart Contracts and Automation: Blockchain's smart contracts can be integrated with DIDs and PKI, automating processes while ensuring only authorised parties execute actions, thus preserving data integrity.
  • Cross-Platform Compatibility: DIDs and PKI are not confined to a solitary blockchain network, permitting interoperability across different systems and platforms, thereby further enhancing data integrity and accessibility.
In conclusion, the Decentralised Identities with Blockchain or DLTs technology offers a comprehensive solution for ensuring data integrity. This pairing addresses a fundamental challenge of the end-to-end security, trust and verifiability of the information written in the Ledger from the Blockchain. To streamline even more the data provenance, and enable data secure access to a collected dataset, the data encryption can be imposed by encrypting the chunks of collected datasets. This will be explained in the next subsection.

4.3. Encryption

Based on the actual use case requirements and if the data are sensitive or not, the encryption can be used to encrypt the datasets. Together with DIDs and PKIs this adds an additional layer of protection to safeguard data integrity and prevent unauthorised access, creating a robust blockchain-based traceability framework. By applying advanced encryption techniques, raw data collected from mining operations can be transformed into encrypted formats before being stored on the blockchain. This ensures that even if unauthorised parties gain access to the data, they are unable to decipher its contents without the corresponding decryption keys.
Encrypted datasets provide the flexibility to selectively share specific portions of data with authorised stakeholders. Through cryptographic mechanisms, data owners can grant access to certain parties by providing them with the necessary decryption keys. This controlled data sharing mechanism strikes a balance between transparency and confidentiality, allowing relevant parties to validate information without compromising sensitive details.
Encrypted datasets do not hinder the auditability of transactions on the Blockchain. While the data itself remains encrypted, the transactions and interactions involving the data are transparent and immutable. This preserves the audit trail and accountability attributes inherent to Blockchain technology, assuring the verifiability and authenticity of actions performed on the encrypted data.
The integration of encrypted datasets aligns with data protection regulations as far as the sensitive data are anonymised. It fosters a robust security posture by safeguarding sensitive information from unauthorised access or data breaches. This is particularly crucial in industries like mining, where compliance with privacy regulations is imperative.
Nevertheless, there are challenges when implementing encrypted datasets, in the form of key management and secure storage of decryption keys. Additionally, efficient encryption methods must be chosen to minimise computational overhead while ensuring data security. Striking the right balance between data protection and operational efficiency is essential to achieve optimal results.

5. Evaluation of the proposed model

This sections reports on the evaluation of the proposed model with the focus on methodology and selection of DLT protocol and evaluation of the technology

5.1. Methodology and selection of DLT protocol

To evaluate the proposed approach, the framework is developed and deployed in a real-world environment, where the data are collected from the mines to monitor emissions. This section encompasses the evaluation of the proposed traceability approach. One of the main requirements for monitoring of mining processes is to support a significant number of transactions in near real-time, to allow auditability without delay. The best possible test to be carried out would be an exact simulation or the live deployment of the system.
There are a number of different Distributed Ledger Technology that can be used to achieve the traceability of the data. Permissioned Blockchains (such as Hyperledger Fabric) were not considered simply because they are consortium led DLT, and the trust necessary to be established in the mining industry explicitly requires public audit.
The choice of DLT depends on the desired level of decentralisation, scalability, security, and energy efficiency. These factors are mainly influenced by the consensus mechanism that specific DLT is using. For instance, the Proof of Work (PoW) has high security due to the computational power required to mine blocks, but it consumes a significant amount of energy, and has slower transaction, thus there are processing and scalability concerns that can affect real-time traceability. The main protocols based on PoW are Bitcoin, Litecoin, Ethereum 1.0, etc. Currently, Ethereum shifted to PoS in its latest version.
The Proof of Stake (PoS) consensus mechanism consumes less energy, making it more sustainable, it has faster transactions that can improve traceability and data handling speed in compared to PoW. There are centralisation risks as due to the existence of actors in the network with more influence, and it is less secure. There are still gas fees for writing the data but they are less expensive to be used to store the large amounts of data in compare to PoW based Blockchain. For example, for PoS Blockchain such as Polygon (transaction fee 70 Gwei at the moment of writing this paper - approximately 2 EUR). To some extent the problem with the price can be solved by hashing the bigger chunks of data instead of each value, in which case it is hard to understand which value from the whole dataset has integrity issues. The main PoS Blockchains are Ethereum 2.0 (Polygon as Layer two of Ethereum), Polkadot, Avalanche, Cardano, Solana, etc. Of course, there are more ledgers, but these are the most popular ones and with most stable user and transaction base.
Delegated Proof of Stake (DPoS) is a consensus mechanism commonly used in blockchain networks where token holders vote to elect a limited number of delegates or validators who are responsible for validating transactions and producing blocks. DPoS aims to improve scalability and energy efficiency compared to traditional PoW networks. There are also a number of interesting DPoS based DLT such as 0BSnetwork and EOSIO.
Blockchains based on the Proof of Authority (PoA) consensus mechanism offers high transaction throughput for efficient traceability, but the network relies on a limited number of approved validators, which means they are not fully decentralised.
In the DLT ecosystem, there are also other algorithms such as Directed Acyclic Graph (DAG), offering high throughput for traceability applications, and lower fees. Implementing and understanding the DAG can be complex, and the DAG- based DLT could face different security challenges compared to traditional blockchains. Furthermore, DAG has very high energy efficiency and the current IOTA protocol, has simplified the integration complexity by providing L2 (layer two) Frameworks that helps implementation of different services on top of L1 (layer one, which is a core protocol).
In Table 1 the comparison of features is given for different DLT, taking into account supported Transactions Per Second (TPS), price, support for DID on L1 or L2, as well as the Hardware library support for devices as the main metrics. The values are taken from relevant research papers and relevant online sources. The below metric cannot be used as comparative performance evaluation, as it would need to have the same data written in different networks, and as gas price is continually changing - repeating the same transaction may result in different transaction fees, which why this analysis is done to justify the selection DLT used to implement the proposed approach. The transaction fee is calculated by multiplying the sum of the gas price and the current value of the token in dollar/ euro.
The reference number of minimum 1000 TPS was taken using the message count from the DIG_IT project. This number can be significantly higher depending on the number of assets, sensors, and processes monitored. At its best the DLT should support as much as possible TPS with as less fees, and it should have an integrated DID framework, and have a support for the embedded devices. From Table 1, IOTA and EOSIO are the best candidate taking into account the set criteria. The IOTA protocol is selected as it, at the moment of writing this paper, apart from other criteria, provides OEM support and has additional frameworks required to satisfy proposed methodology. More specifically, IOTA protocol includes L2 Frameworks for seamless integration of the decentralised identities (DIDs), it does not impose any fees for writing data in the Ledger, it has encryption schemes (Streams protocol [29]) for data anchored on the Tangle, it is very energy efficient [30], and recently there are 32-bit microcontrollers firmware libraries [31] expansion software package for STM32Cube that runs on the STM32 and includes middleware to enable the IOTA Distributed Ledger Technology functions. In conclusion, there are different Ledgers that could be used to achieve the same traceability goals with certain ratios of scalability, costs, and deployment complexity. IOTA was selected for the evaluation deployment in the real mining environment as it provides feeless, scalable technology which is lightweight to be integrated with IoT devices [32], with DIDs, encryption and the Ledger developed as L2 Frameworks [33].

5.2. Evaluation of the proposed methodology in the mining industry (DIG_IT Project)

Dig_IT – A human-centred Internet of Things platform for the sustainable digital mine of the future – is a European Commission funded project that aims to address the needs of the mining industry to move towards a sustainable use of resources while keeping people and environment at the forefront of their priorities. In order to achieve that, DIG_IT developed a smart Industrial Internet of Things platform (IIoTp) to improve the efficiency and sustainability of mining operations by connecting cyber and physical systems. The platform collects data from sensors at 3 levels: human, assets, environment and will also incorporate both market real time and historical data (Figure 1).
  • Field Examples: These are physical assets or locations where operations are conducted or monitored, like a Power Station, Post Grinding Washing Unit, Truck & Mobile Assets, Grinding Units, and considerations for Operator Safety.
  • Data Source Examples: These represent hardware devices that gather data from the field examples. They include intelligent power switches, industrial Programmable Logic Controllers (PLCs), gateways for mobile assets, and wearable devices for safety monitoring.
  • Data Set & Protocols Examples: The middle section details the kind of data collected (like current, voltage, power, temperature alarms, etc.) and the communication protocols used to transmit this data to the IIoT platform. Protocols mentioned are IEC61850, OPC UA (Unified Architecture), MODBUS TCP, OPC DA (Data Access), and MQTT (Message Queuing Telemetry Transport), which are all standard protocols for industrial communication.
  • Schneider Perimeter: This might indicate that the outlined IIoT ecosystem is within the scope of Schneider Electric's solutions, products, or services.
  • IIoT Platform (Aggregator): This is likely a software solution that aggregates the data from various sources, processes it, and may also allow for control commands to be sent back to the field assets. It is represented as the central system where all data converges.
  • Outputs: On the right, the outputs of the IIoT platform are shown. This includes dashboards for data visualization, servers for data processing and storage, and a digital twin, which is a virtual representation of the physical assets, allowing for simulation, analysis, and control.
The Dig_IT project covers a diverse array of mines, each with its unique set of goals and challenges. From underground quarries to expansive open-pit mines, these case studies represent excellence field study for the performance evaluation of the proposed approach. The mines included in the DIG_IT project are Marini Marmi in Italy (underground quarry), La Parrilla mine in Spain (open pit), Titania in Norway (open pit), Hannukainen mine in Finland (open pit), Sotkamo Silver mine in Finland. In the following subsections the deployment of DLT is explained first with the project architecture overview, followed by the implementation of DLT, and description of the approach for certification labelling.

5.3. Architecture

The DIG_IT platform architecture features data collection from devices and sensors, the monitoring units, controllers, as well as other data gathering technologies, all across different worksites. Consequently, near real-time data transmission was implemented with publish-subscribe messaging protocol technologies such as MQTT and Kafka. All the software and hardware infrastructure were designed in such a way that it will expedite and ease the work of end users. The whole architectural design is scalable, flexible and it ensures interoperability and easy information flow between the various components and different data concepts (e.g. real time measurements, input or output of models, economical information etc.).
Therefore, the platform stores data from multiple data sources and sends them to multiple data destinations. All of DIG _IT data is stored in a central location and can be accessed from all DIG _IT components and users. Figure 2 summarises the high-level architecture of the platform, and its basic building blocks. The DIG_IT architecture represent the fundamental example of the IoT project that collect various types of data from the processes in the mines which is why is used as an example in this study, As shown, Platform consists of the following components: (1) Data processor and Distributor; (2) MQTT broker (integrated with SCHNEIDER systems gathering sensors); (3) Apache Kafka (integrated with ML modelling and UI); (4) Timescale DB; (5) Various Data connectors (Data Streamers, Data Sink, IoT message broker connectors, public API connectors: to be implemented for external data sources), OTA Server for garment updates; (6) FTP Server.
The central software component of the platform is the Data processor and Distributor block which performs data processing, harmonisation and exporting to various destinations. As shown in Figure 2, a lot of data comes to the platform from various sources. There is data (mainly sensor’s) coming from the Aggregator, other that comes from the smart garment, ML (machine learning) modelling input/output and other from external sources via APIs. The figure summarises the different data sources from where the data in the project is collected.
Various Data Connectors are implemented so that data is successfully read and written by the Data Processor and Aggregator and the various data sources, data destinations. Data transformation and routing are decoupled from the connector to be able to make platform scale easily in the future and support a vast variety of extra data sources and data sinks. Currently Timescale DB, MQTT and Kafka connectors are used depending on the source from where the data come from. Thus, the data concentrated in the smart garment sent to the platform via MQTT connector. The exact approach is used for the data collected from the Aggregator but by using a different topic. Other data come from APIs and other by parsing files. In addition, different connectors are used for exporting the data to various destinations. Some data are available by directly querying the timescale database while others are published in a Kafka broker to be available for consumption.
The main data sources are Sensors’ data, Machine learning models’ data and data from external sources. Regarding the sensor’s data, there are a lot of several types of sensors and various project partners engaged in data producing and sharing. For example, stationary data contains data from sensors measuring temperature, humidity, PM25, PM10, concentration of CO, NO2, NH3, water level, suspended metals, etc. On the other hand, personal data gathered by using the smart garment and contain measurement obtained by wristband such as scalar and angular acceleration in three axes, the percentage of oxygen saturation in blood, the skin temperature, the heart rate in ppm, the electrodermal activity, the raw PPG and the keywords from the earplug. Simultaneously, it gathers environmental (concentration of CO, NO2 and NH3), noise (noise level in dB) and UWB data such as quality factor and location x, y, z coordinates.
Other sensors’ data includes geotechnical data such as data coming from piezometers and inclinometers are forwarded to the Aggregator.
Having in mind the complexity and the number of different hardware used and available data sources, inability to change the OEM firmware for some of the devices to deploy DID directly on the device - there are number of potential solutions to write the data in the Distributed Ledger Technology:
  • Writing data directly from the device to Blockchain. This approach requires libraries to be deployed on the device and this approach is conformant with the end to end traceability. It also requires creation of Identity for the device (Figure 3, step 1), that will write the data in the encrypted channels and in the Blockchain (step 2 and 3).
  • Writing data from Gateway or Edge to a Blockchain. This approach is not fully compliant as explained in Section 4.2. It requires Gateway running the script (Figure 3, step 4), which proxies the communication on behalf of the device.
  • Writing other sources of data collected by the Kafka event broker. This approach is not fully compliant as explained in Section 4.2. The devices are sending the data to Kafka (Figure 3, step 5). The adapter that is subscribed to Kafka can be developed to listen to a specific channel and collect the data that will be written in the Blockchain.
Figure 3. Methods for writing the data in DLT originated from various sources with different hardware and software capabilities.
Figure 3. Methods for writing the data in DLT originated from various sources with different hardware and software capabilities.
Preprints 95624 g003

5.3. Device Identity - Data source traceability

IOTA Identity is a Rust implementation of decentralised digital identity, also known as Self-Sovereign Identity (SSI). It implements standards including W3C Decentralised Identifiers (DID) [34] and Verifiable Credentials [35] on the IOTA Tangle. It conforms to the DID specifications v1.0 standard [36] and describes how to publish DID Document Create, Read, Update and Delete (CRUD) operations.
This IOTA Identity library is used to generate a new DID, which results with a basic DID Document created that includes the public key (a public-private key pair), which is coupled with the specific channel use to write the data in the IOTA Streams and control access to the DID document.
Using the following approach the DID Document is formatted as an Integration DID message, signed using the same keypair used to generate the tag, and published to an IOTA Tangle on the index generated out of the public key used in the DID creation process.
Figure 4. DID document on the IOTA Tangle Explorer.
Figure 4. DID document on the IOTA Tangle Explorer.
Preprints 95624 g004
All private keys or seeds used for the did:iota method should be equally well protected by the users. The signing key is especially important as it controls how keys are added or removed, providing full control over the identity. The IOTA Identity framework utilises the Stronghold project [37], a secure software implementation isolating digital secrets from exposure to hacks or leaks. Developers may choose to add other ways to manage the private keys in a different manner.

5.4. Encryption for Datasets

IOTA Streams protocol offers a standardised and interoperable structure within the Tangle, ensuring data integrity and immutability. The framework allows any device, acting as a Publisher, to transmit messages into a designated Stream. This data can be made accessible to all or restricted through public key encryption for private interactions. Subscribers, representing other devices, can then retrieve information from the Tangle by subscribing to a Stream.
Figure 5. Encrypted dataset on the Tangle Explorer.
Figure 5. Encrypted dataset on the Tangle Explorer.
Preprints 95624 g005
The dataset can be also made unencrypted, making it fully readable for anyone who accesses the link on the Tangle Explorer. There are two types of encryption used, one for the data written in the Tangle and the second one for storing the data off-chain in the Streams.

5.5. Nodes: Permanent DLT storage

Nodes in the system maintain historical data, including transactions, but periodically perform a 'snapshot' process where older transactions are removed, retaining only unspent transaction output (UTXOs) [38] in the ledger. These transaction pruning settings are specific to each node, resulting in variations in the length of historical data stored across the network. Consequently, not all nodes will have the same historical DID messages. This poses a challenge for client-side validation, as the complete history of a DID Document is essential. To address this issue, IOTA protocol has released new version of the L1 network (Stardust), which writes the DID documents directly in the Ledger. Nevertheless, it is recommended to deploy an own node that will ensure faster access and data writing in the Ledger.

5.6. Data Management Plan for Distributed Ledger Technologies

All processes that involve data processing and storage with a Blockchain pose a certain level of risk, if the undergoing procedures are not followed up with the adequate GDPR assessment. The Blockchain is not usually used for saving the data - it is not meant to be used as a data storage, but depending on the actual Blockchain implementation it is used for storing hashed messages, which represents part of data transaction as a proof of immutability. The project will store data both locally and on the ledger. The local storage ensures a fast retrieval of the information, while the copy on the Ledger ensures its immutability. To be able to adequately assess the compliance with the GDPR in respect to blockchain use, the project will follow strict guidelines:
  • It is mandatory to remove any personal information before sending the data to a blockchain.
  • The data stored locally are encrypted through asymmetric encryption.
  • For personal data, only the owner of the data will have the access to the data, upon authentication and authorization.
DIG_IT will use permanodes for long-term data storage by implementing filters to store only specific information. The data in permanodes will be encrypted and accessed only by the data owner. The data written in the ledger will remain and could be accessed over the Tangle Explorer, and the reason for having the permanodes is to ensure smooth writing of the big chunks of the datasets in the Ledger. The deployment of the setup in this study is done with the IOTA Mainnet permissionless network. IOTA nodes can be run also by parties other than those part of the DIG_IT environment and permanodes can be hosted by anyone.
However, data related to different data sources in DIG_IT will be accessible only within specific encrypted channels, due to personal data involved, which are known and accessible only by entities who have been verified as party to the DIG_IT environment and rightful entity for data processing. The dataset that are meant to be available to community and public are the dataset from the Hannukainen mine, and they will not include any sensitive data. These datasets are going to remain accessible over the permissionless network unencrypted, and readable without any specific tools, but only using the link to the Tangle Explorer.
In case something needs to be deleted from the Blockchain, this is possible only in a permissioned network, because pruning happens in specific permanodes. Finally, as pruning of data from each of the permanodes is only possible within a permissioned network, its implementation would be better suited to enable the exercise of the data subject's right to deletion of data.

5.7. Labelling Sustainable Material Certification in Mining

In the mining industry, ensuring the integrity and authenticity of reported data, particularly pertaining to emissions and environmental parameters, is of utmost importance for regulatory compliance and transparency. Regulatory bodies, are verifiers, require mining companies, the provers, to maintain an immutable record of their daily emissions, suspended metals, water levels, pH, and related parameters (Figure 7, steps 1,2,3). This record must be securely stored within the company's infrastructure while also being readily accessible for government scrutiny as well as to local communities over the public (permissionless) Ledger. A key requirement is to demonstrate that the data has not been tampered with since its initial reporting.
The transparency and public accountability of the mining industry can be further enhanced by making the data accessible through a public dashboard (Figure 7). This ensures that stakeholders, including the general public, can monitor and scrutinise the environmental impact of mining operations. Additionally, the verifier, representing the government agency, can seamlessly access the unique message ID provided by the prover. This message ID serves as a direct link to the Tangle Explorer, a tool that facilitates the verification process by offering an immutable and transparent trail of data provenance.
To better illustrate this concept, let’s consider the following scenario. Government (Verifier) demands companies (Prover) to log their daily emissions (suspended metals, metals, water level, pH, etc) in an immutable way. The data can remain with the company, but they need to be able to show it to the government at any point in time and prove it has not been tampered with, since its reporting day. The data is displayed or accessible using user friendly way such as dashboard, and the Verifier should be able to access the message ID from the Prover that leads straight to the Ledger (Tangle Explorer). Otherwise, the Prover could attach multiple results in the same day and pick the “best fitting” one when being audited.
Figure 6. Diagram of labelling certification for sustainable mining.
Figure 6. Diagram of labelling certification for sustainable mining.
Preprints 95624 g006
The quality and performance data of the enterprises should be considered private and will only be available after granting permission. This being said, where possible and where there are no particular ethical concerns (biometric and personal data from workers, for instance), monitoring data generated and collected during the auditing should be freely distributed.
To reproduce the scenario in which Verifier is assessing the traceability of a specific dataset, in Figure 8 the example of a Dashboard is visually presented, where all values are displayed - in this case water turbidity and water pH level. Verifier can, by clicking the URL that leads to a specific dataset written in the Ledger, access the given data and check on the Blockchain Explorer (Figure 9) that the dataset values have not been changed. The indexation of the payload with the human-readable dataset presented over the Tangle Explorer are unencrypted so as to be available to the relevant actors, and the message tree provides visual representation of the data stored in the Tangle tree with a specific node (Figure 9). The message shows that the message has been indexed by the node and that data is included in the ledger.
Unlike IOTA, other DLT can write only the hashed data instead of the data itself. In this case, the hash can be presented over the Dashboard using the very same approach, and the Verifier would need to go to the Explorer and compare the two hashes, linked to a specific value. If the values or hashes do not match, the dataset has been tempered and values changed. Making the immutable data accessible through a public dashboard enhances transparency and accountability. Government verification agencies can easily access and verify data authenticity using a unique message ID linked to the Tangle Explorer. This system ensures data integrity and prevents tampering.
The image below represents the dashboard for environmental or water quality data in the location of Valkeajoki. The interface includes graphs and data on three different parameters: pH level, turbidity, and electrical conductivity, along with some transaction information. Here's a breakdown of each section:
  • pH Level: This graph displays the pH levels over a period of several days. The pH scale, which measures how acidic or basic water is, ranges from 0 to 14, with 7 being neutral.
  • Turbidity: The second graph shows the turbidity levels which measure the clarity of the water by assessing how much particles suspended in the water scatter light.
  • Electrical Conductivity: The third graph shows the electrical conductivity which indicates the water's ability to conduct electricity.
On the right side of the image, there is a table that contains links to data may be recorded on IOTA ledger (Tangle Explorer). Each "View Transaction" link is associated with a specific measurement (Electrical Conductivity, Turbidity, pH) and provides a timeframe thats corresponds to the date and time of the recorded data.
Figure 7. Compliance Dashboard with pH, Turbidity and Electrical Conductivity and linked to Tangle Explorer.
Figure 7. Compliance Dashboard with pH, Turbidity and Electrical Conductivity and linked to Tangle Explorer.
Preprints 95624 g007
Figure 8 highlights one point with a ph Value of 6.34175 at the specific time of November 26, 2023, at 18:15 indicating a pH value of 6.34175. As it has been stated before, this timestamped data is store in IOTA network and can be visualized (Figure 9) when clicking in “View Transaction” for pH measure.
Figure 8. Closer look to ph Level Graph.
Figure 8. Closer look to ph Level Graph.
Preprints 95624 g008
Figure 9. pH Level data available on the Public Ledger – IOTA Tangle Explorer. https://explorer.iota.org/mainnet/block/0xc2f39273ad98b033e0034cae6caf9ae39fe19506f9c27122d48c03138df3fb2c.
Figure 9. pH Level data available on the Public Ledger – IOTA Tangle Explorer. https://explorer.iota.org/mainnet/block/0xc2f39273ad98b033e0034cae6caf9ae39fe19506f9c27122d48c03138df3fb2c.
Preprints 95624 g009
By recording key environmental metrics such as pH level, turbidity, electrical conductivity, and emissions on an immutable ledger, mining companies can provide verifiable proof of their compliance with regulatory standards. This method effectively addresses the challenges of transparency and accountability in the industry. The immutable nature of blockchain ensures that the recorded data cannot be altered, offering a permanent and trustworthy record of the mining company's environmental impact. This is crucial in demonstrating adherence to environmental regulations and in mitigating the negative consequences of mining operations.
Furthermore, the use of blockchain allows for real-time data sharing with politicians, industrial stakeholders, and local citizens. This transparency ensures that all parties are informed of the mining activities and their environmental impact, fostering trust and collaboration between the mining industry and the affected communities.

6. Discussion and future work

This paper presents a secure, tamper-proof, and user-controlled identity verification and access mechanisms, an approach that lays a sound foundation for a more secure and transparent mining ecosystem. By assigning unique and cryptographically secure identities to each participating device, regardless of their resource constraints or software variations, a unified authentication framework is established. Coupled with PKIs, this setup offers a robust encryption mechanism that ensures secure data transmission between sources and the Blockchain ledger. The original data before hashing is encrypted, offering additional layer of security and minimises the possibility someone unauthorised changing the data. This comprehensive approach underscores that achieving end-to-end traceability extends beyond Blockchain itself, encompassing the intricate interplay of decentralised identities and encryption to ensure confidence in data processing and management within the mining industry’s landscape.
One of the popular methods of low cost IoT monitoring, is using off the shelf sensors, which are then calibrated facilitating offset and other methods on the Edge or in the Cloud. This approach, even affordable and able to cover a lot of points of interest, is prone to errors and is not advisable as these measurements are not legally binding (sensors are not accurate and certified, and the data is changed on the cloud, but the accuracy cannot be guaranteed). The main issue is the number of points where the data should be traced, and complexity to implement such traceability. The use of industry grade certified sensors is one of the key requirements of traceability, and eventually this should be imposed in future for monitoring of the mining industry. This could limit the potential use of certain devices – the fact that devices should be able to run additional libraries to be able to authorise and write data directly in the Ledger. For closed source, and proprietary monitoring hardware and software, these requirements should impact the roadmap, and force OEMs to add as a milestone on their future roadmap to support devices with the embedded DLT libraries. Such an example is STM32 family of 32-bit microcontrollers that embeds the support for Distributed Ledger Technology.
In this study, DIDs and IOTA Streams have been used to implement encryption data records with the hashes anchored on the Tangle. There are other variations, some of them compatible with IOTA technology, such as the L2Sec cryptographic protocol [35] proposed for IoT constraint devices based on microcontrollers. L2Sec provides all the capabilities for a constraint IoT device to structure a stream of data over the Tangle and enable secure data exchange. L2Sec is enhanced with a Hardware Secure Element to build an HW root-of-trust at the IoT device and further improve the security of the overall solution with a secure-by-design approach. This approach can further enhance the security, and especially mitigate the issue with potential device cloning as it will be impossible to replicate HW function on the device.
The newer version of the IOTA network - Stardust [36] has compatible version of IOTA Identity which stores the DID documents directly in an unspent output and therefore in the persistent UTXO ledger, which is stored with consensus on every network node. This means that there is more security and less implementation complexity as the DID are written directly on the Ledger.
There is one technological downside of the current implementation of IOTA Streams due to the fact it uses symmetric encryption, which means that an admin with the root access and the key can decrypt the data. Nevertheless, even if he/she changes the dataset in encrypted channel, he/ she could never change the value in the Leger. This can be resolved by replacing the symmetric encryption with another asymmetric cryptographic algorithm.
This paper did not cover use of Smart Contract for automatization of emission compliance. This is proposed in a number of studies and represents the logical next step and future work, which can be easily integrated once the approach as the one proposed in this paper is established. Integration with existing mining systems and processes also requires careful consideration to ensure a seamless transition and effective data interoperability. Moreover, regulatory frameworks and standards for Blockchain implementation in the mining sector are still evolving, necessitating a harmonised approach to legal and governance aspects.
The proposed approach is not only viable in the mining industry. It can be applied to any supply chain project. Further to this, the proposed methodology goes well with the EU conflict minerals regulation (2021) [37] that came into effect as a union-wide attempt to regulate supply chains and increase transparency between conflict minerals actors. EU importers of tin, tantalum, tungsten, and gold will have to carry out checks on their supply chain by following a five-step framework:
  • Establish strong company management systems;
  • Identify and assess risk in the supply chain;
  • Design and implement a strategy to respond to identified risks;
  • Carry out an independent third-party audit of supply chain due diligence;
  • Report annually on supply chain due diligence
The proposed methodology could help in establishing the five-step framework and address at least (1) identification of the risks in the supply chain, (4) carrying out third-party audits, and reporting on the due diligence (5).

7. Conclusions

It becomes evident that only advanced technologies hold the potential to comprehensively ensure compliance of the industry 4.0 operation with the sustainable development goals. Blockchain, with its inherent tamper-resistant properties, serves as an ideal platform for storing and certifying these critical records. This ensures that any attempt to modify or manipulate the data is immediately detectable, maintaining the data's credibility and integrity. These innovative safeguards not only provide a shield against unauthorised access and tampering but also establish an immutable record of data transactions. There are different ways to collect the data that influence the ability to ensure the integrity and trustworthy data collection from mining operations. Nevertheless, there are a number of technical challenges for achieving such an approach in practice to be able to make these data legally binding and enforce regulative activities.
To address these challenges, an analysis of the point of failures was conducted, leading to the proposal of a framework involving blockchain technology paired with decentralised identities, on-device firmware, and ethical requirements for data collection. Furthermore, the utilisation of encryption introduces an additional layer of data immutability and sequential ordering. Messages written to an encrypted data channel establish an immutable chain, sequentially numbered for every message. This sequential ordering addresses the concern of attaching multiple results on the same reporting day, as each entry remains bound by its position in the sequence.
End-to-end encryption safeguards data throughout its entire journey, from source to destination, ensuring that only authorised parties can access and interpret the information. Simultaneously, Blockchain's distributed and decentralised ledger system offers an incorruptible chain of custody for each data point, assuring its accuracy and authenticity. By recording waste disposal, emissions, and reclamation efforts on an immutable ledger, mining companies can provide verifiable proof of compliance with regulatory standards and mitigate the negative consequences of their operations. In conclusion, the fusion of sustainable mining practices with Blockchain technology offers a transformative path towards a more ecologically responsible and socially accountable mining industry. By providing transparent, traceable, and automated solutions, Blockchain has the potential to reshape the way mining operations are conducted, monitored, and regulated.

Author Contributions

Conceptualization, N.G.; methodology, N.G.; Blockchain, N.G.; validation, N.G. and D.E.; writing—original draft preparation, N.G. A.A and A.G.; Dashboard implementation, D.E., Platform infrastructure A.A and A.G.; Architecture A.A and A.G. All authors have read and agreed to the published version of the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

Notes

1
Etherscan, transaction gas fee estimator https://etherscan.io/gastracker.
2
Muhammed F. Esgin, Veronika Kuchta, Amin Sakzad, Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand, Financial Cryptography and Data Security, 2021, Volume 12675, Springer.
3
4
N. Sealey, A. Aijaz and B. Holden, "IOTA Tangle 2.0: Toward a Scalable, Decentralized, Smart, and Autonomous IoT Ecosystem," 2022 International Conference on Smart Applications, Communications and Networking (SmartNets), Palapye, Botswana, 2022, pp. 01-08, doi: 10.1109/SmartNets55823.2022.9994016.
5
0Bsnetwork fee 0,03 EUR / KB available online: https://www.0bsnetwork.com/.

References

  1. Arvidsson, R., et al. (2017). Assessing the sustainability transition of the global energy system: A scenario-based analy-sis of China's electricity generation. Energy Policy, 104, 122-136.
  2. Weng, Z., & Wang, M. (2018). China's policies on electric vehicles and their impact on the iron ore market. Resources Policy, 55, 1-10.
  3. Boersma, T., & Van Den Bergh, J. C. (2009). The role of technological change for a sustainable development. Energy Policy, 37(6), 2525-2533.
  4. International Energy Agency (IEA). (2021). Global EV Outlook 2021: Accelerating the Transition to Electric Mobility. Paris, France: IEA Publications.
  5. Mancini, L., et al. (2019). An overview of the environmental impact of mining and mineral processing operations. Sci-ence of the Total Environment, 670, 70-88.
  6. Gandiglio, M., et al. (2020). A review of lithium-ion battery state-of-health estimation and management in electric ve-hicle applications: Challenges and recommendations. Applied Energy, 275, 115367.
  7. Lu, Z., et al. (2018). Uncovering the global life cycle greenhouse gas emissions of lithium-ion battery production: A multi-regional input-output analysis. Resources, Conservation, and Recycling, 137, 299-308.
  8. Nykvist, B., & Nilsson, M. (2015). Rapidly falling costs of battery packs for electric vehicles. Nature Climate Change, 5(4), 329-332.
  9. DIG_IT Project, A Human-centred Internet of Things Platform for the Sustainable Digital Mine of the Future, Available online, accessed 15.10.2023 https://cordis.europa.eu/project/id/869529.
  10. Yli-Huumo, J., Ko, D., Choi, S., Park, S., & Smolander, K. (2016). Where is current research on blockchain technolo-gy?—A systematic review. PloS One, 11(10), e0163477.
  11. Alex Smajgl, Charles M. Schweik, Advancing sustainability with blockchain-based incentives and institutions, Front. Blockchain, Sec. Blockchain for Good, Volume 5 - 2022 | https://doi.org/10.3389/fbloc.2022.963766.
  12. Behzad Esmaeilian, Joe Sarkis, Kemper Lewis, Sara Behdad, Blockchain for the future of sustainable supply chain management in Industry 4.0, Resources, Conservation and Recycling, Volume 163, 2020, 105064, ISSN 0921-3449, https://doi.org/10.1016/j.resconrec.2020.105064.
  13. Pincheira, M.; Antonini, M.; Vecchio, M. Integrating the IoT and Blockchain Technology for the Next Generation of Mining Inspection Systems. Sensors 2022, 22, 899. https://doi.org/10.3390/s22030899.
  14. Ahmed, W.A.H.; MacCarthy, B.L. Blockchain-Enabled Supply Chain Traceability in the Textile and Apparel Supply Chain: A Case Study of the Fiber Producer, Lenzing. Sustainability 2021, 13, 10496. https://doi.org/10.3390/su131910496.
  15. Mukesh Kumar, Vikas Kumar Choubey, Rakesh D. Raut, Sandeep Jagtap, Enablers to achieve zero hunger through IoT and blockchain technology and transform the green food supply chain systems, Journal of Cleaner Production, Volume 405, 2023, 136894, ISSN 0959-6526, https://doi.org/10.1016/j.jclepro.2023.136894.
  16. L. Gupta, M. Bansal, Meeradevi, M. Gupta and N. Khaitan, "Blockchain Based Solution to Enhance Drug Supply Chain Management for Smart Pharmaceutical Industry," 2022 IEEE 10th Region 10 Humanitarian Technology Confer-ence (R10-HTC), Hyderabad, India, 2022, pp. 330-335, doi: 10.1109/R10-HTC54060.2022.9929913. [CrossRef]
  17. Lohmer, J.; Ribeiro da Silva, E.; Lasch, R. Blockchain Technology in Operations & Supply Chain Management: A Content Analysis. Sustainability 2022, 14, 6192. https://doi.org/10.3390/su14106192.
  18. Filipe Calvao, Victoria Gronwald, Blockchain in the Mining Industry: Implications for Sustainable Development in Africa, South African Institute of International Affairs (2019) Available online: https://www.jstor.org/stable/resrep29530 Accessed: 13-08-2023.
  19. United Nations Conference on Trade and Development (UNCTAD). (2017). Improving transparency and governance for value chains of artisanal mining: A preliminary assessment of the OECD Due Diligence Guidance for Responsible Supply Chains of Minerals from Conflict-Affected and High-Risk Areas. Available only.ne https://www.oecd.org/daf/inv/mne/OECD-Due-Diligence-Guidance-Minerals-Edition3.pdf Accessed 13.08.2023.
  20. X. Yang, M. Li, H. Yu, M. Wang, D. Xu and C. Sun, "A Trusted Blockchain-Based Traceability System for Fruit and Vegetable Agricultural Products," in IEEE Access, vol. 9, pp. 36282-36293, 2021, doi: 10.1109/ACCESS.2021.3062845.
  21. P. K. Patro, R. Jayaraman, K. Salah and I. Yaqoob, "Blockchain-Based Traceability for the Fishery Supply Chain," in IEEE Access, vol. 10, pp. 81134-81154, 2022, doi: 10.1109/ACCESS.2022.3196162.
  22. N. Sealey, A. Aijaz and B. Holden, "IOTA Tangle 2.0: Toward a Scalable, Decentralized, Smart, and Autonomous IoT Ecosystem," 2022 International Conference on Smart Applications, Communications and Networking (SmartNets), Palapye, Botswana, 2022, pp. 01-08. [CrossRef]
  23. J. García-Hernández, L. G. Marín-Collazos, G. Jiménez-Estévez and P. Mendoza-Araya, "Distributed Ledger Technologies Based Microgrid Energy Management Using IOTA Tangle," 2021 IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON), Valparaíso, Chile, 2021, pp. 1-5. [CrossRef]
  24. Greenwashing, Wikipedia, https://en.wikipedia.org/wiki/Greenwashing.
  25. Privacy by design in big data | ENISA report, available online https://www.enisa.europa.eu/publications/big-data-protection/at_download/fullReport accessed 10.08.2023.
  26. Zuiderveen Borgesius F (2016), 'Singling out people without knowing their names – Behavioural targeting, pseu-donymous data, and the new Data Protection Regulation' 32 Computer Law & Security Review 256.
  27. Thomas Zerdick, Pseudonymous data: processing personal data while mitigating risks, 21 December 2021, available online https://edps.europa.eu/press-publications/press-news/blog/pseudonymous-data-processing-personal-data-while-mitigating_en.
  28. Distributed, C., & Union, E. (n.d.). Distributed Ledger Technologies and Data Protection in the European Union. 1–57.
  29. IOTA Foundation. STREAMS-A Cryptographic Framework for Building Secure Messaging Protocols. 2021. Available online: https://github.com/iotaledger/streams (accessed on 26 November 2021) Accessed 15.08.2023.
  30. Louis Helmer, Andreas Penzkofer, Report on the energy consumption of the IOTA 2.0 prototype network (Go-Shimmer 0.8.3) under different testing scenarios, Distributed, Parallel, and Cluster Computing, DOI https://doi.org/10.48550/arXiv.2210.13996, Available online https://arxiv.org/abs/2210.13996.
  31. IOTA Distributed Ledger Technology software expansion for STM32Cube, Available online https://www.st.com/en/embedded-software/x-cube-iota1.html?rt=db&id=DB3959 Accessed 15.08.2023.
  32. Serguei Popov, IOTA: Feeless and Free, IEEE Blockchain Technical Briefs, January 2019, available online accessed 10.08.2023.
  33. IOTA Identity Specification https://wiki.iota.org/identity.rs/specs/did/iota_did_method_spec.
  34. IOTA DID Specification https://wiki.iota.org/identity.rs/specs/did/iota_did_method_spec.
  35. Verifiable Credentials Data Model v1.1 https://www.w3.org/TR/vc-data-model/.
  36. Decentralized Identifiers (DIDs) v1.0 https://www.w3.org/TR/did-core/.
  37. IOTA Stronghold https://github.com/iotaledger/stronghold.rs.
  38. IOTA 2.0 UTXO Specification https://wiki.iota.org/IOTA-2.0-Research-Specifications/5.1UTXO/.
  39. Carelli, A.; Palmieri, A.; Vilei, A.; Castanier, F.; Vesco, A. Enabling Secure Data Exchange through the IOTA Tangle for IoT Constrained Devices. Sensors 2022, 22, 1384. https://doi.org/10.3390/s22041384 available online: https://www.mdpi.com/1424-8220/22/4/1384 Nilsson, 329-332.
  40. IOTA Stardust, https://wiki.iota.org/introduction/stardust/explanations/what_is_stardust/.
  41. EU Reaches Landmark Agreement on Conflict Minerals Regulation, available online https://ec.europa.eu/commission/presscorner/detail/en/IP_16_3931 accessed 30.09.2023.
Figure 1. Dig_IT platform data collection from environment, humans and assets.
Figure 1. Dig_IT platform data collection from environment, humans and assets.
Preprints 95624 g001
Figure 2. Architecture and building blocks of the data collection mining monitoring system.
Figure 2. Architecture and building blocks of the data collection mining monitoring system.
Preprints 95624 g002
Table 1. Comparison of the DLT features.
Table 1. Comparison of the DLT features.
DLT TPS Price (€) DID OEM support Consensus mechanism
Ethereum 30 0,371 Yes* Yes* PoS
Polygon 7000 0,028 Yes No PoS
Polkadot 1000 0,07 Yes* No PoS
Cardano 250-1000 0,8 Yes No PoS
Algorand 10002 0,001 Yes Yes3* PoS
IOTA 2.0 10004 0 Yes Yes DAG
EOSIO 4000 0 Yes* No DPoS
0Bsnetwork NA 0,055 No No NG-DPoS
* Unofficial libraries developed by third parties.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated