Navigating the Digital Twin Network landscape: A survey on architecture, applications, privacy and security

被引:0
|
作者
Sai, Akshita Maradapu Vera Venkata [1 ]
Wang, Chenyu [2 ]
Cai, Zhipeng [3 ]
Li, Yingshu [3 ]
机构
[1] Towson Univ, Dept Comp & Informat Sci, Towson, MD 21252 USA
[2] Kennesaw State Univ, Dept Software Engn & Game Dev, Marietta, GA 30060 USA
[3] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30303 USA
来源
HIGH-CONFIDENCE COMPUTING | 2024年 / 4卷 / 04期
基金
美国国家科学基金会;
关键词
Digital Twin Networks; Network architecture; Privacy and security; Federated learning; Blockchain; Internet of Vehicles; 6G; Supply chain; EDGE COLLABORATION; FRAMEWORK; CONTEXT;
D O I
10.1016/j.hcc.2024.100269
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, immense developments have occurred in the field of Artificial Intelligence (AI) and the spread of broadband and ubiquitous connectivity technologies. This has led to the development and commercialization of Digital Twin (DT) technology. The widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks (DTNs), which orchestrate through the networks of ubiquitous DTs and their corresponding physical assets. DTNs create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing, computing, and DT modeling. The high volume of user data and the ubiquitous communication systems in DTNs come with their own set of challenges. The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches. Also, currently, there is not enough literature that focuses on privacy and security issues in DTN applications. In this survey, we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their performance. Next, we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN's complex and interleaved communications and the respective components. We then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the DTNs. We also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the issues. Finally, we provide some open research issues and problems in the field of DTN privacy and security. (c) 2024 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:21
相关论文
共 50 条
  • [21] Architecture to Deploy and Operate a Digital Twin Optical Network
    Vilalta, R.
    Casellas, R.
    Gifre, Ll
    Munoz, R.
    Martinez, R.
    Pastor, A.
    Lopez, D.
    Fernandez-Palacios, J. P.
    2022 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXHIBITION (OFC), 2022,
  • [22] A Reference Architecture for Improving Security and Privacy in Internet of Things Applications
    Addo, Ivor D.
    Ahamed, Sheikh I.
    Yau, Stephen S.
    Buduru, Arun
    2014 IEEE INTERNATIONAL CONFERENCE ON MOBILE SERVICES (MS), 2014, : 108 - 115
  • [23] Digital Twin Applications: A Survey of Recent Advances and Challenges
    da Silva Mendonca, Rafael
    de Oliveira Lins, Sidney
    de Bessa, Iury Valente
    de Carvalho Ayres, Florindo Antonio, Jr.
    de Medeiros, Renan Landau Paiva
    de Lucena, Vicente Ferreira, Jr.
    PROCESSES, 2022, 10 (04)
  • [24] Improving cloud storage and privacy security for digital twin based medical records
    Haibo Yi
    Journal of Cloud Computing, 12
  • [25] Improving cloud storage and privacy security for digital twin based medical records
    Yi, Haibo
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [26] A Digital Twin Based Industrial Automation and Control System Security Architecture
    Gehrmann, Christian
    Gunnarsson, Martin
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (01) : 669 - 680
  • [27] Characterizing Security and Privacy Practices in Emerging Digital Credit Applications
    Bowers, Jasmine
    Sherman, Imani N.
    Butler, Kevin R. B.
    Traynor, Patrick
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 94 - 104
  • [28] A Security and Privacy Survey for WSN in e-Health Applications
    Cosio Leon, Maria de los Angeles
    Nieto Hipolito, Juan Ivan
    Luna Garcia, Jesus
    CERMA: 2009 ELECTRONICS ROBOTICS AND AUTOMOTIVE MECHANICS CONFERENCE, 2009, : 125 - +
  • [29] A Survey: Comparative Study of Applications, Attacks, Security and Privacy in VANETs
    Luckshetty, Aakash
    Dontal, Sindhu
    Tangade, Shrikant
    Manvi, Sunilkumar S.
    2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), VOL. 1, 2016, : 1594 - 1598
  • [30] Security and Privacy on 6G Network Edge: A Survey
    Mao, Bomin
    Liu, Jiajia
    Wu, Yingying
    Kato, Nei
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (02): : 1095 - 1127