Towards Secure Digital Twins

被引:6
作者
Kulik, Tomas [1 ]
Gomes, Claudio [2 ]
Macedo, Hugo Daniel [2 ]
Hallerstede, Stefan [2 ]
Larsen, Peter Gorm [2 ]
机构
[1] Sweet Geeks, Innovat Alle 3, DK-7100 Vejle, Denmark
[2] Aarhus Univ, Dept Elect & Comp Engn, DIGIT, Finlandsgade 22, DK-8200 Aarhus, Denmark
来源
LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION. PRACTICE, ISOLA 2022, PT IV | 2022年 / 13704卷
关键词
Digital twins; Cyber security; Security model; SYSTEMS;
D O I
10.1007/978-3-031-19762-8_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced digital technology is finding its way into industrial production and control systems. This led to development of further concepts such as digital shadow and digital twin. In the former an accurate model of the cyber-physical system (CPS) is used to monitor it virtually, while the latter provides a possibility to adapt the CPS's behavior. These developments are often welcome from the operators perspective, however they also pose new challenges in terms of cyber security: an operator could be led to believe the system is operating correctly due to the represented digital image while the CPS is under a cyber attack. In this paper we investigate several cyber security challenges of the digital twin technology and discuss potential mitigations for these challenges based on well established practices within the area of industrial control systems. We further describe the potential cyber attacks and mitigations using a semi-formal notation based on problem frames, we suggest in order to simplify the communication about cyber security challenges of digital twins between different stakeholders. This is shown within a context of a small case study. Finally we outline areas of research for the development of secure digital twin technology.
引用
收藏
页码:159 / 176
页数:18
相关论文
共 30 条
[1]  
[Anonymous], 2005, Securing SCADA Systems
[2]  
Atalay M, 2020, 2020 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR INDUSTRY 4.0 & IOT (METROIND4.0&IOT), P435, DOI [10.1109/metroind4.0iot48571.2020.9138264, 10.1109/MetroInd4.0IoT48571.2020.9138264]
[3]  
Badhwar R., 2021, The CISO's Next Frontier, P259, DOI [10.1007/978-3-030-75354-232, DOI 10.1007/978-3-030-75354-232]
[4]   Low rate DDoS mitigation using real-time multi threshold traffic monitoring system [J].
Baskar, M. ;
Ramkumar, J. ;
Karthikeyan, C. ;
Anbarasu, V. ;
Balaji, A. ;
Arulananth, T. S. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
[5]  
Bécue A, 2018, 2018 14TH IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS (WFCS 2018)
[6]  
Bianchin G., 2018, Cyber-Physical Systems Security, P157, DOI [DOI 10.1007/978-3-319-98935-88, 10.1007/978-3-319-98935-8_8, DOI 10.1007/978-3-319-98935-8_8]
[7]   Digital Twins in Health Care: Ethical Implications of an Emerging Engineering Paradigm [J].
Bruynseels, Koen ;
de Sio, Filippo Santoni ;
van den Hoven, Jeroen .
FRONTIERS IN GENETICS, 2018, 9
[8]   Towards Security-Aware Virtual Environments for Digital Twins [J].
Eckhart, Matthias ;
Ekelhart, Andreas .
CPSS'18: PROCEEDINGS OF THE 4TH ACM WORKSHOP ON CYBER-PHYSICAL SYSTEM SECURITY, 2018, :61-72
[9]  
Feng H., 2021, 2021 ANN MOD SIM C A, DOI [10.23919/annsim52504.2021.9552135, DOI 10.23919/ANNSIM52504.2021.9552135]
[10]  
Feng H., 2021, arXiv