Digital Twin for Wireless Networks: Security Attacks and Solutions

被引:4
作者
Wang, Weizheng [1 ]
Yang, Yaoqi [2 ]
Khan, Latif U. [3 ]
Niyato, Dusit [4 ]
Han, Zhu [5 ]
Guizani, Mohsen [3 ]
机构
[1] City Univ Hong Kong, Hong Kong, Peoples R China
[2] Army Engn Univ PLA, Nanjing, Peoples R China
[3] Mohamed Bin Zayed Univ Artificial Intelligence, Abu Dhabi, U Arab Emirates
[4] Nanyang Technol Univ, Singapore, Singapore
[5] Univ Houston, Houston, TX USA
关键词
Security; Monitoring; Communication system security; Wireless networks; Mathematical models; Jamming; Digital twins;
D O I
10.1109/MWC.020.2200609
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Emerging applications (e.g., human-computer interaction, digital healthcare, and intelligent transportation systems) can be effectively enabled using digital twins (DTs) that combine the virtual model of a physical system with other technologies/ schemes (i.e., mathematical optimization, game theory, and machine learning). Although DTs can well enable wireless systems, they will suffer from various security attacks. Therefore, this article presents an overview of security attacks and concerns in a DT-enabled wireless system. We propose a general framework that will serve as guidelines for future DT-enabled wireless systems. Additionally, we present two use cases to show the effectiveness of the proposed framework. A Stackelberg game-enabled model is provided to effectively enable anti-jamming attacks. In addition a residual- enabled reweighting aggregation scheme furnishes robust training against flawed parameters. Finally, we present an outlook on future directions.
引用
收藏
页码:278 / 285
页数:8
相关论文
共 14 条
  • [1] Fu Shuhao, 2019, ARXIV
  • [2] Digital Twin: Enabling Technologies, Challenges and Open Research
    Fuller, Aidan
    Fan, Zhong
    Day, Charles
    Barlow, Chris
    [J]. IEEE ACCESS, 2020, 8 : 108952 - 108971
  • [3] Gelenbe E., 2020, 2020 9th Mediterranean Conference on Embedded Computing (MECO), P1, DOI DOI 10.1109/MECO49872.2020.9134241
  • [4] Khan L. U., 2022, arXiv
  • [5] Khan L. U., 2023, arXiv
  • [6] Digital-Twin-Enabled 6G: Vision, Architectural Trends, and Future Directions
    Khan, Latif U.
    Saad, Walid
    Niyato, Dusit
    Han, Zhu
    Hong, Choong Seon
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2022, 60 (01) : 74 - 80
  • [7] State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions
    Krishna, Ritika Raj
    Priyadarshini, Aanchal
    Jha, Amitkumar V.
    Appasani, Bhargav
    Srinivasulu, Avireni
    Bizon, Nicu
    [J]. SUSTAINABILITY, 2021, 13 (16)
  • [8] A deep learning approach for effective intrusion detection in wireless networks using CNN
    Riyaz, B.
    Ganapathy, Sannasi
    [J]. SOFT COMPUTING, 2020, 24 (22) : 17265 - 17278
  • [9] Physical layer attack identification and localization in cyber-physical grid: An ensemble deep learning based approach
    Sakhnini, Jacob
    Karimipour, Hadis
    Dehghantanha, Ali
    Parizi, Reza M.
    [J]. PHYSICAL COMMUNICATION, 2021, 47
  • [10] Suhail S., 2022, ARXIV