Towards Security-Aware Virtual Environments for Digital Twins

被引:104
作者
Eckhart, Matthias [1 ]
Ekelhart, Andreas [2 ]
机构
[1] TU Wien, Inst Informat Syst Engn, Christian Doppler Lab SQI, Vienna, Austria
[2] SBA Res, Vienna, Austria
来源
CPSS'18: PROCEEDINGS OF THE 4TH ACM WORKSHOP ON CYBER-PHYSICAL SYSTEM SECURITY | 2018年
基金
奥地利科学基金会;
关键词
Cyber-physical systems; industrial control systems; digital twin; simulation; security monitoring; AutomationML; SYSTEM;
D O I
10.1145/3198458.3198464
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital twins open up new possibilities in terms of monitoring, simulating, optimizing and predicting the state of cyber-physical systems (CPSs). Furthermore, we argue that a fully functional, virtual replica of a CPS can also play an important role in securing the system. In this work, we present a framework that allows users to create and execute digital twins, closely matching their physical counterparts. We focus on a novel approach to automatically generate the virtual environment from specification, taking advantage of engineering data exchange formats. From a security perspective, an identical (in terms of the system's specification), simulated environment can be freely explored and tested by security professionals, without risking negative impacts on live systems. Going a step further, security modules on top of the framework support security analysts in monitoring the current state of CPSs. We demonstrate the viability of the framework in a proof of concept, including the automated generation of digital twins and the monitoring of security and safety rules.
引用
收藏
页码:61 / 72
页数:12
相关论文
共 36 条
[1]   C2PS: A Digital Twin Architecture Reference Model for the Cloud-Based Cyber-Physical Systems [J].
Alam, Kazi Masudul ;
El Saddik, Abdulmotaleb .
IEEE ACCESS, 2017, 5 :2050-2062
[2]  
[Anonymous], 2003, 611313 IEC
[3]  
[Anonymous], 2011, The impact of control technology
[4]  
[Anonymous], 2010, 1 WORKSH SEC CONTR S
[5]  
Antonioli D., 2015, P 1 ACM WORKSH CYB P, P91
[6]  
AutomationML, 2014, V1000 AUTOMATIONML C
[7]  
Caselli M, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P791
[8]  
Caselli Marco, 2015, P 1 ACM WORKSH CYB P, P13, DOI [10.1145/2732198.2732200, DOI 10.1145/2732198.2732200]
[9]  
Chromik Justyna J., 2016, WHATS HOOD IMPROVING, DOI [10.1109/CPSRSG.2016.7684100, DOI 10.1109/CPSRSG.2016.7684100]
[10]  
Dong X, 2015, PROC 1 ACM WORKSHOP, P61