ABSTRACT
Digital twins open up new possibilities in terms of monitoring, simulating, optimizing and predicting the state of cyber-physical systems (CPSs). Furthermore, we argue that a fully functional, virtual replica of a CPS can also play an important role in securing the system. In this work, we present a framework that allows users to create and execute digital twins, closely matching their physical counterparts. We focus on a novel approach to automatically generate the virtual environment from specification, taking advantage of engineering data exchange formats. From a security perspective, an identical (in terms of the system's specification), simulated environment can be freely explored and tested by security professionals, without risking negative impacts on live systems. Going a step further, security modules on top of the framework support security analysts in monitoring the current state of CPSs. We demonstrate the viability of the framework in a proof of concept, including the automated generation of digital twins and the monitoring of security and safety rules.
- K. M. Alam and A. El Saddik. 2017. C2PS: A Digital Twin Architecture Reference Model for the Cloud-Based Cyber-Physical Systems. IEEE Access Vol. 5 (2017), 2050--2062.Google ScholarCross Ref
- David I. Urbina, Jairo Giraldo, Alvaro A Cardenas, Junia Valente, Mustafa Faisal, Nils Ole Tippenhauer, Justin Ruths, Richard Candell, and Henrik Sandberg. 2016. Survey and new directions for physics-based attack detection in control systems. Technical Report. NIST.Google Scholar
- Ján Vachálek, Lukás Bartalskỳ, Oliver Rovnỳ, Dana Sivsmivsová, Martin Morhávc, and Milan Lokvsık. 2017. The digital twin of an industrial production line within the industry 4.0 concept 2017 21st International Conference on Process Control (PC). 258--262.Google Scholar
- C. Wang, L. Fang, and Y. Dai. 2010. A Simulation Environment for SCADA Security Analysis and Assessment 2010 International Conference on Measuring Technology and Mechatronics Automation, Vol. Vol. 1. 342--347. 2157--1473 Google ScholarDigital Library
Index Terms
- Towards Security-Aware Virtual Environments for Digital Twins
Recommendations
Industrial IoT lifecycle via digital twins
CODES '16: Proceedings of the Eleventh IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System SynthesisCurrently, the IoT discussion is focused primarily on the operational phase. This includes how a IoT device behaves, operates, communicates, and interacts with other IoT devices during operation. However, IoT devices and systems have other lifecycle ...
A Specification-based State Replication Approach for Digital Twins
CPS-SPC '18: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCyDigital twins play a key role in realizing the vision of a smart factory. While this concept is often associated with maintenance, optimization, and simulation, digital twins can also be leveraged to enhance the security and safety of cyber-physical ...
Digital Twins for IoT Security Management
Data and Applications Security and Privacy XXXVIIAbstractThe proliferation of Internet of Things (IoT) devices has increased the risk of cyber threats to the confidentiality, integrity, and availability of data processed. In this context, proactive security management has emerged as a critical strategy ...
Comments