Visible to the public A Taxonomy of Security and Defense Mechanisms in Digital Twins-based Cyber-Physical Systems

TitleA Taxonomy of Security and Defense Mechanisms in Digital Twins-based Cyber-Physical Systems
Publication TypeConference Paper
Year of Publication2022
AuthorsHussaini, Adamu, Qian, Cheng, Liao, Weixian, Yu, Wei
Conference Name2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)
Keywordscomposability, Computational modeling, CPS modeling, Cyber-physical systems, digital twin, emulation, Internet of Things, Intrusion detection, Metrics, pubcrawl, resilience, Resiliency, security, simulation, smart transportation, social computing, Systematics, Taxonomy
AbstractThe (IoT) paradigm's fundamental goal is to massively connect the "smart things" through standardized interfaces, providing a variety of smart services. Cyber-Physical Systems (CPS) include both physical and cyber components and can apply to various application domains (smart grid, smart transportation, smart manufacturing, etc.). The Digital Twin (DT) is a cyber clone of physical objects (things), which will be an essential component in CPS. This paper designs a systematic taxonomy to explore different attacks on DT-based CPS and how they affect the system from a four-layer architecture perspective. We present an attack space for DT-based CPS on four layers (i.e., object layer, communication layer, DT layer, and application layer), three attack objects (i.e., confidentiality, integrity, and availability), and attack types combined with strength and knowledge. Furthermore, some selected case studies are conducted to examine attacks on representative DT-based CPS (smart grid, smart transportation, and smart manufacturing). Finally, we propose a defense mechanism called Secured DT Development Life Cycle (SDTDLC) and point out the importance of leveraging other enabling techniques (intrusion detection, blockchain, modeling, simulation, and emulation) to secure DT-based CPS.
DOI10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00112
Citation Keyhussaini_taxonomy_2022