Mitigating Security Threats for Digital Twin Platform: A Systematic Review with Future Scope and Research Challenges
Abstract
In Industry 4.0, the digital twin (DT) enables users to simulate future states and configurations for prediction, optimization, and estimation. Although the potential of digital twin technology has been demonstrated by its proliferation in traditional industrial sectors, including construction, manufacturing, transportation, supply chain, healthcare, and agriculture, the risks involved with their integration have frequently been overlooked. Moreover, as a digital approach, it is intuitive to believe it is susceptible to adversarial attacks. This issue necessitates research into the multitude of attacks that the digital twin may face. This study enumerates various probable operation-specific attacks against digital twin platforms. Also, a comprehensive review of different existing techniques has been carried out to combat these attacks. A comparison of these strategies is provided to shed light on their efficacy against various attacks. Finally, future directions and research issues are highlighted that will help researchers expand the digital twin platform.
Keywords
Full Text:
PDFReferences
M. O. Ozdogan, L. Carkacioglu, and B. Canberk, “Digital twin driven blockchain based reliable and efficient 6G edge network,” in 2022 18th International Conference on Distributed Computing in Sensor Systems (DCOSS), IEEE, 2022, pp. 342–348, doi: https://doi.org/10.1109/DCOSS54816.2022.00062.
R. Stark, C. Fresemann, and K. Lindow, “Development and operation of Digital Twins for technical systems and services,” CIRP Ann., vol. 68, no. 1, pp. 129–132, 2019, doi: https://doi.org/10.1016/j.cirp.2019.04.024.
D. M. Botín-Sanabria, A.-S. Mihaita, R. E. Peimbert-García, M. A. Ramírez-Moreno, R. A. Ramírez-Mendoza, and J. de J. Lozoya-Santos, “Digital twin technology challenges and applications: A comprehensive review,” Remote Sens., vol. 14, no. 6, p. 1335, 2022, doi: https://doi.org/10.3390/rs14061335.
M. Liebenberg and M. Jarke, “Information systems engineering with Digital Shadows: Concept and use cases in the Internet of Production,” Inf. Syst., vol. 114, p. 102182, Mar. 2023, doi: https://doi.org/10.1016/j.is.2023.102182.
H. Hassani, X. Huang, and S. MacFeely, “Impactful Digital Twin in the Healthcare Revolution,” Big Data Cogn. Comput., vol. 6, no. 3, p. 83, Aug. 2022, doi: https://doi.org/10.3390/bdcc6030083.
S. Sarp, M. Kuzlu, Y. Zhao, and O. Gueler, “Digital Twin in Healthcare: A Study for Chronic Wound Management,” IEEE J. Biomed. Heal. Informatics, vol. 27, no. 11, pp. 5634–5643, Nov. 2023, doi: https://doi.org/10.1109/JBHI.2023.3299028.
Z. Zhu, X. Xi, X. Xu, and Y. Cai, “Digital Twin-driven machining process for thin-walled part manufacturing,” J. Manuf. Syst., vol. 59, pp. 453–466, Apr. 2021, doi: https://doi.org/10.1016/j.jmsy.2021.03.015.
Y. Fan et al., “A digital-twin visualized architecture for Flexible Manufacturing System,” J. Manuf. Syst., vol. 60, pp. 176–201, Jul. 2021, doi: https://doi.org/10.1016/j.jmsy.2021.05.010.
Y. Maïzi and Y. Bendavid, “Building a digital twin for IoT smart stores: a case in retail and apparel industry,” Int. J. Simul. Process Model., vol. 16, no. 2, p. 147, 2021, doi: https://doi.org/10.1504/IJSPM.2021.115868.
R. R. Singh, G. Bhatti, D. Kalel, I. Vairavasundaram, and F. Alsaif, “Building a Digital Twin Powered Intelligent Predictive Maintenance System for Industrial AC Machines,” Machines, vol. 11, no. 8, p. 796, Aug. 2023, doi: https://doi.org/10.3390/machines11080796.
R. Rayhana, L. Bai, G. Xiao, M. Liao, and Z. Liu, “Digital Twin Models: Functions, Challenges, and Industry Applications,” IEEE J. Radio Freq. Identif., pp. 1–1, 2024, doi: https://doi.org/10.1109/JRFID.2024.3387996.
D. Mourtzis, “Digital twin inception in the Era of industrial metaverse,” Front. Manuf. Technol., vol. 3, p. 1155735, 2023, doi: https://doi.org/10.3389/fmtec.2023.1155735.
D. Holmes, M. Papathanasaki, L. Maglaras, M. A. Ferrag, S. Nepal, and H. Janicke, “Digital Twins and Cyber Security–solution or challenge?,” in 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), IEEE, 2021, pp. 1–8, doi: https://doi.org/10.3390/bdcc6030083.
R. Mattioli et al., Identifying Emerging Cybersecurity Threats and Challenges for 2030. ENISA_2, 2023. [Online]. Available: https://books.google.co.id/books?id=zlXbzwEACAAJ
A. Gerodimos, L. Maglaras, M. A. Ferrag, N. Ayres, and I. Kantzavelou, “IoT: Communication protocols and security threats,” Internet Things Cyber-Physical Syst., vol. 3, pp. 1–13, 2023, https://doi.org/10.1016/j.iotcps.2022.12.003.
B. Lei, P. Janssen, J. Stoter, and F. Biljecki, “Challenges of urban digital twins: A systematic review and a Delphi expert survey,” Autom. Constr., vol. 147, p. 104716, 2023, https://doi.org/10.1016/j.autcon.2022.104716.
C. Alcaraz and J. Lopez, “Digital twin: A comprehensive survey of security threats,” IEEE Commun. Surv. Tutorials, vol. 24, no. 3, pp. 1475–1503, 2022, doi: https://doi.org/10.1109/COMST.2022.3171465.
C. Mandolla, A. M. Petruzzelli, G. Percoco, and A. Urbinati, “Building a digital twin for additive manufacturing through the exploitation of blockchain: A case analysis of the aircraft industry,” Comput. Ind., vol. 109, pp. 134–152, 2019, https://doi.org/10.1016/j.compind.2019.04.011.
F. Tao et al., “Digital twin and blockchain enhanced smart manufacturing service collaboration and management,” J. Manuf. Syst., vol. 62, pp. 903–914, 2022, doi: https://doi.org/10.1016/j.jmsy.2020.11.008.
D. Guo et al., “A framework for personalized production based on digital twin, blockchain and additive manufacturing in the context of Industry 4.0,” in 2020 IEEE 16th International Conference on Automation Science and Engineering (CASE), IEEE, 2020, pp. 1181–1186, doi: https://doi.org/10.1109/CASE48305.2020.9216732
C. Zhang, G. Zhou, H. Li, and Y. Cao, “Manufacturing blockchain of things for the configuration of a data-and knowledge-driven digital twin manufacturing cell,” IEEE Internet Things J., vol. 7, no. 12, pp. 11884–11894, 2020, doi: https://doi.org/10.1109/JIOT.2020.3005729.
B. Putz, M. Dietz, P. Empl, and G. Pernul, “Ethertwin: Blockchain-based secure digital twin information management,” Inf. Process. Manag., vol. 58, no. 1, p. 102425, 2021, doi: https://doi.org/10.1016/j.ipm.2020.102425.
D. Lee, S. H. Lee, N. Masoud, M. S. Krishnan, and V. C. Li, “Integrated digital twin and blockchain framework to support accountable information sharing in construction projects,” Autom. Constr., vol. 127, p. 103688, 2021, doi: https://doi.org/10.1016/j.autcon.2021.103688
M. Li, Z. Li, X. Huang, and T. Qu, “Blockchain-based digital twin sharing platform for reconfigurable socialized manufacturing resource integration,” Int. J. Prod. Econ., vol. 240, p. 108223, 2021, doi: https://doi.org/10.1016/j.ijpe.2021.108223.
W. Shen, T. Hu, C. Zhang, and S. Ma, “Secure sharing of big digital twin data for smart manufacturing based on blockchain,” J. Manuf. Syst., vol. 61, pp. 338–350, 2021, doi: https://doi.org/10.1016/j.jmsy.2021.09.014.
Y. Lu, X. Huang, K. Zhang, S. Maharjan, and Y. Zhang, “Low-latency federated learning and blockchain for edge association in digital twin empowered 6G networks,” IEEE Trans. Ind. Informatics, vol. 17, no. 7, pp. 5098–5107, 2020, doi: https://doi.org/10.1109/TII.2020.3017668.
Y. Qu, L. Gao, Y. Xiang, S. Shen, and S. Yu, “Fedtwin: Blockchain-enabled adaptive asynchronous federated learning for digital twin networks,” IEEE Netw., vol. 36, no. 6, pp. 183–190, 2022, doi: https://doi.org/10.1109/MNET.105.2100620.
C. Wang, Z. Cai, and Y. Li, “Sustainable blockchain-based digital twin management architecture for IoT devices,” IEEE Internet Things J., vol. 10, no. 8, pp. 6535–6548, 2022, doi: https://doi.org/10.1109/JIOT.2022.3153653.
M. M. Salim, A. K. Comivi, T. Nurbek, H. Park, and J. H. Park, “A blockchain-enabled secure digital twin framework for early botnet detection in IIoT environment,” Sensors, vol. 22, no. 16, p. 6133, 2022, doi: https://doi.org/10.3390/s22166133.
T. Li, H. Wang, D. He, and J. Yu, “Synchronized provable data possession based on blockchain for digital twin,” IEEE Trans. Inf. Forensics Secur., vol. 17, pp. 472–485, 2022, doi: https://doi.org/10.1109/TIFS.2022.3144869.
D. Wang, B. Li, B. Song, Y. Liu, K. Muhammad, and X. Zhou, “Dual-driven resource management for sustainable computing in the blockchain-supported digital twin IoT,” IEEE Internet Things J., vol. 10, no. 8, pp. 6549–6560, 2022, doi: https://doi.org/10.1109/JIOT.2022.3162714.
Y. Liu et al., “A novel cloud-based framework for the elderly healthcare services using digital twin,” IEEE access, vol. 7, pp. 49088–49101, 2019, doi: https://doi.org/10.1109/ACCESS.2019.2909828.
S. Lipsa, R. K. Dash, and K. Cengiz, “An adaptive software-defined networking (SDN) for load balancing in cloud computing,” Intell. Netw. Des. Driven by Big Data Anal. IoT, AI Cloud Comput., p. 135, 2022, doi: https://doi.org/10.1049/PBPC054E_ch7.
V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, “A survey on IoT security: application areas, security threats, and solution architectures,” IEEE Access, vol. 7, pp. 82721–82743, 2019, doi: https://doi.org/10.1109/ACCESS.2019.2924045.
G. Premsankar, M. Di Francesco, and T. Taleb, “Edge computing for the Internet of Things: A case study,” IEEE Internet Things J., vol. 5, no. 2, pp. 1275–1284, 2018, doi: https://doi.org/10.1109/JIOT.2018.2805263.
L. Rosencrance, “6 significant issues that edge computing in IoT solves,” TechTarget. [Online]. Available: https://www.techtarget.com/iotagenda/feature/6-significant-issues-that-edge-computing-in-IoT-solves
M. Alrowaily and Z. Lu, “Secure edge computing in IoT systems: Review and case studies,” in 2018 IEEE/ACM symposium on edge computing (SEC), IEEE, 2018, pp. 440–444, doi: https://doi.org/10.1109/SEC.2018.00060.
J. Zhang, B. Chen, Y. Zhao, X. Cheng, and F. Hu, “Data security and privacy-preserving in edge computing paradigm: Survey and open issues,” IEEE access, vol. 6, pp. 18209–18237, 2018, doi: https://doi.org/10.1109/ACCESS.2018.2820162.
J. Zhang, Q. Li, X. Wang, B. Feng, and D. Guo, “Towards fast and lightweight spam account detection in mobile social networks through fog computing,” Peer-to-Peer Netw. Appl., vol. 11, pp. 778–792, 2018, doi: https://doi.org/10.1007/s12083-017-0559-3.
A. Alrawais, A. Alhothaily, C. Hu, X. Xing, and X. Cheng, “An attribute-based encryption scheme to secure fog communications,” IEEE access, vol. 5, pp. 9131–9138, 2017, doi: https://doi.org/10.1109/ACCESS.2017.2705076.
A. Alotaibi, A. Barnawi, and M. Buhari, “Attribute-based secure data sharing with efficient revocation in fog computing,” J. Inf. Secur., vol. 8, no. 3, pp. 203–222, 2017, doi: https://doi.org/10.4236/jis.2017.83014.
Y. Jiang, W. Susilo, Y. Mu, and F. Guo, “Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing,” Futur. Gener. Comput. Syst., vol. 78, pp. 720–729, 2018, doi: https://doi.org/10.1016/j.future.2017.01.026.
Z. Yu, M. H. Au, Q. Xu, R. Yang, and J. Han, “Towards leakage-resilient fine-grained access control in fog computing,” Futur. Gener. Comput. Syst., vol. 78, pp. 763–777, 2018, doi: https://doi.org/10.1016/j.future.2017.01.025.
F. Akbarian, E. Fitzgerald, and M. Kihl, “Intrusion detection in digital twins for industrial control systems,” in 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), IEEE, 2020, pp. 1–6, doi: https://doi.org/10.23919/SoftCOM50211.2020.9238162.
N. Chaabouni, M. Mosbah, A. Zemmari, C. Sauvignac, and P. Faruki, “Network intrusion detection for IoT security based on learning techniques,” IEEE Commun. Surv. Tutorials, vol. 21, no. 3, pp. 2671–2701, 2019, doi: https://doi.org/10.1109/COMST.2019.2896380.
M. Ge, X. Fu, N. Syed, Z. Baig, G. Teo, and A. Robles-Kelly, “Deep learning-based intrusion detection for IoT networks,” in 2019 IEEE 24th pacific rim international symposium on dependable computing (PRDC), IEEE, 2019, pp. 256–25609, doi: https://doi.org/10.1109/PRDC47002.2019.00056.
S. Raza, L. Wallgren, and T. Voigt, “SVELTE: Real-time intrusion detection in the Internet of Things,” Ad hoc networks, vol. 11, no. 8, pp. 2661–2674, 2013, doi: https://doi.org/10.1016/j.adhoc.2013.04.014.
S. Smys, A. Basar, and H. Wang, “Hybrid intrusion detection system for internet of things (IoT),” J. ISMAC, vol. 2, no. 04, pp. 190–199, 2020, doi: https://doi.org/10.36548/jismac.2020.4.002.
E. Hodo et al., “Threat analysis of IoT networks using artificial neural network intrusion detection system,” in 2016 International Symposium on Networks, Computers and Communications (ISNCC), IEEE, 2016, pp. 1–6, doi:
https://doi.org/10.1109/ISNCC.2016.7746067.
Y. Zhang, P. Li, and X. Wang, “Intrusion detection for IoT based on improved genetic algorithm and deep belief network,” IEEE Access, vol. 7, pp. 31711–31722, 2019, doi:
https://doi.org/10.1109/ACCESS.2019.2903723.
W. Li, S. Tug, W. Meng, and Y. Wang, “Designing collaborative blockchained signature-based intrusion detection in IoT environments,” Futur. Gener. Comput. Syst., vol. 96, pp. 481–489, 2019, doi: https://doi.org/10.1016/j.future.2019.02.064.
M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi, and A. Razaque, “Deep recurrent neural network for IoT intrusion detection system,” Simul. Model. Pract. Theory, vol. 101, p. 102031, 2020, doi: https://doi.org/10.1016/j.simpat.2019.102031.
F. Alsakran, G. Bendiab, S. Shiaeles, and N. Kolokotronis, “Intrusion detection systems for smart home iot devices: experimental comparison study,” in International Symposium on Security in Computing and Communication, Springer, 2019, pp. 87–98, doi: https://doi.org/10.1007/978-981-15-4825-3_7.
G. Bovenzi, G. Aceto, D. Ciuonzo, V. Persico, and A. Pescapé, “A hierarchical hybrid intrusion detection approach in IoT scenarios,” in GLOBECOM 2020-2020 IEEE global communications conference, IEEE, 2020, pp. 1–7, doi: https://doi.org/10.1109/GLOBECOM42002.2020.9348167.
V. Kumar, A. K. Das, and D. Sinha, “UIDS: a unified intrusion detection system for IoT environment,” Evol. Intell., vol. 14, no. 1, pp. 47–59, 2021, doi: https://doi.org/10.1007/s12065-019-00291-w.
H. Qiu, T. Dong, T. Zhang, J. Lu, G. Memmi, and M. Qiu, “Adversarial attacks against network intrusion detection in IoT systems,” IEEE Internet Things J., vol. 8, no. 13, pp. 10327–10335, 2020, doi: https://doi.org/10.1109/JIOT.2020.3048038.
Y. Otoum, D. Liu, and A. Nayak, “DL‐IDS: a deep learning–based intrusion detection framework for securing IoT,” Trans. Emerg. Telecommun. Technol., vol. 33, no. 3, p. e3803, 2022, doi: https://doi.org/10.1002/ett.3803.
S. Baniasadi, O. Rostami, D. Martín, and M. Kaveh, “A novel deep supervised learning-based approach for intrusion detection in IoT systems,” Sensors, vol. 22, no. 12, p. 4459, 2022, doi: https://doi.org/10.3390/s22124459.
M. Sarhan, S. Layeghy, N. Moustafa, M. Gallagher, and M. Portmann, “Feature extraction for machine learning-based intrusion detection in IoT networks,” Digit. Commun. Networks, 2022, doi: https://doi.org/10.1016/j.dcan.2022.08.012.
W. W. Lo, S. Layeghy, M. Sarhan, M. Gallagher, and M. Portmann, “E-graphsage: A graph neural network based intrusion detection system for iot,” in NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, IEEE, 2022, pp. 1–9, doi: https://doi.org/10.1109/NOMS54207.2022.9789878.
M. A. Khan et al., “Voting classifier-based intrusion detection for iot networks,” in Advances on Smart and Soft Computing: Proceedings of ICACIn 2021, Springer, 2022, pp. 313–328, doi: https://doi.org/10.48550/arXiv.2104.10015.
D. Su and Z. Qu, “Detection ddos of attacks based on federated learning with digital twin network,” in International Conference on Knowledge Science, Engineering and Management, Springer, 2022, pp. 153–164, doi: https://doi.org/10.1007/978-3-031-10989-8_13.
T. Mohamed, M. Kezunovic, J. Lusher, J. C. Liu, and J. Ren, “The use of digital twin for timing intrusion detection in synchrophasor systems,” in 2022 IEEE Power & Energy Society General Meeting (PESGM), IEEE, 2022, pp. 1–5, doi: https://doi.org/10.1109/PESGM48719.2022.9916964.
Q. Xu, S. Ali, and T. Yue, “Digital twin-based anomaly detection in cyber-physical systems,” in 2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST), IEEE, 2021, pp. 205–216, doi: https://doi.org/10.1109/ICST49551.2021.00031.
M. Groshev, C. Guimarães, J. Martín-Pérez, and A. de la Oliva, “Toward intelligent cyber-physical systems: Digital twin meets artificial intelligence,” IEEE Commun. Mag., vol. 59, no. 8, pp. 14–20, 2021, doi: https://doi.org/10.1109/MCOM.001.2001237.
S. A. Varghese, A. D. Ghadim, A. Balador, Z. Alimadadi, and P. Papadimitratos, “Digital twin-based intrusion detection for industrial control systems,” in 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), IEEE, 2022, pp. 611–617, doi: https://doi.org/10.1109/PerComWorkshops53856.2022.9767492.
S. Lipsa, T. N. Nguyen, and R. K. Dash, “A New Signature-Based Blockchain Paradigm: Foreseeable Impact on Healthcare Applications,” IEEE Internet Things Mag., vol. 5, no. 3, pp. 146–151, 2022, doi: https://doi.org/10.1109/IOTM.001.2200017.
S. Lipsa and R. K. Dash, “A Novel Dimensionality Reduction Strategy Based on Linear Regression with a Fine-Pruned Decision Tree Classifier for Detecting DDoS Attacks in Cloud Computing Environments,” in International Symposium on Artificial Intelligence, Springer, 2022, pp. 15–25, doi: https://doi.org/10.1007/978-3-031-22485-0_2.
S. Lipsa and R. K. Dash, “A novel intrusion detection system based on deep learning and random forest for digital twin on IOT platform,” Int. J. Sch. Res. Eng. Technol, vol. 2, pp. 51–64, 2023, doi: 10.56781/ijsret.2023.2.1.0020.
K. Cengiz, S. Lipsa, R. K. Dash, N. Ivković, and M. Konecki, “A novel intrusion detection system based on artificial neural network and genetic algorithm with a new dimensionality reduction technique for UAV communication,” IEEE Access, 2024, doi: https://doi.org/10.1109/ACCESS.2024.3349469.
DOI: http://dx.doi.org/10.24042/ijecs.v4i1.22279
Refbacks
- There are currently no refbacks.
International Journal of Electronics and Communications System (IJECS) is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.