Security Attacks and Solutions for Digital Twins

02/25/2022
by   Sabah Suhail, et al.
0

Digital twins, being the virtual replicas of their physical counterparts, share the expected functional requirements and operational behavior of the underlying systems. Due to this fact, digital twins may act as a potential source of data breaches. Attackers may exploit the valuable knowledge about the system accessible through digital twins to put digital twins into a malicious state. We focus on potential attack strategies on digital twins ranging from digital twin's design to the dismissal phase. Next, we discuss defensive strategies to thwart the identified attacks on digital twins. Finally, we outline future research challenges that must be addressed to deal with malicious digital twins.

READ FULL TEXT
research
09/29/2022

Digital and Physical Face Attacks: Reviewing and One Step Further

With the rapid progress over the past five years, face authentication ha...
research
07/04/2023

Digital Sovereignty Strategies for Every Nation

Digital Sovereignty must be on the agenda of every modern nation. Digita...
research
05/22/2022

Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications

The expansive globalization of the semiconductor supply chain has introd...
research
05/03/2023

Digital and Cloud Forensic Challenges

Digital forensics and cloud forensics are increasingly important fields ...
research
06/15/2020

Man, machine and work in a digital twin setup: a case study

This paper explores the opportunities of using a digital twin to address...
research
12/20/2021

Mind-proofing Your Phone: Navigating the Digital Minefield with GreaseTerminator

Digital harms are widespread in the mobile ecosystem. As these devices g...
research
08/25/2023

Implementing Snort Intrusion Prevention System (IPS) for Network Forensic Analysis

The security trade confidentiality, integrity and availability are the m...

Please sign up or login with your details

Forgot password? Click here to reset