Eman Shaikh, Nazeeruddin Mohammad, Abdulrahman Al-Ali, Shahabuddin Muhammad
{"title":"A Probabilistic Model Checking (PMC) Approach to Solve Security Issues in Digital Twin (DT)","authors":"Eman Shaikh, Nazeeruddin Mohammad, Abdulrahman Al-Ali, Shahabuddin Muhammad","doi":"10.1109/IDCIoT56793.2023.10053389","DOIUrl":null,"url":null,"abstract":"Recent years have observed a major rise in the utilization of Digital Twin (DT) technology. In general, a DT is described as a digital counterpart of a given physical entity that is obtained through the different stages of the DT development process: DT data collection, DT data transmission, DT generation, and DT visualization. However, these stages can be susceptible to various security attacks. This paper investigates the major security attacks that can occur throughout the stages of DT development and provides relevant countermeasures to counter these attacks. A use case of DT in the healthcare domain as an in-patient monitoring system is presented to provide a better understanding of the potential DT security attacks. Furthermore, to evaluate the security of DT, a security analysis approach in the form of a probabilistic model checking (PMC) is presented.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"79 1","pages":"192-197"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"物联网技术","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.1109/IDCIoT56793.2023.10053389","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Recent years have observed a major rise in the utilization of Digital Twin (DT) technology. In general, a DT is described as a digital counterpart of a given physical entity that is obtained through the different stages of the DT development process: DT data collection, DT data transmission, DT generation, and DT visualization. However, these stages can be susceptible to various security attacks. This paper investigates the major security attacks that can occur throughout the stages of DT development and provides relevant countermeasures to counter these attacks. A use case of DT in the healthcare domain as an in-patient monitoring system is presented to provide a better understanding of the potential DT security attacks. Furthermore, to evaluate the security of DT, a security analysis approach in the form of a probabilistic model checking (PMC) is presented.