Eman Shaikh, Nazeeruddin Mohammad, Abdulrahman Al-Ali, Shahabuddin Muhammad
{"title":"一种解决数字孪生(DT)安全问题的概率模型检验(PMC)方法","authors":"Eman Shaikh, Nazeeruddin Mohammad, Abdulrahman Al-Ali, Shahabuddin Muhammad","doi":"10.1109/IDCIoT56793.2023.10053389","DOIUrl":null,"url":null,"abstract":"Recent years have observed a major rise in the utilization of Digital Twin (DT) technology. In general, a DT is described as a digital counterpart of a given physical entity that is obtained through the different stages of the DT development process: DT data collection, DT data transmission, DT generation, and DT visualization. However, these stages can be susceptible to various security attacks. This paper investigates the major security attacks that can occur throughout the stages of DT development and provides relevant countermeasures to counter these attacks. A use case of DT in the healthcare domain as an in-patient monitoring system is presented to provide a better understanding of the potential DT security attacks. Furthermore, to evaluate the security of DT, a security analysis approach in the form of a probabilistic model checking (PMC) is presented.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"79 1","pages":"192-197"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Probabilistic Model Checking (PMC) Approach to Solve Security Issues in Digital Twin (DT)\",\"authors\":\"Eman Shaikh, Nazeeruddin Mohammad, Abdulrahman Al-Ali, Shahabuddin Muhammad\",\"doi\":\"10.1109/IDCIoT56793.2023.10053389\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent years have observed a major rise in the utilization of Digital Twin (DT) technology. In general, a DT is described as a digital counterpart of a given physical entity that is obtained through the different stages of the DT development process: DT data collection, DT data transmission, DT generation, and DT visualization. However, these stages can be susceptible to various security attacks. This paper investigates the major security attacks that can occur throughout the stages of DT development and provides relevant countermeasures to counter these attacks. A use case of DT in the healthcare domain as an in-patient monitoring system is presented to provide a better understanding of the potential DT security attacks. Furthermore, to evaluate the security of DT, a security analysis approach in the form of a probabilistic model checking (PMC) is presented.\",\"PeriodicalId\":60583,\"journal\":{\"name\":\"物联网技术\",\"volume\":\"79 1\",\"pages\":\"192-197\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"物联网技术\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.1109/IDCIoT56793.2023.10053389\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"物联网技术","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.1109/IDCIoT56793.2023.10053389","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Probabilistic Model Checking (PMC) Approach to Solve Security Issues in Digital Twin (DT)
Recent years have observed a major rise in the utilization of Digital Twin (DT) technology. In general, a DT is described as a digital counterpart of a given physical entity that is obtained through the different stages of the DT development process: DT data collection, DT data transmission, DT generation, and DT visualization. However, these stages can be susceptible to various security attacks. This paper investigates the major security attacks that can occur throughout the stages of DT development and provides relevant countermeasures to counter these attacks. A use case of DT in the healthcare domain as an in-patient monitoring system is presented to provide a better understanding of the potential DT security attacks. Furthermore, to evaluate the security of DT, a security analysis approach in the form of a probabilistic model checking (PMC) is presented.