当前位置: X-MOL 学术IEEE Commun. Surv. Tutor. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Digital Twin: A Comprehensive Survey of Security Threats
IEEE Communications Surveys & Tutorials ( IF 34.4 ) Pub Date : 4-29-2022 , DOI: 10.1109/comst.2022.3171465
Cristina Alcaraz 1 , Javier Lopez 1
Affiliation  

Industry 4.0 is having an increasingly positive impact on the value chain by modernizing and optimizing the production and distribution processes. In this streamline, the digital twin (DT) is one of the most cutting-edge technologies of Industry 4.0, providing simulation capabilities to forecast, optimize and estimate states and configurations. In turn, these technological capabilities are encouraging industrial stakeholders to invest in the new paradigm, though an increased focus on the risks involved is really needed. More precisely, the deployment of a DT is based on the composition of technologies such as cyber-physical systems, the Industrial Internet of Things, edge computing, virtualization infrastructures, artificial intelligence and big data. However, the confluence of all these technologies and the implicit interaction with the physical counterpart of the DT in the real world generate multiple security threats that have not yet been sufficiently studied. In that context, this paper analyzes the current state of the DT paradigm and classifies the potential threats associated with it, taking into consideration its functionality layers and the operational requirements in order to achieve a more complete and useful classification. We also provide a preliminary set of security recommendations and approaches that can help to ensure the appropriate and trustworthy use of a DT.

中文翻译:


数字孪生:安全威胁的全面调查



工业 4.0 通过生产和分销流程的现代化和优化,对价值链产生越来越积极的影响。在这一流程中,数字孪生 (DT) 是工业 4.0 最前沿的技术之一,提供模拟功能来预测、优化和估计状态和配置。反过来,这些技术能力正在鼓励工业利益相关者投资新范式,尽管确实需要更加关注所涉及的风险。更准确地说,DT的部署是基于信息物理系统、工业物联网、边缘计算、虚拟化基础设施、人工智能和大数据等技术的组合。然而,所有这些技术的融合以及与现实世界中DT的物理对应物的隐式交互产生了多种尚未得到充分研究的安全威胁。在此背景下,本文分析了DT范式的现状,并对与其相关的潜在威胁进行了分类,同时考虑了其功能层和操作要求,以实现更完整和有用的分类。我们还提供了一套初步的安全建议和方法,有助于确保正确且值得信赖地使用 DT。
更新日期:2024-08-26
down
wechat
bug