4.8 Article

A Digital Twin Based Industrial Automation and Control System Security Architecture

期刊

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
卷 16, 期 1, 页码 669-680

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2019.2938885

关键词

Security; Computer architecture; Synchronization; Informatics; Automation; Cloud computing; Clocks; Digital twin; security; security analysis; security framework; state replication

资金

  1. Swedish Foundation for Strategic Research [RIT17-0032]
  2. [768892]

向作者/读者索取更多资源

The digital twin is a rather new industrial control and automation systems concept. While the approach so far has gained interest mainly due to capabilities to make advanced simulations and optimizations, recently the possibilities for enhanced security have got attention within the research community. In this article, we discuss how a digital twin replication model and corresponding security architecture can be used to allow data sharing and control of security-critical processes. We identify design-driving security requirements for digital twin based data sharing and control. We show that the proposed state synchronization design meets the expected digital twin synchronization requirements and give a high-level design and evaluation of other security components of the architecture. We also make performance evaluations of a proof of concept for protected software upgrade using the proposed digital twin design. Our new security framework provides a foundation for future research work in this promising new area.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Providing User Security Guarantees in Public Infrastructure Clouds

Nicolae Paladi, Christian Gehrmann, Antonis Michalas

IEEE TRANSACTIONS ON CLOUD COMPUTING (2017)

Proceedings Paper Computer Science, Information Systems

Secure Ownership Transfer for Resource Constrained IoT Infrastructures

Martin Gunnarsson, Christian Gehrmann

Summary: This paper presents a protocol for secure ownership transfer of constrained IoT devices. The protocol is resource-efficient and relies solely on symmetric cryptography. It has been rigorously analyzed for security requirements and its resource efficiency has been demonstrated through a proof of concept implementation.

INFORMATION SYSTEMS SECURITY AND PRIVACY, ICISSP 2020 (2022)

Article Computer Science, Information Systems

Metadata filtering for user-friendly centralized biometric authentication

Christian Gehrmann, Marcus Rodan, Niklas Jonsson

EURASIP JOURNAL ON INFORMATION SECURITY (2019)

暂无数据