Abstract
Digital twin technology is poised to become an ubiquitous addition to the global technology landscape. As with every other technology or computing capability, platform, environment or ecosystem, risk always accompanies benefit. In order to mitigate risk and effect robust, safe, secure computing environments and capabilities, one must first identify and comprehend the implications of unmodulated risk.
Digital twin technology is no exception—in fact quite the contrary. As a consequence of digital twins being intrinsically associated with physical objects, the potential for negative outcomes is greater than for many other computing applications. Because digital twins will be employed in applications that interact with and control real-world, physical objects, they will also affect human beings who use or rely on those very real objects that are ubiquitous in our everyday physical world.
This chapter discusses the specific areas of cybersecurity and dependability risk in digital twin environments and applications. Dependable systems must also be secure and safe. There is both interplay and interdependency between elements of dependable systems and elements of secure systems.
The challenge of making systems dependable and secure is exacerbated in situations where components are physically more exposed and, therefore, potentially vulnerable to attack by external agents or entities. Such is the case for systems that employ digital twins—engendering a serious imperative to address cybersecurity and dependability. Neglecting to do so invites more serious consequences—not the least of which is harm to humans—as these systems involve physical, real-world objects with which human beings will interact.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, L., Ali Babar, M., & Nuseibeh, B. (2013). Characterizing architecturally significant requirements. IEEE Software, 30(2), 38–45. https://doi.org/10.1109/MS.2012.174
Tarvainen, P. (2008). Adaptability evaluation at software architecture level. The Open Software Engineering Journal, 2, 1–30. https://doi.org/10.2174/1874107X00802010001
Schmidt, D., Stal, M., Rohnert, H., & Buschmann, F. (2000). Pattern-oriented software architecture (Vol. 2). Wiley.
Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., & Stal, M. (1996). Pattern-oriented software architecture: A system of patterns (Vol. 1). Wiley.
Piroumian, V. (2021). Digital twins: Universal interoperability for the digital age. IEEE Computer, 54(1), 61–69.
The Readers Digest Great Encyclopedic Dictionary. The Readers Digest Association. 1966.
Minerva, R., Myoung, L. G., Crespi, & Noël. (2020). Digital twin in the IoT context: A survey on technical features, scenarios and architectural models. Proceedings of the IEEE, 108(10).
The American Heritage Dictionary. (1982). Houghton Mifflin Company.
Wikipedia. Simulation. https://en.wikipedia.org/wiki/Simulation. Accessed 2021.
Webster’s Seventh New Collegiate Dictionary. (1967). G. & C. Merriam Company, Publishers
Furht, B., Grostick, D., Gluch, D., Rabbat, G., Parker, J., & McRoberts, M. (1991). Introduction to real-time computing. In Real-time UNIX® systems. The Kluwer international series in engineering and computer science (real-time systems) (Vol. 121). Springer. https://doi.org/10.1007/978-1-4615-3978-0_1
Radu, A., Cofaru, C., Tolea, B., & Dima, D. (2018). Study regarding the influence of airbag deployment time on the occupant injury level during a frontal vehicle collision. MATEC Web of Conferences, 184, 01007. https://doi.org/10.1051/matecconf/201818401007
Guo, J., Jian, X., & Lin, G. (2014). Performance evaluation of an anti-lock braking system for electric vehicles with a fuzzy sliding mode controller. Energies, 7, 6459–6476. https://doi.org/10.3390/en7106459
National Institute of Standards and Technology (NIST). Risk Management Framework For Information Systems And Organizations. NIST SP 800–37, REVISION 2. https://doi.org/10.6028/NIST.SP.800-37r2. Accessed 2021.
Kaufman, C., Perlman, R., & Speciner, M. (2002). Network security: Private communication in a public world. Prentice-Hall.
Xie, M., Kim-Leng, P., & Dai, Y.-S. (2004). Computing system reliability, models and analysis. Springer.
Wikipedia article. Reliability, availability and serviceability. https://en.wikipedia.org/wiki/Reliability,_availability_and_serviceability. Accessed 2021.
Ross, R. S., Pillitteri, V. Y., Graubart, R., Bodeau, D., & McQuaid, R. Developing cyber resilient systems: A systems security engineering approach (Vol. 2, pp. 800–160). NIST Special Publication. https://doi.org/10.6028/NIST.SP.800-160v2
Wikipedia. Computer security. https://en.wikipedia.org/wiki/Computer_security#cite_ref-:2_1-0. Accessed 2021.
Voas, J., Mell, P., & Piroumian, V. Considerations for digital twin technology and emerging standards. NISTIR 8356. https://doi.org/10.6028/NIST.IR.8356-draft
Voas, J., Kuhn, R., Laplante, P., & Applebaum, S. (2018). Internet of things (IoT) trust concerns. National Institute of Standards and Technology (NIST).
Fagan, M., Megas, K. N., Scarfone, K., & Smith, M. National Institute of Standards and Technology (NIST). Foundational Cybersecurity Activities for IoT Device Manufacturers. https://doi.org/10.6028/NIST.IR.8259
Fagan, M., Megas, K. N., Scarfone, K., & Smith, M. National Institute of Standards and Technology (NIST). IoT Device Cybersecurity Capability Core Baseline. https://doi.org/10.6028/NIST.IR.8259A
Padlipsky, M. A. (1985). The elements of networking style. Prentice-Hall.
US Department of Transportation Federal Aviation Administration. (2016). Performance based navigation, navigation strategy 2016. https://www.faa.gov/nextgen/media/PBN_NAS_NAV.pdf
Dillingham, Gerald L. “Next generation air transportation system.” United States Government Accountability Office. GAO-07-784-T. 2007.
Hurn, J. (1989). GPS, a guide to the next utility. Trimble Navigation.
Paulson, C., & Toth, P. (2021). Small business information security: The fundamentals. NISTIR 7621, Revision 1. https://doi.org/10.6028/NIST.IR.7621r1. Accessed 2021.
Koppel, T. (2016). Lights out: A cyberattack, a nation unprepared, surviving the aftermath. Crown Publishing Group. ISBN-10: 0553419986, ISBN-13: 978-0553419986.
Federal Aviation Administration. NextGen Implementation Plan, 2018–2019. https://www.faa.gov/nextgen/media/NextGen_Implementation_Plan-2018-19.pdf
Boeckl, K., Fagan, M., Fisher, W., Lefkovitz, N., Megas, K. N., Nadeau, E., Gabel, D., Ben, O.’. R., Piccarreta, B., & Scarfone, K. Considerations for managing internet of things (IoT) cybersecurity and privacy risks. NIST 8228. https://doi.org/10.6028/NIST.IR.8228
Crume, J. (2000). Inside internet security. Addison-Wesley. Pearson Education Unlimited.
Laprie, J.-C. Dependable computing: Concepts, limits, challenges (pp. 42–54). LAAS-CNRS. 25th International Symposium on Fault-Tolerant Computing. Special Issue.
Churchley, A. R. Safety Availability and Reliability Assessments (SARA) Ltd. Volume: 17 issue: 6, page(s): 223–226. Issue published: June 1, 1984. https://doi.org/10.1177/002029408401700602
Dewsbury, G., Sommerville, I., Clarke, K., & Rouncefield, M. (2003). A dependability model for domestic systems. In S. Anderson, M. Felici, & B. Littlewood (Eds.), Computer safety, reliability, and security (SAFECOMP 2003. Lecture notes in computer science) (Vol. 2788). Springer. https://doi.org/10.1007/978-3-540-39878-3_9
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Piroumian, V. (2023). Cybersecurity and Dependability for Digital Twins and the Internet of Things. In: Crespi, N., Drobot, A.T., Minerva, R. (eds) The Digital Twin. Springer, Cham. https://doi.org/10.1007/978-3-031-21343-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-031-21343-4_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21342-7
Online ISBN: 978-3-031-21343-4
eBook Packages: Computer ScienceComputer Science (R0)