Skip to main content

Cybersecurity and Dependability for Digital Twins and the Internet of Things

  • Chapter
  • First Online:
The Digital Twin
  • 3246 Accesses

Abstract

Digital twin technology is poised to become an ubiquitous addition to the global technology landscape. As with every other technology or computing capability, platform, environment or ecosystem, risk always accompanies benefit. In order to mitigate risk and effect robust, safe, secure computing environments and capabilities, one must first identify and comprehend the implications of unmodulated risk.

Digital twin technology is no exception—in fact quite the contrary. As a consequence of digital twins being intrinsically associated with physical objects, the potential for negative outcomes is greater than for many other computing applications. Because digital twins will be employed in applications that interact with and control real-world, physical objects, they will also affect human beings who use or rely on those very real objects that are ubiquitous in our everyday physical world.

This chapter discusses the specific areas of cybersecurity and dependability risk in digital twin environments and applications. Dependable systems must also be secure and safe. There is both interplay and interdependency between elements of dependable systems and elements of secure systems.

The challenge of making systems dependable and secure is exacerbated in situations where components are physically more exposed and, therefore, potentially vulnerable to attack by external agents or entities. Such is the case for systems that employ digital twins—engendering a serious imperative to address cybersecurity and dependability. Neglecting to do so invites more serious consequences—not the least of which is harm to humans—as these systems involve physical, real-world objects with which human beings will interact.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, L., Ali Babar, M., & Nuseibeh, B. (2013). Characterizing architecturally significant requirements. IEEE Software, 30(2), 38–45. https://doi.org/10.1109/MS.2012.174

    Article  Google Scholar 

  2. Tarvainen, P. (2008). Adaptability evaluation at software architecture level. The Open Software Engineering Journal, 2, 1–30. https://doi.org/10.2174/1874107X00802010001

    Article  Google Scholar 

  3. Schmidt, D., Stal, M., Rohnert, H., & Buschmann, F. (2000). Pattern-oriented software architecture (Vol. 2). Wiley.

    MATH  Google Scholar 

  4. Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., & Stal, M. (1996). Pattern-oriented software architecture: A system of patterns (Vol. 1). Wiley.

    Google Scholar 

  5. Piroumian, V. (2021). Digital twins: Universal interoperability for the digital age. IEEE Computer, 54(1), 61–69.

    Article  Google Scholar 

  6. The Readers Digest Great Encyclopedic Dictionary. The Readers Digest Association. 1966.

    Google Scholar 

  7. Minerva, R., Myoung, L. G., Crespi, & Noël. (2020). Digital twin in the IoT context: A survey on technical features, scenarios and architectural models. Proceedings of the IEEE, 108(10).

    Google Scholar 

  8. The American Heritage Dictionary. (1982). Houghton Mifflin Company.

    Google Scholar 

  9. Wikipedia. Simulation. https://en.wikipedia.org/wiki/Simulation. Accessed 2021.

  10. Webster’s Seventh New Collegiate Dictionary. (1967). G. & C. Merriam Company, Publishers

    Google Scholar 

  11. Furht, B., Grostick, D., Gluch, D., Rabbat, G., Parker, J., & McRoberts, M. (1991). Introduction to real-time computing. In Real-time UNIX® systems. The Kluwer international series in engineering and computer science (real-time systems) (Vol. 121). Springer. https://doi.org/10.1007/978-1-4615-3978-0_1

  12. Radu, A., Cofaru, C., Tolea, B., & Dima, D. (2018). Study regarding the influence of airbag deployment time on the occupant injury level during a frontal vehicle collision. MATEC Web of Conferences, 184, 01007. https://doi.org/10.1051/matecconf/201818401007

    Article  Google Scholar 

  13. Guo, J., Jian, X., & Lin, G. (2014). Performance evaluation of an anti-lock braking system for electric vehicles with a fuzzy sliding mode controller. Energies, 7, 6459–6476. https://doi.org/10.3390/en7106459

    Article  Google Scholar 

  14. National Institute of Standards and Technology (NIST). Risk Management Framework For Information Systems And Organizations. NIST SP 800–37, REVISION 2. https://doi.org/10.6028/NIST.SP.800-37r2. Accessed 2021.

  15. Kaufman, C., Perlman, R., & Speciner, M. (2002). Network security: Private communication in a public world. Prentice-Hall.

    Google Scholar 

  16. Xie, M., Kim-Leng, P., & Dai, Y.-S. (2004). Computing system reliability, models and analysis. Springer.

    Google Scholar 

  17. Wikipedia article. Reliability, availability and serviceability. https://en.wikipedia.org/wiki/Reliability,_availability_and_serviceability. Accessed 2021.

  18. Ross, R. S., Pillitteri, V. Y., Graubart, R., Bodeau, D., & McQuaid, R. Developing cyber resilient systems: A systems security engineering approach (Vol. 2, pp. 800–160). NIST Special Publication. https://doi.org/10.6028/NIST.SP.800-160v2

  19. Wikipedia. Computer security. https://en.wikipedia.org/wiki/Computer_security#cite_ref-:2_1-0. Accessed 2021.

  20. Voas, J., Mell, P., & Piroumian, V. Considerations for digital twin technology and emerging standards. NISTIR 8356. https://doi.org/10.6028/NIST.IR.8356-draft

  21. Voas, J., Kuhn, R., Laplante, P., & Applebaum, S. (2018). Internet of things (IoT) trust concerns. National Institute of Standards and Technology (NIST).

    Google Scholar 

  22. Fagan, M., Megas, K. N., Scarfone, K., & Smith, M. National Institute of Standards and Technology (NIST). Foundational Cybersecurity Activities for IoT Device Manufacturers. https://doi.org/10.6028/NIST.IR.8259

  23. Fagan, M., Megas, K. N., Scarfone, K., & Smith, M. National Institute of Standards and Technology (NIST). IoT Device Cybersecurity Capability Core Baseline. https://doi.org/10.6028/NIST.IR.8259A

  24. Padlipsky, M. A. (1985). The elements of networking style. Prentice-Hall.

    Google Scholar 

  25. US Department of Transportation Federal Aviation Administration. (2016). Performance based navigation, navigation strategy 2016. https://www.faa.gov/nextgen/media/PBN_NAS_NAV.pdf

    Google Scholar 

  26. Dillingham, Gerald L. “Next generation air transportation system.” United States Government Accountability Office. GAO-07-784-T. 2007.

    Google Scholar 

  27. Hurn, J. (1989). GPS, a guide to the next utility. Trimble Navigation.

    Google Scholar 

  28. Paulson, C., & Toth, P. (2021). Small business information security: The fundamentals. NISTIR 7621, Revision 1. https://doi.org/10.6028/NIST.IR.7621r1. Accessed 2021.

    Book  Google Scholar 

  29. Koppel, T. (2016). Lights out: A cyberattack, a nation unprepared, surviving the aftermath. Crown Publishing Group. ISBN-10: 0553419986, ISBN-13: 978-0553419986.

    Google Scholar 

  30. Federal Aviation Administration. NextGen Implementation Plan, 2018–2019. https://www.faa.gov/nextgen/media/NextGen_Implementation_Plan-2018-19.pdf

  31. Boeckl, K., Fagan, M., Fisher, W., Lefkovitz, N., Megas, K. N., Nadeau, E., Gabel, D., Ben, O.’. R., Piccarreta, B., & Scarfone, K. Considerations for managing internet of things (IoT) cybersecurity and privacy risks. NIST 8228. https://doi.org/10.6028/NIST.IR.8228

  32. Crume, J. (2000). Inside internet security. Addison-Wesley. Pearson Education Unlimited.

    Google Scholar 

  33. Laprie, J.-C. Dependable computing: Concepts, limits, challenges (pp. 42–54). LAAS-CNRS. 25th International Symposium on Fault-Tolerant Computing. Special Issue.

    Google Scholar 

  34. Churchley, A. R. Safety Availability and Reliability Assessments (SARA) Ltd. Volume: 17 issue: 6, page(s): 223–226. Issue published: June 1, 1984. https://doi.org/10.1177/002029408401700602

  35. Dewsbury, G., Sommerville, I., Clarke, K., & Rouncefield, M. (2003). A dependability model for domestic systems. In S. Anderson, M. Felici, & B. Littlewood (Eds.), Computer safety, reliability, and security (SAFECOMP 2003. Lecture notes in computer science) (Vol. 2788). Springer. https://doi.org/10.1007/978-3-540-39878-3_9

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vartan Piroumian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Piroumian, V. (2023). Cybersecurity and Dependability for Digital Twins and the Internet of Things. In: Crespi, N., Drobot, A.T., Minerva, R. (eds) The Digital Twin. Springer, Cham. https://doi.org/10.1007/978-3-031-21343-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-21343-4_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-21342-7

  • Online ISBN: 978-3-031-21343-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics