Skip to main content

Digital Twins for IoT Security Management

  • Conference paper
  • First Online:
Data and Applications Security and Privacy XXXVII (DBSec 2023)


The proliferation of Internet of Things (IoT) devices has increased the risk of cyber threats to the confidentiality, integrity, and availability of data processed. In this context, proactive security management has emerged as a critical strategy for protecting assets and networks. However, managing the complex nature of IoT devices poses a significant challenge to effective IoT security management. Digital twins - virtual replicas of physical assets - offer a promising solution to address these challenges. By creating a digital twin of an IoT network, security analysts could continuously monitor and regulate the IoT network, detect potential problems before they escalate, and assess the impact of new configurations and updates without risking the physical ones. This paper proposes a concept that uses digital twins for proactive IoT security management. To this end, we implement a proof of concept to demonstrate the practical applicability of this approach for four different security use cases. Our results provide a starting point for further research to leverage digital twins for IoT security management.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions


  1. 1.


  1. AboubDakar, M., Kellil, M., Roux, P.: A review of IoT network management: current status and perspectives. J. King Saud Univ. Comput. Inf. Sci. 34(7), 4163–4176 (2022).

  2. Al-Fuqaha, A.I., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015).

  3. Arzo, S.T., Naiga, C., Granelli, F., Bassoli, R., Devetsikiotis, M., Fitzek, F.H.P.: A theoretical discussion and survey of network automation for IoT: challenges and opportunity. IEEE Internet Things J. 8(15), 12021–12045 (2021).

    Article  Google Scholar 

  4. Ventures, C.: 2021 report: Cyberwarfare in the C-suite. Tech. rep, Cybersecurity Ventures (2021)

    Google Scholar 

  5. Dietz, M., Pernul, G.: Digital twin: empowering enterprises towards a system-of-systems approach. Bus. Inf. Syst. Eng. 62(2), 179–184 (2020).

    Article  Google Scholar 

  6. Dietz, M., Vielberth, M., Pernul, G.: Integrating digital twin security simulations in the security operations center. In: Proceedings of the 15th. International Conference on Availability, Reliability and Security (ARES 2020). Association for Computing Machinery (2020).

  7. Empl, P., Schlette, D., Zupfer, D., Pernul, G.: SOAR4IoT: securing IoT assets with digital twins. In: Proceedings of the 17th. International Conference on Availability, Reliability and Security (ARES 2022), Vienna, Austria, 23–26 August 2022, pp. 1–10. ACM (2022).

  8. Fayaz, S.K., Yu, T., Tobioka, Y., Chaki, S., Sekar, V.: BUZZ: testing context-dependent policies in stateful networks. In: Proceedings of the 13th. USENIX Symposium on Networked Systems Design and Implementation (NSDI 2016), pp. 275–289 (2016)

    Google Scholar 

  9. Galmés, M.F., Cheng, X., Shi, X., Xiao, S., Barlet-Ros, P., Cabellos-Aparicio, A.: FlowDT: a flow-aware digital twin for computer networks. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, (ICASSP 2022), pp. 8907–8911. IEEE (2022).

  10. Galmés, M.F., et al.: Building a digital twin for network optimization using graph neural networks. Comput. Networks 217, 109329 (2022).

    Article  Google Scholar 

  11. German Federal Office for Information Security (BSI): Allgemeines zum Einsatz von IoT-Geräten. BSI Grundschutz-Kompendium, Module SYS 4.4, German Federal Office for Information Security (2021)

    Google Scholar 

  12. Hui, L., Wang, M., Zhang, L., Lu, L., Cui, Y.: Digital twin for networking: a data-driven performance modeling perspective. IEEE Network, pp. 1–8 (2022).

  13. ISO/IEC: Information technology - open systems interconnection - basic reference model: management framework (1989). ISO/IEC 7498-4

  14. Juniper Networks: the 2020 state of network automation report. Tech. rep. (2020)

    Google Scholar 

  15. Li, Y., et al.: A survey on network verification and testing with formal methods: approaches and challenges. IEEE Commun. Surv. Tutor. 21(1), 940–969 (2019).

    Article  Google Scholar 

  16. Networks, N.: OT/IoT security report: cyber war insights, threats and trends, recommendations. Tech. rep, Nozomi Networks (2022)

    Google Scholar 

  17. NTT Ltd.: 2022–23 global network report (2022).

  18. Vielberth, M., Glas, M., Dietz, M., Karagiannis, S., Magkos, E., Pernul, G.: A digital twin-based cyber range for SOC analysts. In: Barker, K., Ghazinour, K. (eds.) DBSec 2021. LNCS, vol. 12840, pp. 293–311. Springer, Cham (2021).

    Chapter  Google Scholar 

  19. Wu, Y., Zhang, K., Zhang, Y.: Digital twin networks: a survey. IEEE Internet Things J. 8(18), 13789–13804 (2021).

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Philip Empl .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Empl, P., Hager, H., Pernul, G. (2023). Digital Twins for IoT Security Management. In: Atluri, V., Ferrara, A.L. (eds) Data and Applications Security and Privacy XXXVII. DBSec 2023. Lecture Notes in Computer Science, vol 13942. Springer, Cham.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-37585-9

  • Online ISBN: 978-3-031-37586-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics