Skip to main content
Top

2023 | OriginalPaper | Chapter

Cybersecurity and Dependability for Digital Twins and the Internet of Things

Author : Vartan Piroumian

Published in: The Digital Twin

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Digital twin technology is poised to become an ubiquitous addition to the global technology landscape. As with every other technology or computing capability, platform, environment or ecosystem, risk always accompanies benefit. In order to mitigate risk and effect robust, safe, secure computing environments and capabilities, one must first identify and comprehend the implications of unmodulated risk.
Digital twin technology is no exception—in fact quite the contrary. As a consequence of digital twins being intrinsically associated with physical objects, the potential for negative outcomes is greater than for many other computing applications. Because digital twins will be employed in applications that interact with and control real-world, physical objects, they will also affect human beings who use or rely on those very real objects that are ubiquitous in our everyday physical world.
This chapter discusses the specific areas of cybersecurity and dependability risk in digital twin environments and applications. Dependable systems must also be secure and safe. There is both interplay and interdependency between elements of dependable systems and elements of secure systems.
The challenge of making systems dependable and secure is exacerbated in situations where components are physically more exposed and, therefore, potentially vulnerable to attack by external agents or entities. Such is the case for systems that employ digital twins—engendering a serious imperative to address cybersecurity and dependability. Neglecting to do so invites more serious consequences—not the least of which is harm to humans—as these systems involve physical, real-world objects with which human beings will interact.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Schmidt, D., Stal, M., Rohnert, H., & Buschmann, F. (2000). Pattern-oriented software architecture (Vol. 2). Wiley.MATH Schmidt, D., Stal, M., Rohnert, H., & Buschmann, F. (2000). Pattern-oriented software architecture (Vol. 2). Wiley.MATH
4.
go back to reference Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., & Stal, M. (1996). Pattern-oriented software architecture: A system of patterns (Vol. 1). Wiley. Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., & Stal, M. (1996). Pattern-oriented software architecture: A system of patterns (Vol. 1). Wiley.
5.
go back to reference Piroumian, V. (2021). Digital twins: Universal interoperability for the digital age. IEEE Computer, 54(1), 61–69.CrossRef Piroumian, V. (2021). Digital twins: Universal interoperability for the digital age. IEEE Computer, 54(1), 61–69.CrossRef
6.
go back to reference The Readers Digest Great Encyclopedic Dictionary. The Readers Digest Association. 1966. The Readers Digest Great Encyclopedic Dictionary. The Readers Digest Association. 1966.
7.
go back to reference Minerva, R., Myoung, L. G., Crespi, & Noël. (2020). Digital twin in the IoT context: A survey on technical features, scenarios and architectural models. Proceedings of the IEEE, 108(10). Minerva, R., Myoung, L. G., Crespi, & Noël. (2020). Digital twin in the IoT context: A survey on technical features, scenarios and architectural models. Proceedings of the IEEE, 108(10).
8.
go back to reference The American Heritage Dictionary. (1982). Houghton Mifflin Company. The American Heritage Dictionary. (1982). Houghton Mifflin Company.
10.
go back to reference Webster’s Seventh New Collegiate Dictionary. (1967). G. & C. Merriam Company, Publishers Webster’s Seventh New Collegiate Dictionary. (1967). G. & C. Merriam Company, Publishers
11.
go back to reference Furht, B., Grostick, D., Gluch, D., Rabbat, G., Parker, J., & McRoberts, M. (1991). Introduction to real-time computing. In Real-time UNIX® systems. The Kluwer international series in engineering and computer science (real-time systems) (Vol. 121). Springer. https://doi.org/10.1007/978-1-4615-3978-0_1 Furht, B., Grostick, D., Gluch, D., Rabbat, G., Parker, J., & McRoberts, M. (1991). Introduction to real-time computing. In Real-time UNIX® systems. The Kluwer international series in engineering and computer science (real-time systems) (Vol. 121). Springer. https://​doi.​org/​10.​1007/​978-1-4615-3978-0_​1
15.
go back to reference Kaufman, C., Perlman, R., & Speciner, M. (2002). Network security: Private communication in a public world. Prentice-Hall. Kaufman, C., Perlman, R., & Speciner, M. (2002). Network security: Private communication in a public world. Prentice-Hall.
16.
go back to reference Xie, M., Kim-Leng, P., & Dai, Y.-S. (2004). Computing system reliability, models and analysis. Springer. Xie, M., Kim-Leng, P., & Dai, Y.-S. (2004). Computing system reliability, models and analysis. Springer.
21.
go back to reference Voas, J., Kuhn, R., Laplante, P., & Applebaum, S. (2018). Internet of things (IoT) trust concerns. National Institute of Standards and Technology (NIST). Voas, J., Kuhn, R., Laplante, P., & Applebaum, S. (2018). Internet of things (IoT) trust concerns. National Institute of Standards and Technology (NIST).
24.
go back to reference Padlipsky, M. A. (1985). The elements of networking style. Prentice-Hall. Padlipsky, M. A. (1985). The elements of networking style. Prentice-Hall.
26.
go back to reference Dillingham, Gerald L. “Next generation air transportation system.” United States Government Accountability Office. GAO-07-784-T. 2007. Dillingham, Gerald L. “Next generation air transportation system.” United States Government Accountability Office. GAO-07-784-T. 2007.
27.
go back to reference Hurn, J. (1989). GPS, a guide to the next utility. Trimble Navigation. Hurn, J. (1989). GPS, a guide to the next utility. Trimble Navigation.
29.
go back to reference Koppel, T. (2016). Lights out: A cyberattack, a nation unprepared, surviving the aftermath. Crown Publishing Group. ISBN-10: 0553419986, ISBN-13: 978-0553419986. Koppel, T. (2016). Lights out: A cyberattack, a nation unprepared, surviving the aftermath. Crown Publishing Group. ISBN-10: 0553419986, ISBN-13: 978-0553419986.
31.
go back to reference Boeckl, K., Fagan, M., Fisher, W., Lefkovitz, N., Megas, K. N., Nadeau, E., Gabel, D., Ben, O.’. R., Piccarreta, B., & Scarfone, K. Considerations for managing internet of things (IoT) cybersecurity and privacy risks. NIST 8228. https://doi.org/10.6028/NIST.IR.8228 Boeckl, K., Fagan, M., Fisher, W., Lefkovitz, N., Megas, K. N., Nadeau, E., Gabel, D., Ben, O.’. R., Piccarreta, B., & Scarfone, K. Considerations for managing internet of things (IoT) cybersecurity and privacy risks. NIST 8228. https://​doi.​org/​10.​6028/​NIST.​IR.​8228
32.
go back to reference Crume, J. (2000). Inside internet security. Addison-Wesley. Pearson Education Unlimited. Crume, J. (2000). Inside internet security. Addison-Wesley. Pearson Education Unlimited.
33.
go back to reference Laprie, J.-C. Dependable computing: Concepts, limits, challenges (pp. 42–54). LAAS-CNRS. 25th International Symposium on Fault-Tolerant Computing. Special Issue. Laprie, J.-C. Dependable computing: Concepts, limits, challenges (pp. 42–54). LAAS-CNRS. 25th International Symposium on Fault-Tolerant Computing. Special Issue.
35.
Metadata
Title
Cybersecurity and Dependability for Digital Twins and the Internet of Things
Author
Vartan Piroumian
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-21343-4_14

Premium Partner