2021 International Conference on Information Security and Cryptology (ISCTURKEY) 2021
DOI: 10.1109/iscturkey53027.2021.9654360
|View full text |Cite
|
Sign up to set email alerts
|

Digital Twin Security Threats and Countermeasures: An Introduction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(6 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…The adoption of smart manufacturing and digital twins could lead to data breaches that impact the integrity of production processes and product quality [105]. The interconnected systems rely on accurate and trustworthy data from various parties, and any errors or inaccuracies in the data can have significant consequences [106].…”
Section: Smartmentioning
confidence: 99%
“…The adoption of smart manufacturing and digital twins could lead to data breaches that impact the integrity of production processes and product quality [105]. The interconnected systems rely on accurate and trustworthy data from various parties, and any errors or inaccuracies in the data can have significant consequences [106].…”
Section: Smartmentioning
confidence: 99%
“…Threats are present in almost all components of the DT-ITS structure, and attackers can exploit vulnerabilities in physical systems, data structures, software, and data communication channels. Given such a scenario, Karaarslan and Babiker [135] analyzed the main threats for DT-based solutions and summarized the main countermeasures to be adopted to mitigate vulnerabilities in the different modules of DT systems. Among the main countermeasures, blockchain-based DTs have been increasingly adopted to protect data models and data exchange between components of the DT system [136], even in ITS solutions.…”
Section: Dependability Security and Privacymentioning
confidence: 99%
“…Few researchers have recently focused on the security aspects of DT. For instance, the authors in [27] and [28] discussed the security threats faced by a DT and proposed relevant countermeasures that can be employed to mitigate these threats. Al-Ali et al [29] proposed a six-layer end-to-end conceptual model consisting of a physical space layer, a communication network layer, a virtual space layer, and an application layer.…”
Section: Related Workmentioning
confidence: 99%