Security Analysis of a Digital Twin Framework Using Probabilistic Model Checking

被引:10
|
作者
Shaikh, Eman [1 ]
Al-Ali, A. R. [1 ]
Muhammad, Shahabuddin [2 ]
Mohammad, Nazeeruddin [2 ]
Aloul, F. [1 ]
机构
[1] Amer Univ Sharjah, Dept Comp Sci & Engn, Sharjah, U Arab Emirates
[2] Prince Mohammad Bin Fahd Univ, Cybersecur Ctr, Al Khobar 31962, Saudi Arabia
关键词
Digital twin security; security analysis; probabilistic model checking; Markov decision process; discrete time Markov chain; CHALLENGES; INTERNET; ATTACKS; CONTEXT;
D O I
10.1109/ACCESS.2023.3257171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital Twins (DTs) have been gaining popularity in various applications, such as smart manufacturing, smart energy, smart mobility, and smart healthcare. In simple terms, DT is described as a virtual replica of a given physical product, system, or process. It consists of three major segments: the physical entity, its virtual counterpart, and the connections between them. While the data is collected from a physical entity, processed at the virtual layer, and accessed in the form of a DT at the application layer, it is exposed to several security risks. To ensure the applicability of a DT system, it is imperative to understand these security risks and their implications. However, there is a lack of a framework that can be used to assess the security of a DT. This paper presents a framework in which the security of a DT can be analyzed with the help of a formal verification technique. The framework captures the defense of the system at different layers and considers various attacks at each layer. The security of the DT system is represented as a state-transition system and the security properties are captured in temporal logic. Probabilistic model checking (PMC) is used to verify the systems against these properties. In particular, the framework is used to analyze the probability of success and the cost of various potential attacks that can occur at each layer in a DT system. The applicability of the proposed framework is demonstrated with the help of a detailed case study in the healthcare domain.
引用
收藏
页码:26358 / 26374
页数:17
相关论文
共 50 条
  • [21] Controller dependability analysis by probabilistic model checking
    Kwiatkowska, Marta
    Norman, Gethin
    Parker, David
    CONTROL ENGINEERING PRACTICE, 2007, 15 (11) : 1427 - 1434
  • [22] Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    Piatkowski, Jacek
    COMPUTER NETWORKS, CN 2016, 2016, 608 : 107 - 117
  • [23] Probabilistic Model Checking
    Baier, Christel
    DEPENDABLE SOFTWARE SYSTEMS ENGINEERING, 2016, 45 : 1 - 23
  • [24] Formal security analysis of near field communication using model checking
    Alexiou, Nikolaos
    Basagiannis, Stylianos
    Petridou, Sophia
    COMPUTERS & SECURITY, 2016, 60 : 1 - 14
  • [25] Security analysis of RFID authentication for pervasive systems using model checking
    Kim, Hyun-Seok
    Oh, Jeong-Hyun
    Choi, Jin-Young
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 195 - +
  • [26] Survivability Analysis Using Probabilistic Model Checking: A Study on Wireless Sensor Networks
    Petridou, Sophia
    Basagiannis, Stylianos
    Roumeliotis, Manos
    IEEE SYSTEMS JOURNAL, 2013, 7 (01): : 4 - 12
  • [27] Design and analysis of DNA strand displacement devices using probabilistic model checking
    Lakin, Matthew R.
    Parker, David
    Cardelli, Luca
    Kwiatkowska, Marta
    Phillips, Andrew
    JOURNAL OF THE ROYAL SOCIETY INTERFACE, 2012, 9 (72) : 1470 - 1485
  • [28] Parameterized model checking for security policy analysis
    Ranise, Silvio
    Anh Truong
    Traverso, Riccardo
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2016, 18 (05) : 559 - 573
  • [29] Symbolic partial model checking for security analysis
    Martinelli, F
    COMPUTER NETWORK SECURITY, 2003, 2776 : 122 - 134
  • [30] Parameterized model checking for security policy analysis
    Silvio Ranise
    Anh Truong
    Riccardo Traverso
    International Journal on Software Tools for Technology Transfer, 2016, 18 : 559 - 573