Digital Twin for Wireless Networks: Security Attacks and Solutions

被引:5
|
作者
Wang, Weizheng [1 ]
Yang, Yaoqi [2 ]
Khan, Latif U. [3 ]
Niyato, Dusit [4 ]
Han, Zhu [5 ]
Guizani, Mohsen [3 ]
机构
[1] City Univ Hong Kong, Hong Kong, Peoples R China
[2] Army Engn Univ PLA, Nanjing, Peoples R China
[3] Mohamed Bin Zayed Univ Artificial Intelligence, Abu Dhabi, U Arab Emirates
[4] Nanyang Technol Univ, Singapore, Singapore
[5] Univ Houston, Houston, TX USA
关键词
Security; Monitoring; Communication system security; Wireless networks; Mathematical models; Jamming; Digital twins;
D O I
10.1109/MWC.020.2200609
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Emerging applications (e.g., human-computer interaction, digital healthcare, and intelligent transportation systems) can be effectively enabled using digital twins (DTs) that combine the virtual model of a physical system with other technologies/ schemes (i.e., mathematical optimization, game theory, and machine learning). Although DTs can well enable wireless systems, they will suffer from various security attacks. Therefore, this article presents an overview of security attacks and concerns in a DT-enabled wireless system. We propose a general framework that will serve as guidelines for future DT-enabled wireless systems. Additionally, we present two use cases to show the effectiveness of the proposed framework. A Stackelberg game-enabled model is provided to effectively enable anti-jamming attacks. In addition a residual- enabled reweighting aggregation scheme furnishes robust training against flawed parameters. Finally, we present an outlook on future directions.
引用
收藏
页码:278 / 285
页数:8
相关论文
共 50 条
  • [31] Digital Twin based What-if Simulation of Security Attacks in Smart Irrigation Systems
    Ramesh, Karan
    Sasirekha, G. V. K.
    Rao, Madhav
    Bapat, Jyotsna
    Das, Debabrata
    10TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES, CONECCT 2024, 2024,
  • [32] A Joint Communication and Computation Framework for Digital Twin Over Wireless Networks
    Yang, Zhaohui
    Chen, Mingzhe
    Liu, Yuchen
    Zhang, Zhaoyang
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2024, 18 (01) : 6 - 17
  • [33] Digital Twin Model Selection for Feature Accuracy in Wireless Edge Networks
    Chen, Hong
    Todd, Terence D.
    Zhao, Dongmei
    Karakostas, George
    2023 IEEE 34TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PIMRC, 2023,
  • [34] Digital Twin-Empowered Communications: A New Frontier of Wireless Networks
    Bariah, Lina
    Sari, Hikmet
    Debbah, Merouane
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (12) : 24 - 36
  • [35] SNR Based Digital Estimation of Security in Wireless Sensor Networks
    Ashraf, Adnan
    Rajput, AbdulRauf
    Mussadiq, Marvie
    Chowdhry, B. S.
    Hashmani, Manzoor
    COMMUNICATIONS INFRASTRUCTURE: SYSTEMS AND APPLICATIONS IN EUROPE, 2009, 16 : 35 - +
  • [36] Enhancing base station security against DoS attacks in wireless sensor networks
    Cao, Zhen
    Zhou, Xia
    Xu, Maoxing
    Chen, Zhong
    Hu, Jianbin
    Tang, Liyong
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 999 - 1002
  • [37] Simulating and Analysing Basic Security Attacks in Wireless Sensor Networks using QualNet
    Moon, Ayaz Hassan
    Shah, N. A.
    Iqbal, Ummer
    Ayub, Adil
    2013 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE AND RESEARCH ADVANCEMENT (ICMIRA 2013), 2013, : 68 - 76
  • [38] A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks
    Lee, Hae Young
    Cho, Tae Ho
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2010, E93B (07) : 1881 - 1889
  • [39] Security Vulnerabilities and Countermeasures against Jamming Attacks in Wireless Sensor Networks: A Survey
    Jaitly, Sunakshi
    Malhotra, Harshit
    Bhushan, Bharat
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 559 - 564
  • [40] A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks
    Cinzia Bernardeschi
    Gianluca Dini
    Maurizio Palmieri
    Francesco Racciatti
    Journal of Computer Virology and Hacking Techniques, 2021, 17 : 249 - 263