Digital Twin for Wireless Networks: Security Attacks and Solutions

被引:5
|
作者
Wang, Weizheng [1 ]
Yang, Yaoqi [2 ]
Khan, Latif U. [3 ]
Niyato, Dusit [4 ]
Han, Zhu [5 ]
Guizani, Mohsen [3 ]
机构
[1] City Univ Hong Kong, Hong Kong, Peoples R China
[2] Army Engn Univ PLA, Nanjing, Peoples R China
[3] Mohamed Bin Zayed Univ Artificial Intelligence, Abu Dhabi, U Arab Emirates
[4] Nanyang Technol Univ, Singapore, Singapore
[5] Univ Houston, Houston, TX USA
关键词
Security; Monitoring; Communication system security; Wireless networks; Mathematical models; Jamming; Digital twins;
D O I
10.1109/MWC.020.2200609
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Emerging applications (e.g., human-computer interaction, digital healthcare, and intelligent transportation systems) can be effectively enabled using digital twins (DTs) that combine the virtual model of a physical system with other technologies/ schemes (i.e., mathematical optimization, game theory, and machine learning). Although DTs can well enable wireless systems, they will suffer from various security attacks. Therefore, this article presents an overview of security attacks and concerns in a DT-enabled wireless system. We propose a general framework that will serve as guidelines for future DT-enabled wireless systems. Additionally, we present two use cases to show the effectiveness of the proposed framework. A Stackelberg game-enabled model is provided to effectively enable anti-jamming attacks. In addition a residual- enabled reweighting aggregation scheme furnishes robust training against flawed parameters. Finally, we present an outlook on future directions.
引用
收藏
页码:278 / 285
页数:8
相关论文
共 50 条
  • [41] A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks
    Bernardeschi, Cinzia
    Dini, Gianluca
    Palmieri, Maurizio
    Racciatti, Francesco
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2021, 17 (03) : 249 - 263
  • [42] Reactive Security Scheme using Behavioral Aspects of Attacks for Wireless Sensor Networks
    Ahmed, Roshan Zameer
    Anigol, Anusha
    Biradar, R. C.
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 1023 - 1028
  • [43] Comprehensive Analysis of Security Attacks and Intrusion Detection System in Wireless Sensor Networks
    Shanthi, S.
    Rajan, E. G.
    PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 426 - 431
  • [44] VoIP Security - Attacks and Solutions
    Phithakkitnukoon, Santi
    Dantu, Ram
    Baatarjav, Enkh-Amgalan
    INFORMATION SECURITY JOURNAL, 2008, 17 (03): : 114 - 123
  • [45] IoT security cryptographic solutions for trustworthy wireless sensor networks
    Motwani, Dilip
    Chitre, Vidya
    Bhosale, Varsha
    Israni, Mukesh
    Sonawane, Swapnil
    Nerurkar, Amit
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (04): : 1283 - 1294
  • [46] Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
    Ghadi, Yazeed Yasin
    Mazhar, Tehseen
    Shloul, Tamara Al
    Shahzad, Tariq
    Salaria, Umair Ahmad
    Ahmed, Arfan
    Hamam, Habib
    IEEE Access, 2024, 12 : 12699 - 12719
  • [47] Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
    Ghadi, Yazeed Yasin
    Mazhar, Tehseen
    Al Shloul, Tamara
    Shahzad, Tariq
    Salaria, Umair Ahmad
    Ahmed, Arfan
    Hamam, Habib
    IEEE ACCESS, 2024, 12 : 12699 - 12719
  • [48] A review of threats, protocols, and solutions to enhance the security of wireless networks
    Ataelmanan, Somya Khidir Mohmmed
    Al Hassan, Mostafa Ahmed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (04): : 108 - 115
  • [49] Wormhole attacks in wireless networks
    Hu, YC
    Perrig, A
    Johnson, DB
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 370 - 380
  • [50] Jamming Attacks in Wireless Networks
    Kumar, S. Praveen
    Swapna, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (10): : 110 - 113