Security Analysis of a Digital Twin Framework Using Probabilistic Model Checking

被引:4
|
作者
Shaikh, Eman [1 ]
Al-Ali, A. R. [1 ]
Muhammad, Shahabuddin [2 ]
Mohammad, Nazeeruddin [2 ]
Aloul, F. [1 ]
机构
[1] Amer Univ Sharjah, Dept Comp Sci & Engn, Sharjah, U Arab Emirates
[2] Prince Mohammad Bin Fahd Univ, Cybersecur Ctr, Al Khobar 31962, Saudi Arabia
关键词
Digital twin security; security analysis; probabilistic model checking; Markov decision process; discrete time Markov chain; CHALLENGES; INTERNET; ATTACKS; CONTEXT;
D O I
10.1109/ACCESS.2023.3257171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital Twins (DTs) have been gaining popularity in various applications, such as smart manufacturing, smart energy, smart mobility, and smart healthcare. In simple terms, DT is described as a virtual replica of a given physical product, system, or process. It consists of three major segments: the physical entity, its virtual counterpart, and the connections between them. While the data is collected from a physical entity, processed at the virtual layer, and accessed in the form of a DT at the application layer, it is exposed to several security risks. To ensure the applicability of a DT system, it is imperative to understand these security risks and their implications. However, there is a lack of a framework that can be used to assess the security of a DT. This paper presents a framework in which the security of a DT can be analyzed with the help of a formal verification technique. The framework captures the defense of the system at different layers and considers various attacks at each layer. The security of the DT system is represented as a state-transition system and the security properties are captured in temporal logic. Probabilistic model checking (PMC) is used to verify the systems against these properties. In particular, the framework is used to analyze the probability of success and the cost of various potential attacks that can occur at each layer in a DT system. The applicability of the proposed framework is demonstrated with the help of a detailed case study in the healthcare domain.
引用
收藏
页码:26358 / 26374
页数:17
相关论文
共 50 条
  • [1] Security Analysis of Automotive Architectures using Probabilistic Model Checking
    Mundhenk, Philipp
    Steinhorst, Sebastian
    Lukasiewycz, Martin
    Fahmy, Suhaib A.
    Chakraborty, Samarjit
    [J]. 2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [2] Security Analysis of NFC Relay Attacks using Probabilistic Model Checking
    Alexiou, Nikolaos
    Basagiannis, Stylianos
    Petridou, Sophia
    [J]. 2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 524 - 529
  • [3] A FRAMEWORK FOR FORMAL AUTOMATED ANALYSIS OF SIMULATION EXPERIMENTS USING PROBABILISTIC MODEL CHECKING
    Doud, Kyle
    Yilmaz, Levent
    [J]. 2017 WINTER SIMULATION CONFERENCE (WSC), 2017, : 1312 - 1323
  • [4] Medical treatment analysis using probabilistic model checking
    Debbi, Hichem
    Bourahla, Mustapha
    Debbi, Aimad
    [J]. INTERNATIONAL JOURNAL OF BIOMEDICAL ENGINEERING AND TECHNOLOGY, 2013, 12 (04) : 346 - 359
  • [5] Transportation risk analysis using probabilistic model checking
    Soeanu, Andrei
    Debbabi, Mourad
    Alhadidi, Dima
    Makkawi, Makram
    Allouche, Mohamad
    Belanger, Micheline
    Lechevin, Nicholas
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (09) : 4410 - 4421
  • [6] Probabilistic model checking for the quantification of DoS security threats
    Basagiannis, Stylianos
    Katsaros, Panagiotis
    Pombortsis, Andrew
    Alexiou, Nikolaos
    [J]. COMPUTERS & SECURITY, 2009, 28 (06) : 450 - 465
  • [7] A model checking-based security analysis framework for IoT systems
    Fang, Zheng
    Fu, Hao
    Gu, Tianbo
    Qian, Zhiyun
    Jaeger, Trent
    Hu, Pengfei
    Mohapatra, Prasant
    [J]. HIGH-CONFIDENCE COMPUTING, 2021, 1 (01):
  • [8] LDYIS: a Framework for Model Checking Security Protocols
    Lomuscio, Alessio
    Penczek, Wojciech
    [J]. FUNDAMENTA INFORMATICAE, 2008, 85 (1-4) : 359 - 375
  • [9] Automated Analysis of Commitment Protocols Using Probabilistic Model Checking
    Gunay, Akin
    Song Songzheng
    Liu, Yang
    Zhang, Jie
    [J]. PROCEEDINGS OF THE TWENTY-NINTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2015, : 2060 - 2066
  • [10] A Mathematical Framework for Exploring Protein Folding Dynamics using Probabilistic Model Checking
    Biswas, Prasenjit
    Pal, Sarit
    Khatri, Sunil
    [J]. 2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT 2020), 2020, : 114 - 123