2021 IEEE Globecom Workshops (GC Wkshps) 2021
DOI: 10.1109/gcwkshps52748.2021.9682031
|View full text |Cite
|
Sign up to set email alerts
|

Convoy_DTN: A Security Interaction Engine Design For Digital Twin Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…The proposed security framework employs a dual-pronged strategy to demonstrate its effectiveness through the NeCS-Car teleoperation benchmark and incorporates enhanced data security at crucial interconnected adapter nodes and an intelligent module. Chen et al [107] also focused on security threats brought by DTN. The authors proposed the DT Protection Function (DTPF) and utilized three security schemes including cross-domain security classification, minimize privacy design, and multidimensional policy validation to ensure security.…”
Section: B Smart Industrymentioning
confidence: 99%
“…The proposed security framework employs a dual-pronged strategy to demonstrate its effectiveness through the NeCS-Car teleoperation benchmark and incorporates enhanced data security at crucial interconnected adapter nodes and an intelligent module. Chen et al [107] also focused on security threats brought by DTN. The authors proposed the DT Protection Function (DTPF) and utilized three security schemes including cross-domain security classification, minimize privacy design, and multidimensional policy validation to ensure security.…”
Section: B Smart Industrymentioning
confidence: 99%
“…They also designed the system architecture, analyzed DTN key technologies, investigated the challenges, and pointed out the future development direction of DTN. On that basis, China Mobile subsequently proposed a series of more concrete methods supporting DTN construction [21][22][23]. Yang et al [21] derived a complete flow emulation framework for DTN, which leverages unified ID and deterministic network technology to keep physical network traffic in consistency with that in DTN.…”
Section: Digital Twin Networkmentioning
confidence: 99%
“…Zhu et al [22] proposed a DTN construction method based on knowledge graph, which can represent entity attribute and various topologies according to physical network. Chen et al [23] elaborated a security interaction engine named Digital Twin Protection Function (DTPF) to guarantee the confidentiality, integrity, stability, and non-reputation of messages during DTN policy distribution. DTN also attracts research interests from academia.…”
Section: Digital Twin Networkmentioning
confidence: 99%
“…Focusing on the type of P2V communication, it is necessary to approach it from a cybersecurity perspective due to the risks and threats associated with an environment of this type, such as risks associated with data, risk to physical devices modeled through DTs, to networks through those that are interconnected or to the network applications that operate on them. As described by Chen et al in [29], P2V communication in NDT architectures must comply with the requirements of data confidentiality and integrity and the stability of the authenticity of policies, as well as the unforgeability based on the authenticity of both parties, physical and digital.…”
Section: Bidirectional Pipelinementioning
confidence: 99%