2022
DOI: 10.1007/978-3-031-19762-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure Digital Twins

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…The attack categorization and definitions can be slightly different for different application contexts. Figure 8 depicts the CBMS cyberattacks classification depending on the CIA requirements attacked [44,50,51]. It should be noted that in some attack conditions, more than one CIA requirement might become compromised.…”
Section: Attack Types and Scenariosmentioning
confidence: 99%
See 3 more Smart Citations
“…The attack categorization and definitions can be slightly different for different application contexts. Figure 8 depicts the CBMS cyberattacks classification depending on the CIA requirements attacked [44,50,51]. It should be noted that in some attack conditions, more than one CIA requirement might become compromised.…”
Section: Attack Types and Scenariosmentioning
confidence: 99%
“…Regarding sniffing attacks, Ref. [50] illustrates bandwidth sniffing attacks in which the attacker can gain bandwidth information used between the BMS and CBMS to discover some information about BMS, e.g., active components of the BMS and their related activities. The graphical description of the bandwidth sniffing attack is shown in Figure 9.…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…Usually, security assumptions are made to design and operate the IoT infrastructure that might be at risk of not being fully technologically capable of eliminating potential security threats. Given this insight, virtual prototyping is implemented to evaluate the security vulnerabilities of primary system design, security software, and other IoT configurations, aiming to make them secure against firstorder attacks [23]. A prototyping infrastructure can help to explore situations of accidental failure in order to avoid hazards and thus maintain the overall system's safety.…”
Section: Safety and Securitymentioning
confidence: 99%