Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber–Physical Production Systems
Abstract
:1. Introduction
- We present a flexible DT-centered framework that supports security assessment such as vulnerable component mitigation prioritization in CPPS without compromising operations.
- We identify critical assets through comprehensive dependence rules within the cyber–physical layers.
- We validate the framework’s utility and effectiveness through an industrial case study involving an HRC assembly system, showcasing DT’s potential to enhance CPPS cybersecurity.
2. Background and Related Works
2.1. Common Vulnerabilities in CPPSs
- Software and firmware vulnerabilities: Flaws in application software and operating systems are prevalent yet challenging to mitigate. Vulnerabilities such as outdated firmware (e.g., CWE-1277) open back doors for attackers. Programming errors leading to buffer overflow can enable unauthorized code injection and elevated system access.
- Data communication security: The use of unencrypted protocols for data transmission risks, exposing sensitive information to unauthorized interception; vulnerable to man-in-the-middle (MiTM) attacks, as exemplified by the deployment of HTTP basic authentication for sensitive data (CWE-319).
- Access control issues: Inadequate access control mechanisms, such as improperly granting administrative permissions to guest accounts, can compromise critical system files. This encompasses flaws in identity management (e.g., CWE-1294), resource isolation (e.g., CWE-1189), authentication (e.g., CWE-261), and authorization (e.g., CWE-732). The integration of IoT devices introduces further hardware-targeted threats, including improper resource control (e.g., CWE-125 and CWE-787).
- Cybersecurity awareness and training: Insufficient cybersecurity training and awareness among employees can facilitate phishing attacks and internal breaches. Weak password policies (e.g., CWE-521) and communication gaps within organizations heighten the risk of data leaks and spoofing attacks.
- Cloud and edge computing vulnerabilities: Transitioning to cloud services brings forth vulnerabilities in edge computing and cloud architectures. Application programming interface (API) with insecure default configurations can inadvertently expose critical databases to the public internet, as highlighted by CWE-648, indicating the incorrect use of privileged APIs.
2.2. Advanced Persistent Threats in CPPS
2.3. Cybersecurity Research on Manufacturing System
2.4. Digital Twin Applications in Cybersecurity
3. Digital Twin-Based Security Assessment for CPPS
3.1. Framework Architecture
3.2. Reference Architecture for CPPS
3.2.1. Physical Layer of CPPS
3.2.2. Control Layer of CPPS
3.2.3. Cyber Layer of CPPS
3.3. Dependency Analysis and Criticality Calculation
- FD Embedding Rule (ER):
- ER-1: , for embedded in .
- ER-2: , for contained in .
- FD Interaction Rule (IR):
- IR-1: , for receiving process data from .
- IR-2: , for receiving control data from .
- FD Data Rule (DR):
- DR-1: , for as data stream recipient from .
- DR-2: , for listening to the data stream from .
- FD Network Rule (NR):
- NR-1: , for connected to the network via .
3.4. Vulnerability Virtual Patch and Risk Analysis
- : Weighing factor for each severity level i.
- : Sum of vulnerability scores across different severity scales i.
- : The number of vulnerabilities under each scale.
4. Case Study
4.1. Human–Robot Collaborative Assembly System
4.2. Model-Based Vulnerability Assessment for the Human–Robot Collaborative Assembly System
4.3. Attack Simulation Using Digital-Twin Model
5. Discussion
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
Abbreviations | Definitions |
ATT&CK | adversarial tactics, techniques, and common knowledge |
APT | advanced persistent threat |
DT | digital twin |
CAM | computer-aided manufacturing |
CVE | common vulnerability exposures |
CWE | common weakness enumeration |
CAPEC | common attack pattern enumeration and classification |
CPS | cyber–physical system |
CPPS | cyber–physical production system |
CRS | component risk score |
CCS | component criticality score |
CVS | component vulnerability score |
FD | functional dependence |
HRC | human–robot collaborative |
HMI | human–machine interface |
IED | intelligent electronic device |
IT | information technology |
NC | numerical control |
OT | operational technology |
PLC | programmable logic controller |
TTC | time to compromise |
References
- Monostori, L.; Kádár, B.; Bauernhansl, T.; Kondoh, S.; Kumara, S.; Reinhart, G.; Sauer, O.; Schuh, G.; Sihn, W.; Ueda, K. Cyber-physical systems in manufacturing. Cirp Ann. 2016, 65, 621–641. [Google Scholar] [CrossRef]
- Mohurle, S.; Patil, M. A brief study of wannacry threat: Ransomware attack 2017. Int. J. Adv. Res. Comput. Sci. 2017, 8, 1938–1940. [Google Scholar]
- Tuptuk, N.; Hailes, S. Security of smart manufacturing systems. J. Manuf. Syst. 2018, 47, 93–106. [Google Scholar] [CrossRef]
- Wu, D.; Ren, A.; Zhang, W.; Fan, F.; Liu, P.; Fu, X.; Terpenny, J. Cybersecurity for digital manufacturing. J. Manuf. Syst. 2018, 48, 3–12. [Google Scholar] [CrossRef]
- Bhamare, D.; Zolanvari, M.; Erbad, A.; Jain, R.; Khan, K.; Meskin, N. Cybersecurity for Industrial Control Systems: A Survey. Comput. Secur. 2020, 89, 101677. [Google Scholar] [CrossRef]
- Asghar, M.R.; Hu, Q.; Zeadally, S. Cybersecurity in Industrial Control Systems: Issues, Technologies, and Challenges. Comput. Netw. 2019, 165, 106946. [Google Scholar] [CrossRef]
- Anton, S.D.D.; Fraunholz, D.; Krohmer, D.; Reti, D.; Schneider, D.; Schotten, H.D. The global state of security in industrial control systems: An empirical analysis of vulnerabilities around the world. IEEE Int. Things J. 2021, 8, 17525–17540. [Google Scholar] [CrossRef]
- Rotibi, A.O.; Saxena, N.; Burnap, P.; Tarter, A. Extended dependency modeling technique for cyber risk identification in ICS. IEEE Access 2023, 11, 37229–37242. [Google Scholar] [CrossRef]
- Samanis, E.; Gardiner, J.; Rashid, A. SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools. In Proceedings of the 17th International Conference on Availability, Reliability and Security, Vienna, Austria, 23–26 August 2022; pp. 1–12. [Google Scholar] [CrossRef]
- Staves, A.; Gouglidis, A.; Hutchison, D. An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments. Digit. Threat. Res. Pract. 2023, 4, 1–29. [Google Scholar] [CrossRef]
- Elhabashy, A.E.; Wells, L.J.; Camelio, J.A. Cyber-physical security research efforts in manufacturing–a literature review. Procedia Manuf. 2019, 34, 921–931. [Google Scholar] [CrossRef]
- Yampolskiy, M.; King, W.E.; Gatlin, J.; Belikovetsky, S.; Brown, A.; Skjellum, A.; Elovici, Y. Security of additive manufacturing: Attack taxonomy and survey. Addit. Manuf. 2018, 21, 431–457. [Google Scholar] [CrossRef]
- Humayed, A.; Lin, J.; Li, F.; Luo, B. Cyber-Physical Systems Security—A Survey. IEEE Int. Things J. 2017, 4, 1802–1831. [Google Scholar] [CrossRef]
- Qian, C.; Liu, X.; Ripley, C.; Qian, M.; Liang, F.; Yu, W. Digital twin—Cyber replica of physical things: Architecture, applications and future research directions. Future Int. 2022, 14, 64. [Google Scholar] [CrossRef]
- Baiardi, F.; Tonelli, F. Twin based continuous patching to minimize cyber risk. Eur. J. Secur. Res. 2021, 6, 211–227. [Google Scholar] [CrossRef]
- Balta, E.C.; Pease, M.; Moyne, J.; Barton, K.; Tilbury, D.M. Digital twin-based cyber-attack detection framework for cyber-physical manufacturing systems. IEEE Trans. Autom. Sci. Eng. 2023, 21, 1695–1712. [Google Scholar] [CrossRef]
- Tao, F.; Qi, Q.; Wang, L.; Nee, A. Digital twins and cyber–physical systems toward smart manufacturing and industry 4.0: Correlation and comparison. Engineering 2019, 5, 653–661. [Google Scholar] [CrossRef]
- Alshammari, K.; Beach, T.; Rezgui, Y. Cybersecurity for digital twins in the built environment: Current research and future directions. J. Inf. Technol. Constr. 2021, 26, 159–173. [Google Scholar] [CrossRef]
- Pokhrel, A.; Katta, V.; Colomo-Palacios, R. Digital twin for cybersecurity incident prediction: A multivocal literature review. In Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, Seoul, Republic of Korea, 27 June–19 July 2020; pp. 671–678. [Google Scholar]
- Aheleroff, S.; Xu, X.; Zhong, R.Y.; Lu, Y. Digital twin as a service (DTaaS) in industry 4.0: An architecture reference model. Adv. Eng. Inform. 2021, 47, 101225. [Google Scholar] [CrossRef]
- Böhm, F.; Dietz, M.; Preindl, T.; Pernul, G. Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity. J. Cybersecur. Priv. 2021, 1, 519–538. [Google Scholar] [CrossRef]
- Vielberth, M.; Glas, M.; Dietz, M.; Karagiannis, S.; Magkos, E.; Pernul, G. A digital twin-based cyber range for SOC analysts. In Proceedings of the IFIP Annual Conference on Data and Applications Security and Privacy, Calgary, AB, Canada, 19–20 July 2021; Springer: Cham, Switzerland, 2021; pp. 293–311. [Google Scholar]
- Moyne, J.; Qamsane, Y.; Balta, E.C.; Kovalenko, I.; Faris, J.; Barton, K.; Tilbury, D.M. A requirements driven digital twin framework: Specification and opportunities. IEEE Access 2020, 8, 107781–107801. [Google Scholar] [CrossRef]
- Qamsane, Y.; Moyne, J.; Toothman, M.; Kovalenko, I.; Balta, E.C.; Faris, J.; Tilbury, D.M.; Barton, K. A methodology to develop and implement digital twin solutions for manufacturing systems. IEEE Access 2021, 9, 44247–44265. [Google Scholar] [CrossRef]
- Mahoney, T.C.; Davis, J. Cybersecurity for Manufacturers: Securing the Digitized and Connected Factory; University of Michigan Library: Ann Arbor, MI, USA, Technical Report; 2017. [Google Scholar]
- Zio, E. Challenges in the vulnerability and risk analysis of critical infrastructures. Reliab. Eng. Syst. Saf. 2016, 152, 137–150. [Google Scholar] [CrossRef]
- Common Weakness Enumeration (CWE). Available online: https://cwe.mitre.org/index.html (accessed on 23 February 2024).
- Tatam, M.; Shanmugam, B.; Azam, S.; Kannoorpatti, K. A review of threat modelling approaches for APT-style attacks. Heliyon 2021, 7, e05969. [Google Scholar] [CrossRef] [PubMed]
- Common Attack Pattern Enumeration and Classification (CAPEC). Available online: https://capec.mitre.org/index.html (accessed on 23 February 2024).
- Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK). Available online: https://attack.mitre.org/ (accessed on 23 February 2024).
- Wells, L.J.; Camelio, J.A.; Williams, C.B.; White, J. Cyber-physical security challenges in manufacturing systems. Manuf. Lett. 2014, 2, 74–77. [Google Scholar] [CrossRef]
- Sturm, L.D.; Williams, C.B.; Camelio, J.A.; White, J.; Parker, R. Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the. STL file with human subjects. J. Manuf. Syst. 2017, 44, 154–164. [Google Scholar] [CrossRef]
- DeSmit, Z.; Elhabashy, A.E.; Wells, L.J.; Camelio, J.A. An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems. J. Manuf. Syst. 2017, 43, 339–351. [Google Scholar] [CrossRef]
- Elhabashy, A.E.; Wells, L.J.; Camelio, J.A.; Woodall, W.H. A cyber-physical attack taxonomy for production systems: A quality control perspective. J. Intell. Manuf. 2019, 30, 2489–2504. [Google Scholar] [CrossRef]
- Kure, H.; Islam, S.; Razzaque, M. An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System. Appl. Sci. 2018, 8, 898. [Google Scholar] [CrossRef]
- Noel, S.; Harley, E.; Tam, K.; Limiero, M.; Share, M. CyGraph: Graph-Based Analytics and Visualization for Cybersecurity. In Handbook of Statistics; Elsevier: Amsterdam, The Netherlands, 2016; Volume 35, pp. 117–167. [Google Scholar]
- Lallie, H.S.; Debattista, K.; Bal, J. An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1110–1122. [Google Scholar] [CrossRef]
- Tayouri, D.; Baum, N.; Shabtai, A.; Puzis, R. A survey of MulVAL extensions and their attack scenarios coverage. IEEE Access 2023, 11, 27974–27991. [Google Scholar] [CrossRef]
- Alcaraz, C.; Lopez, J. Digital twin: A comprehensive survey of security threats. IEEE Commun. Surv. Tutorials 2022, 24, 1475–1503. [Google Scholar] [CrossRef]
- Eckhart, M.; Ekelhart, A. Digital Twins for CYBER-Physical Systems Security: State of the Art and Outlook. In Security and Quality in Cyber-Physical Systems Engineering: With Forewords by Robert M. Lee and Tom Gilb; Springer: Cham, Switzerland, 2019; pp. 383–412. [Google Scholar]
- Eckhart, M.; Ekelhart, A. Towards security-aware virtual environments for digital twins. In Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, Incheon, Republic of Korea, 4–8 June 2018; pp. 61–72. [Google Scholar]
- Eckhart, M.; Ekelhart, A. A specification-based state replication approach for digital twins. In Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy, Toronto, ON, Canada, 15–19 October 2018; pp. 36–47. [Google Scholar]
- Lou, X.; Guo, Y.; Gao, Y.; Waedt, K.; Parekh, M. An idea of using Digital Twin to perform the functional safety and cybersecurity analysis. In Proceedings of the INFORMATIK 2019: 50 Jahre Gesellschaft für Informatik–Informatik für Gesellschaft (Workshop-Beiträge), Kassel, Germany, 23–26 September 2019. [Google Scholar]
- Bécue, A.; Fourastier, Y.; Praça, I.; Savarit, A.; Baron, C.; Gradussofs, B.; Pouille, E.; Thomas, C. CyberFactory# 1—Securing the industry 4.0 with cyber-ranges and digital twins . In Proceedings of the 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), Imperia, Italy, 13–15 June 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–4. [Google Scholar]
- Bitton, R.; Gluck, T.; Stan, O.; Inokuchi, M.; Ohta, Y.; Yamada, Y.; Yagyu, T.; Elovici, Y.; Shabtai, A. Deriving a cost-effective digital twin of an ICS to facilitate security evaluation. In Proceedings of the Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, 3–7 September 2018; Proceedings, Part I 23. Springer: Cham, Switzerland, 2018; pp. 533–554. [Google Scholar]
- Suhail, S.; Iqbal, M.; Hussain, R.; Jurdak, R. ENIGMA: An explainable digital twin security solution for cyber–physical systems. Comput. Ind. 2023, 151, 103961. [Google Scholar] [CrossRef]
- Damjanovic-Behrendt, V. A digital twin-based privacy enhancement mechanism for the automotive industry. In Proceedings of the 2018 International Conference on Intelligent Systems (IS), Funchal, Portugal, 25–27 September 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 272–279. [Google Scholar]
- Sellitto, G.P.; Masi, M.; Pavleska, T.; Aranha, H. A Cyber security digital twin for critical infrastructure protection: The intelligent transport system use case. In Proceedings of the IFIP Working Conference on the Practice of Enterprise Modeling, Riga, Latvia, 24–26 November 2021; Springer: Cham, Switzerland, 2021; pp. 230–244. [Google Scholar] [CrossRef]
- Lu, Y.; Liu, C.; Kevin, I.; Wang, K.; Huang, H.; Xu, X. Digital Twin-driven smart manufacturing: Connotation, reference model, applications and research issues. Robot. Comput.-Integr. Manuf. 2020, 61, 101837. [Google Scholar] [CrossRef]
- Liu, S.; Zheng, P.; Bao, J. Digital Twin-based manufacturing system: A survey based on a novel reference model. J. Intell. Manuf. 2023, 1–30. [Google Scholar] [CrossRef]
- Williams, T.J. The Purdue enterprise reference architecture. Comput. Ind. 1994, 24, 141–158. [Google Scholar] [CrossRef]
- Lee, E.A. The past, present and future of cyber-physical systems: A focus on models. Sensors 2015, 15, 4837–4869. [Google Scholar] [CrossRef]
- Aheleroff, S.; Huang, H.; Xu, X.; Zhong, R.Y. Toward sustainability and resilience with Industry 4.0 and Industry 5.0. Front. Manuf. Technol. 2022, 2, 951643. [Google Scholar] [CrossRef]
- Tao, F.; Qi, Q. New IT driven service-oriented smart manufacturing: Framework and characteristics. IEEE Trans. Syst. Man Cybern. Syst. 2017, 49, 81–91. [Google Scholar] [CrossRef]
- Jiang, Y.; Jeusfeld, M.A.; Ding, J.; Sandahl, E. Model-Based Cybersecurity Analysis: Extending Enterprise Modeling to Critical Infrastructure Cybersecurity. Bus. Inf. Syst. Eng. 2023, 65, 643–676. [Google Scholar] [CrossRef]
- Jiang, Y. Vulnerability Analysis for Critical Infrastructures. Ph.D. Thesis, University of Skövde, Skövde, Sweden, 2022. [Google Scholar]
- Jiang, Y.; Atif, Y.; Ding, J. Cyber-physical systems security based on a cross-linked and correlated vulnerability database. In Proceedings of the International Conference on Critical Information Infrastructures Security, Copenhagen, Denmark, 24–26 August 2019; Springer: Cham, Switzerland, 2019; pp. 71–82. [Google Scholar]
- Jacobs, J.; Romanosky, S.; Adjerid, I.; Baker, W. Improving vulnerability remediation through better exploit prediction. J. Cybersecur. 2020, 6, tyaa015. [Google Scholar] [CrossRef]
- Common Vulnerability Scoring System (CVSS). Available online: https://www.first.org/cvss/ (accessed on 23 February 2024).
- Wang, L.; Gao, R.; Váncza, J.; Krüger, J.; Wang, X.V.; Makris, S.; Chryssolouris, G. Symbiotic human-robot collaborative assembly. Cirp Ann. 2019, 68, 701–726. [Google Scholar] [CrossRef]
- Symbiotic Human-Robot Collaborative Assembly: Technologies, Innovations and Competitiveness. Available online: https://cordis.europa.eu/project/id/637107 (accessed on 23 February 2024).
- Drag&Bot. Available online: https://www.dragandbot.com/ (accessed on 23 February 2024).
- RobotStudio. Available online: https://new.abb.com/products/robotics/robotstudio (accessed on 23 February 2024).
- IRC5. Available online: https://new.abb.com/products/robotics/controllers/irc5 (accessed on 23 February 2024).
- Docker. Available online: https://www.docker.com/products (accessed on 23 February 2024).
- US-CERT Asset. Available online: https://www.cisa.gov/protect-assets (accessed on 23 February 2024).
- Jiang, Y.; Atif, Y.; Ding, J.; Wang, W. A Semantic Framework with Humans in the Loop for Vulnerability-Assessment in Cyber-Physical Production Systems. In Proceedings of the International Conference on Risks and Security of Internet and Systems, Hammamet, Tunisia, 29–31 October 2019; Springer: Cham, Switzerland, 2019; pp. 128–143. [Google Scholar]
- Siyaev, A.; Valiev, D.; Jo, G.S. Interaction with industrial digital twin using neuro-symbolic reasoning. Sensors 2023, 23, 1729. [Google Scholar] [CrossRef] [PubMed]
- Liao, Q.V.; Gruen, D.; Miller, S. Questioning the AI: Informing Design Practices for Explainable AI User Experiences. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, New York, NY, USA, 25–30 April 2020; pp. 1–15. [Google Scholar] [CrossRef]
- Elder, S.; Rahman, R.; Fringer, G.; Kapoor, K.; Williams, L. A Survey on Software Vulnerability Exploitability Assessment. ACM Comput. Surv. 2024. [Google Scholar] [CrossRef]
Component | Criticality | Number of Vulnerability | Average Severity |
---|---|---|---|
HRC_MainController_UnitController | 6 | N/A | N/A |
HRC_MainController_RobotStudio | 1 | 1 | 7.4 |
HRC_MainController_Cockpit | 2 | N/A | N/A |
HRC_MainController_Drag&Bot | 2 | N/A | N/A |
HRC_MainController_DockerEngine | 4 | 8 | 7.23 |
HRC_MainController_OperatingSystem | 5 | 19 | 7.74 |
HRC_WorkerIdentification_OperatingSystem | 1 | 19 | 7.74 |
HRC_WorkerIdentification_WorkerIdentification | 1 | N/A | N/A |
HRC_CollisionAvoidance_OperatingSystem | 2 | 19 | 7.74 |
HRC_CollisionAvoidance_CollisionAvoidance | 2 | N/A | N/A |
HRC_HMIC_OperatingSystem | 1 | 2 | 7.3 |
HRC_Router | 5 | 4 | 8.08 |
HRC_IRC5 | 2 | 2 | 9.8 |
HRC_PLC | 2 | 5 | 7.2 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jiang, Y.; Wang, W.; Ding, J.; Lu, X.; Jing, Y. Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber–Physical Production Systems. Future Internet 2024, 16, 134. https://doi.org/10.3390/fi16040134
Jiang Y, Wang W, Ding J, Lu X, Jing Y. Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber–Physical Production Systems. Future Internet. 2024; 16(4):134. https://doi.org/10.3390/fi16040134
Chicago/Turabian StyleJiang, Yuning, Wei Wang, Jianguo Ding, Xin Lu, and Yanguo Jing. 2024. "Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber–Physical Production Systems" Future Internet 16, no. 4: 134. https://doi.org/10.3390/fi16040134
APA StyleJiang, Y., Wang, W., Ding, J., Lu, X., & Jing, Y. (2024). Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber–Physical Production Systems. Future Internet, 16(4), 134. https://doi.org/10.3390/fi16040134