Smart City Gnosys

Smart city article details

Title Securing Iot Device Networks: A Digital Twin And Automated Adversary Emulation Approach
ID_Doc 47750
Authors Van Der Wal E.W.; El-Hajj M.
Year 2023
Published 2023 IEEE 3rd International Conference on Digital Twins and Parallel Intelligence, DTPI 2023
DOI http://dx.doi.org/10.1109/DTPI59677.2023.10365459
Abstract With the number of Internet-connected devices (things), expected to be almost 30 billion by 2030, the Internet of Things (IoT) technologies have already become a part of everyday life, in various areas like public health, smart cars, smart grids, smart cities, smart manufacturing, and smart homes. Hand in hand with this growing adoption, there is also the necessity of securing all these devices from possible cyber attacks. In this paper, We investigate the current state of the art of IoT security and Digital Twins, the digital representations of physical objects. We then use this knowledge to propose a novel methodology to use Cyber Digital Twins and Autonomous Adversary Emulation to improve the security of IoT devices. Consequently, we show that this methodology has the potential to improve the security of IoT applications. This work contributes a review of the state of the art in IoT security research and a novel method for improving IoT device security. © 2023 IEEE.
Author Keywords Autonomous Adversary Emulation; Digital Twins; DT; IoT; Security


Similar Articles


Id Similarity Authors Title Published
47769 View0.995Van Der Wal E.W.; El-Hajj M.Securing Networks Of Iot Devices With Digital Twins And Automated Adversary EmulationICSEC 2022 - International Computer Science and Engineering Conference 2022 (2022)
1150 View0.888Kismul A.; Al-Khateeb H.; Jahankhani H.A Critical Review Of Digital Twin Confidentiality In A Smart CityAdvanced Sciences and Technologies for Security Applications (2023)
47894 View0.88Pavlov V.; Hahn F.; El-Hajj M.Security Aspects Of Digital Twins In IotInternational Conference on Information Systems Security and Privacy (2023)
47934 View0.878Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
58956 View0.875Peck A.G.; Phillips I.W.; Watson T.Treasure Maps And Special Effects: The Digital Twin Offering To Threat ActorsProceedings - 2024 IEEE Smart World Congress, SWC 2024 - 2024 IEEE Ubiquitous Intelligence and Computing, Autonomous and Trusted Computing, Digital Twin, Metaverse, Privacy Computing and Data Security, Scalable Computing and Communications (2024)
5249 View0.871Chowdhury R.R.; Abas P.E.A Survey On Device Fingerprinting Approach For Resource-Constraint Iot Devices: Comparative Study And Research ChallengesInternet of Things (Netherlands), 20 (2022)
18302 View0.868Choudhary V.; Tanwar S.; Rana A.Demystifying Security And Applications Of Internet Of Things2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), ICRITO 2021 (2021)
47990 View0.868Sharma R.; Arya R.Security Threats And Measures In The Internet Of Things For Smart City Infrastructure: A State Of ArtTransactions on Emerging Telecommunications Technologies, 34, 11 (2023)
35067 View0.868El-Hajj M.Leveraging Digital Twins And Intrusion Detection Systems For Enhanced Security In Iot-Based Smart City InfrastructuresElectronics (Switzerland), 13, 19 (2024)
5283 View0.867Wei Z.; Wei Q.; Geng Y.; Yang Y.A Survey On Iot Security: Vulnerability Detection And ProtectionProceedings of 2024 International Conference on Artificial Intelligence of Things and Computing, AITC 2024 (2025)