TY - JOUR
T1 - A comprehensive survey of digital twins
T2 - Applications, technologies and security challenges
AU - Jeremiah, Sekione Reward
AU - El Azzaoui, Abir
AU - Xiong, Neal N.
AU - Park, Jong Hyuk
N1 - Publisher Copyright:
© 2024
PY - 2024/6
Y1 - 2024/6
N2 - Alongside advancements in Artificial Intelligence (AI), significant progress has been made in big data processing, edge/cloud computing, and ubiquitous computing in the past two decades. These advancements catalyzed the development and adoption of Digital Twins (DT) across various domains, serving as virtual replicas of Physical Objects (POs). DTs provide advanced visualization and simulation capabilities, enabling effective estimation, optimization, and forecasting of PO's behaviors. However, the widespread adoption of DTs has introduced various security threats, vulnerabilities, and attacks. Despite ongoing research in DT applications and security, there is a lack of systematic review of the DT security literature across domains and architectural layers. This study fills this gap by systematically reviewing DT research, focusing on three interrelated aspects: DT applications, architectural layers, and security. We explore DT's architectural layers, functional requirements, application, and creation software to identify potential threats, attacks, and vulnerabilities specific to DT layers and application domains. We then systematize our findings under a unified security framework and pinpoint countermeasures against identified security challenges. Furthermore, our study explores DT's role in mitigating existing cyber threats, and we conclude our work by identifying open challenges and potential research directions.
AB - Alongside advancements in Artificial Intelligence (AI), significant progress has been made in big data processing, edge/cloud computing, and ubiquitous computing in the past two decades. These advancements catalyzed the development and adoption of Digital Twins (DT) across various domains, serving as virtual replicas of Physical Objects (POs). DTs provide advanced visualization and simulation capabilities, enabling effective estimation, optimization, and forecasting of PO's behaviors. However, the widespread adoption of DTs has introduced various security threats, vulnerabilities, and attacks. Despite ongoing research in DT applications and security, there is a lack of systematic review of the DT security literature across domains and architectural layers. This study fills this gap by systematically reviewing DT research, focusing on three interrelated aspects: DT applications, architectural layers, and security. We explore DT's architectural layers, functional requirements, application, and creation software to identify potential threats, attacks, and vulnerabilities specific to DT layers and application domains. We then systematize our findings under a unified security framework and pinpoint countermeasures against identified security challenges. Furthermore, our study explores DT's role in mitigating existing cyber threats, and we conclude our work by identifying open challenges and potential research directions.
KW - DT enabling technologies
KW - Digital twin
KW - Digital twin modeling
KW - Digital twin network
KW - Digital twin security
KW - Virtual twin
UR - http://www.scopus.com/inward/record.url?scp=85190278240&partnerID=8YFLogxK
U2 - 10.1016/j.sysarc.2024.103120
DO - 10.1016/j.sysarc.2024.103120
M3 - Article
AN - SCOPUS:85190278240
SN - 1383-7621
VL - 151
JO - Journal of Systems Architecture
JF - Journal of Systems Architecture
M1 - 103120
ER -