Game theory in network security for digital twins in industry

Hailin Feng , Dongliang Chen , Haibin Lv , Zhihan Lv

›› 2024, Vol. 10 ›› Issue (4) : 1068 -1078.

PDF
›› 2024, Vol. 10 ›› Issue (4) :1068 -1078. DOI: 10.1016/j.dcan.2023.01.004
Research article
research-article

Game theory in network security for digital twins in industry

Author information +
History +
PDF

Abstract

To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion, a series of discussions on network security issues are carried out based on game theory. From the perspective of the life cycle of network vulnerabilities, mining and repairing vulnerabilities are analyzed by applying evolutionary game theory. The evolution process of knowledge sharing among white hats under various conditions is simulated, and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed. On this basis, the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm (WCA) to produce better replacement individuals with greater probability from the perspective of both attack and defense. Through the simulation experiment, it is found that the convergence speed of the probability (X) of white Hat 1 choosing the knowledge sharing policy is related to the probability (x0) of white Hat 2 choosing the knowledge sharing policy initially, and the probability (y0) of white hat 2 choosing the knowledge sharing policy initially. When y0 ​= ​0.9, X converges rapidly in a relatively short time. When y0 is constant and x0 is small, the probability curve of the “cooperative development” strategy converges to 0. It is concluded that the higher the trust among the white hat members in the temporary team, the stronger their willingness to share knowledge, which is conducive to the mining of loopholes in the system. The greater the probability of a hacker attacking the vulnerability before it is fully disclosed, the lower the willingness of manufacturers to choose the "cooperative development" of vulnerability patches. Applying the improved wolf colony-co-evolution algorithm can obtain the equilibrium solution of the "attack and defense game model", and allocate the security protection resources according to the importance of nodes. This study can provide an effective solution to protect the network security for digital twins in the industry.

Keywords

Digital twins / Industrial internet of things / Network security / Game theory / Attack and defense

Cite this article

Download citation ▾
Hailin Feng, Dongliang Chen, Haibin Lv, Zhihan Lv. Game theory in network security for digital twins in industry. , 2024, 10(4): 1068-1078 DOI:10.1016/j.dcan.2023.01.004

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

T. Wang, J. Li, Z. Kong, Digital twin improved via visual question answering for vision-language interactive mode in human-machine collaboration, J. Manuf. Syst. 58 (2021) 261-269.

[2]

Y. Fang, C. Peng, P. Lou, Digital-twin-based job shop scheduling toward smart manu facturing, IEEE Trans. Ind. Inf. 15 (12) (2019) 6425-6435.

[3]

Y. Ham, J. Kim, Participatory Sensing and digital twin city: updating virtual city models for enhanced risk-informed decision-making, J. Manag. Eng. 36 (3) (2020) 04020005.

[4]

H. Guo, M. Chen, K. Mohamed, A digital twin-based flexible cellular manufacturing for optimization of air conditioner line, J. Manuf. Syst. 58 (2021) 65-78.

[5]

K. Xia, C. Sacco, M. Kirkpatrick, A digital twin to train deep reinforcement learning agent for smart manufacturing plants: environment, interfaces and intelligence, J. Manuf. Syst. 58 (2021) 210-230.

[6]

Y. He, J. Guo, X. Zheng, From surveillance to digital twin: challenges and recent advances of signal processing for industrial internet of things, IEEE Signal Process. Mag. 35 (5) (2018) 120-129.

[7]

S. Aheleroff, X. Xu, R.Y. Zhong, Digital twin as a service (DTaaS) in industry 4.0: an architecture reference model, Adv. Eng. Inf. 47 (2021) 101225.

[8]

V. Kharchenko, O. Morozova, O. Illiashenko, A digital twin for the logistics system of a manufacturing enterprise using industrial IoT, Inf. Secur. 47 (1) (2020) 125-134.

[9]

M. Wollschlaeger, T. Sauter, J. Jasperneite, The future of industrial communication: automation networks in the era of the internet of things and industry 4.0, IEEE industrial electronics magazine 11 (1) (2017) 17-27.

[10]

F. Tao, J. Cheng, Q. Qi, IIHub: an industrial Internet-of-Things hub toward smart manufacturing based on cyber-physical system, IEEE Trans. Ind. Inf. 14 (5) (2017) 2271-2280.

[11]

T. Gebremichael, L.P.I. Ledwaba, M.H. Eldefrawy, Security and privacy in the industrial internet of things: current standards and future challenges, IEEE Access 8 (2020) 152351-152366.

[12]

C. Gehrmann, M. Gunnarsson, A digital twin based industrial automation and control system security architecture, IEEE Trans. Ind. Inf. 16 (1) (2019) 669-680.

[13]

V. Hassija, V. Chamola, V. Saxena, A survey on IoT security: application areas, security threats, and solution architectures, IEEE Access 7 (2019) 82721-82743.

[14]

G. Srivastava, R.M. Parizi, A. Dehghantanha, The Future of Blockchain Technology in Healthcare Internet of Things Security, Blockchain Cybersecurity, Trust and Privacy, 2020, pp. 161-184.

[15]

S. Lee, S. Kim, K. Choi, Game theory-based security vulnerability quantification for social internet of things, Future Generat. Comput. Syst. 82 (2018) 752-760.

[16]

F. Kong, Y. Zhou, B. Xia, A security reputation model for IoT health data using S-Alex Net and dynamic game theory in cloud computing Environment, IEEE Access 7 (2019) 161822-161830.

[17]

V. Kiran, S. Rani, P. Singh, Towards a light weight routing security in IoT using non-cooperative game models and dempster-shaffer theory, Wireless Pers. Commun. 110 (4) (2020) 1729-1749.

[18]

J. Cheng, H. Zhang, F. Tao, DT-II: digital twin enhanced Industrial Internet reference framework towards smart manufacturing, Robot. Comput. Integrated Manuf. 62 (2020) 101881.

[19]

K.T. Park, Y.W. Nam, H.S. Lee, Design and implementation of a digital twin application for a connected micro smart factory, Int. J. Comput. Integrated Manuf. 32 (6) (2019) 596-614.

[20]

S. West, O. Stoll, J. Meierhofer, Digital twin providing new opportunities for value co-creation through supporting decision-making, Appl. Sci. 11 (9) (2021) 3750.

[21]

R. Rocca, P. Rosa, C. Sassanelli, Integrating virtual reality and digital twin in circular economy practices: a laboratory application case, Sustainability 12 (6) (2020) 2286.

[22]

C. Zhuang, J. Liu, H. Xiong, Digital twin-based smart production management and control framework for the complex product assembly shop-floor, Int. J. Adv. Manuf. Technol. 96 (1) (2018) 1149-1163.

[23]

H. Jiang, S. Qin, J. Fu, How to model and implement connections between physical and virtual models for digital twin application, J. Manuf. Syst. 58 (2021) 36-51.

[24]

G. Wang, G. Zhang, X. Guo, Digital twin-driven service model and optimal allocation of manufacturing resources in shared manufacturing, J. Manuf. Syst. 59 (2021) 165-179.

[25]

T. Kong, T. Hu, T. Zhou, Data construction method for the applications of workshop digital twin system, J. Manuf. Syst. 58 (2021) 323-328.

[26]

C. Zhuang, J. Gong, J. Liu, Digital twin-based assembly data management and process traceability for complex products, J. Manuf. Syst. 58 (2021) 118-131.

[27]

D. Jones, C. Snider, A. Nassehi, Characterising the Digital Twin: a systematic literature review, CIRP Journal of Manufacturing Science and Technology 29 (2020) 36-52.

[28]

C. Wu, Y. Zhou, M.V.P. Pessôa, Conceptual digital twin modeling based on an integrated five-dimensional framework and TRIZ function model, J. Manuf. Syst. 58 (2021) 79-93.

[29]

T. Wang, J. Li, Z. Kong, Digital twin improved via visual question answering for vision-language interactive mode in human-machine collaboration, J. Manuf. Syst. 58 (2021) 261-269.

[30]

Y.H. Pan, T. Qu, N.Q. Wu, Digital twin based real-time production logistics synchronization system in a multi-level computing architecture, J. Manuf. Syst. 58 (2021) 246-260.

[31]

J.A. Marques, M.C. Luizelli, R. Filho, An optimization-based approach for efficient network monitoring using in-band network telemetry, Journal of Internet Services and Applications 10 (1) (2019) 1-20.

[32]

S. Tang, D. Li, B. Niu, Sel-INT: a runtime-programmable selective in-band network telemetry system, IEEE transactions on network and service management 17 (2)(2019) 708-721.

[33]

J. Hyun, N. Van Tu, J.H. Yoo, Real-time and fine-grained network monitoring using in-band network telemetry, Int. J. Netw. Manag. 29 (6) (2019) e2080.

[34]

H. Bouali, J. Akaichi, A. Gaaloul, Real-time data warehouse loading methodology and architecture: a healthcare use case, Int. J. Data Anal. Tech. Strat. 11 (4) (2019) 310-327.

[35]

V. Havard, B. Jeanne, M. Lacomblez, Digital twin and virtual reality: a co-simulation environment for design and assessment of industrial workstations, Production & Manufacturing Research 7 (1) (2019) 472-489.

[36]

Y. Fan, J. Yang, J. Chen, A digital-twin visualized architecture for Flexible Manufacturing System, J. Manuf. Syst. 60 (2021) 176-201.

[37]

J. Bao, D. Guo, J. Li, The modelling and operations for the digital twin in the context of manufacturing, Enterprise Inf. Syst. 13 (4) (2019) 534-556.

[38]

M. Taddeo, T. McCutcheon, L. Floridi, Trusting artificial intelligence in cybersecurity is a double-edged sword, Nat. Mach. Intell. 1 (12) (2019) 557-560.

[39]

V. Mullet, P. Sondi, E. Ramat, A review of cybersecurity guidelines for manufacturing factories in industry 4.0, IEEE Access 9 (2021) 23235-23263.

[40]

S.K. Khan, N. Shiwakoti, P. Stasinopoulos, Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions, Accid. Anal. Prev. 148 (2020) 105837.

[41]

S. Yamaguchi, White-hat worm to fight malware and its evaluation by agent-oriented Petri nets, Sensors 20 (2) (2020) 556.

[42]

C.D. Martin, Taking the high road white hat, black hat: the ethics of cybersecurity, ACM Inroads 8 (1) (2017) 33-35.

[43]

Y. Xiang, L. Wang, A game-theoretic study of load redistribution attack and defense in power systems, Elec. Power Syst. Res. 151 (2017) 12-25.

[44]

H. Hu, Y. Liu, C. Chen, Optimal decision making approach for cyber security defense using evolutionary game, IEEE Transactions on Network and Service Management 17 (3) (2020) 1683-1700.

[45]

Q. Wang, W. Tai, Y. Tang, A two-layer game theoretical attack-defense model for a false data injection attack against power systems, Int. J. Electr. Power Energy Syst. 104 (2019) 169-177.

[46]

S.G. Pease, P.P. Conway, A.A. West, Hybrid ToF and RSSI real-time semantic tracking with an adaptive industrial internet of things architecture, J. Netw. Comput. Appl. 99 (2017) 98-109.

[47]

S.G. Pease, R. Trueman, C. Davies, An intelligent real-time cyber-physical toolset for energy and process prediction and optimisation in the future industrial Internet of Things, Future Generat. Comput. Syst. 79 (2018) 815-829.

[48]

J. Zhang, X. Qu, A.K. Sangaiah, A study of green development mode and total factor productivity of the food industry based on the industrial internet of things, IEEE Commun. Mag. 56 (5) (2018) 72-78.

AI Summary AI Mindmap
PDF

56

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/