Skip to main content

Digital Twin-Based Security Orchestration, Automation and Response for IoT and CPS

  • Conference paper
  • First Online:
Internet of Things (IFIPIoT 2024)

Abstract

The digitisation leveraging technologies in the Internet of Things (IoT) and Cyber-Physical Systems (CPS) has been largely adopted together with the Digital Twin (DT) paradigm. However, the distributed and heterogeneous nature of IoT or CPS poses significant challenges in safeguarding against diverse attack surfaces, including physical devices, network infrastructures, and third-party integration. Furthermore, the evolving security threats and potential cascading effects from cyber attacks add another layer of complexity to the security landscape. Therefore, in this paper, we propose a digital twin-based security orchestration automation and response framework, striving for the business continuity (SOAR4BC). Leveraging system contexts from the DT in combination with security intelligence from the security tools gives us a holistic context for SOAR, which has not been seen in the existing approaches. By subjecting tampered data and distributed denial of service (DDoS) detection to rigorous experimental evaluation, we substantiate the efficacy and reliability of the SOAR4BC framework in detecting and responding to security policy violations within simulated digital twin environments. This validation serves as a compelling proof of concept, highlighting the SOAR4BC framework’s robustness in addressing cyber threats. Our work offers novel insights into the convergence of digital twin technology and cybersecurity, illuminating the unique challenges and opportunities inherent in DT-based IoT and CPS systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://github.com/SINTEF-9012/SINDIT.

  2. 2.

    https://ryu-sdn.org/.

  3. 3.

    https://www.openpolicyagent.org/docs/latest/.

  4. 4.

    https://docs.oasis-open.org/cacao/security-playbooks/v2.0/security-playbooks-v2.0.html.

  5. 5.

    https://www.kali.org/tools/hping3/.

References

  1. Alcaraz, C., Lopez, J.: Digital twin: a comprehensive survey of security threats. IEEE Commun. Surv. Tutor. 24(3), 1475–1503 (2022)

    Article  MATH  Google Scholar 

  2. Allison, D., Smith, P., Mclaughlin, K.: Digital twin-enhanced incident response for cyber-physical systems. In: Proceedings of the 18th International Conference on Availability, Reliability and Security, pp. 1–10 (2023)

    Google Scholar 

  3. Alwarafy, A., Al-Thelaya, K.A., Abdallah, M., Schneider, J., Hamdi, M.: A survey on security and privacy issues in edge-computing-assisted internet of things. IEEE Internet Things J. 8(6), 4004–4022 (2020)

    Article  MATH  Google Scholar 

  4. Bartwal, U., Mukhopadhyay, S., Negi, R., Shukla, S.: Security orchestration, automation, and response engine for deployment of behavioural honeypots. In: 2022 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1–8 (2022)

    Google Scholar 

  5. Bellavista, P., Di Modica, G.: Iotwins: implementing distributed and hybrid digital twins in industrial manufacturing and facility management settings. Future Internet 16(2), 65 (2024)

    Article  MATH  Google Scholar 

  6. Bharatee, A., Ray, P.K., Subudhi, B., Ghosh, A.: Power management strategies in a hybrid energy storage system integrated AC/DC microgrid: a review. Energies 15(19) (2022). https://doi.org/10.3390/en15197176. https://www.mdpi.com/1996-1073/15/19/7176

  7. Chowdhury, N., Gkioulos, V.: Cyber security training for critical infrastructure protection: a literature review. Comput. Sci. Rev. 40, 100361 (2021)

    Article  MATH  Google Scholar 

  8. Empl, P., Schlette, D., Zupfer, D., Pernul, G.: Soar4iot: securing IoT assets with digital twins. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, pp. 1–10 (2022)

    Google Scholar 

  9. Fischertechnik: Training Factory Industry 4.0 24V. https://www.fischertechnik.de/en/products/industry-and-universities/training-models/554868-training-factory-industry-4-0-24v. Accessed 16 June 2024

  10. Goknil, A., et al.: A systematic review of data quality in CPS and IoT for industry 4.0. ACM Comput. Surv. 55(14s) (2023). https://doi.org/10.1145/3593043

  11. Isaja, M., et al.: A blockchain-based framework for trusted quality data sharing towards zero-defect manufacturing. Comput. Ind. 146, 103853 (2023)

    Article  MATH  Google Scholar 

  12. Islam, C., Babar, M.A., Nepal, S.: A multi-vocal review of security orchestration. ACM Comput. Surv. 52(2) (2019). https://doi.org/10.1145/3305268

  13. Islam, C., Babar, M.A., Nepal, S.: Architecture-centric support for integrating security tools in a security orchestration platform. In: Jansen, A., Malavolta, I., Muccini, H., Ozkaya, I., Zimmermann, O. (eds.) ECSA 2020. LNCS, vol. 12292, pp. 165–181. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58923-3_11

    Chapter  MATH  Google Scholar 

  14. Microsoft Security: What is SOAR? https://www.microsoft.com/en-us/security/business/security-101/what-is-soar. Accessed 16 June 2024

  15. Neupane, K., Haddad, R., Chen, L.: Next generation firewall for network security: a survey. In: SoutheastCon 2018, pp. 1–6 (2018). https://doi.org/10.1109/SECON.2018.8478973

  16. Nguyen, H.H., Phung, P.H., Nguyen, P.H., Truong, H.L.: Context-driven policies enforcement for edge-based IoT data sharing-as-a-service. In: 2022 IEEE International Conference on Services Computing (SCC), pp. 221–230 (2022). https://doi.org/10.1109/SCC55611.2022.00041

  17. Nguyen, P., et al.: Towards smarter security orchestration and automatic response for CPS and IoT. In: 2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 298–302 (2023). https://doi.org/10.1109/CloudCom59040.2023.00055

  18. Nguyen, P.H., et al.: Software engineering and AI for data quality in cyber- physical systems - sea4dq’21 workshop report. SIGSOFT Softw. Eng. Notes 47(1), 26–29 (2022). https://doi.org/10.1145/3502771.3502781

  19. Nguyen, T., Lam, A.N., Nguyen, P., Truong, L.: Security orchestration with explainability for digital twins-based smart systems. In: IEEE Annual Computer Software and Applications Conference (2024)

    Google Scholar 

  20. Rajmohan, T., Nguyen, P.H., Ferry, N.: A decade of research on patterns and architectures for IoT security. Cybersecurity 5(1), 2 (2022)

    Article  Google Scholar 

  21. Riggs, H., et al.: Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure. Sensors 23(8), 4060 (2023)

    Article  MATH  Google Scholar 

  22. Rios, E., et al.: The dynabic approach to resilience of critical infrastructures. In: Proceedings of the 18th International Conference on Availability, Reliability and Security. ARES 2023. Association for Computing Machinery, New York (2023). https://doi.org/10.1145/3600160.3605055

  23. Sen, S., Husom, E.J., Goknil, A., Tverdal, S., Nguyen, P., Mancisidor, I.: Taming data quality in AI-enabled industrial internet of things. IEEE Softw. 39(6), 35–42 (2022). https://doi.org/10.1109/MS.2022.3193975

    Article  Google Scholar 

  24. Sheikh, Z.A., Singh, Y., Singh, P.K., Ghafoor, K.Z.: Intelligent and secure framework for critical infrastructure (CPS): current trends, challenges, and future scope. Comput. Commun. 193, 302–331 (2022)

    Article  MATH  Google Scholar 

  25. Technicaldada: Pentbox. https://github.com/technicaldada/pentbox. Accessed 16 June 2024

  26. Tigli, J.Y., Lavirotte, S., Rey, G., Hourdin, V., Riveill, M.: Context-aware authorization in highly dynamic environments. arXiv preprint arXiv:1102.5194 (2011)

Download references

Acknowledgments

The research leading to this publication has received funding from the European Union’s Horizon Europe research and innovation programme under Grant Agreement 101070455 (DYNABIC).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Phu H. Nguyen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nguyen, P.H., Rauniyar, A., Niemi, T.V. (2025). Digital Twin-Based Security Orchestration, Automation and Response for IoT and CPS. In: Rey, G., Tigli, JY., Franquet, E. (eds) Internet of Things. IFIPIoT 2024. IFIP Advances in Information and Communication Technology, vol 737. Springer, Cham. https://doi.org/10.1007/978-3-031-81900-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-81900-1_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-81899-8

  • Online ISBN: 978-3-031-81900-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics