Secure Integration of IoT & Digital Twins

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 20 May 2024 | Viewed by 8046

Special Issue Editors


E-Mail Website
Guest Editor
Department of Applied Informatics, School of Information Sciences, University of Macedonia, Thessaloniki, Greece
Interests: multimodal data communications systems; cloud transmission/streaming/synchronization; wireless communication systems; evolution of WiMAX technology; science information network; Internet of Things; cloud computing; big data
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Digital Twin is a recently developed technique that offers more reliable results for novel and demanding systems. The Digital Twins concept is most frequently used to better “predict” functionality through a virtual model designed to accurately reflect a physical object. Through such a system, useful information could be extracted about its reliability and its usage, as well as the degree of improvement of the existing system/object.

Current systems and their growth could be achieved in a more stable environment with the “help” of a parallel system where their use could be evaluated. With the use of a virtual system model based on a Digital Twin scenario, costs can also be cut considerably.

Thus, the importance of the Digital Twin concept is clear, though new challenges are arising in terms of security and the privacy of the data produced, transmitted, and managed from Internet of Things systems. In most cases, these data are referred to as Big Data due to their nature. Additionally, these types of systems are quite often related to and coexist with cloud systems. Therefore, a need arises for further research in the field of integrated systems that will provide more security and reliability.

The topics of interest include but are not limited to the following:

  • Integration benefits of the Internet of Things and Digital Twins;
  • Security challenges of a Digital Twin system of IoT-based cloud;
  • Big Data secure management through a Digital Twin system;
  • Secure machine learning IoT-based Big Data analytics in the cloud;
  • Challenges and applications of IoT-based Big Data in Digital Twins;
  • Security and privacy issues in Internet-of-Things-enabled systems in a Digital Twin scenario.

Dr. Christos L. Stergiou
Dr. Konstantinos E. Psannis
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • digital twins
  • security
  • integrated model
  • Internet of Things
  • big data
  • cloud computing
  • management
  • efficient

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

17 pages, 995 KiB  
Article
A Self-Adapting IoT Network Configuration Supported by Distributed Graph Transformations
by Leszek Jaskierny and Leszek Kotulski
Appl. Sci. 2023, 13(23), 12718; https://doi.org/10.3390/app132312718 - 27 Nov 2023
Viewed by 606
Abstract
The research described in this article aims to propose the creation of a framework that would enable the self-optimization of IoT device networks. The work is based on two foundations: distributed graph transformations and a flexible IoT network supported by the several standards [...] Read more.
The research described in this article aims to propose the creation of a framework that would enable the self-optimization of IoT device networks. The work is based on two foundations: distributed graph transformations and a flexible IoT network supported by the several standards and definitions proposed by The Open Group, such as the definition of microservices architecture (MSA) as well as IoT and semantic interoperability standards, providing a broader context for the research. It introduces the concept of capabilities, both at the individual device and network levels, which are used to describe the desired functions that will be performed by the given system. The network of distributed IoT devices is visualized as a graph, and graph transformations are used to specify and optimize the network in response to events like degraded performance, failures, or configuration changes. These actions are automatically performed in order to restore the original set of capabilities defined for the system. Validation of these capabilities is used to assess the success rate of the performed actions. The document describes a practical implementation of an IoT network for managing and monitoring an indoor greenhouse. Thanks to the introduction of formal representation of capabilities, the programming effort required to build the system was significantly reduced. Furthermore, automation related to the validation of capabilities and the performance of automated actions reduces the effort by a factor of a hundred compared with a manual action. Full article
(This article belongs to the Special Issue Secure Integration of IoT & Digital Twins)
Show Figures

Figure 1

22 pages, 1122 KiB  
Article
CRBF: Cross-Referencing Bloom-Filter-Based Data Integrity Verification Framework for Object-Based Big Data Transfer Systems
by Preethika Kasu, Prince Hamandawana and Tae-Sun Chung
Appl. Sci. 2023, 13(13), 7830; https://doi.org/10.3390/app13137830 - 03 Jul 2023
Viewed by 750
Abstract
Various components are involved in the end-to-end path of data transfer. Protecting data integrity from failures in these intermediate components is a key feature of big data transfer tools. Although most of these components provide some degree of data integrity, they are either [...] Read more.
Various components are involved in the end-to-end path of data transfer. Protecting data integrity from failures in these intermediate components is a key feature of big data transfer tools. Although most of these components provide some degree of data integrity, they are either too expensive or inefficient in recovering corrupted data. This problem highlights the need for application-level end-to-end integrity verification during data transfer. However, the computational, memory, and storage overhead of big data transfer tools can be a significant bottleneck for ensuring data integrity due to the large size of the data. This paper proposes a novel framework for data integrity verification in big data transfer systems using a cross-referencing Bloom filter. This framework has three advantages over state-of-the-art data integrity techniques: lower computation and memory overhead and zero false-positive errors for a limited number of elements. This study evaluates the computation, memory, recovery time, and false-positive overhead for the proposed framework and compares them with state-of-the-art solutions. The evaluation results indicate that the proposed framework is efficient in detecting and recovering from integrity errors while eliminating false positives in the Bloom filter data structure. In addition, we observe negligible computation, memory, and recovery overheads for all workloads. Full article
(This article belongs to the Special Issue Secure Integration of IoT & Digital Twins)
Show Figures

Figure 1

18 pages, 3848 KiB  
Article
Secure and Efficient Multicast-Enabled Handover Scheme Pertaining to Vehicular Ad Hoc Networks in PMIPv6
by Amit Kumar Goyal, Gaurav Agarwal, Arun Kumar Tripathi and Mangal Sain
Appl. Sci. 2023, 13(4), 2624; https://doi.org/10.3390/app13042624 - 17 Feb 2023
Viewed by 1219
Abstract
In VANET, mobility management and handover management are two of the most intriguing and challenging research topics. The existing mobility management infrastructures are unable to provide seamless secure mobility and handover management. It is very common in a vehicular network that when a [...] Read more.
In VANET, mobility management and handover management are two of the most intriguing and challenging research topics. The existing mobility management infrastructures are unable to provide seamless secure mobility and handover management. It is very common in a vehicular network that when a vehicle roams between two domains, its reachability status may be compromised. The main reason for this is the higher handover latency and packet loss during the handover process. In the last decade, IP-based mobility protocols have been proposed for interoperable handover management systems. There has been a great deal of interest in providing IP multicast to mobile nodes such as vehicles, and numerous strategies have been put forth thus far. This research article proposes an IP multicast-enabled handover architecture for VANET in PMIPv6. Adding the IP multicast facility to the authentication server allows handover management that is both intra-domain and inter-domain, which originally was not supported by PMIPv6. This makes it possible for the IP service of a vehicle to maintain a connection from any location, without changing the earlier application. Additionally, a secure architecture with authentication capabilities built on top of PMIPv6 is suggested for VANET to address the authentication problem. Finally, the article compares the performance of the proposed architecture with that of the ones currently in use by varying several factors, including the vehicle’s density, the setup costs required, and the unit transmission costs on wired and wireless links, and it shows that our proposed solution ensures the handover process with a minimal cost change. Full article
(This article belongs to the Special Issue Secure Integration of IoT & Digital Twins)
Show Figures

Figure 1

14 pages, 2601 KiB  
Article
Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario
by Christos L. Stergiou, Elisavet Bompoli and Konstantinos E. Psannis
Appl. Sci. 2023, 13(2), 758; https://doi.org/10.3390/app13020758 - 05 Jan 2023
Cited by 7 | Viewed by 3077
Abstract
Due to its unique type of services, Cloud Computing could operate as a “base technology” for other technologies; this attracts researchers to develop sustainable Cloud systems. It is a new generation of services that offers an opportunity for users to access and manage [...] Read more.
Due to its unique type of services, Cloud Computing could operate as a “base technology” for other technologies; this attracts researchers to develop sustainable Cloud systems. It is a new generation of services that offers an opportunity for users to access and manage their information, applications, and data regardless of place and time. Nevertheless, there is a type of service that can include large amounts of data, called Big Data, and it consists of the rapid use of the Internet of Things (IoT) to produce large data sets. In this work, initially, we present Cloud Computing (CC) and Big Data (BD) exported from IoT, focusing on the security and management challenges of both. Notably, we combine the two aforementioned technologies to examine their related characteristics and discover new perspectives and opportunities for their integration and to achieve a sustainable environment called a Digital Twin scenario. Subsequently, we present how Cloud Computing contributes to IoT-based Big Data, aiming to fill a scientific gap in the sector of their integration regarding security and privacy. Finally, we additionally survey the security challenges of the integrated model of BD and CC and then propose a novel security algorithm for sustainable Cloud systems in a Digital Twin scenario. The experimental results presented are based on the use of the encryption algorithms AES, RC5, and RSA, and our proposed model extends the advances of CC and IoT-based BD, offering a highly novel and scalable service platform to achieve better privacy and security services. Full article
(This article belongs to the Special Issue Secure Integration of IoT & Digital Twins)
Show Figures

Figure 1

Review

Jump to: Research

38 pages, 2341 KiB  
Review
Digital Twins in Software Engineering—A Systematic Literature Review and Vision
by Miguel A. Guinea-Cabrera and Juan A. Holgado-Terriza
Appl. Sci. 2024, 14(3), 977; https://doi.org/10.3390/app14030977 - 23 Jan 2024
Viewed by 1322
Abstract
Digital twins are a powerful consequence of digital transformation. In fact, they have been applied to many industries to enhance operations, predict needs, improve decision making, or optimize performance, even though the definition of digital twins is still evolving. However, their impact on [...] Read more.
Digital twins are a powerful consequence of digital transformation. In fact, they have been applied to many industries to enhance operations, predict needs, improve decision making, or optimize performance, even though the definition of digital twins is still evolving. However, their impact on the software industry is still limited. Thus, this work aims to analyze the current adoption of digital twins in the software industry as a potential path to integrate them into application lifecycle management. To achieve this objective, first, the significant characteristics of current digital twins are analyzed in their application to manufacturing to understand how the knowledge and the lessons learned can be transferred to the software industry. Second, a systematic literature review was conducted on Scopus, the Web of Science, and the ScienceDirect database. The literature review revealed 93 documents after data screening and cleaning 251 initial documents. Our main findings are that digital twins are already influencing and will significantly affect the software industry, revolutionizing various aspects of the software development lifecycle. This study tackles what identifies a digital twin in the software industry, the specific domains and areas where they can be applied in the software lifecycle, and the proposed approaches explored to build digital twins for developing, deploying, and maintaining software systems. Finally, this study proposes some guidelines for building digital twins in the context of application lifecycle management. Determining an appropriate roadmap shortly is essential to achieve a widespread applicability to building suitable digital twins and preparing organizations for the software industry. Full article
(This article belongs to the Special Issue Secure Integration of IoT & Digital Twins)
Show Figures

Figure 1

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Digital Twin is a recently developed technique that offers more reliable results for novel and demanding systems. The Digital Twins concept is most frequently used to better “predict” functionality through a virtual model designed to accurately reflect a physical object. Through such a system, useful information could be extracted about its reliability and its usage, as well as the degree of improvement of the existing system/object.

Current systems and their growth could be achieved in a more stable environment with the “help” of a parallel system where their use could be evaluated. With the use of a virtual system model based on a Digital Twin scenario, costs can also be cut considerably.

The topics of interest include but are not limited to the following:

  • Integration benefits of the Internet of Things and Digital Twins;
  • Security challenges of a Digital Twin system of IoT-based cloud;
  • Big Data secure management through a Digital Twin system;
  • Secure machine learning IoT-based Big Data analytics in the cloud;
  • Challenges and applications of IoT-based Big Data in Digital Twins;
  • Security and privacy issues in Internet-of-Things-enabled systems in a Digital Twin scenario.
Back to TopTop