TY - GEN
T1 - An IoT Digital Twin for Cyber-Security Defence Based on Runtime Verification
AU - de Hoz Diego, Jorge David
AU - Temperekidis, Anastasios
AU - Katsaros, Panagiotis
AU - Konstantinou, Charalambos
N1 - Publisher Copyright:
© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2022
Y1 - 2022
N2 - A security decoupling approach for IoT device communications is presented, based on a Digital Twin with runtime verification capabilities. The solution proposed assumes that a local agent (security module) can be deployed to the IoT device by the IoT server. The runtime verification approach implemented in the Digital Twin detects possible violations of protected communications from either a remote device or a local compromised process and provides timely and valuable information for countering a potential cyber-security attack. Moreover, only a subset of the observed traffic needs to be monitored, which induces negligible overhead and allows deploying the Digital Twin in IoT devices with limited computational resources. Runtime verification was implemented by adopting a rule-based approach for monitoring parametric events, i.e. the packets that carry data.
AB - A security decoupling approach for IoT device communications is presented, based on a Digital Twin with runtime verification capabilities. The solution proposed assumes that a local agent (security module) can be deployed to the IoT device by the IoT server. The runtime verification approach implemented in the Digital Twin detects possible violations of protected communications from either a remote device or a local compromised process and provides timely and valuable information for countering a potential cyber-security attack. Moreover, only a subset of the observed traffic needs to be monitored, which induces negligible overhead and allows deploying the Digital Twin in IoT devices with limited computational resources. Runtime verification was implemented by adopting a rule-based approach for monitoring parametric events, i.e. the packets that carry data.
KW - Digital twin
KW - IoT
KW - Runtime verification
KW - Security-by-design
UR - http://www.scopus.com/inward/record.url?scp=85142669319&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-19849-6_31
DO - 10.1007/978-3-031-19849-6_31
M3 - Conference contribution
AN - SCOPUS:85142669319
SN - 9783031198489
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 556
EP - 574
BT - Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles - 11th International Symposium, ISoLA 2022, Proceedings
A2 - Margaria, Tiziana
A2 - Steffen, Bernhard
PB - Springer Science and Business Media Deutschland GmbH
T2 - 11th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2022
Y2 - 22 October 2022 through 30 October 2022
ER -