[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

A Cyber Range Framework for Emulating Secure and Private IT/OT Consumer Service Verticals Toward 6G

Published: 10 April 2024 Publication History

Abstract

In the era of 6G technology, the convergence of Information Technology (IT) and Operational Technology (OT) is revolutionizing the way digital twin architectures are deployed for consumer applications. This convergence of IT and OT can leverage edge learning to transform 3D metaverse applications, making them more accessible and intelligent for Consumer Electronics (CE) users. In order to demonstrate IT/OT convergence and enable seamless, instantaneous interactions between physical entities and their digital counterparts in the CE context, we proposed a Digital Twin Metaverse Network (DTMN) that processes data from a wide range of CE applications and endpoints at the network’s edge. To strengthen the cyber resilience of consumer applications, we also propose an innovative cyber-range model that leverages deep learning techniques and is based on the MITRE attack and defense architecture. It addresses the paramount challenges of data security and privacy in a network that hosts CE applications and endpoints. Through known attack and defense scenarios, we showcase our model’s effectiveness in protecting consumer data and ensuring the reliability of CE applications within the DTMN ecosystem. The obtained results show how AI-assisted edge learning can improve the security and functionality of consumer applications, advancing towards a secure and interconnected digital future.

References

[1]
C. K. Wu, C.-T. Cheng, Y. Uwate, G. Chen, S. Mumtaz, and K. F. Tsang, “State-of-the-art and research opportunities for next-generation consumer electronics,” IEEE Trans. Consum. Electron., vol. 69, no. 4, pp. 937–948, Nov. 2023.
[2]
D. Javeed, M. S. Saeed, I. Ahmad, P. Kumar, A. Jolfaei, and M. Tahir, “An intelligent intrusion detection system for smart consumer electronics network,” IEEE Trans. Consum. Electron., vol. 69, no. 4, pp. 906–913, Nov. 2023.
[3]
A. Mukherjee, D. De, N. Dey, R. G. Crespo, and E. Herrera-Viedma, “DisastDrone: A disaster aware consumer Internet of Drone Things system in ultra-low latent 6G network,” IEEE Trans. Consum. Electron., vol. 69, no. 1, pp. 38–48, Feb. 2023.
[4]
M. S. Hossain, M. Al-Hammadi, and G. Muhammad, “Automatic fruit classification using deep learning for industrial applications,” IEEE Trans. Ind. Informat., vol. 15, no. 2, pp. 1027–1034, Feb. 2019.
[5]
M. Ali, Y. F. Hu, D. K. Luong, G. Oguntala, J. P. Li, and K. Abdo, “Adversarial attacks on AI based intrusion detection system for heterogeneous wireless communications networks,” in Proc. AIAA/IEEE 39th Digit. Avionics Syst. Conf. (DASC), 2020, pp. 1–6. 10.1109/DASC50938.2020.9256597.
[6]
A. Rahman et al., “Adversarial examples—Security threats to COVID-19 deep learning systems in medical IoT devices,” IEEE Internet Things J., vol. 8, no. 12, pp. 9603–9610, Jun. 2021.
[7]
H. Q. T. Ngo, H. Nguyenm, and T. P. Nguyen, “Fenceless collision-free avoidance driven by visual computation for an intelligent cyber–physical system employing both single-and double-S trajectory,” IEEE Trans. Consum. Electron., vol. 69, no. 3, pp. 622–639, Aug. 2023.
[8]
M. A. Al-Garadi, A. Mohamed, A. Al-Ali, X. Du, I. Ali, and M. Guizani, “A survey of machine and deep learning methods for Internet of Things (IoT) security,” IEEE Commun. Surveys Tuts., vol. 22, no. 3, pp. 1646–1685, 3rd Quart., 2020. 10.1109/comst.2020.2988293.
[9]
M. Al-Hawawreh and M. S. Hossain, “A privacy-aware framework for detecting cyber attacks on Internet of Medical Things systems using data fusion and quantum deep learning,” Inf. Fusion, vol. 99, Nov. 2023, Art. no.
[10]
M. Fera et al., “Towards digital twin implementation for assessing production line performance and balancing,” Sensors, vol. 20, no. 1, p. 97, 2020.
[11]
H. Viswanathan and P. E. Mogensen, “Communications in the 6G Era,” IEEE Access, vol. 8, pp. 57063–57074, 2020.
[12]
J.-H. Syu, J. C.-W. Lin, G. Srivastava, and K. Yu, “A comprehensive survey on artificial intelligence empowered edge computing on consumer electronics,” IEEE Trans. Consum. Electron., vol. 69, no. 4, pp. 1023–1034, Nov. 2023.
[13]
Y. Jo, O. Choi, J. You, Y. Cha, and D. H. Lee, “Cyberattack models for ship equipment based on the MITRE ATT&CK framework,” Sensors, vol. 22, no. 5, p. 1860, Mar. 2022.
[14]
M. Jbair, B. Ahmad, C. Maple, and R. Harrison, “Threat modelling for industrial cyber physical systems in the era of smart manufacturing,” Comput. Ind., vol. 137, May 2022, Art. no.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Consumer Electronics
IEEE Transactions on Consumer Electronics  Volume 70, Issue 2
May 2024
364 pages

Publisher

IEEE Press

Publication History

Published: 10 April 2024

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media