A Cyber Range Framework for Emulating Secure and Private IT/OT Consumer Service Verticals Toward 6G
Pages 4709 - 4716
Abstract
In the era of 6G technology, the convergence of Information Technology (IT) and Operational Technology (OT) is revolutionizing the way digital twin architectures are deployed for consumer applications. This convergence of IT and OT can leverage edge learning to transform 3D metaverse applications, making them more accessible and intelligent for Consumer Electronics (CE) users. In order to demonstrate IT/OT convergence and enable seamless, instantaneous interactions between physical entities and their digital counterparts in the CE context, we proposed a Digital Twin Metaverse Network (DTMN) that processes data from a wide range of CE applications and endpoints at the network’s edge. To strengthen the cyber resilience of consumer applications, we also propose an innovative cyber-range model that leverages deep learning techniques and is based on the MITRE attack and defense architecture. It addresses the paramount challenges of data security and privacy in a network that hosts CE applications and endpoints. Through known attack and defense scenarios, we showcase our model’s effectiveness in protecting consumer data and ensuring the reliability of CE applications within the DTMN ecosystem. The obtained results show how AI-assisted edge learning can improve the security and functionality of consumer applications, advancing towards a secure and interconnected digital future.
References
[1]
C. K. Wu, C.-T. Cheng, Y. Uwate, G. Chen, S. Mumtaz, and K. F. Tsang, “State-of-the-art and research opportunities for next-generation consumer electronics,” IEEE Trans. Consum. Electron., vol. 69, no. 4, pp. 937–948, Nov. 2023.
[2]
D. Javeed, M. S. Saeed, I. Ahmad, P. Kumar, A. Jolfaei, and M. Tahir, “An intelligent intrusion detection system for smart consumer electronics network,” IEEE Trans. Consum. Electron., vol. 69, no. 4, pp. 906–913, Nov. 2023.
[3]
A. Mukherjee, D. De, N. Dey, R. G. Crespo, and E. Herrera-Viedma, “DisastDrone: A disaster aware consumer Internet of Drone Things system in ultra-low latent 6G network,” IEEE Trans. Consum. Electron., vol. 69, no. 1, pp. 38–48, Feb. 2023.
[4]
M. S. Hossain, M. Al-Hammadi, and G. Muhammad, “Automatic fruit classification using deep learning for industrial applications,” IEEE Trans. Ind. Informat., vol. 15, no. 2, pp. 1027–1034, Feb. 2019.
[5]
M. Ali, Y. F. Hu, D. K. Luong, G. Oguntala, J. P. Li, and K. Abdo, “Adversarial attacks on AI based intrusion detection system for heterogeneous wireless communications networks,” in Proc. AIAA/IEEE 39th Digit. Avionics Syst. Conf. (DASC), 2020, pp. 1–6. 10.1109/DASC50938.2020.9256597.
[6]
A. Rahman et al., “Adversarial examples—Security threats to COVID-19 deep learning systems in medical IoT devices,” IEEE Internet Things J., vol. 8, no. 12, pp. 9603–9610, Jun. 2021.
[7]
H. Q. T. Ngo, H. Nguyenm, and T. P. Nguyen, “Fenceless collision-free avoidance driven by visual computation for an intelligent cyber–physical system employing both single-and double-S trajectory,” IEEE Trans. Consum. Electron., vol. 69, no. 3, pp. 622–639, Aug. 2023.
[8]
M. A. Al-Garadi, A. Mohamed, A. Al-Ali, X. Du, I. Ali, and M. Guizani, “A survey of machine and deep learning methods for Internet of Things (IoT) security,” IEEE Commun. Surveys Tuts., vol. 22, no. 3, pp. 1646–1685, 3rd Quart., 2020. 10.1109/comst.2020.2988293.
[9]
M. Al-Hawawreh and M. S. Hossain, “A privacy-aware framework for detecting cyber attacks on Internet of Medical Things systems using data fusion and quantum deep learning,” Inf. Fusion, vol. 99, Nov. 2023, Art. no.
[10]
M. Fera et al., “Towards digital twin implementation for assessing production line performance and balancing,” Sensors, vol. 20, no. 1, p. 97, 2020.
[11]
H. Viswanathan and P. E. Mogensen, “Communications in the 6G Era,” IEEE Access, vol. 8, pp. 57063–57074, 2020.
[12]
J.-H. Syu, J. C.-W. Lin, G. Srivastava, and K. Yu, “A comprehensive survey on artificial intelligence empowered edge computing on consumer electronics,” IEEE Trans. Consum. Electron., vol. 69, no. 4, pp. 1023–1034, Nov. 2023.
[13]
Y. Jo, O. Choi, J. You, Y. Cha, and D. H. Lee, “Cyberattack models for ship equipment based on the MITRE ATT&CK framework,” Sensors, vol. 22, no. 5, p. 1860, Mar. 2022.
[14]
M. Jbair, B. Ahmad, C. Maple, and R. Harrison, “Threat modelling for industrial cyber physical systems in the era of smart manufacturing,” Comput. Ind., vol. 137, May 2022, Art. no.
Index Terms
- A Cyber Range Framework for Emulating Secure and Private IT/OT Consumer Service Verticals Toward 6G
Index terms have been assigned to the content through auto-classification.
Recommendations
Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence
AbstractCyber Threat sharing helps with defending against cyber attacks in a timely manner. Many frameworks have been proposed for CTI sharing such as Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Intelligence ...
Secure Team Composition to Thwart Insider Threats and Cyber-Espionage
Special Issue on Pricing and Incentives in Networks and Systems and Regular PapersWe develop a formal nondeterministic game model for secure team composition to counter cyber-espionage and to protect organizational secrets against an attacker who tries to sidestep technical security mechanisms by offering a bribe to a project team ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
0098-3063 © 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See https://www.ieee.org/publications/rights/index.html for more information.
Publisher
IEEE Press
Publication History
Published: 10 April 2024
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 05 Jan 2025