Digital Forensics for Analyzing Cyber Threats in the XR Technology Ecosystem within Digital Twins
Recently, advancements in digital twin and extended reality (XR) technologies, along with industrial control systems (ICSs), have driven the transition to Industry 5.0. Digital twins mimic and simulate real-world systems and play a crucial role in various industries. XR provides innovative user expe...
Gespeichert in:
Veröffentlicht in: | Electronics (Basel) 2024-07, Vol.13 (13), p.2653 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 13 |
container_start_page | 2653 |
container_title | Electronics (Basel) |
container_volume | 13 |
creator | Oh, Subin Shon, Taeshik |
description | Recently, advancements in digital twin and extended reality (XR) technologies, along with industrial control systems (ICSs), have driven the transition to Industry 5.0. Digital twins mimic and simulate real-world systems and play a crucial role in various industries. XR provides innovative user experiences through virtual reality (VR), augmented reality (AR), and mixed reality (MR). By integrating digital twin simulations into XR devices, these technologies are utilized in various industrial fields. However, the prevalence of XR devices has increased the exposure to cybersecurity threats in ICS and digital twin environments. Because XR devices are connected to networks, the control and production data they process are at risk of being exposed to cyberattackers. Attackers can infiltrate XR devices through malicious code or hacking attacks to take control of the ICS or digital twin or paralyze the system. Therefore, this study emphasizes the cybersecurity threats in the ecosystem of XR devices used in ICSs and conducts research based on digital forensics. It identifies potentially sensitive data and artifacts in XR devices and proposes secure and reliable security response measures in the Industry 5.0 environment. |
doi_str_mv | 10.3390/electronics13132653 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3079025576</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3079025576</sourcerecordid><originalsourceid>FETCH-LOGICAL-c157t-145ae186d8cbb92d5b7a19f0e99960e98409fc57bad8da5fe854c7192f9c8ae33</originalsourceid><addsrcrecordid>eNptkE1LAzEQhoMoWGp_gZeA59V8NLvJsdRWhYIgK3hbstnZbsp2U5OUsv56Iyp4cA4zc3h44H0RuqbklnNF7qAHE70brAmUU85ywc_QhJFCZYopdv7nv0SzEHYkjaJccjJB-t5ubdQ9XjsPQ0gO3DqPF4Puxw87bPFyrMHjsvOgY8B2wLED_PaCSzDd4Hq3HfHKuDCGCHt8srFLyK-zPNkhXKGLVvcBZj93il7Xq3L5mG2eH56Wi01mqChiRudCA5V5I01dK9aIutBUtQSUUnnack5Ua0RR60Y2WrQgxdwUVLFWGamB8ym6-fYevHs_QojVzh19yhEqnvITJkSRJ4p_U8a7EDy01cHbvfZjRUn1VWf1T538EzYGbHA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3079025576</pqid></control><display><type>article</type><title>Digital Forensics for Analyzing Cyber Threats in the XR Technology Ecosystem within Digital Twins</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Oh, Subin ; Shon, Taeshik</creator><creatorcontrib>Oh, Subin ; Shon, Taeshik</creatorcontrib><description>Recently, advancements in digital twin and extended reality (XR) technologies, along with industrial control systems (ICSs), have driven the transition to Industry 5.0. Digital twins mimic and simulate real-world systems and play a crucial role in various industries. XR provides innovative user experiences through virtual reality (VR), augmented reality (AR), and mixed reality (MR). By integrating digital twin simulations into XR devices, these technologies are utilized in various industrial fields. However, the prevalence of XR devices has increased the exposure to cybersecurity threats in ICS and digital twin environments. Because XR devices are connected to networks, the control and production data they process are at risk of being exposed to cyberattackers. Attackers can infiltrate XR devices through malicious code or hacking attacks to take control of the ICS or digital twin or paralyze the system. Therefore, this study emphasizes the cybersecurity threats in the ecosystem of XR devices used in ICSs and conducts research based on digital forensics. It identifies potentially sensitive data and artifacts in XR devices and proposes secure and reliable security response measures in the Industry 5.0 environment.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics13132653</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Artifact identification ; Augmented reality ; Computer forensics ; Control systems ; Cost control ; Criminal investigations ; Cybersecurity ; Devices ; Digital twins ; Forensic computing ; Forensic sciences ; Industrial electronics ; Internet of Things ; Manufacturing ; Mixed reality ; Personal information ; Privacy ; Product development ; Risk management ; Technology assessment ; Threat evaluation ; User experience ; Virtual communities ; Virtual reality</subject><ispartof>Electronics (Basel), 2024-07, Vol.13 (13), p.2653</ispartof><rights>2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c157t-145ae186d8cbb92d5b7a19f0e99960e98409fc57bad8da5fe854c7192f9c8ae33</cites><orcidid>0009-0009-8246-053X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27922,27923</link.rule.ids></links><search><creatorcontrib>Oh, Subin</creatorcontrib><creatorcontrib>Shon, Taeshik</creatorcontrib><title>Digital Forensics for Analyzing Cyber Threats in the XR Technology Ecosystem within Digital Twins</title><title>Electronics (Basel)</title><description>Recently, advancements in digital twin and extended reality (XR) technologies, along with industrial control systems (ICSs), have driven the transition to Industry 5.0. Digital twins mimic and simulate real-world systems and play a crucial role in various industries. XR provides innovative user experiences through virtual reality (VR), augmented reality (AR), and mixed reality (MR). By integrating digital twin simulations into XR devices, these technologies are utilized in various industrial fields. However, the prevalence of XR devices has increased the exposure to cybersecurity threats in ICS and digital twin environments. Because XR devices are connected to networks, the control and production data they process are at risk of being exposed to cyberattackers. Attackers can infiltrate XR devices through malicious code or hacking attacks to take control of the ICS or digital twin or paralyze the system. Therefore, this study emphasizes the cybersecurity threats in the ecosystem of XR devices used in ICSs and conducts research based on digital forensics. It identifies potentially sensitive data and artifacts in XR devices and proposes secure and reliable security response measures in the Industry 5.0 environment.</description><subject>Artifact identification</subject><subject>Augmented reality</subject><subject>Computer forensics</subject><subject>Control systems</subject><subject>Cost control</subject><subject>Criminal investigations</subject><subject>Cybersecurity</subject><subject>Devices</subject><subject>Digital twins</subject><subject>Forensic computing</subject><subject>Forensic sciences</subject><subject>Industrial electronics</subject><subject>Internet of Things</subject><subject>Manufacturing</subject><subject>Mixed reality</subject><subject>Personal information</subject><subject>Privacy</subject><subject>Product development</subject><subject>Risk management</subject><subject>Technology assessment</subject><subject>Threat evaluation</subject><subject>User experience</subject><subject>Virtual communities</subject><subject>Virtual reality</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptkE1LAzEQhoMoWGp_gZeA59V8NLvJsdRWhYIgK3hbstnZbsp2U5OUsv56Iyp4cA4zc3h44H0RuqbklnNF7qAHE70brAmUU85ywc_QhJFCZYopdv7nv0SzEHYkjaJccjJB-t5ubdQ9XjsPQ0gO3DqPF4Puxw87bPFyrMHjsvOgY8B2wLED_PaCSzDd4Hq3HfHKuDCGCHt8srFLyK-zPNkhXKGLVvcBZj93il7Xq3L5mG2eH56Wi01mqChiRudCA5V5I01dK9aIutBUtQSUUnnack5Ua0RR60Y2WrQgxdwUVLFWGamB8ym6-fYevHs_QojVzh19yhEqnvITJkSRJ4p_U8a7EDy01cHbvfZjRUn1VWf1T538EzYGbHA</recordid><startdate>20240706</startdate><enddate>20240706</enddate><creator>Oh, Subin</creator><creator>Shon, Taeshik</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0009-0009-8246-053X</orcidid></search><sort><creationdate>20240706</creationdate><title>Digital Forensics for Analyzing Cyber Threats in the XR Technology Ecosystem within Digital Twins</title><author>Oh, Subin ; Shon, Taeshik</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c157t-145ae186d8cbb92d5b7a19f0e99960e98409fc57bad8da5fe854c7192f9c8ae33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Artifact identification</topic><topic>Augmented reality</topic><topic>Computer forensics</topic><topic>Control systems</topic><topic>Cost control</topic><topic>Criminal investigations</topic><topic>Cybersecurity</topic><topic>Devices</topic><topic>Digital twins</topic><topic>Forensic computing</topic><topic>Forensic sciences</topic><topic>Industrial electronics</topic><topic>Internet of Things</topic><topic>Manufacturing</topic><topic>Mixed reality</topic><topic>Personal information</topic><topic>Privacy</topic><topic>Product development</topic><topic>Risk management</topic><topic>Technology assessment</topic><topic>Threat evaluation</topic><topic>User experience</topic><topic>Virtual communities</topic><topic>Virtual reality</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Oh, Subin</creatorcontrib><creatorcontrib>Shon, Taeshik</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Oh, Subin</au><au>Shon, Taeshik</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Digital Forensics for Analyzing Cyber Threats in the XR Technology Ecosystem within Digital Twins</atitle><jtitle>Electronics (Basel)</jtitle><date>2024-07-06</date><risdate>2024</risdate><volume>13</volume><issue>13</issue><spage>2653</spage><pages>2653-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>Recently, advancements in digital twin and extended reality (XR) technologies, along with industrial control systems (ICSs), have driven the transition to Industry 5.0. Digital twins mimic and simulate real-world systems and play a crucial role in various industries. XR provides innovative user experiences through virtual reality (VR), augmented reality (AR), and mixed reality (MR). By integrating digital twin simulations into XR devices, these technologies are utilized in various industrial fields. However, the prevalence of XR devices has increased the exposure to cybersecurity threats in ICS and digital twin environments. Because XR devices are connected to networks, the control and production data they process are at risk of being exposed to cyberattackers. Attackers can infiltrate XR devices through malicious code or hacking attacks to take control of the ICS or digital twin or paralyze the system. Therefore, this study emphasizes the cybersecurity threats in the ecosystem of XR devices used in ICSs and conducts research based on digital forensics. It identifies potentially sensitive data and artifacts in XR devices and proposes secure and reliable security response measures in the Industry 5.0 environment.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics13132653</doi><orcidid>https://orcid.org/0009-0009-8246-053X</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2079-9292 |
ispartof | Electronics (Basel), 2024-07, Vol.13 (13), p.2653 |
issn | 2079-9292 2079-9292 |
language | eng |
recordid | cdi_proquest_journals_3079025576 |
source | MDPI - Multidisciplinary Digital Publishing Institute; EZB-FREE-00999 freely available EZB journals |
subjects | Artifact identification Augmented reality Computer forensics Control systems Cost control Criminal investigations Cybersecurity Devices Digital twins Forensic computing Forensic sciences Industrial electronics Internet of Things Manufacturing Mixed reality Personal information Privacy Product development Risk management Technology assessment Threat evaluation User experience Virtual communities Virtual reality |
title | Digital Forensics for Analyzing Cyber Threats in the XR Technology Ecosystem within Digital Twins |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T13%3A54%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Digital%20Forensics%20for%20Analyzing%20Cyber%20Threats%20in%20the%20XR%20Technology%20Ecosystem%20within%20Digital%20Twins&rft.jtitle=Electronics%20(Basel)&rft.au=Oh,%20Subin&rft.date=2024-07-06&rft.volume=13&rft.issue=13&rft.spage=2653&rft.pages=2653-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics13132653&rft_dat=%3Cproquest_cross%3E3079025576%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3079025576&rft_id=info:pmid/&rfr_iscdi=true |