Digital Forensics for Analyzing Cyber Threats in the XR Technology Ecosystem within Digital Twins

Recently, advancements in digital twin and extended reality (XR) technologies, along with industrial control systems (ICSs), have driven the transition to Industry 5.0. Digital twins mimic and simulate real-world systems and play a crucial role in various industries. XR provides innovative user expe...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Electronics (Basel) 2024-07, Vol.13 (13), p.2653
Hauptverfasser: Oh, Subin, Shon, Taeshik
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 13
container_start_page 2653
container_title Electronics (Basel)
container_volume 13
creator Oh, Subin
Shon, Taeshik
description Recently, advancements in digital twin and extended reality (XR) technologies, along with industrial control systems (ICSs), have driven the transition to Industry 5.0. Digital twins mimic and simulate real-world systems and play a crucial role in various industries. XR provides innovative user experiences through virtual reality (VR), augmented reality (AR), and mixed reality (MR). By integrating digital twin simulations into XR devices, these technologies are utilized in various industrial fields. However, the prevalence of XR devices has increased the exposure to cybersecurity threats in ICS and digital twin environments. Because XR devices are connected to networks, the control and production data they process are at risk of being exposed to cyberattackers. Attackers can infiltrate XR devices through malicious code or hacking attacks to take control of the ICS or digital twin or paralyze the system. Therefore, this study emphasizes the cybersecurity threats in the ecosystem of XR devices used in ICSs and conducts research based on digital forensics. It identifies potentially sensitive data and artifacts in XR devices and proposes secure and reliable security response measures in the Industry 5.0 environment.
doi_str_mv 10.3390/electronics13132653
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3079025576</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3079025576</sourcerecordid><originalsourceid>FETCH-LOGICAL-c157t-145ae186d8cbb92d5b7a19f0e99960e98409fc57bad8da5fe854c7192f9c8ae33</originalsourceid><addsrcrecordid>eNptkE1LAzEQhoMoWGp_gZeA59V8NLvJsdRWhYIgK3hbstnZbsp2U5OUsv56Iyp4cA4zc3h44H0RuqbklnNF7qAHE70brAmUU85ywc_QhJFCZYopdv7nv0SzEHYkjaJccjJB-t5ubdQ9XjsPQ0gO3DqPF4Puxw87bPFyrMHjsvOgY8B2wLED_PaCSzDd4Hq3HfHKuDCGCHt8srFLyK-zPNkhXKGLVvcBZj93il7Xq3L5mG2eH56Wi01mqChiRudCA5V5I01dK9aIutBUtQSUUnnack5Ua0RR60Y2WrQgxdwUVLFWGamB8ym6-fYevHs_QojVzh19yhEqnvITJkSRJ4p_U8a7EDy01cHbvfZjRUn1VWf1T538EzYGbHA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3079025576</pqid></control><display><type>article</type><title>Digital Forensics for Analyzing Cyber Threats in the XR Technology Ecosystem within Digital Twins</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Oh, Subin ; Shon, Taeshik</creator><creatorcontrib>Oh, Subin ; Shon, Taeshik</creatorcontrib><description>Recently, advancements in digital twin and extended reality (XR) technologies, along with industrial control systems (ICSs), have driven the transition to Industry 5.0. Digital twins mimic and simulate real-world systems and play a crucial role in various industries. XR provides innovative user experiences through virtual reality (VR), augmented reality (AR), and mixed reality (MR). By integrating digital twin simulations into XR devices, these technologies are utilized in various industrial fields. However, the prevalence of XR devices has increased the exposure to cybersecurity threats in ICS and digital twin environments. Because XR devices are connected to networks, the control and production data they process are at risk of being exposed to cyberattackers. Attackers can infiltrate XR devices through malicious code or hacking attacks to take control of the ICS or digital twin or paralyze the system. Therefore, this study emphasizes the cybersecurity threats in the ecosystem of XR devices used in ICSs and conducts research based on digital forensics. It identifies potentially sensitive data and artifacts in XR devices and proposes secure and reliable security response measures in the Industry 5.0 environment.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics13132653</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Artifact identification ; Augmented reality ; Computer forensics ; Control systems ; Cost control ; Criminal investigations ; Cybersecurity ; Devices ; Digital twins ; Forensic computing ; Forensic sciences ; Industrial electronics ; Internet of Things ; Manufacturing ; Mixed reality ; Personal information ; Privacy ; Product development ; Risk management ; Technology assessment ; Threat evaluation ; User experience ; Virtual communities ; Virtual reality</subject><ispartof>Electronics (Basel), 2024-07, Vol.13 (13), p.2653</ispartof><rights>2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c157t-145ae186d8cbb92d5b7a19f0e99960e98409fc57bad8da5fe854c7192f9c8ae33</cites><orcidid>0009-0009-8246-053X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27922,27923</link.rule.ids></links><search><creatorcontrib>Oh, Subin</creatorcontrib><creatorcontrib>Shon, Taeshik</creatorcontrib><title>Digital Forensics for Analyzing Cyber Threats in the XR Technology Ecosystem within Digital Twins</title><title>Electronics (Basel)</title><description>Recently, advancements in digital twin and extended reality (XR) technologies, along with industrial control systems (ICSs), have driven the transition to Industry 5.0. Digital twins mimic and simulate real-world systems and play a crucial role in various industries. XR provides innovative user experiences through virtual reality (VR), augmented reality (AR), and mixed reality (MR). By integrating digital twin simulations into XR devices, these technologies are utilized in various industrial fields. However, the prevalence of XR devices has increased the exposure to cybersecurity threats in ICS and digital twin environments. Because XR devices are connected to networks, the control and production data they process are at risk of being exposed to cyberattackers. Attackers can infiltrate XR devices through malicious code or hacking attacks to take control of the ICS or digital twin or paralyze the system. Therefore, this study emphasizes the cybersecurity threats in the ecosystem of XR devices used in ICSs and conducts research based on digital forensics. It identifies potentially sensitive data and artifacts in XR devices and proposes secure and reliable security response measures in the Industry 5.0 environment.</description><subject>Artifact identification</subject><subject>Augmented reality</subject><subject>Computer forensics</subject><subject>Control systems</subject><subject>Cost control</subject><subject>Criminal investigations</subject><subject>Cybersecurity</subject><subject>Devices</subject><subject>Digital twins</subject><subject>Forensic computing</subject><subject>Forensic sciences</subject><subject>Industrial electronics</subject><subject>Internet of Things</subject><subject>Manufacturing</subject><subject>Mixed reality</subject><subject>Personal information</subject><subject>Privacy</subject><subject>Product development</subject><subject>Risk management</subject><subject>Technology assessment</subject><subject>Threat evaluation</subject><subject>User experience</subject><subject>Virtual communities</subject><subject>Virtual reality</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptkE1LAzEQhoMoWGp_gZeA59V8NLvJsdRWhYIgK3hbstnZbsp2U5OUsv56Iyp4cA4zc3h44H0RuqbklnNF7qAHE70brAmUU85ywc_QhJFCZYopdv7nv0SzEHYkjaJccjJB-t5ubdQ9XjsPQ0gO3DqPF4Puxw87bPFyrMHjsvOgY8B2wLED_PaCSzDd4Hq3HfHKuDCGCHt8srFLyK-zPNkhXKGLVvcBZj93il7Xq3L5mG2eH56Wi01mqChiRudCA5V5I01dK9aIutBUtQSUUnnack5Ua0RR60Y2WrQgxdwUVLFWGamB8ym6-fYevHs_QojVzh19yhEqnvITJkSRJ4p_U8a7EDy01cHbvfZjRUn1VWf1T538EzYGbHA</recordid><startdate>20240706</startdate><enddate>20240706</enddate><creator>Oh, Subin</creator><creator>Shon, Taeshik</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0009-0009-8246-053X</orcidid></search><sort><creationdate>20240706</creationdate><title>Digital Forensics for Analyzing Cyber Threats in the XR Technology Ecosystem within Digital Twins</title><author>Oh, Subin ; Shon, Taeshik</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c157t-145ae186d8cbb92d5b7a19f0e99960e98409fc57bad8da5fe854c7192f9c8ae33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Artifact identification</topic><topic>Augmented reality</topic><topic>Computer forensics</topic><topic>Control systems</topic><topic>Cost control</topic><topic>Criminal investigations</topic><topic>Cybersecurity</topic><topic>Devices</topic><topic>Digital twins</topic><topic>Forensic computing</topic><topic>Forensic sciences</topic><topic>Industrial electronics</topic><topic>Internet of Things</topic><topic>Manufacturing</topic><topic>Mixed reality</topic><topic>Personal information</topic><topic>Privacy</topic><topic>Product development</topic><topic>Risk management</topic><topic>Technology assessment</topic><topic>Threat evaluation</topic><topic>User experience</topic><topic>Virtual communities</topic><topic>Virtual reality</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Oh, Subin</creatorcontrib><creatorcontrib>Shon, Taeshik</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Oh, Subin</au><au>Shon, Taeshik</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Digital Forensics for Analyzing Cyber Threats in the XR Technology Ecosystem within Digital Twins</atitle><jtitle>Electronics (Basel)</jtitle><date>2024-07-06</date><risdate>2024</risdate><volume>13</volume><issue>13</issue><spage>2653</spage><pages>2653-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>Recently, advancements in digital twin and extended reality (XR) technologies, along with industrial control systems (ICSs), have driven the transition to Industry 5.0. Digital twins mimic and simulate real-world systems and play a crucial role in various industries. XR provides innovative user experiences through virtual reality (VR), augmented reality (AR), and mixed reality (MR). By integrating digital twin simulations into XR devices, these technologies are utilized in various industrial fields. However, the prevalence of XR devices has increased the exposure to cybersecurity threats in ICS and digital twin environments. Because XR devices are connected to networks, the control and production data they process are at risk of being exposed to cyberattackers. Attackers can infiltrate XR devices through malicious code or hacking attacks to take control of the ICS or digital twin or paralyze the system. Therefore, this study emphasizes the cybersecurity threats in the ecosystem of XR devices used in ICSs and conducts research based on digital forensics. It identifies potentially sensitive data and artifacts in XR devices and proposes secure and reliable security response measures in the Industry 5.0 environment.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics13132653</doi><orcidid>https://orcid.org/0009-0009-8246-053X</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2079-9292
ispartof Electronics (Basel), 2024-07, Vol.13 (13), p.2653
issn 2079-9292
2079-9292
language eng
recordid cdi_proquest_journals_3079025576
source MDPI - Multidisciplinary Digital Publishing Institute; EZB-FREE-00999 freely available EZB journals
subjects Artifact identification
Augmented reality
Computer forensics
Control systems
Cost control
Criminal investigations
Cybersecurity
Devices
Digital twins
Forensic computing
Forensic sciences
Industrial electronics
Internet of Things
Manufacturing
Mixed reality
Personal information
Privacy
Product development
Risk management
Technology assessment
Threat evaluation
User experience
Virtual communities
Virtual reality
title Digital Forensics for Analyzing Cyber Threats in the XR Technology Ecosystem within Digital Twins
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T13%3A54%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Digital%20Forensics%20for%20Analyzing%20Cyber%20Threats%20in%20the%20XR%20Technology%20Ecosystem%20within%20Digital%20Twins&rft.jtitle=Electronics%20(Basel)&rft.au=Oh,%20Subin&rft.date=2024-07-06&rft.volume=13&rft.issue=13&rft.spage=2653&rft.pages=2653-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics13132653&rft_dat=%3Cproquest_cross%3E3079025576%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3079025576&rft_id=info:pmid/&rfr_iscdi=true