TY - GEN
T1 - Secure Digital Twin Migration in Edge-Based Autonomous Driving System
AU - Zhou, Yi
AU - Wu, Jun
AU - Lin, Xi
AU - Bashir, Ali Kashif
AU - Al-Otaibi, Yasser D.
AU - Xu, Hansong
N1 - Publisher Copyright:
© 2012 IEEE.
PY - 2023/11/1
Y1 - 2023/11/1
N2 - Digital twin (DT) technology is being applied increasingly in the Internet of Vehicles environment, but it still faces many challenges in terms of efficiency and security. In the field of DT-based autonomous driving, many previous works have been done to study the efficient migration methods of DT models. But these works consider the migration process as a blackbox. We study the efficient migration method of the DT model between the edge computing nodes inside the blackbox. We propose three different migration strategies depending on the source of the initial data and the source of the updated data, and evaluate the efficiency of these strategies in terms of migration time in different network environments using the autonomous driving simulation platform CARLA. We then derive methods for selecting migration strategies under different network conditions. During the migration process, there may be external attacks on participating elements or networks. We analyze the security problems that may arise during the migration process and propose corresponding defense methods against such cyberattacks.
AB - Digital twin (DT) technology is being applied increasingly in the Internet of Vehicles environment, but it still faces many challenges in terms of efficiency and security. In the field of DT-based autonomous driving, many previous works have been done to study the efficient migration methods of DT models. But these works consider the migration process as a blackbox. We study the efficient migration method of the DT model between the edge computing nodes inside the blackbox. We propose three different migration strategies depending on the source of the initial data and the source of the updated data, and evaluate the efficiency of these strategies in terms of migration time in different network environments using the autonomous driving simulation platform CARLA. We then derive methods for selecting migration strategies under different network conditions. During the migration process, there may be external attacks on participating elements or networks. We analyze the security problems that may arise during the migration process and propose corresponding defense methods against such cyberattacks.
UR - http://www.scopus.com/inward/record.url?scp=85141469483&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85141469483&partnerID=8YFLogxK
U2 - 10.1109/MCE.2022.3217363
DO - 10.1109/MCE.2022.3217363
M3 - Article
AN - SCOPUS:85141469483
SN - 2162-2248
VL - 12
SP - 56
EP - 65
JO - IEEE Consumer Electronics Magazine
JF - IEEE Consumer Electronics Magazine
ER -