On Digital Twin Software and Cyber Threats

  • Conference paper
  • First Online:
Internet of Things, Smart Spaces, and Next Generation Networks and Systems (NEW2AN 2022)

Abstract

The purpose of this article is to show, using the examples from the Defense department (available in open sources), that software products are becoming overly complex, practically exceeding the resources of mankind, especially in the context of cyber warfare. For illustration, we use F-35 aircraft Autonomic Logistics Information System, a story about cyber threats of software-based weapons systems, US Army Single Security Architecture as the failure in the fight against cyber threats. Cyber-attack on the Colonial Pipeline is a case of cyber war. In the context of an impending cyber war and given the failures to eliminate cyber threats in many projects, each comparable to the Manhattan nuclear project it should be recognized that their implementation is currently beyond the competence of individual companies and even governments and is becoming a problem of international cooperation. Therefore, an international agreement on cyber warfare is required, for example, like the Treaty on the Non-Proliferation of Nuclear Weapons.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now
Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Grieves, M.W.: Virtually intelligent product systems: digital and physical twins. In: Flumerfelt, S., Schwartz, K.G., Mavris, D., Briceno, S. (eds.) Complex Systems Engineering: Theory and Practice, pp. 175–200. American Institute of Aeronautics and Astronautics, Inc., Reston, VA (2019)

    Chapter  Google Scholar 

  2. Johnston, L., Williamson, S.H.: What was the U.S. GDP then? In: MeasuringWorth (2022)

    Google Scholar 

  3. Semeraro, C., et al.: Digital twin paradigm: a systematic literature review. Comput. Ind. 130 103469 (2021). https://doi.org/10.1016/j.compind.2021.103469

  4. Kurganova, N., et al.: Digital twins’ introduction as one of the major directions of industrial digitalization. Int. J. Open Inf. Technol. 7(5), 105–115 (2019)

    Google Scholar 

  5. Laird, R.: Industry 4.0: the case of the F-35 (2018). https://sldinfo.com/2018/11/industry-4-0-the-case-of-the-f-35/

  6. Delivering digitally for F-35 force management solutions (2021). https://www.lockheedmartin.com/f35/news-and-features/delivering-digitally-for-f35-force-management-solution.html

  7. F-35 Joint Strike Fighter (JSF) program. Congressional research service (2022). https://crsreports.congress.gov. RL30563

  8. IIoT platform creates a digital twin of F-35 manufacturing facilities (2017). https://www.sme.org/iiot-platform-creates-a-digital-twin-of-f-35-manufacturing-facilities

  9. Clark, B., Patt, D., Schramm, H.: Mosaic warfare. Exploiting artificial intelligence and autonomous systems to implement decision-centric operations. CSBA (2020)

    Google Scholar 

  10. Exec. Order No. 13,859, 84 Fed. Reg. 3967 (2019)

    Google Scholar 

  11. U.S. Department of Defense. Summary of the 2018 Department of Defense. Artificial Intelligence Strategy: Harnessing AI to Advance Our Security and Prosperity (2019)

    Google Scholar 

  12. European Commission: proposal for a regulation of the European parliament and of the council laying down harmonised rules on artificial intelligence (Artificial Intelligence Act) (2021). https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52021PC0206

  13. F-35 program stagnated in 2021. https://www.pogo.org/analysis/2022/03/f-35-program-stagnated-in-2021-but-dod-testing-office-hiding-full-extent-of-problem/

  14. GAO-22–105995. F-35 sustainment DOD. Faces several uncertainties and has not met key objectives (2022)

    Google Scholar 

  15. Grazier, D.: F-35 Program stagnated in 2021 but DOD testing office hiding full extent of problem. In: Analysis (2022). https://www.pogo.org/analysis/2022/03/f-35-program-stagnated-in-2021-but-dod-testing-office-hiding-full-extent-of-problem

  16. Charette, R.N.: F-35 Program continues to struggle with software. IEEE Spectr. 19 (2012)

    Google Scholar 

  17. GAO-19-128. Weapon systems cybersecurity. DOD just beginning to grapple with scale of vulnerabilities, report to the committee on armed services, U.S. Senate, US GAO (2018)

    Google Scholar 

  18. Grazier, D.: What should we do about a generation of weapons vulnerable to cyberattacks? An obvious solution being ignored (2019). https://www.pogo.org/analysis/2019/01/what-should-we-do-about-a%20generation-of-weapons-vulnerable-to-cyberattacks/

  19. Thompson, M.: The U.S. Navy’s Titanium “Tin Can”, in Analysis (2019). https://www.pogo.org/analysis/2019/01/the-u-s-navys-titanium-tin-can

  20. Cyber situational awareness - big data solution. https://docplayer.net/2357634-Cyber-situational-awareness-big-data-solution.html/

  21. JRSS Deployments. https://c.ymcdn.com/sites/alamoace.siteym.com/resource/resmgr/2017_ace/2017_speakers/2017_AACE_Keynote_Presentations/doc_keynote_Yee.pdf/

    Google Scholar 

  22. GAO-16-593. Joint information environment: DOD needs to strengthen governance and management (2016)

    Google Scholar 

  23. Marks, J.: The pentagon has a big plan to solve identity verification in two years. In: Nextgov (2018). https://www.defenseone.com/technology/2018/05/pentagon-has-big-plan-solve-identity-verification-two-years/148280/

  24. Pomerleau, M.: The pentagon is moving away from the joint regional security stacks (2021). https://www.c4isrnet.com/it-networks/2021/11/01/the-pentagon-is-moving-away-from-the-joint-regional-security-stacks/

  25. Executive order on improving the nation’s cybersecurity. https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/

  26. Edward snowden. https://en.wikipedia.org/wiki/Edward_Snowden#Revelations

  27. Prism. https://en.wikipedia.org/wiki/PRISM#Responses_to_disclosures

  28. Colonial pipeline ransomware attack. https://en.wikipedia.org/wiki/Colonial_Pipeline_ransomware_attack

  29. Brooks, C.: Alarming cyber statistics for mid-year 2022, 3 Jun 2022. https://www.forbes.com/sites/chuckbrooks/2022/06/03/alarming-cyber-statistics-for-mid-year-2022-that-you-need-to-know/?sh=51f25a7b7864

  30. Hatton, L., Spinellis, D., van Genuchten, M.: The long-term growth rate of evolving software: empirical results and implications. J. Software Evol. Process. 29(5) (2017). https://doi.org/10.1002/smr.1847

  31. Wester, R., Koster, J.: The software behind Moore’s Law. IEEE Software, 32(2) 37–40, (2015). https://doi.org/10.1109/MS.2015.53

  32. Business software and services market size, share & trends analysis report, 2022–2030. https://www.grandviewresearch.com/industry-analysis/business-software-services-market

  33. Tucker, P.: The virtual tools that built the air force’s new fighter. In: Prototype (2020). https://www.defenseone.com/technology/2020/09/virtual-tools-built-air-forces-new-fighter-prototype/168505/

  34. West, T.D., Blackburn, M.: Is digital thread/digital twin affordable? A systemic assessment of the cost of DoD’s latest manhattan project. Procedia Comput. Sci. 114, 47–56 (2017). https://doi.org/10.1016/j.procs.2017.09.003

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manfred Sneps-Sneppe .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sneps-Sneppe, M., Namiot, D. (2023). On Digital Twin Software and Cyber Threats. In: Koucheryavy, Y., Aziz, A. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2022. Lecture Notes in Computer Science, vol 13772. Springer, Cham. https://doi.org/10.1007/978-3-031-30258-9_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30258-9_43

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30257-2

  • Online ISBN: 978-3-031-30258-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation