數(shù)字孿生技術(shù)的安全性與可信任性考慮因素_第1頁
數(shù)字孿生技術(shù)的安全性與可信任性考慮因素_第2頁
數(shù)字孿生技術(shù)的安全性與可信任性考慮因素_第3頁
數(shù)字孿生技術(shù)的安全性與可信任性考慮因素_第4頁
數(shù)字孿生技術(shù)的安全性與可信任性考慮因素_第5頁
已閱讀5頁,還剩46頁未讀 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)

文檔簡介

NISTInternalReportNISTIR8356

SecurityandTrustConsiderationsforDigitalTwinTechnology

JeffreyVoasPeterMell

PhillipLaplanteVartanPiroumian

Thispublicationisavailablefreeofchargefrom:

/10.6028/NIST.IR.8356

NISTInternalReportNISTIR8356

SecurityandTrustConsiderationsforDigitalTwinTechnology

JeffreyVoas PeterMellPhillipLaplante

ComputerSecurityDivisionInformationTechnologyLaboratory

VartanPiroumianIndependentConsultant

Thispublicationisavailablefreeofchargefrom:

/10.6028/NIST.IR.8356

February2025

U.S.DepartmentofCommerce

JeremyPelter,ActingSecretaryofCommerce

NationalInstituteofStandardsandTechnology

CraigBurkhardt,ActingUnderSecretaryofCommerceforStandardsandTechnologyandActingNISTDirector

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

Certaincommercialequipment,instruments,software,ormaterials,commercialornon-commercial,areidentifiedinthispaperinordertospecifytheexperimentalprocedureadequately.Suchidentificationdoesnotimply

recommendationorendorsementofanyproductorservicebyNIST,nordoesitimplythatthematerialsorequipmentidentifiedarenecessarilythebestavailableforthepurpose.

TheremaybereferencesinthispublicationtootherpublicationscurrentlyunderdevelopmentbyNISTin

accordancewithitsassignedstatutoryresponsibilities.Theinformationinthispublication,includingconceptsandmethodologies,maybeusedbyfederalagenciesevenbeforethecompletionofsuchcompanionpublications.

Thus,untileachpublicationiscompleted,currentrequirements,guidelines,andprocedures,wheretheyexist,remainoperative.Forplanningandtransitionpurposes,federalagenciesmaywishtocloselyfollowthe

developmentofthesenewpublicationsbyNIST.

OrganizationsareencouragedtoreviewalldraftpublicationsduringpubliccommentperiodsandprovidefeedbacktoNIST.ManyNISTcybersecuritypublications,otherthantheonesnotedabove,areavailableat

/publications

.

NISTTechnicalSeriesPolicies

Copyright,Use,andLicensingStatements

NISTTechnicalSeriesPublicationIdentifierSyntax

PublicationHistory

ApprovedbytheNISTEditorialReviewBoardon2025-01-31

HowtoCitethisNISTTechnicalSeriesPublication:

VoasJ,MellP,LaplanteP,PiroumianV(2025)SecurityandTrustConsiderationsforDigitalTwinTechnology.

(NationalInstituteofStandardsandTechnology,Gaithersburg,MD),NISTInternalReport(IR)NISTIR8356.

/10.6028/NIST.IR.8356

AuthorORCIDiDs

JeffreyVoas:0000-0003-1139-3690

PeterMell:0000-0003-2938-897X

PhillipLaplante:0000-0002-0415-271X

VartanPiroumian:0000-0000-0000-0000

ContactInformation

nistir-8356-comments@

NationalInstituteofStandardsandTechnology

Attn:ComputerSecurityDivision,InformationTechnologyLaboratory

100BureauDrive(MailStop8930)Gaithersburg,MD20899-8930

AdditionalInformation

Additionalinformationaboutthispublicationisavailableat

/pubs/ir/8356/final

,includingrelatedcontent,potentialupdates,anddocumenthistory.

AllcommentsaresubjecttoreleaseundertheFreedomofInformationAct(FOIA).

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

i

Abstract

Digitaltwintechnologyenablesthecreationofelectronicrepresentationsofreal-worldentitiesandtheabilitytoviewthestatesandtransitionsbetweenstatesoftheseentities.Thisreport

discussestheconceptandpurposeofdigitaltwintechnologyanddescribesitscharacteristics,features,functions,andexpectedoperationaluses.Thisreportalsodiscussesbothtraditionalandnovelcybersecuritychallengespresentedbydigitaltwintechnologyaswellastrust

considerationsinthecontextofexistingNISTguidanceanddocuments.

Keywords

computercybersecurity;control;digitaltwintechnology;instrumentation;real-timecommand;real-timemonitoring;simulation;standards;testing;trust;usecasescenarios.

ReportsonComputerSystemsTechnology

TheInformationTechnologyLaboratory(ITL)attheNationalInstituteofStandardsand

Technology(NIST)promotestheU.S.economyandpublicwelfarebyprovidingtechnical

leadershipfortheNation’smeasurementandstandardsinfrastructure.ITLdevelopstests,testmethods,referencedata,proofofconceptimplementations,andtechnicalanalysestoadvancethedevelopmentandproductiveuseofinformationtechnology.ITL’sresponsibilitiesinclude

thedevelopmentofmanagement,administrative,technical,andphysicalstandardsand

guidelinesforthecost-effectivesecurityandprivacyofotherthannationalsecurity-relatedinformationinfederalinformationsystems.

Audience

Thispublicationisintendedforanyonewhowantstounderstandtheunderlyingtechnologyandenvisionedcapabilitiesofdigitaltwintechnology.ItisparticularlyapplicabletoStandardsDevelopingOrganizations(SDOs)andimplementersofdigitaltwintechnology.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

ii

PatentDisclosureNotice

NOTICE:ITLhasrequestedthatholdersofpatentclaimswhoseusemayberequiredfor

compliancewiththeguidanceorrequirementsofthispublicationdisclosesuchpatentclaimstoITL.However,holdersofpatentsarenotobligatedtorespondtoITLcallsforpatentsandITLhasnotundertakenapatentsearchinordertoidentifywhich,ifany,patentsmayapplytothis

publication.

Asofthedateofpublicationandfollowingcall(s)fortheidentificationofpatentclaimswhoseusemayberequiredforcompliancewiththeguidanceorrequirementsofthispublication,nosuchpatentclaimshavebeenidentifiedtoITL.

NorepresentationismadeorimpliedbyITLthatlicensesarenotrequiredtoavoidpatentinfringementintheuseofthispublication.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

iii

TableofContents

1.Introduction 1

2.DefinitionofDigitalTwins 2

3.MotivationandVision 4

3.1.AdvantagesofDigitalTwinTechnology…4

3.3.supportiveTechnologies…5

a.OperationsonDigitalTwins 7

4.1.DigitalTwinsDefinitionsandthecreationofDigitalTwinInstances…7

4.2.ManipulationandModificationofDigitalTwinDefinitionsandInstances…8

4.3.ExchangeofDigitalTwinDefinitionsandInstances…8

5.UsageScenariosforDigitalTwins 9

5.1.viewingstaticModelsofDigitalTwins…9

5.2.ExecutingandviewingDynamicModelsofDigitalTwins…9

5.3.Real-TimeMonitoringofReal-worldEntities11

5a.eal-imecommandandcontrolofeal-worldEntties………11

6.HighlightedUseCases 12

7.CybersecurityConsiderations 13

7.1.Novelcybersecuritychallenges13

7.1.1.MassiveInstrumentationofObjects 13

7.1.2.CentralizationofObjectMeasurements 14

7.1.3.VisualizationandRepresentationofObjectOperation 14

7.1.4.RemoteControlofObjects 14

8.TrustConsiderations 17

9.Conclusions 21

References 22

AppendixA.ListofSymbols,Abbreviations,andAcronyms 24

AppendixB.Glossary 25

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

1

1.Introduction

Adigitaltwin(DT)isanelectronicrepresentationofareal-worldentity;providingthecapabilitytoevaluatethisentity.Adigitaltwincanemulatebothphysicalthings(e.g.,buildings,

electronics,livingthings),andnon-physicalthings(e.g.,processes,conceptualmodels).Aswithmanynewinformationtechnologies,digitaltwintechnologyemploysexistingfoundational

technologiesandmayreflectexistingcapabilities.Itcoverswhatcurrentlyexistsinmodeling

andsimulationbutthencastsabroadervisionforfuturecapabilities.Thefullbenefitsofdigitaltwintechnologywillrequireinteroperabledefinitions,tools,andstandardsaswellasearly

considerationofdigitaltwincybersecurityandtrust.Thissituationisespeciallytruefornascentstandardseffortsthatseektodefineandstructurethetechnology.

Thisreportintroducestheconceptofadigitaltwin,describestheunderlyingtechnologies,andexpandsonitscurrentcapabilitiesbydiscussingkeycomponents,functions,andcybersecurityandtrustconsiderations.Itisnotintendedtodefine“digitaltwin”–thisactivityshouldbe

undertakenbySDOs.Anydefinitionof“digitaltwin,”however,shouldaddressasetoftechnicalconsiderations,whichareofferedherein.Thesetechnicalconsiderationscanalsobeusedto

testanydefinitionthatiscreatedbyanySDO.

Thisreportisorganizedasfollows:

?Section

2

definesdigitaltwintechnology.

?Section

3

describesthemotivationsforusingdigitaltwintechnology,includingadvantagesandsupportivetechnologies.

?Section

4

discussestypicaloperationsperformedondigitaltwins.

?Section

5

describestechnicalusagescenariosfordigitaltwins.

?Section

6

providesexampleindustryapplicationsofdigitaltwintechnology.

?Section

7

explorescybersecurityconsiderationsinthecontextofexistingNISTguidancebyidentifyingandexploringtraditionalcybersecurityneeds,novelcybersecurity

challenges,andapproachesthatapplytodigitaltwintechnology.

?Section

8

discussestrustissuesthatcanpreventadigitaltwinfromprovidingthe

desiredoperationalfunctionalitywithanacceptablelevelofqualityinthecontextofexistingNISTguidance.

?Section

9

offersconcludingthoughts.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

2

2.DefinitionsofDigitalTwins

Thereareseveralexistingdefinitionsfordigitaltwins.Somehavebeencreatedbyresearchers,standardscommittees,consortia,andindustry.Othersareimplicitlysuggestedbycommercialenterprisesthatmakestatementsabouthowtheirsoftwareapplicationsare“digitaltwin-

compliant.”Despitethesedefinitionsthereisnoagreed-upondefinitionfororconsensusonthefullpotentialofdigitaltwins

[1]

.

TheDigitalTwinConsortium(DTC)offersthefollowingdescriptionfordigitaltwins:

Adigitaltwinisavirtualrepresentationofreal-worldentitiesandprocessessynchronizedataspecifiedfrequencyandfidelity.

?Digitaltwinsystemstransformbusinessbyacceleratingholistic

understanding,optimaldecision-making,andeffectiveaction.

?Digitaltwinsusereal-timeandhistoricaldatatorepresentthe pastandpresentandsimulatepredictedfutures.

?Digitaltwinsaremotivatedbyoutcomes,tailoredtousecases, poweredbyintegration,builtondata,guidedbydomain knowledge,andimplementedinIT/OTsystems

[1]

.

Asimplifieddefinitionfordigitaltwins

1

couldbe:

Adigitaltwinisthevirtual(i.e.,digital)representationofaphysicalorperceivedreal–worldentity,concept,ornotion.

Theuseoftheword“virtual”isappropriatebecauseadigitaltwinissomethingthathastheeffectbutnottheactualformofwhatisspecified.DTsoftwareimplementationspresentahumanuserwithanobject’svisualgraphicrepresentation,eitherstaticordynamic,viatheobject’sDT.

Arelatedimportanttermisthatofadigitaltwindefinition:

Adigitaltwindefinitionisamachine–readablespecificationthatdescribesfeaturesthatmaybemodeledforaparticulartypeofreal–worldentity.

Thus,adigitaltwindefinitionreferstoaparticulartypeofentityratherthanthespecificentityitself.Itdefinesthefeaturesofanentitytypethatcanbestaticallyanddynamicallymodeled,

howthosefeatureswillbedigitallyencodedandrepresented,andhowtheywillpersistina

digitalcomputerenvironment.Computersoftwareapplicationswillreaddigitaltwindefinitionstocreatedigitaltwininstances(orsimply,digitaltwin),whichareinstantiationsofreal-world

objectsthatmodelthestateofrepresentedobjects.

Whilemanyofthesereal-worldentitieshavephysicalforms(e.g.,anaircraftengine,anoil

derrick,avalveinanoilpipelinepumpingstation),digitaltwinscanalsorepresentsomething

abstract.TheDTCdefinitioncontainstheword“processes,”whichisanabstractnotion,andthesimplifieddefinitiondiscussesentitiesthatmaybeperceivedorconceivedwithouthavinga

1Section

3

discussesthedifferencesbetweendigitaltwintechnologyandtraditionalmodelingandsimulation,andSec.

9

discussestheimportanceofsynchronizationbetweenadigitaltwinandareal-worldentity.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

3

physicalform.Forexample,aprocessinacomputeroperatingsystemisreal,evenifitdoesnothaveaconcreteorphysicalshape.Itisaconglomerationofmultipleintangiblethings,suchaselectricalsignals,thestatesofregistersthatcontainvoltageandcurrentlevels,andthe

electricalstateofmemory.Whetheritisviewedstaticallyordynamically,acomputerprogramisreal,andonecanclearlyobservetheeffectsthatithasonotherobjects.

Abusinessprocessisanotherexampleofanabstractconceptthatisrealbuthasnomaterialform.Infact,somesoftwaredefinesdigitaltwinsasrepresentationsofbusinessprocesses.

Digitaltwinscouldevendescribethestepsinamanufacturingprocessorsimulateaspectsof

thedynamicexecutionofspecificprocessesinafactoryorchemicalplant,suchasoilrefiningortheproductionofnuclearfuel.Inshort,adigitaltwincanrepresentanythingthatahumancanconceiveorperceive,whetherphysicalornot.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

4

3.MotivationandVision

Elementsofdigitaltwintechnologyhavelongexistedincomputersandsoftwarethatrepresententitiesandsimulatedynamicbehavior.Now,thematurationofnumerousunderlying

technologiesismakingitpossibletobroadlyapplysimulationandmodelingintheformof

digitalrepresentationsandmakethetechnologyaccessibletoamuchwideruserbase.The

InternetofThings(IoT)hasledtotheemergenceofsmall,low-cost,battery-poweredsensorsthatconnectoveranetworkandenablemassivesensordeploymenttoawidevarietyof

objects(e.g.,modernbuildingsmayhavethousandsofsensors).Thesesensorsthenprovide

informationthatcanfeedandmaintaincomplexmodelsofthoseobjects.Theadvancesin

powerfulbutlow-costprocessingandstorageenableustomaintain,view,andmanipulate

thesedigitalreplicaswithouthavingtousespecial-purposeorexpensivehardware.Therecentadvancesinvirtualreality(VR)andaugmentedreality(AR)haveenabledinexpensive

visualizationofdigitaltwins.

Digitaltwintechnologyisalsoanadvancementoverexistingsimulationandmodelingbecauseitallowsforthereal-timemonitoringofentitieswhiledynamicallyupdatingtheirdigitaltwins.Thereisalsoatrendtoremotecontrolphysicalentitiesbymanipulatingdynamicmodels(i.e.,digitaltwins)asopposedtodirectlymanipulatingtheobjectsthemselves.Suchcontrolismoreindirectandabstractsawaydetailsthathumansmaynotbeabletomanage.

Standardsdevelopmentwilllikelyimpactwhetherdigitaltwintechnologybecomeswidely

used.MostIoTsystems,simulationandmodelingsoftware,andVRandARsystemscurrentlyexistinstovepipeproprietarysystemsandintegratingthemrequiressignificantwork.Muchoftheworkinemergingdigitaltwintechnologyisinthecreationofprotocolsandstandardsto

enableplugandplayintegration.Thegoalistobeabletoloadanydigitaltwincomputerfileintoadigitaltwinsystemandhaveitfunctionregardlessofwhatisbeingmodeled.

3.1.AdvantagesofDigitalTwinTechnology

Aplatformormechanismthatsupportsthecreationofdigitalmodelsofreal-worldobjectsisadvantageousforseveralreasons.Forexample,onecanstudytheobjectviaitsmodelpriortobuildingthereal-worldversion,studytheobjectasitprogressesthroughitslifecycle,and

conceivablycontroltheobjectthroughthemodeltopreventundesirableoutcomesfortheobject,thusreducingcertaintypesofrisk.

Thisadvantageincreaseswhenmodelingmultipleobjectsthatneedtoworktogether,eveniftheobjectsaremaintainedbydifferentorganizations.Ifcooperatingentitiescansharedigitaltwindefinitions,thentheycanmoreeasilymodelanddigitallysimulateobjectinteractions

priortotherealizationoftheoutputproduct.However,theinternaldefinitionsand

representationsoftheobjectsbeingmodeledbyeachsoftwareapplicationtendtobehighlyproprietary.Thedigitalartifactscreatedbytoday’sapplicationsarenoteasilyshared,andtheapplicationsarethereforenotinteroperable.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

5

3.2.ExpectationofStandards

Theadoptionofandadherencetostandardsmayensureinteroperability,compatibility,safety,andcybersecurity.Moreover,theassurancethatsoftwareandhardwaresystems,tools,and

applicationsadheretoandproperlyimplementstandardsengenderscredibilityandtrust

[3]

.

Effortsareunderwaytodevelopdigitaltwinspecificstandardsthatwillbeutilizedinadditiontotheexistingvariousinformationandcommunicationtechnologystandards.

Digitaltwintechnologywillbebuiltuponexistingcomputingsystemstacks,platform

architectures,programmingplatforms,systems,libraries,applicationprogrammerinterfaces

(APIs),andinfrastructure.Forexample,OpenGLisapossible3Dgraphicsstandardusedto

renderthevisualrepresentationcomponentofdigitaltwins.Whileexistingcybersecurity

encryptionstandardswillbeleveraged,multiplecooperating(orcompeting)standardsthatarespecifictodigitaltwintechnologywillbeneeded.Asinglestandardmaynotadequatelyaddressallneeds,andstandardsharmonizationorblendingmaybeappropriate

[4]

.Toolvendors,

softwareandhardwareapplicationvendors,anduserscancomplywithstandardsbyensuringthattheyonlyusevettedelements,whichshouldalsoleadtotheinteroperabilityoftoolsandapplications.

Oneapproachtoestablishingstandardsfordigitaltwintechnologyistofocusonstandardmechanismsforexchanginginformation,suchastherepresentationofreal-worldobjects.

Algorithmsthatsimulatethedynamicbehaviorofobjectscouldremainproprietarytoprotectintellectualproperty,butthedescriptionoftheobjectwhosebehaviorisbeingsimulatedcouldbestandardizedandopeninordertobeexchangedbetweenapplications,domains,industries,andverticalmarkets.Inthesimulationandmodelingarena,therearemanysophisticated

softwaretoolsandapplicationsthatsupport2Dand3Dmodelingandengineeringanalysis.

Eachoftheseapplicationsusesproprietaryinternalmodelstorepresenttheobjectsbeing

modeled(i.e.,thosecreatedbytheuser).Theyalsouseproprietaryandoftencloselyguardedalgorithmsthatrepresentthefunctionalcapabilitiesformodelingandsimulation.

Potentialstandardswouldneedtocovereachinvolvedbusinessdomain.Everyonewho

employsdigitaltwintechnologyinspecificbusinessdomainswouldneedtheirownunique

standardsandstandards-basedproductsthatadheretoacommonsetofbusinessprocessesandusecaseswhereinteroperabilitycanbeachieved.Itisinsufficientforstandardstomerelyenableinteroperabilityinpurelytechnologicaldomains.

3.3.SupportiveTechnologies

Twoofthesupportivetechnologiesthatsupporttherecentinterestindigitaltwintechnology

areVR/ARandIoT.OneexpectationfordigitaltwintechnologyistoleverageVRandARto

createenhanceduserinterfacesanduserexperiencesforhumanbeingstocomprehendthe

modeling,simulation,monitoring,andcommandandcontrolofcomplexentities.Humansrelyheavilyonvisualsensoryinput,andVRandARpromisetopresentmodelsofreal-worldentitiesthroughamediumthatisamenabletohumanconsumptionandcomprehension.

IoThasbeenreferencedindigitaltwindiscussionsandliteraturethankstorecentadvancesinsensorsandtheirongoinganddramaticproliferationinvariousoperations.Thesesensorsare

6

typicallynetwork-connectedanddrivetheabilityofdigitaltwinstomodelreal-worldobjectsinwaysthatwerenotpossibleuntilrecently.Additionally,IoTdevicesareoftenusedtocreateaninformationfabricor“network”thatconsistsoftheobservedentities,thesensorsthatobserveandgatherinformation,theconnectivityelements,theprocessingcomponents(i.e.,backend

computeservers),andthecomponentsthatusetheprocessedIoTdata.Withthesenew

sensorsbeingdeployedonanIoTfabric,digitaltwinscanrepresentanddynamicallymaintaintherepresentationofaninstanceofaninstrumentedobject

[5]

.

Thus,theapplicationofdigitaltwinsgoesbeyondsimplymodelingaclassofreal-worldentities.Itcanalsobeusedtorepresentandtrackaspecificobject,maintainthereal-timestatus,and

presentadynamicallyupdatedviewtoauser.Withanaccurateunderstandingofthestateof

anobject,adigitaltwinmayalsobemanipulatedbyausertocontroltheactualobject,

meaningthatDTtechnologymayadvancebeyondtraditionalmodelingandsimulationsoftwaretoencompasscommand-and-control.Forexample,operatorscouldremotelycommandsurfacerailorsubwaytrainsfromanoperationscenter.

Dependingontheobject,asystemthatmonitorstheobject’sstatemayneedtounderstandthestate’sratesofchange.Forexample,asystemthatmonitorstherateofvelocitychangemay

needtodetectwhentheboundariesofsafeoperationaresurpassed.Forthis,artificial

intelligence(AI)andmachinelearning(ML)couldpotentiallyoutperformtraditionalcomputingmethodsaswellashumanswhomonitorconditionsandmakepredictions.Scientistsand

engineerscouldcreatemodelsofreal-worldconditionsandemploythemtotrainAIsystemstorecognizethoseconditions.Suchapplicationsforsimulation,modeling,andmonitoringare

majormotivationforadvancingdigitaltwintechnology.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

7

4.OperationsonDigitalTwins

Thissectiondiscussesseverallower-leveloperationsthatareperformedondigitaltwins:

?Digitaltwindefinitions(i.e.,descriptionsofobjecttypes)andthecreationofdigitaltwininstances

?Manipulationandmodificationofdigitaltwindefinitionsandinstances

?Exchangeviaelectroniccommunicationsofdigitaltwindefinitionsandinstances

Itisenvisionedthattherewillbemanydigitaltwindefinitionsthatdescribemanykindsofentities.Thissectionalsodiscussesoperationsondigitaltwins,

2

whicharespecificinstancescreatedfromdigitaltwindefinitions.

4.1.DigitalTwinsDefinitionsandtheCreationofDigitalTwinInstances

Adigitaltwindefinitionisaformaldescriptionofthereal-worldentitythatthedigitaltwinrepresents.Forthepurposesofthisreport,thinkofaformaldescriptionasatechnical

definitionofaparticularcategoryorclassofreal-worldobjects.

Thestartingpointforallactivityinvolvingdigitaltwintechnologyistocreateorfindadigital

twindefinitionthatrepresentsthetypeofreal-worldobjectthatistoberepresentedvirtually.Computersoftwareapplicationsarethenusedtocreateaninstanceforthatdefinitiontoholdand/ormaintainthestateoftherepresentedobject.Thesedigitaltwinelectronicinstancescanrepresentbothstaticanddynamicmodelsofthereal-worldentitiesthatcorrespondtotheir

respectivedigitaltwindefinitions.

Thespecificdigitaltwindefinitioncreatedforsomeobjecttypeswilldictatetheprecisemakeupoftheartifactsthatareinstantiatedfromthedefinition.Forexample,adigitaltwindefinitionisnotrequiredtoincludeadynamicviewofitsreal-worldcounterpart.Rather,itcouldcompriseonlyastaticviewoftheobject.Thus,notalldigitaltwindefinitionswillnecessarilycontainall

possibledeclarationsordefinitionconstructsdefinedinsomefuturestandard.Similarly,notallhypertextmarkuplanguage(HTML)filesutilizealltagsdefinedbytheHTMLstandard

[6]

.Ifa

particulardigitaltwindefinitiononlysupportsrepresentingastaticmodelofanentity,the

relatedinstanceswouldcontainnodynamicinformation,suchashowtorenderanimation,

video,ordynamicgraphics.Consider,forexample,aVRpresentationofanavalvessel.AstaticviewcouldrepresenttheinternalelementsoftheshipseenthroughVRasifapersonwere

literallywalkingthroughthevessel.VRtechnologywouldbemoreamenabletothisapplicationthana3DPDFview.Thelatterwouldcomprisedetailedengineeringdrawingstantamounttoanarchitect’sblueprintdrawings.However,itwouldbedifficulttopresenttheequivalentofwhatapersonwouldseewalkingthroughtheinterioroftheship.

Adigitaltwindefinitionshouldcreateamodeloftheobjectitrepresents,notjustaparticular

view.Themodelcouldthenbeusedtopresentthedesiredviewpointofthereal-worldentity.Adefinitioncancontainasmuchoraslittleinformationaboutitsreal-worldcounterpartasits

2Areferencetoa“digitaltwin”withoutotherqualifiersreferstothedigitaltwininstancethatrepresentstheentity.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

8

authordesires,whichmaylimitthetypesofviewsthatcanbecreated.Digitaltwindefinitionauthorsdecidethebreadth,scope,degreeofgranularity,anddetail.

Apracticalconsiderationistheprocessofdigitaltwindefinitionauthoringandencoding.Whileitmaybepossibletoauthordefinitionsusingatexteditor,thispracticecouldbecome

supplantedbymoreadvancedtools.Thisissimilartohownotmanypeoplehand-codeHTMLorXMLanymore

[7]

.Moreover,thecomplexityofdigitaltwindefinitionscouldentirelyprecludetheabilitytocraftdefinitionsbyhand.Manyindustriesusesophisticatedsoftwareapplicationstocreatedigitalartifactsthatrepresentwhattheyplantobuild.Someofthesesoftware

applicationssupportthe“export”oftheirartifactsinstandardfileformatsandencodings,suchasthe3DPDFstandard

[8]

.However,themajorityoftheseapplicationsusetheirown

propri

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論