版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
NISTInternalReportNISTIR8356
SecurityandTrustConsiderationsforDigitalTwinTechnology
JeffreyVoasPeterMell
PhillipLaplanteVartanPiroumian
Thispublicationisavailablefreeofchargefrom:
/10.6028/NIST.IR.8356
NISTInternalReportNISTIR8356
SecurityandTrustConsiderationsforDigitalTwinTechnology
JeffreyVoas PeterMellPhillipLaplante
ComputerSecurityDivisionInformationTechnologyLaboratory
VartanPiroumianIndependentConsultant
Thispublicationisavailablefreeofchargefrom:
/10.6028/NIST.IR.8356
February2025
U.S.DepartmentofCommerce
JeremyPelter,ActingSecretaryofCommerce
NationalInstituteofStandardsandTechnology
CraigBurkhardt,ActingUnderSecretaryofCommerceforStandardsandTechnologyandActingNISTDirector
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
Certaincommercialequipment,instruments,software,ormaterials,commercialornon-commercial,areidentifiedinthispaperinordertospecifytheexperimentalprocedureadequately.Suchidentificationdoesnotimply
recommendationorendorsementofanyproductorservicebyNIST,nordoesitimplythatthematerialsorequipmentidentifiedarenecessarilythebestavailableforthepurpose.
TheremaybereferencesinthispublicationtootherpublicationscurrentlyunderdevelopmentbyNISTin
accordancewithitsassignedstatutoryresponsibilities.Theinformationinthispublication,includingconceptsandmethodologies,maybeusedbyfederalagenciesevenbeforethecompletionofsuchcompanionpublications.
Thus,untileachpublicationiscompleted,currentrequirements,guidelines,andprocedures,wheretheyexist,remainoperative.Forplanningandtransitionpurposes,federalagenciesmaywishtocloselyfollowthe
developmentofthesenewpublicationsbyNIST.
OrganizationsareencouragedtoreviewalldraftpublicationsduringpubliccommentperiodsandprovidefeedbacktoNIST.ManyNISTcybersecuritypublications,otherthantheonesnotedabove,areavailableat
/publications
.
NISTTechnicalSeriesPolicies
Copyright,Use,andLicensingStatements
NISTTechnicalSeriesPublicationIdentifierSyntax
PublicationHistory
ApprovedbytheNISTEditorialReviewBoardon2025-01-31
HowtoCitethisNISTTechnicalSeriesPublication:
VoasJ,MellP,LaplanteP,PiroumianV(2025)SecurityandTrustConsiderationsforDigitalTwinTechnology.
(NationalInstituteofStandardsandTechnology,Gaithersburg,MD),NISTInternalReport(IR)NISTIR8356.
/10.6028/NIST.IR.8356
AuthorORCIDiDs
JeffreyVoas:0000-0003-1139-3690
PeterMell:0000-0003-2938-897X
PhillipLaplante:0000-0002-0415-271X
VartanPiroumian:0000-0000-0000-0000
ContactInformation
nistir-8356-comments@
NationalInstituteofStandardsandTechnology
Attn:ComputerSecurityDivision,InformationTechnologyLaboratory
100BureauDrive(MailStop8930)Gaithersburg,MD20899-8930
AdditionalInformation
Additionalinformationaboutthispublicationisavailableat
/pubs/ir/8356/final
,includingrelatedcontent,potentialupdates,anddocumenthistory.
AllcommentsaresubjecttoreleaseundertheFreedomofInformationAct(FOIA).
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
i
Abstract
Digitaltwintechnologyenablesthecreationofelectronicrepresentationsofreal-worldentitiesandtheabilitytoviewthestatesandtransitionsbetweenstatesoftheseentities.Thisreport
discussestheconceptandpurposeofdigitaltwintechnologyanddescribesitscharacteristics,features,functions,andexpectedoperationaluses.Thisreportalsodiscussesbothtraditionalandnovelcybersecuritychallengespresentedbydigitaltwintechnologyaswellastrust
considerationsinthecontextofexistingNISTguidanceanddocuments.
Keywords
computercybersecurity;control;digitaltwintechnology;instrumentation;real-timecommand;real-timemonitoring;simulation;standards;testing;trust;usecasescenarios.
ReportsonComputerSystemsTechnology
TheInformationTechnologyLaboratory(ITL)attheNationalInstituteofStandardsand
Technology(NIST)promotestheU.S.economyandpublicwelfarebyprovidingtechnical
leadershipfortheNation’smeasurementandstandardsinfrastructure.ITLdevelopstests,testmethods,referencedata,proofofconceptimplementations,andtechnicalanalysestoadvancethedevelopmentandproductiveuseofinformationtechnology.ITL’sresponsibilitiesinclude
thedevelopmentofmanagement,administrative,technical,andphysicalstandardsand
guidelinesforthecost-effectivesecurityandprivacyofotherthannationalsecurity-relatedinformationinfederalinformationsystems.
Audience
Thispublicationisintendedforanyonewhowantstounderstandtheunderlyingtechnologyandenvisionedcapabilitiesofdigitaltwintechnology.ItisparticularlyapplicabletoStandardsDevelopingOrganizations(SDOs)andimplementersofdigitaltwintechnology.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
ii
PatentDisclosureNotice
NOTICE:ITLhasrequestedthatholdersofpatentclaimswhoseusemayberequiredfor
compliancewiththeguidanceorrequirementsofthispublicationdisclosesuchpatentclaimstoITL.However,holdersofpatentsarenotobligatedtorespondtoITLcallsforpatentsandITLhasnotundertakenapatentsearchinordertoidentifywhich,ifany,patentsmayapplytothis
publication.
Asofthedateofpublicationandfollowingcall(s)fortheidentificationofpatentclaimswhoseusemayberequiredforcompliancewiththeguidanceorrequirementsofthispublication,nosuchpatentclaimshavebeenidentifiedtoITL.
NorepresentationismadeorimpliedbyITLthatlicensesarenotrequiredtoavoidpatentinfringementintheuseofthispublication.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
iii
TableofContents
1.Introduction 1
2.DefinitionofDigitalTwins 2
3.MotivationandVision 4
3.1.AdvantagesofDigitalTwinTechnology…4
3.3.supportiveTechnologies…5
a.OperationsonDigitalTwins 7
4.1.DigitalTwinsDefinitionsandthecreationofDigitalTwinInstances…7
4.2.ManipulationandModificationofDigitalTwinDefinitionsandInstances…8
4.3.ExchangeofDigitalTwinDefinitionsandInstances…8
5.UsageScenariosforDigitalTwins 9
5.1.viewingstaticModelsofDigitalTwins…9
5.2.ExecutingandviewingDynamicModelsofDigitalTwins…9
5.3.Real-TimeMonitoringofReal-worldEntities11
5a.eal-imecommandandcontrolofeal-worldEntties………11
6.HighlightedUseCases 12
7.CybersecurityConsiderations 13
7.1.Novelcybersecuritychallenges13
7.1.1.MassiveInstrumentationofObjects 13
7.1.2.CentralizationofObjectMeasurements 14
7.1.3.VisualizationandRepresentationofObjectOperation 14
7.1.4.RemoteControlofObjects 14
8.TrustConsiderations 17
9.Conclusions 21
References 22
AppendixA.ListofSymbols,Abbreviations,andAcronyms 24
AppendixB.Glossary 25
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
1
1.Introduction
Adigitaltwin(DT)isanelectronicrepresentationofareal-worldentity;providingthecapabilitytoevaluatethisentity.Adigitaltwincanemulatebothphysicalthings(e.g.,buildings,
electronics,livingthings),andnon-physicalthings(e.g.,processes,conceptualmodels).Aswithmanynewinformationtechnologies,digitaltwintechnologyemploysexistingfoundational
technologiesandmayreflectexistingcapabilities.Itcoverswhatcurrentlyexistsinmodeling
andsimulationbutthencastsabroadervisionforfuturecapabilities.Thefullbenefitsofdigitaltwintechnologywillrequireinteroperabledefinitions,tools,andstandardsaswellasearly
considerationofdigitaltwincybersecurityandtrust.Thissituationisespeciallytruefornascentstandardseffortsthatseektodefineandstructurethetechnology.
Thisreportintroducestheconceptofadigitaltwin,describestheunderlyingtechnologies,andexpandsonitscurrentcapabilitiesbydiscussingkeycomponents,functions,andcybersecurityandtrustconsiderations.Itisnotintendedtodefine“digitaltwin”–thisactivityshouldbe
undertakenbySDOs.Anydefinitionof“digitaltwin,”however,shouldaddressasetoftechnicalconsiderations,whichareofferedherein.Thesetechnicalconsiderationscanalsobeusedto
testanydefinitionthatiscreatedbyanySDO.
Thisreportisorganizedasfollows:
?Section
2
definesdigitaltwintechnology.
?Section
3
describesthemotivationsforusingdigitaltwintechnology,includingadvantagesandsupportivetechnologies.
?Section
4
discussestypicaloperationsperformedondigitaltwins.
?Section
5
describestechnicalusagescenariosfordigitaltwins.
?Section
6
providesexampleindustryapplicationsofdigitaltwintechnology.
?Section
7
explorescybersecurityconsiderationsinthecontextofexistingNISTguidancebyidentifyingandexploringtraditionalcybersecurityneeds,novelcybersecurity
challenges,andapproachesthatapplytodigitaltwintechnology.
?Section
8
discussestrustissuesthatcanpreventadigitaltwinfromprovidingthe
desiredoperationalfunctionalitywithanacceptablelevelofqualityinthecontextofexistingNISTguidance.
?Section
9
offersconcludingthoughts.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
2
2.DefinitionsofDigitalTwins
Thereareseveralexistingdefinitionsfordigitaltwins.Somehavebeencreatedbyresearchers,standardscommittees,consortia,andindustry.Othersareimplicitlysuggestedbycommercialenterprisesthatmakestatementsabouthowtheirsoftwareapplicationsare“digitaltwin-
compliant.”Despitethesedefinitionsthereisnoagreed-upondefinitionfororconsensusonthefullpotentialofdigitaltwins
[1]
.
TheDigitalTwinConsortium(DTC)offersthefollowingdescriptionfordigitaltwins:
Adigitaltwinisavirtualrepresentationofreal-worldentitiesandprocessessynchronizedataspecifiedfrequencyandfidelity.
?Digitaltwinsystemstransformbusinessbyacceleratingholistic
understanding,optimaldecision-making,andeffectiveaction.
?Digitaltwinsusereal-timeandhistoricaldatatorepresentthe pastandpresentandsimulatepredictedfutures.
?Digitaltwinsaremotivatedbyoutcomes,tailoredtousecases, poweredbyintegration,builtondata,guidedbydomain knowledge,andimplementedinIT/OTsystems
[1]
.
Asimplifieddefinitionfordigitaltwins
1
couldbe:
Adigitaltwinisthevirtual(i.e.,digital)representationofaphysicalorperceivedreal–worldentity,concept,ornotion.
Theuseoftheword“virtual”isappropriatebecauseadigitaltwinissomethingthathastheeffectbutnottheactualformofwhatisspecified.DTsoftwareimplementationspresentahumanuserwithanobject’svisualgraphicrepresentation,eitherstaticordynamic,viatheobject’sDT.
Arelatedimportanttermisthatofadigitaltwindefinition:
Adigitaltwindefinitionisamachine–readablespecificationthatdescribesfeaturesthatmaybemodeledforaparticulartypeofreal–worldentity.
Thus,adigitaltwindefinitionreferstoaparticulartypeofentityratherthanthespecificentityitself.Itdefinesthefeaturesofanentitytypethatcanbestaticallyanddynamicallymodeled,
howthosefeatureswillbedigitallyencodedandrepresented,andhowtheywillpersistina
digitalcomputerenvironment.Computersoftwareapplicationswillreaddigitaltwindefinitionstocreatedigitaltwininstances(orsimply,digitaltwin),whichareinstantiationsofreal-world
objectsthatmodelthestateofrepresentedobjects.
Whilemanyofthesereal-worldentitieshavephysicalforms(e.g.,anaircraftengine,anoil
derrick,avalveinanoilpipelinepumpingstation),digitaltwinscanalsorepresentsomething
abstract.TheDTCdefinitioncontainstheword“processes,”whichisanabstractnotion,andthesimplifieddefinitiondiscussesentitiesthatmaybeperceivedorconceivedwithouthavinga
1Section
3
discussesthedifferencesbetweendigitaltwintechnologyandtraditionalmodelingandsimulation,andSec.
9
discussestheimportanceofsynchronizationbetweenadigitaltwinandareal-worldentity.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
3
physicalform.Forexample,aprocessinacomputeroperatingsystemisreal,evenifitdoesnothaveaconcreteorphysicalshape.Itisaconglomerationofmultipleintangiblethings,suchaselectricalsignals,thestatesofregistersthatcontainvoltageandcurrentlevels,andthe
electricalstateofmemory.Whetheritisviewedstaticallyordynamically,acomputerprogramisreal,andonecanclearlyobservetheeffectsthatithasonotherobjects.
Abusinessprocessisanotherexampleofanabstractconceptthatisrealbuthasnomaterialform.Infact,somesoftwaredefinesdigitaltwinsasrepresentationsofbusinessprocesses.
Digitaltwinscouldevendescribethestepsinamanufacturingprocessorsimulateaspectsof
thedynamicexecutionofspecificprocessesinafactoryorchemicalplant,suchasoilrefiningortheproductionofnuclearfuel.Inshort,adigitaltwincanrepresentanythingthatahumancanconceiveorperceive,whetherphysicalornot.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
4
3.MotivationandVision
Elementsofdigitaltwintechnologyhavelongexistedincomputersandsoftwarethatrepresententitiesandsimulatedynamicbehavior.Now,thematurationofnumerousunderlying
technologiesismakingitpossibletobroadlyapplysimulationandmodelingintheformof
digitalrepresentationsandmakethetechnologyaccessibletoamuchwideruserbase.The
InternetofThings(IoT)hasledtotheemergenceofsmall,low-cost,battery-poweredsensorsthatconnectoveranetworkandenablemassivesensordeploymenttoawidevarietyof
objects(e.g.,modernbuildingsmayhavethousandsofsensors).Thesesensorsthenprovide
informationthatcanfeedandmaintaincomplexmodelsofthoseobjects.Theadvancesin
powerfulbutlow-costprocessingandstorageenableustomaintain,view,andmanipulate
thesedigitalreplicaswithouthavingtousespecial-purposeorexpensivehardware.Therecentadvancesinvirtualreality(VR)andaugmentedreality(AR)haveenabledinexpensive
visualizationofdigitaltwins.
Digitaltwintechnologyisalsoanadvancementoverexistingsimulationandmodelingbecauseitallowsforthereal-timemonitoringofentitieswhiledynamicallyupdatingtheirdigitaltwins.Thereisalsoatrendtoremotecontrolphysicalentitiesbymanipulatingdynamicmodels(i.e.,digitaltwins)asopposedtodirectlymanipulatingtheobjectsthemselves.Suchcontrolismoreindirectandabstractsawaydetailsthathumansmaynotbeabletomanage.
Standardsdevelopmentwilllikelyimpactwhetherdigitaltwintechnologybecomeswidely
used.MostIoTsystems,simulationandmodelingsoftware,andVRandARsystemscurrentlyexistinstovepipeproprietarysystemsandintegratingthemrequiressignificantwork.Muchoftheworkinemergingdigitaltwintechnologyisinthecreationofprotocolsandstandardsto
enableplugandplayintegration.Thegoalistobeabletoloadanydigitaltwincomputerfileintoadigitaltwinsystemandhaveitfunctionregardlessofwhatisbeingmodeled.
3.1.AdvantagesofDigitalTwinTechnology
Aplatformormechanismthatsupportsthecreationofdigitalmodelsofreal-worldobjectsisadvantageousforseveralreasons.Forexample,onecanstudytheobjectviaitsmodelpriortobuildingthereal-worldversion,studytheobjectasitprogressesthroughitslifecycle,and
conceivablycontroltheobjectthroughthemodeltopreventundesirableoutcomesfortheobject,thusreducingcertaintypesofrisk.
Thisadvantageincreaseswhenmodelingmultipleobjectsthatneedtoworktogether,eveniftheobjectsaremaintainedbydifferentorganizations.Ifcooperatingentitiescansharedigitaltwindefinitions,thentheycanmoreeasilymodelanddigitallysimulateobjectinteractions
priortotherealizationoftheoutputproduct.However,theinternaldefinitionsand
representationsoftheobjectsbeingmodeledbyeachsoftwareapplicationtendtobehighlyproprietary.Thedigitalartifactscreatedbytoday’sapplicationsarenoteasilyshared,andtheapplicationsarethereforenotinteroperable.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
5
3.2.ExpectationofStandards
Theadoptionofandadherencetostandardsmayensureinteroperability,compatibility,safety,andcybersecurity.Moreover,theassurancethatsoftwareandhardwaresystems,tools,and
applicationsadheretoandproperlyimplementstandardsengenderscredibilityandtrust
[3]
.
Effortsareunderwaytodevelopdigitaltwinspecificstandardsthatwillbeutilizedinadditiontotheexistingvariousinformationandcommunicationtechnologystandards.
Digitaltwintechnologywillbebuiltuponexistingcomputingsystemstacks,platform
architectures,programmingplatforms,systems,libraries,applicationprogrammerinterfaces
(APIs),andinfrastructure.Forexample,OpenGLisapossible3Dgraphicsstandardusedto
renderthevisualrepresentationcomponentofdigitaltwins.Whileexistingcybersecurity
encryptionstandardswillbeleveraged,multiplecooperating(orcompeting)standardsthatarespecifictodigitaltwintechnologywillbeneeded.Asinglestandardmaynotadequatelyaddressallneeds,andstandardsharmonizationorblendingmaybeappropriate
[4]
.Toolvendors,
softwareandhardwareapplicationvendors,anduserscancomplywithstandardsbyensuringthattheyonlyusevettedelements,whichshouldalsoleadtotheinteroperabilityoftoolsandapplications.
Oneapproachtoestablishingstandardsfordigitaltwintechnologyistofocusonstandardmechanismsforexchanginginformation,suchastherepresentationofreal-worldobjects.
Algorithmsthatsimulatethedynamicbehaviorofobjectscouldremainproprietarytoprotectintellectualproperty,butthedescriptionoftheobjectwhosebehaviorisbeingsimulatedcouldbestandardizedandopeninordertobeexchangedbetweenapplications,domains,industries,andverticalmarkets.Inthesimulationandmodelingarena,therearemanysophisticated
softwaretoolsandapplicationsthatsupport2Dand3Dmodelingandengineeringanalysis.
Eachoftheseapplicationsusesproprietaryinternalmodelstorepresenttheobjectsbeing
modeled(i.e.,thosecreatedbytheuser).Theyalsouseproprietaryandoftencloselyguardedalgorithmsthatrepresentthefunctionalcapabilitiesformodelingandsimulation.
Potentialstandardswouldneedtocovereachinvolvedbusinessdomain.Everyonewho
employsdigitaltwintechnologyinspecificbusinessdomainswouldneedtheirownunique
standardsandstandards-basedproductsthatadheretoacommonsetofbusinessprocessesandusecaseswhereinteroperabilitycanbeachieved.Itisinsufficientforstandardstomerelyenableinteroperabilityinpurelytechnologicaldomains.
3.3.SupportiveTechnologies
Twoofthesupportivetechnologiesthatsupporttherecentinterestindigitaltwintechnology
areVR/ARandIoT.OneexpectationfordigitaltwintechnologyistoleverageVRandARto
createenhanceduserinterfacesanduserexperiencesforhumanbeingstocomprehendthe
modeling,simulation,monitoring,andcommandandcontrolofcomplexentities.Humansrelyheavilyonvisualsensoryinput,andVRandARpromisetopresentmodelsofreal-worldentitiesthroughamediumthatisamenabletohumanconsumptionandcomprehension.
IoThasbeenreferencedindigitaltwindiscussionsandliteraturethankstorecentadvancesinsensorsandtheirongoinganddramaticproliferationinvariousoperations.Thesesensorsare
6
typicallynetwork-connectedanddrivetheabilityofdigitaltwinstomodelreal-worldobjectsinwaysthatwerenotpossibleuntilrecently.Additionally,IoTdevicesareoftenusedtocreateaninformationfabricor“network”thatconsistsoftheobservedentities,thesensorsthatobserveandgatherinformation,theconnectivityelements,theprocessingcomponents(i.e.,backend
computeservers),andthecomponentsthatusetheprocessedIoTdata.Withthesenew
sensorsbeingdeployedonanIoTfabric,digitaltwinscanrepresentanddynamicallymaintaintherepresentationofaninstanceofaninstrumentedobject
[5]
.
Thus,theapplicationofdigitaltwinsgoesbeyondsimplymodelingaclassofreal-worldentities.Itcanalsobeusedtorepresentandtrackaspecificobject,maintainthereal-timestatus,and
presentadynamicallyupdatedviewtoauser.Withanaccurateunderstandingofthestateof
anobject,adigitaltwinmayalsobemanipulatedbyausertocontroltheactualobject,
meaningthatDTtechnologymayadvancebeyondtraditionalmodelingandsimulationsoftwaretoencompasscommand-and-control.Forexample,operatorscouldremotelycommandsurfacerailorsubwaytrainsfromanoperationscenter.
Dependingontheobject,asystemthatmonitorstheobject’sstatemayneedtounderstandthestate’sratesofchange.Forexample,asystemthatmonitorstherateofvelocitychangemay
needtodetectwhentheboundariesofsafeoperationaresurpassed.Forthis,artificial
intelligence(AI)andmachinelearning(ML)couldpotentiallyoutperformtraditionalcomputingmethodsaswellashumanswhomonitorconditionsandmakepredictions.Scientistsand
engineerscouldcreatemodelsofreal-worldconditionsandemploythemtotrainAIsystemstorecognizethoseconditions.Suchapplicationsforsimulation,modeling,andmonitoringare
majormotivationforadvancingdigitaltwintechnology.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
7
4.OperationsonDigitalTwins
Thissectiondiscussesseverallower-leveloperationsthatareperformedondigitaltwins:
?Digitaltwindefinitions(i.e.,descriptionsofobjecttypes)andthecreationofdigitaltwininstances
?Manipulationandmodificationofdigitaltwindefinitionsandinstances
?Exchangeviaelectroniccommunicationsofdigitaltwindefinitionsandinstances
Itisenvisionedthattherewillbemanydigitaltwindefinitionsthatdescribemanykindsofentities.Thissectionalsodiscussesoperationsondigitaltwins,
2
whicharespecificinstancescreatedfromdigitaltwindefinitions.
4.1.DigitalTwinsDefinitionsandtheCreationofDigitalTwinInstances
Adigitaltwindefinitionisaformaldescriptionofthereal-worldentitythatthedigitaltwinrepresents.Forthepurposesofthisreport,thinkofaformaldescriptionasatechnical
definitionofaparticularcategoryorclassofreal-worldobjects.
Thestartingpointforallactivityinvolvingdigitaltwintechnologyistocreateorfindadigital
twindefinitionthatrepresentsthetypeofreal-worldobjectthatistoberepresentedvirtually.Computersoftwareapplicationsarethenusedtocreateaninstanceforthatdefinitiontoholdand/ormaintainthestateoftherepresentedobject.Thesedigitaltwinelectronicinstancescanrepresentbothstaticanddynamicmodelsofthereal-worldentitiesthatcorrespondtotheir
respectivedigitaltwindefinitions.
Thespecificdigitaltwindefinitioncreatedforsomeobjecttypeswilldictatetheprecisemakeupoftheartifactsthatareinstantiatedfromthedefinition.Forexample,adigitaltwindefinitionisnotrequiredtoincludeadynamicviewofitsreal-worldcounterpart.Rather,itcouldcompriseonlyastaticviewoftheobject.Thus,notalldigitaltwindefinitionswillnecessarilycontainall
possibledeclarationsordefinitionconstructsdefinedinsomefuturestandard.Similarly,notallhypertextmarkuplanguage(HTML)filesutilizealltagsdefinedbytheHTMLstandard
[6]
.Ifa
particulardigitaltwindefinitiononlysupportsrepresentingastaticmodelofanentity,the
relatedinstanceswouldcontainnodynamicinformation,suchashowtorenderanimation,
video,ordynamicgraphics.Consider,forexample,aVRpresentationofanavalvessel.AstaticviewcouldrepresenttheinternalelementsoftheshipseenthroughVRasifapersonwere
literallywalkingthroughthevessel.VRtechnologywouldbemoreamenabletothisapplicationthana3DPDFview.Thelatterwouldcomprisedetailedengineeringdrawingstantamounttoanarchitect’sblueprintdrawings.However,itwouldbedifficulttopresenttheequivalentofwhatapersonwouldseewalkingthroughtheinterioroftheship.
Adigitaltwindefinitionshouldcreateamodeloftheobjectitrepresents,notjustaparticular
view.Themodelcouldthenbeusedtopresentthedesiredviewpointofthereal-worldentity.Adefinitioncancontainasmuchoraslittleinformationaboutitsreal-worldcounterpartasits
2Areferencetoa“digitaltwin”withoutotherqualifiersreferstothedigitaltwininstancethatrepresentstheentity.
NISTIR8356
SecurityandTrustConsiderations
February2025
forDigitalTwinTechnology
8
authordesires,whichmaylimitthetypesofviewsthatcanbecreated.Digitaltwindefinitionauthorsdecidethebreadth,scope,degreeofgranularity,anddetail.
Apracticalconsiderationistheprocessofdigitaltwindefinitionauthoringandencoding.Whileitmaybepossibletoauthordefinitionsusingatexteditor,thispracticecouldbecome
supplantedbymoreadvancedtools.Thisissimilartohownotmanypeoplehand-codeHTMLorXMLanymore
[7]
.Moreover,thecomplexityofdigitaltwindefinitionscouldentirelyprecludetheabilitytocraftdefinitionsbyhand.Manyindustriesusesophisticatedsoftwareapplicationstocreatedigitalartifactsthatrepresentwhattheyplantobuild.Someofthesesoftware
applicationssupportthe“export”oftheirartifactsinstandardfileformatsandencodings,suchasthe3DPDFstandard
[8]
.However,themajorityoftheseapplicationsusetheirown
propri
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 商業(yè)伙伴貿(mào)易安全合作協(xié)議范本
- 旋噴樁技術(shù)專項試樁成果分析報告
- 2026年橋梁施工的外部環(huán)境風(fēng)險因素
- 中高級技術(shù)人才培養(yǎng)方案設(shè)計
- 2026年綠色建筑設(shè)計中的電氣節(jié)能技術(shù)
- 高職院校專業(yè)建設(shè)發(fā)展策略
- 2026年電氣工程項目的風(fēng)險管理
- 2026年電氣控制系統(tǒng)開發(fā)流程
- 企業(yè)汽車租賃合同模板范本
- 2026年電氣節(jié)能技術(shù)對企業(yè)財務(wù)的影響
- 海姆立克急救課件 (完整版)
- 2025年互聯(lián)網(wǎng)營銷游戲化營銷案例解析可行性研究報告
- DB31∕T 1048-2020“上海品牌”認(rèn)證通 用要求
- 意識障礙的判斷及護(hù)理
- 病理性賭博的識別和干預(yù)
- 2025年宿遷市泗陽縣保安員招聘考試題庫附答案解析
- 校園文化建設(shè)協(xié)議合同
- 2025年廣東省中考物理試卷及答案
- 2026屆高三語文聯(lián)考作文題目導(dǎo)寫分析及范文:當(dāng)語言與真實經(jīng)驗脫鉤
- 皮革項目商業(yè)計劃書
- 公路護(hù)欄波型梁施工方案
評論
0/150
提交評論