数字孪生技术的安全性与可信任性考虑因素_第1页
数字孪生技术的安全性与可信任性考虑因素_第2页
数字孪生技术的安全性与可信任性考虑因素_第3页
数字孪生技术的安全性与可信任性考虑因素_第4页
数字孪生技术的安全性与可信任性考虑因素_第5页
已阅读5页,还剩46页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

NISTInternalReportNISTIR8356

SecurityandTrustConsiderationsforDigitalTwinTechnology

JeffreyVoasPeterMell

PhillipLaplanteVartanPiroumian

Thispublicationisavailablefreeofchargefrom:

/10.6028/NIST.IR.8356

NISTInternalReportNISTIR8356

SecurityandTrustConsiderationsforDigitalTwinTechnology

JeffreyVoas PeterMellPhillipLaplante

ComputerSecurityDivisionInformationTechnologyLaboratory

VartanPiroumianIndependentConsultant

Thispublicationisavailablefreeofchargefrom:

/10.6028/NIST.IR.8356

February2025

U.S.DepartmentofCommerce

JeremyPelter,ActingSecretaryofCommerce

NationalInstituteofStandardsandTechnology

CraigBurkhardt,ActingUnderSecretaryofCommerceforStandardsandTechnologyandActingNISTDirector

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

Certaincommercialequipment,instruments,software,ormaterials,commercialornon-commercial,areidentifiedinthispaperinordertospecifytheexperimentalprocedureadequately.Suchidentificationdoesnotimply

recommendationorendorsementofanyproductorservicebyNIST,nordoesitimplythatthematerialsorequipmentidentifiedarenecessarilythebestavailableforthepurpose.

TheremaybereferencesinthispublicationtootherpublicationscurrentlyunderdevelopmentbyNISTin

accordancewithitsassignedstatutoryresponsibilities.Theinformationinthispublication,includingconceptsandmethodologies,maybeusedbyfederalagenciesevenbeforethecompletionofsuchcompanionpublications.

Thus,untileachpublicationiscompleted,currentrequirements,guidelines,andprocedures,wheretheyexist,remainoperative.Forplanningandtransitionpurposes,federalagenciesmaywishtocloselyfollowthe

developmentofthesenewpublicationsbyNIST.

OrganizationsareencouragedtoreviewalldraftpublicationsduringpubliccommentperiodsandprovidefeedbacktoNIST.ManyNISTcybersecuritypublications,otherthantheonesnotedabove,areavailableat

/publications

.

NISTTechnicalSeriesPolicies

Copyright,Use,andLicensingStatements

NISTTechnicalSeriesPublicationIdentifierSyntax

PublicationHistory

ApprovedbytheNISTEditorialReviewBoardon2025-01-31

HowtoCitethisNISTTechnicalSeriesPublication:

VoasJ,MellP,LaplanteP,PiroumianV(2025)SecurityandTrustConsiderationsforDigitalTwinTechnology.

(NationalInstituteofStandardsandTechnology,Gaithersburg,MD),NISTInternalReport(IR)NISTIR8356.

/10.6028/NIST.IR.8356

AuthorORCIDiDs

JeffreyVoas:0000-0003-1139-3690

PeterMell:0000-0003-2938-897X

PhillipLaplante:0000-0002-0415-271X

VartanPiroumian:0000-0000-0000-0000

ContactInformation

nistir-8356-comments@

NationalInstituteofStandardsandTechnology

Attn:ComputerSecurityDivision,InformationTechnologyLaboratory

100BureauDrive(MailStop8930)Gaithersburg,MD20899-8930

AdditionalInformation

Additionalinformationaboutthispublicationisavailableat

/pubs/ir/8356/final

,includingrelatedcontent,potentialupdates,anddocumenthistory.

AllcommentsaresubjecttoreleaseundertheFreedomofInformationAct(FOIA).

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

i

Abstract

Digitaltwintechnologyenablesthecreationofelectronicrepresentationsofreal-worldentitiesandtheabilitytoviewthestatesandtransitionsbetweenstatesoftheseentities.Thisreport

discussestheconceptandpurposeofdigitaltwintechnologyanddescribesitscharacteristics,features,functions,andexpectedoperationaluses.Thisreportalsodiscussesbothtraditionalandnovelcybersecuritychallengespresentedbydigitaltwintechnologyaswellastrust

considerationsinthecontextofexistingNISTguidanceanddocuments.

Keywords

computercybersecurity;control;digitaltwintechnology;instrumentation;real-timecommand;real-timemonitoring;simulation;standards;testing;trust;usecasescenarios.

ReportsonComputerSystemsTechnology

TheInformationTechnologyLaboratory(ITL)attheNationalInstituteofStandardsand

Technology(NIST)promotestheU.S.economyandpublicwelfarebyprovidingtechnical

leadershipfortheNation’smeasurementandstandardsinfrastructure.ITLdevelopstests,testmethods,referencedata,proofofconceptimplementations,andtechnicalanalysestoadvancethedevelopmentandproductiveuseofinformationtechnology.ITL’sresponsibilitiesinclude

thedevelopmentofmanagement,administrative,technical,andphysicalstandardsand

guidelinesforthecost-effectivesecurityandprivacyofotherthannationalsecurity-relatedinformationinfederalinformationsystems.

Audience

Thispublicationisintendedforanyonewhowantstounderstandtheunderlyingtechnologyandenvisionedcapabilitiesofdigitaltwintechnology.ItisparticularlyapplicabletoStandardsDevelopingOrganizations(SDOs)andimplementersofdigitaltwintechnology.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

ii

PatentDisclosureNotice

NOTICE:ITLhasrequestedthatholdersofpatentclaimswhoseusemayberequiredfor

compliancewiththeguidanceorrequirementsofthispublicationdisclosesuchpatentclaimstoITL.However,holdersofpatentsarenotobligatedtorespondtoITLcallsforpatentsandITLhasnotundertakenapatentsearchinordertoidentifywhich,ifany,patentsmayapplytothis

publication.

Asofthedateofpublicationandfollowingcall(s)fortheidentificationofpatentclaimswhoseusemayberequiredforcompliancewiththeguidanceorrequirementsofthispublication,nosuchpatentclaimshavebeenidentifiedtoITL.

NorepresentationismadeorimpliedbyITLthatlicensesarenotrequiredtoavoidpatentinfringementintheuseofthispublication.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

iii

TableofContents

1.Introduction 1

2.DefinitionofDigitalTwins 2

3.MotivationandVision 4

3.1.AdvantagesofDigitalTwinTechnology…4

3.3.supportiveTechnologies…5

a.OperationsonDigitalTwins 7

4.1.DigitalTwinsDefinitionsandthecreationofDigitalTwinInstances…7

4.2.ManipulationandModificationofDigitalTwinDefinitionsandInstances…8

4.3.ExchangeofDigitalTwinDefinitionsandInstances…8

5.UsageScenariosforDigitalTwins 9

5.1.viewingstaticModelsofDigitalTwins…9

5.2.ExecutingandviewingDynamicModelsofDigitalTwins…9

5.3.Real-TimeMonitoringofReal-worldEntities11

5a.eal-imecommandandcontrolofeal-worldEntties………11

6.HighlightedUseCases 12

7.CybersecurityConsiderations 13

7.1.Novelcybersecuritychallenges13

7.1.1.MassiveInstrumentationofObjects 13

7.1.2.CentralizationofObjectMeasurements 14

7.1.3.VisualizationandRepresentationofObjectOperation 14

7.1.4.RemoteControlofObjects 14

8.TrustConsiderations 17

9.Conclusions 21

References 22

AppendixA.ListofSymbols,Abbreviations,andAcronyms 24

AppendixB.Glossary 25

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

1

1.Introduction

Adigitaltwin(DT)isanelectronicrepresentationofareal-worldentity;providingthecapabilitytoevaluatethisentity.Adigitaltwincanemulatebothphysicalthings(e.g.,buildings,

electronics,livingthings),andnon-physicalthings(e.g.,processes,conceptualmodels).Aswithmanynewinformationtechnologies,digitaltwintechnologyemploysexistingfoundational

technologiesandmayreflectexistingcapabilities.Itcoverswhatcurrentlyexistsinmodeling

andsimulationbutthencastsabroadervisionforfuturecapabilities.Thefullbenefitsofdigitaltwintechnologywillrequireinteroperabledefinitions,tools,andstandardsaswellasearly

considerationofdigitaltwincybersecurityandtrust.Thissituationisespeciallytruefornascentstandardseffortsthatseektodefineandstructurethetechnology.

Thisreportintroducestheconceptofadigitaltwin,describestheunderlyingtechnologies,andexpandsonitscurrentcapabilitiesbydiscussingkeycomponents,functions,andcybersecurityandtrustconsiderations.Itisnotintendedtodefine“digitaltwin”–thisactivityshouldbe

undertakenbySDOs.Anydefinitionof“digitaltwin,”however,shouldaddressasetoftechnicalconsiderations,whichareofferedherein.Thesetechnicalconsiderationscanalsobeusedto

testanydefinitionthatiscreatedbyanySDO.

Thisreportisorganizedasfollows:

•Section

2

definesdigitaltwintechnology.

•Section

3

describesthemotivationsforusingdigitaltwintechnology,includingadvantagesandsupportivetechnologies.

•Section

4

discussestypicaloperationsperformedondigitaltwins.

•Section

5

describestechnicalusagescenariosfordigitaltwins.

•Section

6

providesexampleindustryapplicationsofdigitaltwintechnology.

•Section

7

explorescybersecurityconsiderationsinthecontextofexistingNISTguidancebyidentifyingandexploringtraditionalcybersecurityneeds,novelcybersecurity

challenges,andapproachesthatapplytodigitaltwintechnology.

•Section

8

discussestrustissuesthatcanpreventadigitaltwinfromprovidingthe

desiredoperationalfunctionalitywithanacceptablelevelofqualityinthecontextofexistingNISTguidance.

•Section

9

offersconcludingthoughts.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

2

2.DefinitionsofDigitalTwins

Thereareseveralexistingdefinitionsfordigitaltwins.Somehavebeencreatedbyresearchers,standardscommittees,consortia,andindustry.Othersareimplicitlysuggestedbycommercialenterprisesthatmakestatementsabouthowtheirsoftwareapplicationsare“digitaltwin-

compliant.”Despitethesedefinitionsthereisnoagreed-upondefinitionfororconsensusonthefullpotentialofdigitaltwins

[1]

.

TheDigitalTwinConsortium(DTC)offersthefollowingdescriptionfordigitaltwins:

Adigitaltwinisavirtualrepresentationofreal-worldentitiesandprocessessynchronizedataspecifiedfrequencyandfidelity.

•Digitaltwinsystemstransformbusinessbyacceleratingholistic

understanding,optimaldecision-making,andeffectiveaction.

•Digitaltwinsusereal-timeandhistoricaldatatorepresentthe pastandpresentandsimulatepredictedfutures.

•Digitaltwinsaremotivatedbyoutcomes,tailoredtousecases, poweredbyintegration,builtondata,guidedbydomain knowledge,andimplementedinIT/OTsystems

[1]

.

Asimplifieddefinitionfordigitaltwins

1

couldbe:

Adigitaltwinisthevirtual(i.e.,digital)representationofaphysicalorperceivedreal–worldentity,concept,ornotion.

Theuseoftheword“virtual”isappropriatebecauseadigitaltwinissomethingthathastheeffectbutnottheactualformofwhatisspecified.DTsoftwareimplementationspresentahumanuserwithanobject’svisualgraphicrepresentation,eitherstaticordynamic,viatheobject’sDT.

Arelatedimportanttermisthatofadigitaltwindefinition:

Adigitaltwindefinitionisamachine–readablespecificationthatdescribesfeaturesthatmaybemodeledforaparticulartypeofreal–worldentity.

Thus,adigitaltwindefinitionreferstoaparticulartypeofentityratherthanthespecificentityitself.Itdefinesthefeaturesofanentitytypethatcanbestaticallyanddynamicallymodeled,

howthosefeatureswillbedigitallyencodedandrepresented,andhowtheywillpersistina

digitalcomputerenvironment.Computersoftwareapplicationswillreaddigitaltwindefinitionstocreatedigitaltwininstances(orsimply,digitaltwin),whichareinstantiationsofreal-world

objectsthatmodelthestateofrepresentedobjects.

Whilemanyofthesereal-worldentitieshavephysicalforms(e.g.,anaircraftengine,anoil

derrick,avalveinanoilpipelinepumpingstation),digitaltwinscanalsorepresentsomething

abstract.TheDTCdefinitioncontainstheword“processes,”whichisanabstractnotion,andthesimplifieddefinitiondiscussesentitiesthatmaybeperceivedorconceivedwithouthavinga

1Section

3

discussesthedifferencesbetweendigitaltwintechnologyandtraditionalmodelingandsimulation,andSec.

9

discussestheimportanceofsynchronizationbetweenadigitaltwinandareal-worldentity.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

3

physicalform.Forexample,aprocessinacomputeroperatingsystemisreal,evenifitdoesnothaveaconcreteorphysicalshape.Itisaconglomerationofmultipleintangiblethings,suchaselectricalsignals,thestatesofregistersthatcontainvoltageandcurrentlevels,andthe

electricalstateofmemory.Whetheritisviewedstaticallyordynamically,acomputerprogramisreal,andonecanclearlyobservetheeffectsthatithasonotherobjects.

Abusinessprocessisanotherexampleofanabstractconceptthatisrealbuthasnomaterialform.Infact,somesoftwaredefinesdigitaltwinsasrepresentationsofbusinessprocesses.

Digitaltwinscouldevendescribethestepsinamanufacturingprocessorsimulateaspectsof

thedynamicexecutionofspecificprocessesinafactoryorchemicalplant,suchasoilrefiningortheproductionofnuclearfuel.Inshort,adigitaltwincanrepresentanythingthatahumancanconceiveorperceive,whetherphysicalornot.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

4

3.MotivationandVision

Elementsofdigitaltwintechnologyhavelongexistedincomputersandsoftwarethatrepresententitiesandsimulatedynamicbehavior.Now,thematurationofnumerousunderlying

technologiesismakingitpossibletobroadlyapplysimulationandmodelingintheformof

digitalrepresentationsandmakethetechnologyaccessibletoamuchwideruserbase.The

InternetofThings(IoT)hasledtotheemergenceofsmall,low-cost,battery-poweredsensorsthatconnectoveranetworkandenablemassivesensordeploymenttoawidevarietyof

objects(e.g.,modernbuildingsmayhavethousandsofsensors).Thesesensorsthenprovide

informationthatcanfeedandmaintaincomplexmodelsofthoseobjects.Theadvancesin

powerfulbutlow-costprocessingandstorageenableustomaintain,view,andmanipulate

thesedigitalreplicaswithouthavingtousespecial-purposeorexpensivehardware.Therecentadvancesinvirtualreality(VR)andaugmentedreality(AR)haveenabledinexpensive

visualizationofdigitaltwins.

Digitaltwintechnologyisalsoanadvancementoverexistingsimulationandmodelingbecauseitallowsforthereal-timemonitoringofentitieswhiledynamicallyupdatingtheirdigitaltwins.Thereisalsoatrendtoremotecontrolphysicalentitiesbymanipulatingdynamicmodels(i.e.,digitaltwins)asopposedtodirectlymanipulatingtheobjectsthemselves.Suchcontrolismoreindirectandabstractsawaydetailsthathumansmaynotbeabletomanage.

Standardsdevelopmentwilllikelyimpactwhetherdigitaltwintechnologybecomeswidely

used.MostIoTsystems,simulationandmodelingsoftware,andVRandARsystemscurrentlyexistinstovepipeproprietarysystemsandintegratingthemrequiressignificantwork.Muchoftheworkinemergingdigitaltwintechnologyisinthecreationofprotocolsandstandardsto

enableplugandplayintegration.Thegoalistobeabletoloadanydigitaltwincomputerfileintoadigitaltwinsystemandhaveitfunctionregardlessofwhatisbeingmodeled.

3.1.AdvantagesofDigitalTwinTechnology

Aplatformormechanismthatsupportsthecreationofdigitalmodelsofreal-worldobjectsisadvantageousforseveralreasons.Forexample,onecanstudytheobjectviaitsmodelpriortobuildingthereal-worldversion,studytheobjectasitprogressesthroughitslifecycle,and

conceivablycontroltheobjectthroughthemodeltopreventundesirableoutcomesfortheobject,thusreducingcertaintypesofrisk.

Thisadvantageincreaseswhenmodelingmultipleobjectsthatneedtoworktogether,eveniftheobjectsaremaintainedbydifferentorganizations.Ifcooperatingentitiescansharedigitaltwindefinitions,thentheycanmoreeasilymodelanddigitallysimulateobjectinteractions

priortotherealizationoftheoutputproduct.However,theinternaldefinitionsand

representationsoftheobjectsbeingmodeledbyeachsoftwareapplicationtendtobehighlyproprietary.Thedigitalartifactscreatedbytoday’sapplicationsarenoteasilyshared,andtheapplicationsarethereforenotinteroperable.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

5

3.2.ExpectationofStandards

Theadoptionofandadherencetostandardsmayensureinteroperability,compatibility,safety,andcybersecurity.Moreover,theassurancethatsoftwareandhardwaresystems,tools,and

applicationsadheretoandproperlyimplementstandardsengenderscredibilityandtrust

[3]

.

Effortsareunderwaytodevelopdigitaltwinspecificstandardsthatwillbeutilizedinadditiontotheexistingvariousinformationandcommunicationtechnologystandards.

Digitaltwintechnologywillbebuiltuponexistingcomputingsystemstacks,platform

architectures,programmingplatforms,systems,libraries,applicationprogrammerinterfaces

(APIs),andinfrastructure.Forexample,OpenGLisapossible3Dgraphicsstandardusedto

renderthevisualrepresentationcomponentofdigitaltwins.Whileexistingcybersecurity

encryptionstandardswillbeleveraged,multiplecooperating(orcompeting)standardsthatarespecifictodigitaltwintechnologywillbeneeded.Asinglestandardmaynotadequatelyaddressallneeds,andstandardsharmonizationorblendingmaybeappropriate

[4]

.Toolvendors,

softwareandhardwareapplicationvendors,anduserscancomplywithstandardsbyensuringthattheyonlyusevettedelements,whichshouldalsoleadtotheinteroperabilityoftoolsandapplications.

Oneapproachtoestablishingstandardsfordigitaltwintechnologyistofocusonstandardmechanismsforexchanginginformation,suchastherepresentationofreal-worldobjects.

Algorithmsthatsimulatethedynamicbehaviorofobjectscouldremainproprietarytoprotectintellectualproperty,butthedescriptionoftheobjectwhosebehaviorisbeingsimulatedcouldbestandardizedandopeninordertobeexchangedbetweenapplications,domains,industries,andverticalmarkets.Inthesimulationandmodelingarena,therearemanysophisticated

softwaretoolsandapplicationsthatsupport2Dand3Dmodelingandengineeringanalysis.

Eachoftheseapplicationsusesproprietaryinternalmodelstorepresenttheobjectsbeing

modeled(i.e.,thosecreatedbytheuser).Theyalsouseproprietaryandoftencloselyguardedalgorithmsthatrepresentthefunctionalcapabilitiesformodelingandsimulation.

Potentialstandardswouldneedtocovereachinvolvedbusinessdomain.Everyonewho

employsdigitaltwintechnologyinspecificbusinessdomainswouldneedtheirownunique

standardsandstandards-basedproductsthatadheretoacommonsetofbusinessprocessesandusecaseswhereinteroperabilitycanbeachieved.Itisinsufficientforstandardstomerelyenableinteroperabilityinpurelytechnologicaldomains.

3.3.SupportiveTechnologies

Twoofthesupportivetechnologiesthatsupporttherecentinterestindigitaltwintechnology

areVR/ARandIoT.OneexpectationfordigitaltwintechnologyistoleverageVRandARto

createenhanceduserinterfacesanduserexperiencesforhumanbeingstocomprehendthe

modeling,simulation,monitoring,andcommandandcontrolofcomplexentities.Humansrelyheavilyonvisualsensoryinput,andVRandARpromisetopresentmodelsofreal-worldentitiesthroughamediumthatisamenabletohumanconsumptionandcomprehension.

IoThasbeenreferencedindigitaltwindiscussionsandliteraturethankstorecentadvancesinsensorsandtheirongoinganddramaticproliferationinvariousoperations.Thesesensorsare

6

typicallynetwork-connectedanddrivetheabilityofdigitaltwinstomodelreal-worldobjectsinwaysthatwerenotpossibleuntilrecently.Additionally,IoTdevicesareoftenusedtocreateaninformationfabricor“network”thatconsistsoftheobservedentities,thesensorsthatobserveandgatherinformation,theconnectivityelements,theprocessingcomponents(i.e.,backend

computeservers),andthecomponentsthatusetheprocessedIoTdata.Withthesenew

sensorsbeingdeployedonanIoTfabric,digitaltwinscanrepresentanddynamicallymaintaintherepresentationofaninstanceofaninstrumentedobject

[5]

.

Thus,theapplicationofdigitaltwinsgoesbeyondsimplymodelingaclassofreal-worldentities.Itcanalsobeusedtorepresentandtrackaspecificobject,maintainthereal-timestatus,and

presentadynamicallyupdatedviewtoauser.Withanaccurateunderstandingofthestateof

anobject,adigitaltwinmayalsobemanipulatedbyausertocontroltheactualobject,

meaningthatDTtechnologymayadvancebeyondtraditionalmodelingandsimulationsoftwaretoencompasscommand-and-control.Forexample,operatorscouldremotelycommandsurfacerailorsubwaytrainsfromanoperationscenter.

Dependingontheobject,asystemthatmonitorstheobject’sstatemayneedtounderstandthestate’sratesofchange.Forexample,asystemthatmonitorstherateofvelocitychangemay

needtodetectwhentheboundariesofsafeoperationaresurpassed.Forthis,artificial

intelligence(AI)andmachinelearning(ML)couldpotentiallyoutperformtraditionalcomputingmethodsaswellashumanswhomonitorconditionsandmakepredictions.Scientistsand

engineerscouldcreatemodelsofreal-worldconditionsandemploythemtotrainAIsystemstorecognizethoseconditions.Suchapplicationsforsimulation,modeling,andmonitoringare

majormotivationforadvancingdigitaltwintechnology.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

7

4.OperationsonDigitalTwins

Thissectiondiscussesseverallower-leveloperationsthatareperformedondigitaltwins:

•Digitaltwindefinitions(i.e.,descriptionsofobjecttypes)andthecreationofdigitaltwininstances

•Manipulationandmodificationofdigitaltwindefinitionsandinstances

•Exchangeviaelectroniccommunicationsofdigitaltwindefinitionsandinstances

Itisenvisionedthattherewillbemanydigitaltwindefinitionsthatdescribemanykindsofentities.Thissectionalsodiscussesoperationsondigitaltwins,

2

whicharespecificinstancescreatedfromdigitaltwindefinitions.

4.1.DigitalTwinsDefinitionsandtheCreationofDigitalTwinInstances

Adigitaltwindefinitionisaformaldescriptionofthereal-worldentitythatthedigitaltwinrepresents.Forthepurposesofthisreport,thinkofaformaldescriptionasatechnical

definitionofaparticularcategoryorclassofreal-worldobjects.

Thestartingpointforallactivityinvolvingdigitaltwintechnologyistocreateorfindadigital

twindefinitionthatrepresentsthetypeofreal-worldobjectthatistoberepresentedvirtually.Computersoftwareapplicationsarethenusedtocreateaninstanceforthatdefinitiontoholdand/ormaintainthestateoftherepresentedobject.Thesedigitaltwinelectronicinstancescanrepresentbothstaticanddynamicmodelsofthereal-worldentitiesthatcorrespondtotheir

respectivedigitaltwindefinitions.

Thespecificdigitaltwindefinitioncreatedforsomeobjecttypeswilldictatetheprecisemakeupoftheartifactsthatareinstantiatedfromthedefinition.Forexample,adigitaltwindefinitionisnotrequiredtoincludeadynamicviewofitsreal-worldcounterpart.Rather,itcouldcompriseonlyastaticviewoftheobject.Thus,notalldigitaltwindefinitionswillnecessarilycontainall

possibledeclarationsordefinitionconstructsdefinedinsomefuturestandard.Similarly,notallhypertextmarkuplanguage(HTML)filesutilizealltagsdefinedbytheHTMLstandard

[6]

.Ifa

particulardigitaltwindefinitiononlysupportsrepresentingastaticmodelofanentity,the

relatedinstanceswouldcontainnodynamicinformation,suchashowtorenderanimation,

video,ordynamicgraphics.Consider,forexample,aVRpresentationofanavalvessel.AstaticviewcouldrepresenttheinternalelementsoftheshipseenthroughVRasifapersonwere

literallywalkingthroughthevessel.VRtechnologywouldbemoreamenabletothisapplicationthana3DPDFview.Thelatterwouldcomprisedetailedengineeringdrawingstantamounttoanarchitect’sblueprintdrawings.However,itwouldbedifficulttopresenttheequivalentofwhatapersonwouldseewalkingthroughtheinterioroftheship.

Adigitaltwindefinitionshouldcreateamodeloftheobjectitrepresents,notjustaparticular

view.Themodelcouldthenbeusedtopresentthedesiredviewpointofthereal-worldentity.Adefinitioncancontainasmuchoraslittleinformationaboutitsreal-worldcounterpartasits

2Areferencetoa“digitaltwin”withoutotherqualifiersreferstothedigitaltwininstancethatrepresentstheentity.

NISTIR8356

SecurityandTrustConsiderations

February2025

forDigitalTwinTechnology

8

authordesires,whichmaylimitthetypesofviewsthatcanbecreated.Digitaltwindefinitionauthorsdecidethebreadth,scope,degreeofgranularity,anddetail.

Apracticalconsiderationistheprocessofdigitaltwindefinitionauthoringandencoding.Whileitmaybepossibletoauthordefinitionsusingatexteditor,thispracticecouldbecome

supplantedbymoreadvancedtools.Thisissimilartohownotmanypeoplehand-codeHTMLorXMLanymore

[7]

.Moreover,thecomplexityofdigitaltwindefinitionscouldentirelyprecludetheabilitytocraftdefinitionsbyhand.Manyindustriesusesophisticatedsoftwareapplicationstocreatedigitalartifactsthatrepresentwhattheyplantobuild.Someofthesesoftware

applicationssupportthe“export”oftheirartifactsinstandardfileformatsandencodings,suchasthe3DPDFstandard

[8]

.However,themajorityoftheseapplicationsusetheirown

propri

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

最新文档

评论

0/150

提交评论