RISKS AND VULNERABILITIES OF DIGITAL TWINS IN MANUFACTURING SYSTEMS DURING ENERGY CONSUMPTION OPTIMIZATION
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1149Keywords:
digital twin, cybersecurity, energy consumption optimization, industrial internet of things, false data injection, defense in depth, cryptographic authentication, cyber-physical systemsAbstract
The presented scientific research is dedicated to an in-depth systemic analysis of information security issues arising during the implementation, integration, and operation of Digital Twin technology in modern cyber-physical manufacturing systems focused on energy consumption optimization. In the context of the rapid transition to Industry 4.0, accompanied by total digitalization and the convergence of computing resources with physical processes, Digital Twin technology has become an indispensable tool for achieving high energy efficiency, minimizing losses, and ensuring the sustainable development of the industry. However, as this research demonstrates, the breakdown of traditional physical network isolation (Air Gap) and the establishment of a continuous bidirectional data flow between the sensor equipment of operational technology and information technology cloud platforms create a large attack surface. The article provides a fundamental overview of the architectural vulnerabilities of the Industrial Internet of Things, analyzes the weaknesses of key communication protocols, and develops an extended threat classification based on an adapted STRIDE model. Special emphasis is placed on threats to data integrity, particularly False Data Injection (FDI) attacks and their cumulative impact on optimization algorithms. Within the methodological and practical part of the work, a representative local environment was built using the Software-in-the-Loop principle, which integrates a Python energy consumption emulator, the Eclipse Mosquitto message broker, and the event-driven Node-RED platform. Through the practical modeling of Spoofing and Tampering attacks, it was demonstrated that the compromise of input telemetry can completely disorient simple moving average (SMA) algorithms, hiding critical overloads from operators and blocking emergency load-shedding mechanisms, which under real conditions leads to the physical destruction of infrastructure. To counter the identified threat vectors, a comprehensive Defense in Depth architecture was developed, implemented, and verified. The proposed approach combines cryptographic encryption of the transport channel using the TLS protocol with strict authentication and application-level payload integrity validation using HMAC-SHA256 digital signatures and timestamp verification. The efficiency evaluation demonstrated the complete neutralization of the studied attacks while maintaining the functional stability of the control algorithms and resulting in entirely acceptable overheads on network delays at a level of 15–20%.
Downloads
References
IT-Enterprise. (2024). Digital twin: Technology transforming manufacturing. https://www.it.ua/knowledge-base/technology-innovation/cifrovoj-dvojnik-digital-twin
Fuller, A., Fan, Z., Day, C., & Barlow, C. (2020). Digital twin: Enabling technologies, challenges and open research. IEEE Access, 8, 108952–108971. https://doi.org/10.1109/ACCESS.2020.2998358
Alcaraz, C., & Lopez, J. (2022). Digital twin: A comprehensive survey of security threats. IEEE Communications Surveys & Tutorials, 24(3), 1475–1503. https://doi.org/10.1109/COMST.2022.3171465
Suhail, S., Hussain, R., Jurdak, R., Oracevic, A., Salah, K., Hong, C. S., & Matulevičius, R. (2022). Blockchain-based digital twins: Research trends, issues, and future challenges. ACM Computing Surveys, 54(11s), 1–34. https://doi.org/10.1145/3517189
He, Y., Mendis, G. J., & Wei, J. (2017). Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism. IEEE Transactions on Smart Grid, 8, 2505–2516. https://doi.org/10.1109/TSG.2017.2703842
Tao, F., Zhang, M., & Nee, A. Y. C. (2019). Digital twin driven smart manufacturing. Academic Press. https://doi.org/10.1016/C2018-0-02206-9
National Institute of Standards and Technology. (2019). Considerations for managing Internet of Things (IoT) cybersecurity and privacy risks (NIST IR 8228). https://doi.org/10.6028/NIST.IR.8228
Eckhart, M., & Ekelhart, A. (2018). Towards security-aware virtual environments for digital twins. In Proceedings of the 4th ACM Workshop on Cyber-Physical System Security (pp. 61–72). https://doi.org/10.1145/3198458.3198464
Savchenko, T., Lutska, N., Vlasenko, L., Sashnova, M., Zahorulko, A., Minenko, S., Ibaiev, E., & Tytarenko, N. (2025). Risk analysis and cybersecurity enhancement of digital twins in dairy production. Technology Audit and Production Reserves, 2(2(82)), 37–49. https://doi.org/10.15587/2706-5448.2025.325422
InHandGO. (2024). Revolutionizing Industry 4.0: How digital twins are powering the future of smart manufacturing. https://inhandgo.com/blogs/articles/revolutionizing-industry-4-0-how-digital-twins-are-powering-the-future-of-smart-manufacturing
Suleiman, R., Maradapu, V. V. S., Wei, Y., & Wang, C. (2025). Blockchain for security in digital twins. Future Internet, 17(9), 385. https://doi.org/10.3390/fi17090385
TXOne Networks. (2023). Digital twins: The benefits and challenges of revolutionary technology in automotive industries. https://www.txone.com/blog/digital-twins-benefits-and-challenges-revolutionary-technology-in-automotive-industries/
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Тетяна Савченко, Ярослав Бондар

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.