Table of Contents - X.2011 (04/2024) - Security guidelines for digital twin network

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of digital twin network
7 Security threats to digital twin networks
7.1 Threats to physical network layer
7.2 Threats to interfaces
7.3 Threats to network digital twin layer
7.4 Threats to network application layer
8 Security requirements for digital twin networks
8.1 Security requirements for the physical network layer
8.2 Security requirements for interfaces
8.3 Security requirements for network digital twin layer
8.4 Security requirements for network application layer
9 Security countermeasure for digital twin network
9.1 Access control
9.2 Trustworthiness of data
9.3 Confidentiality of data
9.4 Adaptive selection and adjustment of security mechanisms
Annex A – End-to-end attribute-based encryption mechanisms on DTN data
Bibliography