Survey On Digital Twin Edge Networks DITEN Towards
Survey On Digital Twin Edge Networks DITEN Towards
(Invited Paper)
1 School of Computer Science and Engineering, Central South University, Changsha 410083, China
ABSTRACT The next generation (6G) wireless systems aim to cater to the Internet of Everything (IoE)
and revolutionize customer services and applications to a fully intelligent and autonomous system. To
achieve this, the digital twin edge network (DITEN) is proposed to combine mobile/multi-access edge
computing (MEC) and digital twin (DT), thereby improving the network performance such as throughput
and security, and reducing the cost of communication, computation, and caching. In DITENs, the network
status can be continuously monitored, and based on the obtained network states, the networking schemes,
such as routing and resource management, can be studied in the established DITENs from a centralized
perspective. In this survey, we present a comprehensive overview of DITEN for 6G. First, we present the
fundamental aspects of DITEN, including concept, framework, and potential. Second, a comprehensive
design of DITEN is devised, including the DT modeling/updating, DT deployment, key issues, and enabling
technologies. Then, the typical applications of DITEN towards 6G are provided, including the Internet
of Things (IoT), vehicular network, space-air-ground integrated network (SAGIN), healthcare, wireless
systems, and other applications, along with the design of DITEN in each application, such as DT modeling,
DT association, incentive mechanisms, and so on. Finally, challenges and open issues are discussed.
INDEX TERMS Digital twin edge networks (DITEN), 6G, DT modeling, DT deployment, applications,
challenges.
in the virtual layer with high precision. However, in practice, and healthcare, request a service from the DITEN system,
it is challenging to model a physical entity/phenomenon vir- and the virtual layer feeds back the optimal decisions to the
tually exactly similar to the physical one. Besides, there are application layer.
some key issues to be addressed, such as efficiency, fault-
tolerance, low latency, and security. To solve these issues, C. POTENTIALS OF DITEN TOWARDS 6G
various advanced enabling technologies in terms of com- The DITEN has some potential to support various applica-
munications, data processing, incentive mechanisms, ML, tions towards 6G [61], such as communication, computation,
and blockchain, can be applied to DT modeling and deci- and simulation. The details are given in the following.
sion making while protecting the privacy of users. Based
on the various formed models and big data, DTs can assist 1) COMMUNICATIONS
with obtaining intelligent solutions to the problems in the Communications are fundamental to a network, and directly
application layer, such as task offloading and resource alloca- impact the performance of the network, including the
tion in IoT, vehicular network, SAGIN, healthcare, wireless throughput, transmission latency, security, etc. Usually, the
system, etc. communication resource in a network is limited. It is infeasi-
Furthermore, effective interfaces between different layers ble to attempt different options in a real network. Fortunately,
of the DITEN system are required to bridge the physical with DITEN, we can process various communication opera-
objects, twins, and applications [61]. Specifically, through tions in a virtual edge network, and then obtain the optimal
the twin-to-physical object interface, the real-time interaction operation parameters to feedback to the real network to gain
between the DT layer and the physical layer can be achieved. the optimal network performance, such as communication
The global information of the system can be obtained rate, bandwidth usage, security, etc. Several researches are
through the communications between twins with the twin- focusing on applying DT to improve the communication
to-twin interfaces. Moreover, through twin-to-application quality in a network. In [62], DITEN is applied to obtain the
interfaces, the applications such as IoT, vehicular networks, optimal communication resource allocation to alleviate the
B. DT DEPLOYMENT
In DITEN, DTs can be deployed on various locations includ-
ing cloud, edge, and physical entity [61], depending on
the distinct requirements for different applications, such
as latency, physical experience quality, computing resource
requirement, and reliability, etc.
FIGURE 4. Digital twin migration in DITEN.
1) DEPLOYMENT ON THE CLOUD [79], [80]
The first way to deploy DTs is on the cloud, which has
4) HYBRID DEPLOYMENT [26], [27]
been applied in most cases. Cloud has large coverage and
rich available resource, it can ensure the stability of the The above three DT deployment methods have different char-
data transmission between the physical entities and DTs, acteristics. To obtain the optimal system performance, the
and satisfy the intensive computation requirements for DT above three DT deployment methods can be integrated to
modeling and updating. As such, deploying DTs on the cloud yield a hybrid DT deployment, such as deploying DTs both
suits the case where the physical entities move constantly, in edge and cloud. For example, in the DT based infotain-
and the DTs are called by multiple devices, such as vehi- ment system for autonomous cars, DTs are deployed both at
cles, wearable devices, etc. However, although the cloud has the edge and cloud for efficient caching. The DTs deployed
rich computing resources than the edge, it will lead to high at the edge make caching decisions for the users with crit-
latency and low context awareness. ical latency requirements. In addition, the cloud is used to
cache the information with relatively low usage frequency
2) DEPLOYMENT ON THE EDGE [81], [82] to address the limited caching capacity at the edge. Cloud
The DT system can be also deployed at the network edge. DTs are used to manage the caching in the cloud.
Since the limited coverage of the edge servers, this DT
deployment way more suits the case where the physical enti- 5) DT MIGRATION
ties are relatively fixed and have the requirement of latency, DT migration has the potential to provide constant services
such as some large-scale types of equipment. Moreover, for end devices by deploying DTs on the edge. Due to the
deploying a DT system at the edge, the performance of AI mobility of end devices, a device connected to a small BS
models for data processing and analysis is improved with may move to the coverage area of another BS, where the BS
the localized edge environment, and the security and syn- is installed with an edge server running DTs. The mobile
chronization of data transmission can be guaranteed with device can connect with the original edge servers via the
the fast and inexpensive edge connections [38]. Low latency core network with the assistance of a newly associated BS.
and more context awareness such as location and mobility of But it may lead to high inherent latency, and is not applicable
end devices can be achieved by deploying DT at the network for many applications with strict latency constraints. In addi-
edge compared with deploying DT at the cloud. Although tion, constructing a new DT system on the edge server on the
edge-based twins have many advantages to enable a variety newly associated small BS is time-consuming and resource
of applications, they are constrained by limited computing cost. To this end, it is promising to migrate the DTs to the
resources. newly associated small BS. Based on the location of the
mobile device, DTs should be migrated dynamically [82].
3) DEPLOYMENT ON THE PHYSICAL ENTITY [83] As shown in Fig. 4, the physical object moves from loca-
The third way is to deploy the DT system on the phys- tion A to C through B, the DT of the physical object is
ical entities directly. This way does not require the data migrated from edge server ES1, ES2, and ES3 accordingly.
exchange between the edge/cloud servers and physical enti- The DTs migration can be achieved efficiently by explor-
ties, thereby relieving the burden on communications, and ing ML schemes. However, the heterogeneity of edge servers
improving security by protecting the physical entities from makes the model migration challenging. The interoperability
malicious communications. In this case, external communi- among different edge/cloud servers may hinder the migration
cation access to the inter-twin communications through DTs, of DTs from one edge/cloud server to another. To simplify
and private intra-twin communications are used to forward the migration of DTs to address end device mobility issues,
the verified and secured data from the DT to the entities’ interoperable must be considered in the design of the servers.
execution units. While, the physical entities always have Easier migration can be achieved utilizing common archi-
limited computing capability and storage space, which may tecture, such as a unified cloud interface/cloud proxy, and
hinder the DT modeling and updating. open cloud computing interface [83].
the latency for DT modeling and updating. To this end, it is machine learning, blockchain, and incentive mechanisms,
necessary to optimize the usage of the limited resources in which are discussed in the following.
the wireless network.
An efficient way to improve the resource utilization is 1) COMMUNICATIONS
to optimize the association between end devices and edge Communications are fundamental to realize a DITEN,
servers based on their computation capabilities and commu- where large-scale data exchange is required to achieve
nication channel state. By establishing and updating DTs at DT modeling/updating and the synchronization between
the associated edge servers, the data and tasks for model the physical objects and their virtual twin in the entire
training can be adaptively distributed to different edge DITEN system. There are three kinds of communications in
servers. The edge association jointly considers end devices’ DITEN, namely physical-to-physical (P2P) communication,
datasets, the computation capability of edge servers, and physical-to-twin (P2T) communication, and twin-to-twin
the communication states between end devices and edge (T2T) communication, which are summarized in Table 2.
servers. Meanwhile, the learning accuracy can be improved The P2P communications achieve the interaction and shar-
by increasing the training batch size of DTs. However, the ing of information among physical objects, which include
large-scale training batch size requires more time to process the communications among end devices, communications
more computation tasks, thereby resulting in long latency. among edge/cloud servers, and communications between end
Moreover, the optimal resource allocation, such as band- devices and edge/cloud servers. The P2P communications
width, should also be studied to improve the efficiency of have strict requirements for their performance of reliability,
communications. In [58], the edge association problem is latency, and capacity. The P2T communications refer to the
researched to balance the learning accuracy and the learning information transmission between physical objects and DTs
time cost, where the associations between DTs and edge through wireless communication technologies. With P2T
servers, the training data batch size, and the bandwidth communications, the physical objects transmit their real-time
allocation are optimized. information to DTN for DT model construction and updat-
ing, and the DTN will feed back the results and instructions
4) SECURITY to the physical object. In P2T communications, a physical
Security is also a key issue in DITEN, including the security object first accesses the network through a BS, then con-
and privacy of the physical objects and data privacy preser- nects to the DT on the Internet. To achieve the real-time
vation in DT. With the large scale of physical objects and data exchange between the physical object and the DTs,
their distribution, how to resist unauthorized access to the there are some strict requirements for P2T communications,
physical objects, servers, DTs, and so on is one of the key including robust communication infrastructure, high reliabil-
problems in the design of DITEN. Moreover, how to guar- ity, low latency, high capacity, and guaranteed transmission
antee the security of interfaces between different layers of privacy and security. The T2T communications achieve the
the DITEN is also a key issue to be addressed, since large- data transmissions between DTs of physical objects in DTN,
scale data transmission is required for the DT modeling and aiming to mirror the communication behavior in the practical
updating, and physical-virtual synchronization. physical communication system. The T2T communications
Besides, security and privacy issues during data transmis- rely on the DT servers’ computation ability to model the data
sion for model training are also needed to be considered. In transmission behavior and do not need to consume any com-
the distributed model training case, some malicious physical munication resources such as spectrum and radio power. In
objects may transmit error information to mislead the behav- addition, compared with the P2P communications that need
ior of the edge server for global model training. Conversely, to consume a certain amount of time, the T2T communica-
some malicious edge servers may transmit mistake global tions only require a very short time to complete the same
model parameters to mislead the updating of the local model transmission behavior. To this end, T2T communications can
in each physical object. To this end, privacy leakage will be be utilized to imitate the long-term transmission process in
caused and need to be considered during the design of the a relatively short period of time, and the results will be sent
DITEN [85], [86], [87]. to the physical communications to guide the schedule of the
practical applications.
Due to the different communication environments, the
D. ENABLE TECHNOLOGIES above three communications have different requirements for
In this subsection, we present some technologies to enable their performance, such as reliability, latency, capacity, and
the DITEN, including communications, data processing, connectivity, which are summarized in Table 2. First, for
(PPO) is applied to obtain the optimal task offloading and from others performing similar or related tasks. TL mini-
resource allocation decision in a distributed blockchain envi- mizes the statistical distance between the source and target
ronment. In [27], DRL is applied to solve the task offloading domains in the feature space, by sharing model parame-
problem in a DT-enabled vehicular edge computing (VEC) ters between the source and target domains and considering
network. In [79], DQN with experience replay and target the transferability of the learned parameters. In [107], deep
network is employed to solve the service offloading problem transfer learning is applied in DT-assisted fault diagnosis.
in a DT-enabled Internet of Vehicles (IoV) network. In [80] To achieve this, a virtual model is built for the system first,
Double Deep Q-learning Network (DDQN) is utilized to and then when the built virtual model reaches acceptable
solve the resource allocation problem at the cooperative edge performance, based on the real-time states of the physi-
servers. cal object and knowledge learned from the virtual model, a
FL: The centralized ML algorithms have a high risk of diagnostic model is constructed and updated applying deep
data leakage since it requires data exchange between the transfer learning.
edge servers and end devices. In addition, in various appli- In [29], TL is exploited to address the DT migration
cation scenarios, synchronizing all raw data to DTs will problem. Considering the mobility of devices in DITEN,
result in over-communication load and data leakage, as such the efficiency of service provided from edge servers to end
the end users may have communication risk. To this end, devices is reduced, so it is challenging to construct and
FL as a promising decentralized ML framework is applied maintain DTs. When end users move from one location to
to strengthen data security and protect user privacy [32]. another location, synchronization of the original DT model
FL does not require the end devices to transmit their raw deployed in the edge server will incur high resource con-
data to the server. In FL, the end devices train their ML sumption, while communication over long distances will
model locally based on their database and only need to lead to high latency. To this end, it is necessary to transfer
transmit their local model parameters to the server, thereby the DT model from the original edge server to the newly
alleviating users’ privacy concerns and providing an ML selected edge server after users’ mobility, like DT mobility
framework for distributed users [100]. FL is a key tech- in the Metaverse. By migrating DTs among servers based
nology to enable the development of IoT [101], [102] and on the location of end devices applying TL, guaranteed and
6G [103] due to its distributed and privacy-preserving fea- high-quality services are provided to users while preventing
tures. Recently, in [23], FL is applied to promote privacy resource consumption and latency for new model training.
and security in DT modeling. Clients train their model and Applying TL for DT migration, the knowledge in original
transmit their trained model to the BS. After that, the BS servers can be reused to construct a DT of users in a target
builds DTs of client devices. server immediately.
However, during DT modeling, a BS that has DTs of
all physical devices may mislead users’ behavior models. In 4) BLOCKCHAIN
addition, malicious physical devices may affect DT modeling Blockchain can be considered as a tamper-proof distributed
by propagating fake data or low-quality models to the BS. database, which guarantees the security of a system in
Moreover, signal distortion and aggregation errors occur a distributed way by using cryptography. Blockchain has
since the constrained resource of the edge devices and the the advantage of decentralization, tamper-proof, anonymous,
random wireless communication environment, which affects publicly verifiable, and traceable. When distributed learning
the convergence speed and prediction accuracy of FL. To is utilized to train DT models, blockchain has the potential
this end, in [104], the authors minimize the loss function of to store the pre-trained models in an immutable and trans-
ML by selecting the users participating in FL and allocat- parent manner, so that those pre-trained models can be used
ing resources optimally. In [105], to motivate more users to to serve to request users in the future. Thus, blockchain
join in FL, an incentive mechanism is proposed based on can be integrated with DITEN to achieve guaranteed secu-
an auction game. In [28], the dynamic DT and FL in an rity, immutability trust, accessibility, and traceability of
air-ground network is studied. An incentive scheme based transactions [108].
on Stackelberg game is developed to motivate customers to There are several works that apply blockchain in DT.
join in model training collaboratively. In [106], an incentive In [109], blockchain is utilized for DT construction, where
scheme combining reputation and contract theory is proposed the transactions initiated by participants involved in DT con-
to motivate mobile users with high reputations to join in FL. struction are managed and tracked with smart contracts.
In [32], cooperative FL is designed to build DTs for resource- In [110], a reference model is proposed to authorize the
limited devices at the edge of the network, and consortium owners of home appliances’ DT located on fog to its
blockchain is employed to secure model updates both in owner, and apply blockchain and clouds to facilitate human-
global and local. Moreover, an iterative double auction is centric services and applications. In [108], blockchain is
developed to motivate APs to train local models and verify applied in DTs’ reshape and transformation process, aiming
updates. at achieving secure manufacturing with traceability guar-
TL: TL is a promising ML approach in which an agent antees, authenticity, compliance, quality, and safety. It is
solves a problem with the help of prior knowledge gained difficult to sustain a conventional blockchain in MEC since
• Edge Association [60], [94], [120], which includes the unified time for cooperative FL and local model update
association between end devices/DTs and edge servers. verification.
• Task Offloading [60], [94], [120], which aims to decide In [119], the authors focus on DT construction and
whether to offload a task and the proportion, thereby DT-assisted resource allocation. To balance the delay and
improving the task processing efficiency. accuracy performance, the iteration latency and DT’s loss
• Resource Allocation [94], [119], [120], which includes function are jointly optimized. In addition, abnormal model
the allocation of resources in terms of communication, recognition (AMR) is leveraged at the servers to protect the
computation, caching, and so on. edge aggregation from malicious devices, thereby improving
• Security Mechanism [32], [60], [119], [121], [122], the security of DT. A two-stage algorithm is proposed based
which aims to guarantee the security while satisfying on DQN, which learns the optimal computational resource
the performance requirements. allocation, device access management, and power control
scheme, by interacting with the environment constantly.
Recently, some existing works are focusing on designing Furthermore, DT can improve the learning performance by
and optimizing the network schemes. In [120], the authors predicting some key state information for intelligent DQN-
apply DITEN to study the computing tasks in the indus- based resource scheduling, such as the available resource of
trial automation scenario. By jointly optimizing the task devices and edge servers, and communication status.
offloading and resource allocation, the end-to-end latency is In [60], DT is applied to assist the mobile users in edge
minimized. In [121], the authors aim to promote data security server selection and task offloading. An edge cooperative
in industrial applications by utilizing DT and the correspond- node selection scheme is proposed to guarantee data secu-
ing trusted architecture. In [122], the security system and rity and provide high-quality communication links so that
mechanism are designed based on DT to guarantee the profit to settle the security problem of cooperative edge servers
of the edging computing, such as low latency, flexibility, and selection in DITEN. The security of the edge servers is
self-organization. verified using the blockchained data stored in DTs. The
In [32], the authors exploit blockchain to develop a reliable edge cooperative nodes can be the ones that passed
new DITEN framework to enable flexible and secure DTs data consistency authentication, or the ones with superior
establishment. First, to construct the DTs of the resource- communication link quality, which can be measured by the
constrained devices at the network edges, a cooperative real-time communication environment data in DT. Moreover,
FL method via AP is developed. Then, a model update DT can obtain the real-time status of the network, so that
chain is proposed by applying a directed acyclic graph the mobile users can offload the task to the selected edge
(DAG) blockchain to ensure the security of local/global server with low power expenditure and latency. In addition,
model updates. In addition, a joint cooperative FL and the decision tree algorithm (DTA) and DDQN are applied
local model update verification scheme is proposed based to solve the formulated mathematical optimization model to
on the iterative double auction, aiming at motivating optimize the energy consumption and network delay.
APs to contribute their resource to local model training In [94], the authors propose a DL framework to mini-
and updating verification for resource-constrained devices. mize the energy consumption on per bit data transmission
Meanwhile, social welfare is maximized by optimizing the of URLLC and delay tolerant services in a MEC system,
IoT devices and applications. In [118], the concept of edge real-time traffic data in IoV applications, aiming at optimiz-
computing based smart manufacturing with distributed con- ing network resource allocation and alleviating the potential
trol structure is demonstrated. The physical entities act as traffic congestion during peak periods. Applying DT to the
edge devices, the concepts of holons and digital agents are task offloading problem in IoV is also studied in [78], and
combined with local DTs to achieve local control, decision the optimal solutions are acquired by applying DRL. DT
making, and optimization. The global digital agent connected can be considered as a software agent located in the cloud,
to a global DT globally controls the network of manu- with which the global network information can be obtained
facturing nodes, which can be used for the optimization through the information exchange between DTs, and the
of the production order and logistics, local digital agents, historical states of a vehicle can be obtained through the
and DTs. communications within the twin. In [78], the system states
are captured and analyzed by employing DT and DRL. The
cost of renting cloud servers and bandwidth, time-varying
C. VEHICULAR NETWORK communication conditions, and the available computation
DITEN is a promising technology to achieve autonomous resources of MEC servers are jointly considered. A task
vehicles, which has attracted much attention from academia prediction module is designed to predict the task arriving
and industry. For task offloading, authors in [65] employ process, so that to reserve computation resources for the
DT technology and AI to design an vehicular MEC system. upcoming tasks, thereby solving the task queue overflow
Cooperative task offloading strategy for vehicles is proposed problem. The task offloading process is modeled as an MDP,
to minimize the offloading costs. An edge management where the state is obtained through the DT, and then as the
framework is developed to improve the learning efficiency of input of DRL. The subjective is to optimize the system utility
multi-agents with DT while enhancing the synchronization in terms of latency, energy consumption, and rent cost.
between DT and the physical system. Moreover, the potential Besides, in [124], DT is applied to obtain the optimal
cooperation among vehicles can be revealed by leveraging caching strategy in a VEN. By leveraging DT technology,
DT, and multi-agents learning groups can be formed adap- the edge caching system is mapped into virtual space, which
tively, thereby improving resource utilization and reducing facilitates the construction of social relation model to cater
learning complexity. In addition, a distributed strategy based to the complex and dynamic social characteristics of vehi-
on multi-agents learning is proposed to minimize the task cles. Based on the social relation model, a vehicular cache
offloading costs of vehicles under strict delay constraint cloud concept is proposed to incorporate the content cache
and adjusts the mapping mode of the DT network’s state dependencies among different vehicles in various traffic envi-
dynamically. ronments. Then, an optimal social-aware caching strategy is
In [27], the authors first introduce the framework of the proposed, which dynamically coordinates the caching capa-
VEC network and the key issues such as task offloading, bilities of RSUs and vehicles based on the similarity of
communication, and caching in the VEC network. Then, user preferences and service availability, and jointly consid-
an adaptive DT-based VEC network consisting of two AI- ers social model establishment, cache cloud formation, and
empowered closed loops is proposed for DT construction cache resource management.
and VEC network management. In addition, a DRL-based In [125], a DT framework is proposed for connected vehi-
intelligent method is designed to obtain the optimal VEC cles with vehicle-to-cloud (V2C) communication, to enable
offloading decisions to minimize total task execution time. the driver to control the vehicle more smartly. In [126], a sen-
In [79], the authors propose a DRL-based service offloading sor fusion method is proposed to prevent potential dangers,
method in a multiuser offloading system to minimize services which draws and matches the bounding box of the target
response time. The authors first analyze the response time vehicle by combing the camera images and DT knowledge.
in a multiuser offloading system, and then model the edge In [66], DT is employed in MEC framework designed to
devices as the agent. Finally, the optimal services offloading achieve safety and intelligent connections among vehicles,
strategy is obtained by applying a DQN to minimize the and the lane-changing of automated vehicles (CAV). The
response time. In [80], the latency minimization in a DT- DT of a MEC network enables the network information to
IoV framework is studied. The edge servers are modeled as be mapped to a coupled road traffic and wireless network
M/M/1/N queues, and the expression of the response time simulator. To this end, the CAVs can learn the optimal solu-
of offloading tasks is formulated mathematically. Then, the tions to lane-changing through a visionary smart method,
optimization model is constructed to minimize the response where self-interest and traffic flow efficiency improvement
time, and DDQN is employed to train the edge server to get are jointly taken into consideration. The established DT
the optimal solutions to the task offloading action. can be used to evaluate and verify the obtained strategy
The above works provide a variety of useful and promis- and then apply the strategy in the physical system for
ing task offloading solutions in the IoV era. However, CAVs to make decisions on lane-changing. In addition, the
some of the existing solutions consider a static environment authors present a case study, in which the DT is composed
and do not consider the task arrival in the coming time. of a cellular automata-based road traffic simulator and an
In [62], the authors apply DT technology to predict the LTE-V MEC network simulator. The lane-changing strategy
is trained with DRL based on the aggregated lane state for resource allocation, in which the leader is the DT of vehi-
information. cles or roadside units, and the followers are the RSUs, and
the objective is to jointly optimize the vehicles’ satisfaction
D. SAGIN
and roadside units’ overall energy efficiency. By establish-
In [81], the authors apply DT to catch the network dynam- ing the dynamic DT for an aerial-assisted IoV, the dynamics
ics in air-ground networks. The drones acting as aggregators of resources in terms of requirements and provide in the
collaboratively complete the model training with the ground network can be captured. The computation task of vehi-
clients such as vehicles and smartphones in FL. In addition, cles that out coverage of ground network can be offloaded
the stackelberg game based incentive strategy is designed for to the equipment like RSUs with rich resources, with the
FL, where the drone’s DT acting as a leader sets the pref- assistance of UAV. By establishing the DTs of vehicles and
erences of the client based on their reputation values, and RSUs at UAV, and keeping updating when the vehicles and
the clients acting as followers decide the training rounds RSUs are out of UAV’s coverage, the unified and efficient
for the global model in the game after trading off prof- resource management can be achieved in an aerial-assisted
its and costs. In addition, another incentive mechanism is IoV network.
proposed to adjust the optimal client selection and its par- In [127], the authors focus on the task scheduling strategy
ticipation degree in each global update, thereby adapting to in a UAV-assisted MEC system. The system dynamics and
the varies of air-ground networks. There are some advan- time-varying task arrivals due to the mobility of UAVs and
tages to the drone acting as the leader. First, since DTs hold mobile users (MUs) are jointly considered. The interactions
the clients’ state information such as available resources so among MUs are modeled as a stochastic game, and a proac-
that clients with high performance can be chosen to join tive DRL scheme is derived to obtain a nash equilibrium
the FL. Second, the direct communications between the (NE), which only uses the local information of each MU
clients and the drone and the corresponding communica- for local and remote computation scheduling. The homoge-
tion costs can be reduced by selecting the drone’s DT as the neous behaviors of MU enable to train the proposed scheme
leader of the Stackelberg game. Third, the state information offline using DT. In [128], the military large-scale UAVs
of each client is not required during the curator making are presented including their characteristics and advantages,
decisions, by deploying the client’s DT on the resource- and the basic problems currently encountered. Then, based
rich ground clients. Finally, the leader’s DT captures the on its design, manufacturing, and application, the urgent
real-time status and the training rounds of the participating to construct a cloud computing based DT framework for
clients, which can make sure the clients finish the training military large-scale UAVs is analyzed, which is further dis-
rounds. cussed from test cost, integrated sensing, centralized control,
In many existing works, it is assumed that the device business prediction, and mission planning.
mobility and service requests are predictable. As such,
In [28], DT is utilized in an aerial-assisted IoV network, E. HEALTHCARE
to catch the dynamics of the resource requirements. A DT is an important technology in the health domain. The
Stackelberg game based incentive mechanism is developed application of IoT makes it possible to monitor a patient’s
health status comprehensively by deploying massive intel- is integrated into a 6G wireless system, and a blockchain-
ligent human body monitoring equipment and environment enabled FL framework is proposed to relieve the burden of
sensors. A patient twin can be established to gather the edge servers on real-time data processing and privacy risk.
time-varying information of the patient, including the phys- In [29], a DT model for a 6G network is designed, where the
iological status and lifestyle, medication information, and DT is employed to ease the unreliable long-distance com-
emotion, to enable the doctors to provide comprehensive munication between the end devices and edge servers. The
medical care for patients and to predict the disease condition authors formulate an adaptive DT deployment problem to
changes to prevent disease worse in advance. For example, associate DTs with edge servers, the objective is to reduce the
by constructing a DT for a patient, a personalized recovery average latency and improve the user utility in DT-enabled
plan can be tailored based on the patient’s real-time physical edge networks. Then, a DRL-based algorithm is proposed
signs, which can improve the patient’s physique and faster to obtain the optimal solutions to the formulated problem,
the recovery time. where the DT placement scheme and the system delay are
Apart from detecting patient signs continuously, DT has jointly considered. Furthermore, a TL based DT migration
some potential for remote surgery. Experts can operate on method is proposed to adapt to the user mobility.
DTs of patients and control the surgery based on real- DITENs can be also applied to support interoperability
time body information. Meanwhile, based on the real-time in the network era, and reduce heterogeneity by designing
information, emergencies that may arise during operation an application drive layer on the top of physical equip-
can be predicted, and the corresponding optimal solutions ment. In [59], the Application-driven digital twin networking
can be obtained in advance. In this case, ultra-fast and ultra- (ADTN) middleware is designed to support the interac-
reliable communications are required to ensure information tions among the simplified, distributed, and heterogeneous
exchange. Furthermore, DT can be applied to develop twin industrial equipment, and to manage the network resource
organs with high precision and sensitivity. dynamically in a distributed industrial environment from
In [30], a DT framework is proposed for an intelligent an application point of view. In particular, the interactions
context-aware healthcare system, to improve the healthcare among various equipment are simplified by enabling DTs
process of patients and healthcare operations. The proposed to use IP protocols, and the network resource is man-
DT framework constructs a patient twin with IoT devices, aged dynamically by applying software defined network to
data analysis, and AI, and can collaborate healthcare profes- develop communication mechanisms that suit application
sionals effectively. Accordingly, an electrocardiogram (ECG) needs [132]. To this end, the management of the indus-
heart rhythms classifier model is proposed applying ML to trial network can be improved greatly, and then configure
process heart disease diagnosis and heart problems detection the topology structure faster and safer, so that the same
with high accuracy. In [129], a Cardio Twin architecture production site can be exploited for different industrial
runs on the Edge is designed to detect ischemic heart applications.
disease. In [130], the congestion control strategy is proposed for
DTENs applying Lyapunov optimization, which does not
require the prior information of the system, and converts
F. WIRELESS SYSTEMS the long-term congestion control problem to multiple online
DT technology has been applied to wireless systems to edge association problems in each time slot. Then, a long-
improve the network performance [22], [131]. In [113], term incentive mechanism is proposed based on contract
key requirements for implementing DT to design 6G are theory, which jointly considers the service delay, individual
presented firstly. Then, the authors introduce the architecture rationality (IR), and incentive compatibility (IC) of physi-
components and trends for different types of twins, such as cal entities. The optimal contracts are derived to maximize
edge-based twins, cloud-based-twins, etc. In addition, various the profit of the service provider. In [22], DT is applied
types of twins are compared, and providing some potential to estimate the edge server status and to provide training
directions and the corresponding guidelines. In [58], DT data for DRL agent, during the task offloading of mobile
users in DITEN. In addition, the impact of estimation devi- V. CHALLENGES AND OPEN ISSUES
ations of DTs from their true value on task offloading is In the following, the challenges and open issues are
explored. Then, the optimal solutions to the task offloading presented, including high-precision modeling, physical-
are obtained by applying Lyapunov optimization and DRL, virtual synchronization, DT migration for mobility, and
to minimize the offloading latency with the constraints on security and privacy.
the total migration cost.
A. HIGH-PRECISION MODELING
G. OTHERS APPLICATIONS In DITEN, the precision of the DT modeling directly decides
In [31], the authors apply the DT technology to a bat- the services provided by the DITEN, such as task offloading,
tery management system (BMS). First, a cloud collaborative resource allocation, network management, and so on. It is
architecture is proposed to break through the constraints challenging to model the physical objects in high precision
on computation capability and storage space in the conven- due to the communication and computation constraints. To
tional BMS, by exploring the massive computing and storage overcome this issue, a large scale of real-time information
capacity of cloud-based servers. Then, the DTs of the batter- on the objects should be provided and further processed,
ies are constructed in the cloud based on the real-time data and it is also required to design some efficient modeling
of the batteries, and the two-way dynamic mapping between methods, which poses some challenges to communications
the batteries and their DTs can be achieved. The refinement and computation. On one hand, it has strict requirements
of safety management of the battery life cycle can be real- for wireless communication systems in terms of ultra-high
ized, by online learning and model updating to overcome capacity and reliability, to support the large-scale data trans-
the shortage of using fixed model parameters in traditional mission in P2T communications. To do so, some advanced
BMS. In addition, based on the accumulated data of batter- technologies, such as Terahertz communication, communi-
ies and their DTs, the optimal system performance upgrade cation with an IRS, and AI, can be integrated into the design
route is constructed based on the intelligent on-the-air remote of the wireless communication system. On the other hand,
program upgrade technology. the computation capability is constrained by the available
In [133], an intelligent edge-based DT model is proposed resources. Thus, it is urgent to design some lightweight and
for Robotics, where robots offload computation and anal- tiny compute methods to process the computation task.
ysis models to the edge, and even towards the cloud. Recently, distributed learning such as FL-based DT
The proposed model requires the support of 5G connec- modeling has been widely investigated, in which the end
tivity and facilitates the enhanced automation and control devices train the model locally, and then send the local model
by a set of intelligent functions, such as task learn- parameters to the server for aggregation to train the global
ing, prediction, and optimization. In [134], a concept of model, thereby decreasing the scale of transmitted data. In
edge-based DT is presented to assess the ecological sus- this case, how to incentive the physical objects and servers
tainability of a cross-company production network. The to contribute their resource to DT modeling is a challenge.
sustainability indicators are computed locally, which can Another challenge is to balance the modeling precision and
reduce the data communications. To this end, the sustain- cost in terms of latency. Since the end devices have differ-
ability of a manufactured product can be traced and does ent communication and computation time, it will cost a long
not require suppliers to publish sensitive data or domain time on waiting for local model parameters of all physical
knowledge. Besides, in [135], DT is applied to proposed objects for global aggregation. A promising method is to
a cloud-edge collaborative architecture for FDM additive select a part of physical objects for model training. To this
manufacturing. The system development and architecture end, how to select the participating physical objects [104],
components of the system are elaborated, thus providing thereby balancing the modeling precision and waiting time
a guideline for other manufacturing resources in cloud is a challenge, which requires a lot of careful follow-ups
manufacturing. research work.
[53] A. A. Al-Habob, O. A. Dobre, A. G. Armada, and S. Muhaidat, [74] B. Sudharsan and P. Patel, “Machine learning meets Internet of
“Task scheduling for mobile edge computing using genetic algo- Things: From theory to practice,” in Proc. Eur. Conf. Mach. Learn.
rithm and conflict graphs,” IEEE Trans. Veh. Technol., vol. 69, no. 8, Principles Practice Knowl. Disc. Databases, 2021, pp. 1–9.
pp. 8805–8819, Aug. 2020. [75] M. S. Murshed, C. Murphy, D. Hou, N. Khan, G. Ananthanarayanan,
[54] M. Zeng, N.-P. Nguyen, O. A. Dobre, and H. V. Poor, “Delay and F. Hussain, “Machine learning at the network edge: A survey,”
minimization for NOMA-assisted MEC under power and energy con- ACM Comput. Surveys, vol. 54, no. 8, pp. 1–37, 2021.
straints,” IEEE Wireless Commun. Lett., vol. 8, no. 6, pp. 1657–1661, [76] Q. Min, Y. Lu, Z. Liu, C. Su, and B. Wang, “Machine learning based
Dec. 2019. digital twin framework for production optimization in petrochemical
[55] Y. C. Hu, M. Patel, D. Sabella, N. Sprecher, and V. Young, “Mobile industry,” Int. J. Inf. Manag., vol. 49, pp. 502–519, Dec. 2019.
edge computing—A key technology towards 5G,” White Paper, ETSI, [77] C. Zhang, G. Zhou, H. Li, and Y. Cao, “Manufacturing blockchain of
Sophia Antipolis, France, 2015. things for the configuration of a data-and knowledge-driven digital
[56] J. Moura and D. Hutchison, “Game theory for multi-access edge twin manufacturing cell,” IEEE Internet Things J., vol. 7, no. 12,
computing: Survey, use cases, and future trends,” IEEE Commun. pp. 11884–11894, Dec. 2020.
Surveys Tuts., vol. 21, no. 1, pp. 260–288, 1st Quart., 2018. [78] J. Zheng, T. H. Luan, L. Gao, Y. Zhang, and Y. Wu, “Learning based
[57] Y. Lu, X. Huang, K. Zhang, S. Maharjan, and Y. Zhang, task offloading in digital twin empowered Internet of Vehicles,” 2021,
“Communication-efficient federated learning and permissioned arXiv:2201.09076.
blockchain for digital twin edge networks,” IEEE Internet Things [79] X. Xu et al., “Service offloading with deep Q-network for digital
J., vol. 8, no. 4, pp. 2276–2288, Jan. 2020. twinning-empowered Internet of Vehicles in edge computing,” IEEE
Trans. Ind. Informat., vol. 18, no. 2, pp. 1414–1423, Feb. 2022.
[58] Y. Lu, X. Huang, K. Zhang, S. Maharjan, and Y. Zhang, “Low-
[80] T. Liu, L. Tang, W. Wang, X. He, and Q. Chen, “Resource allocation
latency federated learning and blockchain for edge association in
via edge cooperation in digital twin assisted Internet of Vehicle,” in
digital twin empowered 6G networks,” IEEE Trans. Ind. Informat.,
Proc. IEEE Global Commun. Conf. (GLOBECOM), 2021, pp. 1–6.
vol. 17, no. 7, pp. 5098–5107, Jul. 2021.
[81] W. Sun, N. Xu, L. Wang, H. Zhang, and Y. Zhang, “Dynamic
[59] P. Bellavista, C. Giannelli, M. Mamei, M. Mendula, and M. Picone, digital twin and federated learning with incentives for air-ground
“Application-driven network-aware digital twin management in networks,” IEEE Trans. Netw. Sci. Eng., vol. 9, no. 1, pp. 321–333,
industrial edge environments,” IEEE Trans. Ind. Informat., vol. 17, Jan./Feb. 2022.
no. 11, pp. 7791–7801, Nov. 2021. [82] M. Masdari, S. S. Nabavi, and V. Ahmadi, “An overview of virtual
[60] T. Liu, L. Tang, W. Wang, Q. Chen, and X. Zeng, “Digital- machine placement schemes in cloud computing,” J. Netw. Comput.
twin-assisted task offloading based on edge collaboration in the Appl., vol. 66, pp. 106–127, May 2016.
digital twin edge network,” IEEE Internet Things J., vol. 9, no. 2, [83] P. Thakur and D. K. Shrivastava, “Interoperability issues and standard
pp. 1427–1444, Jan. 2022. architecture for service delivery in federated cloud: A review,” in
[61] T. H. Luan, R. Liu, L. Gao, R. Li, and H. Zhou, “The paradigm of Proc. IEEE Int. Conf. Comput. Intell. Commun. Netw. (CICN), 2015,
digital twin communications,” 2021, arXiv:2105.07182. pp. 908–912.
[62] C. Hu et al., “Digital twin-assisted real-time traffic data prediction [84] W. Sun, S. Lei, L. Wang, Z. Liu, and Y. Zhang, “Adaptive federated
method for 5G-enabled Internet of Vehicles,” IEEE Trans. Ind. learning and digital twin for Industrial Internet of Things,” IEEE
Informat., vol. 18, no. 4, pp. 2811–2819, Apr. 2022. Trans. Ind. Informat., vol. 17, no. 8, pp. 5605–5614, Aug. 2021.
[63] D. Wang et al., “The role of digital twin in optical communica- [85] L. U. Khan, W. Saad, Z. Han, E. Hossain, and C. S. Hong, “Federated
tion: Fault management, hardware configuration, and transmission learning for Internet of Things: Recent advances, taxonomy, and
simulation,” IEEE Commun. Mag., vol. 59, no. 1, pp. 133–139, open challenges,” IEEE Commun. Surveys Tuts., vol. 23, no. 3,
Jan. 2021. pp. 1759–1799, 3rd Quart., 2021.
[64] P. Jia, X. Wang, and X. Shen, “Digital-twin-enabled intelligent [86] L. U. Khan, Y. K. Tun, M. Alsenwi, M. Imran, Z. Han, and
distributed clock synchronization in Industrial IoT systems,” IEEE C. S. Hong, “A dispersed federated learning framework for 6G-
Internet Things J., vol. 8, no. 6, pp. 4548–4559, Mar. 2021. enabled autonomous driving cars,” 2021, arXiv:2105.09641.
[65] K. Zhang, J. Cao, and Y. Zhang, “Adaptive digital twin and [87] L. U. Khan, Z. Han, D. Niyato, and C. S. Hong, “Socially-
multiagent deep reinforcement learning for vehicular edge com- aware-clustering-enabled federated learning for edge networks,”
puting and networks,” IEEE Trans. Ind. Informat., vol. 18, no. 2, IEEE Trans. Netw. Service Manag., vol. 18, no. 3, pp. 2641–2658,
pp. 1405–1413, Feb. 2022. Sep. 2021.
[66] B. Fan, Y. Wu, Z. He, Y. Chen, T. Q. Quek, and C.-Z. Xu, [88] F. Tang, B. Mao, N. Kato, and G. Gui, “Comprehensive survey
“Digital twin empowered mobile edge computing for intelligent on machine learning in vehicular network: Technology, applica-
vehicular lane-changing,” IEEE Netw., vol. 35, no. 6, pp. 194–201, tions and challenges,” IEEE Commun. Surveys Tuts., vol. 23, no. 3,
Nov./Dec. 2021. pp. 2027–2057, 3rd Quart., 2021.
[67] W. Danilczyk, Y. Sun, and H. He, “ANGEL: An intelligent digital [89] N. Kato et al., “Optimizing space-air-ground integrated networks
twin framework for microgrid security,” in Proc. IEEE North Amer. by artificial intelligence,” IEEE Wireless Commun., vol. 26, no. 4,
Power Symp. (NAPS), 2019, pp. 1–6. pp. 140–147, Aug. 2019.
[90] F. Tang, H. Hofner, N. Kato, K. Kaneko, Y. Yamashita, and
[68] Y. Xiaohu, C.-X. Wang, J. Huang, and X. Gao, “Towards 6G wireless
M. Hangai, “A deep reinforcement learning-based dynamic traf-
communication networks: Vision, enabling technologies, and new
fic offloading in space-air-ground integrated networks (SAGIN),”
paradigm shifts,” Sci. China Inf. Sci., vol. 64, no. 1, pp. 1–74, 2021.
IEEE J. Sel. Areas Commun., vol. 40, no. 1, pp. 276–289,
[69] T. Lechler et al., “Introduction of a comprehensive structure Jan. 2022.
model for the digital twin in manufacturing,” in Proc. 25th IEEE [91] B. Mao, F. Tang, Y. Kawamoto, and N. Kato, “Optimizing compu-
Int. Conf. Emerg. Technol. Factory Autom. (ETFA), vol. 1, 2020, tation offloading in satellite-UAV-served 6G IoT: A deep learning
pp. 1773–1780. approach,” IEEE Netw., vol. 35, no. 4, pp. 102–108, Jul./Aug. 2021.
[70] S. Zhang, C. Kang, Z. Liu, J. Wu, and C. Ma, “A product quality [92] F. Tang, Y. Zhou, and N. Kato, “Deep reinforcement learning
monitor model with the digital twin model and the stacked auto for dynamic uplink/downlink resource allocation in high mobil-
encoder,” IEEE Access, vol. 8, pp. 113826–113836, 2020. ity 5G HetNet,” IEEE J. Sel. Areas Commun., vol. 38, no. 12,
[71] J. Conde, A. Munoz-Arcentales, A. Alonso, S. Lopez-Pernas, and pp. 2773–2782, Dec. 2020.
J. Salvachua, “Modeling digital twin data and architecture: A building [93] Y. Dai, K. Zhang, S. Maharjan, and Y. Zhang, “Deep reinforce-
guide with FIWARE as enabling technology,” IEEE Internet Comput., ment learning for stochastic computation offloading in digital twin
vol. 26, no. 3, pp. 7–14, May/Jun. 2022. networks,” IEEE Trans. Ind. Informat., vol. 17, no. 7, pp. 4968–4977,
[72] S. Ali et al., “6G white paper on machine learning in wireless Jul. 2021.
communication networks,” 2020, arXiv:2004.13875. [94] R. Dong, C. She, W. Hardjawana, Y. Li, and B. Vucetic, “Deep
[73] D. P. Kumar, T. Amgoth, and C. S. R. Annavarapu, “Machine learn- learning for hybrid 5G services in mobile edge computing systems:
ing algorithms for wireless sensor networks: A survey,” Inf. Fusion, Learn from a digital twin,” IEEE Trans. Wireless Commun., vol. 18,
vol. 49, pp. 1–25, Sep. 2019. no. 10, pp. 4692–4707, Oct. 2019.