Securing industry 5.0 using 6σ CYBERNETIC framework

Research output: Contribution to journalArticlepeer-review

Abstract

The data-driven digital economy highly relies on immersive and emerging technologies, mass customisation, autonomous systems, and seamless connectivity. Enabling such an Industrial IoT/Industry 5.0 environment requires streamlined and end-to-end transparent methods for insights, visibility, and control. However, it is important to note that its success depends on data security metrics. The recent cyber-attacks in healthcare and industrial infrastructures have led service providers to high-risk scenarios. From supply chain to service delivery, remote functionality variables, enabling a fully connected factory is a major cybersecurity concern as emerging technologies employ different security requirements. To mitigate these risks, strategic, operational, technical, and cybersecurity alignment is a must, where the gaps between the production and process environments must be bridged to achieve the prime goal of a sustainable, secure, and technologically innovative factory. This research provides a systematic approach to bridging Industry 5.0’s QoS metrics and security gaps by implementing a Six Sigma (6σ) approach in a manufacturing environment. The approach further maps IT/OT, cloud, and cybersecurity standards, thereby enabling insights, visibility, and control. A healthcare 5.0 use-case is demonstrated to show how a 6σ implementation can improve the QoS metrics, unifying standards to achieve a secure, sustainable, resilient, and high-performance environment.
Original languageEnglish (Ireland)
JournalMehran University Research Journal of Engineering and Technology
Volume43
Issue number2
DOIs
Publication statusPublished - 2024

Keywords

  • industry 5.0
  • Precision healthcare
  • Six Sigma
  • cloud computing
  • cybersecurity
  • standards
  • Gap analysis
  • mapping
  • Lean digital transformation
  • Sustainable healthcare
  • IT
  • OT

Fingerprint

Dive into the research topics of 'Securing industry 5.0 using 6σ CYBERNETIC framework'. Together they form a unique fingerprint.

Cite this