Securing industry 5.0 using 6σ CYBERNETIC framework

Abstract

The data-driven digital economy highly relies on immersive and emerging technologies, mass customisation, autonomous systems, and seamless connectivity. Enabling such an Industrial IoT/Industry 5.0 environment requires streamlined and end-to-end transparent methods for insights, visibility, and control. However, it is important to note that its success depends on data security metrics. The recent cyber-attacks in healthcare and industrial infrastructures have led service providers to high-risk scenarios. From supply chain to service delivery, remote functionality variables, enabling a fully connected factory is a major cybersecurity concern as emerging technologies employ different security requirements. To mitigate these risks, strategic, operational, technical, and cybersecurity alignment is a must, where the gaps between the production and process environments must be bridged to achieve the prime goal of a sustainable, secure, and technologically innovative factory. This research provides a systematic approach to bridging Industry 5.0’s QoS metrics and security gaps by implementing a Six Sigma (6σ) approach in a manufacturing environment. The approach further maps IT/OT, cloud, and cybersecurity standards, thereby enabling insights, visibility, and control. A healthcare 5.0 use-case is demonstrated to show how a 6σ implementation can improve the QoS metrics, unifying standards to achieve a secure, sustainable, resilient, and high-performance environment.

Published
Apr 1, 2024
How to Cite
DHIRANI, Lubna Luxmi; NEWE, Thomas. Securing industry 5.0 using 6σ CYBERNETIC framework. Mehran University Research Journal of Engineering and Technology, [S.l.], v. 43, n. 2, p. 220-238, apr. 2024. ISSN 2413-7219. Available at: <https://publications.muet.edu.pk/index.php/muetrj/article/view/3202>. Date accessed: 24 nov. 2024. doi: http://dx.doi.org/10.22581/muet1982.3202.
Section
Articles
This is an open Access Article published by Mehran University of Engineering and Technolgy, Jamshoro under CCBY 4.0 International License