IEEE Access (Jan 2024)

Exploring the Potential Network Vulnerabilities in the Smart Manufacturing Process of Industry 5.0 via the Use of Machine Learning Methods

  • Vadym Shkarupylo,
  • Jamil Abedalrahim Jamil Alsayaydeh,
  • Mohd Faizal Bin Yusof,
  • Andrii Oliinyk,
  • Volodymyr Artemchuk,
  • Safarudin Gazali Herawan

DOI
https://doi.org/10.1109/ACCESS.2024.3474861
Journal volume & issue
Vol. 12
pp. 152262 – 152276

Abstract

Read online

The Industry 5.0 revolution has launched a new age of intelligent manufacturing equipment, which is crucial to our society and economy. Industry 5.0 aims to enhance human potential by integrating cutting-edge IT technology, Artificial Intelligence (AI), the Internet of Things (IoT), robots, and augmented reality into everyday living, especially in smart industrial settings, to maximize human potential. Smart Production Processes (SP2), accessible standards, and resource sharing on the web have increased network vulnerabilities as enterprises adopt them. These vulnerabilities primarily target industry IoT systems, threatening private data. Existing system issues include network vulnerabilities, production capability, and data management. Traditional applications struggle with industrial data’s bulk and complexity, causing data analysis, security, and privacy challenges. Modern industrial systems use AI and ML for big data analysis and data processing to overcome these issues. Optimizing human-machine synergy minimizes costs and equipment maintenance and boosts efficiency. An ML-assisted Smart Production Process (ML-SP2) and Intrusion Detection System (ML-IDS) have been proposed to assess and address Industrial 5.0 concerns. Data capture, predictive maintenance and optimization, transparent decision-making, and proactive maintenance are integrated into the manufacturing process with the ML-SP2. The ML-IDS detects network vulnerabilities using ensemble methods and manages distribution efficiently. The ML-IDS uses the variety of ML techniques such as random forest, decision tree and support vector machines that identifies the intruder with maximum prediction accuracy. In addition, the intruder activities are observed with the help of the convolution networks that improve the overall intruder activities recognition. The smart industrial production phase’s effectiveness

Keywords