Security is ranked as sixth because it is a critical component of digital transformation and protects companies from threats. In the production process, factory and middleware, are the essential components which are ranked seventh and eigth, respectively. Due to the use of virtual computers and networks increases, workflow and virtualization are ranked ninth and tenth, respectively. The eleventh, twelfth and thirteenth of automation are respectively the sensors, robots, and cyberattacks.
Decentralized, securing, and open SCADA are ranked as fourteenth, fifteenth, and sixteenth, respectively, highlighting their importance to digital network security. The importances of security, manufacturing, and FinTech as integral components of digital transformation are ranked seventeenth, eighteenth, and nineteenth, respectively. It refers to the use of technology and machines to increase productivity and workforce employment in the twentieth, twenty-first, and twenty-second centuries, respectively.
The following categories occupy the 23rd, 24th, 25th, 26th, 27th, 28th, 29th, and 30th positions about countermeasures, future, prediction, forecasting, learning, networking, decryption, and classification. In this context, the keywords point to the application of technology and data to anticipate and respond to cyberattacks and other risks and develop smarter, automated operations.
This ranking of terms reflects the current trend toward digital transformation and the move toward a more automated, secure and efficient world. The Internet of Things, cyber manufacturing, industrial, and blockchain technologies are among the most important components of digital transformation. To increase productivity and efficiency in the production process, automation, cybersecurity, and the factory are essential. In addition, robotics, sensors, and cyberattacks are essential elements of automation, while decentralized, secure, and open SCADA are essential to securing digital networks. In addition, technologies, machines, and manpower are essential for maximizing the efficiency of technologies and machines, while countermeasures, futures, predictions, forecasting, learning, networking, decryption, and categorization are critical for predicting and responding to threats. These keywords are organized according to the current trend of digital transformation and the shift to a smarter and more automated world.
2.1 Industrial Automation
Industrial automation involves the use of computers, robots, and other automated technologies to reduce the need for human labour in the manufacturing process [
92]. This technology can be used in a wide range of applications, from simple programmable logic controllers (PLCs) to sophisticated systems such as IIoT and Artificial Intelligence (AI) [
100]. Industrial automation is used to reduce costs, improve efficiency, and increase product quality. In the manufacturing process, machines, robots, and other automated technologies are used to do the necessary tasks in a factory.
Various products can be manufactured using with CMS, ranging from consumer items to complex industrial components. Robots/automated guided vehicles (AGVs) can move materials from one location to another by following predefined paths that can be programmed [
103]. These robots can autonomously navigate obstacles and can be used for various tasks, such as loading and unloading materials in a factory setting. Due to their cost effectiveness, reliability, and safety, AGVs are becoming increasingly popular in manufacturing. Articulated robots utilize a combination of joints, motors, and other components to move with a more excellent range of motion than standard robots [
173]. Articulated robots are commonly used in the automotive industry to do complex tasks. They are often used for welding, spot welding, and painting tasks. Robots with cylindrical joints can do various tasks in a limited area using cylindrical joints to move in a circular motion. Since cylindrical robots can do precise and complex tasks within a limited space, they are used in many industries, from automotive to electronics [
23]. SCARA robot uses a combination of four rotary joints to move in various directions. The SCARA robot is commonly used for high-speed assembly processes such as pick-and-place [
90]. SCARA robot is also used for precise assembly processes. Delta robot uses three linear actuators to move, enabling them to move quickly and accurately in a small space, pick-and-place operations, painting, and welding. For the pneumatic robot, air pressure is used to move the robots, allowing them robots to move rapidly and accurately within a small area. They are frequently used for packaging, sorting, and assembly tasks [
147]. The collaborative robot, or cobot, works with humans to accomplish tasks more efficiently and quickly. These robots are commonly used in the manufacturing industry such as assembly, welding, and painting. By reducing costs, improving safety, and increasing productivity, collaborative robots can help to reduce costs.
In a manufacturing environment, CMS are used to manage the production process, whereas CPS is used to monitor and control physical processes. Manufacturing items using CMS often requires the integration of a variety of technologies, including robotics, artificial intelligence, computer vision, and automation. The real-time monitoring and modification of production processes is part of this process. In contrast, CPS is about monitoring and controlling physical processes by integrating sensors and actuators with computer equipments. In an industrial setting, this can include monitoring temperature, humidity, other environmental characteristics, and controlling robots in an automated production line. CPS are also capable of interacting with their environment, such as opening and closing valves or turning lights on and off. Therefore, the main difference between CMS and CPS is that CMS manage production processes, whereas CPS monitor and control physical processes.
CPS and the Internet of Things (IoT) differ primarily in their complexity and level of interaction with the physical world. CPS is a sophisticated system consisting of physical components and software components capable of monitoring, controlling, and interacting with their environment. The IoT, on the other hand, is a network of connected devices that interact with each other over the Internet. While IoT devices can interact with their environment, they are generally not as complex as the systems found at CPS. In addition, a CPS system is generally isolated from the Internet and connected to a local network, while an IoT device is generally connected to the Internet.
CMS use computer technology to control the entire production process [
29]. Many industries use CMS, including automotive, aerospace, and medical device manufacturing. Manufacturers can reduce costs, improve efficiency, and reduce time-to-market by automating various processes, such as material handling, assembly, and quality control [
167]. CMS are used in a variety of industries. It is a specialized computer used in industrial automation that is programmed to control machines and systems, primarily in manufacturing. Programmable logic controllers, or PLCs, are used to control the operation of machines and systems. And, monitoring and controlling a wide range of parameters, PLCs can also be utilized to integrate multiple machines and systems into an efficient production line. Manufacturing companies can benefit from CMS by reducing costs, improving quality, and increasing efficiency [
48]. Furthermore, these systems are relatively easy to implement and maintain, making them a cost-effective solution for many organizations. By utilizing CMS, manufacturers can produce higher quality products faster and with less waste [
59].
In summary, industrial automation involves replacing human labour with computers, robots, and other automated technologies. To this end, there are a variety of technologies ranging from simple PLCs to more complex systems such as AI and IIoT. In the industrial sector, automation is used to reduce costs, increase productivity, and improve product quality. Numerous tasks in manufacturing are done by machines, robots, and other automated devices. In addition to CMS, CPS are also used to manage and control production processes. Cost savings, increased productivity and improved product quality are the advantages of industrial automation. Disadvantages of this method include the need for complex systems, possibility of job loss, and the need for specialized training.
2.3 Industrial Networking
Industrial networking uses network technology to connect industrial machines and devices such as computers, robots, and other devices [
132,
149]. Industrial networks enable the sharing of data between machines and allow for the remote control of machines and processes. Industrial networking is important because it helps to improve communication between machines, reduce costs, and increase efficiency. By connecting machines, it is possible to share data, automate processes, and reduce downtime due to manual error [
6]. Additionally, industrial networking allows for remote diagnostics, which can help identify and resolve problems quickly. Industrial networking is also important because it provides a secure and reliable connection between machines, which can help protect against malicious attacks and cyber threats [
75]. It is important to ensure that industrial networks are secure, reliable, and scalable to ensure that they can support the operations of the business [
124]. By establishing and maintaining best practices, businesses can ensure that their industrial networks are up-to-date and secure from cyber threats. Additionally, businesses must ensure that their networks are interoperable and able to communicate with multiple devices from different vendors [
140]. Finally, businesses must ensure that their networks can scale to meet the demands of the environment. They inherit the following issues:
(1)
Security: Industrial networks are vulnerable to cyber-attacks, and malicious actors may be able to gain access to sensitive data or disrupt operations [
126]. Security protocols such as firewalls, antivirus, and encryption are essential for protecting industrial networks from these threats.
(2)
Interoperability: Industrial networks require the ability to communicate with multiple devices from different vendors [
125]. This requires compatible protocols and standards to ensure that data can be exchanged between systems.
(3)
Scalability: Industrial networks must be able to scale to meet the increasing demands of the environment [
9,
155]. This requires the ability to add additional devices, expand existing connections, and upgrade existing systems.
(4)
Reliability: Industrial networks must be able to operate in harsh environments and provide reliable connections [
100]. This requires robust hardware, reliable communications protocols, and redundant power sources.
2.3.1 Cyber Security.
It is the objective of cyber security to protect networks, systems, and programs from digital attacks. A cyber attack is usually intended to access, alter, or destroy sensitive data, extort money from users, or interrupt normal business operations [
19,
161,
163,
169]. Because of cyber security, businesses, organizations, and individuals are protected from cyber attacks that could result in significant harm, financial loss, or damage to their reputations. For cyber security to remain effective, it must be continuously implemented and monitored [
12,
19,
35,
89,
134]. Cyber security is an important aspect of any organization or individual using computers and the internet because cyber attacks can occur anywhere. Cyber security can be achieved with tools and processes such as firewalls, antivirus software, encryption, and user authentication. Because of cyber security, individuals, organizations, and businesses are protected from cyber attacks that could cause serious harm to their reputation, financial loss, and even other serious harm to their finances [
134].
A firewall is a network security system that monitors and controls network traffic based on predefined security rules. An effective firewall protects networks from malicious attacks such as malware, ransomware, and Distributed Denial of Service (DDoS) attacks [
35,
134]. Firewalls can be deployed either on-premises or in the cloud.
Intrusion Prevention Systems (IPS): An intrusion prevention system monitors network traffic and blocks malicious traffic following predetermined security policies. Additionally, it detects suspicious traffic and alerts administrators so they can take action. It can detect and block malicious traffic before it reaches the network, detect suspicious traffic, and alert administrators [
134]. Data is scrambled during encryption so only the intended recipient can access it. It can be used in hardware and software to protect sensitive data from unauthorized access. A network’s access control system is a process for restricting access to specific resources or areas of a network. It can control user access to data, applications, and networks and is often implemented using authentication mechanisms such as passwords or biometrics. Identifying, classifying, remediating, and mitigating vulnerabilities within a system is the goal of vulnerability management [
19,
34]. Using it, organizations can identify and address security risks before they become an issue.
Access Management: Access management refers to controlling how users access resources and applications. It ensures that only authorized users can access sensitive data and applications.
Data Loss Prevention (DLP): The purpose of DLP is to prevent unauthorized access to sensitive data, and its leakage [
12,
19,
89]. This technology can be applied to transit, rest, and operation data. This type of firewall controls and monitors application-level traffic and is known as an application firewall. Typically, it is used with a network firewall to protect applications from malicious attacks, such as malware and DDoS attacks. Antivirus software detects, prevents, and removes malicious software, including viruses, malware, and spyware [
12,
19,
34,
89]. It is used to protect computers and networks from malicious attacks.
As technology and the internet have become more prevalent in all aspects of our lives, industrial networking and cyber security have become increasingly important. Security and reliability of networks are particularly essential in industrial environments, where equipment and systems must function efficiently and safely. With the continued expansion and evolution of the industrial sector, it has become increasingly important to implement safe networks and cyber security measures. Industrial cyber security can be achieved by utilizing blockchain-based models.
2.3.2 Blockchain and Federated Learning.
Blockchain technology provides an immutable, distributed ledger that can be used to protect various types of data, including data related to industrial networks [
74]. Blockchain-based solutions can be used by companies to ensure that their data is protected from unauthorized access and manipulation and that all recorded data is accurate and up-to-date. In addition, it is possible to improve cybersecurity by combining blockchain technology with other technologies [
84,
137].
Federated learning is a form of machine learning capable of detecting and preventing cyberattacks. Due to the distributed nature of blockchain networks, federated learning can detect malicious behaviour and alert appropriate personnel [
57]. When blockchain and federated learning are used in the cyber manufacturing system, the potential exists for data leaks [
150]. Whenever data is stored or shared over remote networks, individuals or organizations can gain access to the information without authorization. There are numerous opportunities for misuse of data by bad actors [
110].
In addition, using blockchain and federated learning can be complex and require significant computing capacity, which can be difficult for smaller companies to acquire. As a result, it can be challenging for these firms to take advantage of the potential benefits of these technologies. Finally, blockchain and federated learning are still in their early stages. As a result, there is a lack of understanding and awareness of their potential benefits and threats.
For industrial networks to be secured, organizations must be adequately trained and educated in the use of these technologies. Industrial networks and cybersecurity are essential to the effective and secure operation of industrial facilities and systems. Enterprises can ensure the security of their data and the accuracy of all transactions by integrating blockchain models and federated learning. Enterprises must keep pace with ever-evolving cybersecurity threats to ensure their networks remain secure and their operations continue to run smoothly.
In summary, networking in the industrial sector refers to the use of network technology to connect industrial machines and devices such as computers, robots, and other equipment so that they can be controlled remotely and data can be exchanged between connected units. By improving machine-to-machine communication, reducing costs, and increasing productivity, it also provides a secure and reliable connection between machines and protects against malicious attacks. To ensure the security of data and the accuracy of all transactions, cybersecurity is necessary to protect networks, systems, and programs from digital attacks. The use of blockchain models and federated learning can enhance security, but their potential benefits and risks are not yet fully understood or appreciated. In addition, these technologies are difficult to implement and require a large amount of processing capacity that is difficult for small businesses to acquire. Companies need to ensure that their industrial networks are secure, reliable and scalable, regardless of the obstacles they face.
2.4 Potentials and Challenges of CMS
The successful transition to IIoT and CMS is likely to determine the future economic success of the entire economy [
36,
59]. Countries with a large industry sector, such as Germany, account for 30% of its Gross Domestic Product and employ 25% of its labour force [
51]. IIoT and CMS together enable the integration of physical and digital assets which can be used to optimize production processes and increase efficiency [
108]. This can lead to increased productivity, cost savings, improved quality, and increased customer satisfaction.
CMS are a type of digital manufacturing system that is designed to automate, optimize, and modernize the production process [
162]. This system combines a range of technologies such as sensors, computer vision, robotics, and the IoT [
161]. It enables manufacturers to quickly create and customize products while reducing costs and increasing efficiency. CMS can be used to improve the design, production, and delivery of products and services. It can also be used to automate and optimize processes, reducing the need for manual labour. Additionally, it can provide data-driven insights into production processes, allowing manufacturers to identify areas of improvement and increase profitability [
32]. In comparison with related studies [
27], CMS can be compared to traditional manufacturing systems, such as Computer Numerical Control (CNC) machines, which are limited in their ability to automate production processes. CMS can provide a more efficient system with greater flexibility and scalability.
CMS can be used in a variety of applications, such as 3D printing [
58], additive manufacturing [
40,
86], product customization, and quality control. It can also be used to monitor and control production processes, such as temperature and pressure, and track and log production data [
5,
52]. Regarding evaluation measures, CMS systems must be evaluated based on their ability to meet the goals of the manufacturing process and their ability to integrate with existing systems and processes [
79]. Additionally, they should be evaluated on the cost-effectiveness of their implementation, and the ease of use and scalability of the system.
The integration of IIoT and CMS can lead to new business models, such as predictive maintenance, which can improve the competitiveness of industries [
83]. However, the successful transition to IIoT and CMS is not without its challenges. Industries must invest in the necessary infrastructure and technology and train their employees on the new systems. Companies must ensure that their data is secure and that their systems are compliant with the appropriate regulations [
120]. To ensure a successful transition to IIoT and CMS, industries must collaborate to develop a comprehensive strategy. This strategy should include an assessment of the existing infrastructure and technology, a plan to invest in the necessary technology and training, and a plan to ensure data security and regulatory compliance. The strategy should include measures to ensure the effective use of the technology, such as the development of new business models [
151]. Overall, digitalization presents both opportunities and challenges for countries with large industry sectors. By investing in the necessary infrastructure and technology and developing a comprehensive strategy, industries can ensure that they are well-prepared for digital transformation and can benefit from the opportunities that it presents [
159].
The transformation to Industry 4.0 is indeed a major step forward in the way manufacturing and production. It can lead to greater resource efficiency, shorter time-to-market, higher-value products, and new services [
128]. More specifically, applications and potential benefits of Industry 4.0 include improved production processes and efficiency, better product quality, and reduced costs. By connecting machines, systems, and people, it is possible to gain real-time insights into the production process, allowing for faster and more accurate decision-making [
91,
115]. This can result in improving production planning, reducing inventory costs, and improving customer service. Industry 4.0 also offers the potential for greater customization of products and services, allowing manufacturers to better meet the needs of their customers. This can be achieved with advanced analytics, artificial intelligence, and machine learning. Additionally, it can help improve product quality and safety, reduce waste, and increase efficiency [
127]. Finally, Industry 4.0 can also help to reduce energy consumption and emissions and increase the use of renewable energy sources. This can be achieved with smart sensors and data analytics, which can monitor and adjust energy consumption in real-time [
62,
101]. This is particularly beneficial for companies looking to reduce their carbon footprint. Overall, the transformation to Industry 4.0 offers a wide range of potential benefits, from improved production processes and efficiency to better product quality, cost savings, and reduced energy consumption. By leveraging advanced technology, companies can gain a competitive edge and better meet the needs of their customers [
37,
121].
Intelligent automation is a type of automation that uses AI and machine learning to automate processes and tasks. It is becoming increasingly popular in the manufacturing industry because it can help reduce costs, increase efficiency, and improve product quality [
31,
76]. One of the key benefits of intelligent automation is that it makes small batch sizes down to batch size one feasible. This is because programming and commissioning efforts become negligible [
42]. With intelligent automation, machines can be programmed to recognize patterns and make decisions based on those patterns. CMS are quickly becoming the industry standard for a variety of manufacturing processes. One of the most promising technologies within this field is high-resolution production, which offers significant advantages for manufacturers.
High-resolution production is a form of a cyber manufacturing system that utilizes sophisticated analytics, computer-aided design, and advanced manufacturing techniques to create more precise and detailed products [
55]. This type of production can significantly improve predictability and cost transparency for manufacturers. High-resolution production allows manufacturers to accurately predict each manufacturing process’s cost and identify any potential issues before they arise. This is accomplished by utilizing sophisticated analytics that analyzes the production process and identifies potential problems before they occur. This increases the predictability of the production process and reduces the potential for surprises that could increase costs. Additionally, high-resolution production further improves cost transparency by providing detailed cost breakdowns for each manufacturing process step. This allows manufacturers to easily identify areas where they can reduce costs or increase efficiency.
In addition to improving predictability and cost transparency, high-resolution production also offers the potential to greatly increase the quality of products [
71]. By utilizing advanced manufacturing techniques, manufacturers can create products with greater detail and accuracy than ever before [
154]. This can be especially beneficial for manufacturers in the medical field, as high-resolution production can be used to create medical implants and devices with greater precision and accuracy.
High-resolution production is a revolutionary technology that offers a variety of benefits for manufacturers. By utilizing sophisticated analytics and advanced manufacturing techniques, manufacturers can create products with greater precision and accuracy. Additionally, high-resolution production can improve predictability and cost transparency, allowing manufacturers to better manage their production costs and identify potential issues before they occur [
11]. High-resolution production is quickly becoming the standard for a variety of manufacturing processes, and its potential for improving the quality of products is only beginning to be realized.
Intelligent production planning is an important part of managing a business. It helps to ensure that products are delivered on time and at a lower cost [
174]. It also helps to reduce throughput times, which is the amount of time it takes for a product to be manufactured from start to finish. Predictive maintenance and automatic fault detection are essential for ensuring high overall equipment effectiveness, which leads to fewer maintenance costs. These techniques help to identify potential problems before they occur, allowing businesses to take preventative action to avoid costly repairs. In addition, intelligent production planning can help to reduce waste and optimize production processes. By analyzing data collected during the production process, businesses can identify areas of inefficiency and make improvements to increase production efficiency.
Reconfiguration of CMS and processes help to quickly scale up or change management. This reconfigurability is enabled with sensors, software, and controllers to monitor and adjust the machines and processes to optimize the production process [
78,
97]. This enables companies to quickly scale up or change the production process to meet customer demands [
80]. Human-machine interaction is also important for CMS to improve labour productivity, and ergonomics [
7,
38,
72]. With advanced technologies such as augmented reality, natural language processing, and voice recognition, humans and machines can interact to improve the efficiency of the production process [
142]. By using these technologies, workers can interact with the machines to monitor production, adjust settings, and troubleshoot any errors. This interaction leads to improve labour productivity and ergonomics as workers can work more efficiently and comfortably.
Overall, CMS offers great flexibility and scalability, enables companies to quickly adjust to customer demands and improve production efficiency [
162]. Companies can further improve labour productivity by using advanced technologies to enable human-machine interaction, leading to improved customer satisfaction. The usage of CMS and IIoT may be beneficial in certain areas, but there are also some drawbacks to be considered. For example, these systems can be expensive to implement and maintain and may require specialized personnel to operate them. Additionally, there is a risk of security breaches, as these systems are connected to the internet and can be vulnerable to hacking. The approaches from other fields may not be directly transferable, as the specific points of CMS and IIoT may not apply to those fields. Finally, there may be privacy concerns, as these systems collect and store data about users. That includes:
(1)
Compatibility: Ensuring that the components and machines are compatible with each other and the factory’s existing systems is a major challenge [
108].
(2)
Maintenance: Once the integration is complete, the machines and components need ongoing maintenance and upkeep to ensure that they are functioning properly [
109].
(3)
Cost: Integrating machines and components into the factory’s existing systems can be costly, as new hardware and software may need to be purchased [
25].
(4)
Data Management: Managing data generated by the machines and components can be a challenge, as it must be stored, tracked, and analyzed [
47,
138,
151].
CMS and heterogeneous production infrastructure from different suppliers can be a costly and risky [
105]. Companies may be forced to invest in expensive hardware and software and hire additional personnel to manage the system [
122]. Additionally, the different suppliers may not be able to provide the same level of support and service, which could lead to compatibility issues and increased downtime. Furthermore, the complexity of the System could lead to increased security risks, as hackers may be able to exploit the vulnerabilities. Companies should carefully consider the potential benefits and drawbacks of investing in such a system.
CMS use computer-based technologies to control and manage the manufacturing process. These systems are used to automate the production process, reduce costs, and improve product quality. CMS are used in a variety of industries, including automotive, aerospace, medical, and consumer electronics. Spatio-temporal relationships are the relationships between objects in the system through both spatial and temporal characteristics [
60,
146]. In a cyber manufacturing system, these relationships can be used to optimize the production process and improve the efficiency of the system [
66]. For example, the spatial relationships between objects can be used to determine the optimal placement of components in the production line, whereas temporal relationships can be used to determine the optimal timing of production steps [
170]. The broad field of manufacturing technologies refers to the wide range of technologies used in manufacturing. These technologies include robotics, computer-aided design (CAD), computer-aided manufacturing (CAM), and additive manufacturing. Each of these technologies has its own unique set of advantages and disadvantages and can be used to optimize the production process.
Humans in versatile operating conditions refer to the use of human operators in the production process [
81]. Human operators can be used to do complex tasks that require a high degree of skill and precision [
18]. However, they can also be used to do simpler tasks that require less skill and precision. In either case, human operators must be trained to operate in a variety of conditions, including extreme temperatures, hazardous environments, and difficult working conditions [
116].
In summary, both CMS and IIoT can be considered complex systems, and therefore the development of such systems presents several challenges. The first challenge is to select the right technological basis and architecture. The second challenge is to create an extensible infrastructure or architectural pattern that can support a variety of sensors, actuators, and other hardware and software systems while still maintaining the complexity of the system manageable. This networked system can include a small sensor device and management or planning systems that provide access to enterprise information such as key performance indicators or mass information such as inventory of components, parts, and products. By implementing IIoT and CMS, the transition to Industry 4.0 can improve production processes, efficiency, product quality, cost savings, and energy consumption. By combining intelligent automation with high-resolution production, CMS offers improved predictability, cost transparency, product quality, and the ability to produce small quantities of products more efficiently. In addition, intelligent production planning and CMS and process reconfiguration help optimize production processes and improve labour productivity and ergonomics.
2.4.1 Challenges in the Cyber Manufacturing to Enable Smart Manufacturing.
The transition to CMS is important as a key step toward enabling smart manufacturing. CMS integrate physical components with digital technology to automate production processes. Several challenges must be addressed to successfully transition to CMS, as listed in Table
4. Integration of various systems and technologies is one of the major challenges. An integral part of CMS is the integration of physical components, such as machines and robots, with digital technologies, such as sensors, controllers, and software. For this integration to be reliable, secure, and efficient, it must be implemented in a secure, reliable, and efficient manner [
87,
139].
Edge computing is a paradigm that involves processing data at the edge of a network rather than at a centralized unit [
15,
93]. This can result in data degradation, as some information is lost when exchanging operational data over the edge computing paradigm. Balancing this trade-off is difficult, and most data analysis is still done in the cloud. Communication problems can arise when interconnected devices are using mutually incompatible networks. Different vendors typically provide these networks, and each system is exposed to different market needs, operational conditions, and environmental conditions [
21]. As the number of product variants increases, the accuracy of planning data decreases due to the lack of historical data. This is because when more product variants exist, there are less data available to accurately predict future demand.
The integration of diverse digital technologies and systems is a fundamental aspect of cyber manufacturing [
65,
130]. However, the integration of these systems often poses challenges due to the different communication protocols and data formats used. The resulting interoperability issues hinder the seamless integration of technologies and systems, causing significant setbacks in the production process.
Cyber manufacturing involves the collection, storage, and analysis of sensitive data, making regulatory compliance an important aspect of the process [
50]. This entails compliance with sundry regulations, such as data privacy laws and industry-specific regulations. However, abiding by such regulations is no mean feat, given the swiftly evolving nature of cyber threats. Therefore, it is imperative to engage in continuous surveillance and modifications to security measures to guarantee compliance with the regulations.
As a result, it becomes more difficult to forecast demand and plan production accordingly and accurately. This can lead to overproduction or underproduction, resulting in lost profits and wasted resources. To ensure that the proposed models are accurate and reliable, it is necessary to construct a virtual simulation that can be used to test and verify the models. This is especially difficult in decentralized systems, as the efficient and optimum use of resources is more difficult to achieve in a multi-resource and dynamic environment. Potential risks are associated with cloud solutions and the need for secure access to resources in CPPS (Cyber-Physical Production Systems).
Cloud solutions provide many standards and procedures for their business processes, but this can lead to a loss of governance over valuable data. With increased interconnectivity and resource sharing, there is a greater risk of malicious attacks and trust and credibility issues. To address these issues, peer nodes must be able to handle secure access to resources to ensure trust and consensus among stakeholders.
Additionally, integration must be performed to allow for scalability and flexibility, as production processes may need to be changed or updated over time. A significant challenge lies in developing new skills and capabilities. The operation and maintenance of CMS require new skills and capabilities, as they are more complex than traditional production systems. The ability to understand and work with the system’s various components and troubleshoot and debug any problems that may arise constitutes this ability. Also, there is the issue of cost [
22,
139]. The cost of transitioning to CMS must be weighed against the potential benefits, as CMS are more expensive than traditional production systems. Additionally, the cost of training personnel to operate and maintain CMS must also be taken into consideration. In conclusion, the transition to CMS is an important step in enabling smart manufacturing, but several challenges must be addressed to successfully transition to CMS. These challenges include the integration of different systems and technologies, the development of new skills and capabilities, and the cost of transitioning to CMS.
In summary, several obstacles must be overcome to enable a smooth transition from CMS to smart manufacturing. These obstacles entail integrating physical components with digital technology, developing new skills and competencies, and making the transition to CMS costly. As the number of product variants increases, the accuracy of planning data decreases and edge computing can degrade data, communication problems can arise when devices are networked over incompatible networks, and edge computing can degrade data. To overcome these difficulties, we need to build a virtual simulation and secure access to resources. While there are some drawbacks moving to a CMS, it can also offer numerous benefits, such as greater efficiency, flexibility, and scalability.
2.5 Security and Privacy-preserving Architectures for the Future of Cyber Manufacturing
As mentioned in Figure
4, CMS organization security is an important aspect of any organization, as it is essential to ensure the safety and security of all data and personnel [
30]. Cyber manufacturing organizations must consider a range of security measures to protect their systems and data. These include physical security, personal security, information confidentiality, availability, integrity, communication, and software security. Physical security is essential in any cyber manufacturing organization, as it is the first line of defence against any potential threat. This includes the use of locks, alarms, and CCTV to protect the premises and the personnel. It is also important to ensure that the premises are regularly monitored and maintained to ensure that any potential threats can be identified and addressed quickly. Personal security is also important in any cyber manufacturing organization. This includes the use of secure passwords, two-factor authentication, and other security measures to ensure that only authorized personnel can access the system. It is also important to ensure that personnel are trained in security protocols and practices and that they are aware of the importance of security. Information confidentiality is also important in any cyber manufacturing organization. This includes the use of encryption, access control, and other security measures to ensure that only authorized personnel can access the System. It is also important to ensure that information is stored securely and that any third-party providers are verified and trusted. Availability, integrity, and communication are also important aspects of any cyber manufacturing organization. This includes the use of secure networks, backup systems, and other measures to ensure that the system is always available and operating effectively. It is also important to ensure that all communication is secure and that any information shared is done so in a secure manner. Software security is also an important aspect of any cyber manufacturing organization. This includes the use of secure coding practices, secure software development, and other measures to ensure that the system is secure. It is also important to ensure that all software is regularly updated and that any potential security threats are addressed quickly.
The future of cyber manufacturing will depend on the development of secure and privacy-preserving architectures [
153]. To ensure the safety of data and processes associated with cyber manufacturing, it is necessary to implement security, and privacy-preserving architectures that protect data and processes from malicious attacks [
26]. These architectures should include measures such as authentication, encryption, access control, and other security and privacy-oriented technologies [
171]. Additionally, the architectures should be designed to enable the secure and private sharing of data between different entities involved in the cyber manufacturing process [
14]. The architectures should be designed to ensure the integrity of data and processes related to cyber manufacturing. This will enable cyber manufacturing to remain secure and private while allowing for the efficient and effective development of cyber manufacturing processes. One of the most promising network architectures for CMS is software-defined networking (SDN) [
94]. SDN is a network architecture that allows for centralized control of network traffic, enabling administrators to make changes to the network without having to reconfigure individual devices. This is accomplished by using a logically centralized controller that provides a unified view of the network, allowing for more efficient management and control of the network.
Another innovative network architecture for CMS is edge computing. Edge computing is a distributed computing model that moves data and computing resources from the cloud to the edge of the network [
102]. This can help reduce latency, improve scalability, and enable more efficient communication between the various components of the System. Edge computing can also help reduce the overall cost of CMS, as it eliminates the need for costly cloud computing resources. Wireless networks are becoming increasingly important in CMS [
28]. Wireless networks enable devices to communicate without the need for physical connections, allowing for more flexible and adaptive communication between components. Wireless networks can be used to help communication between robots, sensors, and other devices, enabling more efficient and accurate production processes.
One of the main challenges in developing CMS networks is the integration of different systems and processes. This requires a comprehensive understanding of the various components and their interactions, and the ability to effectively manage communication between them [
16]. In addition, integrating different technologies and systems is often a major challenge due to their different architectures, protocols, and standards. Therefore, a robust integration strategy must be developed to ensure the successful integration of different systems.
Industry 4.0 is a next-generation manufacturing model that incorporates modern information and communication technologies to improve the efficiency, productivity, and profitability of CMS [
63,
73]. Although CMS are gaining competitive advantages in the global market, cyberattacks within the manufacturing sector are becoming increasingly sophisticated and frequent, posing a significant threat to companies and organizations worldwide, making smart manufacturing security a global concern. The security of CMS networks is also a major challenge [
160]. As these systems are increasingly connected to the internet, they become more vulnerable to cyber-attacks. It is essential to ensure the security of these systems by implementing robust security measures such as encryption, authentication, and access control. Additionally, these systems must be designed with the ability to detect and respond to any potential security threats.
To develop CMS networks, new technologies and processes need to be adopted that are reliable, secure, easy to use, easy to maintain, and scalable [
2]. Furthermore, these technologies must be flexible and interoperable since these characteristics are necessary to maintain relevance and adaptability to market changes. A robust authentication protocol, authorization controls, and encryption technique should be included in the design of systems to ensure security and reliability [
133]. It is also important to implement access control measures to ensure that only authorized personnel can access the system. Moreover, the system should be designed to be scalable, flexible, and interoperable so that it can be adapted to changing market conditions in the future [
54]. In addition, the system should be designed so that it can be used, maintained, and understood easily by the users. In particular, CMS has the following challenges:
(1)
Data security is a major challenge in cyber manufacturing [
161]. As cyber manufacturing involves the use of large amounts of data, it is important to ensure that data is secure from unauthorized access and manipulation. This can be achieved by using strong encryption algorithms and secure authentication methods.
(2)
Network security is another challenge in cyber manufacturing [
8]. As cyber manufacturing involves the use of interconnected networks, it is important to ensure that the networks are secure from external threats such as malicious attacks. This can be achieved using firewalls, intrusion detection systems, and other security measures.
(3)
Privacy is a major challenge in cyber manufacturing [
107]. As cyber manufacturing involves the use of large amounts of personal data, it is important to ensure that data is not misused or shared without the user’s consent. This can be achieved by using privacy-preserving technologies such as encryption and anonymization.
(4)
Access control is another challenge in cyber manufacturing. As cyber manufacturing involves the use of interconnected networks, it is important to ensure that only authorized users have access to the networks [
111]. This can be achieved by using access control mechanisms such as authentication, authorization, and role-based access control.
(5)
System integrity is a major challenge in cyber manufacturing [
166]. As cyber manufacturing involves the use of interconnected networks, it is important to ensure that the systems are secure from malicious attacks and unauthorised modifications. This can be achieved by using secure coding practices and system integrity checks.
In summary, CMS organizations need to take a variety of security measures to protect their systems and data, including physical security, human security, confidentiality, availability, integrity, communications, and software security. Industry 4.0 is a manufacturing paradigm of the fourth industrial revolution that focuses on the use of advanced information and communication technologies to improve the effectiveness, productivity, and profitability of manufacturing processes. However, integration of diverse systems and processes, data security, network security, data privacy, access control, and system integrity remain significant barriers to CMS network development. As a result, organizations need to implement robust security measures, including encryption, authentication and access control, and develop systems that are reliable, secure, easy to use and maintain, are adaptable, interoperable, and scalable.