{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T21:54:14Z","timestamp":1773179654722,"version":"3.50.1"},"reference-count":52,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T00:00:00Z","timestamp":1721952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Comput. Sci."],"abstract":"<jats:p>Industry 5.0 promises to revolutionize the industry by focusing on human-centric, sustainability, and resilience empowered by emerging technologies such as Artificial Intelligence (AI) and digitalization. This paradigm shift is expected to bring significant advancements in sustainability, resilience, productivity, effectiveness, efficiency, customization, reliability, safety, security, maintainability etc. However, this shift of the industrial paradigm introduces substantial cybersecurity challenges due to the increased attack surface and data sensitivity. Therefore, the objective of this paper is to conduct a thorough literature review of the recent research on cybersecurity in Industry 5.0, highlighting emerging trends, gaps, and potential solutions. To conduct this research, the authors have applied the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to investigate cybersecurity solutions in Industry 5.0. The findings reveal that conceptual research dominates, with AI, Blockchain, and Internet of Things (IoT) most prevalent but highlights a gap in linking cybersecurity to resilience and sustainability. Furthermore, the paper aims to present trends in cybersecurity research with more relevant results from 2022 to 2024. It conducts a thorough review of the literature, highlighting the evolving landscape of cybersecurity applications in Industry 5.0.<\/jats:p>","DOI":"10.3389\/fcomp.2024.1434436","type":"journal-article","created":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T04:31:09Z","timestamp":1721968269000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Cybersecurity for Industry 5.0: trends and gaps"],"prefix":"10.3389","volume":"6","author":[{"given":"Ravdeep","family":"Kour","sequence":"first","affiliation":[]},{"given":"Ramin","family":"Karim","sequence":"additional","affiliation":[]},{"given":"Pierre","family":"Dersin","sequence":"additional","affiliation":[]},{"given":"Naveen","family":"Venkatesh","sequence":"additional","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2024,7,26]]},"reference":[{"key":"ref1","author":"Abishek","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","first-page":"80863","DOI":"10.1109\/ACCESS.2023.3300650","article-title":"A linear probabilistic resilience model for securing critical infrastructure in industry 5.0","volume":"11","author":"Abuhasel","year":"2023","journal-title":"IEEE Access"},{"key":"ref3","doi-asserted-by":"publisher","first-page":"113","DOI":"10.26636\/jtit.2019.130218","article-title":"WannaCry ransomware: analysis of infection, persistence, recovery prevention and propagation mechanisms","volume":"1","author":"Akbanov","year":"2019","journal-title":"J. Telecommun. Inform. Technol."},{"key":"ref4","year":"2024"},{"key":"ref5","author":"Bakkar","year":"2023"},{"key":"ref6","author":"Beerman","year":"2023"},{"key":"ref7","author":"Bodeau","year":"2015"},{"key":"ref8","author":"Breque","year":"2021"},{"key":"ref9","doi-asserted-by":"publisher","first-page":"19","DOI":"10.34190\/iccws.17.1.29","article-title":"Don\u2019t drink the cyber: extrapolating the possibilities of Oldsmar\u2019s water treatment cyberattack","volume":"17","author":"Cervini","year":"2022","journal-title":"Int. Conf. Cyber Warfare Secur."},{"key":"ref10","doi-asserted-by":"publisher","first-page":"800","DOI":"10.3390\/electronics12183800","article-title":"AI in IIoT Management of Cybersecurity for industry 4.0 and industry 5.0 purposes","volume":"12","author":"Czeczot","year":"2023","journal-title":"Electronics (Switzerland)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04422-6","article-title":"BRL-ETDM: Bayesian reinforcement learning-based explainable threat detection model for industry 5.0 network","author":"Dey","year":"2024","journal-title":"Clust. Comput."},{"key":"ref12","author":"Dmitrieva","year":"2024"},{"key":"ref13","author":"Ellen","year":""},{"key":"ref14","year":"2022"},{"key":"ref15","year":"2016"},{"key":"ref16","volume-title":"Cyber resilience act","year":"2022"},{"key":"ref17","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-030-67361-1_1","article-title":"Realizing cyber-physical systems resilience frameworks and security practices","volume":"2021","author":"Haque","year":"2021","journal-title":"Stud. Syst. Decis. Control"},{"key":"ref18","year":"2020"},{"key":"ref19","year":"2015"},{"key":"ref20","year":"2022"},{"key":"ref21","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1109\/TCE.2023.3283704","article-title":"An explainable and resilient intrusion detection system for industry 5.0","volume":"2023","author":"Javeed","year":"2023","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref22","author":"Kohli","year":"2022"},{"key":"ref23","doi-asserted-by":"publisher","first-page":"2915","DOI":"10.1177\/0954409718822915","article-title":"eMaintenance in railways: issues and challenges in cybersecurity","volume":"233","author":"Kour","year":"2019","journal-title":"Proc. Inst. Mech. Eng. F J. Rail Rapid. Transit."},{"key":"ref24","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1108\/JQME-07-2020-0059","article-title":"Cybersecurity workforce in railway: its maturity and awareness","volume":"27","author":"Kour","year":"2020","journal-title":"J. Qual. Maint. Eng."},{"key":"ref25","author":"Kour","year":"2020"},{"key":"ref26","first-page":"2514","volume-title":"A cybersecurity approach for improved system resilience","author":"Kour","year":"2023"},{"key":"ref27","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MSP.2011.67","article-title":"Stuxnet: dissecting a cyberwarfare weapon","volume":"9","author":"Langner","year":"2011","journal-title":"IEEE Secur. Priv."},{"key":"ref28","author":"Lechachenko","year":"2023"},{"key":"ref29","doi-asserted-by":"publisher","first-page":"858","DOI":"10.3390\/machines10100858","article-title":"Secure Blockchain middleware for decentralized IIoT towards industry 5.0: a review of architecture, enablers, challenges, and directions","volume":"10","author":"Leng","year":"2022","journal-title":"Mach. Des."},{"key":"ref30","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1080\/00207543.2022.2089929","article-title":"Blockchained smart contract pyramid-driven multi-agent autonomous process control for resilient individualised manufacturing towards industry 5.0","volume":"61","author":"Leng","year":"","journal-title":"Int. J. Prod. Res."},{"key":"ref31","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/TSMC.2023.3257172","article-title":"ManuChain II: Blockchained smart contract system as the digital twin of decentralized autonomous manufacturing toward resilience in industry 5.0","volume":"53","author":"Leng","year":"","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"ref32","volume-title":"Cyber kill chain\u00ae | Lockheed Martin","year":"2023"},{"key":"ref33","author":"Natalia","year":"2024"},{"key":"ref34","author":"Navale","year":"2023"},{"key":"ref35","year":"2023"},{"key":"ref36","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1136\/bmj.n71","article-title":"The PRISMA 2020 statement: an updated guideline for reporting systematic reviews","volume":"372","author":"Page","year":"2021","journal-title":"BMJ"},{"key":"ref37","author":"Pant","year":"2022"},{"key":"ref38","doi-asserted-by":"publisher","first-page":"200","DOI":"10.3390\/digital3030014","article-title":"Enhancing cyber security governance and policy for SMEs in industry 5.0: a comparative study between Saudi Arabia and the United Kingdom","volume":"3","author":"Rawindaran","year":"2023","journal-title":"Digital"},{"key":"ref39","author":"Ross","year":"2019"},{"key":"ref40","author":"Salviotti","year":"2023"},{"key":"ref41","year":"2023"},{"key":"ref42","doi-asserted-by":"publisher","first-page":"1485","DOI":"10.1109\/ACCESS.2024.3351485","article-title":"A new trend in cryptographic information security for industry 5.0: a systematic review","volume":"12","author":"Shaikh","year":"2024","journal-title":"IEEE Access"},{"key":"ref43","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1109\/TCE.2023.3282964","article-title":"A low-rank learning-based multi-label security solution for industry 5.0 consumers using machine learning classifiers","volume":"69","author":"Sharma","year":"2023","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref44","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1109\/TCE.2023.3319565","article-title":"Privacy-enhanced pneumonia diagnosis: IoT-enabled federated multi-party computation in industry 5.0","volume":"2023","author":"Siddique","year":"2023","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref45","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.inffus.2022.09.027","article-title":"FusionFedBlock: fusion of blockchain and federated learning to preserve privacy in industry 5.0","volume":"90","author":"Singh","year":"2023","journal-title":"Inform. Fusion"},{"key":"ref46","year":"2023"},{"key":"ref47","year":"2024"},{"key":"ref48","author":"Trunina","year":"2023"},{"key":"ref49","author":"Waheed","year":"2023"},{"key":"ref50","year":"2024"},{"key":"ref51","doi-asserted-by":"publisher","first-page":"1907","DOI":"10.1109\/TCE.2023.3331907","article-title":"Incremental update intrusion detection for industry 5.0 security: a graph attention network-enabled approach","volume":"2023","author":"Wu","year":"2023","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref52","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.cirp.2011.03.041","article-title":"Toward a resilient manufacturing system","volume":"60","author":"Zhang","year":"2011","journal-title":"CIRP Ann. Manuf. Technol."}],"container-title":["Frontiers in Computer Science"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2024.1434436\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T04:31:14Z","timestamp":1721968274000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2024.1434436\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,26]]},"references-count":52,"alternative-id":["10.3389\/fcomp.2024.1434436"],"URL":"https:\/\/doi.org\/10.3389\/fcomp.2024.1434436","relation":{},"ISSN":["2624-9898"],"issn-type":[{"value":"2624-9898","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,26]]},"article-number":"1434436"}}