<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cybersecurity Aspects of Smart Manufacturing Transition to Industry 5.0 Model</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Taras Lechachenko</string-name>
          <email>taras5a@ukr.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ruslan Kozak</string-name>
          <email>ruslan.o.kozak@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuriy Skorenkyy</string-name>
          <email>skorenkyy.tntu@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Kramar</string-name>
          <email>kramaroitntu@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olena Karelina</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Akamai Technologies Poland</institution>
          ,
          <addr-line>Kraków, ul. Opolska 100, PL31-323</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Ternopil Ivan Puluj National Technical University</institution>
          ,
          <addr-line>56 Ruska St, Ternopil, UA46001</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Number and variety of smart manufacturing systems using digital twins for virtualisation and improved control of production are growing fast. Augmented reality interface may serve as an enabler for human creativity inclusion into the product lifecycle and simultaneously contribute to the worker well-being in spirit of the Industry 5.0 principles. Such an integration of a human into industrial platforms requires careful conceptualisation and development of the secure-bydesign augmented reality-enhanced interface for industrial digital twins, which is the focus of this research. Threat modeling and vulnerabilities prioritization for AR-enabled industrial digital twins compliant with the Industry 5.0 are performed by an analytical hierarchy process within STRIDE threat modeling methodology using the TODIM method. The security controls and mitigation actions have been identified, the respective threats and vulnerabilities were ranked to optimize decision-making for the AR-enabled industrial digital twin design.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Industry 5</kwd>
        <kwd>0</kwd>
        <kwd>Industrial Digital Twin</kwd>
        <kwd>Augmented Reality</kwd>
        <kwd>IoT Security</kwd>
        <kwd>Threat Modeling</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Present-day industrial digital twins (IDT) are tools in digitization and optimization of various
industrial systems [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6">1-6</xref>
        ], and may benefit from such novelties as augmented reality (AR) and virtual
reality (VR) technologies [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Realistic 3D models of products and equipment can be interacted with
and may have rich functionality. Implementation of these technologies offer unique benefits for smart
manufacturing as they can be used to model, control and improve the production processes, enhance
knowledge transfer and collaboration of employees. The industrial internet of things (IIoT) gives
manufacturers a comprehensive view of the current state of the production line, characterizes and
controls the ongoing processes in real time.
      </p>
      <p>
        Smart manufacturing is expected to assure high performance to justify investments done for
designing, operating and protection of IIoT. In the transformation, digital twins [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] offer many benefits
but also pose some challenges, such as ensuring security, privacy, and ethical standards, as well as
dealing with the complexity and accuracy of the models. Importantly, with the widespread use of smart
technologies in various domains, ensuring information security becomes vital. Software architecture
and information security measures are to be designed appropriately to protect both businesses and
individuals from data breaches that can have serious consequences.
      </p>
      <p>Smart manufacturing can provide a variety of data, including physical material data and visual data,
process control data and machine data, etc. These data types are to be clearly distinguished, as they
require different mechanisms for harvesting, transmitting, pre-processing and storage. To securely
manage data from the cyber-physical system of low-resource IoT devices, the streaming large-scale
data exchange platform has to be properly designed [9]. Information security and privacy protection,
which involve ensuring that data is kept confidential, immutable and accessible, and preventing
unauthorized access and manipulation, become the critical requirements and deserve special attention
in the context of Industry 5.0.</p>
    </sec>
    <sec id="sec-2">
      <title>2. AR-Enhanced Digital Twin Design for Smart Manufacturing</title>
      <p>In transition to the Industry 5.0 model, a manufacturing company necessarily implements a
humancentered approach into all processes. This includes modeling, engineering, production and management,
as well as decision support systems [10, 11]. Human factor determines effectiveness at both design level
and operational level, thus setting specific requirements to technological development of the
manufacturing facility. Among different aspects, which are to be taken into account, the cognitive ones
for human operators and decision-makers are of the utmost importance. These determine, i.a.,
performance of the manufacturing facility, quality of the product, well being and psychological
satisfaction of the personnel. It is crucial to provide, along with collaborative solutions in the workplace,
efficient and intuitive interfaces for human-machine interaction. As such an interface, the AR-enabled
one has unmatched potential [12]. Such an AR interface can be an indispensable enabler for digital twin
implementation (Figure 1) and control of the physical equipment in the factory floor in real time [13,
14].</p>
    </sec>
    <sec id="sec-3">
      <title>3. Cybersecurity Analysis for Smart Manufacturing Digital Platform</title>
      <p>As already mentioned, the security layer for an industrial digital twin in cloud/edge environments is
to be carefully designed and properly developed. Protection of the IDT as a whole and each IoT device
in particular requires addressing multiple information security and cybersecurity threats. Harvested data
and processed information in IDT is a valuable business asset, therefore proper security measures are
to be designed and enacted.</p>
      <p>Since the digital twin operates with sensitive data and privacy data as part of cyber-physical systems,
best security practices that are in compliance with industry standards and laws should be adopted by
default. One of the most crucial phases of the system development life cycle, secure-by-design implies
that security requirements must be identified in order for engineers to create a high-quality,
economically viable, and secure system.</p>
      <p>In the information security and cyber security domains, threat modeling is a method for determining
security needs. It allows the identification of security requirements, finding threats and vulnerabilities,
assessing their impact and severity thus making possible the prioritization of viable solutions and
measures. A range of applications of this method includes software and networks, IoT components and
industrial processes. The STRIDE [20] threat modeling methodology has been used to identify and
characterize threats and vulnerabilities inherent to the IDT and to personal data of users. We have
composed the general data flow diagram and the threat model shown in Figure 3 for the industrial data
platform architecture depicted in Figure 2, for which applications and technologies are examined in
paper [21].</p>
      <p>For the purposes of this research the specific group of elements (marked in red) have been identified
to be analyzed to address extended attack surfaces that IDT and IoT devices might face due to
incorporating AR-layer into IDT architecture. It has been studied whether there are threats and risks to
the industrial data platform and the data processed in the system imposed by the integrated AR-layer.</p>
      <p>Table 1 summarizes descriptions of the corresponding threat and mitigation measures. The suggested
countermeasures will help software engineers and security experts in the processes of design and
improvement of the industrial data platforms.</p>
      <p>The types of security threats have been identified for each element of the specific group within the
IDT architecture data flow diagram along with countermeasures that should be put into place to mitigate
security risks following the STRIDE methodology. While the STRIDE methodology has been used as
a high-level approach to identify the threats and define respective countermeasures, the OWASP IoT
Top Ten might be leveraged from low-level perspective to model specific security threats and risks as
well as to guide the selection of tests used to evaluate IoT attack surfaces and associated vulnerabilities
[22].</p>
      <p>Considering the Digital Twin architecture data flow diagram depicted on Figure 3, we adapted the
OWASP IoT Top Ten and identified the groups of security practices and controls called to mitigate
security threats and risks the IoT devices might encounter.</p>
      <p>A left-shift approach to information security in the development and use of IDT and IoT devices
helps ensure that sensitive data and privacy-related information are protected against the ever-increasing
threat of cyber-attacks targeting the IoT-empowered industrial systems. The solution provides the
necessary traceability in cyber security and privacy audits to demonstrate compliance with the relevant
regulations.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Multi-criteria decision making based on AHP and TODIM methods</title>
      <p>Ranking of components captured on the data flow diagram (Figure 3) in terms of the STRIDE threat
model was conducted using the TODIM [24, 25] method and intuitionistic fuzzy sets [26]. The
evaluations for the TODIM method were provided by experts with a minimum of five years of
experience in the field of cybersecurity. Those experts have been asked to utilize a linguistic variable
scale presented in Table 3. For this purpose, linguistic variables on the ranking scale, as presented in
the paper [27], were modified, and the scale defined in Table 3 has been applied.</p>
      <p>The algorithm of the TODIM [24] method is as follows. Let a1 ,a2 ,...am be a set of alternatives,
c1 ,c2 ,...cnbe a set of criteria with their corresponding w1 ,w2 ,...cn weights satisfying the condition
n
wi 0,1 and  wi  1 . We construct a matrix a  dij mn , dij where represents the evaluation of
i1
alternative ai ( i  1,2,...m ) based on criterion cj ( j  1,2,...n ) . Let's assume that wjk  w / wk are
j
the relative weights for each criterion c j , ct where wk  max( wj )
k , j  1,2...,n . The TODIM
method consists of the following steps:
1. Normalization a  dij mx into a  dij mx .
2. Calculation of alternative ai dominance over at alternative based on criterion c j . In this case,
consider the factor  as a mitigating factor for loss effects. Thus, the calculation is as follows:
n
 ( ai ,at )   j ( ai ,at )( i,t  1,2...,m )
j1




 j ( a i ,at )  0

 1</p>
      <p>n
wik ( dij  dtj ) /  wjk
j1</p>
      <p>if dij  dtj  0
if dij  dtj  0
n
(  wjk )( dij  dtj ) / wjk
j1
if dij  dtj  0</p>
      <p>Where  j ( ai ,at )( dij  dtj  0 ) represents an advantage and  j ( ai ,at )( dij  dtj  0 ) represents a
loss.</p>
      <p>3. Calculation of the overall evaluation by the formula:
m  m 
 ( ai ,at )  min  ( ai ,at )
 ( ai )  t1 m   1  m  
max  ( ai ,at )  min  ( ai ,at )</p>
      <p> 1   1 
4. Selection of the best  ( ai ) alternative with the highest value.</p>
      <sec id="sec-4-1">
        <title>AR interfaces</title>
      </sec>
      <sec id="sec-4-2">
        <title>IoT Devices Interfaces</title>
      </sec>
      <sec id="sec-4-3">
        <title>AR Interface Data / Control</title>
      </sec>
      <sec id="sec-4-4">
        <title>Data for AR Device / AR Device Command</title>
      </sec>
      <sec id="sec-4-5">
        <title>IoT Device Command / Raw Data</title>
        <p>User</p>
        <p>Table 4 displays the ranking results of the AR-enabled Digital Twin system components with respect
to the STRIDE threats using the TODIM method. The results of ranking shows that major efforts and
activities within the secure-by-design approach should be made to the process components of IDT
architecture as well as to their respective security controls and mitigations. The implementation of the
countermeasures for the data flow and external user components might be deprioritized or delayed for
the next system release in case of tough budget or project timeline.</p>
        <p>Another important separate task in the context of Industry 5.0 is the prioritization of vulnerabilities
for IoT (Table 2) devices, the implementation of which will enable engineers and data architecture
designers in the Industry 5.0 sector to proactively prevent their occurrence through the efficient
allocation of resources for their mitigation. Effective budget allocation in accordance with vulnerability
prioritization will determine the priority of allocating funds to tools and techniques for their reduction.</p>
        <p>This work implemented the prioritization of vulnerabilities for IoT devices using the Analytic
Hierarchy Process (AHP) method developed by Thomas Saaty [23]. For the purpose of the vulnerability
prioritization, three experts with specialized education in the field of cybersecurity and a minimum of
5 years of professional experience within companies of this profile were meticulously selected. Table
5 displays vulnerability ranking assessments by three experts using the Analytic Hierarchy Process
methodology.</p>
      </sec>
      <sec id="sec-4-6">
        <title>Lack of secure update mechanism</title>
      </sec>
      <sec id="sec-4-7">
        <title>Use insecure or outdated components</title>
      </sec>
      <sec id="sec-4-8">
        <title>IInsecure data transfer and storage</title>
      </sec>
      <sec id="sec-4-9">
        <title>Lack of device management</title>
      </sec>
      <sec id="sec-4-10">
        <title>Insecure default settings</title>
        <p>Expert 1
0.0000037
0.3465259
0.0000095
0.6237466
0.0000005
0.0000113
0.0297022</p>
        <p>Expert 2
0.0000096
0.4901828
0.0000104
0.4901828
0.0000010
0.0000058
0.0196073</p>
        <p>Expert 3
0.0000010
0.7605106
0.0000126
0.1396856
0.0000019
0.0000126
0.0997754
Table 6 presents the ranking of averaged pairwise comparison values from three experts in the AHP.</p>
        <p>Applying the AHP method to the prioritization of vulnerabilities for IoT components within IDT
architecture revealed that the vulnerabilities such as the insecure ecosystems interfaces, useinsecure or
outdated components, and insecure default settings should be treated with the highest priority while
developing AR-enabled IDT systems.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>Augmented reality interfaces have immense potential as an enabler for human creativity inclusion
into the product life cycle according to the Industry 5.0 principles. Augmented reality assets can support
virtualisation of manufacturing lines and further implementation of the industrial digital twins. This
may be accompanied with extension of the attack surface for the industrial data platform. Proper
implementation of a secure-based approach to the industrial digital twins design is to be considered a
priority.</p>
      <p>An approach for developing a secure-by-design augmented reality-enhanced interface for industrial
digital twins is proposed. As a result of threat modeling the specific group of elements have been
analyzed to address extended attack surfaces that the IDT system might encounter due to incorporating
AR-layer into its architecture. Threat modeling and vulnerabilities prioritization for AR-enabled
industrial digital twins compliant with the Industry 5.0 are performed by an analytical hierarchy process
within STRIDE threat modeling methodology using the TODIM method. The security controls and
mitigation actions have been identified, the respective threats and vulnerabilities were ranked by using
AHP and TODIM methods to optimize decision-making for the AR-enabled digital twin design.</p>
      <p>The prioritized vulnerabilities and implementing effective mitigation strategies will let engineers
build a robust digital twin ecosystem as well as aid security experts in speeding up and saving means
on the design and upgrade of the IoT-powered manufacturing systems and its constituent parts.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Acknowledgements</title>
      <p>This work was partially supported by the European Institute of Technology through the project
“Smart Manufacturing Innovation, Learning-labs, and Entrepreneurship” (HEI grant agreement No
10044).</p>
    </sec>
    <sec id="sec-7">
      <title>7. References</title>
      <p>[9] Y. Drohobytskiy, V. Brevus, Y. Skorenkyy, Spark structured streaming: Customizing kafka stream
processing. 2020 IEEE Third International Conference on Data Stream Mining Processing (2020)
296-299.
[10] V. Vijayakumar, F. Sgarbossa, W.P. Neumann, A. Sobhani, Framework for incorporating human
factors into production and logistics systems. International Journal of Production Research, 60
(2022) 402-419.
[11] F. Sgarbossa, E.H. Grosse, W.P. Neumann, D. Battini, C.H. Glock, Human factors in production
and logistics systems of the future. Annual Reviews in Control, 49 (2020) 295-305 .
[12] S. Ke, F. Xiang, Z. Zhang, Y. Zuo, An enhanced interaction framework based on VR, AR and MR
in digital twin. Procedia CIRP 83 (2019) 753-758. DOI: 10.1016/j.procir.2019.04.103.
[13] D. Mourtzis, V. Siatras, J. Angelopoulos, Real-time remote maintenance support based on
augmented reality (AR). Applied Sciences 10 (2020) 1855. DOI: 10.3390/app10051855.
[14] R. Geng, M. Li, Z. Hu, Z. Han, R. Zheng, Digital Twin in smart manufacturing: remote control
and virtual machining using VR and AR technologies. Struct Multidisc Optim. 65 (2022) 321.</p>
      <p>URL: DOI:10.1007/s00158-022-03426-3.
[15] C. Li, P. Zheng, S. Li, Y. Pang, C. K. M. Lee, AR-assisted digital twin-enabled robot collaborative
manufacturing system with human-in-the-loop. Robotics and Computer-Integrated Manufacturing
76 (2022) 102321. DOI:10.1016/j.rcim.2022.102321.
[16] Y. Cai, Y. Wang, M. Burnett, Using augmented reality to build digital twin for reconfigurable
additive manufacturing system. Journal of Manufacturing Systems 56 (2020) 598-604.</p>
      <p>DOI:10.1016/j.jmsy.2020.04.005.
[17] V. Pasichnyk, N. Kunanets, M. Nazaruk, A. Bomba, Y. Bilak, Modeling the redistribution
processes of knowledge potential in the formation of the professional competency system. IEEE
14th International Conference on Computer Sciences and Information Technologies (CSIT), Lviv,
Ukraine (2019), 197-200. DOI: 10.1109/STC-CSIT.2019.8929793.
[18] V. Pasichnyk, A. Bomba, M. Nazaruk, N. Kunanets, The dynamics simulation of knowledge
potentials of agents including the feedback. J. Phys.: Conf. Ser. 1840 (2021) 012020. DOI
10.1088/1742-6596/1840/1/012020.
[19] A. Bomba, T. Lechachenko, M. Nazaruk, Modeling the Dynamics of “Knowledge Potentials” of
Agents Including the Stakeholder Requests. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds)
Advances in Computer Science for Engineering and Education IV. ICCSEEA. Lecture Notes on
Data Engineering and Communications Technologies, vol 83. Springer (2021), Cham. DOI:
10.1007/978-3-030-80472-5_7
[20] R. Khan, K. McLaughlin, D. Laverty, S. Sezer. STRIDE-based Threat Modeling for
CyberPhysical Systems. In 2017 IEEE PES: Innovative Smart Grid Technologies Conference Europe
(ISGT-Europe): Proceedings Institute of Electrical and Electronics Engineers Inc. (2018) 1-6. DOI:
10.1109/ISGTEurope.2017.8260283.
[21] P.K. Reddy, V.Q. Pham, B. Prabadevi, M. Liyanage. Industry 5.0: A Survey on Enabling
Technologies and Potential Applications. Journal of Industrial Information Integration 26 (2021)
100257. DOI: 10.1016/j.jii.2021.100257.
[22] G. Lally, D. Sgandurra, Towards a Framework for Testing the Security of IoT Devices
Consistently. In: Emerging Technologies for Authorization and Authentication. Saracino, A.,
Mori, P. Eds. ETAA 2018 Lecture Notes in Computer Science, Volume 11263 (2018). Springer,
Cham. DOI: 10.1007/978-3-030-04372-8_8.
[23] T. Saaty, What is the analytic hierarchy process? Springer Berlin Heidelberg.1988 109-121.
[24] J. Wang, G. Wei, M. Lu, TODIM Method for Multiple Attribute Group Decision Making under
2Tuple Linguistic Neutrosophic Environment. Symmetry 10 (2018) 486. DOI:
10.1080/17509653.2017.1349625
[25] T. Lechachenko, T. Gancarczyk, T. Lobur, A. Postoliuk, Cybersecurity Assessments Based on
Combining TODIM Method and STRIDE Model for Learning Management Systems. CEUR
Workshop Proceedings 3468 (2023) 250-256.
[26] K.T. Atanassov, Intuitionistic fuzzy sets. Physica-Verlag HD. 1999. 1- 137
[27] B.D. Rouyendegh, The Intuitionistic Fuzzy ELECTRE model, International Journal of
Management Science and Engineering Management, 13:2 (2018) 139-145. DOI:
10.1080/17509653.2017.1349625.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ilic</surname>
          </string-name>
          , E. Fleisch,
          <source>Augmented Reality and the Internet of Things. Auto-ID Labs White Paper WPBIZAPP-068</source>
          ,
          <year>2016</year>
          . DOI:
          <volume>10</volume>
          .3929/ethz-a-
          <volume>010833302</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C.</given-names>
            <surname>Qiu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Tan</surname>
          </string-name>
          ,
          <article-title>Digital assembly technology based on augmented reality and digital twins: a review</article-title>
          .
          <source>Virtual Reality &amp; Intelligent Hardware</source>
          <volume>1</volume>
          (
          <year>2019</year>
          )
          <fpage>597</fpage>
          -
          <lpage>610</lpage>
          .
          <fpage>597</fpage>
          -
          <lpage>610</lpage>
          . DOI:
          <volume>10</volume>
          .1016/j.vrih.
          <year>2019</year>
          .
          <volume>10</volume>
          .002.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Egger</surname>
          </string-name>
          , T. Masood,
          <article-title>Augmented reality in support of intelligent manufacturing - A systematic literature review 2020 140 106195</article-title>
          . DOI:
          <volume>10</volume>
          .1016/j.cie.
          <year>2019</year>
          .
          <volume>106195</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>O.</given-names>
            <surname>Kramar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Drohobytskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Skorenkyy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Rokitskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kunanets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Pasichnyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Matsiuk</surname>
          </string-name>
          , Augmented Reality-assisted
          <string-name>
            <surname>Cyber-Physical Systems</surname>
          </string-name>
          of Smart University Campus,
          <source>2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT) 2</source>
          (
          <year>2020</year>
          )
          <fpage>309</fpage>
          -
          <lpage>313</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Li</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>A state-of-the-art survey on Augmented Reality-assisted Digital Twin for futuristic human-centric industry transformation</article-title>
          .
          <source>Robot. Comput.-Integr. Manuf</source>
          .
          <volume>81</volume>
          (
          <year>2023</year>
          )
          <article-title>102515</article-title>
          . URL: https://doi.org/10.1016/j.rcim.
          <year>2022</year>
          .
          <volume>102515</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Siatras</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Nikolakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Alexopoulos</surname>
          </string-name>
          ,
          <article-title>An augmented reality framework for visualization of Internet of Things data for process supervision in factory shop-floor</article-title>
          .
          <source>Procedia CIRP</source>
          (
          <year>2022</year>
          ) 107
          <fpage>1162</fpage>
          -
          <lpage>1167</lpage>
          . DOI:
          <volume>10</volume>
          .1016/j.procir.
          <year>2022</year>
          .
          <volume>05</volume>
          .125.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Azuma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Billinghurst</surname>
          </string-name>
          , G. Klinker,
          <article-title>Special section on mobile augmented reality</article-title>
          .
          <source>Computers &amp; Graphics</source>
          <volume>35</volume>
          (
          <year>2011</year>
          )
          <article-title>vii-viii.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>C.K.</given-names>
            <surname>Lo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.H.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <surname>Ray</surname>
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Zhong</surname>
          </string-name>
          ,
          <article-title>A review of digital twin in product design and development</article-title>
          .
          <source>Advanced Engineering Informatics</source>
          <volume>48</volume>
          (
          <year>2021</year>
          )
          <article-title>101297</article-title>
          . URL: https://doi.org/10.1016/j.aei.
          <year>2021</year>
          .
          <volume>101297</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>