Abstract
The convergence of digital twin (DT) technology and zero trust architecture (ZTA) offers a transformative framework for enhancing cybersecurity and operational resilience in smart manufacturing cyber-physical systems (CPS). This review explores how DTs—virtual representations of physical assets—can simulate, monitor, and evaluate vulnerabilities across complex manufacturing networks in real time. Traditional perimeter-based defenses are increasingly ineffective in distributed and interconnected industrial environments. In response, zero trust policy enforcement—anchored in the principles of "never trust, always verify"—introduces dynamic access controls, micro-segmentation, and continuous authentication that address latent security gaps in CPS. The integration of DTs with ZTA provides contextual awareness for asset behavior, enabling predictive threat modeling, anomaly detection, and proactive security orchestration. This paper reviews recent advancements in DT-enhanced vulnerability assessment tools, zero trust policy engines, and their interplay in manufacturing systems with high cyber-physical interdependence. Emphasis is placed on identifying research gaps, evaluating system architectures, and proposing future directions for implementing resilient, secure-by-design CPS infrastructures. By systematically reviewing case studies, industrial applications, and academic frameworks, this study underscores the critical role of DT and ZTA synergy in safeguarding smart manufacturing environments against evolving cyber threats.
Topics

No keywords indexed for this article. Browse by subject →

References
55
[1]
Abiodun, K., Ogbuonyalu, U. O., Dzamefe, S., Vera, E. N., Oyinlola, A., & Igba, E. (2023). Exploring Cross-Border Digital Assets Flows and Central Bank Digital Currency Risks to Capital Markets Financial Stability. International Journal of Scientific Research and Modern Technology, 2(11), 32–45. https://doi.org/10.38124/ijsrmt.v2i11.447 10.38124/ijsrmt.v2i11.447
[2]
Digital Twin: A Comprehensive Survey of Security Threats

Cristina Alcaraz, Javier Lopez

IEEE Communications Surveys & Tutorials 10.1109/comst.2022.3171465
[3]
Alsmadi, I., & Xu, D. (2020). Security of cyber-physical systems using zero trust architecture. Computers & Security, 92, 101751. https://doi.org/10.1016/j.cose.2020.101751 10.1016/j.cose.2020.101751
[4]
HAN-BSVD: A hierarchical attention network for binary software vulnerability detection

Han Yan, Senlin Luo, Limin Pan et al.

Computers & Security 10.1016/j.cose.2021.102286
[5]
Andronie, M., Lăzăroiu, G., Ștefănescu, R., Uță, C., & Dijmărescu, I. (2021). Sustainable, smart, and sensing technologies for cyber-physical manufacturing systems: A systematic literature review. Sustainability, 13(10), 5495. 10.3390/su13105495
[6]
Atalor, S. I. (2019). Federated Learning Architectures for Predicting Adverse Drug Events in Oncology Without Compromising Patient Privacy ICONIC RESEARCH AND ENGINEERING JOURNALS JUN 2019 | IRE Journals | Volume 2 Issue 12 | ISSN: 2456-8880 10.64388/irev9i4-1711021-6791
[7]
Atalor, S. I., Ijiga, O. M., & Enyejo, J. O. (2023). Harnessing Quantum Molecular Simulation for Accelerated Cancer Drug Screening. International Journal of Scientific Research and Modern Technology, 2(1), 1–18. https://doi.org/10.38124/ijsrmt.v2i1.502 10.38124/ijsrmt.v2i1.502
[8]
Atalor, S. I., Raphael, F. O. & Enyejo, J. O. (2023). Wearable Biosensor Integration for Remote Chemotherapy Monitoring in Decentralized Cancer Care Models. International Journal of Scientific Research in Science and Technology Volume 10, Issue 3 (www.ijsrst.com) doi : https://doi.org/10.32628/IJSRST23113269 10.32628/ijsrst23113269
[9]
Digital Twin-Based Cyber-Attack Detection Framework for Cyber-Physical Manufacturing Systems

Efe C. Balta, Michael Pease, James Moyne et al.

IEEE Transactions on Automation Science and Engine... 10.1109/tase.2023.3243147
[10]
Digital Twin-Based Cyber-Attack Detection Framework for Cyber-Physical Manufacturing Systems

Efe C. Balta, Michael Pease, James Moyne et al.

IEEE Transactions on Automation Science and Engine... 10.1109/tase.2023.3243147
[11]
Barricelli, B. R., Casiraghi, E., & Fogli, D. (2019). A Survey on Digital Twin: Definitions, Characteristics, Applications, and Design Implications. IEEE Access, 7, 167653–167671. https://doi.org/10.1109/ACCESS.2019.2953499 10.1109/access.2019.2953499
[12]
Cunningham, C., & Pollard, J. (2017). The eight business and security benefits of zero trust. Forrester Reseach November.
[13]
Federici, F., Martintoni, D., & Senni, V. (2023). A zero-trust architecture for remote access in industrial IoT infrastructures. Electronics, 12(3), 566. 10.3390/electronics12030566
[14]
Fernández-Caramés, T. M., & Fraga-Lamas, P. (2020). A Review on the Application of Blockchain to the Next Generation of Cybersecure Industry 4.0 Smart Factories. IEEE Access, 7, 45201–45218. https://doi.org/10.1109/ACCESS.2019.2908780 10.1109/access.2019.2908780
[15]
Digital Twin: Enabling Technologies, Challenges and Open Research

Aidan Fuller, Zhong Fan, Charles Day et al.

IEEE Access 10.1109/access.2020.2998358
[16]
Glaessgen, E., & Stargel, D. (2012). The digital twin paradigm for future NASA and U.S. Air Force vehicles. 53rd AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics and Materials Conference, 1–14. https://doi.org/10.2514/6.2012-1818 10.2514/6.2012-1818
[17]
Grieves, M., & Vickers, J. (2017). Digital Twin: Mitigating Unpredictable, Undesirable Emergent Behavior in Complex Systems. In Transdisciplinary Perspectives on Complex Systems (pp. 85–113). Springer. https://doi.org/10.1007/978-3-319-38756-7_4 10.1007/978-3-319-38756-7_4
[18]
He, Y., Xu, X., & Wang, L. (2021). Cybersecurity challenges for industrial cyber–physical systems: A comprehensive review. Robotics and Computer-Integrated Manufacturing, 68, 102114. https://doi.org/10.1016/j.rcim.2020.102114 10.1016/j.rcim.2020.102114
[19]
Ihimoyan, M. K., Enyejo, J. O. & Ali, E. O. (2022). Monetary Policy and Inflation Dynamics in Nigeria, Evaluating the Role of Interest Rates and Fiscal Coordination for Economic Stability. International Journal of Scientific Research in Science and Technology. Online ISSN: 2395-602X. Volume 9, Issue 6. doi : https://doi.org/10.32628/IJSRST2215454
[20]
Imoh, P. O. (2023). Impact of Gut Microbiota Modulation on Autism Related Behavioral Outcomes via Metabolomic and Microbiome-Targeted Therapies International Journal of Scientific Research and Modern Technology (IJSRMT) Volume 2, Issue 8, 2023 DOI: https://doi.org/10.38124/ijsrmt.v2i8.494 10.38124/ijsrmt.v2i8.494
[21]
Koulamas, C., & Kalogeras, A. P. (2018). Cyber-Physical Systems and Digital Twins in the Industrial Internet of Things: A Review. Computer Science Review, 30, 100–112. https://doi.org/10.1016/j.cosrev.2018.10.002 10.1016/j.cosrev.2018.10.002
[22]
Lee, J., Bagheri, B., & Jin, C. (2016). Cyber-physical systems for predictive production systems. CIRP Annals, 65(1), 715–728. https://doi.org/10.1016/j.cirp.2016.06.001 10.1016/j.cirp.2016.06.001
[23]
Review of digital twin about concepts, technologies, and industrial applications

Mengnan Liu, Shuiliang Fang, Huiyue Dong et al.

Journal of Manufacturing Systems 10.1016/j.jmsy.2020.06.017
[24]
Digital twins-based smart manufacturing system design in Industry 4.0: A review

Jiewu Leng, Weiming Shen, Xinyu Li et al.

Journal of Manufacturing Systems 10.1016/j.jmsy.2021.05.011
[25]
Li, X., Peng, J., Niu, J., Wu, F., Liao, J., & Choo, K. K. R. (2017). A robust and energy efficient authentication protocol for industrial internet of things. IEEE Internet of Things Journal, 5(3), 1606-1615. 10.1109/jiot.2017.2787800
[26]
Li, Y., Tao, Z., Wang, L., Du, B., Guo, J., & Pang, S. (2023). Digital twin-based job shop anomaly detection and dynamic scheduling. Robotics and Computer-Integrated Manufacturing, 79, 102443. 10.1016/j.rcim.2022.102443
[27]
Liu, Q., Leng, J., Yan, D., Zhang, D., Wei, L., Yu, A., ... & Chen, X. (2021). Digital twin-based designing of the configuration, motion, control, and optimization model of a flow-type smart manufacturing system. Journal of Manufacturing Systems, 58, 52-64. 10.1016/j.jmsy.2020.04.012
[28]
McLaughlin, S., Konstantinou, C., Wang, X., Davi, L., Sadeghi, A. R., Maniatakos, M., & Karri, R. (2016). The cybersecurity landscape in industrial control systems. Proceedings of the IEEE, 104(5), 1039-1057. 10.1109/jproc.2015.2512235
[29]
Mutahi, D. (2023). Navigating The Delicate Balance: Privacy and Data Security In Computing, https://www.linkedin.com/pulse/navigating-delicate-balance-privacy-data-security-computing-mutahi 10.1109/msp.2004.53
[30]
Exploring Influencer Marketing Among Women Entrepreneurs using Encrypted CRM Analytics and Adaptive Progressive Web App Development

Martina Ononiwu, Tony Isioma Azonuche, Joy Onma Enyejo

International Journal of Scientific Research and M... 10.38124/ijsrmt.v2i6.562
[31]
Ononiwu, M., Azonuche, T. I., Imoh, P. O. & Enyejo, J. O. (2023). Exploring SAFe Framework Adoption for Autism-Centered Remote Engineering with Secure CI/CD and Containerized Microservices Deployment International Journal of Scientific Research in Science and Technology Volume 10, Issue 6 doi : https://doi.org/10.32628/IJSRST 10.32628/ijsrst2302542
[32]
Ononiwu, M., Azonuche, T. I., Okoh, O. F., & Enyejo, J. O. (2023). AI-Driven Predictive Analytics for Customer Retention in E-Commerce Platforms using Real-Time Behavioral Tracking. International Journal of Scientific Research and Modern Technology, 2(8), 17–31. https://doi.org/10.38124/ijsrmt.v2i8.561 10.38124/ijsrmt.v2i8.561
[33]
Ononiwu, M., Azonuche, T. I., Okoh, O. F.. & Enyejo, J. O. (2023). Machine Learning Approaches for Fraud Detection and Risk Assessment in Mobile Banking Applications and Fintech Solutions International Journal of Scientific Research in Science, Engineering and Technology Volume 10, Issue 4 doi : https://doi.org/10.32628/IJSRSET 10.32628/ijsrset232531
[34]
Paul, B., & Rao, M. (2022). Zero-trust model for smart manufacturing industry. Applied Sciences, 13(1), 221. 10.3390/app13010221
[35]
Paul, B., & Rao, M. (2022). Zero-trust model for smart manufacturing industry. Applied Sciences, 13(1), 221. 10.3390/app13010221
[36]
Review of digital twin about concepts, technologies, and industrial applications

Mengnan Liu, Shuiliang Fang, Huiyue Dong et al.

Journal of Manufacturing Systems 10.1016/j.jmsy.2020.06.017
[37]
Qi, Q., Zhao, D., Liao, T. W., & Tao, F. (2018). Modeling of cyber-physical systems and digital twin based on edge computing, fog computing and cloud computing towards smart manufacturing. In International manufacturing science and engineering conference (Vol. 51357, p. V001T05A018). American Society of Mechanical Engineers. 10.1115/msec2018-6435
[38]
Ray, P. P. (2023). Web3: A comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions. Internet of Things and Cyber-Physical Systems, 3, 213-248. 10.1016/j.iotcps.2023.05.003
[39]
Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture. NIST Special Publication 800-207. National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-207 10.6028/nist.sp.800-207
[40]
Terca, K. (2022). Digital twin: Manufacturing case studies, smart factories and predictive maintenance, https://blog.3ds.com/brands/netvibes/digital-twin-manufacturing-case-studies-smart-factories-and-predictive-maintenance/ 10.1201/9781003480860-11
[41]
Trakadas, P., Simoens, P., Gkonis, P., Sarakis, L., Angelopoulos, A., Ramallo-González, A. P., ... & Karkazis, P. (2020). An artificial intelligence-based collaboration approach in industrial iot manufacturing: Key concepts, architectural extensions and potential applications. Sensors, 20(19), 5480. 10.3390/s20195480
[42]
Vigna, R. (2023). The Tangible Benefits of Digital Twins: A New Era of Efficiency and Optimization https://www.linkedin.com/pulse/tangible-benefits-digital-twins-new-era-efficiency-rodrigo-vigna-x0zkc
[43]
Wang, P., Xu, N., Zhang, H., Sun, W., & Benslimane, A. (2021). Dynamic access control and trust management for blockchain-empowered IoT. IEEE Internet of Things Journal, 9(15), 12997-13009. 10.1109/jiot.2021.3125091
[44]
Wang, Y., Su, Z., Guo, S., Dai, M., Luan, T. H., & Liu, Y. (2023). A survey on digital twins: Architecture, enabling technologies, security and privacy, and future prospects. IEEE Internet of Things Journal, 10(17), 14965-1498 10.1109/jiot.2023.3263909
[45]
Patil, P., Kataria, B., Redkar, V., Banait, A., Shilpa, C., Patil, & Khetani, V. (2024). Automated Detection of Tuberculosis Using Deep Learning Algorithms on Chest X-rays. Frontiers in Health Informatics, 13, 218–229. 10.52783/fhi.20
[46]
Kataria B, H B. Jethva, “Decentralized Security Mechanisms for AI-Driven Wireless Networks : Integrating Blockchain and Federated Learning”, Int J Sci Res Sci Eng Technol, vol. 11, no. 5, pp. 342–352, Sep. 2024, doi: 10.32628/IJSRSET24105474. 10.32628/ijsrset24105474
[47]
Shivadekar, S., Kataria, B., Hundekari, S., Wanjale, K., Balpande, V. P., & Suryawanshi, R. (2023). Deep Learning-Based Image Classification of Lung Radiography for Detecting COVID-19 Using a Deep CNN and ResNet 50. International Journal of Intelligent Systems and Applications in Engineering, 11(1s), 241–250. Retrieved from http://dx.doi.org/10.2139/ssrn.4951255 10.2139/ssrn.4951255
[48]
Kataria, B., Jethva, H.B., Shinde, P.V., Banait, S.S., Shaikh, F., Ajani, S. (2023). SLDEB: Design of a Secure and Lightweight Dynamic Encryption Bio-Inspired Model for IoT Networks. International Journal of Safety and Security Engineering, Vol. 13, No. 2, pp. 325-331. https://doi.org/10.18280/ijsse.130214 10.18280/ijsse.130214
[49]
Shivadekar, S., Kataria, B., Limkar, S., et al. (2023). Design of an Efficient Multimodal Engine for Preemption and Post-Treatment Recommendations for Skin Diseases via a Deep Learning-Based Hybrid Bio-Inspired Process. Soft Computing. https://doi.org/10.1007/s00500-023-08709-5 10.1007/s00500-023-08709-5
[50]
Wen, J., Gabrys, B., & Musial, K. (2022). Toward digital twin oriented modeling of complex networked systems and their dynamics: A comprehensive survey. Ieee Access, 10, 66886-66923. 10.1109/access.2022.3184801

Showing 50 of 55 references

Metrics
16
Citations
55
References
Details
Published
Nov 30, 2023
Pages
475-499
Cite This Article
Chima Nwankwo Idika Choubey, Ugoaghalam Uche James, Onuh Matthew Ijiga, et al. (2023). Digital Twin-Enabled Vulnerability Assessment with Zero Trust Policy Enforcement in Smart Manufacturing Cyber-Physical System. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 475-499. https://doi.org/10.32628/cseit23906189