{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T03:53:20Z","timestamp":1776830000800,"version":"3.51.2"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T00:00:00Z","timestamp":1773446400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T00:00:00Z","timestamp":1776816000000},"content-version":"vor","delay-in-days":39,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-026-00316-8","type":"journal-article","created":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T12:32:22Z","timestamp":1773491542000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum enabled cloud IOT collaboration for ultra low latency data processing in cyber physical systems"],"prefix":"10.1007","volume":"6","author":[{"given":"S.","family":"Nalini","sequence":"first","affiliation":[]},{"given":"Syed Mohd.","family":"Saqib","sequence":"additional","affiliation":[]},{"given":"Md.","family":"Mazharunnisa","sequence":"additional","affiliation":[]},{"given":"Shailesh P.","family":"Bendale","sequence":"additional","affiliation":[]},{"given":"Faiz","family":"Akram","sequence":"additional","affiliation":[]},{"given":"P.","family":"Murugan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,14]]},"reference":[{"issue":"2","key":"316_CR1","doi-asserted-by":"publisher","first-page":"126","DOI":"10.17981\/ingecuc.20.2.2024.06","volume":"20","author":"SA Donado","year":"2024","unstructured":"Donado SA, Calvache CJP, Pe\u00f1a RIM. Preliminary review: cybersecurity for operation technology in quantum age against network attacks to critical infrastructures. Inge CuC. 2024;20(2):126\u201343.","journal-title":"Inge CuC"},{"issue":"3-4","key":"316_CR2","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2025.2487023","volume":"19","author":"M Tu","year":"2025","unstructured":"Tu M. Modelling omnipresent AI embedding cyber-physical systems by using a novel invariant-based, quantum-inspired fault detection and Bayesian diagnosis approach. Enterp Inf Syst. 2025;19(3\u20134):2487023.","journal-title":"Enterp Inf Syst"},{"key":"316_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s10142-023-01227-5","author":"S Joshi","year":"2023","unstructured":"Joshi S, Natteshan NVS, Rastogi R, Sampathkumar A, V P, Sountharrajan S. A novel artificial intelligence approach to detect the breast cancer using KNNet technique with EPM gene profiling. Funct Integr Genomics. 2023. https:\/\/doi.org\/10.1007\/s10142-023-01227-5.","journal-title":"Funct Integr Genomics"},{"issue":"20","key":"316_CR4","doi-asserted-by":"publisher","first-page":"5452","DOI":"10.1021\/acs.jpclett.4c00793","volume":"15","author":"X He","year":"2024","unstructured":"He X, Cheng X, Wu B, Liu J. Nonadiabatic field with triangle window functions on quantum phase space. J Phys Chem Lett. 2024;15(20):5452\u201366.","journal-title":"J Phys Chem Lett"},{"key":"316_CR5","doi-asserted-by":"crossref","unstructured":"Jaggi A, Takkalapally P, Rajaram SK, Hudani K, Jiwani N, Natarajan Y. Investigating Fault-Tolerance Techniques for Protecting Cyber-Physical Systems. In\u00a02024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT)\u00a0(Vol. 1, pp. 437\u2013442). IEEE. 2024.","DOI":"10.1109\/ICAICCIT64383.2024.10912360"},{"key":"316_CR6","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-031-73350-5_14","volume-title":"The rise of quantum computing in Industry 6.0 towards sustainability","author":"L Thirupathi","year":"2024","unstructured":"Thirupathi L, Bandari M, Sreeramamurthy K, Gangula R. Cyber-physical systems security and quantum computing applications in disaster recovery for industry 6.0. In: The rise of quantum computing in Industry 6.0 towards sustainability. Cham: Springer; 2024. p. 221\u201335."},{"key":"316_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107186","volume":"92","author":"N Yuvaraj","year":"2021","unstructured":"Yuvaraj N, Chang V, Gobinathan B, Pinagapani A, Kannan S, Dhiman G, et al. Automatic detection of cyberbullying using multi-feature based artificial intelligence with deep decision tree classification. Comput Electr Eng. 2021;92:107186.","journal-title":"Comput Electr Eng"},{"key":"316_CR8","doi-asserted-by":"crossref","unstructured":"Takkalapally P, Sharma N, Jaggi A, Hudani K, Gupta K, Natarajan Y. Assessing the Applicability of Adversarial Machine Learning Approaches for Cybersecurity. In\u00a02024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT)\u00a0(Vol. 1, pp. 431\u2013436). IEEE. 2024.","DOI":"10.1109\/ICAICCIT64383.2024.10912255"},{"key":"316_CR9","doi-asserted-by":"crossref","unstructured":"Kodete CS, Thuraka B, Pasupuleti V. A Systematic Review of AI-Driven and Quantum-Resistant Security Solutions for Cyber-Physical Systems: Blockchain, Federated Learning, and Emerging Technologies. In\u00a02024 International Conference on Computer and Applications (ICCA)\u00a0(pp. 1\u20136). IEEE. 2024.","DOI":"10.1109\/ICCA62237.2024.10927942"},{"key":"316_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100676","volume":"54","author":"PR Babu","year":"2024","unstructured":"Babu PR, Kumar SA, Reddy AG, Das AK. Quantum secure authentication and key agreement protocols for IoT-enabled applications: a comprehensive survey and open challenges. Comput Sci Rev. 2024;54:100676.","journal-title":"Comput Sci Rev"},{"key":"316_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104272","volume":"150","author":"Y Baseri","year":"2025","unstructured":"Baseri Y, Chouhan V, Ghorbani A, Chow A. Evaluation framework for quantum security risk assessment: a comprehensive strategy for quantum-safe transition. Comput Secur. 2025;150:104272.","journal-title":"Comput Secur"},{"issue":"4","key":"316_CR12","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1016\/j.fmre.2023.11.006","volume":"4","author":"H Zeng","year":"2024","unstructured":"Zeng H, Du MM, Zhong W, Zhou L, Sheng YB. High-capacity device-independent quantum secure direct communication based on hyper-encoding. Fundam Res. 2024;4(4):851\u20137.","journal-title":"Fundam Res"},{"issue":"5","key":"316_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11467-024-1396-5","volume":"19","author":"P Zhao","year":"2024","unstructured":"Zhao P, Zhong W, Du MM, Li XY, Zhou L, Sheng YB. Quantum secure direct communication with hybrid entanglement. Front Phys. 2024;19(5):51201.","journal-title":"Front Phys"},{"key":"316_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3448212","author":"S Prajapat","year":"2024","unstructured":"Prajapat S, Kumar P, Kumar D, Das AK, Hossain MS, Rodrigues JJ. Quantum secure authentication scheme for internet of medical things using blockchain. IEEE Internet Things J. 2024. https:\/\/doi.org\/10.1109\/jiot.2024.3448212.","journal-title":"IEEE Internet Things J"},{"key":"316_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3504815","author":"M Imran","year":"2024","unstructured":"Imran M, Altamimi AB, Khan W, Hussain S, Alsaffar M. Quantum cryptography for future networks security: a systematic review. IEEE Access. 2024. https:\/\/doi.org\/10.1109\/access.2024.3504815.","journal-title":"IEEE Access"},{"key":"316_CR16","doi-asserted-by":"crossref","unstructured":"Goyal SB, Rajawat AS, Mittal R, Shrivastava DP. That combines AI-enabled post-quantum models in quantum cyber-physical systems opportunities and challenges.\u00a0Appl Data Sci Smart Syst. 2024;491\u2013498.","DOI":"10.1201\/9781003471059-63"},{"issue":"5","key":"316_CR17","volume":"30","author":"SP Bahulayan","year":"2025","unstructured":"Bahulayan SP, Kavipriya P. A firefly-based optimization algorithm for secure 5G-IoT cyber-physical systems. Ing Syst Inf. 2025;30(5):1259.","journal-title":"Ing Syst Inf"},{"key":"316_CR18","doi-asserted-by":"publisher","DOI":"10.1080\/17509653.2025.2544566","author":"E Shahab","year":"2025","unstructured":"Shahab E, Taghipour S. Designing a resilient cloud network fulfilled by quantum machine learning. Int J Manag Sci Eng Manag. 2025. https:\/\/doi.org\/10.1080\/17509653.2025.2544566.","journal-title":"Int J Manag Sci Eng Manag"},{"key":"316_CR19","doi-asserted-by":"crossref","unstructured":"Chandrasekar M, Chelliah S. QHCP: quantum-resilient hybrid cryptographic protocol for secure data exchange in next-generation networks.\u00a0J Wireless Networks Commun Syst. 2025.","DOI":"10.32595\/jwncs\/v1i3.2025.14"},{"key":"316_CR20","doi-asserted-by":"crossref","unstructured":"Jin J, Pang Z, Kua J, Zhu Q, Johansson KH, Marchenko N, Cavalcanti D. Cloud-fog automation: The new paradigm towards autonomous industrial cyber-physical systems.\u00a0IEEE J Selected Areas Commun. 2025.","DOI":"10.1109\/JSAC.2025.3574587"},{"key":"316_CR21","doi-asserted-by":"crossref","unstructured":"Fan X, Deng X, Liu S, Zhu C, Zhou X, Yi L, et al. Co-designed communication and computing for data reliability in industrial cyber-physical systems with cloud-fog automation.\u00a0IEEE J Selected Areas Commun. 2025.","DOI":"10.1109\/JSAC.2025.3574597"},{"key":"316_CR22","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1109\/OJCOMS.2024.3356508","volume":"5","author":"HM Kamdjou","year":"2024","unstructured":"Kamdjou HM, Baudry D, Havard V, Ouchani S. Resource-constrained extended reality operated with digital twin in industrial internet of things. IEEE Open J Commun Soc. 2024;5:928\u201350.","journal-title":"IEEE Open J Commun Soc"},{"key":"316_CR23","doi-asserted-by":"crossref","unstructured":"Rizvi SMA, Khalid U, Chatzinotas S, Duong TQ, Shin H. Controlled Quantum Semantic Communication for Industrial CPS Networks.\u00a0IEEE Transactions on Network Science and Engineering. 2025.","DOI":"10.1109\/TNSE.2025.3589296"},{"issue":"2","key":"316_CR24","doi-asserted-by":"publisher","DOI":"10.1088\/2631-8695\/ad5269","volume":"6","author":"A Sarkar","year":"2024","unstructured":"Sarkar A, Jhamb M. Secure and portable health monitoring system for cyber physical systems in internet of things. Eng Res Express. 2024;6(2):025357.","journal-title":"Eng Res Express"},{"issue":"4","key":"316_CR25","doi-asserted-by":"publisher","DOI":"10.3390\/info15040173","volume":"15","author":"TH Szymanski","year":"2024","unstructured":"Szymanski TH. A quantum-safe software-defined deterministic internet of things (IoT) with hardware-enforced cyber-security for critical infrastructures. Information. 2024;15(4):173.","journal-title":"Information"},{"key":"316_CR26","doi-asserted-by":"crossref","unstructured":"Zhu C, Fan X, Zheng W, Chen S, Liu S, Deng X, Jeong YS. Intelligent management and computing for trustworthy services under 6g-empoared cyber-physical-social system.\u00a0IEEE Network. 2024.","DOI":"10.1109\/MNET.2024.3522294"},{"issue":"6","key":"316_CR27","doi-asserted-by":"publisher","DOI":"10.3390\/fi17060246","volume":"17","author":"M Elkhodr","year":"2025","unstructured":"Elkhodr M. An AI-driven framework for combined security and privacy in internet of things using quantum-resistant blockchain. Future Internet. 2025;17(6):246.","journal-title":"Future Internet"},{"key":"316_CR28","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2025.066606","author":"MN Alatawi","year":"2025","unstructured":"Alatawi MN. EdgeGuard-IoT: 6G-enabled edge intelligence for secure federated learning and adaptive anomaly detection in Industry 5.0. Comput Mater Contin. 2025. https:\/\/doi.org\/10.32604\/cmc.2025.066606.","journal-title":"Comput Mater Contin"},{"issue":"2","key":"316_CR29","doi-asserted-by":"publisher","first-page":"1756","DOI":"10.1109\/TII.2022.3186891","volume":"19","author":"Y Lu","year":"2022","unstructured":"Lu Y, Yang L, Yang SX, Hua Q, Sangaiah AK, Guo T, et al. An intelligent deterministic scheduling method for ultralow latency communication in edge enabled industrial internet of things. IEEE Trans Ind Inform. 2022;19(2):1756\u201367.","journal-title":"IEEE Trans Ind Inform"},{"issue":"1","key":"316_CR30","doi-asserted-by":"publisher","DOI":"10.1088\/2631-8695\/ad988c","volume":"7","author":"A Sarkar","year":"2025","unstructured":"Sarkar A, Jhamb M. Next-Gen fortified health monitoring for cyber physical systems in internet of things using logistic maps based encryption. Eng Res Express. 2025;7(1):015305.","journal-title":"Eng Res Express"},{"key":"316_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114064","volume":"166","author":"N Kousik","year":"2021","unstructured":"Kousik N, Natarajan Y, Raja RA, Kallam S, Patan R, Gandomi AH. Improved salient object detection using hybrid convolution recurrent neural network. Expert Syst Appl. 2021;166:114064.","journal-title":"Expert Syst Appl"},{"key":"316_CR32","unstructured":"https:\/\/www.kaggle.com\/datasets\/luisenrique054\/iot-sensors-01"},{"key":"316_CR33","unstructured":"https:\/\/github.com\/komeilmoghaddasi\/IoT_Task_Offloading_Dataset"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-026-00316-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00316-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00316-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T02:59:32Z","timestamp":1776826772000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-026-00316-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,14]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["316"],"URL":"https:\/\/doi.org\/10.1007\/s43926-026-00316-8","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,14]]},"assertion":[{"value":"24 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"53"}}