{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T20:56:46Z","timestamp":1771621006390,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T00:00:00Z","timestamp":1707177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T00:00:00Z","timestamp":1707177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004054","name":"King Abdulaziz University","doi-asserted-by":"publisher","award":["KEP-MSc: 78-611-1443"],"award-info":[{"award-number":["KEP-MSc: 78-611-1443"]}],"id":[{"id":"10.13039\/501100004054","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Intell Syst"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>As Edge AI systems become more prevalent, ensuring data privacy and security in these decentralized networks is essential. In this work, a novel hybrid cryptographic mechanism was presented by combining Ant Lion Optimization (ALO) and Diffie\u2013Hellman-based Twofish cryptography (DHT) for secure data transmission. The developed work collects the data from the created edge AI system and processes it using the Autoencoder. The Autoencoder learns the data patterns and identifies the malicious data entry. The Diffie\u2013Hellman (DH) key exchange generates a shared secret key for encryption, while the ALO optimizes the key exchange and improves security performance. Further, the Twofish algorithm performs the data encryption using a generated secret key, preventing security threats during transmission. The implementation results of the study show that it achieved a higher accuracy of 99.45%, lower time consumption of 2\u00a0s, minimum delay of 0.8\u00a0s, and reduced energy consumption of 3.2\u00a0mJ.<\/jats:p>","DOI":"10.1007\/s44196-024-00417-8","type":"journal-article","created":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T14:02:42Z","timestamp":1707228162000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A Hybrid Cryptographic Mechanism for Secure Data Transmission in Edge AI Networks"],"prefix":"10.1007","volume":"17","author":[{"given":"Abdulmohsen","family":"Almalawi","sequence":"first","affiliation":[]},{"given":"Shabbir","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Adil","family":"Fahad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1131-5350","authenticated-orcid":false,"given":"Asif Irshad","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,6]]},"reference":[{"issue":"1","key":"417_CR1","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/JIOT.2021.3098051","volume":"9","author":"S Singh","year":"2021","unstructured":"Singh, S., et al.: Machine-learning-assisted security and privacy provisioning for edge computing: a survey. IEEE Internet Things J. 9(1), 236\u2013260 (2021)","journal-title":"IEEE Internet Things J."},{"key":"417_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3155447","author":"F Al-Doghman","year":"2022","unstructured":"Al-Doghman, F., et al.: AI-enabled secure microservices in edge computing: Opportunities and challenges. IEEE Trans. Serv. Comput. (2022). https:\/\/doi.org\/10.1109\/TSC.2022.3155447","journal-title":"IEEE Trans. Serv. Comput."},{"key":"417_CR3","first-page":"1","volume":"2020","author":"Z Xu","year":"2020","unstructured":"Xu, Z., et al.: Artificial intelligence for securing IoT services in edge computing: a survey. Secur. Commun. Netw. 2020, 1\u201313 (2020)","journal-title":"Secur. Commun. Netw."},{"issue":"6","key":"417_CR4","doi-asserted-by":"publisher","first-page":"4004","DOI":"10.1109\/JIOT.2020.3015432","volume":"8","author":"A Alwarafy","year":"2020","unstructured":"Alwarafy, A., et al.: A survey on security and privacy issues in edge-computing-assisted internet of things. IEEE Internet Things J. 8(6), 4004\u20134022 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"9","key":"417_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3555802","volume":"55","author":"H Hua","year":"2023","unstructured":"Hua, H., et al.: Edge computing with artificial intelligence: a machine learning perspective. ACM Comput. Surv. 55(9), 1\u201335 (2023)","journal-title":"ACM Comput. Surv."},{"key":"417_CR6","doi-asserted-by":"crossref","unstructured":"Sachdev, R.: Towards security and privacy for edge AI in IoT\/IoE based digital marketing environments.\u00a02020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, (2020)","DOI":"10.1109\/FMEC49853.2020.9144755"},{"issue":"2","key":"417_CR7","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1109\/COMST.2021.3062546","volume":"23","author":"P Ranaweera","year":"2021","unstructured":"Ranaweera, P., Jurcut, A.D., Liyanage, M.: Survey on multi-access edge computing security and privacy. IEEE Commun. Surv. Tutor. 23(2), 1078\u20131124 (2021)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"8","key":"417_CR8","doi-asserted-by":"publisher","first-page":"1738","DOI":"10.1109\/JPROC.2019.2918951","volume":"107","author":"Z Zhou","year":"2019","unstructured":"Zhou, Z., et al.: Edge intelligence: paving the last mile of artificial intelligence with edge computing. Proc. IEEE 107(8), 1738\u20131762 (2019)","journal-title":"Proc. IEEE"},{"key":"417_CR9","doi-asserted-by":"publisher","first-page":"103737","DOI":"10.1016\/j.engappai.2020.103737","volume":"94","author":"MS Rahman","year":"2020","unstructured":"Rahman, M.S., et al.: Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption. Eng. Appl. Artif. Intell. 94, 103737 (2020)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"1","key":"417_CR10","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TCSS.2021.3092746","volume":"9","author":"P Zhang","year":"2021","unstructured":"Zhang, P., et al.: A security-and privacy-preserving approach based on data disturbance for collaborative edge computing in social IoT systems. IEEE Trans. Comput. Soc. Syst. 9(1), 97\u2013108 (2021)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"417_CR11","doi-asserted-by":"publisher","first-page":"135479","DOI":"10.1109\/ACCESS.2020.3011503","volume":"8","author":"J Li","year":"2020","unstructured":"Li, J., et al.: A secured framework for sdn-based edge computing in IOT-enabled healthcare system. IEEE Access 8, 135479\u2013135490 (2020)","journal-title":"IEEE Access"},{"key":"417_CR12","doi-asserted-by":"publisher","unstructured":"Singh, A., Satapathy, S.C., Roy, A. et al.: AI-based mobile edge computing for iot: Applications, challenges, and future scope.\u00a0Arab J Sci Eng 47, 9801\u20139831 (2022). https:\/\/doi.org\/10.1007\/s13369-021-06348-2","DOI":"10.1007\/s13369-021-06348-2"},{"key":"417_CR13","doi-asserted-by":"publisher","unstructured":"Gao, H., Huang, W., Liu, T., Yin, Y., Li, Y.: Ppo2: location privacy-oriented task offloading to edge computing using reinforcement learning for intelligent autonomous transport systems.\u00a0IEEE Trans Intell Transport Syst\u00a024(2), 7599\u20137612 (2022). https:\/\/doi.org\/10.1007\/s13369-021-06348-2","DOI":"10.1007\/s13369-021-06348-2"},{"key":"417_CR14","doi-asserted-by":"crossref","unstructured":"Ranaweera, P., Anca D.J., Madhusanka L.: Realizing multi-access edge computing feasibility: Security perspective.\u00a02019 IEEE Conference on Standards for Communications and Networking (CSCN). IEEE, (2019)","DOI":"10.1109\/CSCN.2019.8931357"},{"key":"417_CR15","doi-asserted-by":"publisher","unstructured":"Ansari, M.S., Alsamhi, S.H., Qiao, Y., Ye, Y., Lee, B.: Security of distributed intelligence in edge computing: threats and countermeasures. In: Lynn, T., Mooney, J., Lee, B., Endo, P. (eds.) The Cloud-to-Thing Continuum. Palgrave Studies in Digital Business & Enabling Technologies. Palgrave Macmillan, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41110-7_6","DOI":"10.1007\/978-3-030-41110-7_6"},{"issue":"1","key":"417_CR16","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1108\/IJICC-05-2021-0099","volume":"15","author":"S Rajendran","year":"2021","unstructured":"Rajendran, S., et al.: Emphasizing privacy and security of edge intelligence with machine learning for healthcare. Int. J. Intell. Comput. Cybern. 15(1), 92\u2013109 (2021)","journal-title":"Int. J. Intell. Comput. Cybern."},{"key":"417_CR17","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.comcom.2021.09.029","volume":"181","author":"SA Latif","year":"2022","unstructured":"Latif, S.A., et al.: AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. Comput. Commun. 181, 274\u2013283 (2022)","journal-title":"Comput. Commun."},{"key":"417_CR18","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.inffus.2020.07.009","volume":"64","author":"N Rodr\u00edguez-Barroso","year":"2020","unstructured":"Rodr\u00edguez-Barroso, N., et al.: Federated Learning and differential privacy: software tools analysis, the Sherpa. AI FL framework and methodological guidelines for preserving data privacy. Inf. Fusion 64, 270\u2013292 (2020)","journal-title":"Inf. Fusion"},{"issue":"2","key":"417_CR19","doi-asserted-by":"publisher","first-page":"922","DOI":"10.1109\/TII.2019.2957130","volume":"17","author":"J Xiong","year":"2019","unstructured":"Xiong, J., et al.: An AI-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of IoT. IEEE Trans. Ind. Inf. 17(2), 922\u2013933 (2019)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"417_CR20","doi-asserted-by":"publisher","first-page":"108671","DOI":"10.1016\/j.comnet.2021.108671","volume":"204","author":"Y Wan","year":"2022","unstructured":"Wan, Y., et al.: Privacy-preserving blockchain-enabled federated learning for B5G-Driven edge computing. Comput. Netw. 204, 108671 (2022)","journal-title":"Comput. Netw."},{"issue":"8","key":"417_CR21","doi-asserted-by":"publisher","first-page":"7457","DOI":"10.1109\/JIOT.2020.2984887","volume":"7","author":"S Deng","year":"2020","unstructured":"Deng, S., et al.: Edge intelligence: the confluence of edge computing and artificial intelligence. IEEE Internet Things J. 7(8), 7457\u20137469 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"417_CR22","doi-asserted-by":"publisher","first-page":"4235","DOI":"10.1109\/TII.2019.2902878","volume":"15","author":"AH Sodhro","year":"2019","unstructured":"Sodhro, A.H., Sandeep, P., Victor, H.C.D.A.: Artificial intelligence-driven mechanism for edge computing-based industrial applications. IEEE Trans. Ind. Inf. 15(7), 4235\u20134243 (2019)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"4","key":"417_CR23","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/TETCI.2021.3111636","volume":"6","author":"O Fagbohungbe","year":"2021","unstructured":"Fagbohungbe, O., et al.: Efficient privacy preserving edge intelligent computing framework for image classification in iot. IEEE Trans. Emerg. Topics Comput. Intell. 6(4), 941\u2013956 (2021)","journal-title":"IEEE Trans. Emerg. Topics Comput. Intell."},{"issue":"2","key":"417_CR24","first-page":"80","volume":"1","author":"SR Mugunthan","year":"2019","unstructured":"Mugunthan, S.R.: Soft computing based autonomous low rate DDOS attack detection and security for cloud computing. J. Soft Comput. Paradig. 1(2), 80\u201390 (2019)","journal-title":"J. Soft Comput. Paradig."},{"issue":"2","key":"417_CR25","first-page":"69","volume":"1","author":"DA Sathesh","year":"2019","unstructured":"Sathesh, D.A.: Enhanced soft computing approaches for intrusion detection schemes in social media networks. J. Soft Comput. Paradig. 1(2), 69\u201379 (2019)","journal-title":"J. Soft Comput. Paradig."},{"key":"417_CR26","unstructured":"Sawant, D.S.: Enhancing encryption in cloud computing and reducing energy usage by using PSO-ALO algorithm to improve homomorphic encryption technique. Diss. Dublin, National College of Ireland, (2022)"},{"key":"417_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03372-y","author":"KK Almuzaini","year":"2023","unstructured":"Almuzaini, K.K., et al.: Secured wireless sensor networks using hybrid Rivest Shamir Adleman with ant lion optimization algorithm. Wirel. Netw. (2023). https:\/\/doi.org\/10.1007\/s11276-023-03372-y","journal-title":"Wirel. Netw."},{"key":"417_CR28","doi-asserted-by":"publisher","unstructured":"Bank, D., Koenigstein, N., Giryes, R.: Autoencoders. In: Rokach, L., Maimon, O., Shmueli, E. (eds) Machine Learning for Data Science Handbook. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-24628-9_16","DOI":"10.1007\/978-3-031-24628-9_16"},{"issue":"3","key":"417_CR29","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1049\/cth2.12230","volume":"16","author":"SM Glhamari","year":"2022","unstructured":"Glhamari, S.M., Narm, H.G., Mollaee, H.: Fractional-order fuzzy PID controller design on buck converter with antlion optimization algorithm. IET Control Theory Appl. 16(3), 340\u2013352 (2022)","journal-title":"IET Control Theory Appl."},{"issue":"5s","key":"417_CR30","first-page":"353","volume":"11","author":"HH Hadi","year":"2023","unstructured":"Hadi, H.H., Ammar, A.N.: Diffie-Hellman key exchange based on block matrices combined with elliptic curves. Int. J. Intell. Syst. Appl. Eng. 11(5s), 353\u2013360 (2023)","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"issue":"7","key":"417_CR31","doi-asserted-by":"publisher","first-page":"3612","DOI":"10.3390\/s23073612","volume":"23","author":"A Almalawi","year":"2023","unstructured":"Almalawi, A., Khan, A.I., Alsolami, F., Abushark, Y.B., Alfakeeh, A.S.: Managing security of healthcare data for a modern healthcare system. Sensors 23(7), 3612 (2023)","journal-title":"Sensors"},{"key":"417_CR32","doi-asserted-by":"crossref","unstructured":"Jain, S., Muntean C.H., Verma, R.: Honey2Fish-a hybrid encryption approach for improved password and message security. 2023 IEEE 9th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). IEEE, (2023)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS58521.2023.00042"},{"issue":"2","key":"417_CR33","first-page":"36","volume":"4","author":"OM Barukab","year":"2012","unstructured":"Barukab, O.M., Khan, A.I., Shaik, M.S., Murthy, M.R., Khan, S.A.: Secure communication using symmetric and asymmetric cryptographic techniques. Int. J. Inf. Eng. Electron. Bus. 4(2), 36 (2012)","journal-title":"Int. J. Inf. Eng. Electron. Bus."},{"key":"417_CR34","unstructured":"Fan, K., et al.: Msiap: a dynamic searchable encryption for privacy-protection on smart grid with cloud-edge-end.\u00a0IEEE Transactions on Cloud Computing\u00a0(2021)"},{"key":"417_CR35","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-020-00214-6","author":"PG Shynu","year":"2020","unstructured":"Shynu, P.G., Nadesh R. K., Menon, V.G., Venu P., Abbasi, M., Khosravi, M.R.: A secure data deduplication system for integrated cloud-edge networks. J. Cloud Comput. 9, 61 (2020). https:\/\/doi.org\/10.1186\/s13677-020-00214-6","journal-title":"J. Cloud Comput."},{"key":"417_CR36","doi-asserted-by":"publisher","first-page":"107440","DOI":"10.1016\/j.compeleceng.2021.107440","volume":"96","author":"KPS Kumar","year":"2021","unstructured":"Kumar, K.P.S., et al.: Security and privacy-aware artificial intrusion detection system using federated machine learning. Comput. Electr. Eng. 96, 107440 (2021)","journal-title":"Comput. Electr. Eng."},{"key":"417_CR37","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/B978-0-323-90548-0.00005-X","volume-title":"5G IoT and edge computing for smart healthcare","author":"M AbdulRaheem","year":"2022","unstructured":"AbdulRaheem, M., et al.: An efficient lightweight speck technique for edge-IoT-based smart healthcare systems. In: 5G IoT and edge computing for smart healthcare, pp. 139\u2013162. Academic Press, Cambridge (2022)"},{"issue":"11","key":"417_CR38","doi-asserted-by":"publisher","first-page":"8154","DOI":"10.1109\/JIOT.2021.3125190","volume":"9","author":"K Yu","year":"2021","unstructured":"Yu, K., et al.: A blockchain-based shamir\u2019s threshold cryptography scheme for data protection in industrial internet of things settings. IEEE Internet Things J. 9(11), 8154\u20138167 (2021)","journal-title":"IEEE Internet Things J."},{"key":"417_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103640","volume":"82","author":"W Zheng","year":"2022","unstructured":"Zheng, W., Chen, B., He, D.: An adaptive access control scheme based on trust degrees for edge computing. Comput. Stand Interfaces 82, 103640 (2022)","journal-title":"Comput. Stand Interfaces"},{"issue":"5","key":"417_CR40","doi-asserted-by":"publisher","first-page":"754","DOI":"10.3390\/sym12050754","volume":"12","author":"IH Sarker","year":"2020","unstructured":"Sarker, I.H., Abushark, Y.B., Alsolami, F., Khan, A.I.: Intrudtree: a machine learning based cyber security intrusion detection model. Symmetry 12(5), 754 (2020)","journal-title":"Symmetry"}],"container-title":["International Journal of Computational Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-024-00417-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44196-024-00417-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-024-00417-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T14:06:02Z","timestamp":1707228362000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44196-024-00417-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,6]]},"references-count":40,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["417"],"URL":"https:\/\/doi.org\/10.1007\/s44196-024-00417-8","relation":{},"ISSN":["1875-6883"],"issn-type":[{"value":"1875-6883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,6]]},"assertion":[{"value":"25 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interest or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"24"}}