Skip to main content
Log in

Secure convergence of artificial intelligence and internet of things for cryptographic cipher- a decision support system

  • 1194: Secured and Efficient Convergence of Artificial Intelligence and Internet of Things
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

A Correction to this article was published on 10 May 2021

This article has been updated

Abstract

The communication industry is rapidly growing with the passage of time and the number of communication devices is increasing. This increase of communication devices put the devices and their communication into a high risk and security challenges. Intruders tries for capturing important information from such communication devices and are using for their own benefits. To build an effective and accurate decision support system (DSS) for the convergence of Artificial Intelligence (AI) and Internet of Things (IoT) can secure the systems for secure and smooth point-to-point communication. Multi-criteria decision support systems play an important role in decision making for a particular situation based on several security criteria. Decision making based on multi-criteria is one of the exciting issues faced by practitioners and researchers for the convergence of AI and IoT. Numerous DSS are available for making decisions which have the possibility to adopt activities of the decision making. The planned study presented a DSS for the secure convergence of AI and IoT for devices. The experimental work of the proposed study was carried out in the SuperDecisions tool for plotting the hierarchy of security situations based on goal, security criteria, and alternatives.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Change history

References

  1. Amanullah MA, Habeeb RAA, Nasaruddin FH, Gani A, Ahmed E, Mohamednainar AS, Mdakim N, Imran M (2020) Deep learning and big data technologies for IoT security. Comput Commun 151:495–517

    Article  Google Scholar 

  2. Amin R, Nazir S, García-Magariño I (2020) A collocation method for numerical solution of nonlinear delay integro-differential equations for wireless sensor network and Internet of Things. Sensors 20:1962

    Article  Google Scholar 

  3. Awotunde J, Ameen A, Oladipo I, Tomori A, Abdulraheem M (2016) Evaluation of four encryption algorithms for viability, reliability and performance estimation. Niger J Technol Dev 13:74–82

    Article  Google Scholar 

  4. Chaitra B, Kumar V, Shatharama R (2017) A survey on various lightweight cryptographic algorithms on FPGA. IOSR J Electron Commun Eng 12:45–59

    Google Scholar 

  5. Cheah M, Shaikh SA, Haas O, Ruddle A (2017) Towards a systematic security evaluation of the automotive Bluetooth interface. Veh Commun 9:8–18

    Google Scholar 

  6. Cherdantseva Y, Hilton J, Rana O, Ivins W (2016) A multifaceted evaluation of the reference model of information assurance & security. Comput Secur 63:45–66

    Article  Google Scholar 

  7. Dhanda SS, Singh B, Jindal P (2020) Lightweight cryptography: a solution to secure IoT” Wirel Pers Commun :1–34

  8. Dimitrioglou N, Kardaras D, Barbounaki S (2017) Multicriteria evaluation of the Internet of Things potential in health care: The case of dementia care. In: (2017) IEEE 19th Conference on Business Informatics (CBI), pp 454–462

  9. Drake JI, De Hart JCT, Monleón C, Toro W, Valentim J (2017) Utilization of multiple-criteria decision analysis (MCDA) to support healthcare decision-making FIFARMA, 2016. J Market Access Health Policy 5:1360545

    Article  Google Scholar 

  10. Eisenbarth T, Kumar S, Paar C, Poschmann A, Uhsadel L (2007) A survey of lightweight-cryptography implementations. IEEE Des Test Comput 24:522–533

    Article  Google Scholar 

  11. Fernandes JACS. Choosing the Future of Lightweight Encryption Algorithms [Thesis]. Available: https://fenix.tecnico.ulisboa.pt/downloadFile/281870113704550/Extended_Abstract-Choosing_the_Future_of_Lightweight_Encryption_Algorithms.pdf

  12. Figueroa-Hernandez J Jr (2019) A comparison of lightweight Ciphers Meeting NIST lightweight cryptography requirements to the advanced encryption standard. California State Polytechnic University, Pomona

    Google Scholar 

  13. Frazão TD, Camilo DG, Cabral EL, Souza RP (2018) Multicriteria decision analysis (MCDA) in health care: a systematic review of the main characteristics and methodological steps. BMC Med Inf Decis Mak 18:90

    Article  Google Scholar 

  14. Girija PMM, Ramaswami M (2019) Comprehensive Analysis on lightweight cryptographic algorithms for low resource devices. Test Eng Manag 81:14

  15. Goyal TK, Sahula V, Kumawat D (2019) Energy efficient lightweight cryptography algorithms for IoT devices. IETE J Res :1–14

  16. Gu Z, Nazir S, Hong C, Khan S (2020) Convolution neural network based higher accurate intrusion identification system for the network security and communication. Secur Commun Netw

  17. Halabi T, Bellaiche M (2017) Towards quantification and evaluation of security of Cloud Service Providers. J Inf Secur Appl 33:55–65

    Google Scholar 

  18. Huang X, Nazir S (2020) Evaluating Security of Internet of Medical Things using the Analytic Network Process methods. Secur Commun Netw

  19. Jouini M, Rabai LBA, Khedri R (2015) A multidimensional approach towards a quantitative assessment of security threats. In: Procedia Computer Science The 6th International Conference on Ambient Systems, Networks and Technologies, pp 507–514

  20. Kerckhof S, Durvaux F, Hocquet C, Bol D, Standaert F-X (2012) Towards green cryptography: a comparison of lightweight ciphers from the energy viewpoint. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp 390–407

  21. Khan S, Ali H, Ullah Z, Minallah N, Maqsood S, Hafeez A (2018) KNN and ANN-based recognition of handwritten Pashto letters using zoning features. Int J Adv Comput Sci Appl 9:570–577

    Google Scholar 

  22. Li M, Nazir S, Khan HU, Shahzad S, Amin R (2020) Modelling features-based birthmarks for security of end-to-end communication system. Secur Commun Netw 2020:1-10

  23. Mao W, Cai Z, Towsley D, Feng Q, Guan X (2017) Security importance assessment for system objects and malware detection. Comput Secur 68:47–68

    Article  Google Scholar 

  24. Marwan M, Kartit A, Ouahmane H (2018) Security enhancement in healthcare cloud using machine learning. Procedia Comput Sci 127:388–397

    Article  Google Scholar 

  25. Mohanta BK, Jena D, Satapathy U, Patnaik S (2020) Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology. Internet of Things, vol 11

  26. Mohd NAB, Zaaba ZF (2019) A Review of usability and security evaluation model of ecommerce website. In: The Fifth Information Systems International Conference 2019, pp 1199–1205

  27. Mollaie F, Alizadeh M, Dadsetan S, Rashno A (2013) Implementation and evaluation of lightweight encryption algorithms suitable for RFID. J Next Gener Inf Technol 4:65–77

    Google Scholar 

  28. Nabeeh NA, Abdel-Basset M, El-Ghareeb HA, Aboelfetouh A (2019) “Neutrosophic multi-criteria decision making approach for iot-based enterprises. IEEE Access 7:59559–59574

    Article  Google Scholar 

  29. Nazir S, Shahzad S, Nazir M, Rehman HU (2013) Evaluating security of software components using analytic network process. In: 11th International Conference on Frontiers of Information Technology (FIT), IEEE, Islamabad, pp 183–188

  30. Nazir S, Shahzad S, Mahfooz S, Jan MN (2015) Fuzzy logic based decision support system for component security evaluation. Int Arab J Inf Technol 15:1–9

    Google Scholar 

  31. Nazir S, Ali Y, Ullah N, García-Magariño I (2019) Internet of Things for healthcare using affects of mobile computing: a systematic literature review. Wirel Commun Mob Comput

  32. Patil P, Narayankar P, Narayan D, Meena SM (2016) A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Comput Sci 78:617–624

    Article  Google Scholar 

  33. Pei C, Xiao Y, Liang W, Han X (2018) Trade-off of security and performance of lightweight block ciphers in Industrial Wireless Sensor Networks. EURASIP J Wirel Commun Netw 2018:117

  34. Rahman HU, Rehman AU, Nazir S, Rehman IU, Uddin N (2019) Privacy and security—Limits of personal information to minimize loss of privacy. In: Future of Information and Communication Conference, pp 964–974

  35. Rajesh S, Paul V, Menon VG, Khosravi MR (2019) A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry 11:293

  36. Rana S, Hossain S, Shoun HI, Kashem MA (2018) An effective lightweight cryptographic algorithm to secure resource-constrained devices. Spectrum 9

  37. Rani SS, Alzubi JA, Lakshmanaprabu S, Gupta D, Manikandan R (2019) Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers. Multimedia Tools and Applications 1–20.

  38. Saranya T, Sridevi S, Deisy C, Ducchung T, Ahamedkhan MKA (2020) Performance analysis of machine learning algorithms in intrusion detection system: a review. Procedia Comput Sci 171:1251–1260

    Article  Google Scholar 

  39. Singh P, Deshpande K (2018) Performance evaluation of cryptographic ciphers on IoT devices. arXiv preprint arXiv:1812.02220

  40. Song HH (2020) Testing and evaluation system for cloud computing information security products. In: 3rd International Conference on Mechatronics and Intelligent Robotics (ICMIR-2019), pp 84–87

  41. Subsorn P, Limwiriyakul S (2012) A comparative analysis of internet banking security in Thailand: A customer perspective. Procedia Eng 32:260–272

    Article  Google Scholar 

  42. Wang X, Li J, Kuang X, Tanc Y-A, Li J (2019) The security of machine learning in an adversarial setting: A survey. J Parallel Distrib Comput 130:12–23

    Article  Google Scholar 

  43. Wang L, Ali Y, Nazir S, Niazi M (2020) ISA evaluation framework for security of Internet of Health Things system using AHP-TOPSIS methods. IEEE Access 8:152316–152332

    Article  Google Scholar 

  44. Wijayarathna C, Arachchilage NAG (2019) Using cognitive dimensions to evaluate the usability of security APIs: An empirical investigation. Inf Softw Technol 115:5–19

    Article  Google Scholar 

  45. Wu X, Liu S, Sun Y, An Y, Dong S, Liu G (2019) Ecological security evaluation based on entropy matter-element model: A case study of Kunming city, southwest China. Ecol Ind 102:469–478

    Article  Google Scholar 

  46. Yuan J, Luo X (2019) Regional energy security performance evaluation in China using MTGS and SPA-TOPSIS. Sci Total Environ :1–11

  47. Zhang Z, Wen J, Wang X, Zhao C (2017) A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory. Journal of computational science 26:468–477

    Article  Google Scholar 

  48. Zhang J, Nazir S, Huang A, Alharbi A (2020) Multicriteria decision and machine learning algorithms for component security evaluation: library-based overview. Secur Commun Netw

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Lin Shi or Shah Nazir.

Ethics declarations

Conflict of interest

The authors declared no conflict of interest regarding the publication of this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original online version of this article was revised: The author Lin Shi was left out as one of the corresponding authors.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shi, L., Nazir, S., Chen, L. et al. Secure convergence of artificial intelligence and internet of things for cryptographic cipher- a decision support system. Multimed Tools Appl 80, 31451–31463 (2021). https://doi.org/10.1007/s11042-020-10489-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10489-1

Keywords

Navigation