Abstract
A crucial factor for smart cities, which are more vulnerable to cyber threats, is Cyber Resilience (CR). Nevertheless, the conventional frameworks didn’t concentrate on assuring the Backup Data (BD) integrity before restoration, showing less resilience. Therefore, this article implements an AI-powered BD integrity verification approach for CR in smart infrastructure using Murmur Polytopes Hash (MPH). Initially, the nodes are initialized in the smart city, followed by node clustering, data security, and storage (cloud server and Interplanetary File System (IPFS) (backup)). Now, the hash code is generated and updated in the Merkle tree. Besides, to perform data collection, pre-processing, clustering, correlation heatmap generation, feature extraction, and attack classification, the proposed ransomware attack detection module is designed. If the data is attacked, then the BD verification is done using MPH. Then, the BD is restored. If the data is normal, then the data is downloaded from the cloud server. Thus, the proposed work had a high security level and accuracy of 98.45% and 98.65%, respectively, showing better resilience.
Similar content being viewed by others
Data availability
The datasets generated and/or analysed during the current study are available in the Dataset: https://www.kaggle.com/datasets/amdj3dax/ransomware-detection-data-set
References
Konstantinou, C. Toward a secure and resilient all-renewable energy grid for smart cities. IEEE Consum. Electron. Mag. 11(1), 1–7. https://doi.org/10.1109/MCE.2021.3055492 (2021).
Saheed, Y. K. & Arowolo, M. O. Efficient cyber attack detection on the internet of medical things-smart environment based on deep recurrent neural network and machine learning algorithms. IEEE Access 9, 161546–161554. https://doi.org/10.1109/ACCESS.2021.3128837 (2021).
Rana, M. U., Shah, M. A., Alnaeem, M. A. & Maple, C. Ransomware attacks in cyber-physical systems: Countermeasure of attack vectors through automated web defenses. IEEE Access 13, 1–18. https://doi.org/10.1109/ACCESS.2024.3477631 (2024).
Malik, M. I., Ibrahim, A., Hannay, P. & Sikos, L. F. Developing resilient cyber-physical systems: A review of state-of-the-art malware detection approaches, gaps, and future directions. Computers 12(4), 1–26. https://doi.org/10.3390/computers12040079 (2023).
Bhandari, G. P., Lyth, A., Shalaginov, A. & Gronli, T. M. Artificial intelligence enabled middleware for distributed cyberattacks detection in IoT-based smart environments. In Proceedings-2022 IEEE International Conference on Big Data, Big Data 2022, 3023–3032, https://doi.org/10.1109/BigData55660.2022.10020531 (2022).
Madhavan, K., Yazdinejad, A., Zarrinkalam, F. & Dehghantanha, A. Security vulnerabilities: A metric-driven security analysis of gaps in current AI standards. arXiv preprint arXiv:2502.08610, https://doi.org/10.48550/arXiv.2502.08610 (2025).
Dehghantanha, A., Yazdinejad, A. & Parizi, R. M. Autonomous cybersecurity: Evolving challenges, emerging opportunities, and future research trajectories. In Proceedings of the Workshop on Autonomous Cybersecurity, 1–10. https://doi.org/10.1145/3689933.3690832 (2023).
Ahmed, Y., Beyioku, K. & Yousefi, M. Securing smart cities through machine learning: A honeypot-driven approach to attack detection in Internet of Things ecosystems. IET Smart Cities. 6(3), 180–198. https://doi.org/10.1049/smc2.12084 (2024).
Khattak, Z. H. Cybersecurity vulnerability and resilience of cooperative driving automation for energy efficiency and flow stability in smart cities. Sustain. Cities Soc. 106, 1–19. https://doi.org/10.1016/j.scs.2024.105368 (2024).
Lyu, Q., Liu, S. & Shang, Z. Securing urban landscape: Cybersecurity mechanisms for resilient smart cities. IEEE Access 13, 10966–10977. https://doi.org/10.1109/ACCESS.2024.3522078 (2025).
Dhingra, B., Jain, V., Sharma, D. K., Gupta, K. D. & Kukreja, D. RLET: A lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment. Int. J. Inf. Secur. 23(1), 1–17. https://doi.org/10.1007/s10207-023-00739-2 (2024).
Usman, Y., Ihejirika, C. J., Offor, S. N., Robert, A. & Chataut, R. Green cybersecurity: Leveraging AI, ML, and LLMs to optimize energy, threat detection, and sustainability frameworks. IEEE Access https://doi.org/10.1109/ACCESS.2025.3602451 (2025).
Ali, S. M., Razzaque, A., Yousaf, M. & Ali, S. S. A novel AI-based integrated cybersecurity risk assessment framework and resilience of national critical infrastructure. IEEE Access. 13, 12427–12446. https://doi.org/10.1109/ACCESS.2024.3524884 (2025).
Alazab, M. et al. Enhanced threat intelligence framework for advanced cybersecurity resilience, Egypt. Inform. J. 27(1–26), 2024. https://doi.org/10.1016/j.eij.2024.100521 (2024).
Islam, S., Basheer, N., Papastergiou, S., Ciampi, M. & Silvestri, S. Intelligent dynamic cybersecurity risk management framework with explainability and interpretability of AI models for enhancing security and resilience of digital infrastructure. J. Reliab. Intell. Environ. 11(3), 1–25. https://doi.org/10.1007/s40860-025-00253-3 (2025).
Zhang, X., Wang, J. & Zhu, S. Dual generative adversarial networks based unknown encryption ransomware attack detection. IEEE Access 10, 900–913. https://doi.org/10.1109/ACCESS.2021.3128024 (2022).
Singh, A. et al. Enhancing ransomware attack detection using transfer learning and deep learning ensemble models on cloud-encrypted data. Electronics (Switzerland) 12(18), 1–31. https://doi.org/10.3390/electronics12183899 (2023).
Nandanwar, H. & Katarya, R. A secure and privacy-preserving ids for iot networks using hybrid blockchain and federated learning. In International Conference on Next-Generation Communication and Computing, 207–219, https://doi.org/10.1007/978-981-96-3725-6_18 (2025).
Yazdinejad, A., Mohammadabadi, Z. D., Dehghantanha, A. & Srivastava, G. An explainable and privacy-preserving federated learning model for threat detection in cyber-physical-social systems. IEEE Trans. Comput. Soc. Syst. https://doi.org/10.1109/TCSS.2025.3606798 (2025).
Yazdinejad, A., Dehghantanha, A., Karimipour, H., Srivastava, G. & Parizi, R. M. A robust privacy-preserving federated learning model against model poisoning attacks. IEEE Trans. Inf. Forensics Secur. 19, 6693–6708. https://doi.org/10.1109/TIFS.2024.3420126 (2024).
Urooj, U. et al. Addressing behavioral drift in ransomware early detection through weighted generative adversarial networks. IEEE Access 12, 3910–3925. https://doi.org/10.1109/ACCESS.2023.3348451 (2024).
Al-Hawawreh, M., Sitnikova, E. & Aboutorab, N. Asynchronous peer-to-peer federated capability-based targeted ransomware detection model for industrial IoT. IEEE Access. 9, 148738–148755. https://doi.org/10.1109/ACCESS.2021.3124634 (2021).
Routray, S., Prusti, D. & Rath, S. K. Ransomware attack detection by applying machine learning techniques. Lect. Notes Electr. Eng. 1, 1–12. https://doi.org/10.1007/978-981-99-0085-5_62 (2023).
Zahoora, U. et al. Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier. Sci. Rep. 12(1), 1–15. https://doi.org/10.1038/s41598-022-19443-7 (2022).
Gurukala, N. K. Y. & Verma, D. K. Feature selection using particle swarm optimization and ensemble-based machine learning models for ransomware detection. SN Comput. Sci. 5(8), 1–21. https://doi.org/10.1007/s42979-024-03454-4 (2024).
Nandanwar, H. & Katarya, R. Optimized intrusion detection and secure data management in IoT networks using GAO-Xgboost and ECC-integrated blockchain framework. Knowl. Inf. Syst. https://doi.org/10.1007/s10115-025-02513-3 (2025).
Nandanwar, H. & Katarya, R. A hybrid blockchain-based framework for securing intrusion detection systems in internet of things. Clust. Comput. 28(7), 471. https://doi.org/10.1007/s10586-025-05135-0 (2025).
Nandanwar, H. & Katarya, R. Securing Industry 5.0: An explainable deep learning model for intrusion detection in cyber-physical systems. Comput. Electr. Eng. 123, 110161. https://doi.org/10.1016/j.compeleceng.2025.110161 (2025).
Nandanwar, H. & Katarya, R. TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment. Int. J. Inf. Secur. 23(2), 1251–1277. https://doi.org/10.1007/s10207-023-00787-8 (2023).
Nandanwar, H. & Katarya, R. Deep learning enabled intrusion detection system for Industrial IOT environment. Expert Syst. Appl. 249, 123808 (2024).
Acknowledgements
The authors would like to acknowledge the support of Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2026R435), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Funding
This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2026R435), Princess Nourahbint Abdulrahman University, Riyadh, Saudi Arabia.
Author information
Authors and Affiliations
Contributions
Formal Analysis-Basant Kumar, Shashi Kant Gupta and Ozlem Kilickaya; Resources, Design and coding—Rashmi Dwivedi; Wrting-Original Draft- Diaa Salama AbdElminaam; Writing-Deema Mohammed Alsekait; Review and Editing- Basant Kumar.
Corresponding authors
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.
About this article
Cite this article
Kumar, B., Gupta, S.K., Dwivedi, R. et al. Artificial intelligence driven approach for securing backup data and enhancing cyber resilience in sustainable smart infrastructure. Sci Rep (2026). https://doi.org/10.1038/s41598-026-37802-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-026-37802-6


