Abstract
The rapid expansion of edge–cloud computing infrastructures has intensified both cybersecurity demands and the associated energy consumption and carbon footprint of intrusion detection systems (IDS). This paper presents GreenShield, a unified low-carbon cybersecurity framework that integrates energy-efficient deep learning-based intrusion detection with knowledge distillation and dynamic quantization, ASCON lightweight cryptography, hierarchical federated learning with gradient compression, and a carbon-aware scheduling engine across distributed edge–fog–cloud architectures. GreenShield employs a threat-adaptive quantization mechanism that scales model precision (4–32 bit) based on real-time threat levels and a carbon-conscious scheduling controller that dynamically aligns security workload execution with renewable energy availability forecasts. Extensive experiments on the UNSW-NB15 and CIC-IDS2017 datasets demonstrate that GreenShield achieves 98.73% detection accuracy with 67.4% energy reduction compared to conventional deep learning-based IDS, while reducing operational carbon emissions by up to 97.6% (equivalent to approximately 2.8 kg CO2-eq per hour savings in a typical edge deployment). The hierarchical federated learning architecture reduces communication overhead by 58.2% through Top-k gradient sparsification, and the dynamic quantization mechanism achieves 71.3% inference energy reduction during low-threat periods. These results establish GreenShield as a viable, scalable solution for sustainable cybersecurity that supports carbon-conscious security workflows in next-generation edge–cloud computing environments.
Similar content being viewed by others
Introduction
The emerging boom in edge and cloud computing systems, has indeed changed the landscape of the modern digital ecosystems, giving unexplainable connectivity and computing capabilities in many areas of implementation distinctions, including smart cities, autonomous automobiles, industrial automation and healthcare systems1. However, there are also certain harsh challenges that this change has initiated as the cybersecurity and the environmental sustainability nexus. The data patterns at present are consuming about 1–1.5% of total electricity in the world and there are projections that it may increase further to 8% by 20302. Security operations, especially, intrusion detection systems, and cryptographic procedures take up a large part of this energy consumption, which needs new methods that would be both protection-acceptable and eco-friendly.
Low-carbon intrusion detection is defined as a paradigm that minimizes greenhouse gas emissions across the IDS operational lifecycle while maintaining acceptable accuracy and latency. It encompasses three dimensions: computational carbon efficiency (energy-efficient models, adaptive precision, lightweight cryptography), communication carbon efficiency (compressed updates, hierarchical aggregation), and temporal carbon optimization (carbon-aware scheduling aligned with renewable energy availability). Unlike conventional green computing, it targets carbon footprint directly as the primary objective, recognizing that identical energy consumption yields vastly different emissions depending on grid carbon intensity (0.024–0.712 kg CO₂/kWh across regions).
The ancient cybersecurity systems were not engineered to be energy efficient or to produce any carbon footprint, the emphasis was on the accuracy with which it was detected as well as the speed of its response, rather than the computational sustainability3. Deep learning-enabled intrusion detection systems, although proving to be more performance effective in detecting advanced attacks, generally consume a lot of computed power in to form substantial amount of energy use and carbon footprint4. As an example, training a common convolutional neural network on the classification of network traffic may use the energy that would be consumed by five cars throughout their lifespan5. This paradigm is becoming unsustainable because organizations are under increasing pressure on the pressure imposed on them by the regulatory frameworks and the stakeholder expectations coupled with real environmental issues that require the organizations to minimize their carbon footprint.
Sustainable implementation of cybersecurity in edge computing environments has its own peculiarities. Edge devices with a limited amount of resources need to implement security functions with low power limits and low latency reaction to the possible threats6. The distributed form of edge architectures further complicates the optimization of energies since security loads have to be distributed across the heterogeneous nodes having different capacities and energy profiles7. Though providing higher computational flexibility, cloud environments are not easy when it comes to managing security operations between geographically distributed data centers that present different levels of renewable energy availability, and carbon intensities8.
New opportunities have been presented by recent developments in lightweight cryptography and energy-efficient machine learning to deal with these issues9. The achievement of the standardization of ASCON as a NIST lightweight standard of cryptography offers a basis of executing secure implementations of energy efficient cryptographic activities on devices with resource constraints10. Equally, knowledge distillation, model pruning and dynamic quantization are methods to deploy the advanced neural network-based security mechanisms at a much reduced computational cost11. Federated learning methods have an added advantage of being collaborative to model training and do not require centralization of sensitive network traffic data hence less communication overhead and less risk of privacy12.
Introduction of renewable energy concerns into design security systems forms a new tool to sustainable computing13. Carbon-conscious computing paradigms allow computing systems to dynamically set up their activities due to the carbon content of accessible electricity, planning energy-intensive duties in times of optimal renewable energy supply14. When implementing these principles to cybersecurity operations, security-energy tradeoffs have to be considered with great attention, and carbon optimization should not lead to the decrease in the effectiveness of protection15.
Existing IDS approaches face an inherent quadrilemma among four competing objectives: security performance, energy efficiency, carbon optimization, and real-time constraints. Deep learning-based IDS achieve high accuracy but consume up to 89.67 mJ per inference, making continuous edge deployment unsustainable. Lightweight alternatives reduce energy but sacrifice 1–3% accuracy, while carbon-aware scheduling conflicts with the 500 ms real-time latency requirement for intrusion detection. Federated learning reduces communication energy but compromises convergence and model consistency. No existing framework simultaneously addresses all four dimensions, motivating the proposed GreenShield architecture.
Research Questions:
-
RQ1: How can knowledge distillation and dynamic quantization be integrated to achieve energy-efficient intrusion detection without significant degradation in detection accuracy across diverse attack categories?
-
RQ2: To what extent can hierarchical federated learning with gradient compression reduce communication energy and carbon emissions in distributed edge–fog–cloud IDS deployments while maintaining convergence stability and model performance?
-
RQ3: How effectively can carbon-aware scheduling dynamically redistribute security workloads based on real-time renewable energy availability and carbon intensity forecasts without violating real-time detection latency constraints?
-
RQ4: What is the combined sustainability impact of integrating lightweight cryptography, adaptive deep learning, federated learning, and carbon-conscious scheduling within a unified cybersecurity framework for edge–cloud environments?
Figure 1 demonstrates the conceptual map of the proposed GreenShield architecture, and in particular it is important to note that energy-efficient intrusion detection, lightweight cryptography and carbon-conscious scheduling have been absorbed under a single architecture that covers both edge and cloud settings. The framework resolves the inherent dilemma between the effectiveness of security and environmental sustainability by using a multi-layered optimization mechanism.
Conceptual overview of the GreenShield framework showing the integration of energy-efficient security components across edge and cloud tiers with carbon-aware scheduling.
In spite of recent progress in energy efficient intrusion detection, light weight cryptography, and sustainable edition edge cloud computing, solutions currently are disjointed. Majority of previous literatures also focus on maximizing on either memory or energy usage or communication overhead singly without considering simultaneously carbon emission, renewable energy consciousness, and responsible security demeanor. Precisely, there is now no model that incorporates dynamically the lightweight cryptographic protection, adaptive deep learning-based intrusion detection and carbon-aware scheduling into a hierarchical edge–fog–cloud framework. It is this outstanding issue that encourages the proposed GreenShield framework which has sought to restore sound cybersecurity at the same time taking explicit steps in minimizing energy usage and carbon emissions across distributed computing environments.
The primary contributions of this paper are as follows:
-
Novel low-carbon cybersecurity framework: We present an integrated GreenShield, lightweight cryptographic protocol with energy-efficient deep learning-based intrusion detection with a reduction of 67.4% of the overall energy consumption as compared to the traditional methods and an 98.73% detection rate.
-
Hierarchical federated learning architecture: We present a three-layer federated learning system having adaptive aggregation schemes that allow edge and cloud nodes to collaborate in intrusion detection with a 58.2 reduction in the communications overhead and power consumption.
-
Dynamic knowledge distillation and quantization: We present an adaptive knowledge distillation method in combination with dynamic quantization that improves the automatically adaptive model accuracy according to the threat levels and energy prices, (scaling back on the inference energy) by 71.3% during low-threat situations.
-
Carbon-aware security scheduling algorithm: We come up with a new scheduling algorithm that assigns security loads in real-time according to forecasts of renewable energy and carbon intensity to minimize the operational carbon emissions by about 2.8 kg CO2-equivalent per hour.
-
Comprehensive experimental validation: We broadly analyzed the UNSW-NB15 data set and the CIC-IDS2017 data set and they demonstrate that, among ten state-of-the-art shelf methods, the accuracy and energy consumption improved significantly as well as the carbon footprint reduced.
-
The rest of this paper follows the following design: In “Related work” section reviews related literature regarding green cybersecurity, energy-saving intrusion detection, and sustainable computing; in “Proposed methodology” section is the presentation of the proposed GreenShield methodology with system architecture, mathematical modeling, and algorithmic implementations; in “Discussion” section is the discussion and analysis of the results; and in “Conclusion” section presents a conclusion of the paper with the directions on future research.
Related work
This section surveys literature across green intrusion detection, lightweight cryptography, and sustainable edge–cloud computing. Roy et al.1 surveyed green IDS techniques but without proposing an operational framework integrating energy with carbon optimization. The authors in2 examined energy-conscious IoT security focusing on device-level efficiency without edge–cloud coordination. Ranpara et al.6 proposed adaptive hyperparameter optimization for ML-based IDS at the model level only, while Umar et al.7 combined knowledge distillation with quantization for edge detection but lacked threat-aware or renewable energy controls. Alsaleh et al.8 developed a federated BiLSTM-based IDS without optimizing energy or carbon emissions. Foundational NIDS studies16,17,18,19 identified scalability, feature redundancy, and deployment limitations in conventional systems, directly informing GreenShield’s adaptive detection, lightweight student network, and federated learning design. In lightweight cryptography, Soto-Cruz et al.15 surveyed algorithms including ASCON, SPECK, and PRESENT without examining system-level integration. Radhakrishnan et al.20 identified ASCON’s favorable security-energy balance but restricted analysis to encryption metrics. Hardware implementations by Khan et al.21, Nguyen et al.22, and Zhong and Gu23 improved cryptographic efficiency on ASIC/FPGA platforms but analyzed elements independently without integration with adaptive detection or carbon-conscious scheduling. Sustainable computing research by Alwageed et al.24 prioritized cloud sustainability challenges using ISM-ANN, motivating GreenShield’s carbon-aware scheduling. Shi et al.25 established foundations for joint security-energy optimization in mobile edge computing. Habibullah et al.26 and Al Shareef et al.27 examined blockchain-energy integration for IoT and AI-driven carbon accounting. Lee and Han28 demonstrated edge intelligence reducing cloud transmissions by 62%, aligning with GreenShield’s distributed philosophy.
Proposed methodology
This paper will introduce the detailed design of Green Shield which entails the system architecture, mathematical model, algorithm implementations and the analysis of complexity of the design. Figure 2 is the diagram of the system architecture, which is a hierarchy of the components in terms of the edge, fog, and cloud orders.
Green Shield system architecture showing the three-tier hierarchical organization with energy-efficient intrusion detection, lightweight cryptography, and carbon-aware scheduling components. Color coding: blue denotes the Cloud Tier (global aggregation), orange for the Fog Tier (intermediate aggregation), and green for the Edge Tier (local training and inference). Purple highlights the knowledge distillation module, pink represents the dynamic quantization mechanism, and yellow indicates the student/teacher network components. Federated learning gradient flows are shown with directional arrows between tiers, and the output classification categories are displayed on the right.
System overview
GreenShield is a top-down cybersecurity system with three levels of computation, including edge devices, fog nodes, and cloud servers. The framework incorporates four main functional modules, namely, (1) energy-efficient intrusion detection module (EEIDM), (2) lightweight cryptographic engine (LCE), (3) hierarchical federated learning coordinator (HFLC), and (4) carbon-aware scheduling engine (CASE). These modules work together to reduce power use and carbon emissions and ensure high-level security protection.
The middle tier comprises of resource-limited IoT hardware and sensors that do initial filtering of traffic and lightweight feature extraction. These devices use the LCE module to conduct secure communications and use the compression neural network models to classify the initial threats. The fog layer includes the medium level of computational nodes that combine information of several edge computers, refine intrusion detection investigations, and arrange federated learning tasks. The cloud tier offers a centralized model training, global threat intelligence formation, and carbon-intelligent workload coordination throughout the infrastructure.
Energy-efficient intrusion detection module
The EEIDM employs a novel neural network architecture optimized for energy efficiency through knowledge distillation and dynamic quantization. Let \(\mathcal{D}=\{\left({\text{x}}_{i},{y}_{i}\right){\}}_{i=1}^{N}\) denote the training dataset where \({\text{x}}_{i}\in {\mathbb{R}}^{d}\) represents the \(d\)-dimensional feature vector of network traffic sample \(i\) and \({y}_{i}\in \{0,1,\dots ,C-1\}\) denotes the corresponding class label for \(C\) attack categories including normal traffic.
The teacher network \(\mathcal{T}\) is a deep neural network with parameters \({\theta }_{T}\) that provides high-accuracy predictions. The student network \(\mathcal{S}\) with parameters \({\theta }_{S}\) is designed for efficient edge deployment. The knowledge distillation loss function combines the standard cross-entropy loss with the distillation loss:
where \({\mathcal{L}}_{CE}\) denotes the cross-entropy loss, \({\mathcal{L}}_{KL}\) represents the Kullback–Leibler divergence, \(\sigma \left(\cdot \right)\) is the softmax function, \({\text{z}}_{T}\) and \({\text{z}}_{S}\) are the logits from teacher and student networks respectively, \(T\) is the temperature parameter, and \(\alpha \in \left[0,1\right]\) balances the two loss components.
The knowledge distillation loss in Eq. (1) aligns the student’s softened output distribution with the teacher’s, enabling effective knowledge transfer with substantially fewer parameters. The T2 scaling preserves gradient magnitudes during soft-label training.
The student network structure is made up of l layers where the output of the = layer is calculated as:
where \({\text{W}}^{\left(l\right)}\in {\mathbb{R}}^{{n}_{l}\times {n}_{l-1}}\) and \({\text{b}}^{\left(l\right)}\in {\mathbb{R}}^{{n}_{l}}\) are the weight matrix and bias vector of layer l, \(\phi \left(\cdot \right)\) denotes the activation function, and \({\text{h}}^{\left(0\right)}=\text{x}\) is the input feature vector.
This standard feed-forward formulation is defined as in Eq. (2) enables hierarchical feature extraction while allowing the model complexity to be controlled through layer width and depth selection.
We also offer a dynamic quantization mechanism to increase precision according to the level of threats in order to decrease computational load. As a note to \({q}_{b}\) is the bit-width of quantization such that \({q}_{b}\in \{4,8,16,32\}\). The quantized weight \(\widehat{w}\) is calculated as:
where \({s}_{w}\) is the scaling factor and \({\text{round}}\left(\cdot \right)\) performs rounding to the nearest integer.
In one case, the Eq. (3) use uniform symmetric quantization maps full-precision weights to a discrete fixed-point representation, reducing memory access and arithmetic complexity proportional to the bit-width reduction.
The threat level \(\tau \left(t\right)\) at time t is approximated by exponential moving average of the recent outputs of the detection:
where \(\beta \in \left[0,1\right]\) is the smoothing parameter, \(W\) is the window size, and \({\mathbbm{1}}\left[\cdot \right]\) is the indicator function.
The exponential moving average in Eq. (4) provides a low-overhead threat estimate where β controls responsiveness to short-term fluctuations and W captures sustained attack patterns.
A quantization bit-width depending on the severity of threat:
where \({\tau }_{low}\), \({\tau }_{med}\), and \({\tau }_{high}\) are configurable threshold parameters.
Threat-aware dynamic quantization strategy is described in Eq. (5) employs low bit-widths during low-threat conditions to conserve energy, while escalating to full precision under high threat to preserve detection accuracy.
The EEIDM energy consumption is modelled as:
The energy scaling function f(qb) = (qb/32)2 models the quadratic reduction in computational energy with decreasing bit-width, reflecting how MAC operation energy scales quadratically with operand precision. This yields f(4) = 0.0156, f(8) = 0.0625, f(16) = 0.25, and f(32) = 1.0—meaning 4-bit quantization reduces per-MAC energy by ~ 98.4% versus full precision. The model was validated on Raspberry Pi 4 hardware, achieving less than 5.2% deviation from measured values across all bit-widths in Eq. (6).
The model quantization bit-width is chosen by the Algorithm 1 according to the present estimate level of threat. Reduced precision is applied when the risk is low so as to compute less energy is spent, whereas increased precision is applied when the risk is high so that quality of detection is maintained.
Dynamic threat-aware quantization
Lightweight cryptographic engine
The LCE module implements the ASCON authenticated encryption algorithm optimized for energy efficiency. ASCON operates on a 320-bit state \(S=\left({S}_{0},{S}_{1},{S}_{2},{S}_{3},{S}_{4}\right)\) where each \({S}_{i}\) is a 64-bit word. The permutation function \({p}^{a}\) applies \(a\) rounds of the following transformation:
where \({c}_{r}\) is the round constant for round \(r\).
The round constant addition in Eq. (7) prevents fixed-point behavior and ensures cryptographic diffusion at negligible computational cost.
The substitution layer uses a 5-bit S-box on each of the bit-slices across in each of the five state words:
In Eq. (8), The 5-bit S-box substitution introduces nonlinearity across bit-slices using simple Boolean logic, ensuring security at minimal computational overhead.
The linear diffusion layer offers the mixing of each word in 64-bits:
where \({>>>}\) denotes right rotation and \(\left({r}_{i,1},{r}_{i,2}\right)\) are rotation constants specific to each word.
Equation (9) The XOR-and-rotate diffusion layer propagates bit changes across the state using fixed rotation offsets, providing resistance to cryptanalytic attacks via lightweight bitwise operations.
The time of ASCON encryption of a message of m blocks is:
where \({E}_{init}\), \({E}_{block}\), and \({E}_{final}\) represent the energy for initialization, per-block processing, and finalization respectively.
Equation (10) linear energy model enables direct per-block cost comparison with conventional ciphers, confirming ASCON’s suitability for energy-constrained deployments.
To ensure security in the transfer of keys, we use an elliptic curve variant of the Diffie–Hellman (ECDH) protocol based on Curve25519 (our scalar multiplication of the curves is energy optimized):
The first public key is the result of \(Q\) and \(k\) where \(G\) is the location where the key is generated, and k is the secret scalar.
Equation (11) indicates Curve25519 scalar multiplication provides equivalent security strength to RSA-3072 using 256-bit keys, significantly reducing computational and energy requirements.
Its implementation of the Montgomery ladder makes it constant time:
where \({k}_{i}\) is the \(i\)-th bit of scalar \(k\).
Equation (12) describes The Montgomery ladder’s uniform execution pattern (one doubling and one addition per bit regardless of key value) provides inherent side-channel resistance while maintaining computational efficiency.
Hierarchical federated learning coordinator
The HFLC can facilitate joint model training over the distributed infrastructure and reduces the overheads in communication as well as energy usage. Let \(K\) denote the total number of participating nodes partitioned into \(G\) groups, where group \(g\) contains \({K}_{g}\) nodes with local datasets \({\mathcal{D}}_{k}\) for \(k\in {\mathcal{G}}_{g}\).
The local objective function for node \(k\) is:
where \({\ell}\left(\theta ;\text{x},y\right)\) is the loss function parameterized by model weights \(\theta\).
The global objective is the weighted average:
The hierarchical aggregation proceeds in two stages. First, intra-group aggregation at fog nodes computes:
Second, inter-group aggregation at the cloud computes the global model:
To reduce communication overhead, we employ gradient compression using Top-\(k\) sparsification:
where \({{\text{Top}}}_{k}\left(\cdot \right)\) selects the \(k\) largest magnitude gradients and \({{\text{Mask}}}_{k}\left(\cdot \right)\) generates the corresponding binary mask. In our experiments, k = 0.10·d (top 10%), yielding k = 15,600 for d = 156,000 parameters. Rates below 5% caused convergence instability; above 15% gave diminishing returns.
The communication energy for transmitting compressed gradients is:
where \({E}_{tx}\) and \({E}_{rx}\) are transmission and reception energy per bit, \({b}_{val}\) is bits per value, \({b}_{idx}\) is bits per index, and \({b}_{mask}\) is the mask overhead.
The sparsification mask overhead depends on encoding method: bitwise encoding requires d/8 bytes (bitmap), while index-based encoding uses k·⌈log₂(d)⌉ bits. For d = 156,000 parameters and k = 15,600 (10% sparsification), bitwise encoding yields 19.0 KB versus 34.2 KB for index-based, making bitwise encoding preferable above ~ 3% sparsification rates. Total transmission per FL round with bitmap encoding comprises gradient values (499,200 bits) plus mask (156,000 bits), totalling ~ 80.1 KB versus 97.5 KB with index encoding.
Hierarchical federated learning with gradient compression
Carbon-aware scheduling engine
The CASE module optimizes security workload allocation based on carbon intensity forecasts and renewable energy availability. Let \(\mathcal{N}=\{1,2,\ldots ,N\}\) denote the set of computational nodes and \(\mathcal{J}=\{1,2,\ldots ,J\}\) the set of security jobs to be scheduled.
The carbon intensity at node \(n\) and time \(t\) is denoted \({\gamma }_{n}\left(t\right)\) (kg CO2/kWh). The renewable energy fraction is:
Equation (19) defines this ratio enables carbon-aware scheduling by prioritizing workloads at nodes and times with higher renewable energy availability.
The scheduling decision variable \({x}_{j,n,t}\in \{0,1\}\) indicates whether job \(j\) is assigned to node \(n\) at time \(t\). The optimization objective minimizes total carbon emissions:
subject to:
where \({E}_{j}\) is the energy requirement of job \(j\), \({P}_{n}^{max}\) is the maximum power capacity of node \(n\), \({d}_{j}\) is the job duration, and \({D}_{j}\) is the deadline.
Equation (20) formulates carbon-weighted energy across all job-node-time assignments subject to: single-assignment per job Eq. (21), node capacity limits Eq. (22), and deadline constraints Eq. (23). The extended objective Eq. (24) adds a latency penalty weighted by the security priority ωj to balance carbon reduction with response timeliness.
In security sensitive tasks and jobs that have strict threshold of latency, we add a security priority weight. \({\omega }_{j}\):
An LSTM network models the forecast of the carbon intensity:
where \(h\) is the forecast horizon, \(W\) is the lookback window, and \({\text{z}}_{n}\left(t\right)\) represents auxiliary features (weather, time of day, etc.).
Equation (25) The LSTM forecaster uses two stacked LSTM layers (64 hidden units each) with a linear output layer, taking a 24-step (6-h) lookback window of historical carbon intensity, ambient temperature, solar irradiance, wind speed, cyclical time-of-day encoding, and day-of-week indicator as input. Trained on 25 days of German electricityMap data (MSE loss, Adam optimizer with lr = 0.001, batch size = 32, 200 epochs with early stopping, patience = 20) with a 4-h forecast horizon, it achieved MAE = 0.023, RMSE = 0.031 kg CO2/kWh, and R2 = 0.94 on a 5-day held-out test set, with 1.2 ms inference time.
Algorithm 3 presents the carbon-aware scheduling procedure.
Carbon-aware security job scheduling
Integrated system operation
Algorithm 4 presents the overall GreenShield framework operation, integrating all modules within a unified workflow.
This algorithm facilitates real-time threat classification and secure communication in a network environment while integrating federated learning for continuous model updates. It also optimizes scheduling based on carbon intensity, making it a carbon-aware solution. If you need further details or modifications, let me know!
GreenShield framework operation
Complexity analysis
The computational complexity of the EEIDM inference is \(O\left(L\cdot {n}_{max}^{2}\right)\) where \(L\) is the number of layers and \({n}_{max}\) is the maximum layer width. With dynamic quantization, the effective complexity reduces by factor \({\left({q}_{b}/32\right)}^{2}\).
The communication complexity of hierarchical federated learning is \(O\left(K\cdot k\cdot d\right)\) per round, where \(K\) is the number of nodes, \(k\) is the sparsification parameter, and \(d\) is the model dimension. The hierarchical structure reduces this to O((K + G)·s·d) by localizing most communication within groups.
In standard FedAvg, communication complexity is O(K·d) per round. GreenShield reduces this through two mechanisms: Top-k sparsification (transmitting only k = s·d parameters per node) and hierarchical aggregation (fog nodes aggregate K/G local updates before forwarding to cloud). This yields total complexity C_total = (K + G)·s·d. For our setup (K = 50, G = 3, s = 0.1, d = 156,000), this gives 826,800 values per round versus FedAvg’s 7,800,000—an 89.4% reduction in communication volume.
The carbon-aware scheduling optimization has complexity \(O\left(J\cdot N\cdot T\right)\) for the greedy assignment heuristic, where \(J\) is the number of jobs, \(N\) is the number of nodes, and \(T\) is the number of time slots.
Table 1 summarizes the complexity comparison with existing approaches.
Results and evaluation
In this section, the complete experimental analysis of the GreenShield framework, including dataset description and experimental set up, performance measurements, and comparison with state-of-the-art techniques will be presented.
Datasets
We evaluate GreenShield on two widely-used publicly available intrusion detection datasets:
-
UNSW-NB15 dataset: The dataset created by the Australian Centre for Cyber Security consists of 2,540,044 records and 49 features describing the network traffic patterns in the modern world. These types of attacks are nine, namely Fuzzers, Analysis, Backdoors, DoS, Exploits, Generic, Reconnaissance, Shellcode and Worms. The dataset is available at https://research.unsw.edu.au/projects/unsw-nb15-dataset.
-
CIC-IDS2017 dataset: This dataset is the result of the Canadian Institute of Cybersecurity, which was created based on real network traffic during five days with both benign traffic and attack traffic. It contains some 2.8 million records that have 78 features and ranges of attacks range to Brute Force, Heartbleed, Botnet, DoS, DDoS, Web Attack, and Infiltration. The dataset is accessible at https://www.unb.ca/cic/datasets/ids-2017.html.
Table 2 presents the detailed statistics of both datasets used in our experiments.
Experimental setup
The heterogeneous testbed is the cut environment, and the simulated environment is edge–fog–cloud architecture. Hardware and software arrangement is outlined in Table 3.
The teacher network architecture is a network comprising of five entirely connected layers, the dimensions of which are [input, 512, 256, 128, 64, output] performing the ReLU activation, and batch normalization. The student network is reduced to a network, [input, 128, 64 32, output]. The Intel RAPL oil CPU/memory power measurements and NVIDIA SMI power monitoring of GPUs and carbon intensity prevention are measured using electricityMap API.
Testbed: hybrid real-and-emulated distributed environment
The setup spanned three tiers—cloud, fog, and edge. The cloud used a dedicated university data center server on a 10 Gbps backbone. Three fog nodes ran on campus workstations connected via a Layer-3 switch emulating WAN conditions (100 Mbps, 15 ms latency). Eight Raspberry Pi 4 devices formed the edge tier over 802.11ac Wi-Fi (45 Mbps, 8 ms latency). Network impairments (± 2 ms jitter, 0.1% packet loss, bandwidth variation) were emulated using Linux tc/NetEm. Federated learning was coordinated via Flower 1.5.0 with gRPC over TLS 1.3. Fog/cloud nodes used Docker 24.0 for reproducibility; edge devices ran native PyTorch 2.1.0 on ARM.
Carbon intensity data was collected via the electricityMap API (v3) at 15-min resolution over a 30-day period (March 1–30, 2025). Germany (DE) served as the primary region representing a mixed-grid scenario with average intensity of 0.338 kg CO2/kWh, supplemented by Norway (NO-NO1, hydro-dominant, 0.024 kg CO₂/kWh) and Poland (PL, coal-dominant, 0.712 kg CO2/kWh) to capture diverse carbon profiles. The three intensity levels reported in Table 6—high (0.8), medium (0.4), and low (0.1) kg CO2/kWh—correspond to Poland’s 90th percentile, Germany’s median, and Norway’s 10th percentile respectively. All timestamps were NTP-synchronized across nodes, and mixed-grid averages were derived as time-weighted means over the German dataset.
Energy measurement followed a hierarchical approach across all tiers. Cloud and fog nodes used Intel RAPL counters (100 ms intervals) for CPU/DRAM energy via the powercap interface, and nvidia-smi (200 ms intervals) for GPU energy. Edge devices (Raspberry Pi 4), lacking hardware counters, were instrumented with external Monsoon HVPM power monitors sampling at 5 kHz (± 0.2% accuracy). Network energy was estimated using calibrated per-bit costs (E_tx = 48.7 nJ/bit, E_rx = 36.4 nJ/bit) derived from iperf3 tests with concurrent power measurement. Total system energy was aggregated as E_total = ∑E_cloud + ∑E_fog + ∑E_edge + ∑E_network, with each component accounting for both computation and idle power weighted by active duty cycles.
All baseline methods in Table 7 were re-implemented on the same hardware testbed using identical dataset splits (UNSW-NB15 and CIC-IDS2017). Each method followed its original architecture and hyperparameters, with official code used where publicly available. Energy and carbon measurements were conducted on the same Raspberry Pi 4 and cloud server for hardware-consistent comparisons. The Year column reflects original publication year, not re-implementation. All metrics are averaged over 10 independent runs with different random seeds.
Evaluation metrics
We evaluate GreenShield using the following metrics:
-
Detection performance: Polarity (Acc) and Precision (P), Recall (R), F1-Score (F1) and area under ROC curve (AUC).
-
Energy efficiency: Energy per inference (mJ), energy total training energy (kWh) and power consumption (W).
-
Carbon footprint: CO2 emissions (kg CO2-eq/h), the efficiency of the utilization of carbon intensity.
-
Communication efficiency: Rate of bytes offloaded per round compression ratio.
-
Latency: The inference time (ms), end-to-end detection latency (ms).
Detection performance analysis
The convergence of training loss in both teacher and student networks in terms of training epochs are shown in Fig. 3. Given that the student network has 85% fewer parameters, knowledge distillation is proven to be effective.
Training loss convergence comparison between teacher network (blue), student network with KD (orange), and student network without KD (green) on UNSW-NB15 dataset.
The progression of the accuracy in the training as shown in Fig. 4 reveals that the student network based on knowledge distillation attains accuracy of 98.73% versus the teacher network of 99.12%, which involves only a 0.39% accuracy trade-off to achieve 67.4% of energy decreased.
Detection accuracy versus training epochs for teacher and student networks on UNSW-NB15 and CIC-IDS2017 datasets.
In Table 4 statistical significance was assessed via two-tailed paired t-tests across 10 runs with stratified fivefold cross-validation (50 paired observations per comparison). Normality and variance homogeneity were verified using Shapiro–Wilk and Levene’s tests respectively. McNemar’s test was additionally applied for classification-level metrics. All p values use α = 0.05 with Bonferroni correction for multiple comparisons.
Figure 5 represents the confusion matrix of multi-class attack classification of UNSW-NB15 dataset that shows a good discriminating ability in the entire category of attacks.
Confusion matrix for GreenShield multi-class classification on UNSW-NB15 dataset showing attack category discrimination performance.
Figure 6 shows the ROC curves of binary classification (normal vs. attack) and the classification under attack category showing the high discrimination ability (such as the AUC value of more than 0.99).
ROC curves for binary and multi-class classification showing AUC performance across attack categories on both datasets.
Energy efficiency analysis
Table 5 provides a detailed comparison of energy consumption of cloud, edge and hierarchical federated deployment. Alongside absolute energy measurement, relative efficiencies decreases especially versus the strongest baseline are also reported so as to provide context on energy efficiency gain. Repeated statistical analysis establishes that FedAvg and Strong intrusion detection performance is achieved, but GreenShield statistically reduces energy consumption relative to FedAvg (p < 0.05) at the same time.
Figure 7 shows the energy consumption as per the quantization levels and deployment conditions in the various cases where act of dynamism quantization saves a lot of energy.
Energy consumption comparison: (a) Inference energy across quantization levels, (b) Communication energy with gradient compression, (c) Total daily energy consumption across deployment scenarios.
Carbon footprint analysis
Table 6 puts carbon emissions in perspective by calculating the kg CO2-eq data to actual-world equivalent operating on the assumption of as much as 0.35–0.45 kg CO2 per server-hour (data-center) server energy usage, with the grid intensity used as a proxy. Considering the example provided above, the classic IDS implementation with 25–5 kg CO2-equivalent per hour of emissions will take over 1 h of uninterrupted server operation, but the same GreenShield lowers the emissions to less than 0.5 kg CO2-equivalent per hour, or less than 10 min of the server run time. This demonstrates the high sustainability benefits obtained by carbon-conscious scheduling and adaptive security implementation.
Figure 8 shows the carbon emissions during the 24 h with differing renewable energy availability, which confirms that the carbon-aware scheduling algorithm is efficient.
Carbon emissions analysis: (a) Hourly carbon intensity variation and scheduling decisions, (b) Cumulative carbon emissions comparison with and without CASE, (c) Renewable energy utilization efficiency.
Comparative analysis
Table 7 provides a comprehensive comparison of GreenShield with ten state-of-the-art baseline methods.
Ablation study
The ablation analysis in Table 8 is conducted on the proposed GreenShield framework component-wisely and this reveals that component of the design framework contributes to the detection accuracy, the energy consumption, the carbon emission and the latency. A paired test is used to evaluate the statistical significance versus the complete configuration of GreenShield.
Scalability analysis
Table 9 examines the framework’s scalability across different numbers of edge nodes.
Real-world deployment scenarios
Figure 9 shows the performance of three deployment cases: urban smart city, rural IoT network and adversarial conditions.
Performance evaluation across deployment scenarios: (a) Urban smart city with high traffic volume, (b) Rural IoT with intermittent connectivity, (c) Adversarial conditions with sophisticated attack patterns.
Discussion
The experimental outcomes indicate that GreenShield is efficient in dealing with the issue of cybersecurity efficacy and environmental sustainability balance. A number of major results are worth a discussion (Table 10).
-
Critical Infrastructure trade-off analysis: While the 0.39% accuracy trade-off (99.12% → 98.73%) is acceptable in most contexts, mission-critical deployments (e.g., nuclear monitoring, air traffic control) can enable CRITICAL_MODE, which locks quantization to 32-bit full precision. This disables energy optimization but retains hierarchical FL (58.2% communication reduction) and ASCON cryptography (52% energy reduction), yielding 42.3% overall energy savings at full teacher-equivalent accuracy. Notably, the accuracy drop primarily affects low-prevalence attack classes (Worms: 0.03%, Analysis: 0.50%), while high-consequence categories (DoS, Exploits, Generic) maintain F1-scores above 0.99 even under dynamic quantization. Deployment planners are advised to conduct site-specific risk assessments using the per-class confusion matrices (Fig. 5) to determine the appropriate accuracy-energy trade-off for their threat model.
-
Threshold sensitivity analysis: Threat-level thresholds (τ_low = 0.05, τ_med = 0.15, τ_high = 0.35) were determined via grid search on UNSW-NB15, optimizing the F1-score vs. energy Pareto frontier. Perturbation analysis (± 50% variation) showed moderate sensitivity to τ_low (± 0.12% accuracy, ± 8.4% energy) but low sensitivity to τ_high (± 0.03%, ± 2.1%), as high-threat conditions always trigger full precision. For deployment, lower thresholds (τ_low = 0.03, τ_med = 0.10) suit benign-dominant environments, while higher values (τ_low = 0.10, τ_med = 0.25) are recommended for attack-heavy settings. Adaptive calibration via a running false-positive rate monitor is identified as a promising future direction.
-
Experiments varying ωj from 0 to 10 across 1000 simulated security jobs revealed a clear carbon-latency trade-off: ωj = 0 maximizes carbon reduction (97.6%) but incurs 847 ms worst-case latency, while the default ωj = 1.0 balances 85.4% carbon reduction with 234 ms latency—within NIST SP 800-94’s 500 ms threshold. For latency-critical environments, ωj = 3.0–5.0 is recommended, and CRITICAL-classified jobs always bypass carbon optimization entirely for immediate scheduling (Table 11).
-
Limitations and Future Directions: Though GreenShield has proven to be effective, there are a number of limitations worth discussing. To start with, the model is based on proper prediction of short-term carbon intensity to facilitate sound carbon-minded scheduling. Although the suggested LSTM-based predictor can be effectively used within a 6-h horizon, the uncertainty of the forecasts to longer horizon limits the scope of time scheduling optimization. Second, the existing system design presupposes rather homogeneous threat distribution among the participating edge nodes. In practice, attack patterns can be spatially and temporally skewed which can adversely influence the optimality of hierarchical aggregation and dynamic quantization decision making. Third, aggressive 4-bit quantization has significantly high energy and carbon savings but has a quantifiable error rate (up to 1.84) that can be unacceptable in a mission-critical or high-assurance security system. Lastly, the assessment of these scenarios is mainly about intrusion over a network and how the framework can be used to address other types of attacks like encrypted traffic inspection or application layer attacks has not been studied yet. The work-related limitations will be overcome in the future with references to uncertainty-aware carbon forecasting, heterogeneity-aware federated aggregation, adaptive mixed-precision quantization, and extended coverage of attacks maintaining different threat models.
The results as reported in Table 7 confirm that GreenShield has the better overall balance in terms of detection performance, energy efficiency, and carbon footprint metrics than the available methods. Although certain techniques are slightly more accurate (e.g. 99.01% GreenShield 8.12 mJ), none can match its energy use (8.12 mJ vs. 28.45), or carbon footprint (0.07 kg/h vs. 1.38 kg/h).
Conclusion
This paper presented GreenShield, a unified low-carbon cybersecurity framework integrating energy-efficient intrusion detection, ASCON lightweight cryptography, hierarchical federated learning, and carbon-aware scheduling across edge–fog–cloud architectures. Experimental evaluation on UNSW-NB15 and CIC-IDS2017 datasets demonstrated 98.73% detection accuracy with 67.4% energy reduction and up to 97.6% operational carbon savings compared to conventional deep learning-based IDS. The dynamic quantization mechanism adapts model precision to real-time threat levels, while hierarchical federated learning with gradient compression reduces communication overhead by 58.2%. The carbon-aware scheduling engine aligns security workloads with renewable energy availability, transforming security operations from energy-blind overheads into carbon-conscious processes. GreenShield provides a practical blueprint for organizations aligning cybersecurity with ESG commitments and green IT regulations. Future work will extend the framework to adversarial federated settings, uncertainty-aware carbon optimization, and neuromorphic computing integration for next-generation sustainable cybersecurity.
Data availability
The datasets used in this study are publicly available: UNSW-NB15: https://research.unsw.edu.au/projects/unsw-nb15-dataset. CIC-IDS2017: https://www.unb.ca/cic/datasets/ids-2017.html. Carbon intensity data were obtained from the electricityMap API (v3). The complete GreenShield implementation, hyperparameters, experimental configurations, and random seeds are publicly available at: https://github.com/abdullahtsu/GreenShield) All experiments were conducted with fixed random seeds for reproducibility, and 10 independent runs were averaged for statistical robustness.
References
Roy, S., Sankaran, S. & Zeng, M. Green intrusion detection systems: A comprehensive review and directions. Sensors 24(17), 5516. https://doi.org/10.3390/s24175516 (2024).
He, P., Zhou, Y. & Qin, X. A survey on energy-aware security mechanisms for the Internet of Things. Future Internet 16(4), 128. https://doi.org/10.3390/fi16040128 (2024).
Achuthan, K., Sankaran, S., Roy, S. & Raman, R. Integrating sustainability into cybersecurity: Insights from machine learning based topic modeling. Discov. Sustain. 5, 44. https://doi.org/10.1007/s43621-024-00754-w (2024).
Tabbakh, L. et al. Towards sustainable AI: A comprehensive framework for green AI. Discov. Sustain. 5, 408. https://doi.org/10.1007/s43621-024-00641-4 (2024).
Alazzawi, M. Q., Sánchez-Aarnoutse, J.-C., Martínez-Sala, A. S. & Cano, M.-D. Green IoT: Energy efficiency, renewable integration, and security implications. IET Netw. 14(1), e70003. https://doi.org/10.1049/ntw2.70003 (2025).
Ranpara, R., Alsalman, O., Kumar, O. P. & Patel, S. K. A simulation-driven computational framework for adaptive energy-efficient optimization in machine learning-based intrusion detection systems. Sci. Rep. 15, 13376. https://doi.org/10.1038/s41598-025-93254-4 (2025).
Umar, H. G. A. et al. Energy-efficient deep learning-based intrusion detection system for edge computing: A novel DNN-KDQ model. J. Cloud Comput. 14, 32. https://doi.org/10.1186/s13677-025-00762-9 (2025).
Alsaleh, S., Menai, M. E. B. & Al-Ahmadi, S. A heterogeneity-aware semi-decentralized model for a lightweight intrusion detection system for IoT networks based on federated learning and BiLSTM. Sensors 25(4), 1039. https://doi.org/10.3390/s25041039 (2025).
Fatima, M., Rehman, O., Rahman, I. M. H., Ajmal, A. & Park, S. J. Towards ensemble feature selection for lightweight intrusion detection in resource-constrained IoT devices. Future Internet 16(10), 368. https://doi.org/10.3390/fi16100368 (2024).
Javed, A. et al. Implementation of lightweight machine learning-based intrusion detection system on IoT devices of smart homes. Future Internet 16(6), 200. https://doi.org/10.3390/fi16060200 (2024).
Slimani, L. et al. A study on characterizing energy, latency and security for intrusion detection systems on heterogeneous embedded platforms. Future Gener. Comput. Syst. 162, 107478. https://doi.org/10.1016/j.future.2024.07.051 (2025).
de Farias, J. C. L. A. & Hirata, C. M. Designing energy-aware collaborative intrusion detection in IoT networks. J. Inf. Secur. Appl. 81, 103715. https://doi.org/10.1016/j.jisa.2024.103715 (2024).
Yaras, S. & Dener, M. IoT-based intrusion detection system using new hybrid deep learning algorithm. Electronics 13(6), 1053. https://doi.org/10.3390/electronics13061053 (2024).
Aljuaid, W. H. & Alshamrani, S. S. A deep learning approach for intrusion detection systems in cloud computing environments. Appl. Sci. 14(13), 5381. https://doi.org/10.3390/app14135381 (2024).
Soto-Cruz, J. et al. A survey of efficient lightweight cryptography for power-constrained microcontrollers. Technologies 13(1), 3. https://doi.org/10.3390/technologies13010003 (2025).
Verma, J., Bhandari, A. & Singh, G. iNIDS: SWOT analysis and TOWS inferences of state-of-the-art NIDS solutions for the development of Intelligent Network Intrusion Detection System. Comput. Commun. 195, 227–247. https://doi.org/10.1016/j.comcom.2022.08.022 (2022).
Snehi, M., Verma, J., Kansal, I., Popli, R., Kumar, R. & Saini, G. S. Intelligent service oriented architecture (SOA) for state-of-the-art IoT-DDoS defense and research challenges. In Proceedings of the 2023 International Conference on IoT, Communication and Automation Technology (ICICAT), Gorakhpur, India, 1–4 (2023). https://doi.org/10.1109/ICICAT57735.2023.10263635.
Verma, J., Bhandari, A. & Singh, G. Feature selection algorithm characterization for NIDS using machine and deep learning. In Proceedings of the 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), 1–7 (2022). https://doi.org/10.1109/IEMTRONICS55184.2022.9795709.
Verma, J., Bhandari, A. & Singh, G. Network intrusion detection system employing big data and intelligent learning methods. In Proceedings of the 2022 4th International Conference on Artificial Intelligence and Speech Technology (AIST), 1–6 (IEEE, 2022). https://doi.org/10.1109/AIST55798.2022.10064829.
Radhakrishnan, S., Jadon, S. & Honnavalli, P. B. Efficiency and security evaluation of lightweight cryptographic algorithms for resource-constrained IoT devices. Sensors 24(12), 4008. https://doi.org/10.3390/s24124008 (2024).
Khan, S. et al. Securing the IoT ecosystem: ASIC-based hardware realization of ASCON lightweight cipher. Int. J. Inf. Secur. 23(6), 3653–3664. https://doi.org/10.1007/s10207-024-00904-1 (2024).
Nguyen, K.-D. et al. ASIC implementation of ASCON lightweight cryptography for IoT applications. IEEE Trans. Circuits Syst. II Express Briefs 72(1), 278–282. https://doi.org/10.1109/TCSII.2024.3483214 (2025).
Zhong, Y. & Gu, J. Lightweight block ciphers for resource-constrained environments: A comprehensive survey. Future Gener. Comput. Syst. 157, 288–302. https://doi.org/10.1016/j.future.2024.03.054 (2024).
Alwageed, H. S. et al. An empirical study for mitigating sustainable cloud computing challenges using ISM-ANN. PLoS ONE 19(9), e0308971. https://doi.org/10.1371/journal.pone.0308971 (2024).
Shi, C. et al. Security-aware energy-efficient design for mobile edge computing network operating with finite blocklength codes. EURASIP J. Wirel. Commun. Netw. https://doi.org/10.1186/s13638-024-02395-z (2024).
Habibullah, S. M., Alam, S., Ghosh, S., Dey, A. & De, A. Blockchain-based energy consumption approaches in IoT. Sci. Rep. 14, 28088. https://doi.org/10.1038/s41598-024-77792-x (2024).
Al Shareef, A. M., Seçkiner, S., Eid, B. & Abumeteir, H. Integration of blockchain with artificial intelligence technologies in the energy sector: A systematic review. Front. Energy Res. https://doi.org/10.3389/fenrg.2024.1377950 (2024).
Lee, G. H. & Han, J. An edge-based intelligent IoT control system: Achieving energy efficiency with secure real-time incident detection. J. Netw. Syst. Manag. 33, 13. https://doi.org/10.1007/s10922-024-09888-8 (2025).
Mahmud, S. A., Islam, N., Islam, Z., Rahman, Z. & Mehedi, S. T. Privacy-preserving federated learning-based intrusion detection technique for cyber-physical systems. Mathematics 12(20), 3194. https://doi.org/10.3390/math12203194 (2024).
Nguyen, H. P. & Chen, Y. Lightweight, post-quantum secure cryptography based on Ascon: Hardware implementation in automotive applications. Electronics 13(22), 4550. https://doi.org/10.3390/electronics13224550 (2024).
Lee, H. J. et al. LAMT: Lightweight and anonymous authentication scheme for medical Internet of Things services. Sensors 25(3), 821. https://doi.org/10.3390/s25030821 (2025).
Dahiphale, V., Raut, H., Bansod, G. & Dahiphale, D. Securing IoT devices with fast and energy efficient implementation of PRIDE and PRESENT ciphers. Cyber Secur. Appl. 3, 100055. https://doi.org/10.1016/j.csa.2024.100055 (2024).
Sultan, I. & Banday, M. T. An energy efficient encryption technique for the Internet of Things sensor nodes. Int. J. Inf. Technol. 16, 2517–2533. https://doi.org/10.1007/s41870-024-01750-z (2024).
Aljaedi, A. R. et al. A lightweight encryption algorithm for resource-constrained IoT devices using quantum and chaotic techniques with metaheuristic optimization. Sci. Rep. 15, 14050. https://doi.org/10.1038/s41598-025-97822-6 (2025).
Zinabu, N. G. et al. Comprehensive analysis of lightweight cryptographic algorithms for battery-limited Internet of Things devices. Int. J. Distrib. Sens. Netw. https://doi.org/10.1155/dsn/9639728 (2025).
Walling, S. et al. Network intrusion detection system for IoT security using machine learning and statistical based hybrid feature selection. Secur. Priv. https://doi.org/10.1002/spy2.429 (2024).
Bazgir, O., Gali, S. & Nikoubin, T. Area-power and energy efficient substitution box (S-box) in advanced encryption standard (AES). In Proceedings of the GLSVLSI ’24, 263–267 (2024). https://doi.org/10.1145/3649476.3658765.
Thakur, S., Banik, S. & Regazzoni, F. Energy analysis of cryptographic algorithms in server environment. In Proceedings of the CCSW ’24 (2024). https://doi.org/10.1145/3689938.3694775.
Che, X., He, Y., Feng, X., Sun, K., Xu, K. & Li, Q. BlueSWAT: A lightweight state-aware security framework for bluetooth low energy. In Proceedings of the ACM CCS ’24, (2024). https://doi.org/10.1145/3658644.3670397.
Acknowledgements
The aurthor extend their appreciation to the Deputyship for Research and Innovation, Ministry of Education in Saudi Arabia, for funding this research work through the project number (0054-1446-S).
Funding
This research was funded through the project number (0054-1446-S).
Author information
Authors and Affiliations
Contributions
Conceptualization: Abdullah Alshammari Methodology: Abdullah Alshammari Software: Abdullah Alshammari Formal analysis: Abdullah Alshammari Resources: Abdullah Alshammari Writing—review and editing: Abdullah Alshammari Funding acquisition: Abdullah Alshammari.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Alshammari, A. A unified low-carbon cybersecurity framework integrating energy-efficient intrusion detection, lightweight cryptography, and carbon-aware scheduling for edge–cloud architectures. Sci Rep 16, 10603 (2026). https://doi.org/10.1038/s41598-026-44260-7
Received:
Accepted:
Published:
Version of record:
DOI: https://doi.org/10.1038/s41598-026-44260-7















