IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

AWARE ADAPTIVE ENCRYPTION SYSTEM (CAAES)

AUTHORS:
Kalpana . J
Mentor
Dr. S K . Piramu Preethika
Affiliation
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

The proliferation of Internet of Things (IoT) devices across healthcare, smart cities, industrial automation, and environmental monitoring has created unprecedented opportunities for innovation while simultaneously introducing significant challenges in ensuring secure communication. Traditional static encryption mechanisms, though effective in fixed contexts, often fail to balance cryptographic strength with the resource constraints of heterogeneous IoT environments. Devices differ in computational capacity, energy availability, and data sensitivity, and static approaches impose uniform cryptographic requirements that lead to inefficiencies, latency, and excessive energy consumption. Moreover, static encryption is unable to respond to evolving threats, leaving IoT networks vulnerable to replay, brute force, and man‑in‑the‑middle attacks. These limitations necessitate a paradigm shift toward adaptive security frameworks capable of dynamically adjusting to contextual changes.

Keywords
Article Metrics
Article Views
52
PDF Downloads
2
HOW TO CITE
APA

MLA

Chicago

Copy

J, K. .. (2026). Aware Adaptive Encryption System (Caaes). International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.128

J, Kalpana. "Aware Adaptive Encryption System (Caaes)." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.128.

J, Kalpana. "Aware Adaptive Encryption System (Caaes)." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.128.

References
[1] W. Stallings, Cryptography and Network Security: Principles and Practice, 8th ed. Upper Saddle River, NJ, USA: Pearson, 2023.

[2] A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC Press, 1996.

[3] D. Boneh and V. Shoup, A Graduate Course in Applied Cryptography. Stanford University, 2020.

[4] R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, Jul. 2013.

[5] S. Raza, L. Wallgren, and T. Voigt, “SVELTE: Real-time intrusion detection in the Internet of Things,” Ad Hoc Networks, vol. 11, no. 8, pp. 2661–2674, Nov. 2013.

[6] H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the Internet of Things: A review,” in Proc. Int. Conf. on Computer Science and Electronics Engineering (ICCSEE), Hangzhou, China, 2012, pp. 648–651.

[7] A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, “Fog computing for the Internet of Things: Security and privacy issues,” IEEE Internet Computing, vol. 21, no. 2, pp. 34–42, Mar.–Apr. 2017.

[8] Y. Zhang, R. Deng, and D. Zheng, “Adaptive encryption for IoT communications based on context awareness,” IEEE Access, vol. 7, pp. 65932–65945, 2019.

[9] M. Ammar, G. Russello, and B. Crispo, “Internet of Things: A survey on the security of IoT frameworks,” Journal of Information Security and Applications, vol. 38, pp. 8–27, Feb. 2018.

[10] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the Internet of Things,” IEEE Access, vol. 4, pp. 2292–2303, 2016.

 
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
IOT Based Home Automation using Voice Control
string(21) "Shreyash S. Nannajkar" Nannajkar, S. S.et al.
(2026)
DOI: 10.55041/ijsmt.v2i4.032
A Study on Green HRM Practices and Employee Environmental Commitment at a Leading FMCG Company
string(22) "Aayushi Gandhi Student" Student, A. G.
(2026)
DOI: 10.55041/ijsmt.v2i5.204
Financial Health of Power Distribution Companies in India:A Comparative Analysis
string(14) "Priya Shrimali" Shrimali, P.
(2026)
DOI: 10.55041/ijsmt.v2i3.246
Scroll to Top