AWARE ADAPTIVE ENCRYPTION SYSTEM (CAAES)
The proliferation of Internet of Things (IoT) devices across healthcare, smart cities, industrial automation, and environmental monitoring has created unprecedented opportunities for innovation while simultaneously introducing significant challenges in ensuring secure communication. Traditional static encryption mechanisms, though effective in fixed contexts, often fail to balance cryptographic strength with the resource constraints of heterogeneous IoT environments. Devices differ in computational capacity, energy availability, and data sensitivity, and static approaches impose uniform cryptographic requirements that lead to inefficiencies, latency, and excessive energy consumption. Moreover, static encryption is unable to respond to evolving threats, leaving IoT networks vulnerable to replay, brute force, and man‑in‑the‑middle attacks. These limitations necessitate a paradigm shift toward adaptive security frameworks capable of dynamically adjusting to contextual changes.
J, K. .. (2026). Aware Adaptive Encryption System (Caaes). International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.128
J, Kalpana. "Aware Adaptive Encryption System (Caaes)." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.128.
J, Kalpana. "Aware Adaptive Encryption System (Caaes)." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.128.
[2] A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC Press, 1996.
[3] D. Boneh and V. Shoup, A Graduate Course in Applied Cryptography. Stanford University, 2020.
[4] R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, Jul. 2013.
[5] S. Raza, L. Wallgren, and T. Voigt, “SVELTE: Real-time intrusion detection in the Internet of Things,” Ad Hoc Networks, vol. 11, no. 8, pp. 2661–2674, Nov. 2013.
[6] H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the Internet of Things: A review,” in Proc. Int. Conf. on Computer Science and Electronics Engineering (ICCSEE), Hangzhou, China, 2012, pp. 648–651.
[7] A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, “Fog computing for the Internet of Things: Security and privacy issues,” IEEE Internet Computing, vol. 21, no. 2, pp. 34–42, Mar.–Apr. 2017.
[8] Y. Zhang, R. Deng, and D. Zheng, “Adaptive encryption for IoT communications based on context awareness,” IEEE Access, vol. 7, pp. 65932–65945, 2019.
[9] M. Ammar, G. Russello, and B. Crispo, “Internet of Things: A survey on the security of IoT frameworks,” Journal of Information Security and Applications, vol. 38, pp. 8–27, Feb. 2018.
[10] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the Internet of Things,” IEEE Access, vol. 4, pp. 2292–2303, 2016.