Secure IoT Communication in Distributed Systems Using Adaptive Symmetric Key Encryption
Keywords:
IoT Security, Adaptive Encryption, Symmetric Key Cryptography, Distributed Systems, Secure Communication, Lightweight Encryption, Key Management, Data Privacy, Network Security, Smart SystemsAbstract
The rapid proliferation of Internet of Things (IoT) devices in distributed systems has significantly enhanced connectivity and real-time data exchange across diverse applications such as smart cities, healthcare, and industrial automation. However, this widespread deployment introduces critical challenges related to data security, privacy, and efficient communication, particularly in resource-constrained and heterogeneous environments. Traditional encryption techniques often fail to meet the dynamic requirements of IoT systems due to their computational overhead and lack of adaptability. This paper proposes a novel approach for secure IoT communication in distributed systems using adaptive symmetric key encryption, which dynamically adjusts encryption parameters based on network conditions, device capabilities, and data sensitivity. The proposed system employs a lightweight symmetric encryption mechanism combined with an adaptive key generation and management strategy to ensure secure data transmission while minimizing computational and energy costs. The framework integrates real-time monitoring and intelligent decision-making to optimize encryption strength, thereby achieving a balance between security and performance. Furthermore, the system incorporates robust authentication protocols and secure key distribution techniques to prevent unauthorized access and mitigate common attacks such as replay attacks, man-in-the-middle attacks, and data tampering. Experimental evaluation demonstrates that the proposed approach significantly improves communication efficiency, reduces latency, and enhances overall system security compared to conventional methods. The results indicate that adaptive symmetric key encryption is a promising solution for securing communication in distributed IoT environments, offering scalability, flexibility, and resilience against evolving cyber threats. This work contributes toward the development of intelligent, secure, and efficient IoT communication frameworks for next-generation distributed systems.
Downloads
References
D. Shivaramakrishna, M. Nagaratna, “A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management and Time-Limited access control”, Alexandria Engineering Journal 84 (2023) 275–284
Yuan Cheng, Yanan Liu, Zheng Zhang and Yanxiu Li, “An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks”, Sensors 2023, 23, 6460
Miodrag J. Mihaljevi´c, Milica Kneževi´c, Dragan Uroševi´c, Lianhai Wang, Shujiang Xu, “An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT”, Symmetry 2023, 15, 299
Daniel A. F. Saraiva, Valderi Reis Quietinho Leithardt, Diandre de Paula, André Sales Mendes, Gabriel Villarrubia González, Paul Crocker, “PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices”, Sensors 2019, 19, 4312
Umer Farooq, Najam Ul Hasan, Imran Baig, Naeem Shehzad, “Efficient adaptive framework for securing the Internet of Things devices”, URASIP Journal on Wireless Communications and Networking (2019) 2019:210
Department of Information Technology, KLN College of Engineering, Madurai, India, G. Ramesh, J. Logeshwaran, Department of ECE, Sri Eshwar College of Engineering, Coimbatore, India, V. Aravindarajan, and Department of Information Technology, KLN College of Engineering, Madurai, India, “A Secured Database Monitoring Method to Improve Data Backup and Recovery Operations in Cloud Computing,” BIJCS, vol. 2, no. 1, pp. 1–7, 2023, doi: 10.54646/bijcs.019.
“Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network | SpringerLink.” Accessed: Aug. 27, 2023. [Online].
S. Shakya, An efficient security framework for data migration in a cloud computing environment, JAICN 01 (01) (2019) 45–53, https://doi.org/10.36548/ jaicn.2019.1.006.
Z. Wang, N. Wang, X. Su, S. Ge, An empirical study on business analytics affordances enhancing the management of cloud computing data security, Int. J. Inf. Manag. 50 (2020) 387–394
H. Qiu, M. Qiu, M. Liu, G. Memmi, Secure Health Data Sharing for Medical CyberPhysical Systems for the Healthcare 4.0, IEEE J. Biomed. Health Inform. 24 (9) (2020) 2499–2505
P. Wei, D. Wang, Y. Zhao, S.K.S. Tyagi, N. Kumar, Blockchain data-based cloud data integrity protection mechanism, Futur. Gener. Comput. Syst. 102 (2020) 902–911
G.S. Aujla, A. Singh, M. Singh, S. Sharma, N. Kumar, K.-K.-R. Choo, BloCkEd: blockchain-based secure data processing framework in edge envisioned V2X environment, IEEE Trans. Veh. Technol. 69 (6) (2020) 5850–5863
C. Feng, et al., Efficient and secure data sharing for 5G flying drones: A blockchainenabled approach, IEEE Netw. 35 (1) (2021) 130–137, https://doi.org/10.1109/ MNET.011.2000223.
“Sustainability | Free Full-Text | A Secure Data Sharing Platform Using Blockchain and Interplanetary File System.” Accessed: Aug. 27, 2023. [Online]. Available: htt ps://www.mdpi.com/2071-1050/11/24/7054.
“Enhancing the security of cloud data using hybrid encryption algorithm | SpringerLink.” Accessed: Aug. 27, 2023. [Online]. Available: https://link.springer. com/article/10.1007/s12652-019-01403-1
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.


