
Figure 9: Encrypted Receiver.
6 CONCLUSION AND FUTURE
WORK
This study shows that AES encryption is highly
effective in protecting IoT systems from unauthorized
access and cyber threats. It provides a strong yet
efficient encryption method that works well even on
devices with limited processing power. To ensure
secure and reliable data transmission, the study also
integrates TCP (Transmission Control Protocol),
which guarantees that encrypted data is delivered in
the correct order and without errors.
This makes AES and TCP a great com bination
for IoT applications that require continuous, secure
communication, such as smart homes, industrial
automation, and healthcare monitoring. The results
indicate that AES encryption adds very little delay
while still maintaining high security, making it
suitable for real-time applications. When compared to
older encryption methods, AES proves to be more
secure and more efficient, making it a preferred
choice for modern IoT systems. Future Research
Directions: Looking ahead, researchers can work on:
Optimizing encryption for ultra-low-power IoT
devices to enhance efficiency. Exploring hybrid en
cryption methods to improve security while
conserving energy. Developing lightweight
cryptographic techniques to strengthen security in
constrained environments, making se cure IoT
systems more widely accessible. Figure 9 shows the
Encrypted Receiver.
REFERENCES
Alaba, F. A., Othman, M., Hashem, I. A. T., Alotaibi, F.
(2017). Internet of Things security: A survey. Journal
of Network and Computer Applications, 88, 10-28.
Gurung, R. B., Lin, Y. D., Huang, Y. C. (2019).
Lightweight Intrusion Detection for IoT Systems Using
Convolutional Neural Networks. IEEE Internet of
Things Journal, 6(5), 8170-8179.Improving Chain of
Custody in Forensic Investigation of Electronic Digital
Systems Giuliano Giova.
H. Zhang, Y. Liu, and X. Wang, “Research on Data
Encryption Standard Based on AES Algorithm in
Internet of Things Environment,” International
Conference on Advanced Technologies for
Communications (ATC), 2020. Available:
ResearchGate.
H. Zhang, Y. Liu, and X. Wang, “Research on Data
Encryption Standard Based on AES Algorithm in
Internet of Things Environment,” International
Conference on Advanced Technologies for
Communications (ATC), 2020. Available:
ResearchGate.
Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P.,
Sikdar, B. (2019). A survey on IoT security:
Application areas, security threats, and solution
architectures. IEEE Access, 7, 82721-82743.
J. T. Olsson and P. Andersson, “Enhancing End-to-End
Communication Security in IoT Devices Through
Application Layer Protocol,” Master’s Thesis, Uppsala
University, 2023. Available: DiVA Portal.
Liu, Z., Zhang, Y., Xu, L. (2018). Secure and efficient data
transmission in IoT-enabled intelligent transportation
systems. IEEE Transactions on Intelligent
Transportation Systems, 19(7), 2174-2184.
M. I. Nofal, A. A. Ghoneim, and R. K. Iqbal, “A Novel
Secure End-toEnd IoT Communication Scheme Using
Lightweight Cryptography Based on Block Cipher,”
Applied Sciences, vol. 12, no. 17, p. 8817, 2022. DOI:
10.3390/app12178817.
N. Elgendy, O. Ismail, M. G. Alajmi, and A. M. Elhouni,
“Hybrid Cryptographic End-to-End Encryption Method
for Protecting IoT Devices Against MitM Attacks,”
International Journal of Computer Science and
Information Security (IJCSIS), vol. 19, no. 3, pp. 112–
121, 2023. Available: ResearchGate.
S. P. Suresh, A. Kumar, and R. K. Sharma, “Enhanced
Encryption Technique for Secure IoT Data
Transmission,” International Journal of Engineering
Research Technology (IJERT), vol. 9, no. 10, pp. 45–
52, 2020. Available: Academia.edu.
Singh, P. K., Rajan, R., Gupta, B. B., Conti, M. (2020).
Securing the Internet of Things: A survey on security
challenges, attacks, and countermeasures. Internet of
Things, 12, 100313.Providing Cryptographic security
and evidentiary Chain-of-Custody with the advanced
forensic format, library, and tools1 Simson L.
Garfinkel, Naval Postgraduate School and Harvard
University, USA.
ICRDICCT‘25 2025 - INTERNATIONAL CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION,
COMMUNICATION, AND COMPUTING TECHNOLOGIES
112