International Journal of Communication Networks and Information Security (IJCNIS) https://www.ijcnis.org.shopitsoon.com/index.php/ijcnis <p><strong>International Journal of Communication Networks and Information Security (IJCNIS)</strong></p> <h3><strong>Contact Email: editor@ijcnis.org</strong></h3> <p><strong>Basic Journal Information</strong></p> <ul> <li style="text-align: justify;"><strong>e-ISSN: </strong>2073-607X, <strong>p-ISSN:</strong> 2076-0930| <strong>Frequency</strong> (4 Issue Per Year) | <strong>Nature: </strong>Online and Print | <strong>Language of Publication: </strong>English | <strong>Funded By:</strong></li> <li style="text-align: justify;"><strong>Introduction: International Journal of Communication Networks and Information Security</strong> (IJCNIS) is a scholarly peer-reviewed international scientific journal published four times (March, June, September, December) in a year, focusing on theories, methods, and applications in networks and information security. It provides a challenging forum for researchers, industrial professionals, engineers, managers, and policy makers working in the field to contribute and disseminate innovative new work on networks and information security. The topics covered by this journal include, but not limited to, the following topics:</li> <ol> <li>Broadband access networks</li> <li>Wireless Internet</li> <li>Software defined &amp; ultra-wide band radio</li> <li>Bluetooth technology</li> <li>Wireless Ad Hoc and Sensor Networks</li> <li>Wireless Mesh Networks</li> <li>IEEE 802.11/802.20/802.22</li> <li>Emerging wireless network security issues</li> <li>Fault tolerance, dependability, reliability, and localization of fault</li> <li>Network coding</li> <li>Wireless telemedicine and e-health</li> <li>Emerging issues in 3G, 4G and 5G networks</li> <li>Network architecture</li> <li>Multimedia networks</li> <li>Cognitive Radio Systems</li> <li>Cooperative wireless communications</li> <li>Management, monitoring, and diagnosis of networks</li> <li>Biologically inspired communication</li> <li>Cross-layer optimization and cross-functionality designs</li> <li>Data gathering, fusion, and dissemination</li> <li>Networks and wireless networks security issues</li> <li>Optical Fiber Communication</li> <li>Internet of Things (IoT)</li> <li>Signals and Systems</li> <li>Information Theory and Coding</li> <li>Cryptology</li> <li>Computer Neural Networks</li> <li>Mobile Edge Computing and Mobile Computing</li> <li>Image Encryption Techniques</li> <li>Affective Computing</li> <li>On-chip/Inter-chip Optical Networks</li> <li>Ultra-High-Speed Optical Communication Systems</li> <li>Secure Optical Communication Technology</li> <li>Neural Network Modeling and Dynamics Behavior Analysis</li> <li>Intelligent Manufacturing</li> <li>Big Data Systems</li> <li>Database and Intelligent Information Processing</li> <li>Complex Network Control and Memristor System Analysis</li> <li>Distributed Estimation, Optimization Games</li> <li>Dynamic System Fault Diagnosis</li> <li>Brain-Inspired Neural Networks</li> <li>Memristors</li> <li>Nonlinear Systems</li> <li>Signal and Information Processing</li> <li>Multimodal Information Fusion</li> <li>Blockchain Technology</li> </ol> <li><strong>IJCNIS publishes: </strong></li> </ul> <ul> <ul> <li>Critical reviews/ Surveys</li> <li>Scientific research papers/ contributions</li> <li>Letters (short contributions)</li> </ul> </ul> <ul> <li style="text-align: justify;"><strong>Peer Review Process: </strong>All submitted papers are subjected to a comprehensive blind review process by at least 2 subject area experts, who judge the paper on its relevance, originality, clarity of presentation and significance. The review process is expected to take 8-12 weeks at the end of which the final review decision is communicated to the author. In case of rejection authors will get helpful comments to improve the paper for resubmission to other journals. The journal may accept revised papers as new papers which will go through a new review cycle.</li> <li style="text-align: justify;"><strong>Periodicity: </strong>The Journal is published in 4 issues per year.</li> <li style="text-align: justify;"><strong>Editorial Contribution Percentage in Articles Per Year:</strong> 30%</li> </ul> <p> </p> en-US editor@ijcnis.org (International Journal of Communication Networks and Information Security) editor@ijcnis.org (Support Engineer) Thu, 01 Jan 2026 14:01:24 +0000 OJS 3.2.1.4 http://blogs.law.harvard.edu/tech/rss 60 Emerging AIoT Technologies for Efficient Data Collection and Decision Making in Smart Farming https://www.ijcnis.org.shopitsoon.com/index.php/ijcnis/article/view/8713 <p>Traditional farming is being transformed into intelligent, data-driven agriculture by the confluence of Artificial Intelligence (AI) and the Internet of Things (IoT) into the AIoT paradigm. In order to increase agricultural output, optimize resource use, lessen environmental effects, and improve farmer decision-making, smart farming uses real-time data from distributed sensors, automated systems, and predictive models. The growing use of AIoT technology in agriculture addresses global issues such as resource limitations, population expansion, labor problems, and climate change. Wireless sensor networks (WSNs), drones and autonomous vehicles, edge computing, cloud analytics, and machine learning algorithms for predictive insights are key elements of AIoT systems in agriculture. In order to initiate automatic activities or offer decision assistance, these systems gather diverse data, including soil moisture, weather, crop health indicators, and equipment status. These data are then processed and analyzed. In order to improve data collection and decision-making in smart farming, this article examines new AIoT technologies. We look at the integration of various technologies, their advantages, real-world applications, issues with connectivity, security, data quality, and farmer adoption, as well as potential avenues for future research. This study uses an interdisciplinary approach to identify trends, gaps in existing practice, and tactics to optimize AIoT's influence in sustainable agriculture.</p> Omkar Singh, Vinoth R, Abhilasha Singh, Navanendra Singh Copyright (c) 2026 https://www.ijcnis.org.shopitsoon.com/index.php/ijcnis/article/view/8713 Thu, 01 Jan 2026 00:00:00 +0000 Security and Privacy in Industry 5.0: Emerging Technical Challenges and Future Pathways https://www.ijcnis.org.shopitsoon.com/index.php/ijcnis/article/view/8714 <p>A human-centered, resilient, and sustainable industrial ecosystem where people and intelligent systems work closely together is what Industry 5.0 offers. As industrial systems become more dispersed, data-rich, and interactive, security and privacy threats increase even as efficiency and customization gains are unlocked. The Privacy-Preserving Federated Edge Ledger (PFEL), an integrated, novel framework that combines federated learning, lightweight distributed ledgers, trusted execution environments, adaptive trust scoring, and fine-grained differential privacy to protect data and decision integrity without compromising human-in-the-loop responsiveness, is presented in this paper along with a focused analysis of the fundamental security and privacy challenges in Industry 5.0 and a survey of pertinent technical building blocks. We offer an Industry 5.0-specific threat model, describe the architecture of PFEL, outline safe model aggregation and auditability procedures, examine security and performance trade-offs, and suggest an assessment roadmap with quantifiable metrics. Lastly, we highlight future directions that harmonize security and privacy design with human-centric industrial ideals and examine wider socio-technical and legal ramifications.</p> Vinoth R, Omkar Singh, Navanendra Singh, Abhilasha Singh Copyright (c) 2026 https://www.ijcnis.org.shopitsoon.com/index.php/ijcnis/article/view/8714 Thu, 01 Jan 2026 00:00:00 +0000 AI-Powered Smart Grids: Security Challenges and Intelligent Energy Management Approaches https://www.ijcnis.org.shopitsoon.com/index.php/ijcnis/article/view/8715 <p>Electric power systems are being transformed into smart grids that can operate with flexibility, efficiency, and resilience thanks to the confluence of enhanced sensing, communication, distributed energy resources, and artificial intelligence. With an emphasis on security issues and clever energy management strategies, this study examines the current status of AI-powered smart grids. We present an architectural overview, pinpoint attack surfaces and threat models, and look at particular security risks such as supply-chain vulnerabilities, data integrity assaults, and privacy violations. Next, we examine AI-driven methods for distributed generation coordination, demand response, energy forecasting, and real-time optimization, and we talk about how these methods relate to privacy and security issues. We then assess defense methods such as blockchain-enabled coordination, privacy-preserving analytics, federated learning, anomaly detection, and secure communication protocols. We offer case examples and a thorough design pattern that strikes a compromise between privacy, robustness, and performance. A research agenda for safe, intelligent, and reliable smart grids, as well as suggestions for practitioners, is included in the paper's conclusion.</p> <p>&nbsp;</p> Abhilasha Singh, Navanendra Singh, Omkar Singh, Vinoth R Copyright (c) 2026 https://www.ijcnis.org.shopitsoon.com/index.php/ijcnis/article/view/8715 Thu, 01 Jan 2026 00:00:00 +0000 Adaptive Trust Models for Wireless Sensor Networks Using Blockchain and Edge Intelligence https://www.ijcnis.org.shopitsoon.com/index.php/ijcnis/article/view/8716 <p>Environmental sensing, smart city applications, industrial automation, and contemporary monitoring all depend on wireless sensor networks. However, there are serious trust and security issues because of their dispersed structure, resource limitations, and deployment in frequently dangerous locations. Conventional wireless sensor network trust systems rely on centralized authority and local reputation metrics, which have issues with scalability, adaptability, and resistance to complex attacks. In order to provide a reliable, scalable, and comprehensible trust management solution for wireless sensor networks, this study suggests an integrated architecture that blends adaptive trust modeling with blockchain-backed ledgering and edge intelligence. The suggested methodology records trust anchors, transaction summaries, and policy updates utilizing an immutable blockchain layer, periodic aggregation and adaptive fusion at edge devices using machine learning, and lightweight local trust estimators at sensor nodes. The system constantly modifies the trust weighting based on ambient inputs, node behavior, and context. We introduce the system architecture, formal trust update rules, a lightweight consensus and storage approach appropriate for limited contexts, and a security analysis that addresses common threats like collusion, on-off assaults, Sybil attacks, and fake data injection. When compared to baseline reputation systems, a simulation-based study shows improvements in the detection of misbehaving nodes, a decrease in false positives, and resilience against coordinated attacks. The method provides obvious routes to deployment in practical WSN applications while striking a compromise between enhanced network-level security and energy and communication overhead.</p> Navanendra Singh, Abhilasha Singh, Vinoth R, Omkar Singh Copyright (c) 2026 https://www.ijcnis.org.shopitsoon.com/index.php/ijcnis/article/view/8716 Thu, 01 Jan 2026 00:00:00 +0000 Security and Performance Assessment of Encryption Techniques for Cloud Platforms https://www.ijcnis.org.shopitsoon.com/index.php/ijcnis/article/view/8735 <p>Cloud computing platforms are becoming more popular for storage and processing of sensitive data, because of their scalability and flexibility, however the shared and distributed nature of cloud computing presents significant security dangers. Encryption is also a key element to keeping cloud data safe, but encryption operations will also add computational overhead to the system, affecting performance. This work brings an orderly evaluation of typically used encryption techniques in cloud platforms from both perspective of security effectiveness and performance efficiency. Symmetric, asymmetric and hybrid encryption approaches are examined under conditions that are relevant for cloud computing based on different criteria, e.g. encryption, decryption time, and computational overhead. Experimental results indicate that symmetric encryption performs the best on both encryption and decryption time (118 ms and 104 ms, respectively), which is applicable to bulk data protection, and asymmetric encryption causes high processing overhead (362 ms encryption time and 341 ms decryption time). Hybrid encryption offers a balanced performance where the processing times are moderate (176ms encryption and 158ms decryption) but more secure due to secure key management. The results point to some very clear tradeoffs between security strength and efficiency of performance and suggest that hybrid encryption represents a workable tradeoff for multi-user and scalable cloud environments. These findings constitute some good information in choosing encryption strategies that promote secure and efficient operations of clouds.</p> Lakshmi Rahul Reddy Mareddy Copyright (c) 2026 https://www.ijcnis.org.shopitsoon.com/index.php/ijcnis/article/view/8735 Sat, 03 Jan 2026 00:00:00 +0000 PERFORMANCE COMPARISON OF RELAY NODERANDOM SELECTION METHOD USING DIFFERENT SET OF PARAMETER FOR MANET https://www.ijcnis.org.shopitsoon.com/index.php/ijcnis/article/view/8736 <p>Treads of today research uncertainty environment and natural situation if focussed in Mobile Ad hoc Networks, abig challenge to develop routing protocol that can meet different application needs and optimize routing paths according to the topology change in mobile ad hoc networks <strong>[1], [2]</strong>. The continuous transmission of small packet is called beacon packet, that advertises the presence of a base station and the mobile units sense the beacons and attempt to establish a wireless connection <strong>[3]</strong>. This research aims to propose CH-RNSR with hybrid cryptography (ECC) using RNSR algorithm. The main aim of the proposed research CH-RNSR with ECC algorithm is to increase the remaining energy with the number of malicious nodes detected during the communication via acknowledgement base than RNSR with help of one of leading simulation model called Network Simulator 2.34 work with different set of nodes, malicious nodes in same topology sizeusing various parameters such as packet delivery ratio, throughput, routing overhead, packet loss, delay and remaining energy via Network Simulator 2 (NS2).</p> K. Thamizhmaran, A. Charles Copyright (c) 2026 https://www.ijcnis.org.shopitsoon.com/index.php/ijcnis/article/view/8736 Sat, 03 Jan 2026 00:00:00 +0000