Journal article 74 views 8 downloads
LSTM guided homomorphic encryption for threat-resistant IoT networks
Discover Computing, Volume: 28, Issue: 1
Swansea University Author:
Cheng Cheng
-
PDF | Version of Record
© The Author(s) 2025. This article is licensed under a Creative Commons Attribution 4.0 International License.
Download (3.82MB)
DOI (Published version): 10.1007/s10791-025-09843-4
Abstract
The rapid growth of the Internet of Things (IoT) has led to revolutionary innovations in many fields; however, it has also resulted in significant security and privacy issues due to the resource limitations and distributed nature of IoT networks. Traditional cryptographic techniques or machine learn...
| Published in: | Discover Computing |
|---|---|
| ISSN: | 2948-2992 |
| Published: |
Springer Science and Business Media LLC
2025
|
| Online Access: |
Check full text
|
| URI: | https://cronfa.swan.ac.uk/Record/cronfa71104 |
| first_indexed |
2025-12-08T10:23:30Z |
|---|---|
| last_indexed |
2026-01-08T05:21:57Z |
| id |
cronfa71104 |
| recordtype |
SURis |
| fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2026-01-07T17:07:09.6095821</datestamp><bib-version>v2</bib-version><id>71104</id><entry>2025-12-08</entry><title>LSTM guided homomorphic encryption for threat-resistant IoT networks</title><swanseaauthors><author><sid>11ddf61c123b99e59b00fa1479367582</sid><ORCID>0000-0003-0371-9646</ORCID><firstname>Cheng</firstname><surname>Cheng</surname><name>Cheng Cheng</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2025-12-08</date><deptcode>MACS</deptcode><abstract>The rapid growth of the Internet of Things (IoT) has led to revolutionary innovations in many fields; however, it has also resulted in significant security and privacy issues due to the resource limitations and distributed nature of IoT networks. Traditional cryptographic techniques or machine learning-based anomaly detection systems do not jointly provide data privacy and resilience to threats in real time. The existing methods, such as Homomorphic Encryption (HE), offer a high computation cost for performing encryption. Furthermore, Long Short-Term Memory (LSTM) networks can predict an anomaly profile instead of performing encryption. To address these shortcomings, this paper proposes NeuroCrypt. This new hybrid system combines Fully Homomorphic Encryption (FHE) with LSTM-based encrypted anomaly detection and supplements it with blockchain-based dynamic key management and multi-factor authentication. The architecture targets edge and fog computing settings using, among other techniques, ciphertext packing, model quantisation, and parallelised encrypted operations. The performance of the proposed framework has been evaluated on a real dataset. The results show that the accuracy in the proposed framework is 99.2% compared to existing techniques such as HE-based DNN, FL-based models, and LSTM IDS. Conclusively, NeuroCrypt provides a privacy-preserving, effective, and scalable solution to real-time threat abatement in IoT networks.</abstract><type>Journal Article</type><journal>Discover Computing</journal><volume>28</volume><journalNumber>1</journalNumber><paginationStart/><paginationEnd/><publisher>Springer Science and Business Media LLC</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint/><issnElectronic>2948-2992</issnElectronic><keywords>Internet of things (IoT), Homomorphic encryption (HE), Long short-term memory (LSTM), Anomaly detection, Privacy-preserving computation, Blockchain, Dynamic key management, Multi-factor authentication (MFA)</keywords><publishedDay>9</publishedDay><publishedMonth>12</publishedMonth><publishedYear>2025</publishedYear><publishedDate>2025-12-09</publishedDate><doi>10.1007/s10791-025-09843-4</doi><url/><notes/><college>COLLEGE NANME</college><department>Mathematics and Computer Science School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>MACS</DepartmentCode><institution>Swansea University</institution><apcterm>SU Library paid the OA fee (TA Institutional Deal)</apcterm><funders>The authors have been funded by UKRI Grant EP/W020408/1 and Grant RS718 through Doctoral Training Centre at Swansea University.</funders><projectreference/><lastEdited>2026-01-07T17:07:09.6095821</lastEdited><Created>2025-12-08T10:21:09.6198014</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Sanjeev</firstname><surname>Kumar</surname><order>1</order></author><author><firstname>Sukhvinder Singh</firstname><surname>Deora</surname><order>2</order></author><author><firstname>Tajinder</firstname><surname>Kumar</surname><order>3</order></author><author><firstname>Purushottam</firstname><surname>Sharma</surname><order>4</order></author><author><firstname>Cheng</firstname><surname>Cheng</surname><orcid>0000-0003-0371-9646</orcid><order>5</order></author><author><firstname>Vishal</firstname><surname>Garg</surname><order>6</order></author></authors><documents><document><filename>71104__35914__d3c9df8b7eec4a749612a552100405af.pdf</filename><originalFilename>71104.VoR.pdf</originalFilename><uploaded>2026-01-07T17:05:19.7507643</uploaded><type>Output</type><contentLength>4008156</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><documentNotes>© The Author(s) 2025. This article is licensed under a Creative Commons Attribution 4.0 International License.</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language><licence>http://creativecommons.org/licenses/by/4.0/</licence></document></documents><OutputDurs/></rfc1807> |
| spelling |
2026-01-07T17:07:09.6095821 v2 71104 2025-12-08 LSTM guided homomorphic encryption for threat-resistant IoT networks 11ddf61c123b99e59b00fa1479367582 0000-0003-0371-9646 Cheng Cheng Cheng Cheng true false 2025-12-08 MACS The rapid growth of the Internet of Things (IoT) has led to revolutionary innovations in many fields; however, it has also resulted in significant security and privacy issues due to the resource limitations and distributed nature of IoT networks. Traditional cryptographic techniques or machine learning-based anomaly detection systems do not jointly provide data privacy and resilience to threats in real time. The existing methods, such as Homomorphic Encryption (HE), offer a high computation cost for performing encryption. Furthermore, Long Short-Term Memory (LSTM) networks can predict an anomaly profile instead of performing encryption. To address these shortcomings, this paper proposes NeuroCrypt. This new hybrid system combines Fully Homomorphic Encryption (FHE) with LSTM-based encrypted anomaly detection and supplements it with blockchain-based dynamic key management and multi-factor authentication. The architecture targets edge and fog computing settings using, among other techniques, ciphertext packing, model quantisation, and parallelised encrypted operations. The performance of the proposed framework has been evaluated on a real dataset. The results show that the accuracy in the proposed framework is 99.2% compared to existing techniques such as HE-based DNN, FL-based models, and LSTM IDS. Conclusively, NeuroCrypt provides a privacy-preserving, effective, and scalable solution to real-time threat abatement in IoT networks. Journal Article Discover Computing 28 1 Springer Science and Business Media LLC 2948-2992 Internet of things (IoT), Homomorphic encryption (HE), Long short-term memory (LSTM), Anomaly detection, Privacy-preserving computation, Blockchain, Dynamic key management, Multi-factor authentication (MFA) 9 12 2025 2025-12-09 10.1007/s10791-025-09843-4 COLLEGE NANME Mathematics and Computer Science School COLLEGE CODE MACS Swansea University SU Library paid the OA fee (TA Institutional Deal) The authors have been funded by UKRI Grant EP/W020408/1 and Grant RS718 through Doctoral Training Centre at Swansea University. 2026-01-07T17:07:09.6095821 2025-12-08T10:21:09.6198014 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Sanjeev Kumar 1 Sukhvinder Singh Deora 2 Tajinder Kumar 3 Purushottam Sharma 4 Cheng Cheng 0000-0003-0371-9646 5 Vishal Garg 6 71104__35914__d3c9df8b7eec4a749612a552100405af.pdf 71104.VoR.pdf 2026-01-07T17:05:19.7507643 Output 4008156 application/pdf Version of Record true © The Author(s) 2025. This article is licensed under a Creative Commons Attribution 4.0 International License. true eng http://creativecommons.org/licenses/by/4.0/ |
| title |
LSTM guided homomorphic encryption for threat-resistant IoT networks |
| spellingShingle |
LSTM guided homomorphic encryption for threat-resistant IoT networks Cheng Cheng |
| title_short |
LSTM guided homomorphic encryption for threat-resistant IoT networks |
| title_full |
LSTM guided homomorphic encryption for threat-resistant IoT networks |
| title_fullStr |
LSTM guided homomorphic encryption for threat-resistant IoT networks |
| title_full_unstemmed |
LSTM guided homomorphic encryption for threat-resistant IoT networks |
| title_sort |
LSTM guided homomorphic encryption for threat-resistant IoT networks |
| author_id_str_mv |
11ddf61c123b99e59b00fa1479367582 |
| author_id_fullname_str_mv |
11ddf61c123b99e59b00fa1479367582_***_Cheng Cheng |
| author |
Cheng Cheng |
| author2 |
Sanjeev Kumar Sukhvinder Singh Deora Tajinder Kumar Purushottam Sharma Cheng Cheng Vishal Garg |
| format |
Journal article |
| container_title |
Discover Computing |
| container_volume |
28 |
| container_issue |
1 |
| publishDate |
2025 |
| institution |
Swansea University |
| issn |
2948-2992 |
| doi_str_mv |
10.1007/s10791-025-09843-4 |
| publisher |
Springer Science and Business Media LLC |
| college_str |
Faculty of Science and Engineering |
| hierarchytype |
|
| hierarchy_top_id |
facultyofscienceandengineering |
| hierarchy_top_title |
Faculty of Science and Engineering |
| hierarchy_parent_id |
facultyofscienceandengineering |
| hierarchy_parent_title |
Faculty of Science and Engineering |
| department_str |
School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science |
| document_store_str |
1 |
| active_str |
0 |
| description |
The rapid growth of the Internet of Things (IoT) has led to revolutionary innovations in many fields; however, it has also resulted in significant security and privacy issues due to the resource limitations and distributed nature of IoT networks. Traditional cryptographic techniques or machine learning-based anomaly detection systems do not jointly provide data privacy and resilience to threats in real time. The existing methods, such as Homomorphic Encryption (HE), offer a high computation cost for performing encryption. Furthermore, Long Short-Term Memory (LSTM) networks can predict an anomaly profile instead of performing encryption. To address these shortcomings, this paper proposes NeuroCrypt. This new hybrid system combines Fully Homomorphic Encryption (FHE) with LSTM-based encrypted anomaly detection and supplements it with blockchain-based dynamic key management and multi-factor authentication. The architecture targets edge and fog computing settings using, among other techniques, ciphertext packing, model quantisation, and parallelised encrypted operations. The performance of the proposed framework has been evaluated on a real dataset. The results show that the accuracy in the proposed framework is 99.2% compared to existing techniques such as HE-based DNN, FL-based models, and LSTM IDS. Conclusively, NeuroCrypt provides a privacy-preserving, effective, and scalable solution to real-time threat abatement in IoT networks. |
| published_date |
2025-12-09T05:33:13Z |
| _version_ |
1856805791586058240 |
| score |
11.096068 |

