Secured Data Transmission in IoT using Homomorphic Encryption


  • Suganya. S Assistant professor Department of Information Technology
  • Ramasamy. K Assistant professor, Department of ECE
  • A. Srinivasan Associate professor, Department of ECE
  • Suba. M Assistant professor, Department of ECE
  • V. Kalaichelvi Associate professor, Department of CSE
  • Swaminathan. S Assistant professor, Department of ECE


IOT systems, CGAN technology


The IoT systems transfer highly sensitive data in a network and majority of the people needs IoT technology in real time applications like smart home, smart health care etc., A number of security algorithms exists to protect the IoT systems but with some time complexity. Deep learning is considered to be an efficient technique to analyze threats and respond to attacks and security incidents instantly and accurately. Conditional Generative Adversarial Network (CGAN) is one of the deep learning technique that protects data based on conditions created by generator and discriminator models. CGANs are useful for getting features of choice in generated data. This work use the CGAN feasibility to controllable the data encryption and decryption part in GAN network. This work solve the time complexity issues using Algebraic Matrix in Conditional GAN (AMCGAN) and Fully Homomorphic Encryption (FHE) algorithm. The advantage of using algebraic matrix is to reduce the time complexity and input complexity in cryptography process. It performs both addition and multiplication at the same time, and can compute any operation instantly. There are many encryption techniques used to encrypt the data but the same time they have more time to decrypt the result. Because the mathematical evaluation are complex to derived in encryption part and otherwise. So, this work considered to address the time complexity problem by solving the easiest mathematical derivations in encryption and decryption part. Also we noticed that the fully homomorphic encryption algorithm have less encryption time compared to Chaotic Algorithm and it has minimal time complexity than existing algorithms such as RSA algorithm.


Download data is not yet available.


Hyeontaek Oh Gyu Myoung Lee, Sangdon Park And Jun Kyun Choi Hwanjo Heo), “Personal Data Trading Scheme for Data Brokers in IoT Data Marketplaces”, IEEE Access. 2019

Fangchao YuLi WangXianjin FangYouwen Zhang , “The Defense of Adversarial Example with Conditional Generative Adversarial Networks”, Security and Communication Networks.2020

Juan E. Tapia, Claudia , “ArellanoSoft-biometrics encoding conditional GAN for synthesis of NIR periocular images”, Future Generation Computer Systems.2019

Bulla, P. . “Traffic Sign Detection and Recognition Based on Convolutional Neural Network”. International Journal on Recent and Innovation Trends in Computing and Communication, vol. 10, no. 4, Apr. 2022, pp. 43-53, doi:10.17762/ijritcc.v10i4.5533.

Vanitha, D. D. . (2022). Comparative Analysis of Power switches MOFET and IGBT Used in Power Applications. International Journal on Recent Technologies in Mechanical and Electrical Engineering, 9(5), 01–09.

K Thiagarajan, P Balasubramanian, J Nagaraj, J Padmashree “Encryption and decryption algorithm using algebraic matrix approach”, IOP Conf. Series: Journal of Physics: Conf. Series 1000.2018

Sarah Shihab Hamad, Ali Makki Sagheer “Public Key Fully Homomorphic Encryption”, Journal of Theoretical and Applied Information Technology 96(7), 1924-1934.2018

Weiru Wang, Yanfen Gan, Chi‑Man Vong, Chuangquan Chen “Homo‑ELM: fully homomorphic extreme learning machine”,. Int. J. Mach. Learn. & Cyber, 11, 1531–1540.2020

Delu Huang, Jianjun Wang , “High-capacity reversible data hiding in encrypted image based on specific encryption process”, Signal Processing: Image Communication, 80.2020

Lizhi Xiong, Danping Dong, Zhihua Xia And Xianyi Chen , “High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption”, IEEE Access, vol. 6, pp. 60635-60644.2018

Zhaoqing Pan, Weijie Yu, Xiaokai Yi, Asifullah Khan, Feng Yuan, and Yuhui Zheng Recent Progress on Generative Adversarial Networks (GANs): A Survey: IEEE Access, Vol.7.2019

Ahmed Cherif Megri, Sameer Hamoush, Ismail Zayd Megri, Yao Yu. (2021). Advanced Manufacturing Online STEM Education Pipeline for Early-College and High School Students. Journal of Online Engineering Education, 12(2), 01–06. Retrieved from

Singh, S. . (2022). Unconditionally G ?odel Degeneracy for Quasi-Meager, Smooth Moduli. International Journal on Recent Trends in Life Science and Mathematics, 9(1), 28–36.

Baes, A. M. M. ., Adoptante, A. J. M. ., Catilo, J. C. A. ., Lucero, P. K. L. ., Peralta, J. F. P., & de Ocampo, A. L. P. (2022). A Novel Screening Tool System for Depressive Disorders using Social Media and Artificial Neural Network. International Journal of Intelligent Systems and Applications in Engineering, 10(1), 116–121.

Xiaopu Zhang, Shuai Zhan, Jun Lin, Feng Sun, Xi Zhu, Yang Yang, Xunqian Tong, And Hongyuan Yang , “An Efficient Seismic Data Acquisition Based on Compressed Sensing Architecture with Generative Adversarial Networks”, IEEE access, Vol. 7.2019

Ghazaly, N. M. . (2022). Data Catalogue Approaches, Implementation and Adoption: A Study of Purpose of Data Catalogue. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(1), 01–04.

Decheng Wu, Hailin Cao, Dian Li, And Shizhong Yang , “Energy-Efficient Reconstruction Method for Transmission Lines Galloping With Conditional Generative Adversarial Network”, IEEE Access, vol. 8, pp. 17310-17319.2020

Tushar Vyavahare, Darshana Tekade, Saurabh Nayak, N Suresh kumar and S S Blessy Trencia Lincy , “Enhanced rearrangement technique for secure data transmission: case study credit card process”, IOP Conf. Series: Materials Science and Engineering, 263 (4).2019

Hao Ye, Le Liang, Member, Geoffrey Ye Li, Fellow, and Biing-Hwang Juang , “Deep Learning-Based End-to-End Wireless Communication Systems with Conditional GANs as Unknown Channels”, IEEE Transactions on Wireless Communications, Vol. 19, No. 5.2020

Enju Xu, Yu Zhan, Zheng Wang, Baocang Wang And Yuan Ping , “Attack and Improvement on a Symmetric Fully Homomorphic Encryption Scheme”, IEEE Access. vol. 7, pp. 68373-68379,2019

Mohammed Aledhari, Marianne Di Pierro Mohamed Hefeida & Fahad Saeed , “ A Deep Learning-Based Data Minimization Algorithm for Fast and Secure Transfer of Big Genomic Datasets”, IEEE transactions on big data.2017

Farooq Shaikh and Elias Bou-Harb , “IoT Threat Detection Leveraging Network Statistics and GAN.2019

Akshay Mehrotra and Ambedkar Dukkipati , “Generative Adversarial Residual Pairwise Networks for One Shot Learning”, Computer Vision and Pattern Recognition.2017

Swaminathan.s, Ramasamy.k, Srinivasan.A, AB2IG – an Efficient Crypto System, ,Far East Journal off Electronics and Communications 16:171-78,DOI:10.17654/EC03010171, April 2016

S. Swaminathan;A. Karthick;S. Suganya, A secure and robust crypto system based on unique dynamic key generation scheme, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT),IEEE,Year: 2014

Flow diagram




How to Cite

S. S, R. K, A. . Srinivasan, S. M, V. . Kalaichelvi, and S. S, “Secured Data Transmission in IoT using Homomorphic Encryption”, Int J Intell Syst Appl Eng, vol. 10, no. 3, pp. 241–246, Oct. 2022.



Research Article