IOMT Security and Anomaly Detection in Medical Images Using AI
-
https://doi.org/10.14419/6fzpzd03
Received date: June 10, 2025
Accepted date: June 17, 2025
Published date: November 1, 2025
-
Information and Communication Technology; Internet of Things; Internet of Medical Things; Security; Authentication; Access Control; Key Agreement; Simulation. -
Abstract
The extensive use of information and communication technology (ICT) has transformed every aspect of life as the world moves closer to digitalization. There is no denying that ICT has changed how people communicate, live, work, and study. The Internet of Things, or things, is a powerful combination of critical ICT technologies, with integrated hardware, software, and other technologies for connecting and sharing data with other systems and devices over the Internet. An Internet of Things (IoT) device is any electronic device that can be used in a wide range of social contexts, including connected industries, transportation, healthcare, smart supply chains, smart farms, smart cities, smart grids, and many more. This includes wearable technology and hardware. The Internet of Medical Things (IoMT) is a real-world application of the Internet of Things (IoT) in the healthcare sector, enabling patients to receive better healthcare and enjoy a higher quality of life. It provides seniors and patients with real-time healthcare services, support, and caregiving using Internet-enabled smart devices. The current coronavirus disease (COVID-19) has increased the demand for remote patient care due to a paucity of resources and healthcare facilities, in contrast to the enormous global demand for these services and facilities. Therefore, COVID-19 has played a significant role in the shift of the present healthcare system towards remote care. Even with advancements in the healthcare sector and the apparent benefits of integrating it with IoT, moving all forms of communication online is a logical next step. It opens the door for potential security lapses in the ongoing IoMT communication, providing adversaries with unauthorized access to vital health data that could be misused for malicious intent.
-
References
- Ravi, V., Pham, T. D., & Alazab, M. (2023). Deep learning-based network intrusion detection system for Internet of Medical Things. IEEE Internet of Things Magazine, 6(2), 50–54. https://doi.org/10.1109/IOTM.001.2300021.
- Khan, I. A., Moustafa, N., Razzak, I., Tanveer, M., Pi, D., Pan, Y., & Ali, B. S. (2022). XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks. Future Generation Computer Systems, 127, 181–193. https://doi.org/10.1016/j.future.2021.09.010.
- Edmund, A. N., Alabi, C. A., Tooki, O. O., Imoize, A. L., & Salka, T. D. (2023). Artificial intelligence-assisted Internet of Medical Things enabling medical image processing. In Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things (pp. 309–334). CRC Press.
- Wazid, M., Singh, J., Das, A. K., Shetty, S., Khan, M. K., & Rodrigues, J. J. P. C. (2022). ASCP-IoMT: AI-enabled lightweight secure communica-tion protocol for Internet of Medical Things. IEEE Access, 10, 57990–58004. https://doi.org/10.1109/ACCESS.2022.3179418.
- Muheidat, F., & Tawalbeh, L. A. (2023). AIoMT artificial intelligence (AI) and Internet of Medical Things (IoMT): Applications, challenges, and future trends. In Computational Intelligence for Medical Internet of Things (MIoT) Applications (pp. 33–54). Academic Press. https://doi.org/10.1016/B978-0-323-99421-7.00013-1.
- Ahmad, S., Khan, S., AlAjmi, M. F., Dutta, A. K., Dang, L. M., Joshi, G. P., & Moon, H. (2022). Deep learning enabled disease diagnosis for se-cure Internet of Medical Things. Computers, Materials & Continua, 73(1). https://doi.org/10.32604/cmc.2022.025760.
- Wagan, S. A., Koo, J., Siddiqui, I. F., Qureshi, N. M. F., Attique, M., & Shin, D. R. (2023). A fuzzy-based duo-secure multi-modal framework for IoMT anomaly detection. Journal of King Saud University - Computer and Information Sciences, 35(1), 131–144. https://doi.org/10.1016/j.jksuci.2022.11.007.
- Liu, W., Zhao, F., Shankar, A., Maple, C., Peter, J. D., Kim, B.-G., Slowik, A., Parameshachari, B. D., & Lv, J. (2023). Explainable AI for medical image analysis in medical cyber-physical systems: Enhancing transparency and trustworthiness of IoMT. IEEE Journal of Biomedical and Health In-formatics.
- Manickam, P., Mariappan, S. A., Murugesan, S. M., Hansda, S., Kaushik, A., Shinde, R., & Thipperudraswamy, S. P. (2022). Artificial intelligence (AI) and Internet of Medical Things (IoMT) assisted biomedical systems for intelligent healthcare. Biosensors, 12(8), 562. https://doi.org/10.3390/bios12080562.
- Chen, P.-Y., Cheng, Y.-C., Zhong, Z.-H., Zhang, F.-Z., Pai, N.-S., Li, C.-M., & Lin, C.-H. (2024). Information security and artificial intelligence–assisted diagnosis in an Internet of Medical Thing system (IoMTS). IEEE Access. https://doi.org/10.1109/ACCESS.2024.3351373.
- Kakhi, K., Alizadehsani, R., Kabir, H. D., Khosravi, A., Nahavandi, S., & Acharya, U. R. (2022). The Internet of Medical Things and artificial in-telligence: Trends, challenges, and opportunities. Biocybernetics and Biomedical Engineering, 42(3), 749–771. https://doi.org/10.1016/j.bbe.2022.05.008.
- Sy, I., Diouf, B., Diop, A. K., Drocourt, C., & Durand, D. (2023). Enhancing security in connected medical IoT networks through deep learning-based anomaly detection. In International Conference on Mobile, Secure, and Programmable Networking (pp. 87–99). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-52426-4_7.
- Ghubaish, A., Salman, T., Zolanvari, M., Unal, D., Al-Ali, A., & Jain, R. (2020). Recent advances in the Internet-of-Medical-Things (IoMT) sys-tems security. IEEE Internet of Things Journal, 8(11), 8707–8718. https://doi.org/10.1109/JIOT.2020.3045653.
- Alsalman, D. (2024). A comparative study of anomaly detection techniques for IoT security using AMoT (Adaptive Machine Learning for IoT Threats). IEEE Access. https://doi.org/10.1109/ACCESS.2024.3359033.
- Wang, J., Jin, H., Chen, J., Tan, J., & Zhong, K. (2022). Anomaly detection in Internet of Medical Things with blockchain from the perspective of deep neural network. Information Sciences, 617, 133–149. https://doi.org/10.1016/j.ins.2022.10.060.
- Sargunapathi, R., Vinayagamoorthy, P., Sumathi, P., & Begum, S. S. (2020). Mapping of scientific articles on brain tumors: A scientometric study. Indian Journal of Information Sources and Services, 10(2), 26–34. https://doi.org/10.51983/ijiss.2020.10.2.490.
- Jain, A., & Babu, K. A. (2024). Role of green buildings in the sustainable development of tier-II cities in India. Archives for Technical Sciences, 2(31), 368–378. https://doi.org/10.70102/afts.2024.1631.368.
- Roy, S. K., & Mandal, S. (2020). Users’ perceptions toward library and library services of IISER Kolkata. Indian Journal of Information Sources and Services, 10(2), 44–47. https://doi.org/10.51983/ijiss.2020.10.2.487.
- Sungur, Ş., Çömez, M., & Köroğlu, M. (2021). Determination of vitamin K2 content of dairy products produced in Hatay region in Turkey. Natural and Engineering Sciences, 6(3), 155–165.
- Đurić, N., Stevović, S., Đurić, D., & Perišić, M. (2018). Research methodology of railway route Doboj – Zenica, section km 103+500 – Maglaj. Ar-chives for Technical Sciences, 1(18), 9–20. https://doi.org/10.7251/afts.2018.1018.009D.
- Vinodh Kumar, B., Dhanapal, A., & Tharmar, K. (2019). An analysis of online courses: With special reference to SWAYAM. Indian Journal of In-formation Sources and Services, 9(S1), 19–22. https://doi.org/10.51983/ijiss.2019.9.S1.572.
- Tharik, M., Saraswathi, S., & Arumugam, K. (2021). Uncommon mass beaching of Porpita porpita (Linnaeus, 1758) in the Gulf of Mannar, Tamil Nadu, India. Natural and Engineering Sciences, 6(3), 256–260. https://doi.org/10.28978/nesciences.1036855.
- Kalaiselvi, S., & Kumar, R. S. (2024). Experimental investigation on the weld strength of the steel beam with and without stiffener. Archives for Technical Sciences, 2(31), 240–247. https://doi.org/10.70102/afts.2024.1631.240.
- Dar, B. A., Ahmad, S., & Basharat, M. (2019). Use and awareness of digital information resources (DIRs) by undergraduate students: A survey of Government Degree College for Women Anantnag, Jammu and Kashmir. Indian Journal of Information Sources and Services, 9(1), 9–13. https://doi.org/10.51983/ijiss.2019.9.1.604.
- Tuncer, S., Koç, H. T., & Erdoğan, Z. (2020). Occurrence of the golden pompano, Trachinotus ovatus (Linnaeus 1758) (Osteichthyes: Carangidae) in Dardanelles, the Sea of Marmara. Natural and Engineering Sciences, 5(1), 37–44. https://doi.org/10.28978/nesciences.691695.
- Snousi, H. M., Aleej, F. A., Bara, M. F., & Alkilany, A. (2022). ADC: Novel Methodology for Code Converter Application for Data Pro-cessing. Journal of VLSI Circuits and Systems, 4(2), 46–56. https://doi.org/10.31838/jvcs/04.02.07.
- Jakhir, C., Rudevdagva, R., & Riunaa, L. (2023). Advancements in the novel reconfigurable Yagi antenna. National Journal of Antennas and Prop-agation, 5(1), 33–38. https://doi.org/10.31838/NJAP/05.01.06.
- Suneetha, J., Venkateshwar, C., Rao, A.T.V.S.S.N., Tarun, D., Rupesh, D., Kalyan, A., & Sunil Sai, D. (2023). An intelligent system for toddler cry detection. International Journal of Communication and Computer Technologies, 10(2), 5-10. https://doi.org/10.31838/ijccts/10.02.02.
- Kankam, Kunrada, Prasit Cholamjiak, and Watcharaporn Cholamjiak. "A modified parallel monotone hybrid algorithm for a finite family of $mathcal {G} $-nonexpansive mappings apply to a novel signal recovery." Results in Nonlinear Analysis 5.3 (2022): 393-411. https://doi.org/10.53006/rna.1122092.
-
Downloads
-
How to Cite
Mishra, D. N. ., & Nayak, A. . (2025). IOMT Security and Anomaly Detection in Medical Images Using AI. International Journal of Basic and Applied Sciences, 14(SI-1), 495-500. https://doi.org/10.14419/6fzpzd03
