IOMT Security and Anomaly Detection in Medical Images ‎Using AI

  • Authors

    • Dr. Nidhi Mishra Assistant Professor, Department of CS & IT, Kalinga University, Raipur, India
    • Ashu Nayak Assistant Professor, Department of CS & IT, Kalinga University, Raipur, India
    https://doi.org/10.14419/6fzpzd03

    Received date: June 10, 2025

    Accepted date: June 17, 2025

    Published date: November 1, 2025

  • Information and Communication Technology; Internet of Things; Internet of Medical Things; Security; Authentication; Access Control; ‎Key Agreement; Simulation.
  • Abstract

    The extensive use of information and communication technology (ICT) has transformed every aspect of life as the world moves closer to ‎digitalization. There is no denying that ICT has changed how people communicate, live, work, and study. The Internet of Things, or things, ‎is a powerful combination of critical ICT technologies, with integrated hardware, software, and other technologies for connecting and ‎sharing data with other systems and devices over the Internet. An Internet of Things (IoT) device is any electronic device that can be used in ‎a wide range of social contexts, including connected industries, transportation, healthcare, smart supply chains, smart farms, smart cities, ‎smart grids, and many more. This includes wearable technology and hardware. The Internet of Medical Things (IoMT) is a real-world ‎application of the Internet of Things (IoT) in the healthcare sector, enabling patients to receive better healthcare and enjoy a higher quality of ‎life. It provides seniors and patients with real-time healthcare services, support, and caregiving using Internet-enabled smart devices. The ‎current coronavirus disease (COVID-19) has increased the demand for remote patient care due to a paucity of resources and healthcare ‎facilities, in contrast to the enormous global demand for these services and facilities. Therefore, COVID-19 has played a significant role in ‎the shift of the present healthcare system towards remote care. Even with advancements in the healthcare sector and the apparent benefits of ‎integrating it with IoT, moving all forms of communication online is a logical next step. It opens the door for potential security lapses in the ‎ongoing IoMT communication, providing adversaries with unauthorized access to vital health data that could be misused for malicious ‎intent‎.

  • References

    1. Ravi, V., Pham, T. D., & Alazab, M. (2023). Deep learning-based network intrusion detection system for Internet of Medical Things. IEEE Internet of Things Magazine, 6(2), 50–54. https://doi.org/10.1109/IOTM.001.2300021.
    2. Khan, I. A., Moustafa, N., Razzak, I., Tanveer, M., Pi, D., Pan, Y., & Ali, B. S. (2022). XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks. Future Generation Computer Systems, 127, 181–193. https://doi.org/10.1016/j.future.2021.09.010.
    3. Edmund, A. N., Alabi, C. A., Tooki, O. O., Imoize, A. L., & Salka, T. D. (2023). Artificial intelligence-assisted Internet of Medical Things enabling medical image processing. In Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things (pp. 309–334). CRC Press.
    4. Wazid, M., Singh, J., Das, A. K., Shetty, S., Khan, M. K., & Rodrigues, J. J. P. C. (2022). ASCP-IoMT: AI-enabled lightweight secure communica-tion protocol for Internet of Medical Things. IEEE Access, 10, 57990–58004. https://doi.org/10.1109/ACCESS.2022.3179418.
    5. Muheidat, F., & Tawalbeh, L. A. (2023). AIoMT artificial intelligence (AI) and Internet of Medical Things (IoMT): Applications, challenges, and future trends. In Computational Intelligence for Medical Internet of Things (MIoT) Applications (pp. 33–54). Academic Press. https://doi.org/10.1016/B978-0-323-99421-7.00013-1.
    6. Ahmad, S., Khan, S., AlAjmi, M. F., Dutta, A. K., Dang, L. M., Joshi, G. P., & Moon, H. (2022). Deep learning enabled disease diagnosis for se-cure Internet of Medical Things. Computers, Materials & Continua, 73(1). https://doi.org/10.32604/cmc.2022.025760.
    7. Wagan, S. A., Koo, J., Siddiqui, I. F., Qureshi, N. M. F., Attique, M., & Shin, D. R. (2023). A fuzzy-based duo-secure multi-modal framework for IoMT anomaly detection. Journal of King Saud University - Computer and Information Sciences, 35(1), 131–144. https://doi.org/10.1016/j.jksuci.2022.11.007.
    8. Liu, W., Zhao, F., Shankar, A., Maple, C., Peter, J. D., Kim, B.-G., Slowik, A., Parameshachari, B. D., & Lv, J. (2023). Explainable AI for medical image analysis in medical cyber-physical systems: Enhancing transparency and trustworthiness of IoMT. IEEE Journal of Biomedical and Health In-formatics.
    9. Manickam, P., Mariappan, S. A., Murugesan, S. M., Hansda, S., Kaushik, A., Shinde, R., & Thipperudraswamy, S. P. (2022). Artificial intelligence (AI) and Internet of Medical Things (IoMT) assisted biomedical systems for intelligent healthcare. Biosensors, 12(8), 562. https://doi.org/10.3390/bios12080562.
    10. Chen, P.-Y., Cheng, Y.-C., Zhong, Z.-H., Zhang, F.-Z., Pai, N.-S., Li, C.-M., & Lin, C.-H. (2024). Information security and artificial intelligence–assisted diagnosis in an Internet of Medical Thing system (IoMTS). IEEE Access. https://doi.org/10.1109/ACCESS.2024.3351373.
    11. Kakhi, K., Alizadehsani, R., Kabir, H. D., Khosravi, A., Nahavandi, S., & Acharya, U. R. (2022). The Internet of Medical Things and artificial in-telligence: Trends, challenges, and opportunities. Biocybernetics and Biomedical Engineering, 42(3), 749–771. https://doi.org/10.1016/j.bbe.2022.05.008.
    12. Sy, I., Diouf, B., Diop, A. K., Drocourt, C., & Durand, D. (2023). Enhancing security in connected medical IoT networks through deep learning-based anomaly detection. In International Conference on Mobile, Secure, and Programmable Networking (pp. 87–99). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-52426-4_7.
    13. Ghubaish, A., Salman, T., Zolanvari, M., Unal, D., Al-Ali, A., & Jain, R. (2020). Recent advances in the Internet-of-Medical-Things (IoMT) sys-tems security. IEEE Internet of Things Journal, 8(11), 8707–8718. https://doi.org/10.1109/JIOT.2020.3045653.
    14. Alsalman, D. (2024). A comparative study of anomaly detection techniques for IoT security using AMoT (Adaptive Machine Learning for IoT Threats). IEEE Access. https://doi.org/10.1109/ACCESS.2024.3359033.
    15. Wang, J., Jin, H., Chen, J., Tan, J., & Zhong, K. (2022). Anomaly detection in Internet of Medical Things with blockchain from the perspective of deep neural network. Information Sciences, 617, 133–149. https://doi.org/10.1016/j.ins.2022.10.060.
    16. Sargunapathi, R., Vinayagamoorthy, P., Sumathi, P., & Begum, S. S. (2020). Mapping of scientific articles on brain tumors: A scientometric study. Indian Journal of Information Sources and Services, 10(2), 26–34. https://doi.org/10.51983/ijiss.2020.10.2.490.
    17. Jain, A., & Babu, K. A. (2024). Role of green buildings in the sustainable development of tier-II cities in India. Archives for Technical Sciences, 2(31), 368–378. https://doi.org/10.70102/afts.2024.1631.368.
    18. Roy, S. K., & Mandal, S. (2020). Users’ perceptions toward library and library services of IISER Kolkata. Indian Journal of Information Sources and Services, 10(2), 44–47. https://doi.org/10.51983/ijiss.2020.10.2.487.
    19. Sungur, Ş., Çömez, M., & Köroğlu, M. (2021). Determination of vitamin K2 content of dairy products produced in Hatay region in Turkey. Natural and Engineering Sciences, 6(3), 155–165.
    20. Đurić, N., Stevović, S., Đurić, D., & Perišić, M. (2018). Research methodology of railway route Doboj – Zenica, section km 103+500 – Maglaj. Ar-chives for Technical Sciences, 1(18), 9–20. https://doi.org/10.7251/afts.2018.1018.009D.
    21. Vinodh Kumar, B., Dhanapal, A., & Tharmar, K. (2019). An analysis of online courses: With special reference to SWAYAM. Indian Journal of In-formation Sources and Services, 9(S1), 19–22. https://doi.org/10.51983/ijiss.2019.9.S1.572.
    22. Tharik, M., Saraswathi, S., & Arumugam, K. (2021). Uncommon mass beaching of Porpita porpita (Linnaeus, 1758) in the Gulf of Mannar, Tamil Nadu, India. Natural and Engineering Sciences, 6(3), 256–260. https://doi.org/10.28978/nesciences.1036855.
    23. Kalaiselvi, S., & Kumar, R. S. (2024). Experimental investigation on the weld strength of the steel beam with and without stiffener. Archives for Technical Sciences, 2(31), 240–247. https://doi.org/10.70102/afts.2024.1631.240.
    24. Dar, B. A., Ahmad, S., & Basharat, M. (2019). Use and awareness of digital information resources (DIRs) by undergraduate students: A survey of Government Degree College for Women Anantnag, Jammu and Kashmir. Indian Journal of Information Sources and Services, 9(1), 9–13. https://doi.org/10.51983/ijiss.2019.9.1.604.
    25. Tuncer, S., Koç, H. T., & Erdoğan, Z. (2020). Occurrence of the golden pompano, Trachinotus ovatus (Linnaeus 1758) (Osteichthyes: Carangidae) in Dardanelles, the Sea of Marmara. Natural and Engineering Sciences, 5(1), 37–44. https://doi.org/10.28978/nesciences.691695.
    26. Snousi, H. M., Aleej, F. A., Bara, M. F., & Alkilany, A. (2022). ADC: Novel Methodology for Code Converter Application for Data Pro-cessing. Journal of VLSI Circuits and Systems, 4(2), 46–56. https://doi.org/10.31838/jvcs/04.02.07.
    27. Jakhir, C., Rudevdagva, R., & Riunaa, L. (2023). Advancements in the novel reconfigurable Yagi antenna. National Journal of Antennas and Prop-agation, 5(1), 33–38. https://doi.org/10.31838/NJAP/05.01.06.
    28. Suneetha, J., Venkateshwar, C., Rao, A.T.V.S.S.N., Tarun, D., Rupesh, D., Kalyan, A., & Sunil Sai, D. (2023). An intelligent system for toddler cry detection. International Journal of Communication and Computer Technologies, 10(2), 5-10. https://doi.org/10.31838/ijccts/10.02.02.
    29. Kankam, Kunrada, Prasit Cholamjiak, and Watcharaporn Cholamjiak. "A modified parallel monotone hybrid algorithm for a finite family of $mathcal {G} $-nonexpansive mappings apply to a novel signal recovery." Results in Nonlinear Analysis 5.3 (2022): 393-411. https://doi.org/10.53006/rna.1122092.
  • Downloads

  • How to Cite

    Mishra, D. N. ., & Nayak, A. . (2025). IOMT Security and Anomaly Detection in Medical Images ‎Using AI. International Journal of Basic and Applied Sciences, 14(SI-1), 495-500. https://doi.org/10.14419/6fzpzd03