768 results on '"Internet of Medical Things"'
Search Results
2. SDRG-Net: Secure DR grading network for Real-Time decision support in IoMT environments
- Author
-
Poranki, Venkata Kotam Raju and Srinivasarao, B.
- Published
- 2025
- Full Text
- View/download PDF
3. MetaXAI: Metahuman-assisted audio and visual explainability framework for Internet of Medical Things
- Author
-
Kök, İbrahim
- Published
- 2025
- Full Text
- View/download PDF
4. Hybrid deep learning-based cyberthreat detection and IoMT data authentication model in smart healthcare
- Author
-
Kumar, Manish, Singh, Sushil Kumar, and Kim, Sunggon
- Published
- 2025
- Full Text
- View/download PDF
5. Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain
- Author
-
Kuliha, Megha and Verma, Sunita
- Published
- 2024
- Full Text
- View/download PDF
6. Intelligent two-phase dual authentication framework for Internet of Medical Things.
- Author
-
Asif, Muhammad, Abrar, Mohammad, Salam, Abdu, Amin, Farhan, Ullah, Faizan, Shah, Sabir, and AlSalman, Hussain
- Subjects
- *
PUBLIC key cryptography , *ADVANCED Encryption Standard , *ARTIFICIAL intelligence , *CYBERTERRORISM , *ELLIPTIC curves , *INTERNET of medical things - Abstract
The Internet of Medical Things (IoMT) has revolutionized healthcare by bringing real-time monitoring and data-driven treatments. Nevertheless, the security of communication between IoMT devices and servers remains a huge problem because of the inherent sensitivity of the health data and susceptibility to cyber threats. Current security solutions, including simple password-based authentication and standard Public Key Infrastructure (PKI) approaches, typically do not achieve an appropriate balance between security and low computational overhead, resulting in the possibility of performance bottlenecks and increased vulnerability to attacks. To overcome these limitations, we present an intelligent two-phase dual authentication framework that improves the security of sensor-to-server communication in IoMT environments. During the registration phase, our framework is based on Elliptic Curve Diffie-Hellman (ECDH) for rapid key exchange, and during real-time communication, our framework uses the Advanced Encryption Standard Galois Counter Mode (AES-GCM) to encrypt data securely. The efficiency of the proposed framework was rigorously tested through simulations that evaluated encryption-decryption time, computational cost, latency, and packet delivery ratio. The security resilience was also evaluated against man-in-the-middle, replay, and brute force attacks. The results show that encryption/decryption time is reduced by over 45%, overall computational cost by 45.38%, and latency by 28.42% over existing approaches. Furthermore, the framework achieved a high packet delivery ratio and strong defense against cyber threats for maintaining the confidentiality and integrity of the medical data across IoMT networks. However, the dual authentication approach doesn't affect the functionality of medical IoT devices while enhancing IoMT security, which makes it an ideal integration option for existing healthcare systems. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
7. Enhanced IoMT security framework using group teaching optimized auto-encoder for intrusion detection.
- Author
-
Manoharan, Archana and Thathan, Manigandan
- Subjects
- *
COMPUTER network security , *INTERNET security , *INFORMATION technology security , *DEEP learning , *ALGORITHMS , *INTRUSION detection systems (Computer security) , *INTERNET of medical things - Abstract
Providing security to Internet of Medical Things (IoMT) is significant worldwide problem for future generations its implementation to be successful. The traditional security methodologies developed for IoMT struggles with the specific issues of high false positives and lower detection rate. Therefore, the proposed work aims to develop a ground-breaking intrusion detection model, named as, Group Teaching Optimized Probabilistic Deep Auto-Encoder (GTPDA) for increasing the security of IoMT networks. Here, the data transformation and normalization processes are applied to balance the dataset's properties. Then, an Intriguing Group Teaching Optimization (IGTO) algorithm is applied to choose the most correlated and essential traits from the normalized dataset for effective intrusion detection. Consequently, a Conditional Probabilistic Deep Auto-Encoder (CPDAE) model is used to more accurately classify the type of intrusion with system complexity. This study uses the BoT-IoT, Kaggle invasion dataset, and ToN-IoT open benchmarking datasets for evaluation and performance assessments. Among all, the proposed GTPDA with its various performance metrics presented, achieves an impressive 98.8% precision, 99% recall, 98.8% F1-score, and 99% accuracy, showing its significant performance in ensuring IoMT network security. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. A novel approach for encryption and decryption of digital imaging and communications using mathematical modelling in internet of medical things.
- Author
-
Thalapathiraj, S., Arunnehru, J., Bharathi, V. C., Dhanasekar, R., Vijayaraja, L., Kannadasan, R., Faheem, Muhammad, and Khan, Arfat Ahmad
- Subjects
DATA encryption ,COMPUTER network security ,DIGITAL image processing ,DIGITAL communications ,MEDICAL communication ,IMAGE encryption - Abstract
This research introduces an innovative algorithm for the encryption and decryption of greyscale digital imaging and communications in medicine images utilizing Laplace transforms. The proposed method presents a ground breaking approach to image encryption, effectively concealing visual information and ensuring a robust, secure, and reliable encryption process. By leveraging the inherent strengths of Laplace transform, the algorithm guarantees the complete retrieval of the original image without any loss, provided the correct decryption key is used. To thoroughly evaluate the performance of the algorithm, multiple tests were conducted, including extensive statistical analyses and assessments of encryption quality. Key performance metrics were carefully measured, including correlation coefficients and entropy values, which ranged from 7.89 to 7.99. Additionally, the algorithm's effectiveness was demonstrated through peak signal‐to‐noise ratio values, which spanned from 7.597 to 9.915, indicating the degree of similarity between the original and encrypted images. Furthermore, the number of pixels change rate values, ranging from 99.519241 to 99.609375, highlighted the algorithm's ability to produce significantly different encrypted images from the original. The unified average changing intensity values, falling between 35.72345678 and 35.78233456, further underscored the algorithm's proficiency in altering pixel intensities uniformly. Overall, this research offers a significant advancement in the field of image encryption, combining theoretical robustness with practical efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Exploring secure and private data aggregation techniques for the internet of things: a comprehensive review.
- Author
-
Aga, Dagmawit Tadesse, Chintanippu, Rakesh, Mowri, Rawshan Ara, and Siddula, Madhuri
- Subjects
DATA privacy ,SMART devices ,SMART cities ,INTERNET of things ,INTERNET security ,INTERNET privacy - Abstract
The Internet of Things (IoT) is a notion in which smart devices seamlessly integrate with physical and virtual resources. These resources are accessible online and available to anyone to provide value-added information. The rapid advancement of technology has resulted in the creation of various features and capabilities for end-users and applications. Smart devices generate a large amount of data on the Internet of Things (IoT) and aggregate it on various server platforms, which is crucial for data processing, aggregating, and controlling. The accelerated development of technology has led to the creation of various features and capabilities for end-users and applications. Despite its benefits, IoT technology is plagued by several security and privacy concerns that must be addressed to ensure widespread acceptance. The accelerated technological progress has created a multitude of features and capabilities, yet it has also posed substantial challenges. To address this problem, researchers and practitioners have adopted numerous schemes to aggregate data while preserving data privacy. Data privacy is critical to protect against network entities inside the network, data operators, and external eavesdroppers. This survey paper delves into the security and privacy challenges associated with IoT and explores recent solutions, such as APPA, blockchain-enabled IoT, LPDA, EF-IDASC, and two secure privacy-preserving data aggregation schemes - PPLS. Additionally, it outlines several open research challenges and their anticipated solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Human-centered IoT-based health monitoring in the Healthcare 5.0 era: literature descriptive analysis and future research guidelines.
- Author
-
Rashid, Samad and Nemati, Arash
- Subjects
DATA analytics ,REAL-time control ,INTERNET of things ,EMERGENCY medical services ,INDUSTRY 4.0 - Abstract
Continuous monitoring of individuals' health, particularly those with chronic diseases, out of healthcare centers could result in lower patient traffic in healthcare centers, much more real-time health control, and faster emergency services. Hence, using the internet of things (IoTs) as an enabler of Industry 4.0 facilitating remote health monitoring has gained more attention in recent years. Although plenty of research has been focused on IoT-based health monitoring, they neglected emerging concepts like human-centered health data analytics as a significant requirement in the Healthcare 5.0 era. This paper contributes to the status of human-centered IoT-based health monitoring by conducting a descriptive analysis of the corresponding literature according to biometrics monitored, applied software, hardware, sensors, and communication models, highlighting the lack of consideration of long-term, human-centered health monitoring in the existing IoT-based health monitoring literature. Results showed that the focus of the literature has mostly been on information transit technology development and not human-centered data analytics. In addition, a gap analysis of the current literature recommendations emphasized multi-biometrics monitoring and cybersecurity, not human-centered health data analysis. Finally, several guidelines are provided for human-centered IoT-based health monitoring in future research. Article Highlights: Descriptive analysis of literature on IoT-based health monitoring. Highlighting the lack of attention to the human-centered IoT-based health monitoring. Proposing guidelines for human-centered IoT-based health monitoring. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Secure and Lightweight Cluster-Based User Authentication Protocol for IoMT Deployment †.
- Author
-
Su, Xinzhong and Xu, Youyun
- Subjects
- *
ACCESS control , *DETECTORS , *PRIVACY , *SECURITY management , *INTERNET of medical things - Abstract
Authentication is considered one of the most critical technologies for the next generation of the Internet of Medical Things (IoMT) due to its ability to significantly improve the security of sensors. However, higher frequency cyber-attacks and more intrusion methods significantly increase the security risks of IoMT sensor devices, resulting in more and more patients' privacy being threatened. Different from traditional IoT devices, sensors are generally considered to be based on low-cost hardware designs with limited storage resources; thus, authentication techniques for IoMT scenarios might not be applicable anymore. In this paper, we propose an efficient three-factor cluster-based user authentication protocol (3ECAP). Specifically, we establish the security association between the user and the sensor cluster through fine-grained access control based on Merkle, which perfectly achieves the segmentation of permission. We then demonstrate that 3ECAP can address the privilege escalation attack caused by permission segmentation. Moreover, we further analyze the security performance and communication cost using formal and non-formal security analysis, Proverif, and NS3. Simulation results demonstrated the robustness of 3ECAP against various cyber-attacks and its applicability in an IoMT environment with limited storage resources. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. An Intrusion Detection Model for Internet of Medical Things Using BDA-DAN2 Model.
- Author
-
Alhazmi, Raid Mohsen
- Subjects
DENIAL of service attacks ,FEATURE selection ,MEDICAL equipment ,DEEP learning ,ALGORITHMS ,INTRUSION detection systems (Computer security) ,INTERNET of medical things - Abstract
The Internet of Medical Things (IoMT) is a subset of the Internet of Things (IoT) where medical devices communicate with one another to share sensitive data. The integration of medical devices into the IoT has greatly assisted the development of the IoMT. These advancements facilitate effective communication and providing care for patients in the healthcare sector. However, they also face specific security and privacy concerns, such as malware attacks and denial of service (DoS) attacks. To overcome this problem, intrusion detection systems (IDS) are introduced, specifically employing deep learning (DL) methodologies. This study proposes a deep learning-based binary dragonfly algorithm (BDA) with a dynamic architecture for arti- ficial neural networks2 (DAN2) model for implementing a robust and accurate IDS in IoMT. The IDS has the following stages: collection of data, preprocessing, selection of features, and classification. The IoMT dataset is employed to train the model to get improved outcomes. The standard scalar technique is used for the data preprocessing process. The BDA algorithm is used for feature selection (FS) of the preprocessed data. The DAN2 model is implemented to classify the selected data and to improve the classification accuracy. The dataset was further divided for training and testing of the model. The performance of the BDA-DAN2 model is assessed utilizing the evaluation parameters of accuracy, recall, precision, and F1-score. The BDA-DAN2 model demonstrates superior performance with 99.12% accuracy, 99.28% precision, 99.40% recall, and 98.56% F1-score during training, and 98.92% accuracy, 98.50% precision, 98.68% recall, and 97.90% F1-score during testing. Experiments confirmed that the binary dragonfly algorithm with the DAN2 (BDA-DAN2) model has the highest accuracy compared to the existing models. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Securing IoMT Applications: An Approach for Enhancing the Reliability of Security Policies within Cloud Databases.
- Author
-
KSIBI, SONDES, JAIDI, FAOUZI, and BOUHOULA, ADEL
- Subjects
DATABASES ,ACCESS control ,DATA warehousing ,ELECTRONIC data processing ,DATA security failures ,INTERNET of medical things - Abstract
Applications of the Internet-of-Things (IoT) in healthcare have a great potential since they bring, in a cost effective manner, supreme solutions to large scale medical-care. The Internet-of-Medical-Things (IoMT) connects patients to caregivers and facilitates remote healthcare capabilities. Regardless of their expansion, especially during the COVID19 pandemic, IoMT applications encounter critical types of security risks. Many research efforts were conducted to help designing reliable E-Health Systems (EHS), but compliance and privacy-preserving solutions for EHS still require a lot of work. To address this requirement, we focus on reliability enhancement of security policies in the context of EHS. We especially deal with risk management within the data processing and storage area, in IoMT systems, composed mainly of cloud/private databases that store confidential medical data. Malicious users and attackers can discover and leak unauthorized data via exploiting authorized information and may expand their rights by using advanced features such as database functional dependencies. In such critical systems, identifying and evaluating risks associated to non authorized accesses and policies misconfigurations is highly required. We address, in this paper, the analysis and the management of the compliance of concrete security policies based on appropriate risk metrics. Our solution enhances a well-established formal verification and validation approach that allows identifying non-compliance anomalies in concrete policies with a quantified risk-assessment approach for evaluating risks. A case of application is presented as an example to illustrate the relevance of our proposal. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Kernel random forest with black hole optimization for heart diseases prediction using data fusion.
- Author
-
Alluhaidan, Ala Saleh, Maashi, Mashael, Negm, Noha, Alotaibi, Shoayee Dlaim, Alzahrani, Ibrahim R., and Salama, Ahmed S.
- Subjects
OPTIMIZATION algorithms ,MULTISENSOR data fusion ,RANDOM forest algorithms ,INTERNET of medical things - Abstract
In recent years, the Internet of Things has played a dominant role in various real-time problems and given solutions via sensor signals. Monitoring the patient health status of Internet of Medical Things (IoMT) facilitates communication between wearable sensor devices and patients through a wireless network. Heart illness is one of the reasons for the increasing death rate in the world. Diagnosing the disease is done by the fusion of multi-sensor device signals. Much research has been done in predicting the disease and treating it correctly. However, the issues are accuracy, consumption time, and inefficiency. To overcome these issues, this paper proposed an efficient algorithm for fusing the multi-sensor signals from wearable sensor devices, classifying the medical signal data and predicting heart disease using the hybrid technique of kernel random forest with the Black Hole Optimization algorithm (KRF-BHO). This KRF-BHO is used for sensor data fusion, while XG-Boost is used to classify echocardiogram images. Accuracy in the training phase with multi-sensor data fusion data set of proposed work KRF-BHO with XGBoost classifier is 94.12%; in the testing phase, the accuracy rate is 95.89%. Similarly, for the Cleveland Dataset, the proposed work KRF-BHO with XGBoost classifier is 95.78%; in the testing phase, the accuracy rate is 96.21%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Resilience in the Internet of Medical Things: A Review and Case Study.
- Author
-
Tomer, Vikas, Sharma, Sachin, and Davis, Mark
- Subjects
SOFTWARE-defined networking ,MACHINE learning ,PATIENT monitoring ,CARDIAC patients ,INTERNET of medical things - Abstract
The Internet of Medical Things (IoMT), an extension of the Internet of Things (IoT), is still in its early stages of development. Challenges that are inherent to IoT, persist in IoMT as well. The major focus is on data transmission within the healthcare domain due to its profound impact on health and public well-being. Issues such as latency, bandwidth constraints, and concerns regarding security and privacy are critical in IoMT owing to the sensitive nature of patient data, including patient identity and health status. Numerous forms of cyber-attacks pose threats to IoMT networks, making the reliable and secure transmission of critical medical data a challenging task. Several other situations, such as natural disasters, war, construction works, etc., can cause IoMT networks to become unavailable and fail to transmit the data. The first step in these situations is to recover from failure as quickly as possible, resume the data transfer, and detect the cause of faults, failures, and errors. Several solutions exist in the literature to make the IoMT resilient to failure. However, no single approach proposed in the literature can simultaneously protect the IoMT networks from various attacks, failures, and faults. This paper begins with a detailed description of IoMT and its applications. It considers the underlying requirements of resilience for IoMT networks, such as monitoring, control, diagnosis, and recovery. This paper comprehensively analyzes existing research efforts to provide IoMT network resilience against diverse causes. After investigating several research proposals, we identify that the combination of software-defined networks (SDNs), machine learning (ML), and microservices architecture (MSA) has the capabilities to fulfill the requirements for achieving resilience in the IoMT networks. It mainly focuses on the analysis of technologies, such as SDN, ML, and MSA, separately, for meeting the resilience requirements in the IoMT networks. SDN can be used for monitoring and control, and ML can be used for anomaly detection and diagnosis, whereas MSA can be used for bringing distributed functionality and recovery into the IoMT networks. This paper provides a case study that describes the remote patient monitoring (RPM) of a heart patient in IoMT networks. It covers the different failure scenarios in IoMT infrastructure. Finally, we provide a proposed methodology that elaborates how distributed functionality can be achieved during these failures using machine learning, software-defined networks, and microservices technologies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. An Explainable Deep Learning-Enhanced IoMT Model for Effective Monitoring and Reduction of Maternal Mortality Risks.
- Author
-
Saleh, Sherine Nagy, Elagamy, Mazen Nabil, Saleh, Yasmine N. M., and Osman, Radwa Ahmed
- Subjects
ARTIFICIAL intelligence ,MACHINE learning ,MATERNAL mortality ,DEEP learning ,MEDICAL personnel ,INTERNET of medical things - Abstract
Maternal mortality (MM) is considered one of the major worldwide concerns. Despite the advances of artificial intelligence (AI) in healthcare, the lack of transparency in AI models leads to reluctance to adopt them. Employing explainable artificial intelligence (XAI) thus helps improve the transparency and effectiveness of AI-driven healthcare solutions. Accordingly, this article proposes a complete framework integrating an Internet of Medical Things (IoMT) architecture with an XAI-based deep learning model. The IoMT system continuously monitors pregnant women's vital signs, while the XAI model analyzes the collected data to identify risk factors and generate actionable insights. Additionally, an efficient IoMT transmission model is developed to ensure reliable data transfer with the best-required system quality of service (QoS). Further analytics are performed on the data collected from different regions in a country to address high-risk cities. The experiments demonstrate the effectiveness of the proposed framework by achieving an accuracy of 80% for patients and 92.6% for regional risk prediction and providing interpretable explanations. The XAI-generated insights empower healthcare providers to make informed decisions and implement timely interventions. Furthermore, the IoMT transmission model ensures efficient and secure data transfer. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. IMPLEMENTING A SECURE CLOUD-BASED SYSTEM TO SAFEGUARD SENSITIVE MEDICAL DATA FOR HEALTHCARE.
- Author
-
KHALEQ ZGHAIR, NOOR ABDUL, AL-SADI, AMEER MOSA, and RAZZAQ TARESH, ALI ABDUL
- Subjects
WIRELESS sensor networks ,DISCRETE wavelet transforms ,CLOUD computing ,DEVELOPED countries ,INFORMATION dissemination ,INTERNET of medical things - Abstract
In most developed countries, the medical healthcare system is experiencing rapid development from the stage of clinical information to the stage of information dissemination. In all of these countries, it is undeniable that the Internet of Medical Things (IoMT) technologies have contributed in order to develop information medical healthcare. In reality, the development of smart medical healthcare has been hindered by the protection of medical privacy, according to research and acceptance. This is especially true as telecommunications systems continue to expand and wireless sensor networks (WSN) develop, as well as ways to penetrate those checks that have become increasingly difficult. In the smart healthcare system, protecting users' information remains an outstanding issue. IoMT features and the protection of privacy and security have led to the development of an extended privacy homomorphism algorithm based on scrambling matrixes, an encryption algorithm enhanced by Modified RSA (mRSA), and a method of encrypted data compression that ensures data confidentiality. For the above purpose, we built a prototype system on a demo temporary domain using both hardware and software. According to the results, the proposed scheme protects E-healthcare from potential threats by providing stakeholders with a secure interface and preventing unauthorized users from accessing the mCloud, thus ensuring privacy. E-healthcare services based on cloud technology are protected by the proposed scheme because it is simple and robust. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Enhanced IoMT security framework using group teaching optimized auto-encoder for intrusion detection
- Author
-
Archana Manoharan and Manigandan Thathan
- Subjects
Cyber-attacks ,Deep learning ,Intrusion detection system ,Information security ,Internet of medical things ,Medicine ,Science - Abstract
Abstract Providing security to Internet of Medical Things (IoMT) is significant worldwide problem for future generations its implementation to be successful. The traditional security methodologies developed for IoMT struggles with the specific issues of high false positives and lower detection rate. Therefore, the proposed work aims to develop a ground-breaking intrusion detection model, named as, Group Teaching Optimized Probabilistic Deep Auto-Encoder (GTPDA) for increasing the security of IoMT networks. Here, the data transformation and normalization processes are applied to balance the dataset’s properties. Then, an Intriguing Group Teaching Optimization (IGTO) algorithm is applied to choose the most correlated and essential traits from the normalized dataset for effective intrusion detection. Consequently, a Conditional Probabilistic Deep Auto-Encoder (CPDAE) model is used to more accurately classify the type of intrusion with system complexity. This study uses the BoT-IoT, Kaggle invasion dataset, and ToN-IoT open benchmarking datasets for evaluation and performance assessments. Among all, the proposed GTPDA with its various performance metrics presented, achieves an impressive 98.8% precision, 99% recall, 98.8% F1-score, and 99% accuracy, showing its significant performance in ensuring IoMT network security.
- Published
- 2024
- Full Text
- View/download PDF
19. Exploring secure and private data aggregation techniques for the internet of things: a comprehensive review
- Author
-
Dagmawit Tadesse Aga, Rakesh Chintanippu, Rawshan Ara Mowri, and Madhuri Siddula
- Subjects
Data aggregation ,Data privacy ,Internet of things ,Internet of medical things ,Security ,Smart city ,Computer engineering. Computer hardware ,TK7885-7895 ,Computer software ,QA76.75-76.765 - Abstract
Abstract The Internet of Things (IoT) is a notion in which smart devices seamlessly integrate with physical and virtual resources. These resources are accessible online and available to anyone to provide value-added information. The rapid advancement of technology has resulted in the creation of various features and capabilities for end-users and applications. Smart devices generate a large amount of data on the Internet of Things (IoT) and aggregate it on various server platforms, which is crucial for data processing, aggregating, and controlling. The accelerated development of technology has led to the creation of various features and capabilities for end-users and applications. Despite its benefits, IoT technology is plagued by several security and privacy concerns that must be addressed to ensure widespread acceptance. The accelerated technological progress has created a multitude of features and capabilities, yet it has also posed substantial challenges. To address this problem, researchers and practitioners have adopted numerous schemes to aggregate data while preserving data privacy. Data privacy is critical to protect against network entities inside the network, data operators, and external eavesdroppers. This survey paper delves into the security and privacy challenges associated with IoT and explores recent solutions, such as APPA, blockchain-enabled IoT, LPDA, EF-IDASC, and two secure privacy-preserving data aggregation schemes - PPLS. Additionally, it outlines several open research challenges and their anticipated solutions.
- Published
- 2024
- Full Text
- View/download PDF
20. Human-centered IoT-based health monitoring in the Healthcare 5.0 era: literature descriptive analysis and future research guidelines
- Author
-
Samad Rashid and Arash Nemati
- Subjects
Internet of medical things ,Remote health monitoring ,Healthcare 4.0 ,Healthcare 5.0 ,Human-centered health data analytics ,Computer engineering. Computer hardware ,TK7885-7895 ,Computer software ,QA76.75-76.765 - Abstract
Abstract Continuous monitoring of individuals’ health, particularly those with chronic diseases, out of healthcare centers could result in lower patient traffic in healthcare centers, much more real-time health control, and faster emergency services. Hence, using the internet of things (IoTs) as an enabler of Industry 4.0 facilitating remote health monitoring has gained more attention in recent years. Although plenty of research has been focused on IoT-based health monitoring, they neglected emerging concepts like human-centered health data analytics as a significant requirement in the Healthcare 5.0 era. This paper contributes to the status of human-centered IoT-based health monitoring by conducting a descriptive analysis of the corresponding literature according to biometrics monitored, applied software, hardware, sensors, and communication models, highlighting the lack of consideration of long-term, human-centered health monitoring in the existing IoT-based health monitoring literature. Results showed that the focus of the literature has mostly been on information transit technology development and not human-centered data analytics. In addition, a gap analysis of the current literature recommendations emphasized multi-biometrics monitoring and cybersecurity, not human-centered health data analysis. Finally, several guidelines are provided for human-centered IoT-based health monitoring in future research.
- Published
- 2024
- Full Text
- View/download PDF
21. ACGAN for Addressing the Security Challenges in IoT-Based Healthcare System.
- Author
-
Baniya, Babu Kaji
- Subjects
- *
GENERATIVE adversarial networks , *DATA transmission systems , *AIR traffic control , *MEDICAL personnel , *SECURITY systems , *MEDICAL software , *INTERNET of medical things - Abstract
The continuous evolution of the IoT paradigm has been extensively applied across various application domains, including air traffic control, education, healthcare, agriculture, transportation, smart home appliances, and others. Our primary focus revolves around exploring the applications of IoT, particularly within healthcare, where it assumes a pivotal role in facilitating secure and real-time remote patient-monitoring systems. This innovation aims to enhance the quality of service and ultimately improve people's lives. A key component in this ecosystem is the Healthcare Monitoring System (HMS), a technology-based framework designed to continuously monitor and manage patient and healthcare provider data in real time. This system integrates various components, such as software, medical devices, and processes, aimed at improvi1g patient care and supporting healthcare providers in making well-informed decisions. This fosters proactive healthcare management and enables timely interventions when needed. However, data transmission in these systems poses significant security threats during the transfer process, as malicious actors may attempt to breach security protocols.This jeopardizes the integrity of the Internet of Medical Things (IoMT) and ultimately endangers patient safety. Two feature sets—biometric and network flow metric—have been incorporated to enhance detection in healthcare systems. Another major challenge lies in the scarcity of publicly available balanced datasets for analyzing diverse IoMT attack patterns. To address this, the Auxiliary Classifier Generative Adversarial Network (ACGAN) was employed to generate synthetic samples that resemble minority class samples. ACGAN operates with two objectives: the discriminator differentiates between real and synthetic samples while also predicting the correct class labels. This dual functionality ensures that the discriminator learns detailed features for both tasks. Meanwhile, the generator produces high-quality samples that are classified as real by the discriminator and correctly labeled by the auxiliary classifier. The performance of this approach, evaluated using the IoMT dataset, consistently outperforms the existing baseline model across key metrics, including accuracy, precision, recall, F1-score, area under curve (AUC), and confusion matrix results. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. STORMS: A Pilot Feasibility Study for Occupational TeleRehabilitation in Multiple Sclerosis.
- Author
-
Vestito, Lucilla, Ferraro, Federica, Iaconi, Giulia, Genesio, Giulia, Bandini, Fabio, Mori, Laura, Trompetto, Carlo, and Dellepiane, Silvana
- Subjects
- *
DIGITAL technology , *OCCUPATIONAL rehabilitation , *MULTIPLE sclerosis , *PATIENT monitoring , *TELEREHABILITATION - Abstract
Digital solutions in the field of restorative neurology offer significant assistance, enabling patients to engage in rehabilitation activities remotely. This research introduces ReMoVES, an Internet of Medical Things (IoMT) system delivering telemedicine services specifically tailored for multiple sclerosis rehabilitation, within the overarching framework of the STORMS project. The ReMoVES platform facilitates the provision of a rehabilitative exercise protocol, seamlessly integrated into the Individual Rehabilitation Project, curated by a multidimensional medical team operating remotely. This manuscript delves into the second phase of the STORMS pilot feasibility study, elucidating the technology employed, the outcomes achieved, and the practical, professional, and academic implications. The STORMS initiative, as the genesis of digital telerehabilitation solutions, aims to enhance the quality of life for multiple sclerosis patients. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Real-Time Prediction of Resident ADL Using Edge-Based Time-Series Ambient Sound Recognition.
- Author
-
Lee, Cheolhwan, Yuh, Ah Hyun, and Kang, Soon Ju
- Subjects
- *
HUMAN activity recognition , *COMPUTER network traffic , *CONGREGATE housing , *OLDER patients , *ACTIVITIES of daily living - Abstract
To create an effective Ambient Assisted Living (AAL) system that supports the daily activities of patients or the elderly, it is crucial to accurately detect and differentiate user actions to determine the necessary assistance. Traditional intrusive methods, such as wearable or object-attached devices, can interfere with the natural behavior of patients and may lead to resistance. Furthermore, non-intrusive systems that rely on video or sound data processed by servers or the cloud can generate excessive data traffic and raise concerns about the security of personal information. In this study, we developed an edge-based real-time system for detecting Activities of Daily Living (ADL) using ambient noise. Additionally, we introduced an online post-processing method to enhance classification performance and extract activity events from noisy sound in resource-constrained environments. The system, tested with data collected in a living space, achieved high accuracy in classifying ADL-related behaviors in continuous events and successfully generated user activity logs from time-series sound data, enabling further analyses such as ADL assessments. Future work will focus on enhancing detection accuracy and expanding the range of detectable behaviors by integrating the activity logs generated in this study with additional data sources beyond sound. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. Randomized controlled trial of an Internet-of-Medical-Things device for patient-guided anorectal biofeedback therapy.
- Author
-
Zhou, Jerry, Javadi, Bahman, and Ho, Vincent
- Subjects
- *
DEFECATION disorders , *FECAL incontinence , *ANUS , *VISUAL education , *RANDOMIZED controlled trials , *BIOFEEDBACK training , *INTERNET of medical things - Abstract
Biofeedback therapy is useful for treatment of functional defecation disorders but is not widely available and is labor intensive. We developed an Internet-of-Medical-Things (IoMT) device, enabling self-guided biofeedback therapy. This study assesses the safety and efficacy of self-guided biofeedback therapy using the IoMT device in comparison to standard operator-led therapy. Patients experiencing urge or seepage fecal incontinence (≥1 episode/week) were randomly assigned to either our IoMT system or to the conventional anorectal manometry-based therapy. Both interventions comprised six weekly sessions, focusing on enhancing anal strength, endurance, and coordination. The novel device facilitated self-guided therapy via visual instructions on a companion app. Primary outcomes included safety/tolerability, changes in Vaizey severity scores, and alterations in anorectal pressure profiles. Twenty-five patients (22 females, 3 males) participated, with 13 in the novel device group and 12 in the standard therapy group. Both groups showed significant reductions in symptom severity scores: IoMT device group -4.2 (95% CI: -4.06, -4.34, p = 0.018), and the standard therapy group -4.8 (95% CI: -4.31, -5.29, p = 0.028). Anal sphincter resting pressure and sustained squeeze time improved significantly in both groups, and the novel device group demonstrated an increase in maximum sphincter squeeze pressure. There were no significant differences between the therapy groups. Importantly, the experimental device was well-tolerated compared with standard therapy, with no serious adverse events observed. This study demonstrates the comparable efficacy of self-administered biofeedback using the IoMT device with traditional biofeedback therapy. The results demonstrates the potential of the IoMT device as a safe, self-guided method for FI therapy, offering convenience and effectiveness in fecal incontinence management. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. Efficient lung cancer detection using computational intelligence and ensemble learning.
- Author
-
Jain, Richa, Singh, Parminder, Abdelkader, Mohamed, and Boulila, Wadii
- Subjects
- *
LUNG cancer , *FUZZY logic , *CANCER treatment , *LOGISTIC regression analysis , *RESEARCH personnel , *ENSEMBLE learning , *INTERNET of medical things - Abstract
Lung cancer emerges as a major factor in cancer-related fatalities in the current generation, and it is predicted to continue having a long-term impact. Detecting symptoms early becomes crucial for effective treatment, underscoring innovative therapy's necessity. Many researchers have conducted extensive work in this area, yet challenges such as high false-positive rates and achieving high accuracy in detection continue to complicate accurate diagnosis. In this research, we aim to develop an ecologically considerate lung cancer therapy prototype model that maximizes resource utilization by leveraging recent advancements in computational intelligence. We also propose an Internet of Medical Things (IoMT)-based, consumer-focused integrated framework to implement the suggested approach, providing patients with appropriate care. Our proposed method employs Logistic Regression, MLP Classifier, Gaussian NB Classifier, and Intelligent Feature Selection using K-Means and Fuzzy Logic to enhance detection procedures in lung cancer dataset. Additionally, ensemble learning is incorporated through a voting classifier. The proposed model's effectiveness is improved through hyperparameter tuning via grid search. The proposed model's performance is demonstrated through comparative analysis with existing NB, J48, and SVM approaches, achieving a 98.50% accuracy rate. The efficiency gains from this approach have the potential to save a significant amount of time and cost. This study underscores the potential of computational intelligence and IoMT in developing effective, resource-efficient lung cancer therapies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Federated learning‐driven dual blockchain for data sharing and reputation management in Internet of medical things.
- Author
-
Gan, Chenquan, Xiao, Xinghai, Zhu, Qingyi, Jain, Deepak Kumar, Saini, Akanksha, and Hussain, Amir
- Subjects
- *
FEDERATED learning , *REPUTATION , *INCENTIVE (Psychology) , *INFORMATION sharing , *POISONING , *BLOCKCHAINS - Abstract
In the Internet of Medical Things (IoMT), the vulnerability of federated learning (FL) to single points of failure, low‐quality nodes, and poisoning attacks necessitates innovative solutions. This article introduces a FL‐driven dual‐blockchain approach to address these challenges and improve data sharing and reputation management. Our approach comprises two blockchains: the Model Quality Blockchain (MQchain) and the Reputation Incentive Blockchain (RIchain). MQchain utilizes an enhanced Proof of Quality (PoQ) consensus algorithm to exclude low‐quality nodes from participating in aggregation, effectively mitigating single points of failure and poisoning attacks by leveraging node reputation and quality thresholds. In parallel, RIchain incorporates a reputation evaluation, incentive mechanism, and index query mechanism, allowing for rapid and comprehensive node evaluation, thus identifying high‐reputation nodes for MQchain. Security analysis confirms the theoretical soundness of the proposed method. Experimental evaluation using real medical datasets, specifically MedMNIST, demonstrates the remarkable resilience of our approach against attacks compared to three alternative methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Optimized Intrusion Detection for IoMT Networks with Tree-Based Machine Learning and Filter-Based Feature Selection.
- Author
-
Balhareth, Ghaida and Ilyas, Mohammad
- Subjects
- *
MACHINE learning , *FEATURE selection , *DATABASES , *SET theory , *INTRUSION detection systems (Computer security) , *FALSE alarms , *INTERNET of medical things - Abstract
The Internet of Medical Things (IoMTs) is a network of connected medical equipment such as pacemakers, prosthetics, and smartwatches. Utilizing the IoMT-based system, a huge amount of data is generated, offering experts a valuable resource for tasks such as prediction, real-time monitoring, and diagnosis. To do so, the patient's health data must be transferred to database storage for processing because of the limitations of the storage and computation capabilities of IoMT devices. Consequently, concerns regarding security and privacy can arise due to the limited control over the transmitted information and reliance on wireless transmission, which leaves the network vulnerable to several kinds of attacks. Motivated by this, in this study, we aim to build and improve an efficient intrusion detection system (IDS) for IoMT networks. The proposed IDS leverages tree-based machine learning classifiers combined with filter-based feature selection techniques to enhance detection accuracy and efficiency. The proposed model is used for monitoring and identifying unauthorized or malicious activities within medical devices and networks. To optimize performance and minimize computation costs, we utilize Mutual Information (MI) and XGBoost as filter-based feature selection methods. Then, to reduce the number of the chosen features selected, we apply a mathematical set (intersection) to extract the common features. The proposed method can detect intruders while data are being transferred, allowing for the accurate and efficient analysis of healthcare data at the network's edge. The system's performance is assessed using the CICIDS2017 dataset. We evaluate the proposed model in terms of accuracy, F1 score, recall, precision, true positive rate, and false positive rate. The proposed model achieves 98.79% accuracy and a low false alarm rate 0.007 FAR on the CICIDS2017 dataset according to the experimental results. While this study focuses on binary classification for intrusion detection, we are planning to build a multi-classification approach for future work which will be able to not only detect the attacks but also categorize them. Additionally, we will consider using our proposed feature selection technique for different ML classifiers and evaluate the model's performance empirically in real-world IoMT scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Intermediary Decentralized Computing and Private Blockchain Mechanisms for Privacy Preservation in the Internet of Medical Things.
- Author
-
Razzaq, Rasha Halim, Al-Zubaidie, Mishall, and Atiyah, Rajaa Ghali
- Subjects
NAIVE Bayes classification ,MEDICAL records ,INTERNET privacy ,CYBERTERRORISM ,WORD frequency ,INTERNET of medical things - Abstract
Copyright of Mesopotamian Journal of CyberSecurity is the property of Mesopotamian Academic Press and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
29. Healthcare and the Internet of Medical Things: Applications, Trends, Key Challenges, and Proposed Resolutions.
- Author
-
Al Khatib, Inas, Shamayleh, Abdulrahim, and Ndiaye, Malick
- Subjects
MEDICAL records ,TECHNOLOGICAL innovations ,BLOOD sugar measurement ,DATA protection ,MOBILE health ,ULTRA-wideband radar ,BLOCKCHAINS - Abstract
In recent years, the Internet of medical things (IoMT) has become a significant technological advancement in the healthcare sector. This systematic review aims to identify and summarize the various applications, key challenges, and proposed technical solutions within this domain, based on a comprehensive analysis of the existing literature. This review highlights diverse applications of the IoMT, including mobile health (mHealth) applications, remote biomarker detection, hybrid RFID-IoT solutions for scrub distribution in operating rooms, IoT-based disease prediction using machine learning, and the efficient sharing of personal health records through searchable symmetric encryption, blockchain, and IPFS. Other notable applications include remote healthcare management systems, non-invasive real-time blood glucose measurement devices, distributed ledger technology (DLT) platforms, ultra-wideband (UWB) radar systems, IoT-based pulse oximeters, accident and emergency informatics (A&EI), and integrated wearable smart patches. The key challenges identified include privacy protection, sustainable power sources, sensor intelligence, human adaptation to sensors, data speed, device reliability, and storage efficiency. The proposed mitigations encompass network control, cryptography, edge-fog computing, and blockchain, alongside rigorous risk planning. The review also identifies trends and advancements in the IoMT architecture, remote monitoring innovations, the integration of machine learning and AI, and enhanced security measures. This review makes several novel contributions compared to the existing literature, including (1) a comprehensive categorization of IoMT applications, extending beyond the traditional use cases to include emerging technologies such as UWB radar systems and DLT platforms; (2) an in-depth analysis of the integration of machine learning and AI in IoMT, highlighting innovative approaches in disease prediction and remote monitoring; (3) a detailed examination of privacy and security measures, proposing advanced cryptographic solutions and blockchain implementations to enhance data protection; and (4) the identification of future research directions, providing a roadmap for addressing current limitations and advancing the scientific understanding of IoMT in healthcare. By addressing current limitations and suggesting future research directions, this work aims to advance scientific understanding of the IoMT in healthcare. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Deduplication-Aware Healthcare Data Distribution in IoMT.
- Author
-
Altowaijri, Saleh M.
- Subjects
- *
UBUNTU (Operating system) , *TECHNOLOGICAL innovations , *ENERGY consumption , *DATA distribution , *STRUCTURAL health monitoring , *INTERNET of medical things - Abstract
As medical sensors undergo expeditious advancements, there is rising interest in the realm of healthcare applications within the Internet of Medical Things (IoMT) because of its broad applicability in monitoring the health of patients. IoMT proves beneficial in monitoring, disease diagnosis, and better treatment recommendations. This emerging technology aggregates real-time patient health data from sensors deployed on their bodies. This data collection mechanism consumes excessive power due to the transmission of data of similar types. It necessitates a deduplication mechanism, but this is complicated by the variable sizes of the data chunks, which may be either very small or larger in size. This reduces the likelihood of efficient chunking and, hence, deduplication. In this study, a deduplication-based data aggregation scheme was presented. It includes a Delimiter-Based Incremental Chunking Algorithm (DICA), which recognizes the breakpoint among two frames. The scheme includes static as well as variable-length windows. The proposed algorithm identifies a variable-length chunk using a terminator that optimizes the windows that are variable in size, with a threshold limit for the window size. To validate the scheme, a simulation was performed by utilizing NS-2.35 with the C language in the Ubuntu operating system. The TCL language was employed to set up networks, as well as for messaging purposes. The results demonstrate that the rise in the number of windows of variable size amounts to 62%, 66.7%, 68%, and 72.1% for DSW, RAM, CWCA, and DICA, respectively. The proposed scheme exhibits superior performance in terms of the probability of the false recognition of breakpoints, the static and dynamic sizes of chunks, the average sizes of chunks, the total attained chunks, and energy utilization. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. The role of blockchain to secure internet of medical things.
- Author
-
Ghadi, Yazeed Yasin, Mazhar, Tehseen, Shahzad, Tariq, Amir khan, Muhammad, Abd-Alrazaq, Alaa, Ahmed, Arfan, and Hamam, Habib
- Subjects
- *
DATA privacy , *DATA protection , *HEALTH care industry , *COMMUNICATIONS industries , *MEDICAL technology , *BLOCKCHAINS , *INTERNET of medical things - Abstract
This study explores integrating blockchain technology into the Internet of Medical Things (IoMT) to address security and privacy challenges. Blockchain's transparency, confidentiality, and decentralization offer significant potential benefits in the healthcare domain. The research examines various blockchain components, layers, and protocols, highlighting their role in IoMT. It also explores IoMT applications, security challenges, and methods for integrating blockchain to enhance security. Blockchain integration can be vital in securing and managing this data while preserving patient privacy. It also opens up new possibilities in healthcare, medical research, and data management. The results provide a practical approach to handling a large amount of data from IoMT devices. This strategy makes effective use of data resource fragmentation and encryption techniques. It is essential to have well-defined standards and norms, especially in the healthcare sector, where upholding safety and protecting the confidentiality of information are critical. These results illustrate that it is essential to follow standards like HIPAA, and blockchain technology can help ensure these criteria are met. Furthermore, the study explores the potential benefits of blockchain technology for enhancing inter-system communication in the healthcare industry while maintaining patient privacy protection. The results highlight the effectiveness of blockchain's consistency and cryptographic techniques in combining identity management and healthcare data protection, protecting patient privacy and data integrity. Blockchain is an unchangeable distributed ledger system. In short, the paper provides important insights into how blockchain technology may transform the healthcare industry by effectively addressing significant challenges and generating legal, safe, and interoperable solutions. Researchers, doctors, and graduate students are the audience for our paper. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. A learning-based efficient query model for blockchain in internet of medical things.
- Author
-
Jia, Dayu, Yang, Guanghong, Huang, Min, Xin, Junchang, and Wang, Guoren
- Subjects
- *
DATA structures , *MACHINE learning , *DATA warehousing , *BLOCKCHAINS , *DATA distribution , *EXTREME value theory - Abstract
This paper proposes a learning-based model for the resource-constrained edge nodes in the blockchain-enabled Internet of Medical Things (IoMT) systems to realize efficient querying. Three layers are designed in the new model: data evaluation layer, data storage layer and data distribution layer. The data evaluation layer extracts the features from medical data and evaluates their values based on the Extreme Learning Machine (ELM) method. Then, in the data storage layer, according to the value of medical data, a novelty data structure called Merkle–Huffman tree (M-H tree) is established. Compared with the Merkle tree, high-value data (frequently accessed data) in M-H tree is saved closer to the root node and can be found faster. In the data distribution layer, the sharding-based blockchain model is adopted to increase the storage scalability of the IoMT system. Finally, the experimental results show that the new learning-based model can effectively improve the query speed of the blockchain-enabled medical system by about 3.5% and free up large amounts of storage space on IoMT devices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Substantiation and Effectiveness of Remote Monitoring System Based on IoMT Using Portable ECG Device.
- Author
-
Lee, Hee-Young, Kim, Yoon-Ji, Lee, Kang-Hyun, Lee, Jung-Hun, Cho, Sung-Pil, Park, Junghwan, Park, Il-Hwan, and Youk, Hyun
- Subjects
- *
ELECTROCARDIOGRAPHY , *ATRIAL fibrillation , *HEART beat , *BODY temperature , *PERIODIC health examinations , *RESPIRATION , *INTERNET of medical things - Abstract
Cardiovascular disease is a major global health concern, with early detection being critical. This study assesses the effectiveness of a portable ECG device, based on Internet of Medical Things (IoMT) technology, for remote cardiovascular monitoring during daily activities. We conducted a clinical trial involving 2000 participants who wore the HiCardi device while engaging in hiking activities. The device monitored their ECG, heart rate, respiration, and body temperature in real-time. If an abnormal signal was detected while a physician was remotely monitoring the ECG at the IoMT monitoring center, he notified the clinical research coordinator (CRC) at the empirical research site, and the CRC advised the participant to visit a hospital. Follow-up calls were made to determine compliance and outcomes. Of the 2000 participants, 318 showed abnormal signals, and 182 were advised to visit a hospital. The follow-up revealed that 139 (76.37%) responded, and 30 (21.58% of those who responded) sought further medical examination. Most visits (80.00%) occurred within one month. Diagnostic approaches included ECG (56.67%), ECG and ultrasound (20.00%), ultrasound alone (16.67%), ECG and X-ray (3.33%), and general treatment (3.33%). Seven participants (23.33% of those who visited) were diagnosed with cardiovascular disease, including conditions such as arrhythmia, atrial fibrillation, and stent requirements. The portable ECG device using the patch-type electrocardiograph detected abnormal cardiovascular signals, leading to timely diagnoses and interventions, demonstrating its potential for broad applications in preventative healthcare. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Privacy and surveillance concerns in machine learning fall prediction models: implications for geriatric care and the internet of medical things.
- Author
-
Yang, Russell
- Subjects
- *
COMPUTER vision , *MACHINE learning , *GAUSSIAN mixture models , *ARTIFICIAL intelligence , *NEW business enterprises - Abstract
Fall prediction using machine learning has become one of the most fruitful and socially relevant applications of computer vision in gerontological research. Since its inception in the early 2000s, this subfield has proliferated into a robust body of research underpinned by various machine learning algorithms (including neural networks, support vector machines, and decision trees) as well as statistical modeling approaches (Markov chains, Gaussian mixture models, and hidden Markov models). Furthermore, some advancements have been translated into commercial and clinical practice, with companies in various stages of development capitalizing on the aging population to develop new commercially available products. Yet despite the marvel of modern machine learning-enabled fall prediction, little research has been conducted to shed light on the security and privacy concerns that such systems pose for older adults. The present study employs an interdisciplinary lens in examining privacy issues associated with machine learning fall prediction and exploring the implications of these models in elderly care and the Internet of Medical Things (IoMT). Ultimately, a justice-informed set of best practices rooted in social geroscience is suggested to help fall prediction researchers and companies continue to advance the field while preserving elderly privacy and autonomy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Early Triage Prediction for Outpatient Care Based on Heterogeneous Medical Data Utilizing Machine Learning.
- Author
-
Salman, Omar Sadeq, Abdul Latiff, Nurul Mu'azzah, Syed Arifin, Sharifah Hafizah, and Salman, Omar Hussein
- Subjects
SUPERVISED learning ,MACHINE learning ,MEDICAL records ,OUTPATIENT medical care ,MEDICAL care ,TELEMEDICINE - Abstract
Traditional triage tools hospitals use face limitations in handling the increasing number of patients and analyzing complex data. These ongoing challenges in patient triage necessitate the development of more effective prediction methods. This study aims to use machine learning (ML) to create an automated triage model for remote patients in telemedicine systems, providing more accurate health services and health assessments of urgent cases in real time. A comparative study was conducted to ascertain how well different supervised machine learning models, like SVM, RF, DT, LR, NB, and KNN, evaluated patient triage outcomes for outpatient care. Hence, data from diverse, rapidly generated sources is crucial for informed patient triage decisions. Collected through IoMT-enabled sensors, it includes sensory data (ECG, blood pressure, SpO2, temperature) and non-sensory text frame measurements. The study examined six supervised machine learning algorithms. These models were trained using patient medical data and validated by assessing their performance. Supervised ML technology was implemented in Hadoop and Spark environments to identify individuals with chronic illnesses accurately. A dataset of 55,680 patient records was used to evaluate methods and determine the best match for disease prediction. The simulation results highlight the powerful integration of ML in telemedicine to analyze data from heterogeneous IoMT devices, indicating that the Decision Tree (DT) algorithm outperformed the other five machine learning algorithms by 93.50% in terms of performance and accuracy metrics. This result provides practical insights for developing automated triage models in telemedicine systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. BASS: Safe Deep Tissue Optical Sensing for Wearable Embedded Systems
- Author
-
Vali, Kourosh, Vafi, Ata, Kasap, Begum, and Ghiasi, Soheil
- Subjects
Engineering ,Electronics ,Sensors and Digital Hardware ,Bioengineering ,Affordable and Clean Energy ,Medical cyber-physical systems ,design space exploration ,multi-objective optimization ,wearable embedded systems ,deep tissue optical sensing ,internet of medical things ,medical cyber-physical systems ,Computer Software ,Distributed Computing ,Computer Hardware ,Computer Hardware & Architecture ,Communications engineering ,Distributed computing and systems software - Abstract
In wearable optical sensing applications whose target tissue is not superficial, such as deep tissue oximetry, the task of embedded system design has to strike a balance between two competing factors. On one hand, the sensing task is assisted by increasing the radiated energy into the body, which in turn, improves the signal-to-noise ratio (SNR) of the deep tissue at the sensor. On the other hand, patient safety consideration imposes a constraint on the amount of radiated energy into the body. In this paper, we study the trade-offs between the two factors by exploring the design space of the light source activation pulse. Furthermore, we propose BASS, an algorithm that leverages the activation pulse design space exploration, which further optimizes deep tissue SNR via spectral averaging, while ensuring the radiated energy into the body meets a safe upper bound. The effectiveness of the proposed technique is demonstrated via analytical derivations, simulations, and in vivo measurements in both pregnant sheep models and human subjects.
- Published
- 2023
37. A novel approach for encryption and decryption of digital imaging and communications using mathematical modelling in internet of medical things
- Author
-
S. Thalapathiraj, J. Arunnehru, V. C. Bharathi, R. Dhanasekar, L. Vijayaraja, R. Kannadasan, Muhammad Faheem, and Arfat Ahmad Khan
- Subjects
network security ,cryptography ,laplace transforms ,digital Image ,internet of medical things ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
Abstract This research introduces an innovative algorithm for the encryption and decryption of greyscale digital imaging and communications in medicine images utilizing Laplace transforms. The proposed method presents a ground breaking approach to image encryption, effectively concealing visual information and ensuring a robust, secure, and reliable encryption process. By leveraging the inherent strengths of Laplace transform, the algorithm guarantees the complete retrieval of the original image without any loss, provided the correct decryption key is used. To thoroughly evaluate the performance of the algorithm, multiple tests were conducted, including extensive statistical analyses and assessments of encryption quality. Key performance metrics were carefully measured, including correlation coefficients and entropy values, which ranged from 7.89 to 7.99. Additionally, the algorithm's effectiveness was demonstrated through peak signal‐to‐noise ratio values, which spanned from 7.597 to 9.915, indicating the degree of similarity between the original and encrypted images. Furthermore, the number of pixels change rate values, ranging from 99.519241 to 99.609375, highlighted the algorithm's ability to produce significantly different encrypted images from the original. The unified average changing intensity values, falling between 35.72345678 and 35.78233456, further underscored the algorithm's proficiency in altering pixel intensities uniformly. Overall, this research offers a significant advancement in the field of image encryption, combining theoretical robustness with practical efficiency.
- Published
- 2024
- Full Text
- View/download PDF
38. Transformative impacts of the internet of medical things on modern healthcare
- Author
-
Shams Forruque Ahmed, Senzuti Sharmin, Sweety Angela Kuldeep, Aiman Lameesa, Md. Sakib Bin Alam, Gang Liu, and Amir H. Gandomi
- Subjects
Artificial intelligence ,Internet of medical things ,Internet of things ,Sensors ,Smart Healthcare ,Technology - Abstract
The Internet of Medical Things (IoMT) offers real-time data insights, reduces energy costs, and enhances patient comfort, presenting transformative potential for healthcare systems. While existing research on IoMT in healthcare has primarily concentrated on data security concerns and corresponding solutions, it has often overlooked the broader role of IoMT technologies across diverse healthcare systems and the unique challenges of implementing them. This study aims to bridge these gaps by investigating how IoMT impacts healthcare systems, focusing on its technological roles, benefits, and challenges. The significance of this work lies in its comprehensive exploration of IoMT applications and their potential to transform healthcare delivery through personalized treatment, diagnostics, and enhanced quality of care. The findings indicate that combining IoMT with machine learning (ML) can achieve up to 99.84 % accuracy in predicting heart disease from medical images, while remote monitoring for elderly patients reaches an accuracy of 98.1 %. Additionally, a model utilizing edge-IoMT computations demonstrates a promising solution for real-time seizure detection. By facilitating continuous data collection and providing real-time insights, IoMT significantly enhances the operational effectiveness of ML algorithms, ultimately leading to improved health outcomes for these vulnerable populations. However, IoMT integration into smart healthcare systems raises security concerns, which can be mitigated by using strong encryption, authentication, and security updates, following privacy regulations, and educating healthcare professionals about cybersecurity. Future IoMT research must prioritize the implementation of artificial intelligence algorithms to improve the management of security and vulnerabilities in intelligent healthcare systems.
- Published
- 2025
- Full Text
- View/download PDF
39. Developing medical devices with emerging technologies: trends, challenges, and future directions [version 1; peer review: awaiting peer review]
- Author
-
Achraf akkaoui, Yassine ZAHIDI, Mohamed El Moufid, Wafaa DACHRY, Hassan GZIRI, and Hicham Medromi
- Subjects
Systematic Review ,Articles ,Artificial Intelligence ,Internet of Medical Things ,Augmented Reality ,Cybersecurity ,Medical Devices ,Health care ,Embedded systems - Abstract
This paper examines the rapid advancements and integration of emerging technologies in the medical field, particularly focusing on Artificial Intelligence (AI), the Internet of Medical Things (IoMT), Augmented Reality (AR), and cybersecurity. The study leverages data from Scopus and Web of Science databases to highlight the trends, challenges, and future directions in the development of medical devices. Significant progress has been made in enhancing patient care through the integration of AI and IoMT, which facilitate predictive analytics, personalized treatment plans, and real-time data monitoring. AR is transforming medical training and surgical precision, while cybersecurity measures are becoming increasingly vital to protect sensitive health data. Despite these advancements, the field faces challenges such as data privacy concerns, infrastructure limitations, and interoperability issues. The study also explores Africa’s contributions, with a particular emphasis on Morocco’s emerging role in this technological landscape. Three major research clusters identified include AI and AR, IoT and cybersecurity, and embedded systems, each playing an important role in the evolution of medical technologies. By analyzing publications from 2010 to 2024, the paper provides insights into the current state and future potential of advanced medical technologies, aiming to offer a foundation for further research and innovation in this rapidly evolving field.
- Published
- 2024
- Full Text
- View/download PDF
40. An Internet of Medical Things-Based Mental Disorder Prediction System Using EEG Sensor and Big Data Mining.
- Author
-
Ambeth Kumar, V. D., Surapaneni, Sowmya, Pavitra, D., Venkatesan, R., Omar, Marwan, and Bashir, A. K.
- Subjects
- *
BIG data , *MENTAL illness , *DATA mining , *MENTAL illness treatment , *EATING disorders , *PERSONALITY disorders , *DATA transmission systems - Abstract
In the colloquy concerning human rights, equality, and human health, mental illness and therapy regarding mental health have been condoned. Mental disorder is a behavioral motif that catalyzes the significant anguish or affliction of personal functioning. The symptoms of a mental disorder may be tenacious, degenerative, or transpire as a single episode. Brain sickness is often interpreted as a combination of how a person thinks, perceives, contemplates and reacts. This may be analogous to a specific region or workings of the brain frequently in a social context. Anxiety disorders, psychotic disorders, personality disorders, mood disorders, eating disorders, and many more are examples of mental disorders, while complications include social problems, suicides, and cognitive impairment. These days, mental disorders are quotidian worldwide, and clinically consequential levels of derangement rise adversely. The purpose of this paper is to aid in prognosis of the type of mental disorder by analyzing the brainwaves such as Alpha (α), Beta (β), Gamma (γ), Theta (), Delta (δ) with the help of big data analysis and the Internet of Medical Things (IoMT). IoMT helps in gathering the required data and data transmission, while big data analysis helps in predicting the type of disorder. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. BFLIDS: Blockchain-Driven Federated Learning for Intrusion Detection in IoMT Networks.
- Author
-
Begum, Khadija, Mozumder, Md Ariful Islam, Joo, Moon-Il, and Kim, Hee-Cheol
- Subjects
- *
INTRUSION detection systems (Computer security) , *CONVOLUTIONAL neural networks , *FEDERATED learning , *DATA privacy , *TRANSACTION records , *MACHINE learning , *INTERNET of medical things - Abstract
The Internet of Medical Things (IoMT) has significantly advanced healthcare, but it has also brought about critical security challenges. Traditional security solutions struggle to keep pace with the dynamic and interconnected nature of IoMT systems. Machine learning (ML)-based Intrusion Detection Systems (IDS) have been increasingly adopted to counter cyberattacks, but centralized ML approaches pose privacy risks due to the single points of failure (SPoFs). Federated Learning (FL) emerges as a promising solution, enabling model updates directly on end devices without sharing private data with a central server. This study introduces the BFLIDS, a Blockchain-empowered Federated Learning-based IDS designed to enhance security and intrusion detection in IoMT networks. Our approach leverages blockchain to secure transaction records, FL to maintain data privacy by training models locally, IPFS for decentralized storage, and MongoDB for efficient data management. Ethereum smart contracts (SCs) oversee and secure all interactions and transactions within the system. We modified the FedAvg algorithm with the Kullback–Leibler divergence estimation and adaptive weight calculation to boost model accuracy and robustness against adversarial attacks. For classification, we implemented an Adaptive Max Pooling-based Convolutional Neural Network (CNN) and a modified Bidirectional Long Short-Term Memory (BiLSTM) with attention and residual connections on Edge-IIoTSet and TON-IoT datasets. We achieved accuracies of 97.43% (for CNNs and Edge-IIoTSet), 96.02% (for BiLSTM and Edge-IIoTSet), 98.21% (for CNNs and TON-IoT), and 97.42% (for BiLSTM and TON-IoT) in FL scenarios, which are competitive with centralized methods. The proposed BFLIDS effectively detects intrusions, enhancing the security and privacy of IoMT networks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. Utilizing Deep Feature Fusion for Automatic Leukemia Classification: An Internet of Medical Things-Enabled Deep Learning Framework.
- Author
-
Islam, Md Manowarul, Rifat, Habibur Rahman, Shahid, Md. Shamim Bin, Akhter, Arnisha, and Uddin, Md Ashraf
- Subjects
- *
DEEP learning , *CONVOLUTIONAL neural networks , *AUTOMATIC classification , *MEDICAL coding , *COMPUTER-aided diagnosis , *ASPIRATORS - Abstract
Acute lymphoblastic leukemia, commonly referred to as ALL, is a type of cancer that can affect both the blood and the bone marrow. The process of diagnosis is a difficult one since it often calls for specialist testing, such as blood tests, bone marrow aspiration, and biopsy, all of which are highly time-consuming and expensive. It is essential to obtain an early diagnosis of ALL in order to start therapy in a timely and suitable manner. In recent medical diagnostics, substantial progress has been achieved through the integration of artificial intelligence (AI) and Internet of Things (IoT) devices. Our proposal introduces a new AI-based Internet of Medical Things (IoMT) framework designed to automatically identify leukemia from peripheral blood smear (PBS) images. In this study, we present a novel deep learning-based fusion model to detect ALL types of leukemia. The system seamlessly delivers the diagnostic reports to the centralized database, inclusive of patient-specific devices. After collecting blood samples from the hospital, the PBS images are transmitted to the cloud server through a WiFi-enabled microscopic device. In the cloud server, a new fusion model that is capable of classifying ALL from PBS images is configured. The fusion model is trained using a dataset including 6512 original and segmented images from 89 individuals. Two input channels are used for the purpose of feature extraction in the fusion model. These channels include both the original and the segmented images. VGG16 is responsible for extracting features from the original images, whereas DenseNet-121 is responsible for extracting features from the segmented images. The two output features are merged together, and dense layers are used for the categorization of leukemia. The fusion model that has been suggested obtains an accuracy of 99.89%, a precision of 99.80%, and a recall of 99.72%, which places it in an excellent position for the categorization of leukemia. The proposed model outperformed several state-of-the-art Convolutional Neural Network (CNN) models in terms of performance. Consequently, this proposed model has the potential to save lives and effort. For a more comprehensive simulation of the entire methodology, a web application (Beta Version) has been developed in this study. This application is designed to determine the presence or absence of leukemia in individuals. The findings of this study hold significant potential for application in biomedical research, particularly in enhancing the accuracy of computer-aided leukemia detection. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
43. Combining IoMT and XAI for Enhanced Triage Optimization: An MQTT Broker Approach with Contextual Recommendations for Improved Patient Priority Management in Healthcare.
- Author
-
Stitini, Oumaima, Ouakasse, Fathia, Rakrak, Said, Kaloun, Soulaimane, and Bencharef, Omar
- Subjects
WIRELESS sensor networks ,ARTIFICIAL intelligence ,MEDICAL personnel ,MEDICAL triage ,INTERNET of medical things - Abstract
The widespread adoption of the Internet of Things has significantly enhanced our daily lives across various dimensions. E-health has significantly benefited from advancements in the Internet of Things (IoT), particularly with the emergence of the Internet of Medical Things (IoMT). A sophisticated wireless sensor network produces a huge amount of data, requiring robust cloud-based hardware for precise processing and categorization. The IoMT allows for the extensive gathering of medical data from incoming hospital patients, enabling real-time monitoring of vital signs and health statuses. Nevertheless, effectively prioritizing patients in emergencies is challenging due to the importance and complicatedness of the data. To tackle this issue, an innovative solution involves integrating Explainable Artificial Intelligence into the IoMT ecosystem. By incorporating Explainable AI, the system enhances explainability, fostering trust and reliability in patient prioritization. This provides healthcare providers a more reliable prioritization mechanism that aligns with established medical guidelines. The study explores IoMT devices for collecting medical data from incoming patients, focusing on the MQTT protocol for lightweight devices, aiming to guide patients to the right department and prioritize emergency management through IoMT data analysis. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. Trusted Composition of Internet of Medical Things over Imperfect Networks.
- Author
-
Ahmad, Ehsan, Larson, Brian, and Banga, Abdulbasid
- Subjects
VERBAL behavior ,TRUST ,ARCHITECTURAL design ,SYSTEMS software ,MEDICAL equipment ,INTERNET of medical things - Abstract
The Internet of Medical Things (IoMT) represents a specialized domain within the Internet of Things, focusing on medical devices that require regulatory approval to ensure patient safety. Trusted composition of IoMT systems aims to ensure high assurance of the entire composed system, despite potential variability in the assurance levels of individual components. Achieving this trustworthiness in IoMT systems, especially when using less-assured, commercial, off-the-shelf networks like Ethernet and WiFi, presents a significant challenge. To address this challenge, this paper advocates a systematic approach that leverages the Architecture Analysis & Design Language (AADL) along with Behavior Language for Embedded Systems with Software (BLESS) specification and implementation. This approach aims to provide high assurance on critical components through formal verification, while using less-assured components in a manner that maintains overall system determinism and reliability. A clinical case study involving an automated opioid infusion monitoring IoMT system is presented to illustrate the application of the proposed approach. Through this case study, the effectiveness of the systemic approach in achieving trusted composition of heterogeneous medical devices over less-assured networks is demonstrated. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. Smart Healthcare: Exploring the Internet of Medical Things with Ambient Intelligence.
- Author
-
Sarkar, Mekhla, Lee, Tsong-Hai, and Sahoo, Prasan Kumar
- Subjects
INFORMATION technology ,ARTIFICIAL intelligence ,MEDICAL equipment ,AMBIENT intelligence ,RESEARCH personnel ,MEDICAL care - Abstract
Ambient Intelligence (AMI) represents a significant advancement in information technology that is perceptive, adaptable, and finely attuned to human needs. It holds immense promise across diverse domains, with particular relevance to healthcare. The integration of Artificial Intelligence (AI) with the Internet of Medical Things (IoMT) to create an AMI environment in medical contexts further enriches this concept within healthcare. This survey provides invaluable insights for both researchers and practitioners in the healthcare sector by reviewing the incorporation of AMI techniques in the IoMT. This analysis encompasses essential infrastructure, including smart environments and spectrum for both wearable and non-wearable medical devices to realize the AMI vision in healthcare settings. Furthermore, this survey provides a comprehensive overview of cutting-edge AI methodologies employed in crafting IoMT systems tailored for healthcare applications and sheds light on existing research issues, with the aim of guiding and inspiring further advancements in this dynamic field. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. Enhancing the Internet of Medical Things (IoMT) Security with Meta-Learning: A Performance-Driven Approach for Ensemble Intrusion Detection Systems.
- Author
-
Alalhareth, Mousa and Hong, Sung-Chul
- Subjects
- *
INTRUSION detection systems (Computer security) , *CYBERTERRORISM , *INTERNET of medical things - Abstract
This paper investigates the application of ensemble learning techniques, specifically meta-learning, in intrusion detection systems (IDS) for the Internet of Medical Things (IoMT). It underscores the existing challenges posed by the heterogeneous and dynamic nature of IoMT environments, which necessitate adaptive, robust security solutions. By harnessing meta-learning alongside various ensemble strategies such as stacking and bagging, the paper aims to refine IDS mechanisms to effectively counter evolving cyber threats. The study proposes a performance-driven weighted meta-learning technique for dynamic assignment of voting weights to classifiers based on accuracy, loss, and confidence levels. This approach significantly enhances the intrusion detection capabilities for the IoMT by dynamically optimizing ensemble IDS models. Extensive experiments demonstrate the proposed model's superior performance in terms of accuracy, detection rate, F1 score, and false positive rate compared to existing models, particularly when analyzing various sizes of input features. The findings highlight the potential of integrating meta-learning in ensemble-based IDS to enhance the security and integrity of IoMT networks, suggesting avenues for future research to further advance IDS performance in protecting sensitive medical data and IoT infrastructures. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. An Optimal, Power Efficient, Internet of Medical Things Framework for Monitoring of Physiological Data Using Regression Models.
- Author
-
Mishra, Amitabh, Liberman, Lucas S., and Brahamanpally, Nagaraju
- Subjects
- *
PATIENT monitoring , *REGRESSION analysis , *DATA transmission systems , *ENERGY harvesting , *DECISION trees , *SENSOR networks , *ENERGY consumption , *STRUCTURAL health monitoring , *INTERNET of medical things - Abstract
The sensors used in the Internet of Medical Things (IoMT) network run on batteries and need to be replaced, replenished or should use energy harvesting for continuous power needs. Additionally, there are mechanisms for better utilization of battery power for network longevity. IoMT networks pose a unique challenge with respect to sensor power replenishment as the sensors could be embedded inside the subject. A possible solution could be to reduce the amount of sensor data transmission and recreate the signal at the receiving end. This article builds upon previous physiological monitoring studies by applying new decision tree-based regression models to calculate the accuracy of reproducing data from two sets of physiological signals transmitted over cellular networks. These regression analyses are then executed over three different iteration varieties to assess the effect that the number of decision trees has on the efficiency of the regression model in question. The results indicate much lower errors as compared to other approaches indicating significant saving on the battery power and improvement in network longevity. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Security Analysis for Smart Healthcare Systems.
- Author
-
Ibrahim, Mariam, Al-Wadi, Abdallah, and Elhafiz, Ruba
- Subjects
- *
COMPUTER network traffic , *WIRELESS communications , *HEALTH care industry , *INTRUSION detection systems (Computer security) , *DATA transmission systems , *MEDICAL care , *K-nearest neighbor classification , *INTERNET of medical things - Abstract
The healthcare industry went through reformation by integrating the Internet of Medical Things (IoMT) to enable data harnessing by transmission mediums from different devices, about patients to healthcare staff devices, for further analysis through cloud-based servers for proper diagnosis of patients, yielding efficient and accurate results. However, IoMT technology is accompanied by a set of drawbacks in terms of security risks and vulnerabilities, such as violating and exposing patients' sensitive and confidential data. Further, the network traffic data is prone to interception attacks caused by a wireless type of communication and alteration of data, which could cause unwanted outcomes. The advocated scheme provides insight into a robust Intrusion Detection System (IDS) for IoMT networks. It leverages a honeypot to divert attackers away from critical systems, reducing the attack surface. Additionally, the IDS employs an ensemble method combining Logistic Regression and K-Nearest Neighbor algorithms. This approach harnesses the strengths of both algorithms to improve attack detection accuracy and robustness. This work analyzes the impact, performance, accuracy, and precision outcomes of the used model on two IoMT-related datasets which contain multiple attack types such as Man-In-The-Middle (MITM), Data Injection, and Distributed Denial of Services (DDOS). The yielded results showed that the proposed ensemble method was effective in detecting intrusion attempts and classifying them as attacks or normal network traffic, with a high accuracy of 92.5% for the first dataset and 99.54% for the second dataset and a precision of 96.74% for the first dataset and 99.228% for the second dataset. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. Navigating the Cyber Threat Landscape: An In-Depth Analysis of Attack Detection within IoT Ecosystems.
- Author
-
AboulEla, Samar, Ibrahim, Nourhan, Shehmir, Sarama, Yadav, Aman, and Kashef, Rasha
- Subjects
- *
CYBERTERRORISM , *ARTIFICIAL intelligence , *INTERNET of things , *DEEP learning , *TELECOMMUNICATION systems , *ECOSYSTEMS , *LANDSCAPE assessment , *BLOCKCHAINS , *INTERNET of medical things - Abstract
The Internet of Things (IoT) is seeing significant growth, as the quantity of interconnected devices in communication networks is on the rise. The increased connectivity of devices has heightened their susceptibility to hackers, underscoring the need to safeguard IoT devices. This research investigates cybersecurity in the context of the Internet of Medical Things (IoMT), which encompasses the cybersecurity mechanisms used for various healthcare devices connected to the system. This study seeks to provide a concise overview of several artificial intelligence (AI)-based methodologies and techniques, as well as examining the associated solution approaches used in cybersecurity for healthcare systems. The analyzed methodologies are further categorized into four groups: machine learning (ML) techniques, deep learning (DL) techniques, a combination of ML and DL techniques, Transformer-based techniques, and other state-of-the-art techniques, including graph-based methods and blockchain methods. In addition, this article presents a detailed description of the benchmark datasets that are recommended for use in intrusion detection systems (IDS) for both IoT and IoMT networks. Moreover, a detailed description of the primary evaluation metrics used in the analysis of the discussed models is provided. Ultimately, this study thoroughly examines and analyzes the features and practicality of several cybersecurity models, while also emphasizing recent research directions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Efficient Inference Offloading for Mixture-of-Experts Large Language Models in Internet of Medical Things.
- Author
-
Yuan, Xiaoming, Kong, Weixuan, Luo, Zhenyu, and Xu, Minrui
- Subjects
LANGUAGE models - Abstract
Despite recent significant advancements in large language models (LLMs) for medical services, the deployment difficulties of LLMs in e-healthcare hinder complex medical applications in the Internet of Medical Things (IoMT). People are increasingly concerned about e-healthcare risks and privacy protection. Existing LLMs face difficulties in providing accurate medical questions and answers (Q&As) and meeting the deployment resource demands in the IoMT. To address these challenges, we propose MedMixtral 8x7B, a new medical LLM based on the mixture-of-experts (MoE) architecture with an offloading strategy, enabling deployment on the IoMT, improving the privacy protection for users. Additionally, we find that the significant factors affecting latency include the method of device interconnection, the location of offloading servers, and the speed of the disk. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.