Abstract
Internet of Medical Things (IoMT) applications, called also Medical Internet of Things (MIoT) or IoT for e-health, allow integrating smart technologies to medical devices for a better monitoring of disease progression and patients tracking. While it offers extensive benefits and despite of its expansion, IoMT brings round additional security concerns. Connected Medical Devices (CMD) raise up several security and privacy problems. The complexity and heterogeneity of data and technology in IoMT communications create additional security risks and threats. Malicious users may exploit crucial vulnerabilities in a wide range of IoMT applications, networks and devices. Hence, thinking about smart and efficient security solutions is an urgent need to understand and assess IoMT-related threats. Existing traditional models are no longer convenient and remain unsuitable to address the various born risks. We present in the current manuscript an in depth study of security concerns within IoMT. We review popular risk assessment and management approaches and discuss their suitability to the IoMT context. The main shortcomings are inherent to the complex architecture, the lack of automation and the numerous stakeholders with different security needs and skills.With reference to the conducted study, we introduce our solution as a framework to enhance trustworthiness and support decision making within IoMT environments. The proposal relies on a fine-grained approach for managing associated risks with regard to different areas of focus and common risk factors. To do so, a Machine Learning (ML)-based anomaly detection model and a hybrid Risk Assessment (RA) model are defined to evaluate cumulative IoMT risk. Experiments show obtained competitive results compared to state of the art ML models to detect intrusions in IoT/IoMT systems and we obtained an accuracy rate of 100% with some algorithms. A use case of application is presented to highlight the efficiency of the proposal.
Similar content being viewed by others
Availability of data and materials
A part of this research was conducted based on the publicly available ’BoTNeT-IoT’ dataset.
References
Statista: Number of internet of things (IoT) active connections in healthcare in the European Union (EU) in 2016, 2019, 2022 and 2025 (2020). www.statista.com/statistics/691848/iot-active-connections-in-healthcare-in-the-eu/
Statista: Number of internet of things (IoT) connections worldwide in 2022 and 2023, by application (2023). http://www.statista.com/statistics/1403198/
Bera, A.: 80 insightful internet of things statistics (infographic) (2019). https://safeatlast.co/blog/iot-statistics/
Mckinsey: Digital ecosystems for insurers: opportunities through the internet of things (2019). https://www.mckinsey.com/industries/financial-services/our-insights
Ksibi, S., Jaidi, F., Bouhoula, A.: A comprehensive study of security and cyber-security risk management within e-health systems: synthesis, analysis and a novel quantified approach. Mobile Netw. Appl pp. 1–21 (2022)
Jaïdi, F., Labbene Ayachi, F., Bouhoula, A.: A methodology and toolkit for deploying reliable security policies in critical infrastructures. Secur. Commun. Netw. 2018(1), 7142170 (2018)
Jaidi, F., Ayachi, F.L.: A risk awareness approach for monitoring the compliance of RBAC-based policies. In: 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE), Vol. 4, IEEE, 2015, pp. 454–459
Ksibi, S., Jaidi, F., Bouhoula, A.: IoMT security model based on machine learning and risk assessment techniques. In: International Wireless Communications and Mobile Computing (IWCMC). IEEE 2023, 614–619 (2023)
Abdullah, A., Ismael, A., Rashid, A., Abou-ElNour, A., Tarique, M.: Real time wireless health monitoring application using mobile devices. Int. J. Comput. Netw. Commun. (IJCNC) 7(3), 13–30 (2015)
AllTheResearch: Global internet of medical things (IoMT) market—segment analysis, opportunity assessment, competitive intelligence, industry outlook 2016–2026 (2019). https://www.alltheresearch.com/report/166/internet-of-medical-things-market
OWASP: Top IoT vulnerabilities (2016). https://www.owasp.org/index
Khan, M.A., Salah, K.: IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)
Jiang, X., Lora, M., Chattopadhyay, S.: An experimental analysis of security vulnerabilities in industrial IoT devices. ACM Trans. Intern. Technol. (TOIT) 20(2), 1–24 (2020)
Chen, K., Zhang, S., Li, Z., Zhang, Y., Deng, Q., Ray, S., Jin, Y.: Internet-of-things security and vulnerabilities: taxonomy, challenges, and practice. J. Hardw. Syst. Secur. 2(2), 97–110 (2018)
Grammatikis, P.I.R., Sarigiannidis, P.G., Moscholios, I.D.: Securing the internet of things: challenges, threats and solutions. Intern. Things 5, 41–70 (2019)
Caralli, R.A., Stevens, J.F., Young, L.R., Wilson, W.R.: Improving the information security risk assessment process (2007)
Wynn, J., Whitmore, J., Upton, G., Spriggs, L., McKinnon, D., McInnes, R., Graubart, R., Clausen, L.: Threat assessment and remediation analysis (TARA): methodology description version 1.0, Technical report, MITRE CORP BEDFORD MA (2011)
Institute, C.: What is capability maturity model integration (CMMI) (2017). http://cmmiinstitute.com/capability-maturity-model-integration
FIRST, S.: Common vulnerability scoring system sig (2017). https://www.first.org/cvss/
Shaw, R., Takanti, V., Zullo, T., Director, M., Llc, E.: Best practices in cyber supply chain risk management Boeing and Exostar cyber security supply chain risk management interviews (2017)
F. A. of Information Risk: Quantitative information risk management | the fair institute (2017). http://www.fairinstitute.org/
ISO.: International Standard: Risk Management: Principles and Guidelines. ISO 31000. Principes Et Lignes Directrices, ISO, 2009
Force, J.T.: Risk management framework for information systems and organizations. NIST Spec. Public. 800, 37 (2018)
F. A. of Information Risk, What is a cyber value-at-risk model? (2017). http://www.fairinstitute.org/blog/what-is-a-cyber-value-at-risk-model
Radanliev, P., De Roure, D.C., Nicolescu, R., Huth, M., Montalvo, R.M., Cannady, S., Burnap, P.: Future developments in cyber risk assessment for the internet of things. Comput. Ind. 102, 14–22 (2018)
Radanliev, P., De Roure, D., Cannady, S., Montalvo, R. M., Nicolescu, R., Huth, M.: Economic impact of IoT cyber risk-analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance (2018)
Malik, V., Singh, S.: Security risk management in IoT environment. J. Discrete Math. Sci. Cryptogr. 22(4), 697–709 (2019)
Radanliev, P., De Roure, D.C., Nurse, J. R., Burnap, P., Anthi,E., Uchenna, A., Santos, O., Montalvo, R.M., et al.: Cyber risk management for the internet of things (2019)
Akinrolabu, O., New, S., Martin, A.: CSCCRA: A novel quantitative risk assessment model for SaaS cloud service providers. Computers 8(3), 66 (2019)
Abou El Houda, Z., Moudoud, H., Khoukhi, L.: Secure and efficient federated learning for robust intrusion detection in IoT networks. In: GLOBECOM 2023-2023 IEEE Global Communications Conference, IEEE, pp. 2668–2673 (2023)
Moudoud, H., Mlika, Z., Khoukhi, L., Cherkaoui, S.: Detection and prediction of FDI attacks in IoT systems via hidden Markov model. IEEE Transactions on Network Science and Engineering 9(5), 2978–2990 (2022)
Banse, C., Kunz, I., Schneider, A., Weiss, K.: Cloud property graph: Connecting cloud security assessments with static code analysis. In: 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), IEEE, pp. 13–19 (2021)
Sun, Y., Lin, D., Song, H., Yan, M., Cao, L.: A method to construct vulnerability knowledge graph based on heterogeneous data. In: 2020 16th International Conference on Mobility, Sensing and Networking (MSN), IEEE, pp. 740–745 (2020)
Ksibi, S., Jaidi, F., Bouhoula, A.: Securing IoMT applications: an approach for enhancing the reliability of security policies within cloud databases. J. Inf. Sci. Eng. 40, 1197–1209 (2024)
Yaqoob, T., Abbas, H., Atiquzzaman, M.: Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices-a review. IEEE Commun. Surv. Tutor. 21(4), 3723–3768 (2019)
Koutras, D., Stergiopoulos, G., Dasaklis, T., Kotzanikolaou, P., Glynos, D., Douligeris, C.: Security in iomt communications: A survey. Sensors 20(17), 4828 (2020)
Jagannathan, S., Sorini, A.: A cybersecurity risk analysis methodology for medical devices. In: IEEE Symposium on Product Compliance Engineering (ISPCE). IEEE 2015, pp. 1–6 (2015)
Alsubaei, F., Abuhussein, A., Shiva, S.: A framework for ranking IoMT solutions based on measuring security and privacy. In: Proceedings of the Future Technologies Conference (FTC) 2018: Volume 1, Springer, pp. 205–224 (2019)
Alzahrani, F.A., Ahmad, M., Ansari, M.T.J.: Towards design and development of security assessment framework for internet of medical things. Appl. Sci. 12(16), 8148 (2022)
Lopatina, K., Dokuchaev, V., Maklachkova, V.: Data risks identification in healthcare sensor networks. In: 2021 International Conference on Engineering Management of Communication and Technology (EMCTECH), IEEE, pp. 1–7 (2021)
Ksibi, S., Jaidi, F., Bouhoula, A.: A user-centric fuzzy ahp-based method for medical devices security assessment. In: 2022 15th International Conference on Security of Information and Networks (SIN), IEEE, pp. 01–07 (2022)
Ahmed, M., Byreddy, S., Nutakki, A., Sikos, L.F., Haskell-Dowland, P.: ECU-IOHT: A dataset for analyzing cyberattacks in internet of health things. Ad Hoc Netw. 122, 102621 (2021)
Malamas, V., Chantzis, F., Dasaklis, T.K., Stergiopoulos, G., Kotzanikolaou, P., Douligeris, C.: Risk assessment methodologies for the internet of medical things: a survey and comparative appraisal. IEEE Access 9, 40049–40075 (2021)
Ksibi, S., Jaidi, F., Bouhoula, A.: IoMT applications perspectives: from opportunities and security challenges to cyber-risk management. In: Decision Making and Security Risk Management for IoT Environments. Springer, Berlin. pp. 21–37 (2023)
Darwish, S., Nouretdinov, I., Wolthusen, S.D.: Towards composable threat assessment for medical IoT (MIoT). Procedia Comput. Sci. 113, 627–632 (2017)
Shafiq, M., Tian, Z., Bashir, A.K., Du, X., Guizani, M.: CORRAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Intern. Things J. 8(5), 3242–3254 (2020)
Atuhurra, J., Hara, T., Zhang, Y., Sasabe, M., Kasahara, S.: Dealing with imbalanced classes in bot-IoT dataset, arXiv preprint arXiv:2403.18989 (2024)
Churcher, A., Ullah, R., Ahmad, J., Ur Rehman, S., Masood, F., Gogate, M., Alqahtani, F., Nour, B., Buchanan, W.J.: An experimental analysis of attack classification using machine learning in IoT networks. Sensors 21(2), 446 (2021)
McNeil, D.: Can Smart Thermometers Track the Spread of the Coronavirus? The New York Times, New York (2020)
Funding
Not applicable.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethics approval
‘Not applicable’
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ksibi, S., Jaidi, F. & Bouhoula, A. MLRA-Sec: an adaptive and intelligent cyber-security-assessment model for internet of medical things (IoMT). Int. J. Inf. Secur. 24, 21 (2025). https://doi.org/10.1007/s10207-024-00923-y
Published:
DOI: https://doi.org/10.1007/s10207-024-00923-y