Abstract
The integration of connected devices into the Medical Internet of Things (MIoT) has improved healthcare delivery but also brings vulnerabilities to cyber threats to patient safety and the integrity of critical medical systems. Today’s security threats are no longer simple and traditional security mechanisms are no longer sufficient. The contribution of this research is an advanced data analysis approach based on a cognitive cyber-physical system to detect and prevent cyber-attacks in MIoT environments. In this paper, we introduce a framework that combines the whale optimization algorithm (WOA) with deep learning models such as gated recurrent units (GRU) and a dense neural network (DNN) for anomaly detection in cyber-attacks. Using a set of wearable health devices and medical imaging equipment, the system is trained to detect threats with unprecedented accuracy. The performance of the model is improved with Hyperparameter optimization using WOA. Experimental results show that the proposed GRU-DNN-WOA framework achieves a detection accuracy of 98.2%, precision of 97.1%, recall of 98.0%, and F1-score of 97.5% on the MedBIoT dataset. On the IoT-23 dataset, it achieves an accuracy of 96.8%, precision of 95.7%, recall of 96.6%, and F1-score of 96.1%, outperforming prior cybersecurity techniques. The results confirm the framework's robustness, scalability, and real-time applicability for securing the MIoT systems.













Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.Data availability statement
The datasets will be available on reasonable request from the corresponding author. The datasets will be available on reasonable request from the corresponding author.
Change history
30 April 2025
Funding project number has been updated.
References
Elhoseny M, Thilakarathne NN, Alghamdi MI, Mahendran RK, Gardezi AA, Weerasinghe H, Welhenge A (2021) Security and privacy issues in medical internet of things: overview, countermeasures, challenges and future directions. Sustainability 13(21):11645
Osama M, Ateya AA, Sayed MS, Hammad M, Pławiak P, Abd El-Latif AA, Elsayed RA (2023) Internet of medical things and healthcare 4.0: Trends, requirements, challenges, and research directions. Sensors 23(17):7435
He Y, Aliyu A, Evans M, Luo C (2021) Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping review. J Med Internet Res 23(4):e21747
Ntantogian C, Laoudias C, Honrubia AJD, Veroni E, Xenakis C (2021) Cybersecurity threats in the healthcare domain and technical solutions. In: Handbook of computational neurodegeneration, pp 1–29. Springer International Publishing, Cham
Cybersecurity. https://www.fda.gov/medical-devices/digital-health-center-excellence/cybersecurity?utm
Τσαγδής Α (2022)Hardware-based security methods for Internet of Things (IoT). Internet of everything (IoE) and cyber-physical systems (CPS)
Patel R (2020) Internet of things (IoT): cybersecurity risks in healthcare
Perwej Y, Akhtar N, Kulshrestha N, Mishra P (2022) A methodical analysis of medical internet of things (MIoT) security and privacy in current and future trends. J Emerg Technol Innov Res 9(1):d346–d371
Wani RU, Zaman FT, Can O (2024) Security and privacy challenges, issues, and enhancing techniques for Internet of Medical Things: a systematic review. Security and Privacy 7(5):e409
Boppiniti ST (2021) AI-based cybersecurity for threat detection in real-time networks. Int J Mach Learning Sustain Develop 3(2)
Thakor VA, Razzaque MA, Khandaker MRA (2021) Lightweight cryptography algorithms for resource-constrained IoT devices: a review, comparison and research opportunities. IEEE Access 9:28177–28193
Caino, AR (2024) Cybersecurity strategies information technology leaders use to protect healthcare information systems from ransomware, PhD diss., Walden University
Priyadarshini I, Kumar R, Tuan LM, Son LH, Long HV, Sharma R, Rai S (2021) A new enhanced cyber security framework for medical cyber physical systems. SICS Softw Intens Cyber Phys Syst, pp 1–25
Newaz AKMI, Sikder AK, Rahman MA, Uluagac AS (2021) A survey on security and privacy issues in modern healthcare systems: attacks and defenses. ACM Trans Comput Healthcare 2(3):1–44
Czekster RM, Grace P, Marcon C, Hessel F, Cazella SC (2023) Challenges and opportunities for conducting dynamic risk assessments in medical IoT. Appl Sci 13(13):7406
Chinnasamy P, Deepalakshmi P (2022) HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud. J Ambient Intell Humaniz Comput 13(2):1001–1019
Kolokotronis N, Dareioti M, Shiaeles S, Bellini E (2022) n intelligent platform for threat assessment and cyber-attack mitigation in IoMT ecosystems. In: 2022 IEEE globecom workshops (GC Wkshps), pp 541–546. IEEE
Santhi TM, Mary MCH (2022) Machine-learning approach for detecting cyberattacks in Medical Internet of Things. In: Advances in cyber security and intelligent analytics, pp 129–140. CRC Press
Chaturvedi S (2023) IoT-based secure healthcare framework using blockchain technology with a novel simplified swarm-optimized bayesian normalized neural networks. Int J Data Informat Intell Comput 2(2):63–71
Mishra S, Chakraborty S, Sahoo KS, Bilal M (2023) Cogni-Sec: a secure cognitive enabled distributed reinforcement learning model for medical cyber–physical system. Internet Things 24:100978
Aljanabi M (2023) Safeguarding connected health: Leveraging trustworthy AI techniques to harden intrusion detection systems against data poisoning threats in IoMT environments. Babylon J Internet Things 2023:31–37
Ashraf MWA, Singh AR, Pandian A, RathoreRS, Bajaj M, Zaitsev I (2024) A hybrid approach using support vector machine rule-based system: detecting cyber threats in internet of things. Sci Rep 14(1):27058
Chinnasamy P, Ayyasamy RK, Anuradha K, Alam I, Nair DMN, Kiran A (2024) Enhancing IoT data security: integrating elliptic galois cryptography with matrix XOR steganography and adaptive firefly optimization. In: 2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp 29–33. IEEE
Arbi A, Israr M (2024) Empowering cyber-physical systems through ai-driven fusion for enhanced health assessment. Int J Data Informat Intell Comput 3(3):16–23
Mohammadi A, Ghahramani H, Asghari SA, Aminian M (2024) Advanced cyberattack detection in internet of medical things (IoMT) using convolutional neural networks. arXiv preprint arXiv:2410.23306
Saranya T, Jeyamala D, Sellamuthu S (2024) A Secure framework for MIoT: TinyML-powered emergency alerts and intrusion detection for secure real-time monitoring. In: 2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp 13–21. IEEE
Alsolami T, Alsharif B, Ilyas M (2024) Enhancing cybersecurity in healthcare: evaluating ensemble learning models for intrusion detection on the internet of medical things. Sensors 24(18):5937
Venkatesan S, Ramakrishnan M (2024) A Smart coherent security model (SCSM) using intelligent optimization and ensemble deep learning mechanisms for healthcare-IoT networks. In: 2024 Control Instrumentation System Conference (CISCON), pp 1–9. IEEE
Akinola O, Akinola A, Ifeanyi IV, Oyerinde O, Adewole OJ, Sulaimon B, Oyekan BO (2024) Artificial intelligence and machine learning techniques for anomaly detection and threat mitigation in cloud-connected medical devices. Int J Sci Res Mod Technol, 3
Vaisakhkrishnan K, Ashok G, Mishra P, Kumar TG (2024) Guarding digital health: deep learning for attack detection in medical IoT. Proc Comput Sci 235:2498–2507
Salem FM, Salem FM (2022) Gated RNN: the gated recurrent unit (GRU) RNN. Recurrent neural networks: from simple to gated architectures, pp. 85–100
Nazari F, Yan W ((2021)) Convolutional versus dense neural networks: comparing the two neural networks performance in predicting building operational energy use based on the building shape. arXiv preprint arXiv:2108.12929
Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67
John A, Mohan S, Vianny (2021))DMM Cognitive cyber‐physical system applications. Cognitive engineering for next generation computing: a practical analytical approach, pp 167–187
Gaur P, Kaushik A (2021)AES image encryption (Advanced encryption standard). Int J Res Appl Sci Eng Technol 9(12):1357–1363
Mohammed AHY, Dziyauddin RA, Latiff LA (2023) Current multi-factor of authentication: Approaches, requirements, attacks and challenges. Int J Adv Comput Sci Appl 14(1)
Oakley A (2023) HIPAA, HIPPA, or HIPPO: What really is the heath insurance portability and accountability act? Biotechnol Law Rep 42(6):306–318
Guerra-Manzanares A, Medina-Galindo J, Bahsi H, Nõmm S (2020) MedBIoT: generation of an IoT botnet dataset in a medium-sized IoT network." In ICISSP, pp. 207-218. Retrieved from https://cs.taltech.ee/research/data/medbiot/
Garcia S, Parmisano A, Erquiaga MJ (2020) IoT-23: a labeled dataset with malicious and Benign IoT network traffic (version 1.0.0). Zenodo. Retrieved from https://www.stratosphereips.org/datasets-iot23
Elreedy D, Atiya AF, Kamalov F (2024) A theoretical distribution analysis of synthetic minority oversampling technique (SMOTE) for imbalanced learning. Mach Learn 113(7):4903–4923
Mahmoud BS, Garko AB (2022) A machine learning model for malware detection using recursive feature elimination (RFE) for feature selection and ensemble technique. IOS J
Funding
The author extends the appreciation to the Deanship of Postgraduate Studies and Scientific Research at Majmaah University for funding this research work through the project number (R-2025-1612).
Author information
Authors and Affiliations
Contributions
YT contributed to the conception, SM involved design and methodology, NA performed iterpretation of results, running codes and manuscript drafting; supervision, and investigation, PKS did supervision and investigation; MY contributed to methodology; and TP also contributed to methodology, result analysis.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. The authors declare no conflict of interest. The authors declare no competing interests.
Consent for publication
Not applicable.
Declaration of generative AI and AI-assisted technologies in the writing process
During the preparation of this work, the author(s) have not used any tool, the author(s) reviewed and edited the content as needed and take (s) full responsibility for the content of the publication.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Tang, Y., Mishra, S., Alduaiji, N. et al. An advanced data analytics approach to a cognitive cyber-physical system for the identification and mitigation of cyber threats in the medical internet of things (MIoT). J Supercomput 81, 623 (2025). https://doi.org/10.1007/s11227-025-07093-1
Accepted:
Published:
DOI: https://doi.org/10.1007/s11227-025-07093-1
Keywords
Profiles
- Mohammad Yahya View author profile
- Tao Pang View author profile