Skip to main content

Advertisement

Log in

An advanced data analytics approach to a cognitive cyber-physical system for the identification and mitigation of cyber threats in the medical internet of things (MIoT)

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

This article has been updated

Abstract

The integration of connected devices into the Medical Internet of Things (MIoT) has improved healthcare delivery but also brings vulnerabilities to cyber threats to patient safety and the integrity of critical medical systems. Today’s security threats are no longer simple and traditional security mechanisms are no longer sufficient. The contribution of this research is an advanced data analysis approach based on a cognitive cyber-physical system to detect and prevent cyber-attacks in MIoT environments. In this paper, we introduce a framework that combines the whale optimization algorithm (WOA) with deep learning models such as gated recurrent units (GRU) and a dense neural network (DNN) for anomaly detection in cyber-attacks. Using a set of wearable health devices and medical imaging equipment, the system is trained to detect threats with unprecedented accuracy. The performance of the model is improved with Hyperparameter optimization using WOA. Experimental results show that the proposed GRU-DNN-WOA framework achieves a detection accuracy of 98.2%, precision of 97.1%, recall of 98.0%, and F1-score of 97.5% on the MedBIoT dataset. On the IoT-23 dataset, it achieves an accuracy of 96.8%, precision of 95.7%, recall of 96.6%, and F1-score of 96.1%, outperforming prior cybersecurity techniques. The results confirm the framework's robustness, scalability, and real-time applicability for securing the MIoT systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

Data availability statement

The datasets will be available on reasonable request from the corresponding author. The datasets will be available on reasonable request from the corresponding author.

Change history

  • 30 April 2025

    Funding project number has been updated.

References

  1. Elhoseny M, Thilakarathne NN, Alghamdi MI, Mahendran RK, Gardezi AA, Weerasinghe H, Welhenge A (2021) Security and privacy issues in medical internet of things: overview, countermeasures, challenges and future directions. Sustainability 13(21):11645

    Article  Google Scholar 

  2. Osama M, Ateya AA, Sayed MS, Hammad M, Pławiak P, Abd El-Latif AA, Elsayed RA (2023) Internet of medical things and healthcare 4.0: Trends, requirements, challenges, and research directions. Sensors 23(17):7435

  3. He Y, Aliyu A, Evans M, Luo C (2021) Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping review. J Med Internet Res 23(4):e21747

    Article  Google Scholar 

  4. Ntantogian C, Laoudias C, Honrubia AJD, Veroni E, Xenakis C (2021) Cybersecurity threats in the healthcare domain and technical solutions. In: Handbook of computational neurodegeneration, pp 1–29. Springer International Publishing, Cham

  5. Cybersecurity. https://www.fda.gov/medical-devices/digital-health-center-excellence/cybersecurity?utm

  6. Τσαγδής Α (2022)Hardware-based security methods for Internet of Things (IoT). Internet of everything (IoE) and cyber-physical systems (CPS)

  7. Patel R (2020) Internet of things (IoT): cybersecurity risks in healthcare

  8. Perwej Y, Akhtar N, Kulshrestha N, Mishra P (2022) A methodical analysis of medical internet of things (MIoT) security and privacy in current and future trends. J Emerg Technol Innov Res 9(1):d346–d371

    Google Scholar 

  9. Wani RU, Zaman FT, Can O (2024) Security and privacy challenges, issues, and enhancing techniques for Internet of Medical Things: a systematic review. Security and Privacy 7(5):e409

    Article  Google Scholar 

  10. Boppiniti ST (2021) AI-based cybersecurity for threat detection in real-time networks. Int J Mach Learning Sustain Develop 3(2)

  11. Thakor VA, Razzaque MA, Khandaker MRA (2021) Lightweight cryptography algorithms for resource-constrained IoT devices: a review, comparison and research opportunities. IEEE Access 9:28177–28193

  12. Caino, AR (2024) Cybersecurity strategies information technology leaders use to protect healthcare information systems from ransomware, PhD diss., Walden University

  13. Priyadarshini I, Kumar R, Tuan LM, Son LH, Long HV, Sharma R, Rai S (2021) A new enhanced cyber security framework for medical cyber physical systems. SICS Softw Intens Cyber Phys Syst, pp 1–25

  14. Newaz AKMI, Sikder AK, Rahman MA, Uluagac AS (2021) A survey on security and privacy issues in modern healthcare systems: attacks and defenses. ACM Trans Comput Healthcare 2(3):1–44

  15. Czekster RM, Grace P, Marcon C, Hessel F, Cazella SC (2023) Challenges and opportunities for conducting dynamic risk assessments in medical IoT. Appl Sci 13(13):7406

    Article  Google Scholar 

  16. Chinnasamy P, Deepalakshmi P (2022) HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud. J Ambient Intell Humaniz Comput 13(2):1001–1019

    Article  Google Scholar 

  17. Kolokotronis N, Dareioti M, Shiaeles S, Bellini E (2022) n intelligent platform for threat assessment and cyber-attack mitigation in IoMT ecosystems. In: 2022 IEEE globecom workshops (GC Wkshps), pp 541–546. IEEE

  18. Santhi TM, Mary MCH (2022) Machine-learning approach for detecting cyberattacks in Medical Internet of Things. In: Advances in cyber security and intelligent analytics, pp 129–140. CRC Press

  19. Chaturvedi S (2023) IoT-based secure healthcare framework using blockchain technology with a novel simplified swarm-optimized bayesian normalized neural networks. Int J Data Informat Intell Comput 2(2):63–71

    Google Scholar 

  20. Mishra S, Chakraborty S, Sahoo KS, Bilal M (2023) Cogni-Sec: a secure cognitive enabled distributed reinforcement learning model for medical cyber–physical system. Internet Things 24:100978

  21. Aljanabi M (2023) Safeguarding connected health: Leveraging trustworthy AI techniques to harden intrusion detection systems against data poisoning threats in IoMT environments. Babylon J Internet Things 2023:31–37

    Article  Google Scholar 

  22. Ashraf MWA, Singh AR, Pandian A, RathoreRS, Bajaj M, Zaitsev I (2024) A hybrid approach using support vector machine rule-based system: detecting cyber threats in internet of things. Sci Rep 14(1):27058

  23. Chinnasamy P, Ayyasamy RK, Anuradha K, Alam I, Nair DMN, Kiran A (2024) Enhancing IoT data security: integrating elliptic galois cryptography with matrix XOR steganography and adaptive firefly optimization. In: 2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp 29–33. IEEE

  24. Arbi A, Israr M (2024) Empowering cyber-physical systems through ai-driven fusion for enhanced health assessment. Int J Data Informat Intell Comput 3(3):16–23

    Google Scholar 

  25. Mohammadi A, Ghahramani H, Asghari SA, Aminian M (2024) Advanced cyberattack detection in internet of medical things (IoMT) using convolutional neural networks. arXiv preprint arXiv:2410.23306

  26. Saranya T, Jeyamala D, Sellamuthu S (2024) A Secure framework for MIoT: TinyML-powered emergency alerts and intrusion detection for secure real-time monitoring. In: 2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp 13–21. IEEE

  27. Alsolami T, Alsharif B, Ilyas M (2024) Enhancing cybersecurity in healthcare: evaluating ensemble learning models for intrusion detection on the internet of medical things. Sensors 24(18):5937

    Article  Google Scholar 

  28. Venkatesan S, Ramakrishnan M (2024) A Smart coherent security model (SCSM) using intelligent optimization and ensemble deep learning mechanisms for healthcare-IoT networks. In: 2024 Control Instrumentation System Conference (CISCON), pp 1–9. IEEE

  29. Akinola O, Akinola A, Ifeanyi IV, Oyerinde O, Adewole OJ, Sulaimon B, Oyekan BO (2024) Artificial intelligence and machine learning techniques for anomaly detection and threat mitigation in cloud-connected medical devices. Int J Sci Res Mod Technol, 3

  30. Vaisakhkrishnan K, Ashok G, Mishra P, Kumar TG (2024) Guarding digital health: deep learning for attack detection in medical IoT. Proc Comput Sci 235:2498–2507

  31. Salem FM, Salem FM (2022) Gated RNN: the gated recurrent unit (GRU) RNN. Recurrent neural networks: from simple to gated architectures, pp. 85–100

  32. Nazari F, Yan W ((2021)) Convolutional versus dense neural networks: comparing the two neural networks performance in predicting building operational energy use based on the building shape. arXiv preprint arXiv:2108.12929

  33. Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67

    Article  Google Scholar 

  34. John A, Mohan S, Vianny (2021))DMM Cognitive cyber‐physical system applications. Cognitive engineering for next generation computing: a practical analytical approach, pp 167–187

  35. Gaur P, Kaushik A (2021)AES image encryption (Advanced encryption standard). Int J Res Appl Sci Eng Technol 9(12):1357–1363

  36. Mohammed AHY, Dziyauddin RA, Latiff LA (2023) Current multi-factor of authentication: Approaches, requirements, attacks and challenges. Int J Adv Comput Sci Appl 14(1)

  37. Oakley A (2023) HIPAA, HIPPA, or HIPPO: What really is the heath insurance portability and accountability act? Biotechnol Law Rep 42(6):306–318

    Article  Google Scholar 

  38. Guerra-Manzanares A, Medina-Galindo J, Bahsi H, Nõmm S (2020) MedBIoT: generation of an IoT botnet dataset in a medium-sized IoT network." In ICISSP, pp. 207-218. Retrieved from https://cs.taltech.ee/research/data/medbiot/

  39. Garcia S, Parmisano A, Erquiaga MJ (2020) IoT-23: a labeled dataset with malicious and Benign IoT network traffic (version 1.0.0). Zenodo. Retrieved from https://www.stratosphereips.org/datasets-iot23

  40. Elreedy D, Atiya AF, Kamalov F (2024) A theoretical distribution analysis of synthetic minority oversampling technique (SMOTE) for imbalanced learning. Mach Learn 113(7):4903–4923

    Article  MathSciNet  Google Scholar 

  41. Mahmoud BS, Garko AB (2022) A machine learning model for malware detection using recursive feature elimination (RFE) for feature selection and ensemble technique. IOS J

Download references

Funding

The author extends the appreciation to the Deanship of Postgraduate Studies and Scientific Research at Majmaah University for funding this research work through the project number (R-2025-1612).

Author information

Authors and Affiliations

Authors

Contributions

YT contributed to the conception, SM involved design and methodology, NA performed iterpretation of results, running codes and manuscript drafting; supervision, and investigation, PKS did supervision and investigation; MY contributed to methodology; and TP also contributed to methodology, result analysis.

Corresponding author

Correspondence to Tao Pang.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. The authors declare no conflict of interest. The authors declare no competing interests.

Consent for publication

Not applicable.

Declaration of generative AI and AI-assisted technologies in the writing process

During the preparation of this work, the author(s) have not used any tool, the author(s) reviewed and edited the content as needed and take (s) full responsibility for the content of the publication.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tang, Y., Mishra, S., Alduaiji, N. et al. An advanced data analytics approach to a cognitive cyber-physical system for the identification and mitigation of cyber threats in the medical internet of things (MIoT). J Supercomput 81, 623 (2025). https://doi.org/10.1007/s11227-025-07093-1

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11227-025-07093-1

Keywords

Profiles

  1. Mohammad Yahya
  2. Tao Pang