[go: up one dir, main page]

 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (210)

Search Parameters:
Keywords = Internet of Medical Things (IoMT)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 5949 KiB  
Article
Deduplication-Aware Healthcare Data Distribution in IoMT
by Saleh M. Altowaijri
Mathematics 2024, 12(16), 2482; https://doi.org/10.3390/math12162482 (registering DOI) - 11 Aug 2024
Viewed by 359
Abstract
As medical sensors undergo expeditious advancements, there is rising interest in the realm of healthcare applications within the Internet of Medical Things (IoMT) because of its broad applicability in monitoring the health of patients. IoMT proves beneficial in monitoring, disease diagnosis, and better [...] Read more.
As medical sensors undergo expeditious advancements, there is rising interest in the realm of healthcare applications within the Internet of Medical Things (IoMT) because of its broad applicability in monitoring the health of patients. IoMT proves beneficial in monitoring, disease diagnosis, and better treatment recommendations. This emerging technology aggregates real-time patient health data from sensors deployed on their bodies. This data collection mechanism consumes excessive power due to the transmission of data of similar types. It necessitates a deduplication mechanism, but this is complicated by the variable sizes of the data chunks, which may be either very small or larger in size. This reduces the likelihood of efficient chunking and, hence, deduplication. In this study, a deduplication-based data aggregation scheme was presented. It includes a Delimiter-Based Incremental Chunking Algorithm (DICA), which recognizes the breakpoint among two frames. The scheme includes static as well as variable-length windows. The proposed algorithm identifies a variable-length chunk using a terminator that optimizes the windows that are variable in size, with a threshold limit for the window size. To validate the scheme, a simulation was performed by utilizing NS-2.35 with the C language in the Ubuntu operating system. The TCL language was employed to set up networks, as well as for messaging purposes. The results demonstrate that the rise in the number of windows of variable size amounts to 62%, 66.7%, 68%, and 72.1% for DSW, RAM, CWCA, and DICA, respectively. The proposed scheme exhibits superior performance in terms of the probability of the false recognition of breakpoints, the static and dynamic sizes of chunks, the average sizes of chunks, the total attained chunks, and energy utilization. Full article
Show Figures

Figure 1

Figure 1
<p>System model.</p>
Full article ">Figure 2
<p>Average number of chunks.</p>
Full article ">Figure 3
<p>Average chunk size.</p>
Full article ">Figure 4
<p>Performances of all schemes under IC and fixed-sized windows.</p>
Full article ">Figure 5
<p>Likelihood of breakpoint failure.</p>
Full article ">Figure 6
<p>Throughput.</p>
Full article ">Figure 7
<p>Energy efficiency.</p>
Full article ">Figure 8
<p>Computational overhead.</p>
Full article ">Figure 9
<p>Energy consumption at collector devices (CDs).</p>
Full article ">Figure 10
<p>Energy consumption at sensing devices.</p>
Full article ">
15 pages, 3559 KiB  
Article
Advanced Denoising and Meta-Learning Techniques for Enhancing Smart Health Monitoring Using Wearable Sensors
by Minyechil Alehegn Tefera, Amare Mulatie Dehnaw, Yibeltal Chanie Manie, Cheng-Kai Yao, Shegaw Demessie Bogale and Peng-Chun Peng
Future Internet 2024, 16(8), 280; https://doi.org/10.3390/fi16080280 - 5 Aug 2024
Viewed by 420
Abstract
This study introduces a novel meta-learning method to enhance diabetes detection using wearable sensor systems in smart health applications. Wearable sensor technology often needs to operate accurately across a wide range of users, each characterized by unique physiological and behavioral patterns. However, the [...] Read more.
This study introduces a novel meta-learning method to enhance diabetes detection using wearable sensor systems in smart health applications. Wearable sensor technology often needs to operate accurately across a wide range of users, each characterized by unique physiological and behavioral patterns. However, the specific data for a particular application or user group might be scarce. Moreover, collecting extensive training data from wearable sensor experiments is challenging, time-consuming, and expensive. In these cases, meta-learning can be particularly useful. This model can quickly adapt to the nuances of new users or specific applications with minimal data. Therefore, to solve the need for a huge amount of training data and to enable the application of artificial intelligence (AI) in data-scarce scenarios, a meta-learning method is proposed. This meta-learning model has been implemented to forecast diabetes, resolve cross-talk issues, and accurately detect R peaks from overlapping electrocardiogram (ECG) signals affected by movement artifacts, poor electrode contact, electrical interference, or muscle activity. Motion artifacts from body movements, external conditions such as temperature, humidity, and electromagnetic interference, and the inherent quality and calibration of the sensor can all contribute to noise. Contact quality between the sensor and the skin, signal processing errors, power supply variations, user-generated interference from activities like talking or exercising, and the materials used in the wearable device also play significant roles in the overall noise in wearable sensor data and can significantly distort the true signal, leading to erroneous interpretations and potential diagnostic errors. Furthermore, discrete wavelet transform (DWT) was also implemented to improve the quality of the data and enhance the performance of the proposed model. The demonstrated results confirmed that with only a limited amount of target data, the proposed meta-learning and DWT denoising method can adapt more quickly and improve the detection of diabetes compared to the traditional method. Therefore, the proposed system is cost-effective, flexible, faster, and adaptable, reduces the need for training data, and can enhance the accuracy of chronic disease detection such as diabetes for smart health systems. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed discrete wavelet transform (DWT) multi-level denoising (<b>a</b>) before applying the denoising technique, (<b>b</b>) after applying the denoising technique.</p>
Full article ">Figure 2
<p>The scheme and implementation framework of the proposed system.</p>
Full article ">Figure 3
<p>Proposed technique performance based on RMSE and MSE according to various iterations (k) steps.</p>
Full article ">Figure 4
<p>Comparison of performance of meta-learning, without pre-train, after fine-tune, and before fine-tune in terms of MAE and time.</p>
Full article ">Figure 5
<p>Predicted vs actual glucose level using the proposed method.</p>
Full article ">Figure 6
<p>ROC curve of the proposed model.</p>
Full article ">Figure 7
<p>Detected r-peaks using the proposed method.</p>
Full article ">Figure 8
<p>Performance of different models.</p>
Full article ">
18 pages, 260 KiB  
Review
A Review of Post-Quantum Privacy Preservation for IoMT Using Blockchain
by Fariza Sabrina, Shaleeza Sohail and Umair Ullah Tariq
Electronics 2024, 13(15), 2962; https://doi.org/10.3390/electronics13152962 - 26 Jul 2024
Viewed by 402
Abstract
The Internet of Medical Things (IoMT) has significantly enhanced the healthcare system by enabling advanced patient monitoring, data analytics, and remote interactions. Given that IoMT devices generate vast amounts of sensitive data, robust privacy mechanisms are essential. This privacy requirement is critical for [...] Read more.
The Internet of Medical Things (IoMT) has significantly enhanced the healthcare system by enabling advanced patient monitoring, data analytics, and remote interactions. Given that IoMT devices generate vast amounts of sensitive data, robust privacy mechanisms are essential. This privacy requirement is critical for IoMT as, generally, these devices are very resource-constrained with limited storage, computation, and communication capabilities. Blockchain technology, with its decentralisation, transparency, and immutability, offers a promising solution for improving IoMT data security and privacy. However, the recent emergence of quantum computing necessitates developing measures to maintain the security and integrity of these data against emerging quantum threats. This work addresses the current gap of a comprehensive review and analysis of the research efforts to secure IoMT data using blockchain in the quantum era. We discuss the importance of blockchain for IoMT privacy and analyse the impact of quantum computing on blockchain to justify the need for these works. We also provide a comprehensive review of the existing literature on quantum-resistant techniques for effective blockchain solutions in IoMT applications. From our detailed review, we present challenges and future opportunities for blockchain technology in this domain. Full article
(This article belongs to the Special Issue Machine Learning for Cybersecurity: Threat Detection and Mitigation)
24 pages, 1006 KiB  
Systematic Review
Healthcare and the Internet of Medical Things: Applications, Trends, Key Challenges, and Proposed Resolutions
by Inas Al Khatib, Abdulrahim Shamayleh and Malick Ndiaye
Informatics 2024, 11(3), 47; https://doi.org/10.3390/informatics11030047 - 16 Jul 2024
Viewed by 625
Abstract
In recent years, the Internet of medical things (IoMT) has become a significant technological advancement in the healthcare sector. This systematic review aims to identify and summarize the various applications, key challenges, and proposed technical solutions within this domain, based on a comprehensive [...] Read more.
In recent years, the Internet of medical things (IoMT) has become a significant technological advancement in the healthcare sector. This systematic review aims to identify and summarize the various applications, key challenges, and proposed technical solutions within this domain, based on a comprehensive analysis of the existing literature. This review highlights diverse applications of the IoMT, including mobile health (mHealth) applications, remote biomarker detection, hybrid RFID-IoT solutions for scrub distribution in operating rooms, IoT-based disease prediction using machine learning, and the efficient sharing of personal health records through searchable symmetric encryption, blockchain, and IPFS. Other notable applications include remote healthcare management systems, non-invasive real-time blood glucose measurement devices, distributed ledger technology (DLT) platforms, ultra-wideband (UWB) radar systems, IoT-based pulse oximeters, accident and emergency informatics (A&EI), and integrated wearable smart patches. The key challenges identified include privacy protection, sustainable power sources, sensor intelligence, human adaptation to sensors, data speed, device reliability, and storage efficiency. The proposed mitigations encompass network control, cryptography, edge-fog computing, and blockchain, alongside rigorous risk planning. The review also identifies trends and advancements in the IoMT architecture, remote monitoring innovations, the integration of machine learning and AI, and enhanced security measures. This review makes several novel contributions compared to the existing literature, including (1) a comprehensive categorization of IoMT applications, extending beyond the traditional use cases to include emerging technologies such as UWB radar systems and DLT platforms; (2) an in-depth analysis of the integration of machine learning and AI in IoMT, highlighting innovative approaches in disease prediction and remote monitoring; (3) a detailed examination of privacy and security measures, proposing advanced cryptographic solutions and blockchain implementations to enhance data protection; and (4) the identification of future research directions, providing a roadmap for addressing current limitations and advancing the scientific understanding of IoMT in healthcare. By addressing current limitations and suggesting future research directions, this work aims to advance scientific understanding of the IoMT in healthcare. Full article
Show Figures

Figure 1

Figure 1
<p>The systematic article selection process for this review.</p>
Full article ">Figure 2
<p>Network visualization.</p>
Full article ">
28 pages, 3061 KiB  
Article
BFLIDS: Blockchain-Driven Federated Learning for Intrusion Detection in IoMT Networks
by Khadija Begum, Md Ariful Islam Mozumder, Moon-Il Joo and Hee-Cheol Kim
Sensors 2024, 24(14), 4591; https://doi.org/10.3390/s24144591 - 15 Jul 2024
Viewed by 725
Abstract
The Internet of Medical Things (IoMT) has significantly advanced healthcare, but it has also brought about critical security challenges. Traditional security solutions struggle to keep pace with the dynamic and interconnected nature of IoMT systems. Machine learning (ML)-based Intrusion Detection Systems (IDS) have [...] Read more.
The Internet of Medical Things (IoMT) has significantly advanced healthcare, but it has also brought about critical security challenges. Traditional security solutions struggle to keep pace with the dynamic and interconnected nature of IoMT systems. Machine learning (ML)-based Intrusion Detection Systems (IDS) have been increasingly adopted to counter cyberattacks, but centralized ML approaches pose privacy risks due to the single points of failure (SPoFs). Federated Learning (FL) emerges as a promising solution, enabling model updates directly on end devices without sharing private data with a central server. This study introduces the BFLIDS, a Blockchain-empowered Federated Learning-based IDS designed to enhance security and intrusion detection in IoMT networks. Our approach leverages blockchain to secure transaction records, FL to maintain data privacy by training models locally, IPFS for decentralized storage, and MongoDB for efficient data management. Ethereum smart contracts (SCs) oversee and secure all interactions and transactions within the system. We modified the FedAvg algorithm with the Kullback–Leibler divergence estimation and adaptive weight calculation to boost model accuracy and robustness against adversarial attacks. For classification, we implemented an Adaptive Max Pooling-based Convolutional Neural Network (CNN) and a modified Bidirectional Long Short-Term Memory (BiLSTM) with attention and residual connections on Edge-IIoTSet and TON-IoT datasets. We achieved accuracies of 97.43% (for CNNs and Edge-IIoTSet), 96.02% (for BiLSTM and Edge-IIoTSet), 98.21% (for CNNs and TON-IoT), and 97.42% (for BiLSTM and TON-IoT) in FL scenarios, which are competitive with centralized methods. The proposed BFLIDS effectively detects intrusions, enhancing the security and privacy of IoMT networks. Full article
(This article belongs to the Special Issue Intelligent Solutions for Cybersecurity)
Show Figures

Figure 1

Figure 1
<p>Deployment and detection-based Intrusion Detection Systems.</p>
Full article ">Figure 2
<p>Proposed BC-enabled FL architecture for IoMT intrusion detection.</p>
Full article ">Figure 3
<p>CNN model used as an ML classifier at the local client’s end.</p>
Full article ">Figure 4
<p>BiLSTM model used as an ML classifier at the local client’s end.</p>
Full article ">Figure 5
<p>Rounds vs. accuracy of centralized vs. Federated Learning on the Edge-IIotSet dataset (<b>a</b>,<b>b</b>), and TON-IoT Dataset (<b>c</b>,<b>d</b>): (<b>a</b>) CNN Performance on Edge-IIoTSet; (<b>b</b>) BiLSTM Performance on Edge-IIoTSet; (<b>c</b>) CNN Performance on TON-IoT; and (<b>d</b>) BiLSTM Performance on TON-IoT.</p>
Full article ">Figure 5 Cont.
<p>Rounds vs. accuracy of centralized vs. Federated Learning on the Edge-IIotSet dataset (<b>a</b>,<b>b</b>), and TON-IoT Dataset (<b>c</b>,<b>d</b>): (<b>a</b>) CNN Performance on Edge-IIoTSet; (<b>b</b>) BiLSTM Performance on Edge-IIoTSet; (<b>c</b>) CNN Performance on TON-IoT; and (<b>d</b>) BiLSTM Performance on TON-IoT.</p>
Full article ">Figure 6
<p>ROC curve (True Positive rate vs. False Positive rate) for the Edge-IIotSet Dataset (<b>a</b>,<b>b</b>), and TON-IoT Dataset (<b>c</b>,<b>d</b>): (<b>a</b>) CNN Performance on Edge-IIoTSet; (<b>b</b>) BiLSTM Performance on Edge-IIoTSet; (<b>c</b>) CNN Performance on TON-IoT; and (<b>d</b>) BiLSTM Performance on TON-IoT.</p>
Full article ">Figure 6 Cont.
<p>ROC curve (True Positive rate vs. False Positive rate) for the Edge-IIotSet Dataset (<b>a</b>,<b>b</b>), and TON-IoT Dataset (<b>c</b>,<b>d</b>): (<b>a</b>) CNN Performance on Edge-IIoTSet; (<b>b</b>) BiLSTM Performance on Edge-IIoTSet; (<b>c</b>) CNN Performance on TON-IoT; and (<b>d</b>) BiLSTM Performance on TON-IoT.</p>
Full article ">Figure 7
<p>Successful deployment of smart contracts and functions.</p>
Full article ">Figure 8
<p>Decrease in latency with the progression of FL rounds.</p>
Full article ">Figure 9
<p>Security analysis of developed smart contracts using OYENTE.</p>
Full article ">
23 pages, 5137 KiB  
Article
Secure-by-Design Real-Time Internet of Medical Things Architecture: e-Health Population Monitoring (RTPM)
by Jims Marchang, Jade McDonald, Solan Keishing, Kavyan Zoughalian, Raymond Mawanda, Corentin Delhon-Bugard, Nicolas Bouillet and Ben Sanders
Telecom 2024, 5(3), 609-631; https://doi.org/10.3390/telecom5030031 - 10 Jul 2024
Viewed by 692
Abstract
The healthcare sector has undergone a profound transformation, owing to the influential role played by Internet of Medical Things (IoMT) technology. However, there are substantial concerns over these devices’ security and privacy-preserving mechanisms. The current literature on IoMT tends to focus on specific [...] Read more.
The healthcare sector has undergone a profound transformation, owing to the influential role played by Internet of Medical Things (IoMT) technology. However, there are substantial concerns over these devices’ security and privacy-preserving mechanisms. The current literature on IoMT tends to focus on specific security features, rather than wholistic security concerning Confidentiality, Integrity, and Availability (CIA Triad), and the solutions are generally simulated and not tested in a real-world network. The proposed innovative solution is known as Secure-by-Design Real-Time IoMT Architecture for e-Health Population Monitoring (RTPM) and it can manage keys at both ends (IoMT device and IoMT server) to maintain high privacy standards and trust during the monitoring process and enable the IoMT devices to run safely and independently even if the server is compromised. However, the session keys are controlled by the trusted IoMT server to lighten the IoMT devices’ overheads, and the session keys are securely exchanged between the client system and the monitoring server. The proposed RTPM focuses on addressing the major security requirements for an IoMT system, i.e., the CIA Triad, and conducts device authentication, protects from Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, and prevents non-repudiation attacks in real time. A self-healing solution during the network failure of live e-health monitoring is also incorporated in RTPM. The robustness and stress of the system are tested with different data types and by capturing live network traffic. The system’s performance is analysed using different security algorithms with different key sizes of RSA (1024 to 8192 bits), AES (128 to 256 bits), and SHA (256 bits) to support a resource-constraint-powered system when integrating with resource-demanding secure parameters and features. In the future, other security features like intrusion detection and prevention and the user’s experience and trust level of such a system will be tested. Full article
Show Figures

Figure 1

Figure 1
<p>Research design.</p>
Full article ">Figure 2
<p>Use case diagram.</p>
Full article ">Figure 3
<p>Proposed balanced system requirement over device limitation, security and performance.</p>
Full article ">Figure 4
<p>Proposed IoMT monitoring architecture.</p>
Full article ">Figure 5
<p>RTPM controller architecture of the client.</p>
Full article ">Figure 6
<p>Model network diagram of key management.</p>
Full article ">Figure 7
<p>User registration for monitoring.</p>
Full article ">Figure 8
<p>User authorisation process.</p>
Full article ">Figure 9
<p>Connection establishment, identification, and authentication.</p>
Full article ">Figure 10
<p>Warning message so that the device is not moved.</p>
Full article ">Figure 11
<p>Warning when coming too close.</p>
Full article ">Figure 12
<p>Capturing evidence if the system is moved.</p>
Full article ">Figure 13
<p>The body temperature and moisture level.</p>
Full article ">Figure 14
<p>Air quality of the room and movement monitoring.</p>
Full article ">Figure 15
<p>Lighting and noise monitoring.</p>
Full article ">
24 pages, 2167 KiB  
Article
Utilizing Deep Feature Fusion for Automatic Leukemia Classification: An Internet of Medical Things-Enabled Deep Learning Framework
by Md Manowarul Islam, Habibur Rahman Rifat, Md. Shamim Bin Shahid, Arnisha Akhter and Md Ashraf Uddin
Sensors 2024, 24(13), 4420; https://doi.org/10.3390/s24134420 - 8 Jul 2024
Viewed by 638
Abstract
Acute lymphoblastic leukemia, commonly referred to as ALL, is a type of cancer that can affect both the blood and the bone marrow. The process of diagnosis is a difficult one since it often calls for specialist testing, such as blood tests, bone [...] Read more.
Acute lymphoblastic leukemia, commonly referred to as ALL, is a type of cancer that can affect both the blood and the bone marrow. The process of diagnosis is a difficult one since it often calls for specialist testing, such as blood tests, bone marrow aspiration, and biopsy, all of which are highly time-consuming and expensive. It is essential to obtain an early diagnosis of ALL in order to start therapy in a timely and suitable manner. In recent medical diagnostics, substantial progress has been achieved through the integration of artificial intelligence (AI) and Internet of Things (IoT) devices. Our proposal introduces a new AI-based Internet of Medical Things (IoMT) framework designed to automatically identify leukemia from peripheral blood smear (PBS) images. In this study, we present a novel deep learning-based fusion model to detect ALL types of leukemia. The system seamlessly delivers the diagnostic reports to the centralized database, inclusive of patient-specific devices. After collecting blood samples from the hospital, the PBS images are transmitted to the cloud server through a WiFi-enabled microscopic device. In the cloud server, a new fusion model that is capable of classifying ALL from PBS images is configured. The fusion model is trained using a dataset including 6512 original and segmented images from 89 individuals. Two input channels are used for the purpose of feature extraction in the fusion model. These channels include both the original and the segmented images. VGG16 is responsible for extracting features from the original images, whereas DenseNet-121 is responsible for extracting features from the segmented images. The two output features are merged together, and dense layers are used for the categorization of leukemia. The fusion model that has been suggested obtains an accuracy of 99.89%, a precision of 99.80%, and a recall of 99.72%, which places it in an excellent position for the categorization of leukemia. The proposed model outperformed several state-of-the-art Convolutional Neural Network (CNN) models in terms of performance. Consequently, this proposed model has the potential to save lives and effort. For a more comprehensive simulation of the entire methodology, a web application (Beta Version) has been developed in this study. This application is designed to determine the presence or absence of leukemia in individuals. The findings of this study hold significant potential for application in biomedical research, particularly in enhancing the accuracy of computer-aided leukemia detection. Full article
(This article belongs to the Special Issue Securing E-health Data across IoMT and Wearable Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Workflow of the proposed framework. This workflow comprises six essential components: 1. Image acquisition 2. Cloud-based feature fusion model. 3. Image preprocessing, 4. Extraction of features 5. Block for concatenating features and classifying them. 6. Sending the outcome to the medical center and patient.</p>
Full article ">Figure 2
<p>Original images.</p>
Full article ">Figure 3
<p>Segmented images.</p>
Full article ">Figure 4
<p>The structure of the suggested model. The input image shapes are 128 × 128 × 3, and feature extraction is performed using transfer learning models. In order to reduce the number of parameters and preserve spatial information, the global average pooling2D is utilized. To mitigate overfitting concerns, dropout layers with a value of 0.2 are implemented in the dense layer.</p>
Full article ">Figure 5
<p>Leveraging spatial and morphological features: A squeeze-and-excitation enhanced deep learning architecture for leukemia classification.</p>
Full article ">Figure 6
<p>Original images’ training and validation.</p>
Full article ">Figure 7
<p>Segmented images’ training and validation.</p>
Full article ">Figure 8
<p>Combined images’ training and validation.</p>
Full article ">Figure 9
<p>Confusion matrix.</p>
Full article ">Figure 10
<p>Comparison between traditional CNN models.</p>
Full article ">Figure 11
<p>Comparison between Mohamed E. Karar et al. [<a href="#B44-sensors-24-04420" class="html-bibr">44</a>] and Mustafa Ghaderzadeh et al. [<a href="#B38-sensors-24-04420" class="html-bibr">38</a>].</p>
Full article ">Figure 12
<p>Flow Diagram of classification process in the AWS Cloud Server. A patient or user can upload their sample test image in the cloud server; the server trained with the deep learning model can perform image preprocessing and testing. Finally, it sends the notification of the results to the user.</p>
Full article ">Figure 13
<p>Leukemia Classification Web Application. A user uploads the sample images for prediction, all the processing is then performed in the cloud server, and the results of the sample images are then sent back to the user.</p>
Full article ">
18 pages, 884 KiB  
Article
Trusted Composition of Internet of Medical Things over Imperfect Networks
by Ehsan Ahmad, Brian Larson and Abdulbasid Banga
Future Internet 2024, 16(7), 230; https://doi.org/10.3390/fi16070230 - 28 Jun 2024
Viewed by 628
Abstract
The Internet of Medical Things (IoMT) represents a specialized domain within the Internet of Things, focusing on medical devices that require regulatory approval to ensure patient safety. Trusted composition of IoMT systems aims to ensure high assurance of the entire composed system, despite [...] Read more.
The Internet of Medical Things (IoMT) represents a specialized domain within the Internet of Things, focusing on medical devices that require regulatory approval to ensure patient safety. Trusted composition of IoMT systems aims to ensure high assurance of the entire composed system, despite potential variability in the assurance levels of individual components. Achieving this trustworthiness in IoMT systems, especially when using less-assured, commercial, off-the-shelf networks like Ethernet and WiFi, presents a significant challenge. To address this challenge, this paper advocates a systematic approach that leverages the Architecture Analysis & Design Language (AADL) along with Behavior Language for Embedded Systems with Software (BLESS) specification and implementation. This approach aims to provide high assurance on critical components through formal verification, while using less-assured components in a manner that maintains overall system determinism and reliability. A clinical case study involving an automated opioid infusion monitoring IoMT system is presented to illustrate the application of the proposed approach. Through this case study, the effectiveness of the systemic approach in achieving trusted composition of heterogeneous medical devices over less-assured networks is demonstrated. Full article
Show Figures

Figure 1

Figure 1
<p>A clinical use case of opioid infusion monitoring.</p>
Full article ">Figure 2
<p>Top-level AADL model.</p>
Full article ">Figure 3
<p>Component containment hierarchy.</p>
Full article ">Figure 4
<p>Respiration Monitor system structure.</p>
Full article ">Figure 5
<p>Respiration Monitor state machine.</p>
Full article ">
46 pages, 2253 KiB  
Article
Smart Healthcare: Exploring the Internet of Medical Things with Ambient Intelligence
by Mekhla Sarkar, Tsong-Hai Lee and Prasan Kumar Sahoo
Electronics 2024, 13(12), 2309; https://doi.org/10.3390/electronics13122309 - 13 Jun 2024
Viewed by 1025
Abstract
Ambient Intelligence (AMI) represents a significant advancement in information technology that is perceptive, adaptable, and finely attuned to human needs. It holds immense promise across diverse domains, with particular relevance to healthcare. The integration of Artificial Intelligence (AI) with the Internet of Medical [...] Read more.
Ambient Intelligence (AMI) represents a significant advancement in information technology that is perceptive, adaptable, and finely attuned to human needs. It holds immense promise across diverse domains, with particular relevance to healthcare. The integration of Artificial Intelligence (AI) with the Internet of Medical Things (IoMT) to create an AMI environment in medical contexts further enriches this concept within healthcare. This survey provides invaluable insights for both researchers and practitioners in the healthcare sector by reviewing the incorporation of AMI techniques in the IoMT. This analysis encompasses essential infrastructure, including smart environments and spectrum for both wearable and non-wearable medical devices to realize the AMI vision in healthcare settings. Furthermore, this survey provides a comprehensive overview of cutting-edge AI methodologies employed in crafting IoMT systems tailored for healthcare applications and sheds light on existing research issues, with the aim of guiding and inspiring further advancements in this dynamic field. Full article
(This article belongs to the Special Issue Internet of Things, Big Data, and Cloud Computing for Healthcare)
Show Figures

Figure 1

Figure 1
<p>General architecture of AMI assisted living.</p>
Full article ">Figure 2
<p>Different body-based IoMT devices.</p>
Full article ">Figure 3
<p>Various ambient IoMT devices.</p>
Full article ">Figure 4
<p>General workflow of AI.</p>
Full article ">Figure 5
<p>A pictorial representation of popular models used for sensor data analysis.</p>
Full article ">Figure 6
<p>A pictorial representation of the applications of AMI in heathcare.</p>
Full article ">Figure 7
<p>Pictorial framework of smart transdermal drug delivery system for diabetic patients.</p>
Full article ">Figure 8
<p>Pictorial framework of automatic identification and localization of colorectal cancer lesions.</p>
Full article ">
18 pages, 1131 KiB  
Article
Enhancing the Internet of Medical Things (IoMT) Security with Meta-Learning: A Performance-Driven Approach for Ensemble Intrusion Detection Systems
by Mousa Alalhareth and Sung-Chul Hong
Sensors 2024, 24(11), 3519; https://doi.org/10.3390/s24113519 - 30 May 2024
Viewed by 663
Abstract
This paper investigates the application of ensemble learning techniques, specifically meta-learning, in intrusion detection systems (IDS) for the Internet of Medical Things (IoMT). It underscores the existing challenges posed by the heterogeneous and dynamic nature of IoMT environments, which necessitate adaptive, robust security [...] Read more.
This paper investigates the application of ensemble learning techniques, specifically meta-learning, in intrusion detection systems (IDS) for the Internet of Medical Things (IoMT). It underscores the existing challenges posed by the heterogeneous and dynamic nature of IoMT environments, which necessitate adaptive, robust security solutions. By harnessing meta-learning alongside various ensemble strategies such as stacking and bagging, the paper aims to refine IDS mechanisms to effectively counter evolving cyber threats. The study proposes a performance-driven weighted meta-learning technique for dynamic assignment of voting weights to classifiers based on accuracy, loss, and confidence levels. This approach significantly enhances the intrusion detection capabilities for the IoMT by dynamically optimizing ensemble IDS models. Extensive experiments demonstrate the proposed model’s superior performance in terms of accuracy, detection rate, F1 score, and false positive rate compared to existing models, particularly when analyzing various sizes of input features. The findings highlight the potential of integrating meta-learning in ensemble-based IDS to enhance the security and integrity of IoMT networks, suggesting avenues for future research to further advance IDS performance in protecting sensitive medical data and IoT infrastructures. Full article
(This article belongs to the Special Issue Advances in IoMT for Healthcare Systems–2nd Edition)
Show Figures

Figure 1

Figure 1
<p>The structure of proposed IDS model.</p>
Full article ">Figure 2
<p>The comparison between the accuracy obtained by the proposed model and the related models.</p>
Full article ">Figure 3
<p>The comparison between the detection rate obtained by the proposed model and the related models.</p>
Full article ">Figure 4
<p>The comparison between the F1 score obtained by the proposed model and the related models.</p>
Full article ">Figure 5
<p>The comparison between the FPR obtained by the proposed model and the related models.</p>
Full article ">
17 pages, 1088 KiB  
Article
Efficient Inference Offloading for Mixture-of-Experts Large Language Models in Internet of Medical Things
by Xiaoming Yuan, Weixuan Kong, Zhenyu Luo and Minrui Xu
Electronics 2024, 13(11), 2077; https://doi.org/10.3390/electronics13112077 - 27 May 2024
Viewed by 753
Abstract
Despite recent significant advancements in large language models (LLMs) for medical services, the deployment difficulties of LLMs in e-healthcare hinder complex medical applications in the Internet of Medical Things (IoMT). People are increasingly concerned about e-healthcare risks and privacy protection. Existing LLMs face [...] Read more.
Despite recent significant advancements in large language models (LLMs) for medical services, the deployment difficulties of LLMs in e-healthcare hinder complex medical applications in the Internet of Medical Things (IoMT). People are increasingly concerned about e-healthcare risks and privacy protection. Existing LLMs face difficulties in providing accurate medical questions and answers (Q&As) and meeting the deployment resource demands in the IoMT. To address these challenges, we propose MedMixtral 8x7B, a new medical LLM based on the mixture-of-experts (MoE) architecture with an offloading strategy, enabling deployment on the IoMT, improving the privacy protection for users. Additionally, we find that the significant factors affecting latency include the method of device interconnection, the location of offloading servers, and the speed of the disk. Full article
(This article belongs to the Special Issue Network Security Management in Heterogeneous Networks)
Show Figures

Figure 1

Figure 1
<p>This is the communication model design. Users ask LLM medical questions from their own devices, then devices send the token via networks. Devices receive intermediate parameters sent via networks and complete computation for partial layers, and finally, all devices finish computation; LLM generates the final medical answers to the user.</p>
Full article ">Figure 2
<p>This is the MedMixtral 8x7B workflow. First, we prepare a dataset of about 100,000 samples from HealthCareMagic. Then, we fine-tune the Mixtral 8x7B model. After that, we design a strategy to offload the weights to both RAM and disk, aiming to alleviate the resource strain on IoMT deployments of LLMs. We obtain medical advice by asking the MedMixtral 8x7B model, and finally, evaluate our model’s performance on iCliniq.</p>
Full article ">Figure 3
<p>An instance of the process of MedMixtral 8x7B generating medical answers. After the input tokens enter the model, it is routed to the experts by the router. Then, the experts generate responses based on the input tokens.</p>
Full article ">Figure 4
<p>This is the trend in changes in VRAM usage with the number of offloading experts. Our strategy requires less VRAM capacity than the strategy method across all number of offloading experts scenarios.</p>
Full article ">
30 pages, 3770 KiB  
Article
An Optimal, Power Efficient, Internet of Medical Things Framework for Monitoring of Physiological Data Using Regression Models
by Amitabh Mishra, Lucas S. Liberman and Nagaraju Brahamanpally
Sensors 2024, 24(11), 3429; https://doi.org/10.3390/s24113429 - 26 May 2024
Cited by 1 | Viewed by 458
Abstract
The sensors used in the Internet of Medical Things (IoMT) network run on batteries and need to be replaced, replenished or should use energy harvesting for continuous power needs. Additionally, there are mechanisms for better utilization of battery power for network longevity. IoMT [...] Read more.
The sensors used in the Internet of Medical Things (IoMT) network run on batteries and need to be replaced, replenished or should use energy harvesting for continuous power needs. Additionally, there are mechanisms for better utilization of battery power for network longevity. IoMT networks pose a unique challenge with respect to sensor power replenishment as the sensors could be embedded inside the subject. A possible solution could be to reduce the amount of sensor data transmission and recreate the signal at the receiving end. This article builds upon previous physiological monitoring studies by applying new decision tree-based regression models to calculate the accuracy of reproducing data from two sets of physiological signals transmitted over cellular networks. These regression analyses are then executed over three different iteration varieties to assess the effect that the number of decision trees has on the efficiency of the regression model in question. The results indicate much lower errors as compared to other approaches indicating significant saving on the battery power and improvement in network longevity. Full article
Show Figures

Figure 1

Figure 1
<p>An Internet of Medical Things (IoMT) network.</p>
Full article ">Figure 2
<p>IoMT data collection, processing and transmission through data/cell phone networks.</p>
Full article ">Figure 3
<p>Graphical representation of random forest. Adapted from “What is random forest?”, by IBM, 2024, IBM. <a href="https://www.ibm.com/topics/random-forest" target="_blank">https://www.ibm.com/topics/random-forest</a> (accessed on 22 May 2024).</p>
Full article ">Figure 4
<p>Graphical representation of Gradient boosted trees for regression. Adapted from “Gradient Boosting in ML”, by GeeksforGeeks, 2024, GeeksforGeeks. <a href="https://www.geeksforgeeks.org/ml-gradient-boosting/" target="_blank">https://www.geeksforgeeks.org/ml-gradient-boosting/</a> (accessed on 22 May 2024).</p>
Full article ">Figure 5
<p>Signal recreation through prediction for ART signal for different sample frequencies.</p>
Full article ">Figure 6
<p>ECG Lead-II: Full dataset.</p>
Full article ">Figure 7
<p>ART Data: Full dataset.</p>
Full article ">Figure 8
<p>Error in prediction for ART Data with reduced samples: full dataset.</p>
Full article ">Figure 9
<p>ART Data: dataset with outliers removed.</p>
Full article ">Figure 10
<p>ART Data: full dataset (<span class="html-italic">n</span> = 10).</p>
Full article ">Figure 11
<p>Random Forest Regression on ECG Lead-II Data: full dataset (<span class="html-italic">n</span> = 10).</p>
Full article ">Figure 12
<p>Random Forest Regression on ECG Lead-II Data: half data removed (<span class="html-italic">n</span> = 10).</p>
Full article ">Figure 13
<p>Random Forest Regression on ECG Lead-II Data: two-third data removed (<span class="html-italic">n</span> = 10).</p>
Full article ">Figure 14
<p>Random Forest Regression on ECG Lead-II Data: three-fourth data removed (<span class="html-italic">n</span> = 10).</p>
Full article ">Figure 15
<p>Gradient Boosting Regression on ECG Lead-II Data: full set (<span class="html-italic">n</span> = 10).</p>
Full article ">Figure 16
<p>Gradient Boosting Regression on ECG Lead-II Data: three-fourth data removed (<span class="html-italic">n</span> = 10).</p>
Full article ">Figure 17
<p>Gradient Boosting Regression on ECG Lead-II Data: full set (<span class="html-italic">n</span> = 1000).</p>
Full article ">Figure 18
<p>Gradient Boosting Regression on ECG Lead-II Data: three-fourth data removed (<span class="html-italic">n</span> = 1000).</p>
Full article ">Figure 19
<p><math display="inline"><semantics> <msup> <mi>R</mi> <mn>2</mn> </msup> </semantics></math> scores v/s Dataset size for ECG-Lead II signal.</p>
Full article ">Figure 20
<p>Mean square error v/s dataset size for ECG Lead—II.</p>
Full article ">Figure 21
<p>Gradient Boosting Regression on ART Data: full set (<span class="html-italic">n</span> = 10).</p>
Full article ">Figure 22
<p>Gradient Boosting Regression on ART Data: half data removed (<span class="html-italic">n</span> = 10).</p>
Full article ">Figure 23
<p>Gradient Boosting Regression on ART Data: half data removed (<span class="html-italic">n</span> = 100).</p>
Full article ">Figure 24
<p>Gradient Boosting Regression on ART Data: half data removed (<span class="html-italic">n</span> = 1000).</p>
Full article ">Figure 25
<p><math display="inline"><semantics> <msup> <mi>R</mi> <mn>2</mn> </msup> </semantics></math> scores v/s Dataset size for ART signal.</p>
Full article ">Figure 26
<p>Mean square error v/s dataset size for the ART signal.</p>
Full article ">
20 pages, 2594 KiB  
Article
Security Analysis for Smart Healthcare Systems
by Mariam Ibrahim, Abdallah Al-Wadi and Ruba Elhafiz
Sensors 2024, 24(11), 3375; https://doi.org/10.3390/s24113375 - 24 May 2024
Viewed by 655
Abstract
The healthcare industry went through reformation by integrating the Internet of Medical Things (IoMT) to enable data harnessing by transmission mediums from different devices, about patients to healthcare staff devices, for further analysis through cloud-based servers for proper diagnosis of patients, yielding efficient [...] Read more.
The healthcare industry went through reformation by integrating the Internet of Medical Things (IoMT) to enable data harnessing by transmission mediums from different devices, about patients to healthcare staff devices, for further analysis through cloud-based servers for proper diagnosis of patients, yielding efficient and accurate results. However, IoMT technology is accompanied by a set of drawbacks in terms of security risks and vulnerabilities, such as violating and exposing patients’ sensitive and confidential data. Further, the network traffic data is prone to interception attacks caused by a wireless type of communication and alteration of data, which could cause unwanted outcomes. The advocated scheme provides insight into a robust Intrusion Detection System (IDS) for IoMT networks. It leverages a honeypot to divert attackers away from critical systems, reducing the attack surface. Additionally, the IDS employs an ensemble method combining Logistic Regression and K-Nearest Neighbor algorithms. This approach harnesses the strengths of both algorithms to improve attack detection accuracy and robustness. This work analyzes the impact, performance, accuracy, and precision outcomes of the used model on two IoMT-related datasets which contain multiple attack types such as Man-In-The-Middle (MITM), Data Injection, and Distributed Denial of Services (DDOS). The yielded results showed that the proposed ensemble method was effective in detecting intrusion attempts and classifying them as attacks or normal network traffic, with a high accuracy of 92.5% for the first dataset and 99.54% for the second dataset and a precision of 96.74% for the first dataset and 99.228% for the second dataset. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>IoMT System Architecture.</p>
Full article ">Figure 2
<p>Cyberattack effects on individuals.</p>
Full article ">Figure 3
<p>Cyberattack occurrences.</p>
Full article ">Figure 4
<p>IDS-integrated IoMT Network Architecture.</p>
Full article ">Figure 5
<p>Proposed Framework Architecture.</p>
Full article ">Figure 6
<p>(<b>a</b>) Dataset 1 Confusion Matrix and (<b>b</b>) Dataset 2 Confusion Matrix.</p>
Full article ">Figure 7
<p>(<b>a</b>) Dataset-1 AUC-ROC graph, (<b>b</b>) Dataset-1 AUC-PR graph, (<b>c</b>) Dataset-2 AUC-ROC graph, and (<b>d</b>) Dataset-2 AUC-PR graph.</p>
Full article ">
20 pages, 4529 KiB  
Article
Risk Evaluation and Attack Detection in Heterogeneous IoMT Devices Using Hybrid Fuzzy Logic Analytical Approach
by Pritika, Bharanidharan Shanmugam and Sami Azam
Sensors 2024, 24(10), 3223; https://doi.org/10.3390/s24103223 - 19 May 2024
Viewed by 584
Abstract
The rapidly expanding Internet of Medical Things (IoMT) landscape fosters enormous opportunities for personalized healthcare, yet it also exposes patients and healthcare systems to diverse security threats. Heterogeneous IoMT devices present challenges that need comprehensive risk assessment due to their varying functionality, protocols, [...] Read more.
The rapidly expanding Internet of Medical Things (IoMT) landscape fosters enormous opportunities for personalized healthcare, yet it also exposes patients and healthcare systems to diverse security threats. Heterogeneous IoMT devices present challenges that need comprehensive risk assessment due to their varying functionality, protocols, and vulnerabilities. Hence, to achieve the goal of having risk-free IoMT devices, the authors used a hybrid approach using fuzzy logic and the Fuzzy Analytical Hierarchy Process (FAHP) to evaluate risks, providing effective and useful results for developers and researchers. The presented approach specifies qualitative descriptors such as the frequency of occurrence, consequence severity, weight factor, and risk level. A case study with risk events in three different IoMT devices was carried out to illustrate the proposed method. We performed a Bluetooth Low Energy (BLE) attack on an oximeter, smartwatch, and smart peak flow meter to discover their vulnerabilities. Using the FAHP method, we calculated fuzzy weights and risk levels, which helped us to prioritize criteria and alternatives in decision-making. Smartwatches were found to have a risk level of 8.57 for injection attacks, which is of extreme importance and needs immediate attention. Conversely, jamming attacks registered the lowest risk level of 1, with 9 being the maximum risk level and 1 the minimum. Based on this risk assessment, appropriate security measures can be implemented to address the severity of potential threats. The findings will assist healthcare industry decision-makers in evaluating the relative importance of risk factors, aiding informed decisions through weight comparison. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Flowchart of hybrid risk assessment.</p>
Full article ">Figure 2
<p>Triangular fuzzy number [<a href="#B26-sensors-24-03223" class="html-bibr">26</a>].</p>
Full article ">Figure 3
<p>MF of frequency of occurrence.</p>
Full article ">Figure 4
<p>MF of severity of consequences.</p>
Full article ">Figure 5
<p>MF of risk level.</p>
Full article ">Figure 6
<p>Devices used for testing [<a href="#B33-sensors-24-03223" class="html-bibr">33</a>,<a href="#B34-sensors-24-03223" class="html-bibr">34</a>,<a href="#B35-sensors-24-03223" class="html-bibr">35</a>].</p>
Full article ">Figure 7
<p>Sniffing attack on oximeter.</p>
Full article ">Figure 8
<p>Sniffing attack on smartwatch.</p>
Full article ">Figure 9
<p>Jamming attack on oximeter.</p>
Full article ">
21 pages, 1356 KiB  
Article
Technoeconomic Analysis for Deployment of Gait-Oriented Wearable Medical Internet-of-Things Platform in Catalonia
by Marc Codina, David Castells-Rufas, Maria-Jesus Torrelles and Jordi Carrabina
Information 2024, 15(5), 288; https://doi.org/10.3390/info15050288 - 18 May 2024
Viewed by 614
Abstract
The Internet of Medical Things (IoMT) extends the concept of eHealth and mHealth for patients with continuous monitoring requirements. This research concentrates on the use of wearable devices based on the use of inertial measurement units (IMUs) that account for a gait analysis [...] Read more.
The Internet of Medical Things (IoMT) extends the concept of eHealth and mHealth for patients with continuous monitoring requirements. This research concentrates on the use of wearable devices based on the use of inertial measurement units (IMUs) that account for a gait analysis for its use in three health cases, equilibrium evaluation, fall prevention and surgery recovery, that impact a large elderly population. We also analyze two different scenarios for data capture: supervised by clinicians and unsupervised during activities of daily life (ADLs). The continuous monitoring of patients produces large amounts of data that are analyzed in specific IoMT platforms that must be connected to the health system platforms containing the health records of the patients. The aim of this study is to evaluate the factors that impact the cost of the deployment of such an IoMT solution. We use population data from Catalonia together with an IoMT deployment model for costs from the current deployment of connected devices for monitoring diabetic patients. Our study reveals the critical dependencies of the proposed IoMT platforms: from the devices and cloud cost, the size of the population using these services and the savings from the current model under key parameters such as fall reduction or rehabilitation duration. Future research should investigate the benefit of continuous monitoring in improving the quality of life of patients. Full article
(This article belongs to the Special Issue Technoeconomics of the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Platform integration model for complex ecosystems allowing new partners to add clinically relevant data to global public heath platform [<a href="#B26-information-15-00288" class="html-bibr">26</a>].</p>
Full article ">Figure 2
<p>The structure and flowchart of the methodology for the population subsets for the 3 cases studied with the IoMT devices selected.</p>
Full article ">Figure 3
<p>A cost comparison between the evolution of the traditional model using a posturograph (gray line) and the IoMT solution (yellow line) for equilibrium assessment along the years for the 65+ population.</p>
Full article ">Figure 4
<p>The cost of the fall to the health system using the proposed IoMT solution (blue) according to the reduction in the number of falls compared with the current cost (dotted orange) without reduction.</p>
Full article ">Figure 5
<p>Reduction in the break event (% of fall reduction) depending on the IoMT device cost.</p>
Full article ">Figure 6
<p>The cost per year of the IoMT solution for the test-oriented supervised model (yellow) and ADL-oriented unsupervised model (blue) according to the reduction in the duration of the rehabilitation compared with the cost estimation with the current clinical method (gray) for the yearly cases in Catalonia.</p>
Full article ">
Back to TopTop