A Comprehensive Review of Deep Learning Techniques for Intrusion Detection in the Internet of Medical Things

Authors

  • Aisha Essa Muhammad University of Baghdad
  • Amer Abdulmajeed Abdulrahman University of Baghdad

DOI:

https://doi.org/10.37385/jaets.v7i1.6637

Keywords:

Internet of Medical Things (IoMT), Intrusion Detection Systems (IDS), Deep Learning (DL)

Abstract

The work revisits the security issues of Internet of Medical Things (IoMT) platforms and provides a list of deep learning models used for intrusion detection. The study fills the salient gap in early detection of actual IoMT system intrusions for enhanced medical device and data security. A wide-ranging and systematic investigation of deep learning models, such as CNNs, LSTMs, and hybrid ones (GNNs and BiLSTMs) recently introduced was carried out. These were then analyzed against well-known benchmark datasets, such as ToN-IoT and IoT-Healthcare Security and WUSTL-EHMS-2020, to consider the quality of their detection work on cybersecurity threats for IoMT systems. The results indicated high accuracy in cyber threat detection, reaching even 100% accuracy. But the challenges are still how to decrease false positives and improve the real-time performance of the model on robustness and generalization when making real-world applications. The research is literature-based and aimed to provide some further updates on a secure IoMT framework by identifying recent studies in the security of the IoMT ecosystem and shedding light on future work using hybrid methods, blockchain technology, or federated learning approaches that can contribute to the detection of IDSs. And all can help pave the way for a more secure, privacy-protecting IoMT that safeguards extremely sensitive medical data. The research also enhances the model: utilizing 15+ deep-learning models to propose an IoMT-resistant architecture. This can promote participation in the theoretical research and practical security protocols in the IoMT context, thus drawing attention and comprehension from researchers and practitioners to enhance security protocols.

Downloads

Download data is not yet available.

References

Abdualrahman, A. A., & Ibrahem, M. K. (2021). Intrusion detection system using data stream classification. Iraqi Journal of Science, 319–328.

Akar, G., Sahmoud, S., Onat, M., Cavusoglu, Ü., & Malondo, E. (2025). L2D2: A Novel LSTM Model for Multi-Class Intrusion Detection Systems in the Era of IoMT. IEEE Access, 13, 7002–7013. https://doi.org/10.1109/ACCESS.2025.3526883

Alalhareth, M., & Hong, S.-C. (2023). An Adaptive Intrusion Detection System in the Internet of Medical Things Using Fuzzy-Based Learning. Sensors, 23(22), 9247. https://doi.org/10.3390/s23229247

Alalhareth, M., & Hong, S.-C. (2024). Enhancing the Internet of Medical Things (IoMT) Security with Meta-Learning: A Performance-Driven Approach for Ensemble Intrusion Detection Systems. Sensors, 24(11), 3519. https://doi.org/10.3390/s24113519

Alanazi, H. K., Abd El-Aziz, A. A., & Hamdi, H. (2023). Securing IoT Devices in e-Health using Machine Learning Techniques. International Journal of Advanced Computer Science and Applications, 14(9). https://doi.org/10.14569/IJACSA.2023.0140967

Alhijaj, T. B., Hameed, S. M., & Bara’a, A. A. (2021). A decision tree-aware genetic algorithm for botnet detection. Iraqi Journal of Science, 2454–2462.

Alzubi, J. A., Alzubi, O. A., Qiqieh, I., & Singh, A. (2024). A blended deep learning intrusion detection framework for consumable edge-centric IoMT industry. IEEE Transactions on Consumer Electronics, 70(1), 2049-2057. https://doi.org/10.1109/TCE.2024.3350231

Awotunde, J. B., Abiodun, K. M., Adeniyi, E. A., Folorunso, S. O., & Jimoh, R. G. (2021). A deep learning-based intrusion detection technique for a secured IoMT system. In International Conference on Informatics and Intelligent Applications (pp. 50-62). Cham: Springer International Publishing.

Barnawi, A., Chhikara, P., Tekchandani, R., Kumar, N., & Alzahrani, B. (2024). A Differentially Privacy Assisted Federated Learning Scheme to Preserve Data Privacy for IoMT Applications. IEEE Transactions on Network and Service Management, 21(4), 4686–4700. https://doi.org/10.1109/TNSM.2024.3393969

Berguiga, A., Harchay, A., & Massaoudi, A. (2025). HIDS-IoMT: A deep learning-based intelligent intrusion detection system for the Internet of Medical Things. IEEE Access, 13, 32863–32882. https://doi.org/10.1109/ACCESS.2025.3543127

Dadkhah, S., Neto, E. C. P., Ferreira, R., Molokwu, R. C., Sadeghi, S., & Ghorbani, A. A. (2024). CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT. Internet of Things, 28, 101351. https://doi.org/10.1016/j.iot.2024.101351

Daher, L. A. (2023). Towards Secure IoMT: Attack Detection Using Deep Q-Learning in Healthcare Networks. 2023 16th International Conference on Developments in E-Systems Engineering (DeSE), 407–412. https://doi.org/10.1109/DeSE58530.2023.00076

Fadhil, H. M., Dawood, Z. O., & Al Mhdawi, A. (2024). Enhancing Intrusion Detection Systems Using Metaheuristic Algorithms. Diyala Journal of Engineering Sciences, 15–31.

Fouda, M., Ksantini, R., & Elmedany, W. (2022). A novel intrusion detection system for internet of healthcare things based on deep subclasses dispersion information. IEEE Internet of Things Journal, 10(10), 8395–8407.

Gatea, M. J., & Hameed, S. M. (2022). An Internet of Things Botnet Detection Model Using Regression Analysis and Linear Discrimination Analysis. Iraqi Journal of Science, 4534–4546.

Judith, A., Kathrine, G. J. W., Silas, S., & J, A. (2023). Efficient Deep Learning-Based Cyber-Attack Detection for Internet of Medical Things Devices. Engineering Proceedings, 59(1). https://doi.org/10.3390/engproc2023059139

Kamil, W. F., & Mohammed, I. J. (2023). Adapted CNN-SMOTE-BGMM deep learning framework for network intrusion detection using unbalanced dataset. Iraqi Journal of Science, 4846–4864.

Kamil, W. F., & Mohammed, I. J. (2023). Deep learning model for intrusion detection system utilizing convolution neural network. Open Engineering, 13(1), 20220403. https://doi.org/10.1515/eng-2022-0403

Manimurugan, S., Al-Mutairi, S., Aborokbah, M. M., Chilamkurti, N., Ganesan, S., & Patan, R. (2020). Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access, 8, 77396–77404. https://doi.org/10.1109/ACCESS.2020.2988955

Memon, S. A., Wiil, U. K., & Shaikh, M. (2023). Explainable Intrusion Detection for Internet of Medical Things. IC3K - Proceedings, 3, 40–51. https://doi.org/10.5220/0012210300003598

Mpembele, A. B. (2024). Differential Privacy-Enabled Federated Learning for 5G-Edge-Cloud Framework in Smart Healthcare. Tennessee State University.

Nakip, M., & Gelenbe, E. (2024). Online self-supervised deep learning for intrusion detection systems. IEEE Transactions on Information Forensics and Security, 19, 5668–5683. https://doi.org/10.1109/TIFS.2024.3402148

Oh, M.-J., Danuor, P., & Jung, Y.-B. (2023). A study on the optimal magnetic beam forming of coil arrays for long distance wireless power transmission. Sensors, 23(11), 5312. https://doi.org/10.3390/s23115312

Okpu, E. O., Taylor, O. E., Nwiabu, N. D., & Matthias, D. (2024). A Hybrid Machine Learning Approach for Intrusion Detection and Mitigation on IoT Smart Healthcare. International Journal, 13(7). https://doi.org/10.30534/ijacst/2024/021372024

Park, J., Park, S., Kang, B. B., & Kim, K. (2019). eMotion: An SGX extension for migrating enclaves. Computers & Security, 80, 173–185. https://doi.org/10.1016/j.cose.2018.10.019

Ramya, R., Hussein, A. H. A., Adnan, M. M., Shilpa, N., & Priya, S. (2023). Intrusion Detection in Healthcare using Sand-Cat Optimization based Long-Short Term Memory. 2023 International Conference on Integrated Intelligence and Communication Systems (ICIICS), 1–5.

Ravi, V., Pham, T. D., & Alazab, M. (2023). Deep learning-based network intrusion detection system for Internet of medical things. IEEE Internet of Things Magazine, 6(2), 50–54. https://doi.org/10.1109/IOTM.0001.2300049

Razzaq, R. H., Al-Zubaidie, M., & Atiyah, R. G. (2024). Intermediary Decentralized Computing and Private Blockchain Mechanisms for Privacy Preservation in the Internet of Medical Things. Mesopotamian Journal of CyberSecurity, 4(3), 152–165.

Rbah, Y., Mahfoudi, M., Balboul, Y., Chetioui, K., Fattah, M., Mazer, S., Elbekkali, M., & Bernoussi, B. (2023). A Fog-Based Attack Detection Model Using Deep Learning for the Internet of Medical Things. AISE Proceedings, 506–511.

Rbah, Y., Mahfoudi, M., Fattah, M., Balboul, Y., Chetioui, K., Mazer, S., Elbekkali, M., & Bernoussi, B. (2024). Hybrid software defined network-based deep learning framework for enhancing internet of medical things cybersecurity. International Journal of Artificial Intelligence, 13(3), 3599–3610.

Rbah, Y., Mahfoudi, M., Fattah, M., Balboul, Y., Mazer, S., Elbekkali, M., & Bernoussi, B. (2024). Deep Learning for Enhanced IoMT Security: A GNN-BiLSTM Intrusion Detection System. 2024 International Conference on Circuit, Systems and Communication (ICCSC), 1–6.

Revathi, T., Anbazhagan, K., & Kavitha, R. (2024). Utilizing Deep Learning to Enhanced Security in the Internet of Medical Things via Intrusion Detection Systems. 2024 International Conference on Emerging Technologies in Computer Science for Interdisciplinary Applications (ICETCS), 1–6.

Saran, N., & Kesswani, N. (2025). Intrusion detection system for the Internet of Medical Things using GRU with attention mechanism–based hybrid deep learning. Jordanian Journal of Computers and Information Technology, 11(2). https://doi.org/10.5455/jjcit.71-1725609265

Shambharkar, P. G., & Sharma, N. (2023). Artificial Intelligence Driven Intrusion Detection Framework for the Internet of Medical Things. Research Square. https://doi.org/10.21203/rs.3.rs-2634004/v1

Si-Ahmed, A., Al-Garadi, M. A., & Boustia, N. (2023). Survey of Machine Learning based intrusion detection methods for Internet of Medical Things. Applied Soft Computing, 140, 110227. https://doi.org/10.1016/j.asoc.2023.110227

Sulaiman, S. S., Nadher, I., & Hameed, S. M. (2024). Credit Card Fraud Detection Using Improved Deep Learning Models. Computers, Materials & Continua, 78(1), 1049-1069. https://doi.org/10.32604/cmc.2023.046051

Tsimenidis, S., Lagkas, T., & Rantos, K. (2022). Deep learning in IoT intrusion detection. Journal of Network and Systems Management, 30(1), 8. https://doi.org/10.1007/s10922-021-09685-y

Vaisakhkrishnan, K., Ashok, G., Mishra, P., & Kumar, T. G. (2024). Guarding Digital Health: Deep Learning for Attack Detection in Medical IoT. Procedia Computer Science, 235, 2498–2507. https://doi.org/10.1016/j.procs.2024.01.286

Vijayakumar, K. P., Pradeep, K., Balasundaram, A., & Prusty, M. R. (2023). Enhanced cyber attack detection process for internet of health things (IoHT) devices using deep neural network. Processes, 11(4), 1072. https://doi.org/10.3390/pr11041072

Wang, J., Jin, H., Chen, J., Tan, J., & Zhong, K. (2022). Anomaly detection in Internet of medical Things with Blockchain from the perspective of deep neural network. Information Sciences, 617, 133–149. https://doi.org/10.1016/j.ins.2022.12.056

Yaqoob, T., Abbas, H., & Atiquzzaman, M. (2019). Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review. IEEE Communications Surveys & Tutorials, 21(4), 3723–3768. https://doi.org/10.1109/COMST.2019.2914094

Downloads

Published

2025-12-29

How to Cite

Muhammad, A. E., & Abdulrahman, A. A. (2025). A Comprehensive Review of Deep Learning Techniques for Intrusion Detection in the Internet of Medical Things. Journal of Applied Engineering and Technological Science (JAETS), 7(1), 745–761. https://doi.org/10.37385/jaets.v7i1.6637