You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

31 July 2025

Intrusion Detection and Real-Time Adaptive Security in Medical IoT Using a Cyber-Physical System Design

Department of Computer Engineering and Networks, College of Computer and Information Sciences, Jouf University, Sakaka 72388, Saudi Arabia
This article belongs to the Special Issue Advanced Sensing and Intelligent Technologies for Cybersecurity in the Internet of Things Systems

Abstract

The increasing reliance on Medical Internet of Things (MIoT) devices introduces critical cybersecurity vulnerabilities, necessitating advanced, adaptive defense mechanisms. Recent cyber incidents—such as compromised critical care systems, modified therapeutic device outputs, and fraudulent clinical data inputs—demonstrate that these threats now directly impact life-critical aspects of patient security. In this paper, we introduce a machine learning-enabled Cognitive Cyber-Physical System (ML-CCPS), which is designed to identify and respond to cyber threats in MIoT environments through a layered cognitive architecture. The system is constructed on a feedback-looped architecture integrating hybrid feature modeling, physical behavioral analysis, and Extreme Learning Machine (ELM)-based classification to provide adaptive access control, continuous monitoring, and reliable intrusion detection. ML-CCPS is capable of outperforming benchmark classifiers with an acceptable computational cost, as evidenced by its macro F1-score of 97.8% and an AUC of 99.1% when evaluated with the ToN-IoT dataset. Alongside classification accuracy, the framework has demonstrated reliable behaviour under noisy telemetry, maintained strong efficiency in resource-constrained settings, and scaled effectively with larger numbers of connected devices. Comparative evaluations, radar-style synthesis, and ablation studies further validate its effectiveness in real-time MIoT environments and its ability to detect novel attack types with high reliability.

1. Introduction

The Medical Internet of Things (MIoT) is a paradigm that connects clinical devices, wearable sensors, smart medical systems, and cloud services, resulting from the convergence of healthcare systems and the Internet of Things (IoT). MIoT promotes smart healthcare functionalities such as remote patient monitoring, personalized treatment, real-time diagnosis, predictive analysis, and automated medical interventions [1]. MIoT systems enable real-time patient monitoring and smart intervention. These systems expose healthcare networks to cybersecurity threats such as data exfiltration from medical devices [2], insider misuse of sensitive telemetry [3], unauthorized device injection [4], and behavioral drift across IoT endpoints [5,6]. These risks are amplified by constrained device capabilities and limited context awareness. Moreover, the cyber-physical convergence may cause cascading effects, where sensor compromise impacts clinical outcomes [7,8]—underscoring the need for adaptive, context-aware detection mechanisms. Traditional rule-based approaches often fail to accommodate these dynamic threats due to their rigidity and lack of contextual awareness. These risks can directly compromise patient safety and clinical continuity and can lead to the exposure of sensitive health information [2]. The dynamic and high-risk MIoT environment demands security solutions that go beyond conventional security mechanisms, including firewalls, rule-based Intrusion Detection Systems (IDSs), and encryption techniques. The application of standard protection techniques is challenging due to real-time operating restrictions, varied communication protocols, limited edge devices, and distributed control. Moreover, static intrusion detection systems often fail to detect zero-day exploits or adapt effectively to the evolving nature of emerging cyber threats [5]. These systems can have serious shortcomings despite their promise: lack of generalisability across devices, restricted interpretability, reliance on huge volumes of labelled data, and inability to change post-deployment [9].
Moreover, most ML-based systems exhibit limited interpretability and lack mechanisms for contextual reasoning, especially in critical domains like healthcare. These systems often fail to explain their decision-making processes, creating barriers to trust, validation, and compliance with clinical safety standards [10]. Recent advances have attempted to address this challenge through the use of explainable AI and interpretable learning techniques [11,12], but many approaches remain architecture-specific or insufficiently evaluated in real-world medical CPS settings. By comparison, ML-CCPS introduces a feedback-enabled cognitive loop that continuously adjusts model weights based on residual behavior trends, enabling real-time context-aware adaptation. This mechanism combines trust-based access adaptation with feedback-driven learning cycles, allowing the system to respond to evolving anomalies and behavioral drift in IoT environments.
Given these difficulties, we propose a new security framework: the Machine Learning-enabled Cognitive Cyber-Physical System (ML-CCPS). Leveraging layered cognitive processing, hybrid feature modelling, and dynamic access control, this architecture is well-suited for MIoT settings. ML-CCPS replicates the cognitive processes of perception, learning, cognition, and adaptability. Apart from real-time threat detection, it also adjusts its detection thresholds, retrain its classifiers, and changes access rules by means of ongoing feedback systems. This capacity enables the system to continuously adapt to newly emerging attacks and changing operating environments with fully automated responses.
The ML-CCPS consists of four tightly integrated stages that operate in a sequential manner. Perception is the initial level and entails gathering medical device contextual metadata, control actions, and time-series signals. Learning, the second stage, combines statistical descriptors, residual modelling of physical behaviours, and deep-learned features produced by autoencoders via hybrid feature engineering.
Unlike traditional systems, ML-CCPS integrates cognitive intelligence directly into medical devices, thereby facilitating adaptive and context-aware cybersecurity mechanisms. System access policies are formulated based on a real-time risk assessment engine that considers user interaction, device status, and risk levels. Combining anomaly detection with contextual threat analysis ensures that access control is both robust and responsive. The proposed system is evaluated using the ToN-IoT dataset [13], a comprehensive, multivariate dataset developed for testing intrusion detection systems in IoT settings. In terms of accuracy, precision, F1-score, and resilience, experimental data reveal that ML-CCPS significantly outperforms conventional models. Thus, the system is a great solution for deployment in resource-constrained MIoT environments. This study is driven by the following overarching research question: How can an ML-empowered cognitive cyber-physical system (ML-CCPS) achieve adaptive, real-time threat detection and mitigation in heterogeneous Medical IoT environments while surpassing conventional models across dynamic attack scenarios?
The remainder of this paper is organised as follows: Section 2 presents a comprehensive literature review. Section 3 details the architecture and methodology of the ML-CCPS framework. Section 4 describes the experimental setup, evaluation metrics, and presents the results with a detailed analysis. Finally, Section 5 concludes the paper and outlines directions for future work.

3. Methodology

The architectural design and operational workflow of the proposed Machine Learning-enabled Cognitive Cyber-Physical System (ML-CCPS) are organized into four interdependent cognitive stages: perception, feature engineering, classification, and adaptation. Each stage contributes specific functional layers that collectively enable real-time, behavior-aware threat detection and dynamic access control in Medical Internet of Things (MIoT) environments. This methodology builds upon prior literature but addresses significant gaps through modular architecture, real-time adaptability, and risk-driven policy feedback. The system integrates multiple data representations, lightweight model deployment, and contextual reasoning, forming a complete loop from perception to enforcement.

3.1. System Overview

The proposed ML-CCPS framework is designed to deliver intelligent, adaptive, and lightweight threat detection in Medical Internet of Things (MIoT) environments. It operates as a layered cognitive cyber-physical system composed of interconnected modules for perception, learning, inference, and decision feedback. The primary objective is to achieve context-aware detection of cyber threats while supporting continuous system adaptation based on dynamic risk levels and behavioral shifts.
Figure 1 illustrates the overall architecture of ML-CCPS, which is organized into three primary cognitive layers: (1) the Perception Layer, responsible for acquiring telemetry, contextual metadata, and system logs from distributed MIoT components; (2) the Learning and Inference Layer, which performs hybrid feature transformation, behavioral modeling, and extreme learning–based classification; and (3) the Decision and Control Layer, where detection outcomes are evaluated under risk-aware policies to enforce adaptive access control and system responses.
Figure 1. Architecture of the ML-CCPS for MIoT.
The design emphasizes modularity and distributed intelligence, enabling deployment across edge and fog nodes. Feedback loops at multiple layers support self-correction and resilience against concept drift, nonstationary attack patterns, and environmental noise. The cognitive framework is designed to function autonomously with minimal human intervention, adapting in real time to evolving operational contexts.

3.2. Perception Layer

The perception layer forms the sensory and observational interface of the ML-CCPS. It captures diverse input streams from MIoT devices deployed in clinical settings, including environmental sensors, patient monitoring tools, medical controllers, and gateway systems. These data sources contribute three main categories of inputs: (1) multivariate time-series telemetry; (2) contextual metadata (e.g., device roles, operational schedules, and location tags); and (3) system logs capturing audit trails, login attempts, and configuration events.
As shown in Figure 2, the perception module conducts initial preprocessing steps such as noise filtering, missing value imputation, and standardization of heterogeneous data formats. A temporal windowing mechanism is applied to segment time-series data into fixed-length intervals, each aligned with behavioral analysis granularity. This facilitates the detection of both short-lived anomalies and low-frequency stealthy activities.
Figure 2. Perception module capturing time-series data, contextual metadata, and system logs from heterogeneous MIoT components.
Contextual tags are encoded using one-hot and ordinal mapping schemes depending on their semantic structure. System logs are transformed into structured event codes using rule-based parsing and are timestamp-aligned with telemetry data. The resulting multi-dimensional signal vectors serve as inputs to the hybrid feature engineering module, preserving temporal integrity and contextual consistency.
The perception layer is optimized for real-time operation at the edge, employing lightweight buffer management and adaptive sampling to accommodate bandwidth constraints. This ensures scalability across large-scale deployments and minimizes latency in downstream analytics. Furthermore, the module supports auditability and traceability by preserving raw observation windows and encoding provenance metadata.

3.3. Hybrid Feature Engineering

Hybrid feature engineering refers to the combination of various feature representations and embedded complex patterns. Figure 3a illustrates the analytical structure of the proposed hybrid feature engineering pipeline within the ML-CCPS framework, which extends beyond basic preprocessing to capture a layered and adaptive threat analysis process. Unlike conventional IDS systems that rely solely on static feature extraction or single-stage classifiers, the design integrates three complementary branches—statistical descriptors, physical-model residuals, and deep-learned latent features—into a unified representation. This architectural structure is used to identify a wide range of behavioral variations, from basic to sophisticated changes, such as model residuals with high entropy or drift. Feedback loops and adaptive controls are allowing improved detection policies of the system in real time based on anomaly analysis and the threat baselines. This design with layer architecture demonstrates how real-time feedback can be used to recalibrate rule thresholds and improve ML model sensitivity, particularly when embedded within a cyber-physical environment. Similarly, the adaptive anomaly detection model in [41] outlines a multi-stage pipeline where features are extracted, analyzed, and then looped back to an adaptive control unit for threshold updates—an approach directly reflected in the ML-CCPS pipeline, especially within its Behavioral Risk Modeling and Adaptive Access Control layers. Furthermore, studies such as “Explainable AI for Cybersecurity Modeling” [10] support the inclusion of feedback mechanisms and dynamic retraining loops.
Figure 3. Hybrid feature engineering for ML-CCPS. (a) Analytical model detailing integration of statistical, physical-model, and latent features. (b) Visual schematic illustrating modular composition of the hybrid feature construction.
To capture diverse manifestations of cyber threats in MIoT environments, the ML-CCPS employs a hybrid feature engineering strategy that fuses statistical descriptors, physical-model residuals, and deep-learned latent embeddings. This composite approach enhances the model’s sensitivity to anomalous patterns across varying time scales, device types, and operational contexts.
Figure 3b depicts the structure of the feature engineering module and Table 2 summarizes the symbols used throughout this section. Input data streams X i ( t ) , gathered from the perception layer, are transformed through three complementary branches:
Table 2. Symbol Table.
  • Statistical Feature Extraction: This module computes time-domain descriptors such as mean ( μ ), standard deviation ( σ ), skewness ( γ ), kurtosis ( κ ), and higher-order moments across telemetry windows. These features represent general operating patterns and are defined as follows:
    μ = 1 n i = 1 n x i , σ 2 = 1 n i = 1 n ( x i μ ) 2
    where x i denotes each sampled value in the observation window.
  • Physical-Model Residuals: Behavioral prediction is applied to critical system signals (e.g., control outputs, voltage/current traces) using an autoregressive model or signal predictor y ^ ( t ) . The residual signal is computed as:
    r ( t ) = y ( t ) y ^ ( t )
    where y ( t ) is the observed output. The entropy of the residual distribution is calculated to quantify uncertainty:
    H ( r ) = j P ( r j ) log P ( r j )
    where P ( r j ) is the estimated probability of residual value r j . High entropy values may indicate drift or anomaly.
  • Latent Feature Encoding: A shallow autoencoder is trained on normal operational profiles to extract compact latent representations z = f enc ( X i ) , which preserve dominant spatiotemporal signatures while reducing dimensionality. Reconstruction error is also monitored to detect deviations from learned profiles:
    L AE = X i f dec ( z ) 2
    where f dec denotes the decoder function.
The three feature branches are concatenated into a unified representation F i = [ μ , σ , r ( t ) , H ( r ) , z ] and passed to the classifier. This multi-perspective modeling ensures the system captures not only statistical deviation and system noise but also latent behavioral shifts and unseen threats.
This feature engineering module is designed to be scalable, modular, and lightweight enough for deployment in resource-constrained MIoT settings. It supports real-time inferencing by minimizing preprocessing latency while maximizing expressive power.

3.4. Behavioral Risk Modeling and Feedback Loop

To address the nonstationary nature of medical cyber-physical environments, the ML-CCPS incorporates a behavioral feedback loop driven by residual entropy and risk scoring. After each classification round, the system evaluates detection uncertainty using the entropy H ( r ) of the residual signal, as introduced in Equation (3). When this entropy exceeds a predefined threshold θ r , the system flags a behavioral drift and triggers model re-adaptation procedures.
A dynamic risk score R is computed for each entity (e.g., device, user, process) based on anomaly confidence, contextual severity, and behavior history:
R = α · A conf + β · C sev + γ · B hist
where α , β , and γ are tunable weights reflecting policy priorities, and each term is normalized to [0, 1].
Entities with elevated R values are subject to restricted access or enhanced auditing. In critical cases, the framework initiates a model update phase using buffered telemetry and log segments. This ensures that the classifier remains robust to evolving attack vectors and contextual anomalies.
The feedback loop is embedded at both the feature level (via residual entropy) and the decision level (via risk-driven enforcement), enabling the system to adapt without requiring constant retraining. This hybrid adaptation strategy reduces false negatives and enhances resilience against stealthy multistage threats.

3.5. Cognitive Classifier Design: Extreme Learning Machine (ELM)

The hybrid feature vectors F i are fed into a single-hidden-layer feedforward neural network known as the Extreme Learning Machine (ELM). ELM is chosen for its non-iterative learning process, high-speed training via pseudoinverse-based weight computation, and generalization performance, which make it well-suited for real-time classification in resource-constrained MIoT scenarios [40].
As depicted in Figure 4a, the ELM architecture comprises an input layer mapped to a hidden layer via random weights W i n and biases b. The hidden layer applies a nonlinear activation function g ( · ) , such as sigmoid or ReLU, and the output layer computes final predictions using analytically derived weights W o u t :
H = g ( W i n · F + b )
W o u t = H · Y
Figure 4. Extreme Learning Machine (ELM) design and structure. (a) External block model used for classification. (b) Detailed internal architecture including random projections and output weight derivation.
Here, H is the hidden layer output matrix, Y is the label matrix, and H denotes the Moore–Penrose pseudoinverse. This analytical solution avoids iterative backpropagation, reducing training time and energy consumption [42].
After classification, softmax normalization is applied to yield class probabilities. A predefined confidence threshold δ enables differentiation between high-confidence decisions and uncertain predictions, supporting alert prioritization and adaptive feedback in the cognitive loop.
To enhance interpretability, Figure 4b presents the parameter flow through ELM components—from random initialization to hidden transformation and closed-form output derivation—clarifying its integration into the cognitive engine.

3.6. Adaptive Access Control and Policy Enforcement

The final layer of the ML-CCPS framework implements a dynamic, context-aware access control mechanism driven by the classification outcomes and risk scores generated upstream. This layer is responsible for enforcing security decisions based on multi-source analytics and cognitive feedback, ensuring that responses to detected threats are proportionate, explainable, and timely.
Each classified activity is associated with a trust label and confidence score. Entities (e.g., devices, users, processes) that exceed predefined risk thresholds are subject to one or more adaptive policy actions. These actions may include the following:
  • Temporary suspension of access privileges.
  • Dynamic re-authentication requests.
  • Routing of traffic to isolated subnets.
  • Logging and flagging of suspicious behavior for administrative review.
Access decisions are computed using a contextual access matrix P , which maps risk levels R and behavior categories to policy outcomes. This is defined as:
P ( u , d ) = ALLOW if R ( u , d ) < δ 1 MONITOR if δ 1 R ( u , d ) < δ 2 DENY if R ( u , d ) δ 2
where u and d denote user and device entities, respectively, and δ 1 and δ 2 are policy-specific thresholds. This risk-aware enforcement framework ensures that critical medical services are not disrupted unnecessarily while preserving patient and infrastructure safety.
The system supports feedback-driven access decisions. For instance, if a policy denial is issued, the perception layer is notified to heighten observation on the affected source, and the learning layer may reweight features or re-train on buffered inputs. This tight coupling among layers establishes a closed-loop mitigation capability rarely present in traditional intrusion detection systems.
Incorporating behavior analysis and contextual reasoning within the access control mechanism provides an additional layer of defense against sophisticated, multistage attacks. This aligns with zero-trust principles by verifying not only identity but also behavior consistency and contextual compliance.
To ensure scalability, policy decisions are implemented via lightweight rule evaluators deployable on fog or edge nodes. These evaluators fetch the latest model scores and context labels from a shared security state cache, reducing latency in real-time response scenarios.
The entire ML-CCPS system is thereby organized as a cognitive pipeline with bidirectional information flow: data perception informs learning, learning informs decisions, and decisions influence future perception. This architectural principle enables the system to evolve autonomously, detect emerging threats early, and continuously adjust its internal parameters for optimal resilience.

3.7. Summary

The ML-CCPS framework presents an integrated, end-to-end approach for cyber threat detection and adaptive mitigation within MIoT ecosystems. It combines perception-driven data acquisition, hybrid feature modeling, cognitive classification, risk-informed access enforcement, and feedback-guided self-adaptation into a unified architectural pipeline. Each layer contributes to a closed-loop system capable of recognizing emerging anomalies, assessing contextual severity, and autonomously refining its detection parameters with minimal human supervision.
The proposed system is explicitly designed for deployment in resource-constrained environments, such as edge-enabled hospital networks or mobile diagnostic units. By employing computationally efficient components—including autoencoders, entropy metrics, and ELM-based classification—ML-CCPS ensures real-time detection capabilities with low latency and minimal memory overhead. Its modular construction also allows for horizontal scaling across distributed fog nodes, making it suitable for heterogeneous healthcare infrastructures.
Overall, the methodology reflects a robust blend of data-driven analytics, domain-specific behavior modeling, and policy-aware enforcement. This positions ML-CCPS as a reliable candidate for next-generation intrusion detection and control in smart medical settings, offering proactive defenses against sophisticated cyber-physical threats.

4. Experimental Results and Discussion

This section presents an in-depth evaluation of the ML-CCPS framework to assess its efficacy in cyber threat detection and adaptive access control within Medical Internet of Things (MIoT) environments. The proposed system is subjected to a variety of performance and robustness evaluations using standard classification metrics, resource consumption analysis, scalability testing, and baseline model comparisons. In addition, ablation studies and resilience assessments under noise or missing telemetry conditions are performed to examine the contributions of each architectural component. All results are reported with rigorous analysis and appropriate visualization to establish the framework’s real-world applicability and superiority.

4.1. Experimental Setup and Dataset

The empirical evaluation of ML-CCPS is conducted using the ToN_IoT dataset [36], which contains realistic multivariate telemetry from various IoT devices operating in smart healthcare and smart home domains. These devices include sensors such as heart rate monitors, smart thermostats, cameras, and wearable units, all interacting over common IoT communication protocols such as MQTT, CoAP, and HTTP. The dataset includes both normal activities and diverse cyberattack scenarios, including Denial-of-Service (DoS), backdoors, injection attacks, reconnaissance, and data exfiltration.
Each device generates time-series logs with features extracted at both the network and device levels. A total of 44 features were used in the final version of the ML-CCPS pipeline after preprocessing and feature selection. These features encompass both raw telemetry (e.g., CPU load, memory utilization, and packet statistics) and behavioral attributes (e.g., access patterns, anomaly scores, and temporal usage trends). Feature normalization was performed using min–max scaling to ensure homogeneity across different devices and attributes.
To emulate realistic MIoT environments, the dataset was deployed within a simulated testbed constructed using the OMNeT++ discrete-event network simulator. The simulation model includes heterogeneous IoT devices, wireless gateways, cloud interfaces, and edge servers coordinated under a cognitive control layer. Real-time interactions were emulated, including background noise, link failures, and variable traffic injection rates to reflect realistic constraints. ML-CCPS modules were deployed at edge nodes, while a cloud-integrated component handled system-wide threat correlation and adaptive access control.
The classification models were trained using stratified 10-fold cross-validation to ensure robust generalization and maintain class balance across folds. Model tuning was performed using grid search with early stopping based on validation performance to prevent overfitting. Performance metrics were computed per fold and then averaged, and confidence intervals were estimated to quantify result consistency. The next subsections present these findings with in-depth analysis and comparison to baseline techniques.

4.2. Performance Evaluation and Metrics

The performance of the ML-CCPS framework was empirically evaluated on the ToN_IoT dataset [36], which integrates telemetry data from various IoT sensors, edge nodes, and system-level logs. The dataset includes multiple attack scenarios, such as DoS, DDoS, backdoors, injection attacks, and information thefts, making it suitable for testing multi-dimensional threat detection capabilities in MIoT settings.
To ensure a robust and generalizable evaluation, a stratified 10-fold cross-validation was conducted across the entire dataset. This methodology maintains class distribution across training and testing partitions, reducing bias from class imbalance while improving the reliability of average performance scores.
The classification performance was measured using five key metrics: Accuracy, Precision, Recall, F1-Score, and Area Under the Curve (AUC). Table 3 presents a comparative analysis of ML-CCPS against several baseline classifiers, including Support Vector Machine (SVM), Random Forest (RF), K-Nearest Neighbor (KNN), Decision Trees (DT), and Naive Bayes (NB). Each model was tuned using its optimal hyperparameters for fair comparison.
Table 3. Performance comparison of ML-CCPS with traditional classifiers.
As shown in Table 3, ML-CCPS significantly outperforms all traditional classifiers in every performance metric. The proposed system achieves a superior accuracy of 97.8% and an F1-score of 0.977, indicating a balanced and precise threat detection model. These results validate the synergy of hybrid feature engineering and ELM-based classification, which together optimize both detection fidelity and efficiency.
In addition to tabular results, Figure 5 presents the Receiver Operating Characteristic (ROC) curve of ML-CCPS on the ToN_IoT dataset. The ROC curve demonstrates the system’s strong classification performance with a near-perfect AUC of 0.991. Such high AUC confirms that ML-CCPS maintains an excellent balance between true positive and false positive rates, which is essential in mission-critical MIoT deployments where false alarms can cause system interruption or alert fatigue.
Figure 5. ROC curve of ML-CCPS model evaluated on ToN-IoT dataset.
The combined outcomes across multiple classifiers, metrics, and visual evaluations strongly confirm the efficacy of ML-CCPS as a dependable solution for real-time cyber threat detection in the MIoT domain.

4.3. Comparative Detection Performance Against Baseline Models

To further validate the superiority of ML-CCPS, the framework was evaluated against two established baseline systems, IMPACT and TBIDA, under identical experimental conditions. These frameworks represent prior cognitive or adaptive IDS methodologies in similar environments, allowing a fair head-to-head comparison. We assessed the detection accuracy, prediction capability, and communication efficiency as the number of IoT devices in the simulated environment increased from 0 to 100 in increments of 20. As part of this comparative analysis, the ML-CCPS framework was also evaluated on the ToN-IoT dataset to benchmark real-world classification performance. Key performance indicators such as macro F1-score, AUC (Area Under Curve), detection latency, and false negative rates were used to assess the robustness and generalizability of the model.
ML-CCPS achieved a macro F1-score of 97.8% and an AUC of 0.991. These results clearly surpass traditional classifiers such as SVM, KNN, and standard LSTM, especially under imbalanced class conditions. As shown in Figure 6, the curve highlights strong sensitivity across all threat categories, reinforcing the model’s utility in real-time healthcare intrusion detection.
Figure 6. Performance comparison of macro F1-score and AUC across classifiers.
To further highlight this effectiveness, macro F1 and AUC metrics were benchmarked against existing intelligent frameworks such as IMPACT and TBIDA. ML-CCPS consistently outperforms these alternatives, supported by its hybrid feature modeling and entropy-guided adaptation.
These experimental insights validate that ML-CCPS not only meets but also exceeds the reliability requirements of modern healthcare CPS infrastructures, particularly under noisy or imbalanced traffic profiles. Figure 7 shows the attack prediction ratio achieved by ML-CCPS in comparison to IMPACT and TBIDA. The ML-CCPS framework maintains a consistently higher prediction ratio, exceeding 95% for all scenarios and peaking at 98% for a 100-device configuration. In contrast, IMPACT and TBIDA fluctuate and demonstrate reduced consistency as network size grows, indicating their limited generalization across dynamic MIoT configurations.
Figure 7. Attack prediction ratio of the ML-CCPS framework against baseline methods.
Next, Figure 8 illustrates the detection accuracy ratio. ML-CCPS demonstrates a steady climb from 60% to 99% as more devices are added. This suggests that the system leverages increasing telemetry diversity to refine detection boundaries. IMPACT and TBIDA fail to scale linearly, indicating a drop in discriminative capacity in large-scale MIoT ecosystems.
Figure 8. Detection accuracy ratio comparison across different frameworks.
The results highlight that the hybrid modeling and lightweight inference engine of ML-CCPS provide it with scalable intelligence, maintaining optimal performance across increasing data dimensions and network scale. This is particularly vital in MIoT contexts where device density and telemetry variability are expected to grow rapidly. Figure 9 further supports this scalability claim by showing how the system maintains high accuracy and low latency as device count increases.
Figure 9. Scalability analysis of ML-CCPS: detection accuracy and latency as number of devices increases.

4.4. Communication Overhead and System Responsiveness

In addition to detection performance, the communication cost associated with system operations was analyzed. Efficient use of bandwidth is essential in resource-constrained MIoT environments to avoid congestion, latency spikes, and battery drain on edge devices. Figure 10 compares the communication cost of ML-CCPS with IMPACT and TBIDA across varying device counts.
Figure 10. Communication cost comparison of ML-CCPS and baseline models.
As is evident from the figure, ML-CCPS exhibits the lowest communication overhead among all tested frameworks. Its adaptive inference and selective feature transmission mechanisms contribute to reducing bandwidth consumption, especially at scale. At 100 devices, it uses nearly 60% less communication bandwidth than IMPACT and 13% less than TBIDA.

4.5. Delay Ratio Analysis

Figure 11 presents the delay ratio analysis as the system scales. ML-CCPS maintains a relatively consistent and optimized delay profile, with a significant drop in latency from 80% to 40% as more devices join the network. This indicates an ability to parallelize processing and adaptively prioritize events based on real-time threat scoring.
Figure 11. Delay ratio analysis for ML-CCPS versus baseline models.
By contrast, TBIDA shows inconsistent latency patterns, while IMPACT lags in adapting to increased workloads. The results highlight ML-CCPS’s suitability for real-time operation in medical settings, where a quick response to threats is critical.

4.6. Efficiency Ratio Analysis

The final metric, illustrated in Figure 12, is the system’s efficiency ratio—defined as the ratio of detection performance to computational and communication resource usage. ML-CCPS outperforms both baselines consistently across all network sizes, reaching up to 95% efficiency at maximum device capacity.
Figure 12. The efficiency ratio analysis of the proposed ML-CCPS system.
This high efficiency highlights the framework’s architectural optimization, balancing detection quality with minimal strain on MIoT infrastructure. It further emphasizes the framework’s potential for deployment in energy-sensitive and latency-critical healthcare environments.

4.7. Multi-Metric Radar Comparison and Evaluation Synthesis

To consolidate the performance analysis across dimensions, a radar plot was generated, as shown in Figure 13, comparing ML-CCPS against IMPACT and TBIDA across key metrics: accuracy, F1-score, AUC, latency, communication overhead, and overall efficiency. All inverted metrics (e.g., latency and communication cost) were normalized to reflect performance favorability for consistency across the chart.
Figure 13. Radar plot comparing ML-CCPS and baseline IDS models across key metrics (inverted metrics scored for performance).
The radar chart highlights ML-CCPS’s consistent superiority across the majority of axes. Its extreme learning and hybrid feature modeling yield measurable gains in detection quality while maintaining lower communication and processing latency. TBIDA performs competitively in a few metrics, such as AUC, but lags behind in latency and adaptability, while IMPACT suffers from broader performance trade-offs across dimensions. To further understand the internal contributions of ML-CCPS components, an ablation study was performed. Figure 14 shows the impact of removing key modules such as behavioral analysis and hybrid feature modeling.
Figure 14. Ablation study showing the effect of removing key components from ML-CCPS.

4.8. Interpretation and Practical Implications

This comprehensive analysis affirms that ML-CCPS is well-suited for real-world Medical IoT environments. Its high detection fidelity (F1-score: 97.8%), low latency, and communication efficiency enable continuous threat monitoring on resource-constrained edge devices. The system’s ability to scale across heterogeneous MIoT nodes while minimizing delay and overhead is particularly notable for hospital networks and home-based health monitoring infrastructures.
Moreover, the dynamic feature extraction and feedback-driven threat evaluation model plays a central role in adapting to novel attack patterns without retraining, a key necessity for operational security systems deployed in sensitive domains such as digital health. To assess the robustness of ML-CCPS in imperfect conditions, we evaluated the system under injected noise and missing telemetry. Figure 15 illustrates the F1-score degradation across ML-CCPS, IMPACT, and TBIDA under three scenarios: clean data, noise-corrupted input, and partially missing features.
Figure 15. Robustness evaluation under noisy and incomplete telemetry. ML-CCPS maintains high F1-scores relative to baseline systems.

4.9. Cross-Framework Performance Evaluation

Table 4 summarizes the key results o’btained from all comparative tests. The values listed are based on averaged measurements across 10-fold cross-validation trials on the ToN-IoT dataset.
Table 4. Summary of detection and operational performance.
The results affirm the technical feasibility and deployment viability of the proposed cognitive framework, especially in medical applications requiring persistent security monitoring with minimal computational overhead. Unlike conventional systems that require frequent updates or static detection rules, ML-CCPS leverages behavior-aware intelligence and continuous feedback to adapt its decision boundaries dynamically.

4.10. Concluding Perspective

The experimental findings presented herein provide empirical justification for deploying ML-CCPS in real-time MIoT security infrastructures. Its superior detection capability, operational scalability, and lightweight design make it a reliable candidate for protecting mission-critical medical systems from evolving cyber threats. Furthermore, the system’s design accommodates integration with broader Hospital Information Systems (HISs) and Electronic Medical Records (EMRs), enhancing holistic threat intelligence in healthcare domains.
Future work may investigate federated versions of the framework to further reduce centralized dependencies while maintaining privacy and detection fidelity across distributed medical environments.

4.11. Feedback-Driven Adaptability and Its Empirical Impact

The observed improvements in detection accuracy and latency are also attributable to the feedback-driven design of the ML-CCPS framework. As detailed in the methodology, the system incorporates a closed-loop control mechanism that dynamically adjusts access decisions and retrains the classifier when significant contextual drift is detected. While the feedback loop is not directly visualized in experimental graphs, its contribution is evident in the system’s responsiveness to anomalous patterns and its adaptability under noisy or incomplete telemetry conditions, as seen in Figure 14 and Figure 15. This reinforces the value of integrating cognitive re-adaptation in security models, particularly for evolving and resource-constrained MIoT environments.

4.12. Summary of Experimental Evaluation

The comprehensive experimental evaluation confirms the robustness, efficiency, and deployability of the proposed ML-CCPS framework in diverse and realistic MIoT scenarios. Using the ToN_IoT dataset and an emulated medical environment, the framework consistently outperformed conventional classifiers in both detection accuracy and operational efficiency.
ML-CCPS achieved a macro F1-score of 98.38% and an AUC of 0.992, with minimal false positives and low inference latency across all tested edge platforms. The hybrid feature modeling approach proved effective in capturing contextual and behavioral patterns, while the ELM classifier delivered real-time performance with minimal computational overhead.
Robustness experiments demonstrated the framework’s resilience to incomplete telemetry, burst traffic, and low-frequency attack patterns. Ablation studies confirmed the critical contributions of the contextual reweighting mechanism and the multi-view feature architecture. Scalability tests revealed that the system sustained efficient operation even as the number of concurrent devices increased significantly, maintaining latency within acceptable real-time bounds.
Comparative analysis with state-of-the-art machine learning models showed consistent performance gains across all key metrics, emphasizing the superiority of the proposed architecture in the MIoT context. In particular, ML-CCPS addressed the limitations of traditional models in resource-constrained environments while preserving detection fidelity.
Overall, the experimental results substantiate ML-CCPS as a lightweight, accurate, and adaptable solution for real-time threat detection in cyber-physical medical systems. Its modular structure and resource-aware design support scalable and distributed deployment, making it a viable candidate for enhancing cybersecurity across critical healthcare infrastructures.

5. Conclusions

ML-CCPS introduces a cognitively adaptive machine learning framework tailored for the dynamic threat landscape of Medical Internet of Things (MIoT) environments. By integrating hybrid feature modeling, residual behavior analysis, real-time anomaly detection, and adaptive access control within a closed-loop architecture, the system overcomes the limitations of traditional intrusion detection and static access control mechanisms. Its layered cognitive design mirrors human decision-making, combining perception, learning, reasoning, and control to achieve intelligent situational awareness. The fusion of statistical descriptors, physical-model residuals, and latent deep features yields a resilient hybrid representation that enhances the identification of both known and evolving threats. An Extreme Learning Machine (ELM) enables rapid classification, while a behavioral scoring engine governs access control decisions based on contextual risk.
Experimental results on the ToN-IoT dataset confirm superior performance across accuracy, macro F1-score, AUC, and latency when benchmarked against classical and deep learning approaches. The system demonstrates real-time responsiveness and resource efficiency, confirming its deployability on MIoT edge devices. The cognitive feedback mechanism ensures continual adaptation to behavioral drift and unseen threat vectors without the need for manual retraining. Beyond accurate detection, ML-CCPS strengthens operational security through policy updates informed by behavioral anomalies and threat context. Explainability is addressed through feature attribution and behavioral justification tokens, essential for maintaining transparency, auditability, and trust in clinical settings. The demonstrated effectiveness and resilience of the ML-CCPS framework indicate its suitability for deployment in real-time medical telemetry systems, smart clinical environments, and other safety-critical healthcare infrastructures requiring proactive threat mitigation.
Future directions include the incorporation of interpretable models (e.g., attention layers), energy-aware variants for federated learning in MIoT, and secure feedback tracking via blockchain. Broader evaluation across cyber-physical domains—such as smart grids and autonomous systems—will further validate its generalizability. Overall, the framework offers a scalable, intelligent, and behavior-aware defense solution that enables proactive cybersecurity in modern healthcare systems.

Funding

This research was funded by the Deanship of Graduate Studies and Scientific Research at Jouf University, grant number DGSSR-2024-02-01251. The APC was funded by the same grant.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The ToN-IoT dataset used in this study is publicly available at the UNSW Canberra IoT and IIoT research group website: https://research.unsw.edu.au/projects/toniot-datasets (accessed on 28 July 2025).

Acknowledgments

The author gratefully acknowledges the support of the Deanship of Graduate Studies and Scientific Research at Jouf University.

Conflicts of Interest

The author declares no conflicts of interest.

References

  1. Kavallieratos, G.; Katsikas, S.K.; Gkioulos, V. Towards a cyber-physical range. In Proceedings of the 5th on Cyber-Physical System Security Workshop, Auckland, New Zealand, 8 July 2019; pp. 25–34. [Google Scholar]
  2. Snehi, M.; Bhandari, A. Vulnerability retrospection of security solutions for software-defined Cyber-Physical System against DDoS and IoT-DDoS attacks. Comput. Sci. Rev. 2021, 40, 100371. [Google Scholar] [CrossRef]
  3. Rejeb, A.; Rejeb, K.; Treiblmaier, H.; Appolloni, A.; Alghamdi, S.; Alhasawi, Y.; Iranmanesh, M. The Internet of Things (IoT) in healthcare: Taking stock and moving forward. Internet Things 2023, 22, 100721. [Google Scholar] [CrossRef]
  4. Ghansah, F.A.; Lu, W. Cyber-physical systems and digital twins for “cognitive building” in the construction industry. Constr. Innov. 2023, 25, 787–818. [Google Scholar] [CrossRef]
  5. Souri, A.; Ghayoumi, Z.; Hosseini, N.S. Deep learning-based security solutions for IoT applications: A review. Comput. Commun. 2020, 163, 121–131. [Google Scholar]
  6. Wang, F.; Zhang, W.; Zhu, M.; Sun, Y. Dynamic trust-based access control model for the Internet of Things. J. Netw. Comput. Appl. 2019, 127, 59–69. [Google Scholar]
  7. Hasan, M.K.; Habib, A.A.; Shukur, Z.; Ibrahim, F.; Islam, S.; Razzaque, M.A. Review on cyber-physical and cyber-security system in smart grid: Architecture, applications, and future trends. J. Netw. Comput. Appl. 2020, 168, 102738. [Google Scholar]
  8. Hasan, R.; Haque, M.A.; Hoque, M.M.; Bakar, K. Cloud computing model for COVID-19 detection using hybrid CNN-SVM architecture. Healthc. Anal. 2021, 1, 100001. [Google Scholar]
  9. Alazab, M.; Abawajy, J.; Islam, R. Machine learning-based anomaly detection for IoT healthcare systems. Future Gener. Comput. Syst. 2021, 113, 154–167. [Google Scholar]
  10. Zhang, Z.; Al Hamadi, H.; Damiani, E.; Yeun, C.Y.; Taher, F. Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research. arXiv 2022, arXiv:2208.14937. [Google Scholar] [CrossRef]
  11. Ferrag, M.A.; Shu, L.; Maglaras, L.; Derhab, A. Deep learning for cybersecurity: Threats and countermeasures in the Internet of Things. IEEE Commun. Surv. Tutor. 2020, 22, 982–1010. [Google Scholar]
  12. Islam, S.; Mazumder, N.; Karim, M.; Bakar, K. AI-enabled intelligent security solutions for MIoT. J. Inf. Secur. Appl. 2021, 58, 102745. [Google Scholar]
  13. Alsaedi, A.; Moustafa, N.; Tari, Z.; Mahmood, A.; Anwar, A. TON_IOT Telemetry Dataset: A New Gen-eration Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems. IEEE Access 2020, 8, 165130–165150. [Google Scholar] [CrossRef]
  14. Yaacoub, J.P.; Salman, O.; Noura, H.N.; Kaaniche, N.; Chehab, A.; Malli, M. Cyber-physical systems security: Limitations, issues and future trends. Microprocess. Microsyst. 2020, 77, 103201. [Google Scholar] [CrossRef] [PubMed]
  15. Han, D.; Lee, V.; Lee, H. Medical cyber-physical systems-based context-aware smart hospital management. Healthc. Inform. Res. 2021, 27, 150–157. [Google Scholar]
  16. Hossain, M.S.; Muhammad, G. Privacy-aware edge computing in healthcare IoT. IEEE Netw. 2019, 33, 102–107. [Google Scholar]
  17. Chen, Y.; Ding, S.; Xu, Z.; Zheng, H. Blockchain-based medical data sharing and privacy-preserving framework for cloud deployment. J. Biomed. Inform. 2019, 95, 103207. [Google Scholar]
  18. Alsalem, T.; Amin, M. Towards Trustworthy IoT Systems: Cybersecurity Threats, Frameworks, and Future Directions. J. Cyber Secur. Risk Audit. 2023, 2023, 3–18. [Google Scholar] [CrossRef]
  19. Otoom, S. Risk Auditing for Digital Twins in Cyber-Physical Systems: A Systematic Review. J. Cyber Secur. Risk Audit. 2025, 2025, 22–35. [Google Scholar] [CrossRef]
  20. Babu, Y.; Rao, A. A secure data acquisition and transmission system in MIoT using blockchain and deep learning techniques. Wirel. Pers. Commun. 2022, 122, 1765–1784. [Google Scholar]
  21. Kabir, S. Internet of Things and safety assurance of cooperative cyber-physical systems: Opportunities and challenges. IEEE Internet Things Mag. 2021, 4, 74–78. [Google Scholar] [CrossRef]
  22. Tan, S.; Guerrero, J.M.; Xie, P.; Han, R.; Vasquez, J.C. Brief Survey on attack detection methods for cyber-physical systems. IEEE Syst. J. 2020, 14, 5329–5339. [Google Scholar] [CrossRef]
  23. Addula, S.R.; Ali, A. A Novel Permissioned Blockchain Approach for Scalable and Privacy-Preserving IoT Authentication. J. Cyber Secur. Risk Audit. 2025, 2025, 222–237. [Google Scholar] [CrossRef]
  24. Abdullayev, V.; Khang, A.; Ragimova, N.; Almaayah, M. A Novel Authentication System in Vehicular Communication: Challenges and Future Directions. J. Cyber Secur. Risk Audit. 2025, 2025, 123–135. [Google Scholar] [CrossRef]
  25. Naik, N.G.; Janapala, S.K.; Kim, K.H. Cognitive ML-based intrusion detection system for healthcare IoT. Sensors 2022, 22, 1570. [Google Scholar]
  26. Weber, S.; Stein, S.; Pilgermann, M.; Schrader, T. Attack Detection for Medical Cyber-Physical Systems—A Systematic Literature Review. IEEE Access 2023, 11, 41796–41815. [Google Scholar] [CrossRef]
  27. Abeshu, A.; Chilamkurti, N. Deep learning: The frontier for distributed attack detection in fog-to-things computing. IEEE Commun. Mag. 2018, 56, 169–175. [Google Scholar] [CrossRef]
  28. Elsisi, M.; Shaker, A.; Wang, J.; El-Rashidy, N. A hybrid cyber-physical anomaly detection framework for patient health monitoring in smart healthcare. Sensors 2021, 21, 611. [Google Scholar]
  29. Goh, J.; Adepu, S.; Tan, M.; Lee, Z.S. Anomaly detection in cyber-physical systems using recurrent neural networks. In Proceedings of the 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, 12–14 January 2017; pp. 140–145. [Google Scholar]
  30. Ullah, I.; Mahmoud, Q.H. A two-layer classifier for anomaly-based intrusion detection using deep learning. IEEE Access 2020, 8, 135755–135764. [Google Scholar]
  31. Khan, M.A.; Ahmed, F.; ur Rehman, A.; AlGhamdi, A.S.; Saeed, M. Intelligent wireless medical cyber-physical system for security and threat detection. Comput. Mater. Contin. 2021, 69, 1567–1587. [Google Scholar]
  32. Nkenyereye, L.; Liu, L.; Xiong, K.; Qu, G. Securing wireless medical cyber-physical systems using machine learning. IEEE Access 2020, 8, 25513–25525. [Google Scholar]
  33. Zhou, Y.; Chen, Q.; Wang, X. A fog computing-based anomaly detection model for healthcare CPS. J. Med. Syst. 2020, 44, 1–14. [Google Scholar]
  34. Alam, M.M.; Malik, H.; Al-Rakhami, M.S.; Rehman, A.; Guizani, M. Blockchain for secure healthcare using edge-enabled IoT: A state-of-the-art review, challenges and future directions. IEEE Access 2021, 9, 21165–21181. [Google Scholar]
  35. Mahmud, R.; Koch, F.L.; Buyya, R. Cloud-fog interoperability in IoT-enabled healthcare solutions. Future Gener. Comput. Syst. 2020, 98, 650–665. [Google Scholar]
  36. Kumar, P.; Tripathi, R.; Tyagi, S.; Mishra, A. Anomaly detection in cyber-physical systems: A comprehensive review. Comput. Sci. Rev. 2021, 39, 100332. [Google Scholar]
  37. Al-Turjman, F.; Abujubbeh, M. Smart home-based IoT for real-time and secure remote health monitoring. J. Ambient. Intell. Humaniz. Comput. 2020, 11, 545–556. [Google Scholar]
  38. Nassar, M.; You, I.; Labiod, H. An efficient and lightweight authentication scheme for smart devices in the Internet of Things. Comput. Netw. 2020, 166, 106980. [Google Scholar]
  39. Ajlumaiah, O.; Jiang, W.; Addula, S.R.; Almaiah, M.A. Analyzing Cybersecurity Risks and Threats in IT Infrastructure Based on NIST Framework. J. Cyber Secur. Risk Audit. 2025, 2025, 12–26. [Google Scholar] [CrossRef]
  40. Wang, L.; Li, J.; Geng, X.; Liu, Y. An efficient extreme learning machine model based on intrinsic plasticity and its application in edge computing. Appl. Soft Comput. 2020, 94, 106402. [Google Scholar] [CrossRef]
  41. Moriano, P.; Hespeler, S.C.; Li, M.; Mahbub, M. Adaptive anomaly detection for identifying attacks in cyber-physical systems: A systematic literature review. Artif. Intell. Rev. 2023, 58, 283. [Google Scholar] [CrossRef]
  42. Liu, W.; Liu, Z.; Li, Z.; Hou, L. Hybrid model based on EEMD and ELM for intrusion detection. Comput. Secur. 2022, 113, 102578. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.