1. Introduction
The adoption of the Internet of Things (IoT) in the healthcare sector has led to the formation of the Internet of Medical Things (IoMT) [
1]. The integration of Artificial Intelligence (AI) into healthcare systems has brought significant advancement in IoMT [
2]. The primary breakthrough of the IoMT system is to improve the quality of life of patients, which also enables real-time health monitoring, remote patient care, and improved treatment accuracy [
3]. However, the integration of various communication protocols and different healthcare devices in the IoMT is always vulnerable to various security threats and cyberattacks, allowing adversaries to exploit sensitive information [
4]. Attackers often exploit Man-in-the-Middle (MitM) attacks to leak information from the IoMT system [
5]. In an MitM attack, an adversary secretly intercepts and potentially alters communication between medical devices (e.g., wearable sensors) and healthcare servers or applications. Therefore, security monitoring becomes an utmost priority in IoMT systems.
Numerous attacks, ranging from network-based and device-specific to data-centric and authentication-related, are employed to infiltrate the network and compromise the integrity of the IoMT system. Various prevention methods, such as attack detection, standards and protocol compliance, and authentication and access control, are used to protect the robustness of the network [
6]. In contrast, legacy security techniques are complex and require more resources, which cannot be afforded by IoMT devices due to their resource-constrained nature, characterized by low processing power, limited storage capacity, and short battery life [
2]. The IoMT devices are connected using lightweight communication protocols, and the standardization is suboptimal. Therefore, innovative protection strategies must be engineered to address the urgent safety dilemmas of IoMT infrastructures, taking into account their limited-resource design [
7]. Nowadays, a wide range of innovative ideas are emerging to protect the IoMT network, which consists of firmware validation, patch management, log analysis and auditing, and intrusion detection. Intrusion detection is the most frequently implemented attack detection and reduction methodology in IoMT, leveraging nascent Machine Learning (ML) methods. ML can streamline the IDS and easily deploy and control it even in resource-constrained devices and highly dynamic networks [
8,
9,
10].
Traditional security strategies encounter significant limitations in IoMT environments. They lack the capability to detect unknown or zero-day attacks in real-time due to their static, rule-based nature, which prevents them from adapting to evolving threats. Additionally, they struggle to scale across diverse, heterogeneous networks of medical devices commonly found in IoMT systems [
11,
12].
New generation IDS are specifically designed to address the limitations of conventional security mechanisms in heterogeneous and resource-constrained IoMT environments. These IDS models are increasingly leveraging lightweight machine learning, deep learning, and adaptive ensemble techniques to operate effectively across a wide range of device types, communication protocols, and data formats [
13]. By minimizing memory and computation requirements, they enable real-time detection even on low-power sensors and embedded medical devices. Moreover, the integration of anomaly-based and hybrid detection techniques allows these systems to identify novel attack patterns and zero-day threats that signature-based systems often miss. The ability to learn from streaming data, adapt to dynamic network conditions, and provide interpretable security decisions marks a significant advancement in securing sensitive healthcare infrastructures against modern cyber threats [
14].
To overcome the challenges faced by traditional security systems, there is a strong motivation to develop a new IDS that can adapt to the highly dynamic and heterogeneous nature of IoMT. Our work addresses the limitations of existing IDS by developing a solution capable of detecting novel threats and adapting to dynamic intrusions within the diverse IoMT landscape. This framework prioritizes real-world deployment by ensuring minimal execution time and efficient resource utilization, ultimately enhancing detection accuracy and improving security in the ever-evolving IoMT environment.
This work is an extended version of our prior conference paper [
1]. In contrast to [
1], this article contributes:
We propose a novel hybrid IDS that integrates Empirical Distribution Ranking (EDR) for feature selection with a fuzzy rule-based inference system and a J48 decision tree classifier to detect and categorize various cyberattacks in IoMT environments.
The system introduces a fuzzification mechanism that translates numerical features into linguistic variables (e.g., Low, Medium, High), enabling the extraction of interpretable fuzzy IF-THEN rules that enhance explainability and reduce classification ambiguity.
By employing the J48 algorithm in conjunction with fuzzy logic, the proposed system maintains low computational overhead while offering human-understandable reasoning paths, crucial for trust and transparency in medical settings.
The model is extensively validated using three benchmark IoMT datasets: WUSTL-EHMS-2020, CICIoMT2024, and ECU-IoHT. It achieves superior accuracy (up to 99.68%) and robust performance in terms of precision, recall, F1-score, and ROC analysis.
A detailed performance comparison demonstrates that the proposed method consistently outperforms state-of-the-art IDS approaches, particularly in attack interpretability, accuracy, and scalability to resource-constrained IoMT networks.
The structure of this manuscript is as follows:
Section 2 provides a review of related work,
Section 3 presents our novel intrusion detection methodology for IoMT networks,
Section 4 introduces the dataset,
Section 5 details the experiments and performance evaluations, and
Section 6 concludes with a reflection on the contributions of this research.
2. Related Work
The Internet of Medical Things (IoMT) refers to the interconnected network of medical devices, software, and healthcare systems that enable real-time patient monitoring, diagnosis, and treatment through data transmission over the internet. This emerging technology significantly enhances the quality of healthcare services by enabling remote care, facilitating timely interventions, and allowing for continuous monitoring. However, the IoMT ecosystem faces substantial security challenges due to the resource-constrained nature of devices, the heterogeneous communication protocols used, and the absence of standardized frameworks. These limitations make IoMT systems vulnerable to a wide range of cyber threats, including data breaches, unauthorized access, and denial-of-service attacks. Therefore, implementing robust and adaptive security mechanisms is critical to safeguarding sensitive medical data and ensuring the integrity and reliability of healthcare services.
Recent advancements in intrusion detection for the IoMT have explored a variety of machine learning and deep learning paradigms. Sohail et al. [
10] proposed an explainable IDS based on ensemble boosting algorithms such as XGBoost, AdaBoost, and CatBoost, with XGBoost demonstrating superior performance due to its robustness against class imbalance and effective regularization. Feature importance analysis highlighted indicators such as the
FIN flag and the
ICMP protocol, although class imbalance remained a limiting factor in detecting minority attacks. Similarly, the L2D2 model introduced in [
15] employed a dual-layer LSTM and dense architecture optimized via the AdamW algorithm to capture temporal dependencies in IoMT traffic. Despite outperforming conventional methods in multi-class classification, its computational demands make it impractical for binary detection on constrained devices. In [
16], a hybrid UNet++–LSTM architecture was proposed to extract network traffic features, achieving 99.92% anomaly detection and 87.96% attack categorization accuracy. However, difficulties in classifying specific attacks, such as ARP spoofing and reconnaissance, highlighted the model’s sensitivity to complex intrusion patterns. Addressing dataset limitations, Dadkhah et al. [
17] curated a realistic IoMT dataset comprising 40 devices and 18 diverse attack types across various protocols. Their evaluation using five ML techniques demonstrated improved generalizability, although challenges such as class imbalance, limited device scalability, and potential overfitting persist. The study in [
13] explored fine-tuned Transformer models for anomaly detection under data scarcity. While these models showed promising detection accuracy, their computational complexity and memory overhead limit their applicability in real-time IoMT deployments.
In [
18], the authors proposed an enhanced deep learning-based intrusion detection framework tailored for IoMT environments, combining embedded Ensemble Learning (EL) for feature selection with a One-Dimensional Convolutional Long Short-Term Memory (1D-CLSTM) neural network for cyberthreat classification. To address class imbalance, a random undersampling boosting strategy was employed. Although the model demonstrated promising results, its accuracy in detecting specific attacks, such as DoS (88%) and Nmap Port Scan (81%), remained suboptimal on the ECU-IoHT dataset, indicating a need for further refinement in handling complex and stealthy threat types. Similarly, the authors in [
14] proposed time-series classification models for detecting potential cyberattacks in IoHT networks by first applying a modified Neighborhood Component Analysis (NCA) for feature selection. They introduced two LSTM-based architectures, the Directed Acyclic Graph LSTM (DAG-LSTM) and the Projected Layer LSTM (PL-LSTM), and compared them against existing models, including GRU, traditional LSTM, and Bi-LSTM, using real-world IoHT traffic data. Despite demonstrating improved performance, tuning the regularization parameter
and computing feature weights remains computationally intensive, suggesting that ensemble learning could be a potential enhancement.
In [
19], the authors proposed a hybrid IDS that integrates Bidirectional Encoder Representations from Transformers (BERT) with deep learning techniques to detect cyberattacks in IoMT networks. The approach leverages BERT’s contextual understanding to enhance detection performance in complex medical traffic environments. However, the study highlights key limitations, including limited generalizability due to evaluation on small datasets and the model’s computational complexity, which may hinder deployment on resource-constrained IoMT devices. Kumar et al. [
20] proposed a novel cyberattack detection framework for Internet of Healthcare Things (IoHT) environments that integrates Federated Learning (FL) with LSTM networks. The FL paradigm preserves patient privacy by enabling decentralized training of a global model without data sharing, while the LSTM network effectively captures temporal attack patterns in time-series data. Although the system demonstrates robustness and reduced computational complexity through embedded feature selection, the authors acknowledge the need for improvement in detecting specific attacks, such as DoS and Nmap port scans, in future iterations. Complementing these efforts, the authors in [
21] introduced SECIoHTFL, a federated learning-based IDS that incorporates
-differential privacy to identify cyberattacks in Internet of Healthcare Things networks securely. Their approach leverages Deep Neural Networks (DNNs), including Convolutional Neural Networks (CNNs), to analyze network traffic while preserving user privacy. Although the system demonstrates promise, this work highlights vulnerabilities in the aggregation server to adversarial model poisoning attacks. It suggests future enhancements such as adaptive noise addition and more robust aggregation techniques to improve security and scalability.
In [
22], the authors proposed a novel cyberattack detection framework tailored for healthcare systems using IoMT datasets. The integrated model combines LSTM for extracting temporal features, Principal Component Analysis (PCA) for dimensionality reduction, and K-Nearest Neighbors (KNN) for classification, achieving high accuracy across multiple datasets. However, the combination of LSTM and PCA introduces increased computational overhead, potentially necessitating high-performance systems or cloud-based deployment solutions to ensure scalability in real-world environments. Similarly, the work done in [
23] presents a comparative analysis of intrusion detection models in healthcare systems, highlighting the effectiveness of the Maximum Information Coefficient (MIC) for feature selection in capturing nonlinear relationships. However, the approach’s reliance on biometric features may raise privacy concerns, and its effectiveness may diminish on datasets lacking strong nonlinear correlations. Moreover, the study [
24] proposes Light Feature Engineering based on Mean Decrease in Accuracy (LEMDA). This feature engineering method enhances IDS performance in IoT systems by improving F1 scores by 34% and reducing detection time. However, its effectiveness depends on parameter tuning and may vary in dynamic IoT environments.
In [
25], the authors proposed the Memory Feedback Transformer (MF-Transformer), which integrates Memory Feedback LSTM (MF-LSTM) modules throughout the Transformer architecture to capture and propagate temporal dependencies across all layers. The model initially captures spatial-to-spatial relationships within individual time steps and subsequently fuses spatial-to-temporal dynamics through MF-LSTM’s feedback mechanism, allowing for robust tracking of both short-term anomalies and long-term trends. While the approach demonstrates superior performance in anomaly detection by preserving long-range dependencies, the integration of LSTM feedback loops throughout the Transformer increases model complexity. It may pose scalability challenges in resource-constrained IoMT environments.
In [
26], the authors proposed a novel human-centric framework for cyberattack detection in IoMT environments, combining Quantum Random Forest (QRF) with local differential privacy to ensure patient data protection while enhancing detection accuracy. The framework further integrates active learning, threat intelligence feeds, and generative AI tools such as ChatGPT (GPT-5) to augment human decision-making and strengthen threat response. Although the framework demonstrates strong performance in terms of accuracy, detection rate, and resource efficiency, the use of quantum-enhanced techniques and generative tools introduces complexity. It requires advanced hardware and careful tuning for real-world deployment.
In [
27], the authors introduced FedIoMT, a federated learning framework designed for the IoMT ecosystem that incorporates meta-learning and an advanced clustering strategy to enable robust model aggregation. The system employs the Kolmogorov-Arnold Convolutional Network (KANConvNet) as a local classifier, enhancing scalability, interpretability, and adaptability within the federated learning environment. Despite these strengths, the framework faces challenges related to computational efficiency on low-power devices, maintaining privacy protections, mitigating overfitting, and ensuring seamless deployment across heterogeneous IoMT infrastructures.
In [
28], the authors proposed MF-CGAN, a multi-feature Conditional Generative Adversarial Network designed to generate realistic synthetic data using the WUSTL-EHMS-2020 dataset, which includes both network traffic and health metrics. The architecture integrates conditional features, such as attack type, traffic direction, and status flags, to preserve complex interdependencies. It comprises a generator composed of dense layers and a discriminator that jointly evaluates data authenticity. While MF-CGAN enhances data diversity and realism for training intrusion detection systems, potential drawbacks include the risk of mode collapse and computational overhead associated with generating high-dimensional, feature-rich synthetic samples.
Fuzzy IF-THEN rule-based systems offer significant advantages for IDS in the IoMT environment, primarily due to their ability to handle uncertainty, vagueness, and imprecision inherent in medical and network data. These systems enable interpretable decision-making by formulating human-readable rules, making them highly suitable for critical domains like healthcare, where explainability and trust are paramount. Unlike crisp classification models that require precise thresholds, fuzzy rule-based systems offer soft boundaries for attack detection, enabling nuanced classification of ambiguous patterns commonly found in resource-constrained and heterogeneous IoMT networks.
In [
29], the authors proposed a fuzzy-based self-tuning LSTM Intrusion Detection System that dynamically adjusts training epochs using early stopping, thereby improving adaptability and detection performance over conventional models. Complementing this, ref. [
30] introduced a hybrid risk assessment framework that combines fuzzy logic with the Fuzzy Analytical Hierarchy Process (FAHP) to evaluate and prioritize vulnerabilities in heterogeneous IoMT devices. This approach, demonstrated through a BLE attack case study, provides structured risk quantification but may be subject to the subjectivity of linguistic inputs and dependence on expert-defined parameters. To address trust and identity threats, Ref. [
31] presented FTM-IoMT, a fuzzy logic-based Trust Management mechanism capable of detecting Sybil attacks by evaluating trustworthiness through integrity, receptivity, and compatibility. Despite its effectiveness in isolating malicious nodes, its reliance on static fuzzy rules may hinder responsiveness to rapidly evolving attack strategies. Furthermore, Ref. [
32] proposed a Federated Learning-based Deep Neural Network (DNN-FL) anomaly detection system that preserves data privacy while ensuring robust cyberthreat identification across IoHT networks; however, this approach faces challenges such as communication overhead and handling non-IID data distributions across clients.
In [
33], the authors introduced FLSec-RPL, a fuzzy logic-based intrusion detection scheme targeting DIO neighbor suppression attacks in RPL-based IoT networks. Their three-phase detection strategy, comprising activity monitoring, fuzzy logic-based identification, and malicious node validation, demonstrated superior performance across multiple metrics, including detection accuracy, F1-score, energy efficiency, and network reliability, in both static and mobile RPL scenarios. Similarly, the work done in [
34] proposed a collaborative framework that integrates fuzzy logic-based feature selection with CNN-based classification, addressing challenges such as attack diversity and scalability in large-scale IoT systems. By employing network clustering and observer nodes with localized detection models that collaborate via majority voting, the system achieved remarkable detection accuracies of 99.72% and 98.36% on the NSLKDD and NSW-NB15 datasets, respectively. However, despite these advancements, existing IDS frameworks often underutilize the interpretability advantages of fuzzy inference systems, leaning instead on black-box models that entail high computational complexity and limited explainability. This gap motivates our proposed work to develop an efficient, lightweight, and interpretable IDS that combines fuzzy inference with ensemble decision-tree classifiers, notably the J48 algorithm, to address the evolving security demands of IoMT environments. Our approach aims to deliver robust, transparent, and resource-aware intrusion detection tailored to the heterogeneous and constrained nature of medical networks.
Table 1 provides a comparison of studies based on ML/DL for IoMT network attack detection and mitigation.