Securing Medical IoT Devices: AI-Based Approaches to Vulnerability Management
Keywords:
Medical IoT, Vulnerability Management, Artificial Intelligence, Machine Learning, Cybersecurity, Random Forest, Anomaly Detection, Healthcare Security.Abstract
Medical Internet of Things (IoT) devices are becoming a big part of modern healthcare because they let doctors keep an eye on patients and make decisions based on data. But their extensive use has revealed serious weaknesses that put patient safety and data privacy at risk. This study looked into using AI to manage vulnerabilities in medical IoT environments. We used real-world datasets and expert opinions to create and test machine learning models including Random Forest, Support Vector Machines, and Autoencoders to see how well they could find and categorize device vulnerabilities. The AI models were integrated into an automated vulnerability management framework, which demonstrated high detection accuracy, low false positive rates, and efficient response times within a simulated hospital network. Feedback from experts stressed the framework's usefulness in real life and the necessity for ongoing improvements to avoid alert fatigue. The findings confirm that AI-driven vulnerability management can significantly enhance the security posture of medical IoT devices, ensuring safer and more resilient healthcare delivery.
Downloads
References
Ahmed, S., Ilyas, M., & Raja, M. Y. A. (2022). IoT based smart systems using machine learning (ML) and artificial intelligence (AI): vulnerabilities and intelligent solutions. no. Icsit, 56-61.
Alabdulatif, A., Khalil, I., & Saidur Rahman, M. (2022). Security of blockchain and AI-empowered smart healthcare: application-based analysis. Applied Sciences, 12(21), 11039.
Al-Attar, B. (2023). Network Security in AI-based healthcare systems. Babylonian Journal of Networking, 2023, 112-124.
Bajpayi, P., Sharma, S., & Gaur, M. S. (2024, March). AI Driven IoT Healthcare Devices Security Vulnerability Management. In 2024 2nd International Conference on Disruptive Technologies (ICDT) (pp. 366-373). IEEE.
Bala, I., Pindoo, I., Mijwil, M. M., Abotaleb, M., & Yundong, W. (2024). Ensuring security and privacy in Healthcare Systems: a Review Exploring challenges, solutions, Future trends, and the practical applications of Artificial Intelligence. Jordan Medical Journal, 58(3).
Chakraborty, C., Nagarajan, S. M., Devarajan, G. G., Ramana, T. V., & Mohanty, R. (2023). Intelligent AI-based healthcare cyber security system using multi-source transfer learning method. ACM Transactions on Sensor Networks.
Garg, N., Petwal, R., Wazid, M., Singh, D. P., Das, A. K., & Rodrigues, J. J. (2023). On the design of an AI-driven secure communication scheme for internet of medical things environment. Digital Communications and Networks, 9(5), 1080-1089.
Gilbert, C., & Gilbert, M. (2024). AI-Driven Threat Detection in the Internet of Things (IoT), Exploring Opportunities and Vulnerabilities.
Gopalan, S. S., Raza, A., & Almobaideen, W. (2021, March). IoT security in healthcare using AI: A survey. In 2020 International Conference on Communications, Signal Processing, and their Applications (ICCSPA) (pp. 1-6). IEEE.
Humayun, M., Tariq, N., Alfayad, M., Zakwan, M., Alwakid, G., & Assiri, M. (2024). Securing the Internet of Things in artificial intelligence era: A comprehensive survey. IEEE access, 12, 25469-25490.
Imoize, A. L., Balas, V. E., Solanki, V. K., Lee, C. C., & Obaidat, M. S. (Eds.). (2023). Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things. Boca Raton, FL, USA:: CRC press.
Mazhar, T., Talpur, D. B., Shloul, T. A., Ghadi, Y. Y., Haq, I., Ullah, I., ... & Hamam, H. (2023). Analysis of IoT security challenges and its solutions using artificial intelligence. Brain Sciences, 13(4), 683.
Radanliev, P., De Roure, D., Maple, C., Nurse, J. R., Nicolescu, R., & Ani, U. (2024). AI security and cyber risk in IoT systems. Frontiers in Big Data, 7, 1402745.
Sankaran, K. S., Kim, T. H., & Renjith, P. N. (2023). An improved ai-based secure m-trust privacy protocol for medical internet of things in smart healthcare system. IEEE Internet of Things Journal, 10(21), 18477-18485.
Zaman, S., Alhazmi, K., Aseeri, M. A., Ahmed, M. R., Khan, R. T., Kaiser, M. S., & Mahmud, M. (2021). Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey. Ieee Access, 9, 94668-94690.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.