Securing AI-Enabled IoT Healthcare Devices: Practical Solutions for Protecting Patient Data

Authors

  • Baha Eldin Hamouda Hassan Hamouda Department of Information Technology, Gulf Colleges, Hafar Al-Batin, Saudi Arabia

DOI:

https://doi.org/10.54536/ajmri.v4i4.3017

Keywords:

Advanced Encryption Standard (AES), Artificial Intelligence, Data Breach Prevention, Data Loss Prevention, End-to-End Encryption, Internet of Things (IoT), Use of Healthcare Devices

Abstract

AI provides a biometrics authentication system to enhance a patient’s security, which requires unique physiological and behavioral characteristics to access it easily, and AI facilitates patient data through homomorphic encryption, differential privacy, and federation learning, allowing data to be analyzed and shared without exposing sensitive information. AI analyses user behavior patterns to detect potential insider threats or unauthorized access to patient data. The study highlight the centers on the security issues in IoT-based healthcare systems and presents a comprehensive framework designed to safeguard patient data. The study depicts the use of a method of a systematic literature review (SLR) to extract results and analyze unique security risks and their association with AI that enables IoT devices in healthcare. Furthermore, the results showed that implementation of continuous monitoring and audit mechanism is to respond and detected to its security incident implementation of continuous monitoring and audit mechanism is to respond and detected to security incident implementation of continuous monitoring and audit mechanisms is to respond and detect security incidents promptly. In conclusion, the given article addressed IoT solutions in healthcare, such as interoperability challenges and resource constraints. In an intrusion detection system, log monitoring irregularity detection is helpful for identification of unauthorised identification of unauthorized access for suspicious activities. Overall, the adoption of AI enables healthcare to rely on collecting and storing large patient data volumes. As a result, the data can be vulnerable to breaches, unauthorized access, and misuse.

Downloads

Download data is not yet available.

References

Akkaoui, R. (2021). Blockchain for the management of Internet of Things devices in the medical industry. IEEE Transactions on Engineering Management.

Ali, A., Almaiah, M. A., Hajjej, F., Pasha, M. F., Fang, O. H., Khan, R., Teo, J., & Zakarya, M. (2022). An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network. Sensors, 22(2), 572.

Alshamrani, M. (2022). IoT and artificial intelligence implementations for remote healthcare monitoring systems: A survey. Journal of King Saud University-Computer and Information Sciences, 34(8), 4687-4701.

Anantharam, P., Banerjee, T., Sheth, A., Thirunarayan, K., Marupudi, S., Sridharan, V., & Forbis, S. G. (2015). Knowledge-driven personalized contextual mHealth service for asthma management in children. In 2015 IEEE International Conference on Mobile Services (pp. 228–235). IEEE.

Angehrn, Z., Haldna, L., Zandvliet, A. S., Gil Berglund, E., Zeeuw, J., Amzal, B., Cheung, S. A., Polasek, T. M., Pfister, M., & Kerbusch, T. (2020). Artificial intelligence and machine learning applied at the point of care. Frontiers in Pharmacology, 11, 759.

Anuradha, M., Jayasankar, T., Prakash, N., Sikkandar, M. Y., Hemalakshmi, G., Bharatiraja, C., & Britto, A. S. F. (2021). IoT enabled cancer prediction system to enhance the authentication and security using cloud computing. Microprocessors and Microsystems, 80, 103301.

Butpheng, C., Yeh, K.-H., & Xiong, H. (2020). Security and privacy in IoT-cloud-based e-health systems—A comprehensive review. Symmetry, 12(7), 1191.

Cakir, E. (2013). Single sign-on: Risks and opportunities of using SSO (Single Sign-On) in a complex system environment with a focus on overall security aspects. In Proceedings of the International Conference on Security and Privacy (pp. 69–79).

Castillo O’Sullivan, A., & Thierer, A. D. (2015). Projecting the growth and economic impact of the Internet of Things. SSRN.

Chacko, A., & Hayajneh, T. (2018). Security and privacy issues with IoT in healthcare. EAI Endorsed Transactions on Pervasive Health and Technology, 4(14).

Dang, L. M., Piran, M. J., Han, D., Min, K., & Moon, H. (2019). A survey on internet of things and cloud computing for healthcare. Electronics, 8(7), 768.

Dissanayake, N., Jayatilaka, A., Zahedi, M., & Babar, M. A. (2022). Software security patch management-A systematic literature review of challenges, approaches, tools and practices. Information and Software Technology, 144, 106771.

Gonçalves, E. d. A. (2023). Analysis of implementation of a Security Information and Events Management (SIEM) System in Public Business Entities (PBE) hospitals.

González-Granadillo, G., González-Zarzosa, S., & Diaz, R. (2021). Security information and event management (SIEM): analysis, trends, and usage in critical infrastructures. Sensors, 21(14), 4759.

Gope, P., Das, A. K., Kumar, N., & Cheng, Y. (2019). Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Transactions on Industrial Informatics, 15(9), 4957-4968.

Gope, P., & Sikdar, B. (2018). Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet of Things Journal, 6(1), 580-589.

Gupta, A., Tripathi, M., Shaikh, T. J., & Sharma, A. (2019). A lightweight anonymous user authentication and key establishment scheme for wearable devices. Computer Networks, 149, 29-42.

Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2-3), 293–315.

Khashan, O. A., Ahmad, R., & Khafajah, N. M. (2021). An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Networks, 115, 102448.

Kumar, R., Kumar, P., Tripathi, R., Gupta, G. P., Islam, A. N., & Shorfuzzaman, M. (2022). Permissioned blockchain and deep learning for secure and efficient data sharing in industrial healthcare systems. IEEE Transactions on Industrial Informatics, 18(11), 8065-8073.

Kute, S. S., Tyagi, A. K., & Aswathy, S. (2022). Security, privacy and trust issues in internet of things and machine learning based e-healthcare. Intelligent Interactive Multimedia Systems for e-Healthcare Applications, 291-317.

Liu, R., Weng, Z., Hao, S., Chang, D., Bao, C., & Li, X. (2020). Addressless: enhancing IoT server security using IPv6. IEEE Access, 8, 90294-90315.

Maleh, Y., Lakkineni, S., Tawalbeh, L. A., & AbdEl-Latif, A. A. (2022). Blockchain for cyber-physical systems: Challenges and applications. In Advances in blockchain technology for cyber-physical systems (pp. 11–59). Springer.

Medileh, S., Laouid, A., Euler, R., Bounceur, A., Hammoudeh, M., AlShaikh, M., Eleyan, A., & Khashan, O. A. (2020). A flexible encryption technique for the internet of things environment. Ad Hoc Networks, 106, 102240.

Sakhawat, A. R., Fatima, A., Abbas, S., Ahmad, M., & Khan, M. A. (2024). Emerging technologies for enhancing robust cybersecurity measures for business intelligence in Healthcare 5.0. In Strengthening industrial cybersecurity to protect business intelligence (pp. 270–293). Springer.

Sanci, L., Williams, I., Russell, M., Chondros, P., Duncan, A.-M., Tarzia, L., Peter, D., Lim, M. S., Tomyn, A., & Minas, H. (2022). Towards a health promoting university: descriptive findings on health, wellbeing and academic performance amongst university students in Australia. BMC Public Health, 22(1), 1-24.

Sardar, A., Umer, S., Rout, R. K., Wang, S.-H., & Tanveer, M. (2023). A secure face recognition for IoT-enabled healthcare system. ACM Transactions on Sensor Networks, 19(3), 1-23.

Sharma, S., Chen, K., & Sheth, A. (2018). Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems. IEEE Internet Computing, 22(2), 42-51.

Singh, N., Buyya, R., & Kim, H. (2024). Securing cloud-based Internet of Things: Challenges and mitigations. arXiv preprint arXiv:2402.00356.

Srinivas, J., Das, A. K., Kumar, N., & Rodrigues, J. J. (2018). Cloud centric authentication for wearable healthcare monitoring system. IEEE Transactions on Dependable and Secure Computing, 17(5), 942-956.

Stuurman, K., & Kamara, I. (2016). IoT standardization—the approach in the field of data protection as a model for ensuring compliance of IoT applications? In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) (pp. 182–188). IEEE.

Thilagam, K., Beno, A., Lakshmi, M. V., Wilfred, C. B., George, S. M., Karthikeyan, M., Peroumal, V., Ramesh, C., & Karunakaran, P. (2022). Secure IoT Healthcare Architecture with Deep Learning-Based Access Control System. Journal of Nanomaterials, 2022.

Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based internet of things. International Journal of Distributed Sensor Networks, 9(8), 794326.

Wang, M., Zhu, T., Zhang, T., Zhang, J., Yu, S., & Zhou, W. (2020). Security and privacy in 6G networks: New areas and new challenges. Digital Communications and Networks, 6(3), 281-291.

Zhang, X., & Hoshino, K. (2019). Implantable and wearable sensors. In S. K. Saha & S. K. Ghosh (Eds.), Biomedical sensors and instrumentation (pp. 489–545). Elsevier. https://doi.org/10.1016/B978-0-12-814862-4.00008-9

Downloads

Published

2025-06-26

How to Cite

Hassan Hamouda, B. E. H. (2025). Securing AI-Enabled IoT Healthcare Devices: Practical Solutions for Protecting Patient Data. American Journal of Multidisciplinary Research and Innovation, 4(4), 91–101. https://doi.org/10.54536/ajmri.v4i4.3017