Intelligent Fusion: A Resilient Anomaly Detection Framework for IoMT Health Devices
Abstract
1. Introduction
- We propose a unified IoMT anomaly detection framework that distinguishes between security incidents, sensor malfunctions, and physiological deterioration through context-aware fusion;
- We design a hybrid architecture combining an XGBoost security classifier and an LSTM autoencoder for physiological and technical deviations, integrated via a calibrated decision layer producing Stable, High-Risk, and Critical alerts;
- We evaluate the framework on CICIoMT2024 and MIMIC-IV, including fault-resilience testing under controlled sensor corruption to assess robustness under operational stress;
- We demonstrate practical feasibility by reporting inference latency and by providing explainability analyses based on SHAP and reconstruction error profiles, which are critical factors for clinical adoption [11].
2. Related Work
2.1. Anomaly Detection in IoMT Networks
2.2. Anomaly Detection in Physiological Signals
2.3. Sensor Fusion and Fault Tolerance
3. The Proposed Anomaly Detection and Fusion Framework
3.1. System Architecture
3.2. Types of Anomalies and Operational Definitions
3.3. Security Anomaly Detection Module
3.3.1. Feature Engineering and Preprocessing
3.3.2. Supervised Classification Model
3.4. Physiological Anomaly Detection Module
3.4.1. Time-Series Data Preparation
3.4.2. Unsupervised Anomaly Detection Model
3.5. The Fusion Layer and Decision Logic
3.5.1. Sensor Health Scoring
3.5.2. Decision Fusion and Final Alerting
4. Experimental Setup
4.1. Security Anomaly Dataset: CICIoMT2024
4.2. Physiological and Technical Anomaly Dataset: MIMIC-IV
4.3. Model Implementation Details
- XGBoost: The security module uses XGBClassifier from the XGBoost library (v2.0). The configuration of the model was for multi-class classification, and it was trained on the GPU (device= “cuda”) for a significant acceleration of the process on the large dataset CICIoMT2024.
- LSTM Autoencoder: The detector of physiological anomalies was implemented in TensorFlow (v2.16) by using the Keras API. The architecture is composed of a symmetric encoder–decoder structure with LSTM layers of 64 units. The model training was accelerated on the GPU, which is typical of many DL models in these steps. It was trained with the goal to minimise the Mean Absolute Error (MAE) loss function using the Adam optimiser, performed using Google Colab Pro, a cloud-based computational platform provided by Google LLC (Mountain View, CA, USA) with an NVIDIA L4 GPU provided through the Colab infrastructure and manufactured by NVIDIA Corporation (Santa Clara, CA, USA).
4.4. Evaluation Metrics
- Detection Metrics: The initial performance of the model was evaluated with a suite of standard metrics: accuracy, precision, recall, F1-score, and the Area Under the Receiver Operating Characteristic Curve (AUC-ROC). For the whole evaluation of the integrated fusion framework, we also report the Matthews Correlation Coefficient (MCC) and Cohen’s Kappa, which are effective in cases of multi-class classification with imbalanced data [40]. Furthermore, we assessed the statistical significance of these overall metrics by the calculation of 95% Bootstrap Confidence Intervals. All the metrics were calculated with the use of the metrics module of the scikit-learn library.
- Fault Resilience: The robustness of the framework was put to the test by measuring the increase in the reconstruction error of the LSTM autoencoder in response to sensor faults that were injected synthetically at various levels of severity (10% to 90%).
- Time Efficiency: To assess the feasibility of an edge deployment, we measured the average latency of inference of each expert model in milliseconds. The measurement was performed by using Python’s time.perf_counter and we calculated the average over 100 cycles of prediction.
- Explainability (Fidelity): The fidelity of the explanations of the security model was measured in a quantitative way. A simple “proxy” model (a DecisionTreeClassifier) was trained with the use of only the top-10 features that were identified by the complex XGBoost model. A fidelity score was then given by comparing the accuracy of the proxy model to that of the original model.
5. Results and Discussion
5.1. Performance of the Security Anomaly Detection Module
- The top 10 most influential features were taken from the complex XGBoost model.
- A simpler, inherently interpretable DecisionTreeClassifier was trained by using only this reduced set of 10 features.
- The performance of the simple model (99.85% 5-fold CV accuracy) was put in comparison with the robust performance of the original complex model (99.91% 5-fold CV accuracy).
5.2. Performance of the Physiological Anomaly Detection Module
5.3. Integrated Fusion Framework Evaluation
5.3.1. Fault Resilience
5.3.2. Privacy Concerns
5.3.3. Time Efficiency for Edge Deployment
5.3.4. Holistic Performance of Fusion Logic
- Soft Risk Calibration: Instead of using raw output scores, a calibrated risk score (risk_cal) was calculated by the normalisation of the raw scores based on their 10th and 90th percentiles. This makes the sensitivity to outliers lower, and it produces a risk distribution that is more stable.
- Intelligent Sample Selection: For every scenario, a representative sample of data was intelligently selected, one for which the calibrated risk score was typical for its category, and not an arbitrary or an extreme example.
- Scenario 1 (Normal operation): The “Normal” scenario correctly assigns a System Stable alert with a corresponding low risk score, thereby confirming the system’s baseline stability.
- Scenarios 2 and 3 (Single-Domain Threats): These results illustrate the balanced logic of the framework. Both a network security attack (Scenario 2) and a significant physiological anomaly (Scenario 3) are correctly identified as High-Risk Detected. Their rescaled scores both fall in an appropriate way within the high-risk band (≥0.5), suggesting that the system is designed to treat threats against both the data integrity and the patient physiology with comparable priority.
- Scenario 4 (Converged Cyber–Physical Threat): The framework correctly identifies the simultaneous occurrence of both a security attack and a physiological anomaly as the highest threat condition and assigns the Critical alert corresponding to the high risk score event. This supports the main objective of the system: successful detection and flagging of the most serious scenario.
5.3.5. Deployment Considerations and Practical Limitations
6. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
| ABP | Arterial Blood Pressure |
| AE | Autoencoder |
| AUC | Area Under the Curve |
| AUROC | Area Under the Receiver Operating Characteristic Curve |
| AUPRC | Area Under the Precision–Recall Curve |
| CPU | Central Processing Unit |
| CSV | Comma-Separated Values |
| DDoS | Distributed Denial of Service |
| DoS | Denial of Service |
| EHR | Electronic Health Record |
| ffill | Forward-fill imputation |
| GPU | Graphics Processing Unit |
| HR | Heart Rate |
| ICU | Intensive Care Unit |
| IoMT | Internet of Medical Things |
| IoT | Internet of Things |
| LSTM | Long Short-Term Memory |
| MAE | Mean Absolute Error |
| MAP | Mean Arterial Pressure |
| MIMIC-IV | Medical Information Mart for Intensive Care IV |
| ML | Machine Learning |
| PR | Precision–Recall |
| RAM | Random Access Memory |
| ROC | Receiver Operating Characteristic |
| RR | Respiratory Rate |
| SpO2 | Peripheral oxygen saturation |
| TEMP | Temperature |
| XGB | Extreme Gradient Boosting (XGBoost) |
Appendix A. Literature Search Strategy
References
- Wei, K.; Zhang, L.; Guo, Y.; Jiang, X. Health monitoring based on Internet of Medical Things: Architecture, enabling technologies, and applications. IEEE Access 2020, 8, 27468–27478. [Google Scholar] [CrossRef]
- Dinstag, G.; Amar, D.; Ingelsson, E.; Ashley, E.; Shamir, R. Personalized prediction of adverse heart and kidney events using baseline and longitudinal data from SPRINT and ACCORD. PLoS ONE 2019, 14, e0219728. [Google Scholar] [CrossRef]
- Dilmaghani, R.S.; Bobarshad, H.; Ghavami, M.; Choobkar, S.; Wolfe, C. Wireless sensor networks for monitoring physiological signals of multiple patients. IEEE Trans. Biomed. Circuits Syst. 2011, 5, 347–356. [Google Scholar] [CrossRef]
- Foorthuis, R. On the nature and types of anomalies: A review of deviations in data. Int. J. Data Sci. Anal. 2021, 12, 297–331. [Google Scholar] [CrossRef]
- Yaacoub, J.; Noura, M.; Noura, H.; Salman, O.; Yaacoub, E.; Couturier, R.; Chehab, A. Securing Internet of Medical Things systems: Limitations, issues and recommendations. Future Gener. Comput. Syst. 2020, 105, 581–606. [Google Scholar] [CrossRef]
- Talukder, M.A.; Hasan, K.F.; Islam, M.M.; Uddin, M.A.; Akhter, A.; Yousuf, M.A.; Alharbi, F.; Moni, M.A. A dependable hybrid machine learning model for network intrusion detection. J. Inf. Secur. Appl. 2023, 71, 103405. [Google Scholar] [CrossRef]
- Reddy, S.; Kaza, V.S.; Mohana, R.M.; Alhameed, M.; Jeribi, F.; Alam, S.; Shuaib, M. Detecting anomalies in smart wearables for hypertension: A deep learning mechanism. Front. Public Health 2025, 12, 1426168. [Google Scholar] [CrossRef]
- Wagan, S.A.; Koo, J.; Siddiqui, I.F.; Qureshi, N.M.F.; Attique, M.; Shin, D.R. A fuzzy-based duo-secure multi-modal framework for IoMT anomaly detection. J. King Saud Univ. Comput. Inf. Sci. 2023, 35, 131–144. [Google Scholar] [CrossRef]
- John, A.; Padinjarathala, A.; Doheny, E.P.; Cardiff, B.; John, D. An evaluation of ECG data fusion algorithms for wearable IoT sensors. Inf. Fusion 2023, 96, 237–251. [Google Scholar] [CrossRef]
- King, R.C.; Villeneuve, E.; White, R.J.; Sherratt, R.S.; Holderbaum, W.; Harwin, W.S. Application of data fusion techniques and technologies for wearable health monitoring. Med. Eng. Phys. 2017, 42, 1–12. [Google Scholar] [CrossRef]
- Kalasampath, K.; Spoorthi, K.N.; Sajeev, S.; Kuppa, S.; Ajay, K.; Maruthamuthu, A. A literature review on applications of explainable artificial intelligence (XAI). IEEE Access 2025, 13, 41111–41140. [Google Scholar] [CrossRef]
- Binbusayyis, A.; Alaskar, H.; Vaiyapuri, T.; Dinesh, M. An investigation and comparison of machine learning approaches for intrusion detection in IoMT network. J. Supercomput. 2022, 78, 17403–17422. [Google Scholar] [CrossRef] [PubMed]
- Koutras, D.; Stergiopoulos, G.; Dasaklis, T.; Kotzanikolaou, P.; Glynos, D.; Douligeris, C. Security in IoMT communications: A survey. Sensors 2020, 20, 4828. [Google Scholar] [CrossRef]
- Khan, A.; Jaouhari, S.; Tamani, N.; Mroueh, L. Knowledge-based anomaly detection: Survey, challenges, and future directions. Eng. Appl. Artif. Intell. 2024, 136, 108996. [Google Scholar] [CrossRef]
- Talukder, M.; Islam, M.; Uddin, M.; Hasan, K.; Sharmin, S.; Alyami, S.; Moni, M. Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction. J. Big Data 2024, 11, 39. [Google Scholar] [CrossRef]
- Han, S.; Xie, M.; Chen, H.; Ling, Y. Intrusion detection in cyber-physical systems: Techniques and challenges. IEEE Syst. J. 2014, 8, 1052–1062. [Google Scholar] [CrossRef]
- Santoro, D.; Ciano, T.; Ferrara, M. A comparison between machine and deep learning models on high stationarity data. Sci. Rep. 2024, 14, 70341. [Google Scholar] [CrossRef]
- Ur Rehman, M.; Bahşi, H. Process-aware security monitoring in industrial control systems: A systematic review and future directions. Int. J. Crit. Infrastruct. Prot. 2024, 47, 100719. [Google Scholar] [CrossRef]
- Naghib, A.; Soleimanian Gharehchopogh, F.; Zamanifar, A. A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: Current status, challenges, and opportunities. Artif. Intell. Rev. 2025, 58, 114. [Google Scholar] [CrossRef]
- Goudarzi, M.; Shaghaghi, A.; Finn, S.; Stillerd, B.; Jha, S. Towards threat modelling of IoT context-sharing platforms. In Proceedings of the IEEE 23rd International Symposium on Network Computing and Applications (NCA), Bertinoro, Italy, 24–26 October 2024; pp. 87–96. [Google Scholar] [CrossRef]
- Hasan, M.; Li, F.; Gouverneur, P.; Piet, A.; Grzegorzek, M. A comprehensive survey and comparative analysis of time series data augmentation in medical wearable computing. PLoS ONE 2025, 20, e0315343. [Google Scholar] [CrossRef]
- Brekke, I.J.; Puntervoll, L.H.; Pedersen, P.B.; Kellett, J.; Brabrand, M. The value of vital sign trends in predicting and monitoring clinical deterioration: A systematic review. PLoS ONE 2019, 14, e0210875. [Google Scholar] [CrossRef]
- Johnson, A.E.W.; Bulgarelli, L.; Shen, L.; Gayles, A.; Shammout, A.; Horng, S.; Pollard, T.J.; Hao, S.; Moody, B.; Gow, B.; et al. MIMIC-IV, a freely accessible electronic health record dataset. Sci. Data 2023, 10, 1. [Google Scholar] [CrossRef]
- Rim, B.; Sung, N.J.; Min, S.D.; Lee, M. Deep learning in physiological signal data: A survey. Sensors 2020, 20, 969. [Google Scholar] [CrossRef]
- Luo, Y.; Cheng, L.; Peng, G.; Yao, D.; Li, J.; Wang, Q. Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities. ACM Comput. Surv. 2021, 54, 85. [Google Scholar] [CrossRef]
- Sahiner, B.; Chen, W.; Samala, R.K.; Petrick, N. Data drift in medical machine learning: Implications and potential remedies. Br. J. Radiol. 2023, 96, 20220878. [Google Scholar] [CrossRef]
- Charlton, P.H.; Marozas, V.; Mejía-Mejía, E.; Kyriacou, P.A.; Mant, J. Determinants of photoplethysmography signal quality at the wrist. PLoS Digit. Health 2025, 4, e0000585. [Google Scholar] [CrossRef] [PubMed]
- Zamanzadeh Darban, Z.; Webb, G.I.; Pan, S.; Aggarwal, C.C.; Salehi, M. Deep learning for time series anomaly detection: A survey. ACM Comput. Surv. 2024, 56, 15. [Google Scholar] [CrossRef]
- Roy, M.; Majumder, S.; Halder, A.; Biswas, U. ECG-NET: A deep LSTM autoencoder for detecting anomalous ECG. Eng. Appl. Artif. Intell. 2023, 124, 106484. [Google Scholar] [CrossRef]
- Ahmed, S.F.; Alam, M.S.B.; Afrin, S.; Rafa, S.J.; Rafa, N.; Gandomi, A.H. Insights into Internet of Medical Things (IoMT): Data fusion, security issues and potential solutions. Inf. Fusion 2024, 102, 102060. [Google Scholar] [CrossRef]
- Senel, N.; Kefferpütz, K.; Doycheva, K.; Elger, G. Multi-sensor data fusion for real-time multi-object tracking. Processes 2023, 11, 501. [Google Scholar] [CrossRef]
- Hall, D.L.; Llinas, J. An introduction to multisensor data fusion. Proc. IEEE 1997, 85, 6–23. [Google Scholar] [CrossRef]
- Ghosh, N.; Paul, R.; Maity, S.; Maity, K.; Saha, S. Fault matters: Sensor data fusion for detection of faults using Dempster–Shafer theory of evidence in IoT-based applications. Expert Syst. Appl. 2020, 162, 113887. [Google Scholar] [CrossRef]
- Singh, S.; Prasad, D. Wireless body area network (WBAN): A review of schemes and protocols. Mater. Today Proc. 2022, 49, 3488–3496. [Google Scholar] [CrossRef]
- Canadian Institute for Cybersecurity. CIC IoMT 2024 Dataset; University of New Brunswick: Fredericton, NB, Canada, 2024; Available online: https://www.unb.ca/cic/datasets/iomt-dataset-2024.html (accessed on 27 July 2025).
- Dadkhah, S.; Pinto Neto, E.C.; Ferreira, R.; Molokwu, R.C.; Sadeghi, S.; Ghorbani, A.A. CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT. Internet Things 2024, 27, 101351. [Google Scholar] [CrossRef]
- Sohail, F.; Bhatti, M.A.M.; Awais, M.; Iqtidar, A. Explainable boosting ensemble methods for intrusion detection in Internet of Medical Things (IoMT) applications. In Proceedings of the 4th International Conference on Digital Futures and Transformative Technologies (ICoDT2), Islamabad, Pakistan, 22–23 October 2024; pp. 1–8. [Google Scholar] [CrossRef]
- Johnson, A.; Bulgarelli, L.; Pollard, T.; Gow, B.; Moody, B.; Horng, S.; Celi, L.A.; Mark, R. MIMIC-IV, version 3.1; PhysioNet: Cambridge, MA, USA, 2024. [CrossRef]
- LeCun, Y.; Bengio, Y.; Hinton, G. Deep learning. Nature 2015, 521, 436–444. [Google Scholar] [CrossRef]
- Chicco, D.; Jurman, G. The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation. BMC Genom. 2020, 21, 6. [Google Scholar] [CrossRef]
- Rabbi, F.; Hossain, N.; Das, S. A comparative analysis of machine learning techniques for detecting probing attack with SHAP algorithm. Expert Syst. Appl. 2025, 271, 126718. [Google Scholar] [CrossRef]
- Çoşkun, K.; Çetin, G. A comparative evaluation of the boosting algorithms for network attack classification. Int. J. 3D Print. Technol. Digit. Ind. 2022, 6, 102–112. [Google Scholar] [CrossRef]
- Moreno Haro, L.M.; Oliveira-Filho, A.; Agard, B.; Tahan, A. Failure detection in sensors via variational autoencoders and image-based feature representation. Sensors 2025, 25, 2175. [Google Scholar] [CrossRef] [PubMed]
- Vincent, P.; Larochelle, H.; Lajoie, I.; Bengio, Y.; Manzagol, P.-A. Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion. J. Mach. Learn. Res. 2010, 11, 3371–3408. Available online: http://jmlr.org/papers/v11/vincent10a.html (accessed on 2 August 2025).










| Work Stream | Representative References | Typical Techniques and Algorithms | Typical Datasets and Benchmarks Used in That Stream | Gap That Motivates Intelligent Fusion |
|---|---|---|---|---|
| IoMT network intrusion and anomaly detection | [12,13,14,15,16,17] | Signature IDS → ML anomaly detection, tree-based ensembles (often boosted trees), CPS-inspired IDS | Flow-based NIDS corpora and IoT/IoMT traffic benchmarks (often CIC-like families), plus IoMT-specific testbeds | Usually treats security in isolation, without physiological context or sensor-quality reasoning |
| Dependable and explainable IDS in IoMT | [6,11] | Ensemble learning with XAI (e.g., SHAP), post hoc interpretability | IoMT intrusion datasets and intrusion benchmarks used for explainability studies | Interpretation is addressed, but cross-domain root-cause separation (security vs. clinical vs. fault) is not central |
| Physiological anomaly detection in clinical time series | [22,23,24,28] | Deep time-series anomaly detection, autoencoders, reconstruction-error pipelines | ICU/EHR resources, prominently MIMIC-family databases | Often under-models artefacts and measurement idiosyncrasies that appear in real monitoring |
| Deep LSTM autoencoder patterns for physiological signals (example line) | [29] | LSTM autoencoders, reconstruction error for anomaly scoring | Annotated physiological repositories (e.g., ECG-centric corpora in that literature) | Typically not connected to adversarial interference, and rarely assessed under explicit sensor-fault stress |
| Sensor integrity, fault detection, and recovery in wearables/WBAN | [27,34] | Fault detection and recovery schemes, signal-quality assessment, robustness heuristics | WBAN/wearable recordings and quality-focused datasets | Surveys highlight that validation is still emerging, and fault tolerance is under-tested at scale |
| IoMT and wearable data fusion frameworks | [8,9,10,30] | Multi-modal fusion (incl. fuzzy frameworks), feature/decision fusion strategies | Wearable multi-sensor streams, ECG fusion evaluations | Fusion is studied, but not explicitly framed as a unified tripartite diagnosis (security, physiology, sensor faults) under calibrated escalation policies |
| General multi-sensor fusion theory and evidence-based fusion | [31,32,33] | Classical multi-sensor fusion, evidence theory (e.g., Dempster–Shafer) | Domain-agnostic, used as a methodological foundation | Provides rationale, but needs operationalisation with IoMT-specific anomaly semantics |
| Group | Attributes |
|---|---|
| Removed protocol identifiers | Protocol Type, HTTP, HTTPS, DNS, Telnet, SMTP, SSH, IRC, TCP, UDP, DHCP, ARP, ICMP, IGMP, IPv, LLC |
| Retained behavioural features | Header Length, Duration, Rate, Srate, Tot sum, Tot size, Min, Max, AVG, Std, IAT, Number, Radius, Magnitude, Variance, Covariance, Weight, Fin flag number, Syn flag number, Rst flag number, Psh flag number, Ack flag number, Ece flag number, Cwr flag number, Fin count, Syn count, Ack count, Rst count |
| Aggregated Category | Example Original Classes Included |
|---|---|
| Normal | Benign |
| DDoS | TCP_IP-DDoS-SYN1, MQTT-DDoS-Connect_Flood, etc. |
| DoS | TCP_IP-DoS-SYN1, MQTT-DoS-Connect_Flood, etc. |
| Recon | Recon-OS_Scan, Recon-Port_Scan, Recon-Ping_Sweep |
| Spoofing | ARP_Spoofing |
| Malformed | MQTT-Malformed_Data |
| Severity Level | Rule Definition (Window Level) | Clinical Interpretation |
|---|---|---|
| Critical | Any of vasopressor use, mechanical ventilation, lactate ≥ 4.0 mmol/L, or mean arterial pressure < 60 mmHg | Proxy for shock, severe respiratory failure, or metabolic stress requiring urgent clinical attention |
| High | If not Critical and any of heart rate > 130 bpm, respiratory rate > 30 bpm, SpO2 < 90%, temperature > 39 °C, or temperature < 35 °C | Proxy for clinically relevant instability or acute deviation from expected physiologic ranges |
| Stable | Otherwise | Proxy for absence of severe instability signals within the window |
| Component | Setting | Value | Notes |
|---|---|---|---|
| MIMIC-IV binning | Resampling interval | 15 min | Fixed grid for irregular charting |
| Selected vitals | Number of channels | 7 | HR, SpO2, RR, ABP (Sys/Dia/Mean), Temperature |
| Sequence construction | Window length | 24 steps | Sliding windows |
| Sequence construction | Stride | 1 | Overlapping windows |
| Split protocol | Unit of split | Subject-level | Leakage-safe partitioning |
| Scaling | Standardisation | Train-only StandardScaler | Prevents information leakage |
| Physiological module | Model | LSTM autoencoder | Reconstruction-based anomaly scoring |
| Physiological module | Loss/optimiser | Reconstruction loss/Adam | Early stopping used (patience-based) |
| Security module | Model | Gradient-boosted trees (XGBoost) | Multiclass classifier on CICIoMT2024 |
| Tuning policy | Hyperparameter optimisation | Not used at scale | Stable configurations, deployment-oriented |
| Tuning policy | Calibration/thresholds | Calib split | Threshold selection as operating point |
| Class | Precision | Recall | F1–Score | Support |
|---|---|---|---|---|
| DDoS | 0.9998 | 0.9999 | 0.9998 | 1,494,156 |
| DoS | 0.9998 | 0.9994 | 0.9996 | 558,803 |
| Malformed | 0.9259 | 0.82 | 0.8697 | 1539 |
| Normal | 0.9791 | 0.995 | 0.987 | 57,820 |
| Recon | 0.9917 | 0.9768 | 0.9842 | 31,118 |
| Spoofing | 0.9013 | 0.8465 | 0.8731 | 4814 |
| Macro Avg | 0.9663 | 0.9396 | 0.9522 | 2,148,250 |
| Weighted Avg | 0.9988 | 0.9988 | 0.9988 | 2,148,250 |
| Mean Accuracy (99.91%) |
| Control Area | Technical Measure | What Is Protected | Practical Note |
|---|---|---|---|
| Data minimisation | Local processing of raw signals, transmit only alerts, and aggregated indicators | Reduces exposure of raw health data | Supports GDPR data minimisation and purpose limitation |
| Encryption in transit | TLS for network communication | Prevents interception during transfer | Applies device to gateway and gateway to server links |
| Encryption at rest | AES 256 for stored artefacts, managed keys with rotation | Protects stored derived data and logs | Limits impact of storage compromise |
| Access control | Role-based access control, least privilege, service account separation | Limits unauthorised access | Supports auditability and operational governance |
| Audit logging | Logging of access and alert generation events | Enables accountability and incident response | Supports security monitoring under HIPAA safeguards |
| Pseudonymisation and retention | Remove direct identifiers, defined retention windows | Limits re-identification risk | Aligns with GDPR storage limitation |
| Model Component | Average Inference Latency (ms) |
|---|---|
| Security | 8.77 |
| Physiological model | 74.75 |
| Fusion | 1.16 |
| Total | 84.69 |
| p95 upper bound | ≈107.30 |
| Fusion Variant | Threshold Critical | Threshold High-Risk | Accuracy | Macro F1 | Balanced Accuracy | MCC |
|---|---|---|---|---|---|---|
| Fusion classifier | 0.82 | 0.15 | 0.9985 | 0.9818 | 0.9866 | 0.9970 |
| Fusion classifier robustness variant (balanced fusion, patched student) | 0.86 | 0.05 | 0.9982 | 0.9839 | 0.9957 | 0.9964 |
| Class | Precision | Recall | F1-Score | FPR |
|---|---|---|---|---|
| Stable | ≈0.91 | ≈0.94 | ≈0.92 | 0.002 |
| High-Risk | ≈0.998 | ≈0.995 | ≈0.996 | 0.028 |
| Critical | ≈0.94 | ≈0.971 | ≈0.955 | 0.003 |
| Class | False Positive Rate (FPR) | False Negative Rate (FNR) |
|---|---|---|
| Stable | <0.2% | ≈3.0% |
| High-Risk | <0.2% | <0.1% |
| Critical | <0.2% | <0.1% |
| Dominant Anomaly Source | Typical Error Pattern | Clinical Interpretation | Practical Mitigation |
|---|---|---|---|
| Network-driven anomalies | High-Risk predicted as Critical, or Critical predicted as High-Risk | Borderline network evidence, ambiguity in severity mapping | Calibrate Critical threshold with safety constraint, monitor alert burden |
| Physiology-driven anomalies | High-Risk predicted as Critical, or Critical predicted as High-Risk | Transition windows around deterioration or recovery | Use window-level smoothing and review high residual channels |
| Sensor-fault-dominated anomalies | Stable predicted as High-Risk | Technical artefacts that mimic instability | Incorporate sensor health weighting and require persistence before escalation |
| Scenarios | Security Status | Physiological/ Technical Status | Calculated Risk Score | Final Framework Decision |
|---|---|---|---|---|
| 1 | Normal | Normal | 0.194 | System Stable |
| 2 | Attack Detected | Normal | 0.880 | High-Risk Detected |
| 3 | Normal | Anomaly Detected | 0.605 | High-Risk Detected |
| 4 | Attack Detected | Anomaly Detected | 0.948 | Critical Alert |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Pastore, F.; Anwar, R.W.; Jabeur, N.H.; Ali, S. Intelligent Fusion: A Resilient Anomaly Detection Framework for IoMT Health Devices. Information 2026, 17, 117. https://doi.org/10.3390/info17020117
Pastore F, Anwar RW, Jabeur NH, Ali S. Intelligent Fusion: A Resilient Anomaly Detection Framework for IoMT Health Devices. Information. 2026; 17(2):117. https://doi.org/10.3390/info17020117
Chicago/Turabian StylePastore, Flavio, Raja Waseem Anwar, Nafaa Hadi Jabeur, and Saqib Ali. 2026. "Intelligent Fusion: A Resilient Anomaly Detection Framework for IoMT Health Devices" Information 17, no. 2: 117. https://doi.org/10.3390/info17020117
APA StylePastore, F., Anwar, R. W., Jabeur, N. H., & Ali, S. (2026). Intelligent Fusion: A Resilient Anomaly Detection Framework for IoMT Health Devices. Information, 17(2), 117. https://doi.org/10.3390/info17020117

