Optimized Fuzzy Secure Scheme for Trust Assessment in IoMT
DOI:
https://doi.org/10.26636/jtit.2026.2.2494Keywords:
IoMT, fuzzy logic, trust management, security, optimizationAbstract
Rapid development of technologies associated with the Internet of Medical Things (IoMT) has enabled continuous patient monitoring, diagnosis, and integration of medical devices with various healthcare infrastructures. However, the increasing heterogeneity of IoMT systems and their connectivity-related features introduce also security risks, such as data tampering, unauthorized access, and unsafe behavior of the devices themselves. Traditional trust assessment techniques often fail to handle the uncertainty inherent in medical data and devices. This paper presents a fuzzy logic-based secure trust assessment scheme designed for IoMT, which integrates behavioral and communication indicators to compute trust scores for a device. The scheme employs a fuzzy logic-based approach and provides a trust level evaluation procedure suitable for resource-limited IoMT devices. A fuzzy inference system was developed specifically for this scheme and further optimized by applying evolutionary algorithms. The experimental results demonstrate an improved accuracy of the optimized model in evaluating the trust level of devices and show its enhanced accuracy compared to a classical trust mechanism.
Downloads
References
[1] N. Khatoon, S. Roy, and P. Pranav, "A Survey on Applications of Internet of Things in Healthcare", in: Internet of Things and Big Data Applications, Springer International Publishing, pp. 89-106, 2020. DOI: https://doi.org/10.1007/978-3-030-39119-5_6
View in Google Scholar
[2] Z. Shouran, A. Ashari, and T. Kuntoro, "Internet of Things (IoT) of Smart Home: Privacy and Security", International Journal of Computer Applications, vol. 182, pp. 3-8, 2019. DOI: https://doi.org/10.5120/ijca2019918450
View in Google Scholar
[3] J.J. Hathaliya and S. Tanwar, "An Exhaustive Survey on Security and Privacy Issues in Healthcare 4.0", Computer Communications, vol. 153, pp. 311-335, 2020. DOI: https://doi.org/10.1016/j.comcom.2020.02.018
View in Google Scholar
[4] W. Najib, S. Sulistyo, and Widyawan, "Survey on Trust Calculation Methods in Internet of Things", Procedia Computer Science, vol. 161, pp. 1300-1307, 2019.
View in Google Scholar
[5] G.J. Blinowski, "Risk-based Decision Making in IoT Systems", Proc. of 38th International Conference on Information Systems Architecture and Technology - ISAT 2017, pp. 230-241, 2017. DOI: https://doi.org/10.1007/978-3-319-67220-5_21
View in Google Scholar
[6] A.M. Konsta, A.L. Lafuente, and N. Dragoni, "A Survey of Trust Management for Internet of Things", IEEE Access, vol. 11, pp. 122175-122204, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3327335
View in Google Scholar
[7] A. Chacko and T. Hayajneh, "Security and Privacy Issues with IoT in Healthcare", EAI Endorsed Transactions on Pervasive Health and Technology, vol. 4, art. no. e2, 2018. DOI: https://doi.org/10.4108/eai.13-7-2018.155079
View in Google Scholar
[8] P.K.D. Pramanik, G. Pareek, and A. Nayyar, "Security and Privacy in Remote Healthcare", Telemedicine Technologies, pp. 201-225, 2019. DOI: https://doi.org/10.1016/B978-0-12-816948-3.00014-3
View in Google Scholar
[9] C. Butpheng, K.-H. Yeh, and H. Xiong, "Security and Privacy in IoT-Cloud-Based e-Health Systems - A Comprehensive Review", Symmetry, vol. 12, art. no. 1191, 2020. DOI: https://doi.org/10.3390/sym12071191
View in Google Scholar
[10] I. Sadek, S.U. Rehman, J. Codjo, and B. Abdulrazak, "Privacy and Security of IoT Based Healthcare Systems: Concerns, Solutions, and Recommendations", Lecture Notes in Computer Science, vol. 11862, pp. 3-17, 2019. DOI: https://doi.org/10.1007/978-3-030-32785-9_1
View in Google Scholar
[11] S. Albishi, B. Soh, A. Ullah, and F. Algarni, "Challenges and Solutions for Applications and Technologies in the Internet of Things", Procedia Computer Science, vol. 124, pp. 608-614, 2017. DOI: https://doi.org/10.1016/j.procs.2017.12.196
View in Google Scholar
[12] C. Fernandez-Gago, F. Moyano, and J. Lopez, "Modelling Trust Dynamics in the Internet of Things", Information Sciences, vol. 396, pp. 72-82, 2017. DOI: https://doi.org/10.1016/j.ins.2017.02.039
View in Google Scholar
[13] Z. Yan, P. Zhang, and A.V. Vasilakos, "A Survey on Trust Management for Internet of Things", Journal of Network and Computer Applications, vol. 42, pp. 120-134, 2014. DOI: https://doi.org/10.1016/j.jnca.2014.01.014
View in Google Scholar
[14] W. Najib, S. Sulistyo, and Widyawan, "Survey on Trust Calculation Methods in Internet of Things", Procedia Computer Science, vol. 161, pp. 1300-1307, 2019. DOI: https://doi.org/10.1016/j.procs.2019.11.245
View in Google Scholar
[15] A. Rauf, R.A. Shaikh, and A. Shah, "Trust Modelling and Management for IoT Healthcare", International Journal of Wireless and Microwave Technologies, vol. 12, pp. 21-35, 2022. DOI: https://doi.org/10.5815/ijwmt.2022.05.03
View in Google Scholar
[16] L. Gu, J. Wang, and B. Sun, "Trust Management Mechanism for Internet of Things", China Communications, vol. 11, pp. 148-156, 2014. DOI: https://doi.org/10.1109/CC.2014.6821746
View in Google Scholar
[17] M. Ammar, G. Russello, and B. Crispo, "Internet of Things: A Survey on the Security of IoT Frameworks", Journal of Information Security and Applications, vol. 38, pp. 8-27, 2018. DOI: https://doi.org/10.1016/j.jisa.2017.11.002
View in Google Scholar
[18] A. Mosenia and N. K. Jha, "A Comprehensive Study of Security of Internet-of-Things", IEEE Transactions on Emerging Topics in Computing, vol. 5, pp. 586-602, 2017. DOI: https://doi.org/10.1109/TETC.2016.2606384
View in Google Scholar
[19] U. Jayasinghe, N.B. Truong, G.M. Lee, and T.-W. Um, "RpR: A Trust Computation Model for Social Internet of Things", 2016 Int. IEEE Conferences on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Tolouse, France, 2016. DOI: https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0146
View in Google Scholar
[20] F. Fei et al., "A K-anonymity Based Schema for Location Privacy Preservation", IEEE Transactions on Sustainable Computing, vol. 4, pp. 156-167, 2019. DOI: https://doi.org/10.1109/TSUSC.2017.2733018
View in Google Scholar
[21] F. Jiang et al., "Deep Learning Based Multi-channel Intelligent Attack Detection for Data Security", IEEE Transactions on Sustainable Computing, vol. 5, pp. 204-212, 2020. DOI: https://doi.org/10.1109/TSUSC.2018.2793284
View in Google Scholar
[22] I.U. Din et al., "LightTrust: Lightweight Trust Management for Edge Devices in Industrial Internet of Things", IEEE Internet of Things Journal, vol. 10, pp. 2776-2783, 2023. DOI: https://doi.org/10.1109/JIOT.2021.3081422
View in Google Scholar
[23] J. Chen et al., "Trust Architecture and Reputation Evaluation for Internet of Things", Journal of Ambient Intelligence and Humanized Computing, vol. 10, pp. 3099-3107, 2018. DOI: https://doi.org/10.1007/s12652-018-0887-z
View in Google Scholar
[24] S.W.A. Hamdani et al., "Dynamic Distributed Trust Management Scheme for the Internet of Things", Turkish Journal of Electrical Engineering and Computer Sciences, vol. 29, pp. 796-815, 2021. DOI: https://doi.org/10.3906/elk-2003-5
View in Google Scholar
[25] M. Alruwaythi and K.E. Nygard, "Fuzzy Logic Approach Based on User Behavior Trust in Cloud Security", 2019 IEEE International Conference on Electro Information Technology (EIT), Brookings, USA, 2019. DOI: https://doi.org/10.1109/EIT.2019.8834173
View in Google Scholar
[26] M.D. Alshehri and F.K. Hussain, "A Fuzzy Security Protocol for Trust Management in the Internet of Things (Fuzzy-IoT)", Computing, vol. 101, pp. 791-818, 2018. DOI: https://doi.org/10.1007/s00607-018-0685-7
View in Google Scholar
[27] P. Singh et al., "Service Versus Protection: A Bayesian Learning Approach for Trust Provisioning in Edge of Things Environment", IEEE Internet of Things Journal, vol. 9, pp. 22061-22070, 2022. DOI: https://doi.org/10.1109/JIOT.2021.3082272
View in Google Scholar
[28] U. Jayasinghe, G.M. Lee, T.-W. Um, and Q. Shi, "Machine Learning Based Trust Computational Model for IoT Services", IEEE Transactions on Sustainable Computing, vol. 4, pp. 39-52, 2019. DOI: https://doi.org/10.1109/TSUSC.2018.2839623
View in Google Scholar
[29] K. Prathapchandran and T. Janani, "A Trust-based Security Model to Detect Misbehaving Nodes in Internet of Things (IoT) Environment using Logistic Regression", Journal of Physics: Conference Series, vol. 1850, art. no. 012031, 2021. DOI: https://doi.org/10.1088/1742-6596/1850/1/012031
View in Google Scholar
[30] P. Kannimuthu and J. Thangamuthu, "Decision Tree Trust (DTTrust)-based Authentication Mechanism to Secure RPL Routing Protocol on Internet of Battlefield Thing (IoBT)", International Journal of Business Data Communications and Networking, vol. 17, pp. 1-24, 2021. DOI: https://doi.org/10.4018/IJBDCN.2021010101
View in Google Scholar
[31] L. Liu et al., "A Detection Framework Against CPMA Attack Based on Trust Evaluation and Machine Learning in IoT Network", IEEE Internet of Things Journal, vol. 8, pp. 15249-15258, 2021. DOI: https://doi.org/10.1109/JIOT.2020.3047642
View in Google Scholar
[32] M.M. Hassan et al., "A Robust Deep-learning-enabled Trust-boundary Protection for Adversarial Industrial IoT Environment", IEEE Internet of Things Journal, vol. 8, pp. 9611-9621, 2021. DOI: https://doi.org/10.1109/JIOT.2020.3019225
View in Google Scholar
[33] Y. Alghofaili and M.A. Rassam, "A Trust Management Model for IoT Devices and Services Based on the Multi-criteria Decision-making Approach and Deep Long Short-term Memory Technique", Sensors, vol. 22, art. no. 634, 2022. DOI: https://doi.org/10.3390/s22020634
View in Google Scholar
[34] N.A. Azeez and C.V. der Vyver, "Security and Privacy Issues in e-health Cloud-based System: A Comprehensive Content Analysis", Egyptian Informatics Journal, vol. 20, pp. 97-108, 2019. DOI: https://doi.org/10.1016/j.eij.2018.12.001
View in Google Scholar
[35] A. Almogren et al., "FTM-IoMT: Fuzzy-based Trust Management for Preventing Sybil Attacks in Internet of Medical Things", IEEE Internet of Things Journal, vol. 8, pp. 4485-4497, 2021. DOI: https://doi.org/10.1109/JIOT.2020.3027440
View in Google Scholar
[36] S.E. Ali et al., "BFT-IoMT: A Blockchain-based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things", Sensors, vol. 23, art. no. 4265, 2023. DOI: https://doi.org/10.3390/s23094265
View in Google Scholar
[37] L. Yang et al., "An Intelligent Trust Cloud Management Method for Secure Clustering in 5G Enabled Internet of Medical Things", arXiv, 2022. DOI: https://doi.org/10.1109/TII.2021.3128954
View in Google Scholar
[38] S. Dadkhah et al., "CICIoMT2024: A Benchmark Dataset for Multi-protocol Security Assessment in IoMT", Internet of Things, vol. 28, art. no. 101351, 2024. DOI: https://doi.org/10.1016/j.iot.2024.101351
View in Google Scholar
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Olena Semenova, Olha Voitsekhovska, Andrii Dzhus, Vladyslav Kuzniak

This work is licensed under a Creative Commons Attribution 4.0 International License.