AI-Enhanced Threat Intelligence in Remote Patient Monitoring Systems: A Survey on Recent Advances, Challenges and Future Research Directions

被引:0
作者
Trivedi, Jolly [1 ]
Tahir, Mohammad [1 ]
Isoaho, Jouni [1 ]
机构
[1] Univ Turku, Dept Comp, Turku 20540, Finland
关键词
Artificial intelligence; Security; Medical services; Threat assessment; Computer security; Surveys; Cyber threat intelligence; Real-time systems; Federated learning; Privacy; Remote patient monitoring (RPM); telemedicine; human digital twin (HDT); pseudonymization; security; privacy; cloud; artificial intelligence; cyber threat intelligence (CTI); HIPAA; GDPR; machine learning; federated learning; anomaly detection; threat detection; healthcare security; personalized healthcare;
D O I
10.1109/ACCESS.2025.3572626
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern healthcare is increasingly relying on Remote Patient Monitoring (RPM) systems, which continuously collect health data and provide the ability to monitor patients in real-time. RPM systems are extremely susceptible to cyber threats due to their growing reliance on interconnected devices and hence need comprehensive security. AI has emerged as a crucial technology for addressing security issues in RPM systems. The objective of this survey is to understand the impact on the security of RPM systems by integrating Artificial Intelligence (AI) with threat intelligence. This survey analyzed 86 research articles from leading databases related to AI models, security of RPM systems, anomaly detection, and architectural solutions, in addition to 24 articles related to existing RPMs. This survey article emphasizes that RPM systems become much more resilient when automated attack mitigation, real-time anomaly detection, and predictive analytics are provided by AI-powered models. To secure the sensitive data in RPM, this survey discusses how AI can be applied to various architectural solutions, including edge computing, cloud integration, blockchain technology, and Federated Learning (FL). Furthermore, the benefits and challenges of deploying AI-driven threat intelligence, cross-platform compatibility, and the need for explainable AI to improve trust in automatically made decisions are presented. Moreover, this review highlights research gaps, including the necessity of comprehensive end-to-end architectures for maintaining security and privacy in RPM systems. It is revealed through this survey that AI-powered threat intelligence enhances RPM security considerably due to its ability of continuous monitoring, adaptive defense mechanisms, and early detection of threats. However, challenges such as the explainability of AI models persist and necessitate continued innovation. The survey paper suggests integrating AI-enhanced threat Detection as a Service (TDaas) that implements FL to transform the existing RPM security system, and ultimately contributes to a secure and reliable threat detection system in healthcare. This review provides a roadmap for future research in the area of AI-driven threat intelligence security for RPM systems and offers insights for developing resilient healthcare infrastructure.
引用
收藏
页码:106465 / 106488
页数:24
相关论文
共 113 条
[1]   Patient-generated health data management and quality challenges in remote patient monitoring [J].
Abdolkhani, Robab ;
Gray, Kathleen ;
Borda, Ann ;
DeSouza, Ruth .
JAMIA OPEN, 2019, 2 (04) :471-478
[2]   IoT-Based Healthcare-Monitoring System towards Improving Quality of Life: A Review [J].
Abdulmalek, Suliman ;
Nasir, Abdul ;
Jabbar, Waheb A. ;
Almuhaya, Mukarram A. M. ;
Bairagi, Anupam Kumar ;
Khan, Md Al-Masrur ;
Kee, Seong-Hoon .
HEALTHCARE, 2022, 10 (10)
[3]   Explainable AI for Event and Anomaly Detection and Classification in Healthcare Monitoring Systems [J].
Abououf, Menatalla ;
Singh, Shakti ;
Mizouni, Rabeb ;
Otrok, Hadi .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (02) :3446-3457
[4]   Exploring the matrix: knowledge, perceptions and prospects of artificial intelligence and machine learning in Nigerian healthcare [J].
Adigwe, Obi Peter ;
Onavbavba, Godspower ;
Sanyaolu, Saheed Ekundayo .
FRONTIERS IN ARTIFICIAL INTELLIGENCE, 2024, 6
[5]  
Ahmed S., 2023, P IEEE ACM INT WORKS, P1
[6]  
Albahar A., 2023, J. Knowl. Learn. Sci. Technol., V2, P242
[7]   Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline [J].
Alevizos, Lampis ;
Dekker, Martijn .
ELECTRONICS, 2024, 13 (11)
[8]  
Alevizos L, 2024, Arxiv, DOI arXiv:2403.03265
[9]   A Lightweight and Secure Authentication Scheme for Remote Monitoring of Patients in IoMT [J].
Ali, Zohaib ;
Mahmood, Saba ;
Ul Hassan, Khwaja Mansoor ;
Daud, Ali ;
Alharbey, Riad ;
Bukhari, Amal .
IEEE ACCESS, 2024, 12 :73004-73020
[10]   A Mini Literature Review on Challenges and Opportunity in Threat Intelligence [J].
Althamir, Mohammed A. ;
Boodai, Jawhara Z. ;
Rahman, M. M. Hafizur .
2023 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION, ICAIIC, 2023, :558-563