{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T10:22:28Z","timestamp":1778494948902,"version":"3.51.4"},"reference-count":45,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T00:00:00Z","timestamp":1692057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Internet of Medical Things (IoMT) is an ecosystem composed of connected electronic items such as small sensors\/actuators and other cyber-physical devices (CPDs) in medical services. When these devices are linked together, they can support patients through medical monitoring, analysis, and reporting in more autonomous and intelligent ways. The IoMT devices; however, often do not have sufficient computing resources onboard for service and security assurance while the medical services handle large quantities of sensitive and private health-related data. This leads to several research problems on how to improve security in IoMT systems. This paper focuses on quantum machine learning to assess security vulnerabilities in IoMT systems. This paper provides a comprehensive review of both traditional and quantum machine learning techniques in IoMT vulnerability assessment. This paper also proposes an innovative fused semi-supervised learning model, which is compared to the state-of-the-art traditional and quantum machine learning in an extensive experiment. The experiment shows the competitive performance of the proposed model against the state-of-the-art models and also highlights the usefulness of quantum machine learning in IoMT security assessments and its future applications.<\/jats:p>","DOI":"10.3390\/fi15080271","type":"journal-article","created":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T11:09:44Z","timestamp":1692097784000},"page":"271","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Quantum Machine Learning for Security Assessment in the Internet of Medical Things (IoMT)"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5940-5799","authenticated-orcid":false,"given":"Anand Singh","family":"Rajawat","sequence":"first","affiliation":[{"name":"School of Computer Sciences & Engineering, Sandip University, Nashik 422213, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8411-7630","authenticated-orcid":false,"given":"S. B.","family":"Goyal","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, City University, Petaling Jaya 46100, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1708-6237","authenticated-orcid":false,"given":"Pradeep","family":"Bedi","sequence":"additional","affiliation":[{"name":"School of Computing Science and Engineering, Galgotias University, Greater Noida 203201, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3114-8978","authenticated-orcid":false,"given":"Tony","family":"Jan","sequence":"additional","affiliation":[{"name":"Centre for Artificial Intelligence Research and Optimization, Design and Creative Technology Vertical, Torrens University, Sydney 2007, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2822-0657","authenticated-orcid":false,"given":"Md","family":"Whaiduzzaman","sequence":"additional","affiliation":[{"name":"School of Information Technology, Torrens University, Brisbane 4006, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7745-9667","authenticated-orcid":false,"given":"Mukesh","family":"Prasad","sequence":"additional","affiliation":[{"name":"School of Computer Science, Faculty of Engineering and IT (FEIT), University of Technology Sydney, Sydney 2007, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2023,8,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"e4680","DOI":"10.1002\/ett.4680","article-title":"Artificial intelligence framework-based ultra-lightweight communication protocol for prediction of attacks in Internet of Things environment","volume":"34","author":"Jammula","year":"2023","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"450","DOI":"10.3390\/iot3040024","article-title":"Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control","volume":"3","author":"Hussein","year":"2022","journal-title":"IoT"},{"key":"ref_3","unstructured":"Ramadan, R. (2023, August 12). Internet of Things (iot) Security Vulnerabilities: A Review. Available online: https:\/\/plomscience.com\/journals\/index.php\/PLOMSAI\/article\/view\/14."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"107754","DOI":"10.1016\/j.compeleceng.2022.107754","article-title":"Decision tree based user-centric security solution for critical IoT infrastructure","volume":"99","author":"Puthal","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Hasan, T., Malik, J., Bibi, I., Khan, W.U., Al-Wesabi, F.N., Dev, K., and Huang, G. (2022). Securing industrial internet of things against botnet attacks using hybrid deep learning approach. IEEE Trans. Netw. Sci. Eng.","DOI":"10.36227\/techrxiv.19313318.v3"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Koutras, D., Stergiopoulos, G., Dasaklis, T., Kotzanikolaou, P., Glynos, D., and Douligeris, C. (2020). Security in IoMT communications: A survey. Sensors, 20.","DOI":"10.3390\/s20174828"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1080\/02564602.2021.1927863","article-title":"Internet of medical things (IoMT): Overview, emerging technologies, and case studies","volume":"39","author":"Razdan","year":"2022","journal-title":"IETE Tech. Rev."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1016\/j.future.2019.12.028","article-title":"Securing internet of medical things systems: Limitations, issues and recommendations","volume":"105","author":"Yaacoub","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Bouriche, A., and Bouriche, S. (2022). A systematic review on security vulnerabilities to preveny types of attacks in iomt. Int. J. Comput. Inf. Manuf., 2.","DOI":"10.54489\/ijcim.v2i2.107"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Sadhu, P.K., Yanambaka, V.P., Abdelgawad, A., and Yelamarthi, K. (2022). Prospect of internet of medical things: A review on security requirements and solutions. Sensors, 22.","DOI":"10.3390\/s22155517"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1926","DOI":"10.1109\/COMST.2022.3196449","article-title":"How deep the theory of quantum communications goes: Superadditivity, superactivation and causal activation","volume":"24","author":"Koudia","year":"2022","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"103954","DOI":"10.1016\/j.jobe.2021.103954","article-title":"Structural health monitoring of civil engineering structures by using the internet of things: A review","volume":"48","author":"Mishra","year":"2022","journal-title":"J. Build. Eng."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"101816","DOI":"10.1016\/j.tele.2022.101816","article-title":"Internet of Things Technology: Balancing privacy concerns with convenience","volume":"70","author":"Jeon","year":"2022","journal-title":"Telemat. Inform."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1080\/09540091.2022.2149698","article-title":"Threat analysis model to control IoT network routing attacks through deep learning approach","volume":"34","author":"Janani","year":"2022","journal-title":"Connect. Sci."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"212220","DOI":"10.1109\/ACCESS.2020.3039985","article-title":"Systematic literature review on IoT-based botnet attack","volume":"8","author":"Ali","year":"2020","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Schuld, M., and Petruccione, F. (2018). Supervised Learning with Quantum Computers, Springer.","DOI":"10.1007\/978-3-319-96424-9"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Joshi, S., Sharma, M., Das, R.P., Rosak-Szyrocka, J., \u017bywio\u0142ek, J., Muduli, K., and Prasad, M. (2022). Modeling Conceptual Framework for Implementing Barriers of AI in Public Healthcare for Improving Operational Excellence: Experiences from Developing Countries. Sustainability, 14.","DOI":"10.3390\/su141811698"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Sharma, H., Vyas, V.K., Pandey, R.K., and Prasad, M. (2022). Proceedings of the International Conference on Intelligent Vision and Computing (ICIVC 2021), Sur, Oman, 3\u20134 October 2021, Springer International Publishing.","DOI":"10.1007\/978-3-030-97196-0"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Ban, X., Ding, M., Liu, S., Chen, C., and Zhang, J. (2022, January 9\u201312). A Survey on IoT Vulnerability Discovery. Proceedings of the Network and System Security: 16th International Conference, NSS 2022, Denarau Island, Fiji.","DOI":"10.1007\/978-3-031-23020-2_15"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","article-title":"IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices","volume":"6","author":"Meneghello","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1826","DOI":"10.1109\/TDSC.2020.3037908","article-title":"A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices","volume":"19","author":"Zhao","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"101968","DOI":"10.1016\/j.cose.2020.101968","article-title":"A novel approach for detecting vulnerable IoT devices connected behind a home NAT","volume":"97","author":"Meidan","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"17086","DOI":"10.1038\/s41598-022-21325-x","article-title":"iDetect for vulnerability detection in internet of things operating systems using machine learning","volume":"12","author":"Wassif","year":"2022","journal-title":"Sci. Rep."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Zeng, M., Yu, T., Wang, X., Nguyen, L.T., Mengshoel, O.J., and Lane, I. (2017, January 11\u201314). Semi-supervised convolutional neural networks for human activity recognition. Proceedings of the 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA.","DOI":"10.1109\/BigData.2017.8257967"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Ramezani, S.B., Sommers, A., Manchukonda, H.K., Rahimi, S., and Amirlatifi, A. (2020, January 19\u201324). Machine learning algorithms in quantum computing: A survey. Proceedings of the 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK.","DOI":"10.1109\/IJCNN48605.2020.9207714"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Qu, Z., Meng, Y., Liu, B., Muhammad, G., and Tiwari, P. (2023). QB-IMD: A secure medical data processing system with privacy protection based on quantum blockchain for IoMT. IEEE Internet Things J.","DOI":"10.1109\/JIOT.2023.3285388"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Zanbouri, K., Al-Khafaji, H.M.R., Navimipour, N.J., and Yal\u00e7\u0131n, \u015e. (2023). A new fog-based transmission scheduler on the Internet of multimedia things using a fuzzy-based quantum genetic algorithm. IEEE MultiMedia, 1\u201312.","DOI":"10.1109\/MMUL.2023.3247522"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2100116","DOI":"10.1002\/qute.202100116","article-title":"Quantum communication using semiconductor quantum dots","volume":"5","author":"Vajner","year":"2022","journal-title":"Adv. Quantum Technol."},{"key":"ref_29","unstructured":"Bharathi, M., and Amsaveni, A. (2021). Internet of Medical Things: Remote Healthcare Systems and Applications, Springer."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"101889","DOI":"10.1016\/j.inffus.2023.101889","article-title":"A privacy-aware framework for detecting cyber attacks on internet of medical things systems using data fusion and quantum deep learning","volume":"99","author":"Hossain","year":"2023","journal-title":"Inf. Fusion"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Rahmani, A.M., and Hosseini Mirmahaleh, S.Y. (2022). Flexible-Clustering Based on Application Priority to Improve IoMT Efficiency and Dependability. Sustainability, 14.","DOI":"10.3390\/su141710666"},{"key":"ref_32","unstructured":"Anitha Kumari, K., Padmashani, R., Varsha, R., and Upadhayay, V. (2020). Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm, Springer."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/BF00992698","article-title":"Q-learning","volume":"8","author":"Watkins","year":"1992","journal-title":"Mach. Learn."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Zikria, Y.B., Afzal, M.K., and Kim, S.W. (2020). Internet of multimedia things (IoMT): Opportunities, challenges and solutions. Sensors, 20.","DOI":"10.3390\/s20082334"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MITP.2019.2906442","article-title":"Security and vulnerability of extreme automation systems: The IoMT and IoA case studies","volume":"21","author":"Fiaidhi","year":"2019","journal-title":"IT Prof."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1007\/s11859-016-1162-9","article-title":"A novel vulnerability prediction model to predict vulnerability loss based on probit regression","volume":"21","author":"Geng","year":"2016","journal-title":"Wuhan Univ. J. Nat. Sci."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Imran, M., Zaman, U., Imtiaz, J., Fayaz, M., and Gwak, J. (2021). Comprehensive survey of iot, machine learning, and blockchain for health care applications: A topical assessment for pandemic preparedness, challenges, and solutions. Electronics, 10.","DOI":"10.3390\/electronics10202501"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Manickam, P., Mariappan, S.A., Murugesan, S.M., Hansda, S., Kaushik, A., Shinde, R., and Thipperudraswamy, S. (2022). Artificial intelligence (AI) and internet of medical things (IoMT) assisted biomedical systems for intelligent healthcare. Biosensors, 12.","DOI":"10.3390\/bios12080562"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"98069","DOI":"10.1109\/ACCESS.2019.2926989","article-title":"Advanced Quantum Based Neural Network Classifier and Its Application for Objectionable Web Content Filtering","volume":"7","author":"Patel","year":"2019","journal-title":"IEEE Access"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"3067","DOI":"10.1007\/s00500-017-2954-3","article-title":"Enhanced quantum-based neural network learning and its application to signature verification","volume":"23","author":"Patel","year":"2019","journal-title":"Soft Comput."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1031","DOI":"10.1109\/TETC.2019.2901272","article-title":"A Novel Quantum-Inspired Fuzzy Based Neural Network for Data Classification","volume":"9","author":"Patel","year":"2021","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"50347","DOI":"10.1109\/ACCESS.2019.2891956","article-title":"A Generalized Enhanced Quantum Fuzzy Approach for Efficient Data Clustering","volume":"7","author":"Bharill","year":"2019","journal-title":"IEEE Access"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Chaganti, R., Mourade, A., Ravi, V., Vemprala, N., Dua, A., and Bhushan, B. (2022). A Particle Swarm Optimization and Deep Learning Approach for Intrusion Detection System in Internet of Medical Things. Sustainability, 14.","DOI":"10.3390\/su141912828"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"2271","DOI":"10.1007\/s10586-022-03658-4","article-title":"Federated learning-based AI approaches in smart healthcare: Concepts, taxonomies, challenges and open issues","volume":"26","author":"Rahman","year":"2022","journal-title":"Clust. Comput."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-019-1445-8","article-title":"A systematic review for enabling of develop a blockchain technology in healthcare application: Taxonomy, substantially analysis, motivations, challenges, recommendations and future direction","volume":"43","author":"Hussien","year":"2019","journal-title":"J. Med. Syst."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/8\/271\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:33:56Z","timestamp":1760128436000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/8\/271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,15]]},"references-count":45,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2023,8]]}},"alternative-id":["fi15080271"],"URL":"https:\/\/doi.org\/10.3390\/fi15080271","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,15]]}}}