ISA evaluation framework for security of internet of health things system using AHP-TOPSIS methods

L Wang, Y Ali, S Nazir, M Niazi - Ieee Access, 2020 - ieeexplore.ieee.org
L Wang, Y Ali, S Nazir, M Niazi
Ieee Access, 2020ieeexplore.ieee.org
Security has become a vital factor for any Internet of things network but it is of paramount
importance for Internet of Health Things (IoHT). IoHT also known as Internet of Medical
Things (IoMT) is integration of IoT and healthcare environment, where fragile data related to
the patients is transmitted from IoT devices to server. During this transmission, if, any
eavesdropping or intrusion occurs then it will not only lead to the serious mutilation of entire
network but this data will be handled maliciously for wrong doings as well. Therefore, a …
Security has become a vital factor for any Internet of things network but it is of paramount importance for Internet of Health Things (IoHT). IoHT also known as Internet of Medical Things (IoMT) is integration of IoT and healthcare environment, where fragile data related to the patients is transmitted from IoT devices to server. During this transmission, if, any eavesdropping or intrusion occurs then it will not only lead to the serious mutilation of entire network but this data will be handled maliciously for wrong doings as well. Therefore, a proper security is indispensable for IoHT based equipments due to exposure to different attacks. Security of IoHT has been the burning issue in last couple of years. In this regard different security models, surveys, frameworks have been presented. In this article, a proposed Identified Security Attributes (ISA) framework is presented to evaluate the security features of IoHT based device in healthcare environment. The proposed framework uses hybrid MCDM methods such as Analytical Hierarchical Process (AHP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). This framework works in two phase: in first phase the weights of attributes are derived by using AHP method and in second phase security assessment of alternatives is performed based upon security criteria by using TOPSIS method. The outcomes of proposed security assessment framework demonstrate that the reliable and secure alternative among alternatives is selected in IoMT system. This approach can be used as a guideline for future use in IoMT systems or any other IoT based domain. To the best of our knowledge, it is novel approach to address the security assessment of IoT and these MCDM methods have never been used before for assessment and decision making in IoHT system for security.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果