ISA Evaluation Framework for Security of Internet of Health Things System Using AHP-TOPSIS Methods

Security has become a vital factor for any Internet of things network but it is of paramount importance for Internet of Health Things (IoHT). IoHT also known as Internet of Medical Things (IoMT) is integration of IoT and healthcare environment, where fragile data related to the patients is transmitted from IoT devices to server. During this transmission, if, any eavesdropping or intrusion occurs then it will not only lead to the serious mutilation of entire network but this data will be handled maliciously for wrong doings as well. Therefore, a proper security is indispensable for IoHT based equipments due to exposure to different attacks. Security of IoHT has been the burning issue in last couple of years. In this regard different security models, surveys, frameworks have been presented. In this article, a proposed Identified Security Attributes (ISA) framework is presented to evaluate the security features of IoHT based device in healthcare environment. The proposed framework uses hybrid MCDM methods such as Analytical Hierarchical Process (AHP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). This framework works in two phase: in first phase the weights of attributes are derived by using AHP method and in second phase security assessment of alternatives is performed based upon security criteria by using TOPSIS method. The outcomes of proposed security assessment framework demonstrate that the reliable and secure alternative among alternatives is selected in IoMT system. This approach can be used as a guideline for future use in IoMT systems or any other IoT based domain. To the best of our knowledge, it is novel approach to address the security assessment of IoT and these MCDM methods have never been used before for assessment and decision making in IoHT system for security.

[1]  Pasi Tyrväinen,et al.  A framework for evaluating Internet-of-Things platforms: Application provider viewpoint , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[2]  Andrew P. Martin,et al.  Threat-Based Security Analysis for the Internet of Things , 2014, 2014 International Workshop on Secure Internet of Things.

[3]  Media A. Ayu,et al.  Web based multi criteria decision making using AHP method , 2010, Proceeding of the 3rd International Conference on Information and Communication Technology for the Moslem World (ICT4M) 2010.

[4]  Suzanne D. Pawlowski,et al.  The Delphi method as a research tool: an example, design considerations and applications , 2004, Inf. Manag..

[5]  Aris Gunaryati,et al.  Fuzzy Analytical Hierarchy Process Method to Determine the Quality of Gemstones , 2018, Adv. Fuzzy Syst..

[6]  Yi Zhang,et al.  Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice , 2018, J. Hardw. Syst. Secur..

[7]  Muhammad Ali Imran,et al.  Securing Internet of Medical Things with Friendly-jamming schemes , 2020, Computer Communications.

[8]  Xiangjian He,et al.  SAMS: A Seamless and Authorized Multimedia Streaming Framework for WMSN-Based IoMT , 2019, IEEE Internet of Things Journal.

[9]  Foutse Khomh,et al.  Enforcing security in Internet of Things frameworks: A Systematic Literature Review , 2019, Internet Things.

[10]  Davor Svetinovic,et al.  A taxonomy of security and privacy requirements for the Internet of Things (IoT) , 2014, 2014 IEEE International Conference on Industrial Engineering and Engineering Management.

[11]  Stefan Poslad,et al.  An Evaluation Framework for Adaptive Security for the IoT in eHealth , 2014 .

[12]  Stefano Bianchi,et al.  Privacy and Security Threats on the Internet of Things , 2019, Internet of Things Security and Data Protection.

[13]  Gülçin Büyüközkan,et al.  A combined fuzzy AHP and fuzzy TOPSIS based strategic analysis of electronic service quality in healthcare industry , 2012, Expert Syst. Appl..

[14]  Xiangjian He,et al.  P2DCA: A Privacy-Preserving-Based Data Collection and Analysis Framework for IoMT Applications , 2019, IEEE Journal on Selected Areas in Communications.

[15]  Alka Agrawal,et al.  Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security , 2020, Symmetry.

[16]  Dimitris Kardaras,et al.  Multicriteria Evaluation of the Internet of Things Potential in Health Care: The Case of Dementia Care , 2017, 2017 IEEE 19th Conference on Business Informatics (CBI).

[17]  Anirban Mondal,et al.  Mobile Computing, IoT and Big Data for Urban Informatics: Challenges and Opportunities , 2018, Handbook of Smart Cities, Software Services and Cyber Infrastructure.

[18]  Thomas L. Saaty,et al.  On the invalidity of fuzzifying numerical judgments in the Analytic Hierarchy Process , 2007, Math. Comput. Model..

[19]  Amala V. Rajan,et al.  Internet of Things (IoT): Application systems and security vulnerabilities , 2016, 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA).

[20]  Wen-Hwa Liao,et al.  Applying analytic hierarchy process to assess healthcare-oriented cloud computing service systems , 2016, SpringerPlus.

[21]  Sajjan G. Shiva,et al.  A Framework for Ranking IoMT Solutions Based on Measuring Security and Privacy , 2018 .

[22]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.

[23]  Omar Alrawi,et al.  SoK: Security Evaluation of Home-Based IoT Deployments , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[24]  Ray Brown,et al.  Hybrid Cybersecurity Framework for the Internet of Medical Things (IOMT) , 2019, 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3).

[25]  Lisandro Zambenedetti Granville,et al.  Internet of Things in healthcare: Interoperatibility and security issues , 2012, 2012 IEEE International Conference on Communications (ICC).

[26]  Abdulsalam Yassine,et al.  Autonomous monitoring in healthcare environment: Reward-based energy charging mechanism for IoMT wireless sensing nodes , 2019, Future Gener. Comput. Syst..

[27]  Krishnendu Shaw,et al.  Evaluation and selection of mobile health (mHealth) applications using AHP and fuzzy TOPSIS , 2019, Technology in Society.

[28]  Žarko Rađenović,et al.  Integrated AHP-TOPSIS Method for the Assessment of Health Management Information Systems Efficiency , 2017 .

[29]  Nagy Ramadan,et al.  Cybersecurity Risks of Blockchain Technology , 2020 .

[30]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[31]  Ramjee Prasad,et al.  Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.

[32]  Talita D. C. Frazão,et al.  Multicriteria decision analysis (MCDA) in health care: a systematic review of the main characteristics and methodological steps , 2018, BMC Medical Informatics and Decision Making.

[33]  Andrea Zanella,et al.  IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices , 2019, IEEE Internet of Things Journal.

[34]  Gwo-Hshiung Tzeng,et al.  Improving Sustainable Mobile Health Care Promotion: A Novel Hybrid MCDM Method , 2019, Sustainability.

[35]  Ion Bica,et al.  A security authorization scheme for smart home Internet of Things devices , 2017, Future Gener. Comput. Syst..

[36]  Wang Xi,et al.  Research on IoT Privacy Security Risks , 2016, 2016 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII).

[37]  Muhammad Bilal,et al.  A Distributed Secure Framework for Sharing Patient’s Data among IoMT Devices , 2019 .

[38]  Ali Ismail Awad,et al.  Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes , 2018, Sensors.

[39]  Thanassis Giannetsos,et al.  SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT) , 2020, Comput. Commun..

[40]  Hyeong-Ah Choi,et al.  Securing smart home: Technologies, security challenges, and security requirements , 2014, 2014 IEEE Conference on Communications and Network Security.

[41]  Dominick Rizk,et al.  Applied Layered-Security Model to IoMT , 2019, 2019 IEEE International Conference on Intelligence and Security Informatics (ISI).

[42]  Sajjan G. Shiva,et al.  Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment , 2017, 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops).

[43]  Saleem Ullah,et al.  Security Issues in the Internet of Things (IoT): A Comprehensive Study , 2017 .

[44]  Sajjan G. Shiva,et al.  IoMT-SAF: Internet of Medical Things Security Assessment Framework , 2019, Internet Things.

[45]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[46]  Dragan Pamucar,et al.  A New Model for Determining Weight Coefficients of Criteria in MCDM Models: Full Consistency Method (FUCOM) , 2018, Symmetry.

[47]  E. Cowan Security assessment of IoT devices : The case of two smart TVs , 2017 .

[48]  Sufian Hameed,et al.  Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review , 2019, J. Comput. Networks Commun..

[49]  Jeong-Jun Suh,et al.  A Study on Device Security in IoT Convergence , 2016, 2016 International Conference on Industrial Engineering, Management Science and Application (ICIMSA).

[50]  Manju Pandey,et al.  An ANP-GRA-Based Evaluation Model for Security Features of IoT Systems , 2019, Advances in Intelligent Systems and Computing.

[51]  Keon Chul Park,et al.  Security assessment framework for IoT service , 2016, Telecommunication Systems.

[52]  Shah Nazir,et al.  Selecting software design based on birthmark , 2014 .

[53]  Navdeep Kaur,et al.  Multi criteria decision making approach for selecting effort estimation model , 2012, ArXiv.

[54]  Mário M. Freire,et al.  Challenges of securing Internet of Things devices: A survey , 2018, Secur. Priv..

[55]  Helmut Krcmar,et al.  A comprehensive model of information security factors for decision-makers , 2020, Comput. Secur..

[56]  Deepak Gupta,et al.  Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers , 2019, Multimedia Tools and Applications.

[57]  Miodrag Potkonjak,et al.  Security of IoT systems: Design challenges and opportunities , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[58]  Julia I. Drake,et al.  Utilization of multiple-criteria decision analysis (MCDA) to support healthcare decision-making FIFARMA, 2016 , 2017, Journal of market access & health policy.

[59]  Seokjoong Kang,et al.  A Method of Assigning Weights Using a Ranking and Nonhierarchy Comparison , 2016, Adv. Decis. Sci..

[60]  Renato A. Krohling,et al.  Information Technology and Quantitative Management ( ITQM 2015 ) A-TOPSIS – An approach Based on TOPSIS for Ranking Evolutionary Algorithms , 2015 .

[61]  Fahad Ahmed Al-Zahrani,et al.  Evaluating the Usable-Security of Healthcare Software Through Unified Technique of Fuzzy Logic, ANP and TOPSIS , 2020, IEEE Access.

[62]  In Lee,et al.  The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .

[63]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[64]  Ali Saman Tosun,et al.  An Experimental Framework for Investigating Security and Privacy of IoT Devices , 2017, ISDDC.

[65]  Mahmoud Ammar,et al.  Journal of Information Security and Applications , 2022 .

[66]  Joe Cecil,et al.  WITHDRAWN: An IoMT-based Cyber Training Framework for Orthopedic Surgery using Next Generation Internet Technologies , 2019, Informatics in Medicine Unlocked.

[67]  Sandhya Makkar,et al.  Challenges and Opportunities of Internet of Things for Health Care , 2019, A Handbook of Internet of Things in Biomedical and Cyber Physical System.