Interval-Valued Intuitionistic Fuzzy-Analytic Hierarchy Process for evaluating the impact of security attributes in Fog based Internet of Things paradigm

Abstract Internet of Things(IoT) may be defined as a network of smart devices that are involved in data collection and exchange. This technology has automated the day-to-day jobs and thus made our lives easier. But, real-time analysis of data is not always possible in a typical cloud-IoT architecture, especially for latency-sensitive applications. This led to the introduction of fog computing. On one side, fog layer has the capability of data processing and computation at the network edge and thus provides faster results. But, on the other hand, it also brings the attack surface closer to the devices. This makes the sensitive data on the layer vulnerable to attacks. Thus, considering Fog -IoT security is of prime importance. The security of a system or platform depends upon multiple factors. The order of selection of these factors plays a vital role in efficient assessment of security. This makes the problem of assessment of Fog-IoT security a Multi-Criteria Decision-Making (MCDM) problem. Therefore, the authors have deployed an Interval-Valued Intuitionistic Fuzzy Set (IVIFS) based Analytical Hierarchy Process (AHP) for the said environment. Using this integrated approach, the Fog-IoT security factors and their sub-factors are prioritized and ranked. The results obtained using above hybrid approach are validated by comparing them with Fuzzy-AHP (F-AHP) and Classical- AHP (C-AHP) results and are found to statistically correlated. The ideology and results of this research will help the security practitioners in accessing the security of Fog-IoT environment effectively. Moreover, the outcome of this analysis will help in paving a path for researchers by shifting their focus towards the most prioritized factor thereby assuring security in the environment.

[1]  Cengiz Kahraman,et al.  Fuzzy Multicriteria Decision-Making: A Literature Review , 2015, Int. J. Comput. Intell. Syst..

[2]  Brajendra Panda,et al.  Maintaining Data Integrity in Fog Computing Based Critical Infrastructure Systems , 2019, 2019 International Conference on Computational Science and Computational Intelligence (CSCI).

[3]  Alka Agrawal,et al.  Security Issues in Fog Environment: A Systematic Literature Review , 2020, International Journal of Wireless Information Networks.

[4]  An Braeken,et al.  Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model , 2019, Wireless Networks.

[5]  Fuhong Lin,et al.  Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system , 2018, EURASIP J. Wirel. Commun. Netw..

[6]  Hannu Tenhunen,et al.  An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach , 2016 .

[7]  Joseph K. Liu,et al.  A Survey on Access Control in Fog Computing , 2018, IEEE Communications Magazine.

[8]  K. S. Ravichandran,et al.  Solving cloud vendor selection problem using intuitionistic fuzzy decision framework , 2018, Neural Computing and Applications.

[9]  Krassimir T. Atanassov,et al.  Intuitionistic fuzzy sets , 1986 .

[10]  Carla Merkle Westphall,et al.  Mutual Authentication for IoT in the Context of Fog Computing , 2019, 2019 11th International Conference on Communication Systems & Networks (COMSNETS).

[11]  K. Atanassov Operators over interval valued intuitionistic fuzzy sets , 1994 .

[12]  Sushil Kumar,et al.  Analytic hierarchy process: An overview of applications , 2006, Eur. J. Oper. Res..

[13]  S. Mercy Shalinie,et al.  Design of cognitive fog computing for intrusion detection in Internet of Things , 2018, Journal of Communications and Networks.

[14]  Prosanta Gope,et al.  LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm , 2019, Comput. Secur..

[15]  K. Atanassov More on intuitionistic fuzzy sets , 1989 .

[16]  Tanupriya Choudhury,et al.  Fog computing: Common security issues and proposed countermeasures , 2016, 2016 International Conference System Modeling & Advancement in Research Trends (SMART).

[17]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[18]  Dimitris Gritzalis,et al.  Access Control Issues in Utilizing Fog Computing for Transport Infrastructure , 2015, CRITIS.

[19]  V. S. Shankar Sriram,et al.  IIVIFS-WASPAS: An integrated Multi-Criteria Decision-Making perspective for cloud service provider selection , 2020, Future Gener. Comput. Syst..

[20]  Choong Seon Hong,et al.  An Architecture of IoT Service Delegation and Resource Allocation Based on Collaboration between Fog and Cloud Computing , 2016, Mob. Inf. Syst..

[21]  Mohamed Abdel-Basset,et al.  A neutrosophic theory based security approach for fog and mobile-edge computing , 2019, Comput. Networks.

[22]  Shuai Geng,et al.  Decision framework of photovoltaic module selection under interval-valued intuitionistic fuzzy environment , 2015 .

[23]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[24]  Hu-Chen Liu,et al.  Improving quality function deployment analysis with the cloud MULTIMOORA method , 2020, Int. Trans. Oper. Res..

[25]  Rajkumar Buyya,et al.  Cloud-Fog Interoperability in IoT-enabled Healthcare Solutions , 2018, ICDCN.

[26]  Sateesh Addepalli,et al.  Fog computing and its role in the internet of things , 2012, MCC '12.

[27]  T. Saaty How to Make a Decision: The Analytic Hierarchy Process , 1990 .

[28]  Ashok Kumar Das,et al.  Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks , 2019, IEEE Transactions on Industrial Informatics.

[29]  Tuva Selstad Dybedokken Trust Management in Fog Computing , 2017 .

[30]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[31]  N. Arunkumar,et al.  Enabling technologies for fog computing in healthcare IoT systems , 2019, Future Gener. Comput. Syst..

[32]  Costin Badica,et al.  CAAVI-RICS Model for Analyzing the Security of Fog Computing Systems: Authentication , 2019, 2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT).

[33]  Graham Morgan,et al.  Fog Computing Security Challenges and Future Directions [Energy and Security] , 2019, IEEE Consumer Electronics Magazine.

[34]  Jaesung Lim,et al.  Design of Future UAV-Relay Tactical Data Link for Reliable UAV Control and Situational Awareness , 2018, IEEE Communications Magazine.

[35]  Hossein Sayyadi Tooranloo,et al.  Supplier selection and evaluation using interval-valued intuitionistic fuzzy AHP method , 2017 .

[36]  Gwo-Hshiung Tzeng,et al.  Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS , 2004, Eur. J. Oper. Res..

[37]  Jong-Wuu Wu,et al.  Correlation of intuitionistic fuzzy sets by centroid method , 2002, Inf. Sci..

[38]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[39]  Prasant Kumar Pattnaik,et al.  Cyber Security Metrics Evaluation Using Multi-criteria Decision-Making Approach , 2020 .

[40]  Xuyun Zhang,et al.  Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things , 2019, Secur. Commun. Networks.

[41]  Qing-wei Cao,et al.  Research on AHP with interval-valued intuitionistic fuzzy sets and its application in multi-criteria decision making problems , 2013 .

[42]  Richa Verma,et al.  A Systematic Survey on Fog steered IoT: Architecture, Prevalent Threats and Trust Models , 2020, International Journal of Wireless Information Networks.

[43]  Chuah Chai Wen,et al.  Fog Computing, Applications, Security and Challenges, Review , 2018, International Journal of Engineering & Technology.

[44]  Tie Qiu,et al.  Survey on fog computing: architecture, key technologies, applications and open issues , 2017, J. Netw. Comput. Appl..

[45]  Francisco Chiclana,et al.  Non-dominance and attitudinal prioritisation methods for intuitionistic and interval-valued intuitionistic fuzzy preference relations , 2012, Expert Syst. Appl..

[46]  Thar Baker,et al.  A Mechanism for Securing IoT-enabled Applications at the Fog Layer , 2019, J. Sens. Actuator Networks.

[47]  Ludmil Mikhailov,et al.  Deriving priorities from fuzzy pairwise comparison judgements , 2003, Fuzzy Sets Syst..

[48]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[49]  Baoding Liu Why is There a Need for Uncertainty Theory , 2012 .

[50]  Richa Verma,et al.  Security and Privacy Issues in Fog driven IoT Environment , 2019 .

[51]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..