• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Business and Economics
  • Accounting & Information Systems
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Business and Economics
  • Accounting & Information Systems
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Features-Based IoT Security Authentication Framework Using Statistical Aggregation, Entropy, and MOORA Approaches

    Thumbnail
    View/Open
    Features-Based_IoT_Security_Authentication_Framework_Using_Statistical_Aggregation_Entropy_and_MOORA_Approaches.pdf (3.035Mb)
    Date
    2022
    Author
    Khan, Habib Ullah
    Sohail, Muhammad
    Nazir, Shah
    Metadata
    Show full item record
    Abstract
    The Internet of Thing (IoT) is one of the most imperative technology for all organizations that's play a vital role in many operations, using communication networks, for exchange of data in order to perform a useful task. However, security of IoT devices and data is a major concern. This research work prioritizes the alternatives of security authentication features from studied articles. The multi-objective optimization method based on the ratio analysis (MOORA) is useful in multi-criteria decision making (MCDM) for ranking the alternatives. The statistical aggregation (SA) method has been used to assign weights to security authentication features in comparison to entropy method. In this paper, we identify weights for authentication features using the proposed SA method. Moreover, we evaluate the accuracy rates of the proposed model using entropy method. Finally, we ranked out the alternatives of authentication features using the MOORA approach. In fact, the entropy weight values came against the initial value of the objects in which the accuracy was 15% which is not suitable to this problem while the accuracy of the SA is 85%. Hence, the accuracy improvement is approximately 70 % using the SA method. This method is applicable for finding the weights of the objects based on initial values by MCDM approaches. We study the key security authentication which is the preserving of confidentiality, integrity, and availability that are the prime objectives for security of an IoT device. Furthermore, challenges are preserving the selected attributes through any approach, as discussed in the literature, adds to the complexity of IoT device security. We identify the future challenges to improve the security of IoT devices.
    DOI/handle
    http://dx.doi.org/10.1109/ACCESS.2022.3212735
    http://hdl.handle.net/10576/55029
    Collections
    • Accounting & Information Systems [‎555‎ items ]

    entitlement


    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Video