Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices
Author | Habib Ullah, Khan |
Author | Sohail, Muhammad |
Author | Ali, Farhad |
Author | Nazir, Shah |
Author | Ghadi, Yazeed Yasin |
Author | Ullah, Inam |
Available date | 2023-10-08T10:48:42Z |
Publication Date | 2023-04-19 |
Publication Name | Physical Communication |
Identifier | http://dx.doi.org/10.1016/j.phycom.2023.102084 |
Citation | Khan, H. U., Sohail, M., Ali, F., Nazir, S., Ghadi, Y. Y., & Ullah, I. (2023). Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices. Physical Communication, 59, 102084. |
ISSN | 1874-4907 |
Abstract | The Internet of Things (IoT) technologies continuously expand with time due to the advances in automated, connected device technology, mobility, and wide access to information. IoT is the collection of many linked devices due to their unique features, such as scalability, maintainability, fault tolerance, reliability, accuracy, and much more. With the growing number of hybrid devices in large organizations, security and privacy concerns are becoming more challenging. Security is essential for protecting the hardware, network aspects of devices, and information access from unauthorized entities. Most of the security methods and procedures provided by researchers are based on existing Internet security practices. The top-ranking authentication feature categories included the most compatible and common authentication feature for all types of IoT-based devices as an elementary security requirement for protection from unauthorized access. The future challenge is to address the incompatibility of the authentication feature with IoT devices based on appropriate technologies. AI and machine learning are also implementable in order to detect the vulnerability of IoT devices and inform the concerned operator or administration for protection. This research highlights the authentication feature of IoT devices from literature studies and evaluates the significant feature using COPRAS approach to assist organization in enhancing security of IoT devices. |
Sponsor | This Research is funded by Qatar national library and in parts by Qatar University (Internal Grant No. QUHI-CBE-21/22-1 ). |
Language | en |
Publisher | Elsevier |
Subject | IoT Authentication Security MCDM Device communication |
Type | Article |
Volume Number | 59 |
Open Access user License | http://creativecommons.org/licenses/by/4.0/ |
ESSN | 1876-3219 |
Check access options
Files in this item
This item appears in the following Collection(s)
-
Accounting & Information Systems [527 items ]