عرض بسيط للتسجيلة

المؤلفKhan, Habib Ullah
المؤلفAli, Yasir
تاريخ الإتاحة2024-12-03T11:08:27Z
تاريخ النشر2024-05-24
اسم المنشورScientific Reports
المعرّفhttp://dx.doi.org/10.1038/s41598-024-62066-3
الاقتباسKhan, H. U., & Ali, Y. (2024). Modeling security evaluation framework for IoHT-driven systems using integrated decision-making methodology. Scientific Reports, 14(1), 12233.
الرقم المعياري الدولي للكتاب2045-2322
معرّف المصادر الموحدhttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85194848031&origin=inward
معرّف المصادر الموحدhttp://hdl.handle.net/10576/61630
الملخصThe intensification of the Internet of Health Things devices created security concerns due to the limitations of these devices and the nature of the healthcare data. While dealing with the security challenges, several authentication schemes, protocols, processes, and standards have been adopted. Consequently, making the right decision regarding the installation of a secure authentication solution or procedure becomes tricky and challenging due to the large number of security protocols, complexity, and lack of understanding. The major objective of this study is to propose an IoHT-based assessment framework for evaluating and prioritizing authentication schemes in the healthcare domain. Initially, in the proposed work, the security issues related to authentication are collected from the literature and consulting experts’ groups. In the second step, features of various authentication schemes are collected under the supervision of an Internet of Things security expert using the Delphi approach. The collected features are used to design suitable criteria for assessment and then Graph Theory and Matrix approach applies for the evaluation of authentication alternatives. Finally, the proposed framework is tested and validated to ensure the results are consistent and accurate by using other multi-criteria decision-making methods. The framework produces promising results such as 93%, 94%, and 95% for precision, accuracy, and recall, respectively in comparison to the existing approaches in this area. The proposed framework can be picked as a guideline by healthcare security experts and stakeholders for the evaluation and decision-making related to authentication issues in IoHT systems
راعي المشروعOpen Access funding provided by the Qatar National Library. In part, the Qatar University Internal Grant No. QUHI-CBE-21/22\u20131 funded this publication.
اللغةen
الناشرSpringer Nature
الموضوعAuthentication security requirements
GTM
IoHT assessment framework
TOPSIS
العنوانModeling security evaluation framework for IoHT-driven systems using integrated decision-making methodology
النوعArticle
رقم العدد1
رقم المجلد14
dc.accessType Open Access


الملفات في هذه التسجيلة

Thumbnail

هذه التسجيلة تظهر في المجموعات التالية

عرض بسيط للتسجيلة