A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in Healthcare

<p dir="ltr">Internet of Things (IoT) devices have drawn significant attention over the last few years due to their significant contribution to every domain of life, but the major application of these devices has been witnessed in the healthcare sector. IoT devices have changed the c...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Habib Ullah Khan (12024579) (author)
مؤلفون آخرون: Yasir Ali (799969) (author), Faheem Khan (6557516) (author)
منشور في: 2023
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513561241321472
author Habib Ullah Khan (12024579)
author2 Yasir Ali (799969)
Faheem Khan (6557516)
author2_role author
author
author_facet Habib Ullah Khan (12024579)
Yasir Ali (799969)
Faheem Khan (6557516)
author_role author
dc.creator.none.fl_str_mv Habib Ullah Khan (12024579)
Yasir Ali (799969)
Faheem Khan (6557516)
dc.date.none.fl_str_mv 2023-02-28T00:00:00Z
dc.identifier.none.fl_str_mv 10.3390/math11051197
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/A_Features-Based_Privacy_Preserving_Assessment_Model_for_Authentication_of_Internet_of_Medical_Things_IoMT_Devices_in_Healthcare/24166533
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Information and computing sciences
Cybersecurity and privacy
Distributed computing and systems software
Mathematical sciences
Applied mathematics
authentication
IoMT
security features
AHP
TOPSIS
MCDM
dc.title.none.fl_str_mv A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in Healthcare
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p dir="ltr">Internet of Things (IoT) devices have drawn significant attention over the last few years due to their significant contribution to every domain of life, but the major application of these devices has been witnessed in the healthcare sector. IoT devices have changed the complexion of healthcare set-up, however, the major limitation of such devices is susceptibility to many cyberattacks due to the use of embedded operating systems, the nature of communication, insufficient software updates, and the nature of backend resources. Similarly, they transfer a huge amount of sensitive data via sensors and actuators. Therefore, the security of Internet of Health Things (IoHT) devices remains a prime concern as these devices are prone to various cyberattacks, which can lead to compromising and violating the security of IoT devices. Therefore, IoT devices need to be authenticated before they join the network or communicate within a network, and the applied method of authentication must be robust and reliable. This authentication method has to be evaluated before being implemented for the authentication of IoT devices/equipment in a healthcare environment. In this study, an evaluation framework is introduced to provide a reliable and secure authentication mechanism based on authentication features. The proposed framework evaluates and selects the most appropriate authentication scheme/method based on evaluating authentication features using a hybrid multicriteria decision-making approach. It completes this in two steps: in the first step, the analytic hierarchy process (AHP) method is applied for assigning criteria weights; and in the second step, the technique for order preference by similarity to ideal solution (TOPSIS) approach selects the best authentication solution for IoHT devices based upon identified authentication features. This is the first attempt to present a features-based authentication model for selecting the improved authentication solution employed in IoHT devices.</p><h2>Other Information</h2><p dir="ltr">Published in: Mathematics<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/math11051197" target="_blank">https://dx.doi.org/10.3390/math11051197</a></p>
eu_rights_str_mv openAccess
id Manara2_3191cd798769fb818f00495e4a67d93d
identifier_str_mv 10.3390/math11051197
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/24166533
publishDate 2023
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in HealthcareHabib Ullah Khan (12024579)Yasir Ali (799969)Faheem Khan (6557516)Information and computing sciencesCybersecurity and privacyDistributed computing and systems softwareMathematical sciencesApplied mathematicsauthenticationIoMTsecurity featuresAHPTOPSISMCDM<p dir="ltr">Internet of Things (IoT) devices have drawn significant attention over the last few years due to their significant contribution to every domain of life, but the major application of these devices has been witnessed in the healthcare sector. IoT devices have changed the complexion of healthcare set-up, however, the major limitation of such devices is susceptibility to many cyberattacks due to the use of embedded operating systems, the nature of communication, insufficient software updates, and the nature of backend resources. Similarly, they transfer a huge amount of sensitive data via sensors and actuators. Therefore, the security of Internet of Health Things (IoHT) devices remains a prime concern as these devices are prone to various cyberattacks, which can lead to compromising and violating the security of IoT devices. Therefore, IoT devices need to be authenticated before they join the network or communicate within a network, and the applied method of authentication must be robust and reliable. This authentication method has to be evaluated before being implemented for the authentication of IoT devices/equipment in a healthcare environment. In this study, an evaluation framework is introduced to provide a reliable and secure authentication mechanism based on authentication features. The proposed framework evaluates and selects the most appropriate authentication scheme/method based on evaluating authentication features using a hybrid multicriteria decision-making approach. It completes this in two steps: in the first step, the analytic hierarchy process (AHP) method is applied for assigning criteria weights; and in the second step, the technique for order preference by similarity to ideal solution (TOPSIS) approach selects the best authentication solution for IoHT devices based upon identified authentication features. This is the first attempt to present a features-based authentication model for selecting the improved authentication solution employed in IoHT devices.</p><h2>Other Information</h2><p dir="ltr">Published in: Mathematics<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/math11051197" target="_blank">https://dx.doi.org/10.3390/math11051197</a></p>2023-02-28T00:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.3390/math11051197https://figshare.com/articles/journal_contribution/A_Features-Based_Privacy_Preserving_Assessment_Model_for_Authentication_of_Internet_of_Medical_Things_IoMT_Devices_in_Healthcare/24166533CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/241665332023-02-28T00:00:00Z
spellingShingle A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in Healthcare
Habib Ullah Khan (12024579)
Information and computing sciences
Cybersecurity and privacy
Distributed computing and systems software
Mathematical sciences
Applied mathematics
authentication
IoMT
security features
AHP
TOPSIS
MCDM
status_str publishedVersion
title A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in Healthcare
title_full A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in Healthcare
title_fullStr A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in Healthcare
title_full_unstemmed A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in Healthcare
title_short A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in Healthcare
title_sort A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in Healthcare
topic Information and computing sciences
Cybersecurity and privacy
Distributed computing and systems software
Mathematical sciences
Applied mathematics
authentication
IoMT
security features
AHP
TOPSIS
MCDM