2016
DOI: 10.1007/s11235-016-0168-0
|View full text |Cite|
|
Sign up to set email alerts
|

Security assessment framework for IoT service

Abstract: What are the critical requirements to be considered for the security measures in Internet of Things (IoT) services? Further, how should those security resources be allocated? To provide valuable insight into these questions, this paper introduces a security assessment framework for the IoT service environment from an architectural perspective. Our proposed framework integrates fuzzy DEMATEL and fuzzy ANP to reflect dependence and feedback interrelations among security criteria and, ultimately, to weigh and pri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 48 publications
(18 citation statements)
references
References 48 publications
0
18
0
Order By: Relevance
“…Also a fuzzy MCDM model for selecting suppliers presented in [58] via combining DEMATEL with TOPSIS technique. It also integrated with ANP in fuzzy environment to provide framework for assessing security criteria [59]. It also integrated with analytic hierarchy process (AHP) to evaluate criteria of auto spare parts industry [60], and to evaluate intertwined effects in e-learning programs [61].…”
Section: The Related Work Of Dematel and Ahp Techniquesmentioning
confidence: 99%
“…Also a fuzzy MCDM model for selecting suppliers presented in [58] via combining DEMATEL with TOPSIS technique. It also integrated with ANP in fuzzy environment to provide framework for assessing security criteria [59]. It also integrated with analytic hierarchy process (AHP) to evaluate criteria of auto spare parts industry [60], and to evaluate intertwined effects in e-learning programs [61].…”
Section: The Related Work Of Dematel and Ahp Techniquesmentioning
confidence: 99%
“…Topic 5 is related to risk assessment and prioritization of IoT security threats. For a secure IoT environment, various Mobile Information Systems studies have prioritized security threats by applying approaches such as product-development life cycle, decisionmaking trial-and-evaluation laboratory, analytic network processing, and graph theory to develop risk assessment and management frameworks [200][201][202][203][204][205][206][207].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…Several other proposals also outline the importance of IoT security and discuss various security requirements. For instance, Hossain et al [ 157 ], and Park and Shin [ 158 ] listed IoT security requirements that include data integrity, information protection, anonymity, non-repudiation and data freshness (i.e., real-time data). Alqassem [ 140 ] discusses IoT security requirements from a heterogeneous network’s perspective, here the author focuses on secure and private connections and transactions.…”
Section: Iot Security Requirements: State Of the Artmentioning
confidence: 99%