Advertisement

An ANP-GRA-Based Evaluation Model for Security Features of IoT Systems

  • Akshay HindujaEmail author
  • Manju Pandey
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 989)

Abstract

The world has been experiencing a notable growth on the application of Internet of Things (IoT)-based appliances as IoT has been established as a major component of Information Technology after digital computer, Internet, and mobile technologies. However, the rapid growth of IoT-based systems also raises two undeniable concerns: security and privacy. Since IoT-based appliances are inherently exposed to the security attacks, security and privacy must be taken into account at the time of their acquisition. Owing to their economic concerns, the IoT-based system manufacturers may compromise with security issues, which can cause a breach of the network security and exploitation of user data. Therefore, an assessment framework for security features of IoT system is imperative. In this paper, we develop an assessment framework to evaluate the security features of IoT-based equipment. The proposed assessment framework uses hybrid multi-criteria decision making (MCDM) methodology. The framework comprises two widely used MCDM methods, Analytic Network Process (ANP) and Grey Relational Analysis (GRA). The evaluation process of security features of IoT system is twofold: first ANP is used to assign importance to the evaluating criteria, and then GRA is used to assess the alternatives with respect to the criteria. We also carried out an empirical study on assessment of IoT-based healthcare devices.

Keywords

Internet of things (IoT) Evaluation of IoT security features Multi criteria decision-making (MCDM) Analytic network process (ANP) Grey relation analysis (GRA) 

References

  1. 1.
    Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29, 1645–1660 (2013)CrossRefGoogle Scholar
  2. 2.
    Nedeltchev, P.: The internet of everything is the new economy. In: Cisco. https://www.cisco.com/c/en/us/solutions/collateral/enterprise/cisco-on-cisco/Cisco_IT_Trends_IoE_Is_the_New_Economy.html (2015)
  3. 3.
    Kidmose, E., Pedersen, J.M.: Security in internet of things. In: Cybersecurity and Privacy-Bridging the Gap, 99 p. River Publishers (2017)Google Scholar
  4. 4.
    Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26, 23–30 (2010)CrossRefGoogle Scholar
  5. 5.
    Sethi, P., Sarangi, S.R.: Internet of things: architectures, protocols, and applications. J. Electr. Comput. Eng. 2017 (2017).  https://doi.org/10.1155/2017/9324035CrossRefGoogle Scholar
  6. 6.
    Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: Proceeding of the 2012 International Conference on Computer Science and Electronics Engineering 2012, vol. 3, pp. 648–651 (2012).  https://doi.org/10.1109/ICCSEE.2012.373
  7. 7.
    Saaty, T.L.: Decision Making with Dependence and Feedback: The Analytic Network Process : The Organization and Prioritization of Complexity, 2nd edn, Rws Publications (2001)Google Scholar
  8. 8.
    Selcuk, H., Zaim, S., Delen, D.: Selecting “The Best” ERP system for SMEs using a combination of ANP and PROMETHEE methods. Expert Syst. Appl. 42, 2343–2352 (2015).  https://doi.org/10.1016/j.eswa.2014.10.034CrossRefGoogle Scholar
  9. 9.
    Büyüközkan, G., Güleryüz, S., Karpak, B.: A new combined IF-DEMATEL and IF-ANP approach for CRM partner evaluation. Int. J. Prod. Econ. 191, 194–206 (2017).  https://doi.org/10.1016/j.ijpe.2017.05.012CrossRefGoogle Scholar
  10. 10.
    Büyüközkan, G., Güleryüz, S.: An integrated DEMATEL-ANP approach for renewable energy resources selection in Turkey. Int. J. Prod. Econ. 182, 435–448 (2016).  https://doi.org/10.1016/j.ijpe.2016.09.015CrossRefGoogle Scholar
  11. 11.
    Chen, J.K., Chen, I.S.: Using a novel conjunctive MCDM approach based on DEMATEL, fuzzy ANP, and TOPSIS as an innovation support system for Taiwanese higher education. Expert Syst. Appl. 37, 1981–1990 (2010).  https://doi.org/10.1016/j.eswa.2009.06.079CrossRefGoogle Scholar
  12. 12.
    Ju-Long, D.: Control problems of grey systems. Syst. Control Lett. 1, 288–294 (1982). http://dx.doi.org/10.1016/S0167-6911(82)80025-XMathSciNetCrossRefGoogle Scholar
  13. 13.
    Lin, C.-T., Chang, C.-W., Chen, C.-B.: The worst ill-conditioned silicon wafer slicing machine detected by using grey relational analysis. Int. J. Adv. Manuf. Technol. 31, 388–395 (2006).  https://doi.org/10.1007/s00170-006-0685-1CrossRefGoogle Scholar
  14. 14.
    Chen, W.-H., Tsai, M.-S., Kuo, H.-L.: Distribution system restoration using the hybrid fuzzy-grey method. IEEE Trans. Power Syst. 20, 199–205 (2005).  https://doi.org/10.1109/TPWRS.2004.841234CrossRefGoogle Scholar
  15. 15.
    Jiang, B.C., Tasi, S.-L., Wang, C.-C.: Machine vision-based gray relational theory applied to IC marking inspection. IEEE Trans. Semicond. Manuf. 15, 531–539 (2002).  https://doi.org/10.1109/TSM.2002.804906CrossRefGoogle Scholar
  16. 16.
    Kuo, Y., Yang, T., Huang, G.W.: The use of grey relational analysis in solving multiple attribute decision-making problems. Comput. Ind. Eng. 55, 80–93 (2008).  https://doi.org/10.1016/j.cie.2007.12.002CrossRefGoogle Scholar
  17. 17.
    Islam, S.M.R., Kwak, D., Kabir, M.H., et al.: The internet of things for health care: a comprehensive survey. IEEE Access 3, 678–708 (2015)CrossRefGoogle Scholar
  18. 18.
    Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 2015 pp. 336–341 (2016).  https://doi.org/10.1109/ICITST.2015.7412116
  19. 19.
    Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of things: a survey of existing protocols and open research issues 43, 1–11 (2015)Google Scholar
  20. 20.
    Zhang, B., Zou, Z., Liu, M.: Evaluation on security system of internet of things based on Fuzzy-AHP method BT. In: 2nd International Conference on E-Business and E-Government, ICEE 2011, 6 May 2011–8 May 2011. E-bus E-Government (ICEE), pp. 2230–2234 (2011)Google Scholar
  21. 21.
    Park, K.C., Shin, D.H.: Security assessment framework for IoT service. Telecommun. Syst. 64, 193–209 (2017).  https://doi.org/10.1007/s11235-016-0168-0CrossRefGoogle Scholar
  22. 22.
    Jing, Q., Vasilakos, A.V., Wan, J., et al.: Security of the internet of things: perspectives and challenges. Wirel Netw. 20, 2481–2501 (2014).  https://doi.org/10.1007/s11276-014-0761-7CrossRefGoogle Scholar
  23. 23.
    Okoli, C., Pawlowski, S.D.: The Delphi method as a research tool: an example, design considerations and applications. Inf. Manag. Elsevier 42, 15–29 (2004)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Computer ApplicationsNational Institute of Technology RaipurRaipurIndia

Personalised recommendations