Modeling security evaluation framework for IoHT-driven systems using integrated decision-making methodology

Habib Ullah Khan,Yasir Ali
DOI: https://doi.org/10.1038/s41598-024-62066-3
IF: 4.6
2024-05-30
Scientific Reports
Abstract:The intensification of the Internet of Health Things devices created security concerns due to the limitations of these devices and the nature of the healthcare data. While dealing with the security challenges, several authentication schemes, protocols, processes, and standards have been adopted. Consequently, making the right decision regarding the installation of a secure authentication solution or procedure becomes tricky and challenging due to the large number of security protocols, complexity, and lack of understanding. The major objective of this study is to propose an IoHT-based assessment framework for evaluating and prioritizing authentication schemes in the healthcare domain. Initially, in the proposed work, the security issues related to authentication are collected from the literature and consulting experts' groups. In the second step, features of various authentication schemes are collected under the supervision of an Internet of Things security expert using the Delphi approach. The collected features are used to design suitable criteria for assessment and then Graph Theory and Matrix approach applies for the evaluation of authentication alternatives. Finally, the proposed framework is tested and validated to ensure the results are consistent and accurate by using other multi-criteria decision-making methods. The framework produces promising results such as 93%, 94%, and 95% for precision, accuracy, and recall, respectively in comparison to the existing approaches in this area. The proposed framework can be picked as a guideline by healthcare security experts and stakeholders for the evaluation and decision-making related to authentication issues in IoHT systems
multidisciplinary sciences
What problem does this paper attempt to address?
This paper aims to address the security assessment issues of Internet of Healthcare Things (IoHT) devices, particularly in regards to the selection and prioritization of authentication schemes. Due to the increasing number of IoHT devices and the sensitivity of medical data, security becomes a major concern. The existing security protocols are numerous, complex, and poorly understood, making it difficult to choose the appropriate authentication solution. The study proposes an IoHT-based assessment framework for evaluating and prioritizing authentication schemes in the healthcare domain. Firstly, authentication-related security issues are collected through literature review and expert consultation. Secondly, under the guidance of IoT security experts, the characteristics of various authentication schemes are collected using the Delphi method. Then, evaluation criteria are designed using graph theory and matrix methods to assess alternative authentication schemes. Finally, the accuracy and consistency of the framework are validated through other multi-criteria decision-making methods. Experimental results show that the framework achieves 93% accuracy, 94% precision, and 95% recall, surpassing existing methods. The framework provides a guide for healthcare security experts and stakeholders to assess and make decisions regarding authentication issues in IoHT systems. It considers key security characteristics such as mutual authentication, key negotiation, and data integrity, and evaluates them using graph theory and matrix methods, while validating with the AHP-TOPSIS method. The uniqueness of this study lies in its integration of multiple methods, addressing the limitations of traditional decision-making methods, and filling the gaps in existing assessment frameworks in terms of feature evaluation and validation.