casa 22(1): e4

Research Article

Analyzing Healthcare Device Security through Fuzzy Rule-based Multi-criteria Model

Download361 downloads
  • @ARTICLE{10.4108/eai.16-5-2022.173978,
        author={Neetu Yadav and Shafeeq Ahmad and Naseem Ahmad Khan},
        title={Analyzing Healthcare Device Security through Fuzzy Rule-based Multi-criteria Model},
        journal={EAI Endorsed Transactions on Context-aware Systems and Applications},
        volume={8},
        number={1},
        publisher={EAI},
        journal_a={CASA},
        year={2022},
        month={5},
        keywords={Healthcare informatics, IoHT, fuzzy logic, MCDM, security evaluation},
        doi={10.4108/eai.16-5-2022.173978}
    }
    
  • Neetu Yadav
    Shafeeq Ahmad
    Naseem Ahmad Khan
    Year: 2022
    Analyzing Healthcare Device Security through Fuzzy Rule-based Multi-criteria Model
    CASA
    EAI
    DOI: 10.4108/eai.16-5-2022.173978
Neetu Yadav1, Shafeeq Ahmad1, Naseem Ahmad Khan1,*
  • 1: Department of Computer Science & Engineering, Azad Institute of Engineering & Technology, Lucknow, Uttar Pradesh, India
*Contact email: naseemkhan033@gmail.com

Abstract

Managing risk as well as safeguarding electronic health records can be difficult for small medical practises. As a result of their vulnerability to various attacks, Internet of Health Things (IoHT)-based devices require appropriate security. In this paper, fuzzy TOPSIS is used to assess the security characteristics of IoHT-based devices in a medical setting. This technique utilizes a security evaluation of alternative solutions depending on security factors. The results of the presented security evaluation approach demonstrate that the most trustworthy as well as safe alternative among several of the alternative solutions is chosen for the IoHT model. This strategy could be used as a model for future IoHT structures or even other IoT-based domains. To the authors’ knowledge, it is an unique strategy to IoT security evaluation, as well as such MCDM method have not been utilised before for evaluation as well as decision - making process in IoHT security systems.