Features-based IoT Security Authentication Framework using Statistical Aggregation, Entropy, and MOORA Approaches

The Internet of Thing (IoT) is one of the most imperative technology for all organizations that's play a vital role in many operations, using communication networks, for exchange of data in order to perform a useful task. However, security of IoT devices and data is a major concern. This resear...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2022, Vol.10, p.1-1
Hauptverfasser: Khan, Habib Ullah, Sohail, Muhammad, Nazir, Shah
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1
container_issue
container_start_page 1
container_title IEEE access
container_volume 10
creator Khan, Habib Ullah
Sohail, Muhammad
Nazir, Shah
description The Internet of Thing (IoT) is one of the most imperative technology for all organizations that's play a vital role in many operations, using communication networks, for exchange of data in order to perform a useful task. However, security of IoT devices and data is a major concern. This research work prioritizes the alternatives of security authentication features from studied articles. The multi-objective optimization method based on the ratio analysis (MOORA) is useful in multi-criteria decision making (MCDM) for ranking the alternatives. The statistical aggregation (SA) method has been used to assign weights to security authentication features in comparison to entropy method. In this paper, we identify weights for authentication features using the proposed SA method. Moreover, we evaluate the accuracy rates of the proposed model using entropy method. Finally, we ranked out the alternatives of authentication features using the MOORA approach. In fact, the entropy weight values came against the initial value of the objects in which the accuracy was 15% which is not suitable to this problem while the accuracy of the SA is 85%. Hence, the accuracy improvement is approximately 70 % using the SA method. This method is applicable for finding the weights of the objects based on initial values by MCDM approaches. We study the key security authentication which is the preserving of confidentiality, integrity, and availability that are the prime objectives for security of an IoT device. Furthermore, challenges are preserving the selected attributes through any approach, as discussed in the literature, adds to the complexity of IoT device security. We identify the future challenges to improve the security of IoT devices.
doi_str_mv 10.1109/ACCESS.2022.3212735
format Article
fullrecord <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_proquest_journals_2726115085</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9919340</ieee_id><doaj_id>oai_doaj_org_article_e3b02bf85e4e4f47989f73c23aec6489</doaj_id><sourcerecordid>2726115085</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-a9c59d27ee8c89b4b7a4917c427f8132f0af525ac1c48ddd91b83f4de07cb9613</originalsourceid><addsrcrecordid>eNpNUV1r4zAQNOUKLb3-gr4I-lrn9GVLejQhuQv0CDTts5DlletcaqWSzJF_f0pdyu3LLrMzoxVTFHcELwjB6kezXK52uwXFlC4YJVSw6qK4pqRWJatY_e2_-aq4jXGPc8kMVeK6eF-DSVOAWLYmQoc2_hntwE5hSCfUTOkVxjRYkwY_onUwb_DXhz9oisPYo13KeDyvD6jp-wD9B-8BrcYU_PH0gMzYod_b7VODmuMxeGNfIX4vLp05RLj97DfFy3r1vPxVPm5_bpbNY2k5lqk0ylaqowJAWqla3grDFRGWU-EkYdRh4ypaGUssl13XKdJK5ngHWNhW1YTdFJvZt_Nmr49heDPhpL0Z9AfgQ69NyMcfQANrMW2drIADd1woqZxgljIDtuZSZa_72St_4n2CmPTeT2HM52sqaE1IhWWVWWxm2eBjDOC-XiVYn6PSc1T6HJX-jCqr7mbVAABfCqWIYhyzf1dekEQ</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2726115085</pqid></control><display><type>article</type><title>Features-based IoT Security Authentication Framework using Statistical Aggregation, Entropy, and MOORA Approaches</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Khan, Habib Ullah ; Sohail, Muhammad ; Nazir, Shah</creator><creatorcontrib>Khan, Habib Ullah ; Sohail, Muhammad ; Nazir, Shah</creatorcontrib><description>The Internet of Thing (IoT) is one of the most imperative technology for all organizations that's play a vital role in many operations, using communication networks, for exchange of data in order to perform a useful task. However, security of IoT devices and data is a major concern. This research work prioritizes the alternatives of security authentication features from studied articles. The multi-objective optimization method based on the ratio analysis (MOORA) is useful in multi-criteria decision making (MCDM) for ranking the alternatives. The statistical aggregation (SA) method has been used to assign weights to security authentication features in comparison to entropy method. In this paper, we identify weights for authentication features using the proposed SA method. Moreover, we evaluate the accuracy rates of the proposed model using entropy method. Finally, we ranked out the alternatives of authentication features using the MOORA approach. In fact, the entropy weight values came against the initial value of the objects in which the accuracy was 15% which is not suitable to this problem while the accuracy of the SA is 85%. Hence, the accuracy improvement is approximately 70 % using the SA method. This method is applicable for finding the weights of the objects based on initial values by MCDM approaches. We study the key security authentication which is the preserving of confidentiality, integrity, and availability that are the prime objectives for security of an IoT device. Furthermore, challenges are preserving the selected attributes through any approach, as discussed in the literature, adds to the complexity of IoT device security. We identify the future challenges to improve the security of IoT devices.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2022.3212735</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Accuracy ; Agglomeration ; Alternatives ; Authentication ; Cloud computing ; Communication networks ; Decision analysis ; Decision making ; Electronic devices ; Entropy ; Entropy method ; Internet of Things ; IoT ; MCDM ; MOORA ; Multiple criterion ; Multiple objective analysis ; Optimization ; Performance evaluation ; Protocols ; Security ; Security requirements ; Weightage</subject><ispartof>IEEE access, 2022, Vol.10, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-a9c59d27ee8c89b4b7a4917c427f8132f0af525ac1c48ddd91b83f4de07cb9613</citedby><cites>FETCH-LOGICAL-c408t-a9c59d27ee8c89b4b7a4917c427f8132f0af525ac1c48ddd91b83f4de07cb9613</cites><orcidid>0000-0001-8373-2781 ; 0000-0003-0126-9944</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9919340$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2096,4010,27610,27900,27901,27902,54908</link.rule.ids></links><search><creatorcontrib>Khan, Habib Ullah</creatorcontrib><creatorcontrib>Sohail, Muhammad</creatorcontrib><creatorcontrib>Nazir, Shah</creatorcontrib><title>Features-based IoT Security Authentication Framework using Statistical Aggregation, Entropy, and MOORA Approaches</title><title>IEEE access</title><addtitle>Access</addtitle><description>The Internet of Thing (IoT) is one of the most imperative technology for all organizations that's play a vital role in many operations, using communication networks, for exchange of data in order to perform a useful task. However, security of IoT devices and data is a major concern. This research work prioritizes the alternatives of security authentication features from studied articles. The multi-objective optimization method based on the ratio analysis (MOORA) is useful in multi-criteria decision making (MCDM) for ranking the alternatives. The statistical aggregation (SA) method has been used to assign weights to security authentication features in comparison to entropy method. In this paper, we identify weights for authentication features using the proposed SA method. Moreover, we evaluate the accuracy rates of the proposed model using entropy method. Finally, we ranked out the alternatives of authentication features using the MOORA approach. In fact, the entropy weight values came against the initial value of the objects in which the accuracy was 15% which is not suitable to this problem while the accuracy of the SA is 85%. Hence, the accuracy improvement is approximately 70 % using the SA method. This method is applicable for finding the weights of the objects based on initial values by MCDM approaches. We study the key security authentication which is the preserving of confidentiality, integrity, and availability that are the prime objectives for security of an IoT device. Furthermore, challenges are preserving the selected attributes through any approach, as discussed in the literature, adds to the complexity of IoT device security. We identify the future challenges to improve the security of IoT devices.</description><subject>Accuracy</subject><subject>Agglomeration</subject><subject>Alternatives</subject><subject>Authentication</subject><subject>Cloud computing</subject><subject>Communication networks</subject><subject>Decision analysis</subject><subject>Decision making</subject><subject>Electronic devices</subject><subject>Entropy</subject><subject>Entropy method</subject><subject>Internet of Things</subject><subject>IoT</subject><subject>MCDM</subject><subject>MOORA</subject><subject>Multiple criterion</subject><subject>Multiple objective analysis</subject><subject>Optimization</subject><subject>Performance evaluation</subject><subject>Protocols</subject><subject>Security</subject><subject>Security requirements</subject><subject>Weightage</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUV1r4zAQNOUKLb3-gr4I-lrn9GVLejQhuQv0CDTts5DlletcaqWSzJF_f0pdyu3LLrMzoxVTFHcELwjB6kezXK52uwXFlC4YJVSw6qK4pqRWJatY_e2_-aq4jXGPc8kMVeK6eF-DSVOAWLYmQoc2_hntwE5hSCfUTOkVxjRYkwY_onUwb_DXhz9oisPYo13KeDyvD6jp-wD9B-8BrcYU_PH0gMzYod_b7VODmuMxeGNfIX4vLp05RLj97DfFy3r1vPxVPm5_bpbNY2k5lqk0ylaqowJAWqla3grDFRGWU-EkYdRh4ypaGUssl13XKdJK5ngHWNhW1YTdFJvZt_Nmr49heDPhpL0Z9AfgQ69NyMcfQANrMW2drIADd1woqZxgljIDtuZSZa_72St_4n2CmPTeT2HM52sqaE1IhWWVWWxm2eBjDOC-XiVYn6PSc1T6HJX-jCqr7mbVAABfCqWIYhyzf1dekEQ</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>Khan, Habib Ullah</creator><creator>Sohail, Muhammad</creator><creator>Nazir, Shah</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-8373-2781</orcidid><orcidid>https://orcid.org/0000-0003-0126-9944</orcidid></search><sort><creationdate>2022</creationdate><title>Features-based IoT Security Authentication Framework using Statistical Aggregation, Entropy, and MOORA Approaches</title><author>Khan, Habib Ullah ; Sohail, Muhammad ; Nazir, Shah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-a9c59d27ee8c89b4b7a4917c427f8132f0af525ac1c48ddd91b83f4de07cb9613</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Accuracy</topic><topic>Agglomeration</topic><topic>Alternatives</topic><topic>Authentication</topic><topic>Cloud computing</topic><topic>Communication networks</topic><topic>Decision analysis</topic><topic>Decision making</topic><topic>Electronic devices</topic><topic>Entropy</topic><topic>Entropy method</topic><topic>Internet of Things</topic><topic>IoT</topic><topic>MCDM</topic><topic>MOORA</topic><topic>Multiple criterion</topic><topic>Multiple objective analysis</topic><topic>Optimization</topic><topic>Performance evaluation</topic><topic>Protocols</topic><topic>Security</topic><topic>Security requirements</topic><topic>Weightage</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Khan, Habib Ullah</creatorcontrib><creatorcontrib>Sohail, Muhammad</creatorcontrib><creatorcontrib>Nazir, Shah</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Khan, Habib Ullah</au><au>Sohail, Muhammad</au><au>Nazir, Shah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Features-based IoT Security Authentication Framework using Statistical Aggregation, Entropy, and MOORA Approaches</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2022</date><risdate>2022</risdate><volume>10</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>The Internet of Thing (IoT) is one of the most imperative technology for all organizations that's play a vital role in many operations, using communication networks, for exchange of data in order to perform a useful task. However, security of IoT devices and data is a major concern. This research work prioritizes the alternatives of security authentication features from studied articles. The multi-objective optimization method based on the ratio analysis (MOORA) is useful in multi-criteria decision making (MCDM) for ranking the alternatives. The statistical aggregation (SA) method has been used to assign weights to security authentication features in comparison to entropy method. In this paper, we identify weights for authentication features using the proposed SA method. Moreover, we evaluate the accuracy rates of the proposed model using entropy method. Finally, we ranked out the alternatives of authentication features using the MOORA approach. In fact, the entropy weight values came against the initial value of the objects in which the accuracy was 15% which is not suitable to this problem while the accuracy of the SA is 85%. Hence, the accuracy improvement is approximately 70 % using the SA method. This method is applicable for finding the weights of the objects based on initial values by MCDM approaches. We study the key security authentication which is the preserving of confidentiality, integrity, and availability that are the prime objectives for security of an IoT device. Furthermore, challenges are preserving the selected attributes through any approach, as discussed in the literature, adds to the complexity of IoT device security. We identify the future challenges to improve the security of IoT devices.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2022.3212735</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0001-8373-2781</orcidid><orcidid>https://orcid.org/0000-0003-0126-9944</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2022, Vol.10, p.1-1
issn 2169-3536
2169-3536
language eng
recordid cdi_proquest_journals_2726115085
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals
subjects Accuracy
Agglomeration
Alternatives
Authentication
Cloud computing
Communication networks
Decision analysis
Decision making
Electronic devices
Entropy
Entropy method
Internet of Things
IoT
MCDM
MOORA
Multiple criterion
Multiple objective analysis
Optimization
Performance evaluation
Protocols
Security
Security requirements
Weightage
title Features-based IoT Security Authentication Framework using Statistical Aggregation, Entropy, and MOORA Approaches
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T17%3A32%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Features-based%20IoT%20Security%20Authentication%20Framework%20using%20Statistical%20Aggregation,%20Entropy,%20and%20MOORA%20Approaches&rft.jtitle=IEEE%20access&rft.au=Khan,%20Habib%20Ullah&rft.date=2022&rft.volume=10&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2022.3212735&rft_dat=%3Cproquest_doaj_%3E2726115085%3C/proquest_doaj_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2726115085&rft_id=info:pmid/&rft_ieee_id=9919340&rft_doaj_id=oai_doaj_org_article_e3b02bf85e4e4f47989f73c23aec6489&rfr_iscdi=true