Research Article
Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method
Table 3
Comparison with respect to IoMT1.
| | Availability | Authentication | Confidentiality | Safety | Stability | Continuity | Trustworthiness | Auditing | Network monitoring | Secure key management | Access control | Non-repudiation | EV |
| Availability | 1 | 1/2 | 2 | 3 | 4 | 2 | 3 | 2 | 7 | 2 | 9 | 5 | 0.167 | Authentication | 2 | 1 | 2 | 4 | 3 | 3 | 2 | 5 | 3 | 5 | 7 | 2 | 0.189 | Confidentiality | 1/2 | 1/2 | 1 | 3 | 2 | 2 | 2 | 2 | 7 | 2 | 7 | 5 | 0.130 | Safety | 1/3 | 1/4 | 1/3 | 1 | 1/2 | 2 | 3 | 5 | 3 | 5 | 3 | 5 | 0.104 | Stability | 1/4 | 1/3 | 1/2 | 2 | 1 | 2 | 2 | 2 | 3 | 2 | 7 | 2 | 0.090 | Continuity | 1/2 | 1/3 | 1/2 | 1/2 | 1/2 | 1 | 3 | 3 | 2 | 2 | 3 | 5 | 0.082 | Trustworthiness | 1/3 | 1/2 | 1/2 | 1/3 | 1/2 | 1/3 | 1 | 2 | 3 | 2 | 4 | 3 | 0.064 | Auditing | 1/2 | 1/5 | 1/2 | 1/5 | 1/2 | 1/3 | 1/2 | 1 | 2 | 3 | 3 | 2 | 0.051 | Network monitoring | 1/7 | 1/3 | 1/7 | 1/3 | 1/3 | 1/2 | 1/3 | 1/2 | 1 | 2 | 2 | 2 | 0.036 | Secure key management | 1/2 | 1/5 | 1/2 | 1/5 | 1/2 | 1/2 | 1/2 | 1/3 | 1/2 | 1 | 2 | 2 | 0.038 | Access control | 1/9 | 1/7 | 1/7 | 1/3 | 1/7 | 1/3 | 1/4 | 1/3 | 1/2 | 1/2 | 1 | 2 | 0.022 | Non-repudiation | 1/5 | 1/2 | 1/5 | 1/5 | 1/2 | 1/5 | 1/3 | 1/2 | 1/2 | 1/2 | 1/2 | 1 | 0.028 |
|
|
CR = 0.985.
|