Research Article
Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method
Table 5
Comparison with respect to IoMT3.
| | Availability | Authentication | Confidentiality | Safety | Stability | Continuity | Trustworthiness | Auditing | Network monitoring | Secure key management | Access control | Non-repudiation | EV |
| Availability | 1 | 3 | 2 | 3 | 4 | 2 | 5 | 2 | 3 | 2 | 7 | 5 | 0.192 | Authentication | 1/3 | 1 | 2 | 4 | 3 | 5 | 2 | 5 | 3 | 5 | 7 | 2 | 0.173 | Confidentiality | 1/2 | 1/2 | 1 | 3 | 2 | 2 | 2 | 2 | 7 | 2 | 7 | 5 | 0.132 | Safety | 1/3 | 1/4 | 1/3 | 1 | 1/2 | 2 | 3 | 5 | 3 | 3 | 3 | 5 | 0.098 | Stability | 1/4 | 1/3 | 1/2 | 2 | 1 | 2 | 2 | 2 | 3 | 2 | 7 | 2 | 0.089 | Continuity | 1/2 | 1/5 | 1/2 | 1/2 | 1/2 | 1 | 3 | 3 | 2 | 2 | 3 | 2 | 0.073 | Trustworthiness | 1/5 | 1/2 | 1/2 | 1/3 | 1/2 | 1/3 | 1 | 2 | 3 | 2 | 2 | 3 | 0.059 | Auditing | 1/2 | 1/5 | 1/2 | 1/5 | 1/2 | 1/3 | 1/2 | 1 | 2 | 3 | 3 | 2 | 0.054 | Network monitoring | 1/3 | 1/3 | 1/7 | 1/3 | 1/3 | 1/2 | 1/3 | 1/2 | 1 | 2 | 2 | 2 | 0.039 | Secure key management | 1/2 | 1/5 | 1/2 | 1/3 | 1/2 | 1/2 | 1/2 | 1/3 | 1/2 | 1 | 2 | 2 | 0.040 | Access control | 1/7 | 1/7 | 1/7 | 1/3 | 1/7 | 1/3 | 1/2 | 1/3 | 1/2 | 1/2 | 1 | 2 | 0.023 | Non-repudiation | 1/5 | 1/2 | 1/5 | 1/5 | 1/2 | 1/2 | 1/3 | 1/2 | 1/2 | 1/2 | 1/2 | 1 | 0.028 |
|
|
CR = 0.10.
|