Research Article

Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method

Table 8

Limit matrix.

Node labelCriteria for evaluating security of Internet of Medical ThingsAvailable component
AvailabilityAuthenticationConfidentialitySafetyStabilityContinuityTrustworthinessAuditingNetwork monitoringSecure key managementAccess controlNon-repudiationIoMT1IoMT2IoMT3

Criteria for evaluating security of Internet of Medical ThingsAvailability0.170.170.170.170.170.170.170.170.170.170.170.170.000.000.00
Authentication0.180.180.180.180.180.180.180.180.180.180.180.180.000.000.00
Confidentiality0.130.130.130.130.130.130.130.130.130.130.130.130.000.000.00
Safety0.100.100.100.100.100.100.100.100.100.100.100.100.000.000.00
Stability0.090.090.090.090.090.090.090.090.090.090.090.090.000.000.00
Continuity0.080.080.080.080.080.080.080.080.080.080.080.080.000.000.00
Trustworthiness0.060.060.060.060.060.060.060.060.060.060.060.060.000.000.00
Auditing0.050.050.050.050.050.050.050.050.050.050.050.050.000.000.00
Network monitoring0.040.040.040.040.040.040.040.040.040.040.040.040.000.000.00
Secure key management0.040.040.040.040.040.040.040.040.040.040.040.040.000.000.00
Access control0.020.020.020.020.020.020.020.020.020.020.020.020.000.000.00
Non-repudiation0.030.030.030.030.030.030.030.030.030.030.030.030.000.000.00

Available componentIoMT10.000.000.000.000.000.000.000.000.000.000.000.000.600.600.60
IoMT20.000.000.000.000.000.000.000.000.000.000.000.000.250.250.25
IoMT30.000.000.000.000.000.000.000.000.000.000.000.000.160.160.16