Success Factors of IoT Security: A Structured Analysis Using Fuzzy-AHP
The advent of the Internet of Things (IoT) marks a significant milestone in digital innovation, transforming numerous aspects of daily life. As IoT continues to proliferate, ensuring robust security becomes increasingly critical, drawing attention from both academic and industry circles. This study...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2024-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10684204/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850114241219002368 |
|---|---|
| author | Muhammad Zohaib Abeer Abdulaziz AlSanad Muhammad Azeem Akbar |
| author_facet | Muhammad Zohaib Abeer Abdulaziz AlSanad Muhammad Azeem Akbar |
| author_sort | Muhammad Zohaib |
| collection | DOAJ |
| description | The advent of the Internet of Things (IoT) marks a significant milestone in digital innovation, transforming numerous aspects of daily life. As IoT continues to proliferate, ensuring robust security becomes increasingly critical, drawing attention from both academic and industry circles. This study seeks to systematically identify and categorize the primary success factors essential for securing IoT systems. By synthesizing insights from comprehensive literature reviews and detailed questionnaires, we have identified 21 pivotal success factors frequently referenced in both scholarly research and practical implementations. These success factors are organized into four key categories: Security protocols and Standards, Threat Detection and Prevention Mechanisms, Device Security management and Governance, Risk and Compliance (GRC). To evaluate the relative importance of these factors, we employ the fuzzy Analytic Hierarchy Process (fuzzy-AHP), a method recognized for its effectiveness in addressing complex decision-making challenge within IT contexts. This innovative application of fuzzy-AHP in the IoT security domain facilitates the nuanced prioritization of these success factors. Our research offers a structured hierarchy of IoT security success factors, providing critical guidance for practitioners and academics in developing more resilient and effective security strategies for the evolving IoT ecosystem. |
| format | Article |
| id | doaj-art-e086bae10e334a1fa6bd5ce7f6f53559 |
| institution | OA Journals |
| issn | 2169-3536 |
| language | English |
| publishDate | 2024-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-e086bae10e334a1fa6bd5ce7f6f535592025-08-20T02:36:57ZengIEEEIEEE Access2169-35362024-01-011218618618620910.1109/ACCESS.2024.346410210684204Success Factors of IoT Security: A Structured Analysis Using Fuzzy-AHPMuhammad Zohaib0https://orcid.org/0009-0007-7478-5671Abeer Abdulaziz AlSanad1https://orcid.org/0000-0003-0870-1285Muhammad Azeem Akbar2https://orcid.org/0000-0002-4906-6495Software Engineering Department, Lappeenranta-Lahti University of Technology, Lappeenranta, FinlandInformation Systems Department, Imam Mohammad Ibn Saud Islamic University, Riyadh, Saudi ArabiaSoftware Engineering Department, Lappeenranta-Lahti University of Technology, Lappeenranta, FinlandThe advent of the Internet of Things (IoT) marks a significant milestone in digital innovation, transforming numerous aspects of daily life. As IoT continues to proliferate, ensuring robust security becomes increasingly critical, drawing attention from both academic and industry circles. This study seeks to systematically identify and categorize the primary success factors essential for securing IoT systems. By synthesizing insights from comprehensive literature reviews and detailed questionnaires, we have identified 21 pivotal success factors frequently referenced in both scholarly research and practical implementations. These success factors are organized into four key categories: Security protocols and Standards, Threat Detection and Prevention Mechanisms, Device Security management and Governance, Risk and Compliance (GRC). To evaluate the relative importance of these factors, we employ the fuzzy Analytic Hierarchy Process (fuzzy-AHP), a method recognized for its effectiveness in addressing complex decision-making challenge within IT contexts. This innovative application of fuzzy-AHP in the IoT security domain facilitates the nuanced prioritization of these success factors. Our research offers a structured hierarchy of IoT security success factors, providing critical guidance for practitioners and academics in developing more resilient and effective security strategies for the evolving IoT ecosystem.https://ieeexplore.ieee.org/document/10684204/IoT securitysuccess factorsprioritization-based-taxonomyfuzzy analytic hierarchy process (fuzzy-AHP) |
| spellingShingle | Muhammad Zohaib Abeer Abdulaziz AlSanad Muhammad Azeem Akbar Success Factors of IoT Security: A Structured Analysis Using Fuzzy-AHP IEEE Access IoT security success factors prioritization-based-taxonomy fuzzy analytic hierarchy process (fuzzy-AHP) |
| title | Success Factors of IoT Security: A Structured Analysis Using Fuzzy-AHP |
| title_full | Success Factors of IoT Security: A Structured Analysis Using Fuzzy-AHP |
| title_fullStr | Success Factors of IoT Security: A Structured Analysis Using Fuzzy-AHP |
| title_full_unstemmed | Success Factors of IoT Security: A Structured Analysis Using Fuzzy-AHP |
| title_short | Success Factors of IoT Security: A Structured Analysis Using Fuzzy-AHP |
| title_sort | success factors of iot security a structured analysis using fuzzy ahp |
| topic | IoT security success factors prioritization-based-taxonomy fuzzy analytic hierarchy process (fuzzy-AHP) |
| url | https://ieeexplore.ieee.org/document/10684204/ |
| work_keys_str_mv | AT muhammadzohaib successfactorsofiotsecurityastructuredanalysisusingfuzzyahp AT abeerabdulazizalsanad successfactorsofiotsecurityastructuredanalysisusingfuzzyahp AT muhammadazeemakbar successfactorsofiotsecurityastructuredanalysisusingfuzzyahp |