Success Factors of IoT Security: A Structured Analysis Using Fuzzy-AHP

The advent of the Internet of Things (IoT) marks a significant milestone in digital innovation, transforming numerous aspects of daily life. As IoT continues to proliferate, ensuring robust security becomes increasingly critical, drawing attention from both academic and industry circles. This study...

Full description

Saved in:
Bibliographic Details
Main Authors: Muhammad Zohaib, Abeer Abdulaziz AlSanad, Muhammad Azeem Akbar
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10684204/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The advent of the Internet of Things (IoT) marks a significant milestone in digital innovation, transforming numerous aspects of daily life. As IoT continues to proliferate, ensuring robust security becomes increasingly critical, drawing attention from both academic and industry circles. This study seeks to systematically identify and categorize the primary success factors essential for securing IoT systems. By synthesizing insights from comprehensive literature reviews and detailed questionnaires, we have identified 21 pivotal success factors frequently referenced in both scholarly research and practical implementations. These success factors are organized into four key categories: Security protocols and Standards, Threat Detection and Prevention Mechanisms, Device Security management and Governance, Risk and Compliance (GRC). To evaluate the relative importance of these factors, we employ the fuzzy Analytic Hierarchy Process (fuzzy-AHP), a method recognized for its effectiveness in addressing complex decision-making challenge within IT contexts. This innovative application of fuzzy-AHP in the IoT security domain facilitates the nuanced prioritization of these success factors. Our research offers a structured hierarchy of IoT security success factors, providing critical guidance for practitioners and academics in developing more resilient and effective security strategies for the evolving IoT ecosystem.
ISSN:2169-3536