Open Access iconOpen Access

ARTICLE

crossmark

Healthcare Device Security Assessment through Computational Methodology

Masood Ahmad1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Sabita Khatri2, Adil Hussain Seh1, Mohd Nadeem1, Alka Agrawal1,*

1 Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, 226025, Uttar Pradesh, India
2 Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
3 Department of Computer Science, University College of Al Jamoum, Umm Al Qura University, Makkah, 21421, Saudi Arabia

* Corresponding Author: Alka Agrawal. Email: email

Computer Systems Science and Engineering 2022, 41(2), 811-828. https://doi.org/10.32604/csse.2022.020097

Abstract

The current study discusses the different methods used to secure healthcare devices and proposes a quantitative framework to list them in order of significances. The study uses the Hesitant Fuzzy (HF), Analytic Hierarchy Process (AHP) integrated with Fuzzy Technical for Order Preference by Similarities to Ideal Solution (TOPSIS) to classify the best alternatives to security techniques for healthcare devices to securing the devices. The technique is enlisted to rate the alternatives based on the degree of satisfaction of their weights. The ranks of the alternatives consequently decide the order of priority for the techniques. A1 was the most probable alternative of all the alternatives, according to the ranks of the alternatives acquired. This means that the security of A2 healthcare devices is the greatest of all the alternatives picked. A corroborative guide for the developers and the makers in quantitatively determining the security of healthcare devices to engineer efficacious devices will be the findings drawn up with the assistance of the proposed framework. The assessments performed using the proposed framework are systematic, precise, and definitive. Therefore, the results of the present empirical analysis are a stronger and accurate choice than the manual assessment of the device’s security.

Keywords


Cite This Article

APA Style
Ahmad, M., Al-Amri, J.F., Subahi, A.F., Khatri, S., Seh, A.H. et al. (2022). Healthcare device security assessment through computational methodology. Computer Systems Science and Engineering, 41(2), 811-828. https://doi.org/10.32604/csse.2022.020097
Vancouver Style
Ahmad M, Al-Amri JF, Subahi AF, Khatri S, Seh AH, Nadeem M, et al. Healthcare device security assessment through computational methodology. Comput Syst Sci Eng. 2022;41(2):811-828 https://doi.org/10.32604/csse.2022.020097
IEEE Style
M. Ahmad et al., “Healthcare Device Security Assessment through Computational Methodology,” Comput. Syst. Sci. Eng., vol. 41, no. 2, pp. 811-828, 2022. https://doi.org/10.32604/csse.2022.020097



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1701

    View

  • 964

    Download

  • 0

    Like

Share Link