{"id":"https://openalex.org/W3082806071","doi":"https://doi.org/10.1155/2020/8829595","title":"Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method","display_name":"Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method","publication_year":2020,"publication_date":"2020-09-01","ids":{"openalex":"https://openalex.org/W3082806071","doi":"https://doi.org/10.1155/2020/8829595","mag":"3082806071"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8829595","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8829595","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8829595.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8829595.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102724797","display_name":"Xucheng Huang","orcid":"https://orcid.org/0000-0002-4641-102X"},"institutions":[{"id":"https://openalex.org/I146613903","display_name":"Shanghai Lixin University of Accounting and Finance","ror":"https://ror.org/02g81yf77","country_code":"CN","type":"education","lineage":["https://openalex.org/I146613903"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xucheng Huang","raw_affiliation_strings":["School of Finance, Shanghai Lixin University of Accounting and Finance, Shanghai 201209, China"],"affiliations":[{"raw_affiliation_string":"School of Finance, Shanghai Lixin University of Accounting and Finance, Shanghai 201209, China","institution_ids":["https://openalex.org/I146613903"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020009700","display_name":"Shah Nazir","orcid":"https://orcid.org/0000-0003-0126-9944"},"institutions":[{"id":"https://openalex.org/I4210142599","display_name":"University of Swabi","ror":"https://ror.org/04ez8az68","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210142599"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Shah Nazir","raw_affiliation_strings":["Department of Computer Science, University of Swabi, Swabi, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Swabi, Swabi, Pakistan","institution_ids":["https://openalex.org/I4210142599"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102724797"],"corresponding_institution_ids":["https://openalex.org/I146613903"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":3.2246,"has_fulltext":true,"cited_by_count":27,"citation_normalized_percentile":{"value":0.9232017,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.972000002861023,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9550999999046326,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8352041244506836},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6366285085678101},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6082432270050049},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5939549803733826},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5792263150215149},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.509149968624115},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.49170786142349243},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.45988404750823975},{"id":"https://openalex.org/keywords/wearable-technology","display_name":"Wearable technology","score":0.4531058669090271},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3378658890724182},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18814954161643982},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.1419954001903534}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8352041244506836},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6366285085678101},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6082432270050049},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5939549803733826},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5792263150215149},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.509149968624115},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.49170786142349243},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.45988404750823975},{"id":"https://openalex.org/C54290928","wikidata":"https://www.wikidata.org/wiki/Q4845080","display_name":"Wearable technology","level":3,"score":0.4531058669090271},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3378658890724182},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18814954161643982},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.1419954001903534},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8829595","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8829595","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8829595.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ea1237d448814a5ea0087e76569fcb32","is_oa":true,"landing_page_url":"https://doaj.org/article/ea1237d448814a5ea0087e76569fcb32","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8829595","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8829595","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8829595.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3082806071.pdf","grobid_xml":"https://content.openalex.org/works/W3082806071.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W2017392369","https://openalex.org/W2052650124","https://openalex.org/W2161857810","https://openalex.org/W2391315998","https://openalex.org/W2568658310","https://openalex.org/W2691059671","https://openalex.org/W2733889053","https://openalex.org/W2765739766","https://openalex.org/W2768152971","https://openalex.org/W2782169620","https://openalex.org/W2784053622","https://openalex.org/W2790360011","https://openalex.org/W2889531475","https://openalex.org/W2896821547","https://openalex.org/W2897829713","https://openalex.org/W2948013588","https://openalex.org/W2970573904","https://openalex.org/W2979173878","https://openalex.org/W3004742816","https://openalex.org/W3015014633","https://openalex.org/W3040379978","https://openalex.org/W3040521429","https://openalex.org/W4239797467"],"related_works":["https://openalex.org/W3090300519","https://openalex.org/W2514492205","https://openalex.org/W4250401876","https://openalex.org/W2943851981","https://openalex.org/W2566526749","https://openalex.org/W2907667791","https://openalex.org/W3047461507","https://openalex.org/W3126390843","https://openalex.org/W4245880644","https://openalex.org/W2481123202"],"abstract_inverted_index":{"Internet":[0,33],"of":[1,32,34,41,46,57,82,89,94,103,133],"Medical":[2],"Things":[3,35],"(IoMT)":[4],"plays":[5],"an":[6,85],"important":[7,52,126],"role":[8],"in":[9,26,29,43,49,68],"healthcare.":[10,44],"Different":[11],"devices":[12,23,48],"such":[13],"as":[14,147],"smart":[15],"sensors,":[16],"wearable":[17],"devices,":[18],"handheld,":[19],"and":[20,59,63,77,123],"many":[21],"other":[22,125],"are":[24],"connected":[25],"a":[27],"network":[28,109],"the":[30,38,74,92,95,101,107,129,134,138],"form":[31],"(IoT)":[36],"for":[37],"smooth":[39],"running":[40],"communication":[42],"Security":[45],"these":[47],"healthcare":[50],"is":[51,67,84,98,115],"due":[53],"to":[54,71,99],"its":[55],"nature":[56],"functionality":[58],"efficiency.":[60],"An":[61],"efficient":[62],"robust":[64],"security":[65,80,102],"system":[66],"dire":[69],"need":[70],"cope":[72],"with":[73],"attacks,":[75],"threats,":[76],"vulnerability.":[78],"The":[79,112,131],"evaluation":[81],"IoMT":[83,104,140],"issue":[86],"since":[87],"couple":[88],"years.":[90],"Therefore,":[91],"aim":[93],"proposed":[96,113,135],"study":[97],"evaluate":[100],"by":[105],"using":[106,117],"analytic":[108],"(ANP)":[110],"process.":[111],"approach":[114],"applied":[116],"ISO/IEC":[118],"27002":[119],"(ISO":[120],"27002)":[121],"standard":[122],"some":[124],"features":[127],"from":[128],"literature.":[130],"results":[132],"research":[136],"demonstrate":[137],"effective":[139],"components":[141],"which":[142],"can":[143],"further":[144],"be":[145],"used":[146],"secure":[148],"IoMT.":[149]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
