{"title":"Ensuring the integrity assessment of IoT medical sensors using hesitant fuzzy sets.","authors":"Waeal J Obidallah","doi":"10.1177/14604582241301019","DOIUrl":null,"url":null,"abstract":"<p><p><b>Objective:</b> The Internet of Medical Things (IoMT) is transforming healthcare systems, but concerns about device integrity and sensitive data are growing. The study aims to develop a framework for evaluating and prioritizing integrity schemes in healthcare for IoT-based medical sensor devices, addressing the challenges of selecting the right authentication solution due to its complexity and intricacy. <b>Methods:</b> A unified health-hesitant fuzzy expert system for IoMT sensor integrity assessment in Saudi Arabia is described in this paper. Medical sensor integrity literature and professionals are contacted first. Delphi is used to gather attributes of integrity approaches while an Internet of Things medical sensor integrity specialist supervises the operation. After collecting characteristics, good assessment criteria are created and the hesitant fuzzy analytic network procedure is used to assess integrity. <b>Results:</b> Functional integrity and measurement accuracy are the biggest factors in IoMT sensor security and integrity, according to assessment. The framework achieves 93%, 94%, and 95% precision, accuracy, and recall compared to current approaches. The framework helps healthcare integrity security professionals and stakeholders assess and resolve IoT medical sensor authentication issues. <b>Conclusion:</b> This health-hesitant fuzzy expert system will let Saudi Arabian and international healthcare stakeholders safely deploy IoMT sensors in the changing healthcare landscape.</p>","PeriodicalId":55069,"journal":{"name":"Health Informatics Journal","volume":null,"pages":null},"PeriodicalIF":2.2000,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Health Informatics Journal","FirstCategoryId":"3","ListUrlMain":"https://doi.org/10.1177/14604582241301019","RegionNum":3,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"HEALTH CARE SCIENCES & SERVICES","Score":null,"Total":0}
引用次数: 0
Abstract
Objective: The Internet of Medical Things (IoMT) is transforming healthcare systems, but concerns about device integrity and sensitive data are growing. The study aims to develop a framework for evaluating and prioritizing integrity schemes in healthcare for IoT-based medical sensor devices, addressing the challenges of selecting the right authentication solution due to its complexity and intricacy. Methods: A unified health-hesitant fuzzy expert system for IoMT sensor integrity assessment in Saudi Arabia is described in this paper. Medical sensor integrity literature and professionals are contacted first. Delphi is used to gather attributes of integrity approaches while an Internet of Things medical sensor integrity specialist supervises the operation. After collecting characteristics, good assessment criteria are created and the hesitant fuzzy analytic network procedure is used to assess integrity. Results: Functional integrity and measurement accuracy are the biggest factors in IoMT sensor security and integrity, according to assessment. The framework achieves 93%, 94%, and 95% precision, accuracy, and recall compared to current approaches. The framework helps healthcare integrity security professionals and stakeholders assess and resolve IoT medical sensor authentication issues. Conclusion: This health-hesitant fuzzy expert system will let Saudi Arabian and international healthcare stakeholders safely deploy IoMT sensors in the changing healthcare landscape.
期刊介绍:
Health Informatics Journal is an international peer-reviewed journal. All papers submitted to Health Informatics Journal are subject to peer review by members of a carefully appointed editorial board. The journal operates a conventional single-blind reviewing policy in which the reviewer’s name is always concealed from the submitting author.