{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:43:29Z","timestamp":1774161809528,"version":"3.50.1"},"reference-count":27,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,9,1]]},"abstract":"<jats:p>Internet of Medical Things (IoMT) plays an important role in healthcare. Different devices such as smart sensors, wearable devices, handheld, and many other devices are connected in a network in the form of Internet of Things (IoT) for the smooth running of communication in healthcare. Security of these devices in healthcare is important due to its nature of functionality and efficiency. An efficient and robust security system is in dire need to cope with the attacks, threats, and vulnerability. The security evaluation of IoMT is an issue since couple of years. Therefore, the aim of the proposed study is to evaluate the security of IoMT by using the analytic network (ANP) process. The proposed approach is applied using ISO\/IEC 27002 (ISO 27002) standard and some other important features from the literature. The results of the proposed research demonstrate the effective IoMT components which can further be used as secure IoMT.<\/jats:p>","DOI":"10.1155\/2020\/8829595","type":"journal-article","created":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T23:34:00Z","timestamp":1599003240000},"page":"1-14","source":"Crossref","is-referenced-by-count":23,"title":["Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4641-102X","authenticated-orcid":true,"given":"Xucheng","family":"Huang","sequence":"first","affiliation":[{"name":"School of Finance, Shanghai Lixin University of Accounting and Finance, Shanghai 201209, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0126-9944","authenticated-orcid":true,"given":"Shah","family":"Nazir","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Swabi, Swabi, Pakistan"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.2985082"},{"key":"2","first-page":"87","volume-title":"Systematic analysis of security implementation for internet of health things in mobile health networks","year":"2020"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-07760-5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2876088"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2789329"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2016.2631546"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0384-6"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-016-0168-0"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101747"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-3700-7_1"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2017.2767291"},{"key":"15","volume":"17","year":"2014","journal-title":"International Journal on Advances"},{"key":"18","year":"2015"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.3390\/s18030817"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3006358"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8852124"},{"key":"23","first-page":"1","volume":"15","year":"2015","journal-title":"International Arab Journal of Information and Technology"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.09.012"},{"key":"27","first-page":"1","volume":"47","year":"2015","journal-title":"Sindh University Research Journal (Science Series)"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/535970"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2019.124780"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/bf03191825"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2017.080650"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.05.048"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9629381"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-8618-3_26"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8829595.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8829595.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8829595.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T23:34:03Z","timestamp":1599003243000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8829595\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,1]]},"references-count":27,"alternative-id":["8829595","8829595"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8829595","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,1]]}}}