TY - JOUR
T1 - Cybersecuriy Risk Management and Evaluation Framework of Blockchain Identity Management Systems in HIoT
T2 - Experts Evaluation
AU - Alamri, Bandar
AU - Richardson, Ita
AU - Crowley, Katie
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2024
Y1 - 2024
N2 - This paper presents an evaluation of a cybersecurity risk management and evaluation framework for Blockchain-based Identity Management Systems (BC-IdM) in the Health Internet of Things (HIoT). In this paper, thirteen experts were interviewed using a Delphi method to evaluate the framework, which includes the factors that are used to evaluate any HIoT BC-IdM system and the cybersecurity risk management processes and activities that should be applied. In addition, the Simple Multi-Attribute Rating Technique (SMART) was used in the interviews and questionnaires with the experts to assign weights to the twenty-six identified evaluation factors to rank them based on their importance. The identified factors are divided into four main categories: security and privacy, technical, HIoT-related considerations, and external aspects. This paper shows that the security and privacy factors are the most important among other factors. Using Delphi, an agreement on the details of the framework was sought, including the cybersecurity risk management processes and activities in the main phases: framing, assessment, responding, and mentoring of risks. This article identifies the main and subcategories of the evaluation factors and explains the framework content in detail. It presents recommendations and findings concerning Blockchain-based Identity Management Systems in Health Internet of Things. The framework plays a role in standardizing BC-IdM in HIoT and contributes to the applicability and reliability of such systems by considering security, privacy, technical, HIoT-related, and external considerations.
AB - This paper presents an evaluation of a cybersecurity risk management and evaluation framework for Blockchain-based Identity Management Systems (BC-IdM) in the Health Internet of Things (HIoT). In this paper, thirteen experts were interviewed using a Delphi method to evaluate the framework, which includes the factors that are used to evaluate any HIoT BC-IdM system and the cybersecurity risk management processes and activities that should be applied. In addition, the Simple Multi-Attribute Rating Technique (SMART) was used in the interviews and questionnaires with the experts to assign weights to the twenty-six identified evaluation factors to rank them based on their importance. The identified factors are divided into four main categories: security and privacy, technical, HIoT-related considerations, and external aspects. This paper shows that the security and privacy factors are the most important among other factors. Using Delphi, an agreement on the details of the framework was sought, including the cybersecurity risk management processes and activities in the main phases: framing, assessment, responding, and mentoring of risks. This article identifies the main and subcategories of the evaluation factors and explains the framework content in detail. It presents recommendations and findings concerning Blockchain-based Identity Management Systems in Health Internet of Things. The framework plays a role in standardizing BC-IdM in HIoT and contributes to the applicability and reliability of such systems by considering security, privacy, technical, HIoT-related, and external considerations.
KW - Blockchain
KW - cybersecurity risk management
KW - Delphi
KW - evaluation
KW - health IoT
KW - identity management
KW - Multi-Criteria Decision Making
UR - http://www.scopus.com/inward/record.url?scp=85205419219&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2024.3468379
DO - 10.1109/ACCESS.2024.3468379
M3 - Article
SN - 2169-3536
VL - 12
SP - 144652
EP - 144683
JO - IEEE Access
JF - IEEE Access
ER -