A Multi-Criteria Decision-Making Process for the Selection of an Efficient and Reliable IoT Application
Abstract
:1. Introduction
- In this research, we create efficient recommendation systems for evaluating and ranking IoT applications with the help of the MCDM framework. An MCDM strategy implementing the fuzzy TOPSIS (a technique for order performance by similarity to ideal solution) framework was used to reduce the sophistication of the envisioned solution. To the best of our experience and understanding, this is the first study to suggest a fuzzy TOPSIS for designing a recommendation method in the setting of the IoT. It is, correspondingly, the first study to investigate as well as verify the standards utilized in the anticipated system. The results demonstrate that the suggested fuzzy TOPSIS model is reliable as well as feasible for building IoT decision-making schemes.
- From this current perspective, the study also aims to compare the outcomes with those of other MCDM approaches. It aims to investigate the outcomes of fuzzy TOPSIS and TOPSIS approaches that were used to tackle the issue of effective and trustworthy IoT application selection.
2. Literature Review
3. Materials and Methods
3.1. Fuzzy TOPSIS Approach
3.2. Fuzzy TOPSIS Approach
4. Results
4.1. Statistical Findings
4.2. Comparative Findings of the Fuzzy TOPSIS and TOPSIS Analysis
5. Discussion
6. Conclusions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Alfayad, F.S. Huawei and the Gulf region: Market opportunities despite the ongoing US-China trade war. Int. Rev. Manag. Mark. 2019, 9, 47–53. [Google Scholar] [CrossRef]
- Albreem, M.A.; Sheikh, A.M.; Bashir, M.J.; El-Saleh, A.A. Towards green Internet of Things (IoT) for a sustainable future in Gulf Cooperation Council countries: Current practices, challenges and future prospective. Wirel. Netw. 2022, 29, 539–567. [Google Scholar] [CrossRef]
- Ansari, M.T.J.; Baz, A.; Alhakami, H.; Alhakami, W.; Kumar, R.; Khan, R.A. P-STORE: Extension of STORE methodology to elicit privacy requirements. Arab. J. Sci. Eng. 2021, 46, 8287–8310. [Google Scholar] [CrossRef]
- Ansari, M.T.J.; Al-Zahrani, F.A.; Pandey, D.; Agrawal, A. A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development. BMC Med. Inform. Decis. Mak. 2020, 20, 236. [Google Scholar] [CrossRef]
- Habibi, N. The Persian Gulf and China: The Growth and Limits of Economic Ties. In Middle East Briefs; Crown Center for Middle East Studies: Waltham, MA, USA, 2020; p. 34201. [Google Scholar]
- Shambour, M.K.; Gutub, A. Progress of IoT research technologies and applications serving Hajj and Umrah. Arab. J. Sci. Eng. 2022, 47, 1253–1273. [Google Scholar]
- Brdesee, H. Exploring Factors Impacting E-Commerce Adoption in Tourism Industry in Saudi Arabia. Ph.D. Thesis, RMIT University, Melbourne, VIC, Australia, 2013. [Google Scholar]
- Othman, F.M. A System of Mobile Service Units for the Large-Scale Event Industry: An Implementation for the Hajj, the Pilgrimage to Makkah, Saudi Arabia. Ph.D. Thesis, Loughborough University, Loughborough, UK, 2003. [Google Scholar]
- Ansari, M.T.J.; Pandey, D.; Alenezi, M. STORE: Security threat oriented requirements engineering methodology. J. King Saud Univ.-Comput. Inf. Sci. 2018, 34, 191–203. [Google Scholar]
- Vailshery, L.S. IOT Connected Devices Worldwide 2019–2030. Statista. Available online: https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/ (accessed on 25 September 2022).
- Saudi Arabia Internet of Things (IOT) Market, by Component (Software, Hardware, Services), by Connectivity, by End Use, by Region, by Top 5 Cities, Competition, Opportunity, and Forecast, 2017–2027. Research and Markets-Market Research Reports-Welcome. Available online: https://www.researchandmarkets.com/reports/5562151/saudi-arabia-internet-of-things-iot-market-by (accessed on 25 September 2022).
- Nabeeh, N.A.; Abdel-Basset, M.; El-Ghareeb, H.A.; Aboelfetouh, A. Neutrosophic multi-criteria decision making approach for iot-based enterprises. IEEE Access 2019, 7, 59559–59574. [Google Scholar] [CrossRef]
- Abdel-Basset, M.; Gamal, A.; Son, L.H.; Smarandache, F. A bipolar neutrosophic multi criteria decision making framework for professional selection. Appl. Sci. 2020, 10, 1202. [Google Scholar]
- Ansari, M.T.J.; Agrawal, A.; Khan, R.A. DURASec: Durable Security Blueprints for Web-Applications Empowering Digital India Initiative. ICST Trans. Scalable Inf. Syst. 2022, 9, e7. [Google Scholar] [CrossRef]
- Guo, X.; Zeng, T.; Wang, Y.; Zhang, J. Fuzzy TOPSIS approaches for assessing the intelligence level of IoT-based tourist attractions. IEEE Access 2018, 7, 1195–1207. [Google Scholar] [CrossRef]
- Tariq, M.I.; Mian, N.A.; Sohail, A.; Alyas, T.; Ahmad, R. Evaluation of the challenges in the Internet of medical things with multicriteria decision making (AHP and TOPSIS) to overcome its obstruction under fuzzy environment. Mob. Inf. Syst. 2020, 2020, 8815651. [Google Scholar] [CrossRef]
- Gupta, N.; Sharma, V.; Kashyap, M. A critical analysis of sensor based IoT architectures using fuzzy TOPSIS. In Proceedings of the 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India, 12–13 October 2018; pp. 21–27. [Google Scholar]
- Yadav, S.; Garg, D.; Luthra, S. Development of IoT based data-driven agriculture supply chain performance measurement framework. J. Enterp. Inf. Manag. 2020, 34, 292–327. [Google Scholar] [CrossRef]
- Chakraborty, B.; Das, S. Introducing a new supply chain management concept by hybridizing topsis, IoT and cloud computing. J. Inst. Eng. (India) Ser. C 2021, 102, 109–119. [Google Scholar] [CrossRef]
- Singla, C.; Mahajan, N.; Kaushal, S.; Verma, A.; Sangaiah, A.K. Modelling and analysis of multi-objective service selection scheme in IoT-cloud environment. In Cognitive Computing for Big Data Systems over IoT; Springer: Cham, Switzerland, 2018; pp. 63–77. [Google Scholar]
- Qahtan, S.; Sharif, K.Y.; Zaidan, A.A.; Alsattar, H.A.; Albahri, O.S.; Zaidan, B.B.; Zulzalil, H.; Osman, M.H.; Alamoodi, A.H.; Mohammed, R.T. Novel multi security and privacy benchmarking framework for blockchain-based IoT healthcare industry 4.0 systems. IEEE Trans. Ind. Inform. 2022, 18, 6415–6423. [Google Scholar] [CrossRef]
- Wibowo, S.; Grandhi, S. Fuzzy multicriteria analysis for performance evaluation of internet-of-things-based supply chains. Symmetry 2018, 10, 603. [Google Scholar] [CrossRef]
- Gardas, B.B.; Heidari, A.; Navimipour, N.J.; Unal, M. A Fuzzy-Based Method for Objects Selection in Blockchain-Enabled Edge-IoT Platforms Using a Hybrid Multi-Criteria Decision-Making Model. Appl. Sci. 2022, 12, 8906. [Google Scholar] [CrossRef]
- Mahmoudi, A.; Deng, X.; Javed, S.A.; Zhang, N. Sustainable supplier selection in megaprojects: Grey ordinal priority approach. Bus. Strategy Environ. 2021, 30, 318–339. [Google Scholar] [CrossRef]
- Ijemaru, G.K.; Ang, L.M.; Seng, K.P. Transformation from IoT to IoV for waste management in smart cities. J. Netw. Comput. Appl. 2022, 204, 103393. [Google Scholar] [CrossRef]
- Krishankumar, R.; Ecer, F. Selection of IoT service provider for sustainable transport using q-rung orthopair fuzzy CRADIS and unknown weights. Appl. Soft Comput. 2023, 132, 109870. [Google Scholar] [CrossRef]
- Ahmed, U.; Carpitella, S.; Certa, A.; Izquierdo, J. A Feasible Framework for Maintenance Digitalization. Processes 2023, 11, 558. [Google Scholar] [CrossRef]
- Deveci, M.; Gokasar, I.; Pamucar, D.; Chen, Y.; Coffman, D.M. Sustainable E-scooter parking operation in urban areas using fuzzy Dombi based RAFSI model. Sustain. Cities Soc. 2023, 91, 104426. [Google Scholar] [CrossRef]
- Alyami, H.; Nadeem, M.; Alharbi, A.; Alosaimi, W.; Ansari, T.J.; Pandey, D.; Kumar, R.; Khan, R.A. The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective. Appl. Sci. 2021, 11, 11784. [Google Scholar] [CrossRef]
- Kan, S.H. Metrics and Models in Software Quality Engineering; Addison-Wesley Professional: Boston, MA, USA, 2003. [Google Scholar]
- Tribus, M.; McIrvine, E.C. Energy and information. Sci. Am. 1971, 225, 179–190. [Google Scholar] [CrossRef]
- Zeng, M.L.; Chan, L.M. Trends and issues in establishing interoperability among knowledge organization systems. J. Am. Soc. Inf. Sci. Technol. 2004, 55, 377–395. [Google Scholar] [CrossRef]
- Ansari, M.T.J.; Pandey, D. Risks, security, and privacy for HIV/AIDS data: Big data perspective. In Big Data Analytics in HIV/AIDS Research; IGI Global: Hershey, PA, USA, 2018; pp. 117–139. [Google Scholar]
- Ansari, T.J.; Pandey, D. An Integration of Threat Modeling with Attack Pattern and Misuse Case for Effective Security Requirement Elicitation. Int. J. Adv. Res. Comput. Sci. 2017, 8, 16–20. [Google Scholar]
- Benford, S.; Greenhalgh, C.; Reynard, G.; Brown, C.; Koleva, B. Understanding and constructing shared spaces with mixed-reality boundaries. ACM Trans. Comput. Interact. 1998, 5, 185–223. [Google Scholar] [CrossRef]
- Winer, R.S. A framework for customer relationship management. Calif. Manag. Rev. 2001, 43, 89–105. [Google Scholar] [CrossRef]
- Yoon, K.P.; Hwang, C.L. Multiple Attribute Decision Making: An Introduction; Sage Publications: Thousand Oaks, CA, USA, 1995. [Google Scholar]
- Alyami, H.; Ansari MT, J.; Alharbi, A.; Alosaimi, W.; Alshammari, M.; Pandey, D.; Agrawal, A.; Kumar, R.; Khan, R.A. Effectiveness Evaluation of Different IDSs Using Integrated Fuzzy MCDM Model. Electronics 2022, 11, 859. [Google Scholar] [CrossRef]
- Alzahrani, F.A.; Ahmad, M.; Ansari, M.T.J. Towards Design and Development of Security Assessment Framework for Internet of Medical Things. Appl. Sci. 2022, 12, 8148. [Google Scholar] [CrossRef]
- Alharbi, A.; Ansari, T.J.; Alosaimi, W.; Alyami, H.; Alshammari, M.; Agrawal, A.; Kumar, R.; Pandey, D.; Khan, R.A. An Empirical Investigation to Understand the Issues of Distributed Software Testing amid COVID-19 Pandemic. Processes 2022, 10, 838. [Google Scholar] [CrossRef]
- Alassery, F.; Alzahrani, A.; Khan, A.I.; Khan, A.; Nadeem, M.; Ansari, T.J. Quantitative Evaluation of Mental-Health in Type-2 Diabetes Patients Through Computational Model. Intell. Autom. Soft Comput. 2022, 32, 1701–1715. [Google Scholar] [CrossRef]
- Braglia, M.; Frosolini, M.; Montanari, R. Fuzzy TOPSIS approach for failure mode, effects and criticality analysis. Qual. Reliab. Eng. Int. 2003, 19, 425–443. [Google Scholar] [CrossRef]
- Agrawal, A.; Khan, R.A.; Ansari, M.T.J. Empowering Indian Citizens through the Secure E-Governance: The Digital India Initiative Context. In Emerging Technologies in Data Mining and Information Security; Springer: Singapore, 2023; pp. 3–11. [Google Scholar]
- Ansari, M.T.J.; Khan, N.A. Worldwide COVID-19 Vaccines Sentiment Analysis Through Twitter Content. Electron. J. Gen. Med. 2021, 18, em329. [Google Scholar] [CrossRef]
- Khan, A.I.; Alsolami, F.; Alqurashi, F.; Abushark, Y.B.; Sarker, I.H. Novel energy management scheme in IoT enabled smart irrigation system using optimized intelligence methods. Eng. Appl. Artif. Intell. 2022, 114, 104996. [Google Scholar] [CrossRef]
- Almalawi, A.; Khan, A.I.; Alqurashi, F.; Abushark, Y.B.; Alam, M.M.; Qaiyum, S. Modeling of Remora Optimization with Deep Learning Enabled Heavy Metal Sorption Efficiency Prediction onto Biochar. Chemosphere 2022, 303, 135065. [Google Scholar] [CrossRef] [PubMed]
- Khan, A.I.; Alghamdi, A.S.A.; Abushark, Y.B.; Alsolami, F.; Almalawi, A.; Ali, A.M. Recycling waste classification using emperor penguin optimizer with deep learning model for bioenergy production. Chemosphere 2022, 307, 136044. [Google Scholar] [CrossRef] [PubMed]
- Alassery, F.; Alzahrani, A.; Khan, A.I.; Irshad, K.; Kshirsagar, S.R. An artificial intelligence-based solar radiation prophesy model for green energy utilization in energy management system. Sustain. Energy Technol. Assess. 2022, 52, 102060. [Google Scholar] [CrossRef]
Criteria | Description |
---|---|
Ease of Use (R1) | Ease of use is a fundamental term that refers to how simple it is for users to use a product. Design professionals identify particular metrics for each project, such as “Users should be allowed to tap Find within three seconds of attempting to access the interface.” The goal is to optimize ease of use while providing maximum features and functions and upholding business constraints [30]. |
Energy Consumption (R2) | All of the energy utilized to execute an action, manufacture something, or merely inhabit a construction is referred to as energy consumption. Power factor, energy consumption, peak voltage, as well as power consumption are all factors that influence energy consumption. Meters’ functionality enables them to be used for a variety of monitoring purposes [31]. |
Interoperability (R3) | Interoperability is the characteristic that allows uncontrolled resource-sharing among various systems. This could be described as the capacity to share data among distinct elements or machines, via both hardware and software, or as the transfer of information and infrastructure between multiple machines through local area networks (LANs) or wide area networks (WANs). The term interoperability is widely defined as the capacity of two or more elements or systems to share information and utilize that information [32]. |
Privacy (R4) | When it comes to the Internet, privacy refers to an individual’s personal or a group’s command over their preferential anonymity, and also how secure they feel about sharing and storing information. One important objective of data privacy is to guarantee that data in transport and at rest has always been shielded while enabling information to flow [33]. |
Availability (R5) | One of the three basic features of security management prevalent in all systems is availability. The assumption that a computer is accessible or available to an authorized user whenever they are required is known as availability. System availability must be high to guarantee that the system works as expected when required. The availability of the products allows for the development of fault detection systems. In addition, it guarantees backup computation by incorporating hot and cold sites into planning for disaster recovery [34]. |
Interface (R6) | An interface in computer technology is a shared boundary that allows three or more distinct elements of a computer system to exchange information. Applications, computer hardware, passive components, humans, and combinations of these, can all be exchanged [35]. |
Customer Service(R7) | Customer service refers to a variety of services that help customers make the most cost-effective and appropriate use of a good or service. It includes help with production planning, installation, mentoring, troubleshooting, servicing, upgrading, and decommissioning. Technical support is also used to refer to IoT technology items such as portable phones, sensors, computer systems, software platforms, or other mechanical and electronic products [36]. |
Criteria | Category | Weight | |
---|---|---|---|
1 | R1 | + | (0.143,0.143,0.143) |
2 | R2 | + | (0.143,0.143,0.143) |
3 | R3 | + | (0.143,0.143,0.143) |
4 | R4 | + | (0.143,0.143,0.143) |
5 | R5 | + | (0.143,0.143,0.143) |
6 | R6 | + | (0.143,0.143,0.143) |
7 | R7 | + | (0.143,0.143,0.143) |
Code | Linguistic terms | L | M | U |
---|---|---|---|---|
1 | Very low | 1 | 1 | 3 |
2 | Low | 1 | 3 | 5 |
3 | Medium | 3 | 5 | 7 |
4 | High | 5 | 7 | 9 |
5 | Very high | 7 | 9 | 9 |
R1 | R2 | R3 | R4 | R5 | R6 | R7 | |
---|---|---|---|---|---|---|---|
T1 | (4.275,6.275,8.231) | (4.319,6.319,8.011) | (4.099,6.099,7.989) | (4.385,6.385,7.989) | (4.187,6.187,8.077) | (4.341,6.341,8.143) | (4.319,6.319,8.121) |
T2 | (4.385,6.385,8.165) | (4.319,6.319,8.099) | (4.341,6.341,8.055) | (4.297,6.297,8.121) | (4.209,6.209,7.901) | (4.209,6.209,8.033) | (4.363,6.363,8.011) |
T3 | (4.297,6.297,8.143) | (4.604,6.604,8.253) | (4.187,6.187,7.989) | (4.451,6.451,8.099) | (4.165,6.165,7.923) | (4.275,6.275,8.033) | (4.209,6.209,7.945) |
T4 | (4.385,6.385,8.187) | (4.385,6.385,8.077) | (4.363,6.363,8.099) | (4.099,6.099,7.967) | (4.033,6.033,7.879) | (4.143,6.143,7.967) | (4.209,6.209,7.967) |
T5 | (4.143,6.143,8.033) | (4.473,6.473,8.209) | (4.451,6.451,8.209) | (4.275,6.275,8.121) | (4.297,6.297,8.121) | (4.253,6.253,8.209) | (4.209,6.209,8.011) |
T6 | (4.451,6.451,8.275) | (4.341,6.341,8.165) | (4.143,6.143,8.033) | (4.319,6.319,8.143) | (4.187,6.187,8.099) | (4.143,6.143,7.989) | (4.275,6.275,8.143) |
R1 | R2 | R3 | R4 | R5 | R6 | R7 | |
---|---|---|---|---|---|---|---|
T1 | (0.517,0.758,0.995) | (0.523,0.766,0.971) | (0.499,0.743,0.973) | (0.538,0.784,0.981) | (0.516,0.762,0.995) | (0.529,0.772,0.992) | (0.530,0.776,0.997) |
T2 | (0.530,0.772,0.987) | (0.523,0.766,0.981) | (0.529,0.772,0.981) | (0.528,0.773,0.997) | (0.518,0.765,0.973) | (0.513,0.756,0.979) | (0.536,0.781,0.984) |
T3 | (0.519,0.761,0.984) | (0.558,0.800,1.000) | (0.510,0.754,0.973) | (0.547,0.792,0.995) | (0.513,0.759,0.976) | (0.521,0.764,0.979) | (0.517,0.762,0.976) |
T4 | (0.530,0.772,0.989) | (0.531,0.774,0.979) | (0.531,0.775,0.987) | (0.503,0.749,0.978) | (0.497,0.743,0.970) | (0.505,0.748,0.971) | (0.517,0.762,0.978) |
T5 | (0.501,0.742,0.971) | (0.542,0.784,0.995) | (0.542,0.786,1.000) | (0.525,0.771,0.997) | (0.529,0.775,1.000) | (0.518,0.762,1.000) | (0.517,0.762,0.984) |
T6 | (0.538,0.780,1.000) | (0.526,0.768,0.989) | (0.505,0.748,0.979) | (0.530,0.776,1.000) | (0.516,0.762,0.997) | (0.505,0.748,0.973) | (0.525,0.771,1.000) |
R1 | R2 | R3 | R4 | R5 | R6 | R7 | |
---|---|---|---|---|---|---|---|
T1 | (0.074,0.108,0.142) | (0.075,0.109,0.139) | (0.071,0.106,0.139) | (0.077,0.112,0.140) | (0.074,0.109,0.142) | (0.076,0.110,0.142) | (0.076,0.111,0.143) |
T2 | (0.076,0.110,0.141) | (0.075,0.109,0.140) | (0.076,0.110,0.140) | (0.075,0.111,0.143) | (0.074,0.109,0.139) | (0.073,0.108,0.140) | (0.077,0.112,0.141) |
T3 | (0.074,0.109,0.141) | (0.080,0.114,0.143) | (0.073,0.108,0.139) | (0.078,0.113,0.142) | (0.073,0.109,0.140) | (0.074,0.109,0.140) | (0.074,0.109,0.140) |
T4 | (0.076,0.110,0.141) | (0.076,0.111,0.140) | (0.076,0.111,0.141) | (0.072,0.107,0.140) | (0.071,0.106,0.139) | (0.072,0.107,0.139) | (0.074,0.109,0.140) |
T5 | (0.072,0.106,0.139) | (0.078,0.112,0.142) | (0.078,0.112,0.143) | (0.075,0.110,0.143) | (0.076,0.111,0.143) | (0.074,0.109,0.143) | (0.074,0.109,0.141) |
T6 | (0.077,0.111,0.143) | (0.075,0.110,0.141) | (0.072,0.107,0.140) | (0.076,0.111,0.143) | (0.074,0.109,0.143) | (0.072,0.107,0.139) | (0.075,0.110,0.143) |
Positive Ideal | Negative Ideal | |
---|---|---|
R1 | (0.077,0.111,0.143) | (0.072,0.106,0.139) |
R2 | (0.080,0.114,0.143) | (0.075,0.109,0.139) |
R3 | (0.078,0.112,0.143) | (0.071,0.106,0.139) |
R4 | (0.078,0.113,0.143) | (0.072,0.107,0.140) |
R5 | (0.076,0.111,0.143) | (0.071,0.106,0.139) |
R6 | (0.076,0.110,0.143) | (0.072,0.107,0.139) |
R7 | (0.077,0.112,0.143) | (0.074,0.109,0.140) |
Distance from Positive Ideal | Distance from Negative Ideal | |
---|---|---|
T1 | 0.018 | 0.016 |
T2 | 0.017 | 0.017 |
T3 | 0.015 | 0.018 |
T4 | 0.023 | 0.009 |
T5 | 0.013 | 0.019 |
T6 | 0.017 | 0.017 |
Ci | Rank | |
---|---|---|
T1 | 0.47 | 5 |
T2 | 0.509 | 3 |
T3 | 0.538 | 2 |
T4 | 0.282 | 6 |
T5 | 0.595 | 1 |
T6 | 0.495 | 4 |
Ranking Order | 1 | 2 | 3 | 4 | 5 | 6 |
---|---|---|---|---|---|---|
TOPSIS | T5 | T2 | T6 | T1 | T3 | T4 |
Fuzzy TOPSIS | T5 | T3 | T2 | T6 | T1 | T4 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alojaiman, B. A Multi-Criteria Decision-Making Process for the Selection of an Efficient and Reliable IoT Application. Processes 2023, 11, 1313. https://doi.org/10.3390/pr11051313
Alojaiman B. A Multi-Criteria Decision-Making Process for the Selection of an Efficient and Reliable IoT Application. Processes. 2023; 11(5):1313. https://doi.org/10.3390/pr11051313
Chicago/Turabian StyleAlojaiman, Bader. 2023. "A Multi-Criteria Decision-Making Process for the Selection of an Efficient and Reliable IoT Application" Processes 11, no. 5: 1313. https://doi.org/10.3390/pr11051313
APA StyleAlojaiman, B. (2023). A Multi-Criteria Decision-Making Process for the Selection of an Efficient and Reliable IoT Application. Processes, 11(5), 1313. https://doi.org/10.3390/pr11051313