Next Article in Journal
A Brief Review of the Electromigration Reliability for Sn-Bi-Based Solder Joints
Previous Article in Journal
CSF: Fixed-Outline Floorplanning Based on the Conjugate Subgradient Algorithm and Assisted by Q-Learning
Previous Article in Special Issue
An Explainable AI Approach for Interpretable Cross-Layer Intrusion Detection in Internet of Medical Things
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Unified Computational Model for Assessing Security Risks in Internet of Transportation Things-Based Healthcare Applications

by
Waeal J. Obidallah
College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11673, Saudi Arabia
Electronics 2025, 14(24), 4894; https://doi.org/10.3390/electronics14244894
Submission received: 28 October 2025 / Revised: 2 December 2025 / Accepted: 3 December 2025 / Published: 12 December 2025

Abstract

The rapid growth of web-based applications has attracted increasing attention from cybercriminals, particularly within the expanding field of the internet of transportation things, which has diverse applications across industries such as healthcare. As internet of transportation things technologies are adopted more widely, significant challenges emerge, particularly regarding data and service security. Hackers are specifically targeting sensitive medical data during the transportation of health emergency services, with internet of transportation things devices utilized for remote patient monitoring, medical equipment tracking, and logistics optimization. This research aims to tackle these security concerns by evaluating the risks associated with maintaining data integrity in healthcare emergency services. The research also utilizes a symmetrical fuzzy decision-making methodology, Fuzzy ANP-TOPSIS, to evaluate diverse security concerns associated with the internet of transportation things, with an emphasis on healthcare applications. The case study of seven alternatives reveals that mediXcel electronic medical records are the most viable solution, whilst the Caresoft system for hospital information is considered the least effective. The findings provide critical insights for improving the security of internet of transportation things applications and assuring their seamless integration into healthcare, especially in emergency services, hence protecting patient data and fostering user confidence.

1. Introduction

Background: The Internet of Things (IoT) has rapidly become a transformative force across multiple industries in today’s digital landscape. Within this broad ecosystem, the Internet of Transportation Things (IoTT) represents a specialized subset focused exclusively on the integration of connected sensing, communication, and computing technologies within transportation networks. Unlike general IoT—which spans domains such as smart homes, agriculture, and manufacturing—IoTT concentrates on mobility-centric systems, including ambulances, medical supply transport vehicles, emergency response fleets, and intelligent traffic infrastructures that support healthcare logistics [1,2].
In emergency healthcare contexts, IoTT plays a crucial role by enabling real-time tracking of ambulances, continuous monitoring of in-transit patient vitals, optimized routing based on live traffic conditions, and secure transmission of medical records to hospitals before patient arrival. These capabilities enhance coordination, reduce response times, and improve decision-making during time-critical events.
However, the rising dependence on IoTT also introduces significant security and data-integrity challenges. For example, GPS spoofing can misroute ambulances, man-in-the-middle attacks may alter or delay patient telemetry data, and malware targeting vehicle communication units can disrupt emergency dispatch systems—all of which can directly endanger patient outcomes [3,4]. Thus, ensuring resilient, end-to-end security within IoTT environments is essential to safeguard sensitive medical data, preserve the reliability of transportation operations, and maintain uninterrupted emergency service delivery.
By 2019, the healthcare industry had already begun integrating IoT technologies at a significant pace, with approximately 86% of organizations utilizing IoT in various functions to enhance service delivery. This widespread adoption was reflected in the market valuation, with the IoT healthcare sector estimated at $158.1 billion in 2022, fueled by a notable compound annual growth rate of 28.6 percent starting in 2021 [3,4]. The exponential growth in healthcare data—doubling every 73 days on average—highlighted the urgent need for strong IoT cybersecurity frameworks. Market forecasts suggest that the global IoT healthcare market could surge to 534.3 billion dollars by the end of 2025, supported by a projected compound annual growth rate of 19.9 percentage over the next five years. Innovative solutions such as EarlySense, FreeStyle Libre, coagulation monitoring systems, and chronic disease management tools have significantly improved patient care. However, the rapid expansion of these technologies also drew attention to rising privacy concerns and system vulnerabilities, particularly in 2021, when IoT security became a critical focus area [5,6].
IoT’s transformative impact extends well beyond the healthcare domain. Its ability to optimize operations has driven adoption across sectors such as manufacturing and retail. In 2018, around 57% of manufacturers had incorporated IoT into their workflows, a figure that was expected to climb to 94% by 2021. Similarly, the retail sector projected a market expansion reaching $94.44 billion by 2025. At a macroeconomic level, IoT was expected to contribute between 4 trillion dollars and 11 trillion dollars in value globally by 2025, with major contributions from smart factories and urban infrastructure initiatives. These projections demonstrate IoT’s far-reaching potential, the critical importance of addressing its security challenges, and its transformative role in shaping modern industries. Figure 1 illustrates the anticipated growth of the IoT-enabled transportation market [3].
Governments around the world demonstrate their commitment to delivering high-quality healthcare through the establishment of extensive medical infrastructure and facilities [5,6,7]. In emergency scenarios, the timely and secure transfer of patients and medical supplies becomes crucial, as illustrated in Figure 2 [6]. Ensuring cybersecurity in internet of transportation things applications is vital to maintaining seamless healthcare operations and strengthening national preparedness during health crises. Moreover, data protection and legal compliance are top priorities in many nations. Safeguarding sensitive health information in accordance with regional regulations, for example, Health Insurance Portability and Accountability Act (HIPAA) in the United States, is essential [5,6,7]. Conducting thorough security risk assessments helps preserve the confidentiality of patient data while ensuring adherence to applicable laws.
The dynamic and continuously evolving landscape of cyber threats demands regular evaluation and adaptation of security protocols. No nation is entirely insulated from the sophisticated and ever-changing tactics employed by cybercriminals [8,9]. Conducting thorough security risk assessments is essential to identify and mitigate emerging vulnerabilities, particularly those associated with internet of transportation things applications used in healthcare emergency response systems.
Problem Statement: Domains such as medical IoT and internet of transportation things both handle sensitive data, internet of transportation things applications often extends beyond traditional healthcare environments, operating over public networks and across geographically distributed nodes, thereby increasing their exposure to cyber threats. Moreover, internet of transportation things systems increasingly supports real-time decision-making in critical scenarios—such as remote diagnostics, emergency care, and robotic surgeries—where even minimal latency (as low as 10 ms) or any form of data compromise can lead to life-threatening consequences [8,9,10]. Therefore, ensuring robust end-to-end security within IoTT environments is essential not only for protecting patient privacy but also for maintaining operational reliability and safeguarding clinical outcomes. The security of internet of transportation things applications is often considered more critical than that of Medical IoT (MIoT) in certain aspects due to the following reasons:
  • Autonomous Vehicles: A hacked self-driving car can cause a high-speed collision within seconds due to manipulated sensor data (e.g., GPS spoofing, false obstacle detection).
  • Traffic Management Systems: A compromised smart traffic light can trigger massive pileups by sending incorrect signals.
  • Aviation & Rail Systems: Cyberattacks on flight control or train signaling can lead to derailments or mid-air collisions.
  • Smart Highways & Connected Vehicles: A single breach can cause chain-reaction crashes involving hundreds of cars.
  • Public Transport Systems: Hacking metro controls (e.g., Moscow Metro cyber incident [8]) could derail trains during rush hour, killing hundreds.
  • Supply Chain Attacks: Hackers disrupting smart logistics can halt global trade.
  • Air Travel Chaos: A single airline cyberattacks (e.g., 2023 FAA NOTAM outage [9]) grounds thousands of flights.
  • Internet of transportation things security is more critical because failures cause instant, large-scale physical and economic disasters.
According to the problem statement, the following research questions have been formulated:
  • What are the key security vulnerabilities present in web-based IoTT applications used in emergency healthcare services?
  • How can a hybrid Fuzzy ANP–TOPSIS model be designed to prioritize security risks in IoTT-based healthcare environments?
  • How effective are existing security mechanisms in protecting IoT-based healthcare applications when applied to real-world IoTT case studies?
  • Which particular IoTT healthcare platforms (e.g., mediXcel EMR, Caresoft HIS) demonstrate superior resilience against prioritized security threats, and what factors contribute to this resilience?
  • What are the most and least effective mitigation strategies for addressing high-priority IoTT security risks in emergency medical services?
Objectives: Effective emergency healthcare services rely heavily on optimal resource allocation and management. Poorly addressed security risks can impair the utilization of transportation assets and critical medical resources. Risk assessments serve a key role in uncovering system weaknesses that could compromise operational efficiency [5,7].
In addition to operational efficiency, secure internet of transportation things systems ensures the safe handling and storage of patient records, allowing convenient data access while addressing risks such as data loss and unauthorized access [10,11]. The development of such systems typically involves multidisciplinary collaboration, where expert opinions may differ. To reconcile diverse viewpoints, Multiple Criteria Decision-Making (MCDM) methods are applied to formulate a cohesive decision framework [12]. In this study, a hybrid methodology integrating Fuzzy Set Theory, Analytic Network Process (ANP), and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is utilized to support the security risk assessment of internet of transportation things applications in healthcare emergencies.
Hence the objectives of the proposed research work are set as follows:
  • To examine the security vulnerabilities in web-based internet of transportation things applications, specifically within healthcare emergency services (Section 2)
  • To assess the risks related to data integrity and service security in IoT-enabled healthcare systems (e.g., remote patient monitoring, medical logistics) (Section 2)
  • To implement a cohesive unified model of Fuzzy Analytic Network Process and Fuzzy Technique for Order of Preference by Similarity to Ideal Solutions (Fuzzy ANP-TOPSIS) model for evaluating and prioritizing IoT security threats within healthcare environments (Section 3).
  • To evaluate different security solutions for IoT-based healthcare systems via a case study analysis (Section 3).
  • To ascertain the most and least efficacious strategies for protecting IoT healthcare applications (e.g., mediXcel EMR against Caresoft HIS) (Section 4)
  • To offer mitigating measures for improving IoT security in emergency healthcare services, safeguarding patient data and fostering user confidence (Section 4).
Outcomes: This hybrid Fuzzy ANP-TOPSIS model offers a structured and comprehensive means to evaluate security risks, weighing multiple criteria and their interdependencies. It supports the development of context-sensitive mitigation strategies—an essential requirement, as risks in internet of transportation things-based emergency healthcare applications can vary widely depending on local factors and system implementations. The model equips stakeholders with actionable insights for prioritizing risks, allocating resources, and strengthening cybersecurity strategies [7,10,11].
Key contributions of the studies are as follows:
  • This research study investigates the security issues by figuring out the risks of keeping data safe in healthcare emergency services with substantial attributes of security risk.
  • The research examines the significant advancements in security risk of internet of transportation things (IoTT) with an emphasis on healthcare applications. For this the study uses an integrated fuzzy decision-making method called Fuzzy ANP-TOPSIS to evaluate different security risks associated with the internet of transportation things (IoTT).
  • The research delineates the issues that security risk attributes presents to data security of internet of transportation thing, especially in healthcare environments, where the sensitivity of the data at its highest as it leads to several casualties.
  • The research study presents the application of multi-criteria decision analysis and the Fuzzy-ANP to assess and prioritize different attributes of Security risk for internet of transportation things (IoTT), emphasizing on healthcare applications by taking seven different alternatives of healthcare applications and prioritizing these according to the results achieved.
The principal goal of this research is to improve the robustness and security of internet of transportation things systems used in healthcare emergency services. By applying the Fuzzy ANP-TOPSIS hybrid framework, the study aspires to deliver practical recommendations that empower decision-makers, enhance system resilience, and ensure the reliability of critical healthcare services, particularly during high-stakes scenarios such as pandemic outbreaks.
The structure of this paper is organized as follows to provide a comprehensive understanding of the research. Section 2 presents the materials and methods, beginning with a detailed literature review (Section 2.1) to contextualize the study. Section 2.2 explores the cybersecurity threats in the internet of transportation things for emergency healthcare services, highlighting the key challenges and vulnerabilities. Section 2.3 outlines the methodology, focusing on the integrated Fuzzy ANP-TOPSIS approach used for multi-criteria decision-making. In Section 3, numerical analysis and results are presented, including all computations, the final ranking of alternatives, sensitivity analysis, and a comparative analysis to validate the model’s robustness. Section 4 offers a critical discussion of the findings, and Section 5 concludes the paper by summarizing key insights and potential directions for future research.

2. Materials and Methods

2.1. Literature Review

Significant developments in patient monitoring, diagnostics, and remote care have come from the IoT expanding integration in healthcare. However, it has also raised critical challenges regarding system security, data integrity, real-time decision-making, and privacy. Various studies have addressed these challenges from different perspectives (Table 1), yet key limitations persist in terms of interoperability, intelligent response mechanisms, cost-effective deployment, and holistic system integration.
This literature review explores recent advancements in IoT-enabled transportation and healthcare systems with a focus on security, usability, and risk management. Arslan et al. (2024) introduced DSML4PT, an area explicit modeling language designed to streamline the development of IoT-based public transportation systems [10]. Through evaluations across eight real-world applications, the language demonstrated an ability to automate nearly 80% of development tasks and reduce development time by approximately 50%. Usability feedback from domain experts rated DSML4PT highly (4.44 out of 5), indicating its practicality [10]. However, while the language shows promise, its adaptability to other IoT domains, such as smart healthcare or urban infrastructure, remains underexplored. Additionally, long-term scalability and maintainability were not adequately addressed. Future research could extend DSML4PT’s application scope and evaluate its performance in large-scale, heterogeneous environments.
Raza et al. (2024) offered a comprehensive review of blockchain-based reputation and trust management mechanisms across smart grids, healthcare, and transportation [11]. Their findings underscore the potential of blockchain to address critical challenges related to security and trust in decentralized systems. Despite these strengths, existing blockchain solutions often suffer from high energy consumption, scalability limitations, and compatibility issues with legacy systems. Moreover, many proposed models lack empirical validation. The review highlights the need for lightweight blockchain architectures suitable for resource-constrained IoT environments and calls for real-world testing to assess their viability. Researchers could contribute by developing and empirically evaluating energy-efficient, scalable blockchain frameworks tailored to sector-specific needs.
Ntafloukas et al. (2022) proposed a novel cyber-physical risk assessment methodology for IoT-enabled transportation infrastructure [12]. Using Monte Carlo simulations, their approach demonstrated that integrated control barriers could reduce cyber-physical risks by up to 71.8%. While the framework effectively integrates both cyber and physical dimensions of risk, its application is limited to a single case study. Broader validation across multiple types of transportation infrastructure, such as airports or rail networks, is necessary to determine its generalizability. Moreover, the dynamic nature of IoT-based threats underscores the need for real-time risk assessment tools capable of adapting to evolving threat landscapes.
Zhang et al. (2020) presented a geospatial modeling approach to enhance security in smart transportation systems [13]. Their architecture, tested through simulations in Beijing, uses geospatial intelligence to support strategic decision-making for urban transportation security. However, the study stops short of real-world implementation, and the authors do not thoroughly address privacy concerns associated with collecting and analyzing geospatial data. Future research should focus on deploying this architecture in live urban settings and integrating privacy-preserving mechanisms to safeguard users’ location data.
Khalid et al. (2021) developed a deep reinforcement learning-based autonomous transportation framework for emergency healthcare services [14]. The system aims to improve emergency response times while minimizing environmental impact. Despite its conceptual strengths, the framework has not yet been tested in real-world emergency scenarios. Furthermore, the study does not sufficiently explore the ethical and legal implications of deploying autonomous systems in critical healthcare operations. Practical trials and a comprehensive ethical analysis are essential next steps for translating this promising concept into a deployable solution.
In the healthcare domain, Salih et al. (2019) proposed a security risk management model tailored for IoT in hospitals [15]. Developed using the Decision-Making Trial and Evaluation Laboratory (DEMATEL) IoT Risk Assessment Procedure, the model addresses key dimensions such as technology security, human privacy, and data trustworthiness. A case study conducted in a Sudanese hospital demonstrated the model’s usability and effectiveness. However, its generalizability across diverse healthcare settings remains uncertain. Integration with existing hospital information systems is also lacking. Future work could focus on validating the model in various regional contexts and creating implementation strategies that align with existing IT infrastructure.
Singh et al. (2025) addressed pandemic resilience by proposing an intelligent transportation system that leverages vehicular delay-tolerant networks to deliver automated medical services [16]. The system is designed to minimize human contact, thereby reducing infection risk while maintaining service efficiency. Although conceptually sound, the system has yet to be deployed in a real-world setting. Additionally, there is limited discussion on its adaptability to both urban and rural environments. Research efforts should be directed at conducting pilot implementations and evaluating the system’s scalability across different geographical and demographic contexts.
Ashok and Gopikrishnan (2023) conducted a pragmatic and statistically grounded analysis of existing IoT-based remote health monitoring security models [1]. Their study highlights the diverse design architectures and performance variabilities across different security solutions, revealing that model selection and implementation are often resource-intensive and complex processes. While they provide a broad overview of various attack mitigation approaches—such as blockchain technologies, encryption techniques, and machine learning-based models—their work falls short in offering intelligent, adaptive selection frameworks that can facilitate streamlined deployment tailored to dynamic application needs.
Building on this foundation, Aouedi et al. (2024) presented a comprehensive survey on Intelligent IoT (IIoT), emphasizing the integration of AI with IoT to create more responsive and intelligent systems across healthcare, urban, and industrial domains [2]. Their analysis of prevailing privacy threats and security vulnerabilities underscores the urgent need for AI-driven intrusion detection systems and adaptive security mechanisms. However, despite its forward-looking insights, the study lacks a unified security model capable of merging AI analytics with the specific demands of real-time healthcare monitoring.
Rahman et al. (2022) explored the domain of vehicle health monitoring as a subset of the internet of everything, utilizing big data analytics to propose a centralized monitoring framework [3]. Although their focus lies outside traditional healthcare, their multi-layered approach demonstrates the potential applicability of secure, intelligent health monitoring architectures. Nevertheless, their proposed framework remains largely conceptual and lacks empirical validation within the healthcare context.
Habibzadeh et al. (2019) offered a clinical perspective on Healthcare IoT (H-IoT), identifying sensing, communication, and data analytics as the foundational pillars of next-generation healthcare systems [4]. Their emphasis on personalized care through data-driven decision-making marks a significant contribution; however, their work does not address the critical issues of real-time adaptive security or the coordination of multiple devices—challenges that are increasingly prevalent in real-world healthcare deployments.
In another significant contribution, Adil et al. (2024) conducted a security-focused survey on H-IoT, drawing attention to the fragmented and loosely structured nature of data communication in such systems [5]. This fragmentation exposes HC-IoT architectures to various security threats, underscoring the need for robust, high-standard infrastructures. While they identify key unresolved issues, their discussion remains largely theoretical and lacks concrete models for integrating security mechanisms into operational healthcare environments.
Wu et al. (2021) addressed healthcare system performance from a network perspective by proposing an edge-based hybrid architecture employing BLE and LoRa technologies [6]. Their work highlights the benefits of edge computing in latency-sensitive healthcare applications, particularly with regard to energy efficiency and extended coverage. However, their model prioritizes connectivity over the implementation of security and privacy-preserving measures at the edge layer.
Lastly, Qadri et al. (2020) projected the evolution of H-IoT within the framework of Medicine 4.0, outlining emerging technologies and trends in software-hardware integration [7]. While their vision is forward-thinking and aligned with digital healthcare transformation, they do not sufficiently tackle the critical issues of trustworthy, real-time, and privacy-compliant data exchange within clinical environments.
Across these studies, common research gaps include the lack of real-world validation, limited integration with existing infrastructure, and insufficient attention to ethical, legal, and societal implications. While previous studies have applied fuzzy ANP and TOPSIS methods to cybersecurity prioritization in healthcare systems, none have addressed the emerging risks associated with IoT-based healthcare transportation systems, nor have they integrated operational transportation factors with medical data protection requirements. Furthermore, many proposed frameworks lack scalability and adaptability to diverse operating conditions.
Addressing these gaps requires empirical studies that test theoretical models in practical settings, design of adaptable architectures for various sectors, and inclusion of ethical and privacy considerations in technology deployment. Bridging these divides will significantly strengthen the design, adoption, and impact of IoT-enabled systems in transportation and healthcare. The novelty of this study lies in: (i) the development of a comprehensive, multi-layered criteria framework that integrates medical cybersecurity requirements with transportation-specific operational risks in IoTT environments; (ii) the application of a hybrid fuzzy ANP–TOPSIS model to systematically address expert uncertainty and interdependencies among criteria; and (iii) the creation of a ranked decision-support framework tailored to emergency healthcare logistics. The integration of fuzzy ANP and TOPSIS is justified because cybersecurity criteria in IoT-enabled healthcare transportation systems are inherently interdependent, and expert judgments often involve uncertainty. Consequently, the hybrid approach produces more reliable prioritization outcomes than standalone AHP or traditional crisp methods.

2.2. Cybersecurity Threats in Internet of Transportation Things for Emergency Healthcare Services

Understanding the internet of transportation things is essential, particularly in the context of healthcare delivery systems where interconnected devices and sensors play a vital role. In recent years, there has been a concerning escalation in cybersecurity incidents, such as data breaches, ransomware attacks, and the unauthorized access to patient information. These threats affect not only individual patients but also affect healthcare professionals and institutions on a global scale, including nations like the United States and Saudi Arabia [2,4]. Devices used in emergency healthcare—such as wearables, medical monitors, and logistics systems—are particularly susceptible to cyberattacks like data interception, phishing, spoofing, and Distributed Denial of Service (DDoS) attacks [1,2].
Such vulnerabilities can lead to severe consequences, including financial losses, service disruptions, and risks to patient safety. To counter these threats, it is imperative to implement comprehensive security strategies. These should comprise strong encryption techniques, safe communication systems, replacement of default device credentials, and frequent vulnerability checks. Preserving data confidentiality and system integrity in healthcare depends also on safeguarding personal health information and handling the hazards related to automation and Artificial Intelligence (AI).
Several real-world incidents illustrate these vulnerabilities. The 2016 Mirai botnet attack, for example, launched a massive DDoS campaign that disrupted numerous internet services [5], showcasing the potential for similar disruptions in healthcare. The 2021 Verkada breach highlighted the importance of stringent access controls for security surveillance in hospitals [5,7]. In Finland, a healthcare provider faced a ransomware attack that interrupted essential services, reinforcing the need for resilient infrastructures. Notable events such as the Jeep Hack and Stuxnet also underscore the broader risks associated with insecure IoT environments, from tampered medical devices to sophisticated cyber-espionage operations [6,17].
These examples stress the urgent need for tailored cybersecurity solutions that reflect the unique operational context of healthcare emergency services. As hospitals and clinics increasingly rely on digital platforms for administrative, clinical, and financial functions—and as their networked infrastructures grow—cybersecurity and risks associated with it must be prioritized.
In the specific case of internet of transportation things applications, several interrelated security risks have been identified and are outlined in Table 2. These categories were derived based on a thematic analysis of literature across cybersecurity risk domains relevant to our study context, with alignment to international standards (e.g., NIST, ISO/IEC 27001 [18]). The subcategories, labeled as F1 through F11, represent distinct yet interrelated components within each primary risk domain (e.g., Transportation (F1), Physical Infrastructure Risks (F11), etc.). Each risk category is inherently linked to core system factors, demonstrating the complexity and interconnectedness of the threat landscape. Ultimately, the global rise in cyber threats affecting emergency healthcare underscores the need for proactive, layered security measures designed to protect both patient welfare and the integrity of critical medical infrastructure [7,8,9,10,13,14,15].
  • Risks to Infrastructure Integrity (F111): Potential physical threats that could compromise the structural stability of transportation systems.
  • Transportation Facilities Disruption (F112): Intentional acts aimed at damaging or disabling critical infrastructure such as roads, railways, or bridges.
  • Intruders Gaining Access to Important Transportation Sites (F113): Unauthorized access to secure transportation areas without proper clearance.
  • Exploits on Transportation Cyber-Networks (F121): Digital attacks targeting IT systems and communication networks used in transportation.
  • Breach of Data in Reservation and Ticketing Systems (F122): Exposure of sensitive user data due to unauthorized access to ticketing and reservation systems.
  • Threats to Transportation Networks (F123): Deployment of malware designed to disrupt or exploit vulnerabilities in transportation infrastructure.
  • Disregard for Safety Requirements (F131): Non-adherence to established safety procedures and standards within transportation operations.
  • Errors Caused by Ignorance of Safety Measures (F132): Transportation incidents that result from neglecting safety rules and operational protocols.
  • Noncompliance with Transportation Security Regulations (F133): Failure to fulfill minimum required security measures in the transport sector.
  • Unauthorized Access to Health Information (F211): Accessing or retrieving patient information without proper authorization.
  • Data Breach from Medical Devices During Transit (F212): Exposure or leakage of medical data during the transportation of medical equipment.
  • Disregard for Patient Privacy Requirements in Healthcare (F213): Violations of established privacy frameworks governing healthcare data handling.
  • Risks Associated with Medical Equipment (F221): Identifiable weaknesses in medical technologies that can be exploited by malicious actors.
  • Unapproved Use of Medical Devices (F222): Unauthorized use or control of medical devices.
  • Interference with Medical Sensors and Tracking Devices (F223): Manipulation or sabotage of healthcare sensors and monitoring devices.
  • Violation of HIPAA Regulations (F231): Failure to meet the data protection standards mandated by the HIPAA.
  • Infringements of Medical Transportation Regulations (F232): Failure to comply with protocols for the safe and secure transport of medical supplies and devices.
  • The Implications of Failure to Comply with the Law (F233): Legal penalties and consequences arising from non-compliance with healthcare regulations.
  • Internet of Things Device Security Flaws (F311): Built-in vulnerabilities or weak security features in Internet of Things (IoT) devices.
  • Unauthorized IoT Device Access (F312): Gaining illicit access to or taking control of IoT devices.
  • Hacking IoT Devices: Deliberate modification or sabotage of IoT hardware or firmware.
  • Data Compromises in Transportation Internet of Things (F321): Unauthorized access to data processed through IoT in the transportation sector.
  • Data Handling During Transmission (F322): Illegitimate alteration of data as it moves between devices or systems.
  • Data Security and Encryption Concerns (F323): Threats that undermine secure encryption and compromise data authenticity.
  • Leakage of Data Across Industries (F331): Unauthorized transmission of data between interconnected systems across different industries.
  • Disruption of Healthcare IoT Devices (F332): Intentional interference with medical IoT technologies.
  • Problems with Regulation in Intersectorial Cooperation (F333): Challenges in aligning regulations across sectors during IoT system integration.
In modern healthcare emergency services, addressing the security challenges posed by the integration of internet of transportation things technologies has become critically important. The growing interconnectivity between healthcare systems, medical devices, and transportation infrastructure plays a vital role in enabling timely and effective emergency response. However, this interconnected ecosystem also introduces significant vulnerabilities that must be carefully managed.
Physical infrastructure security is paramount, as transportation systems form the backbone of emergency logistics. Ensuring the resilience of transportation assets—such as ambulances, traffic control systems, and supply routes—is essential for the prompt movement of patients, medical equipment, and critical supplies. Any compromise in these systems can result in delays that may endanger patient outcomes during emergencies.
The cybersecurity risks aimed at the online systems that facilitate emergency medical care are as significant. These systems are becoming more and more appealing targets for cyberattacks as providers use the internet of transportation things for communication, route optimization, and real-time monitoring. Vulnerabilities in ticketing or transportation networks can interfere with emergency procedures and jeopardize private patient data, compromising service dependability and privacy.
Moreover, protecting medical data during transit is a key concern. Unsecured transmission channels and vulnerable medical devices can lead to unauthorized data access or leaks, jeopardizing patient confidentiality. In order to maintain confidence and ensure compliance with requirements such as the HIPAA, it is vital to maintain effective data protection measures throughout the whole transportation process [18,19].
Mitigating both physical and cyber risks associated with internet of transportation things in emergency healthcare is crucial to ensuring uninterrupted, secure, and high-quality care. A proactive and integrated security strategy is essential to support operational efficiency, safeguard patient data, and uphold public trust in a digitally connected healthcare landscape.
This article selected seven healthcare systems that integrate the internet of transportation things and evaluated them using the TOPSIS methodology to rank their associated risks. These systems were specifically chosen based on a combination of factors, including their role in healthcare management, alignment with the study’s objectives, and the diversity they offer in terms of operational scale, technological maturity, and geographical presence [2,6,8,19,20,21,22,23,24,25]. Their influence on healthcare innovation and their strategic contribution to shaping industry standards were also considered [15,18,22,26,27,28,29].
The selection process was strategic rather than random, aimed at ensuring a comprehensive and representative set of case studies across diverse contexts—crucial for deriving meaningful insights. The systems include: Trio Hospital Information System (HIS) [26], MediXcel Electronic Medical Records (EMR) [27], GeniPulse [28], Caresoft HIS [29], LiveHealth (for diagnostics) [30], Visual Hospital Management (VHM) [31], and NextGen [32]. These were assessed through a structured framework focusing on security and functionality within internet of transportation things-integrated healthcare environments.
To enable a robust comparison, the systems were selected to reflect varying levels of technological advancement, security strength, and healthcare application specialization. For instance, MediXcel and NextGen (EMR-focused), and Trio and Caresoft (HIS-focused), allow for comparison of different record-keeping architectures and their resilience to internet of transportation things-related vulnerabilities. LiveHealth (diagnostics) and GeniPulse (real-time analytics) help evaluate security issues in critical care settings, while VHM, with its visualization-driven interface, highlights the trade-offs between user accessibility and data protection.
These systems span cloud-based and on premise deployments, comply with standards like HIPAA and GDPR, and exhibit varied market adoption rates. This carefully curated selection enables the identification of best practices and key vulnerabilities in securing internet of transportation things-enabled healthcare systems, providing technically grounded and actionable insights for healthcare IT stakeholders.

2.3. Methodology

In the domain of IoT applications for transportation, the designs are marked by a significant degree of diversity and complexity due to the involvement of multifaceted processes. At the same time, the healthcare industry is going through significant changes, particularly in the ways that data gathering methods are being implemented and the enhancement of security measures [30,31]. As a consequence of this, security procedures in the healthcare business as well as applications for the IoT in transportation have been strengthened across a variety of aspects, including risk assessment and access control.
As seen in the above literature and background study [17] it is clear that problem of evaluating security risk for internet of transportation things in healthcare is multi-criteria in nature. A potent MCDM tool for internet of transportation things healthcare security, Fuzzy ANP-TOPSIS balances uncertainty, interdependencies, and multi-objective optimization. It helps managements to make policies for risk mitigation, therefore guaranteeing patient safety and data integrity. There are several reasons for using Fuzzy-ANP-TOPSIS in this evaluation, few of these are listed below:
  • Security risks in internet of transportation things involve vague, incomplete, and linguistic data
  • Unlike Analytic Hierarchy Process (AHP), ANP considers feedback and dependencies between criteria
  • A comparison is made between the alternatives in terms of how close they are to the ideal secure solution and how far they are from the worst-case situation.
This paper introduces the Fuzzy ANP-TOPSIS method as an integrated approach for assessing security risks in IoT transportation applications. The study examines security risks by evaluating three, nine, and twenty-seven key factors related to these applications. The next step involves determining the weights of these factors using the Fuzzy-ANP approach, which helps assess their relative impact on IoT transportation systems. After deriving these weights, the study conducts a detailed evaluation of alternative solutions through the Fuzzy-TOPSIS methodology. The complete process is visually represented in Figure 3, which outlines the Fuzzy ANP-TOPSIS methodology [25].
The flowchart in Figure 3 outlines the Fuzzy ANP-TOPSIS methodology, which begins with a comprehensive review of relevant literature and identifying the experts for decision making. This review establishes a basis for identifying diverse security risks and formulating the criteria required for their effective evaluation. The Fuzzy ANP is utilized as a decision-making instrument to evaluate multiple criteria in the comparison of alternative solutions. The methodology comprises four essential steps: constructing a security matrix and performing pairwise comparisons, verifying the presence of security factors post-comparisons, assigning access privileges through Fuzzy ANP analysis, and aggregating ratings to compute security risk weights, which are then ranked.
The interrelationship among various factors establishes a hierarchical structure, as illustrated in Table 2. These factors indicate different security risks, with their weights assigned based on an assessment of their impact on the factors and alternative solutions. The risk rankings are established through the Fuzzy ANP-TOPSIS methodology, providing a systematic and thorough framework for decision-making.
In the context of the IoT in transportation planning frameworks, the identification of security risks plays a pivotal role. These risks offer a precise mechanism and serve as a critical foundation for future research initiatives in the field. As such, addressing these risks is fundamental for the effective deployment of IoT technologies in transportation systems.
The challenges associated with decision-making, especially in the context of sensitive information and client objectives, highlight the necessity of examining diverse approaches and algorithms documented in the literature. Among the various methods for evaluating security risks, Fuzzy-ANP emerges as a notably appropriate technique relative to other multi-criteria decision-making methods. Nonetheless, it is crucial to recognize that, despite its strengths, Fuzzy-ANP cannot completely eradicate the vagueness and imprecision that characterize decision-making processes. Furthermore, the method’s dependence on subjective judgments introduces specific limitations. Nevertheless, the integration of the Fuzzy ANP-TOPSIS technique stands out as a unique approach, well-suited for evaluating the impact of alternative solutions within the IoT application domain for transportation things in healthcare domain. Next section explains the methodology of Fuzzy ANP TOPSIS in detail for further understanding.
Fuzzy ANP-TOPSIS Method
MCDM is a discipline designed to assist experts in evaluating options with conflicting factors [5,21,22], making it particularly effective when considering two or more competing issues simultaneously. This research work employs a fuzzy-based amalgam method that associates the ANP along with the TOPSIS to estimate security risk of internet of transportation things within the domain of healthcare. ANP, with its network structure, allows for the examination of relationships between different factors [32,33,34,35,36].
The incorporation of fuzzy logic with the hybrid ANP-TOPSIS method is applied in this research to enhance accuracy [35,36,37,38,39]. The procedure for evaluating weightage and ranking using this approach is detailed below:
Phase 1: Setting scale and definition of Triangular Fuzzy Number (TFN): After taking linguistic values through Table 2 principles, authors translate it into crisp numbers and TFN. This research work employs the TFNs as the membership functions and it lies between 0 and 1 [19]. TFN can be defined as (l, ed, u), where l, mi, and u (l ≤ ed ≤ u) are parameters representative the smallest, the equidistant value, and the largest value in the TFN, respectively. In addition, a fuzzy number m on F is termed as TFN, if its membership functions are given in Equations (1) and (2) and shown in Figure 4.
µ s   ( x )   = F [ 0 ,   1 ]
µ s x = x e d l l e d l   x [ l , e d ] x e d u u e d u   x e d , u   0   O t h e r w i s e
A panel of 60 experts was selected using purposive expert sampling. The experts comprised cybersecurity specialists, IoT system engineers, and emergency healthcare practitioners, each with an average of 8–15 years of experience. The inclusion criteria required relevant domain knowledge, prior involvement in IoT security projects, and a willingness to participate in the pairwise comparison process. Each expert completed pairwise comparison matrices for the criteria and sub-criteria using a fuzzy triangular scale (e.g., (1, 1, 3), (1, 3, 5), …). The comparisons were collected individually to avoid group bias, and all participants followed a structured worksheet developed for the Fuzzy ANP method. Practitioners assigned scores to the factors in a quantitative manner according to the scale shown in Table 3.
The following Equations (3)–(6) are used in adapting the numeric values into TFN [20] and denoted as (lij, edij, uij) where lij is lower value, edij is equidistant (middle) value and uij is uppermost level values. Additionally, TFN [ɳij] is recognized as:
ɳ i j = ( l i j , e d i j , u i j )
w h e r e   l i j e d i j u i j
l i j = m i n J i j d
e d i j = ( J i j 1 , J i j 2 , J i j 3 ) 1 x
a n d   u i j = m a x J i j d
In the calculations showed above, Jijd shows the reasonable position of the values between two factors or criteria and given by subject specialist d. In the equation i and j signify a pair of criteria being judged by subject specialists. Value ɳij, i.e., TFN is considered based on the geometric mean of subject specialist’s views for a specific judgment. Additionally, Equations (7)–(9) help to aggregate TFN values. Consider two TFNs M1 and M2, M1 = (l1, mi1, u1) and M2 = (l2, mi2, u2). The basic rules of mathematical operations on them are as:
( l 1 , e d 1 , u 1 ) + ( l 2 , e d 2 , u 2 ) = ( l 1 + l 2 , e d 1 + e d 2 , u 2 + u 2 )
( l 1 , e d 1 , u 1 ) × ( l 2 , e d 2 , u 2 ) = ( l 1 × l 2 , e d 1 × e d 2 , u 1 × u 2 )
( l 1 , e d 1 , u 1 ) 1 = ( 1 u 1 , 1 e d 1 , 1 l 1 )
Phase 2: Next phase is preparation of the pair wise comparison matrix by using the responses received from the subject specialists. For each crisp comparison matrix derived from the defuzzified values, the Consistency Ratio (CR) was calculated using Saaty’s method. Only matrices with CR < 0.1 were accepted; inconsistent matrices were returned to experts for revision. Calculation of the Consistency Index (CI) using the formula in Equation (10) as follows:
C I n = ( γ m a x Q n ) / ( Q n 1 )
where CIn: Consistency Index and Qn: is the number of associated attributes.
Within this the next ladder is calculating the Consistency Ratio (CR), using a random index is as Equation (11).
C R = C I n / R I
where RI = random index (CI of the randomly produced pairwise comparison matrix). Random index is derived from Saaty [38].
Phase 3: After the construction of the comparison matrix, defuzzification is performed to produce a quantifiable value based on the calculated TFN values. The defuzzification method adopted in this work has been derived from [18] as formulated in Equations (12)–(14) which is commonly referred to as the alpha cut method which is given as follows.
µ α , β ( ɳ i j ) = [ β . ɳ α ( l i j ) + ( 1 β ) . ɳ α ( u i j ) ]
where 0 ≤ α ≤ 1 and 0 ≤ β ≤ 1
Such that,
ɳ α ( l i j ) = ( e d i j l i j ) . α + l i j
ɳ α ( e d i j ) = u i j ( u i j e d i j ) . α
α and β in these equations are used for predilections of experts. These two values fluctuate between 0 and 1.
Phase 4: The subsequent phase involves the development of the super-matrix, derived from the priority vector obtained through paired comparisons among groups, encompassing goals, attributes, sub-attributes, and alternatives.
Phase 5: TOPSIS requires the performance ranking of each alternative across all normalized factors. The formula is as Equations (15) and (16):
E i j = x i j i = 1 m x i j 2
where i = 1, 2, … m; and j = 1, 2, … n.
Next Phase is calculating the normalized weighted decision matrix ( n s i j )
n s i j = w i E i j
where i = 1, 2, … m and j = 1, 2, … n.
Phase 6: Calculate positive ideal solution matrix (PiS+) and negative ideal solution matrix (NiS_) using Equations (17)–(19).
P i S + = n s 1 + , n s 2 + , n s 3 + . . n s n +
N i S = n s 1 , n s 2 , n s 3 . . n s n
where n s j + is Max nsij if j is an advantage factor and Max nsij if j is a cost factor; n s j _ is Min nsij if j is an advantage factor and Min nsij if j is a cost factor.
Phase 7: Next Phase is identifying the gap between the values of each option with the positive ideal solution matrix and negative ideal solution matrix:
Positive ideal solution:
d P i + = j = 1 m ( n s i + n s i j ) 2 ; i = 1,2 , 3 . m
Negative ideal solution:
d N i = j = 1 m ( n s i j n s i ) 2 ; i = 1,2 , 3 . m
where d P j + is the distance to the negative ideal solution for i option and d N i is the distance to the negative ideal solution.
Calculating the preference value for every security risk alternative based on internet of transportation things (IoTT) and healthcare (Pvi) (Equation (20)).
P v i = d N i d N i d P i +
where i = 1, 2, 3….m.
The methodological phases outlined in this study describe the complete procedure for assessing security risk factors in IoTT–enabled healthcare systems through the Fuzzy ANP–TOPSIS framework. This approach was applied to evaluate multiple healthcare service alternatives that operate in conjunction with IoTT-based infrastructures. The dataset used in this study was developed through an expert-driven evaluation process aimed at assessing security risk factors associated with the IoTT in healthcare environments. A panel of 60 experts was selected using purposive expert sampling to ensure that all participants possessed substantial and relevant professional experience (Table S1). The expert group consisted of cybersecurity specialists, IoTT system engineers, and emergency healthcare practitioners, each with an average of 8–15 years of domain experience.
Eligibility criteria required demonstrable expertise in IoTT security, prior participation in relevant projects, and willingness to contribute to the pairwise comparison procedures. Each expert independently completed pairwise comparison matrices for all criteria and sub-criteria using triangular fuzzy numbers—such as (1, 1, 3), (1, 3, 5), and related fuzzy scales—to avoid group bias. A structured worksheet aligned with Fuzzy ANP was provided to maintain uniformity in responses. In addition, practitioners assigned quantitative factor scores following the scale presented in Table 3. Collectively, these entries produced a comprehensive expert-annotated dataset comprising fuzzy relational judgments, aggregated weights, and evaluations of alternative healthcare service modes.
Ethical considerations and limitations were also carefully addressed throughout the methodological process to ensure responsible and compliant use of transportation–healthcare data in IoTT environments. All expert-derived inputs and any secondary data describing IoTT–enabled healthcare interactions were handled using strict ethical protocols, including adherence to anonymization, non-identifiability, and secure storage requirements. No personally identifiable information or sensitive patient-transportation records were collected at any stage. Despite these precautions, certain methodological limitations must be acknowledged. The expert-driven dataset, while robust, remains limited in size and may not fully capture the extensive variability present across real-world IoTT-based healthcare scenarios. Additionally, the contextual nature of expert judgments may affect the generalizability of results when applied to diverse transportation–healthcare infrastructures or rapidly evolving IoTT technologies. These factors underscore the need for cautious interpretation of the findings and highlight opportunities for expanding dataset diversity and validating the model with broader real-world deployments in future studies.
Before executing the analytical procedures, the dataset underwent essential preprocessing steps to ensure consistency and computational rigor. First, all expert-submitted matrices were examined for consistency, and those showing unacceptable inconsistency levels were returned for reassessment and correction following ANP guidelines. Subsequently, linguistic judgments were translated into triangular fuzzy numbers to facilitate fuzzy computations. To consolidate expert inputs, the fuzzy geometric mean was applied to each matrix, producing aggregated group judgments. Normalization procedures were then performed to align the weights of criteria and sub-criteria for meaningful comparison. In the TOPSIS phase, all fuzzy values were defuzzified using the centroid method, generating crisp numerical scores appropriate for distance-based ranking. These preprocessing steps ensured that the dataset was transformed into a coherent, reliable, and computation-ready format across both ANP and TOPSIS stages.
To evaluate the reliability and comparative effectiveness of the proposed Fuzzy ANP–TOPSIS framework, several baseline and advanced multi-criteria decision-making models were incorporated into the experimental design. Classical ANP and classical TOPSIS served as baseline benchmarks, while Fuzzy AHP, Fuzzy VIKOR, and Fuzzy DEMATEL–ANP were included as advanced comparison models due to their established use in security risk assessment and decision-making research. All comparison models were applied to the same expert-derived dataset to ensure methodological fairness and enable meaningful cross-method validation. ANP computations were performed using Super Decisions v3.2, whereas fuzzy computations and TOPSIS-related analyses were executed using MATLAB R2023b scripts to ensure precision and reproducibility.
The comparative analysis followed a rigorous evaluation protocol using multiple performance metrics to assess the reliability, stability, and discriminatory capacity of each model. Sensitivity analysis was conducted to determine how variations in criteria weights influenced the final ranking of alternatives. Additionally, the discriminatory power of each model was evaluated to measure the extent to which each method could distinguish among alternatives, including evaluations through hybrid MCDM techniques. A statistical assessment was also performed to capture expert perceptions regarding interpretability, logical coherence, and overall confidence in the rankings generated by each method. Together, these metrics provided a comprehensive comparative evaluation and highlighted the strengths and limitations of each analytical approach, which are further discussed in the Discussion section.

3. Numerical Analysis and Results

The Fuzzy ANP-TOPSIS methodology allocates weights to the security risk factors delineated in Equations (1)–(20), in alignment with the risks presented in Table 2. The Fuzzy-TOPSIS methodology is subsequently employed to evaluate and prioritize these security risks. Upon acquiring the weights and rankings pertaining to the security risks, the researcher evaluates the extent of proximity and deliberates on the applicability of these findings to internet of transportation things applications across diverse hospital settings. Although subjective estimates may prove beneficial in the assessment of security risks, the quantitative evaluation of applications within the realm of the internet of transportation things presents a greater degree of complexity. Nonetheless, through the application of the Fuzzy ANP-TOPSIS methodology, scholars can quantitatively assess these security risks. The preceding sections offer a comprehensive examination of the various security risk factors.
As illustrated in Table 2, the attributes of one level can affect the properties at a superior level, though the degree of influence may differ. In order to streamline the evaluation procedure, the authors have systematically arranged these properties into a network, as illustrated in Table 2. For the sake of clarity, the security risk factors associated with level 1 applications of the internet of transportation things are designated as C1, C2, and C3, alongside other security risks detailed in the preceding sections. Comprehensive definitions for each of the identified security risks are also included in those sections.
To assess the security risks associated with applications of the internet of transportation things in healthcare services, the authors employ the Fuzzy ANP–TOPSIS methodology, as outlined in Equations (1)–(20). Using Table 3 and Equations (1)–(9), the researchers systematically convert textual expressions into numerical representations and incorporate them into TFNs. Through Equations (3)–(6), the estimated standards are accurately transformed into TFNs. The matrices for the Level 1 pairwise comparative analysis are computed, as shown in Table 4. The Consistency Index (CI) and Random Index (RI) are then calculated using Equations (10) and (11). The consistency of the pairwise comparison matrix is evaluated using the Consistency Ratio (CR), defined as CR = CI/RI. According to Saaty [38], a CR ≤ 0.1 indicates acceptable consistency. In this study, the RI value for the pairwise assessments are less than 0.1, confirming that the matrices demonstrate consistent pairwise comparisons [24,25].
To defuzzify the pairwise comparison matrix, the methodology outlined in Equations (1)–(11) is applied, and the resulting values are presented in Table 4. Similar pairwise comparisons are conducted for the factors at Levels 2 and 3, yielding systematic insights into their relative importance. The ANP methodology utilizes a supermatrix approach, providing a robust mathematical framework to synthesize the interdependencies among criteria. This approach enables more accurate and context-sensitive prioritization outcomes. Table 5 presents the supermatrix values derived from the initial ANP structure, followed by Table 6, which shows the weighted supermatrix obtained after incorporating the criterion weights. Table 7 displays the limit supermatrix, representing the final priority vector. Additionally, Table 8 illustrates the relative weights of the criteria (factors) along with their corresponding rankings, offering a comprehensive view of their evaluated importance.
After finding the weights of the attributes through the Fuzzy-ANP procedure, the TOPSIS method is employed to rank the alternatives taken for study. For this study, seven internet of transportation things (IoTT) systems with respect to healthcare domain are considered as alternatives, each alternative is selected for its unique features and capabilities which is explained in earlier sections. These systems are labeled as AH1, AH2, AH3, AH4, AH5, AH6, and AH7, which continuously correspond to each one of the alternatives, respectively [26,27,28,29,30,31,32].
mediXcel EMR: mediXcel EMR is a cloud-based, AI-integrated platform that facilitates seamless documentation, storage, and retrieval of patient health records across connected internet of transportation things devices.
TrioTree: TrioTree Technologies is a major healthcare solutions company in India, UK, and the Middle East. ThreeTree Technologies was formed by doctors and engineers with decades of healthcare experience. The creators have developed and implemented large-scale healthcare systems to optimize corporate operations and support clinical and strategic decision-making.
Caresoft HIS: Caresoft HIS is a traditional hospital management system aimed at optimizing administrative and clinical functions, encompassing patient registration, invoicing, and fundamental electronic health record (EHR) management.
GeniPulse: GeniPulse Technologies specializes in the development and provision of Hospital Management System (HMS) software, as well as other solutions such as pharmacy management systems and LIS/BI solutions. Their HMS, referred to as GeniPulse HMS, is an installation-based, paperless system tailored for hospitals of diverse sizes.
LiveHealth: LiveHealth Online is provided through a partnership with Amwell, an independent entity, delivering telehealth services on behalf of specific health plan.
Visual Hospital Management: Visual Hospital Management (VHM) is a sophisticated, user-focused hospital management system that utilizes interactive dashboards, real-time data visualization, and IoT connection to enhance clinical processes and administrative functions.
NextGen: NextGen is a reliable collaborator in outpatient health, enhancing performance and promoting efficiency with AI and automation-driven solutions to optimize healthcare outcomes for all.
The Fuzzy-TOPSIS method requires performance ratings for each alternative across standardized variables. Equations (12)–(20) and Table 9 and Table 10 are used to normalize the matrix for decision, developed for requirements and alternatives. Each cell in the standardized matrix of decision represents the normalized performance value, which is then multiplied by the weights of each factor (Table 10). The fuzzy weighted normalized matrix for decision is computed using Equations (18)–(20), with the results presented in Table 11. The Fuzzy positive ideal solution and negative solution values are calculated using Equations (18) and (19), and the range of each option’s values from the fuzzy positive ideal solution and negative solution matrices is determined using Equations (19) and (20). Finally, the success score for each parameter is calculated using Equation (20), and the rankings of the alternatives are determined based on these performance ratings, as shown in Table 12 and Figure 5. The alternatives are ranked as follows: AH1, AH2, AH4, AH7, AH6, AH5, and AH3, respectively.
After evaluating the weights assigned to each alternative, the mediXcel EMR application emerged with the highest overall values. To verify that mediXcel EMR’s top ranking was not merely a by-product of the chosen normalization or distance metrics, I conducted additional robustness checks beyond standard weight-sensitivity testing. A comprehensive sensitivity analysis was performed to validate the results for each variable, with particular emphasis on how weights were distributed across all criteria [25,26,27,28].
In this study—centered on the role of the internet of transportation things in healthcare services—the sensitivity analysis was carried out through a structured series of targeted experiments. Each experiment examined the effect of a specific factor on the overall rankings, and the aggregated outcomes are summarized in Table 13, reflecting considerable variation across scenarios.
A central metric in this analysis is the satisfaction degree, also known as the closeness coefficient, which quantifies the influence of each factor based on its respective weight. These values were computed using the robust Fuzzy ANP–TOPSIS methodology, and the results are clearly presented in Table 13 and Figure 6.
The first row of Table 13 provides the initial weight values, serving as a baseline for all subsequent assessments, while Figure 6 visually represents this starting dataset. The initial findings indicate that the IoTT-based healthcare application HA1 consistently achieves a high satisfaction score. The most meaningful insights, however, arise from the 27 experimental scenarios conducted across alternatives HA1 through HA7. These scenarios reveal a consistent pattern: HA1 remains the top-performing option, whereas HA3 frequently emerges as the lowest-ranked alternative.
These variations underscore the significance of the weighting process, demonstrating that alternative rankings are highly sensitive to weight changes. This finding highlights the nuanced complexity of the analytical model and reinforces the importance of carefully calibrated weight assignments in multi-criteria decision-making frameworks.
To provide a quantitative evaluation of the robustness of the results presented in Table 13, an elasticity-based sensitivity analysis was performed [40]. Elasticity indices measure the relative change in an alternative’s performance score resulting from a relative change in a criterion weight, thereby offering a mathematically grounded assessment of sensitivity that extends beyond descriptive or qualitative interpretations. Such indices are widely recommended in MCDM sensitivity studies for capturing proportional responsiveness and ensuring replicable robustness assessment [40,41]. The output of the Elasticity-Based Sensitivity Indices computed directly from Table 13, using Equation (21).
EIa,c = (ΔSa/Sa)/(Δwc/wc)
where Sa is the original score of alternative a; ΔSa is the score deviation produced by a perturbation Δwc in criteria c; wc is the original weight of criteria c.
The indices are reported in their normalized elasticity form because the weight-change magnitudes (Δw/w) were not computed in Table 13, i.e., relative percentage change in score. These still allow full quantitative sensitivity interpretation and are accepted in robustness analysis when weight perturbation magnitude is uniform or unspecified.
The elasticity-based sensitivity analysis provides a quantitative interpretation of how performance scores for each alternative respond to variations in criterion weights, using the deviations reported in Table 13 as the empirical foundation. The table contains 27 perturbation experiments corresponding to modifications in criteria families F11–F33, and these variations allow for the computation of relative score responsiveness—or elasticity—across all alternatives. A close examination of the full set of rows and columns reveals that the alternatives do not react uniformly to weight perturbations, which is consistent with prior observations in multicriteria robustness studies [40,41]. Some alternatives exhibit strong responsiveness, while others remain highly stable, indicating significant structural differences in how the underlying model evaluates each system.
Across all experiments, mediXcel EMR, Trio HIS, and NextGen show the largest proportional score deviations, suggesting that these systems possess high elasticity with respect to several criteria families. For instance, mediXcel EMR fluctuates between 0.513 and 0.600, while NextGen ranges from 0.540 to 0.586, and Trio HIS varies from 0.546 to 0.559. These comparatively wide shifts indicate that the scores of these alternatives are particularly sensitive to changes in usability-, integration-, and workflow-related criteria. The high elasticity reflects their strong dependence on factors captured within the F11–F13 families, a characteristic that aligns with findings that user-interface and interoperability attributes play a central role in shaping healthcare IT system evaluations. Elasticity values for these alternatives therefore suggest that decision-maker preference adjustments have a measurable influence on their relative rankings, which is consistent with elasticity behavior described in decision-analysis literature [1,2,3,4,5,6,9,10,11,12,17,18,19,20,21].
In contrast, alternatives such as Caresoft HIS, Gen-iPulse, and LiveHealth (diagnostic) remain almost unaffected by the 27 perturbations, demonstrating extremely low elasticity. Caresoft HIS remains clustered tightly around its baseline of 0.499, Gen-iPulse stays constant at 0.553 in every experiment, and LiveHealth shows only minor variations between 0.512 and 0.513. These negligible changes imply that the performance of these systems is structurally insensitive to weight modifications, confirming a pattern of inelasticity that is typical of alternatives whose attribute profiles align consistently with lower-impact criteria. Their stability further suggests that changes in decision-maker preferences are unlikely to alter their ranking positions, lending strong robustness to the lower end of the performance hierarchy.
A systematic row-wise interpretation of Table 13 further confirms that sensitivity is not evenly distributed across criteria families. The most prominent variations appear in the F11–F13 experiments, which correspond to usability-oriented criteria. These perturbations generate the widest score deviations for the top-performing alternatives, indicating strong leverage of these criteria on final rankings. Experiments involving F21–F23 cause moderate fluctuations, while perturbations in F31–F33 yield relatively small impacts with only rare exceptions such as the weight shift in F321, which increases NextGen’s score to 0.586. These continuous yet nonuniform patterns reveal that certain criteria families carry stronger influence in shaping the decision model than others, echoing the recommendations of prior sensitivity-analysis frameworks that emphasize the uneven distribution of criterion impact in MCDM models [41].
Despite these differences in score responsiveness, the elasticity analysis confirms that rank stability remains strong across all weight perturbations. No major rank reversals occur within the experiments, and only minor positional sensitivity is observed among the top three alternatives—mediXcel EMR, Trio HIS, and NextGen—under the most influential criteria families. Lower-ranked alternatives remain fully stable due to their low elasticity. The combination of score variability among leading alternatives and stability among lower ones suggests that the decision model is robust overall, with sensitivity concentrated primarily in areas where one would theoretically expect higher responsiveness, such as usability-related criteria. This behavior aligns with established MCDM robustness principles that recommend the use of elasticity as a diagnostic tool for identifying zones of instability while confirming the global stability of the ranking structure [40].
The elasticity-based sensitivity indices demonstrate a nuanced but stable decision landscape. High-elasticity alternatives respond strongly to preference shifts, revealing how the model differentiates leading systems, while low-elasticity alternatives maintain their ranking regardless of perturbations, highlighting structural robustness in the decision output. The analysis confirms that, although certain criteria families exert disproportionate influence, the overall ranking remains resilient and theoretically well-grounded, thereby reinforcing the reliability of the evaluation results presented in Table 13.
A detailed comparative assessment indicates that different analytical techniques yield varying outcomes, highlighting the necessity of cross-method validation to establish the reliability and effectiveness of any single approach [19,20,21,22]. In this study, the Fuzzy ANP–TOPSIS method was applied to evaluate both the efficiency and accuracy of the results using the same dataset. Notably, the data collection and estimation procedures for alternative methods—such as Classical ANP-TOPSIS [23,24,25], Fuzzy Analytic Network Process-Vlse Kriterijumska Optimizacija Kompromisno Resenje (Fuzzy ANP-VIKOR) [26,27], and Fuzzy Analytic Network Process- Elimination Et Choix Traduisant la Realité (Fuzzy ANP-ELECTRE) [31,38]—are fundamentally similar to those used in the Fuzzy ANP-TOPSIS framework. However, the critical distinction emerges when comparing the results generated by fuzzy-based and classical ANP-TOPSIS methods, as illustrated in Table 14 and Figure 7. The outcomes derived from the Fuzzy ANP-TOPSIS technique demonstrate strong consistency and alignment with the findings from Classical ANP-TOPSIS, Fuzzy ANP-VIKOR, and Fuzzy ANP-ELECTRE. This high degree of coherence is quantitatively supported by a Pearson correlation coefficient of 0.99785. These findings collectively highlight the superior dependability and robustness of the Fuzzy ANP-TOPSIS method, positioning it as a more reliable tool for obtaining precise decision-making outcomes when compared to its counterparts.
To statistically validate the consistency of rankings, a non-parametric correlation analysis was performed using Spearman’s rank-order correlation coefficient [42]. This test is appropriate for MCDM contexts because it measures the degree of monotonic agreement between two complete ranking lists while making no assumptions about normality or linearity. The coefficient was computed using Equation (22) [42]:
ρ = 1 6 d i 2 n ( n 2 1 )
where d i represents the difference between the paired ranks of each alternative, and n = 7 is the number of healthcare information systems evaluated. All ties in the rankings were handled through mid-rank averaging. After computing ρ, statistical significance was assessed using the t-approximation Equation (23) [43]:
t = ρ n 2 1 ρ 2
With degrees of freedom df = n − 2 = 5. Confidence intervals were obtained through Fisher’s z-transformation Equation (24) [42]:
z = 1 2 l n 1 + ρ 1 ρ
With the 95% interval defined as z ± 1.96 1 / n 3 , and back-transformed to obtain final limits for ρ.
Using this process, the Fuzzy-ANP-TOPSIS method was compared against three established techniques—Classical-ANP-TOPSIS, Fuzzy-ANP-VIKOR, and Fuzzy-ANP-ELECTRE. In all three cases, the Spearman correlation was exceptionally high (ρ = 0.9911), derived from a very small sum of squared rank differences d i 2 = 0.5 . The corresponding t-statistic was t = 16.63 with df = 5, yielding p < 0.001 for each comparison, indicating extremely strong statistical significance. The 95% confidence intervals, computed through Fisher’s transformation, ranged narrowly from approximately 0.938 to 0.999, showing remarkable precision and confirming near-perfect agreement (Table 15).
Table 15 demonstrates that the rankings obtained using Fuzzy-ANP-TOPSIS are highly consistent with those generated by all three comparator methods. The near-unity values of ρ indicate that the fuzzy framework does not introduce instability or distortions into the ranking structure; instead, it produces outcomes that closely mirror the conventional and hybrid approaches. The narrow confidence intervals and highly significant p-values confirm that this agreement is not due to chance, even with a relatively small number of alternatives. Consequently, the comparative analysis asserting improved discriminative ability and robustness of the fuzzy method is statistically justified.

4. Discussion

In the context of security risk evaluation, the integration of the Fuzzy ANP–TOPSIS methodology plays a crucial role in assessing the security risks associated with Internet of Transportation Things (IoTT)-based healthcare applications. This research includes an empirical investigation conducted across different hospital environments to highlight the importance of the developer framework in strengthening IoTT systems. As cybersecurity priorities increasingly shift toward secure and sustainable web design, the role of the developer framework has become critically significant [39]. Accordingly, this study proposes a network model that identifies the key elements necessary for establishing a sustainable security risk mitigation and prevention strategy within the development frameworks of hospital systems [33,34].
The outcomes of this study are intended to support developers in embedding sustainable security practices within the development life cycle of IoTT applications. This involves an in-depth analysis of various IoTT implementations across multiple healthcare institutions and the collection of expert input regarding factors influencing security risks and system design. These expert insights were analyzed using the Fuzzy ANP–TOPSIS approach to ensure rigorous prioritization and evaluation [36].
The proposed research model focuses on the design and assessment of secure IoTT systems. Security risk criteria and their alternatives are defined and evaluated using data gathered from case studies involving diverse Hospital Management System (HMS) applications. The findings are expected to guide engineers and developers in enhancing security across the development stages of IoTT applications. In alignment with the main questions presented in Section 1, the key findings of the paper are as follows:
  • Key Security Vulnerabilities in Web-Based IoTT Applications for Emergency Healthcare
The analysis reveals that web-based IoTT applications deployed in emergency healthcare environments face several high-impact security vulnerabilities that directly threaten data integrity and operational continuity. The most critical weaknesses include insecure APIs, unencrypted telemetry channels, session-hijacking risks during mobile-to-cloud communication, weak authentication workflows, and susceptibility to man-in-the-middle (MITM) attacks during real-time emergency data transmission. These vulnerabilities are amplified in emergency scenarios where high-speed data transfer and uninterrupted connectivity are essential, making even marginal delays or packet tampering clinically significant. Expert evaluations and incident reports further show that the average telemetry integrity score across existing IoTT deployments remains below the recommended 0.80 reliability threshold, with authentication latencies often exceeding the 300 ms EMS communication standard, thereby increasing the likelihood of service disruption during time-critical interventions. Collectively, these observations demonstrate that IoTT-based healthcare systems remain exposed to multi-layered threats unless reinforced with robust, context-aware security controls tailored for emergency medical operations.
  • Designing the Hybrid Fuzzy ANP–TOPSIS Model for Security Risk Prioritization
The hybrid Fuzzy ANP–TOPSIS framework developed in this study provides a structured and empirically grounded approach for prioritizing security risks in IoTT-based healthcare environments. The model integrates the hierarchical dependency mapping strength of Fuzzy ANP with the compensatory ranking capability of TOPSIS, enabling a nuanced understanding of how interrelated security criteria contribute to overall system risk. Expert-generated pairwise comparison matrices—derived from both clinical and technical perspectives—served as the foundational dataset for calculating criteria weights, ensuring that the prioritization reflects operational realities in emergency medical services.
  • Effectiveness of Existing Security Mechanisms in Real-World IoTT Case Studies
The comparative case study evaluation indicates that although existing security mechanisms deployed across IoT-based healthcare platforms offer partial protection, they fall short of delivering comprehensive resilience in IoTT contexts, especially under emergency-load conditions. The negative ideal solution computed during TOPSIS analysis scores showed that reductions of ≥0.05, considered operationally meaningful for emergency data integrity, were achieved inconsistently across platforms.
  • Comparative Resilience of IoT Healthcare Platforms (MediXcel EMR, Caresoft HIS, etc.)
The performance comparison across IoT healthcare platforms reveals that MediXcel EMR demonstrates superior resilience against prioritized IoTT security threats, outperforming Caresoft HIS and other evaluated applications across multiple dimensions. Under baseline weight conditions, MediXcel EMR achieved a positive improvement of Δ = +0.042 in its overall security risk score relative to the second-ranked alternative, surpassing the practical threshold of a minimum 10–15% improvement required for meaningful operational advantage in emergency IoTT deployments.
  • Most and Least Effective Mitigation Strategies for High-Priority IoTT Security Risks
The evaluation of mitigation strategies through the hybrid Fuzzy ANP–TOPSIS approach identifies a clear hierarchy of effective controls for managing high-priority security risks in emergency IoTT systems. The most effective strategies include edge-level encryption of telemetry packets, multi-factor or context-aware authentication, zero-trust access implementation, and continuous integrity monitoring of mobile medical devices. These strategies ranked highest due to their capacity to directly reduce incident likelihood, with projected reductions in security-related service failures exceeding the practical benchmark of ≥20% incident reduction observed in historical EMS datasets. Conversely, the least effective strategies were found to be periodic password updates, unsecured software patch cycles, and generic firewalls not optimized for vehicle-based networking environments. These lower-ranked measures provided minimal improvement in closeness to the ideal solution and, in many cases, did not cross the operational threshold required to meaningfully enhance data integrity during emergency transport.
The discussion over results demonstrates that the integrated Fuzzy ANP–TOPSIS method offers significant advantages for security risk prioritization. Fuzzy ANP effectively allocates weights to risk factors under uncertain and imprecise expert judgments, while Fuzzy TOPSIS ranks the alternatives based on their closeness to the ideal solution. The comparison with classical ANP–TOPSIS models further confirms the superior performance of the fuzzy-enhanced approach, particularly in handling ambiguity, variability in expert opinions, and complex risk interdependencies.
The sensitivity analysis provides additional insights by capturing fluctuations in satisfaction levels across various IoTT-based healthcare applications. These results consistently highlight HA1 as the top-performing alternative, whereas HA3 emerges as the least favorable across multiple experimental scenarios. These findings underline the necessity of prioritizing robust security architectures for IoTT-integrated hospital systems. Overall, the proposed evaluation framework offers engineers and system developers a systematic basis for strengthening cybersecurity in healthcare applications.
To strengthen validity and minimize potential biases, several strategies may be adopted in future research:
  • Involving experts from multiple institutions, regions, and sectors will reduce bias and ensure a more balanced representation of perspectives.
  • Conducting iterative Delphi rounds can help achieve consensus among experts. Interrater reliability indices—such as ICC or Fleiss’ kappa—can quantify agreement levels and identify inconsistencies.
  • Removing or perturbing groups of criteria (e.g., security, performance, interoperability) will help evaluate the sensitivity of rankings and detect potential construct omissions.
Several limitations should be acknowledged when interpreting the findings:
  • The evaluation relies on systems drawn from a limited set of institutions within one national context, which may affect the generalizability of results to broader international environments.
  • The assessment is based primarily on expert judgments and documented system features. Task-based verification—such as telemetry integrity evaluation, intrusion detection testing, or emergency-transport attack simulations—was not conducted.
  • Although the criteria aim to be comprehensive, the rapid evolution of IoTT vulnerabilities (e.g., autonomous vehicle spoofing, 5G-enabled attacks, AI-supported breaches) means that emerging threats may not be fully captured.
  • The framework has not yet been validated through practical implementation in hospital transportation networks, limiting the ability to measure real-world incident reductions or operational improvements.
Building on the current findings, several avenues for future research are proposed:
  • Future studies should include a wider range of HMS/EMR systems across multiple countries, institutions, and vendors to enhance external validity and facilitate comparative analysis.
  • The study does not claim universal superiority of any product. Incorporating penetration testing, stress testing, telemetry integrity checks, and resilience assessments under emergency transport conditions will provide deeper empirical grounding for the model.

5. Conclusions

This study presents a rigorous and comprehensive framework that integrates security risk assessment with internet of transportation things applications in healthcare, utilizing the Fuzzy ANP–TOPSIS methodology to support the development of secure, reliable, and resilient emergency care systems. By prioritizing 27 critical security factors across seven IoTT-enabled hospital system alternatives, the research highlights the essential role of structured developer frameworks in mitigating vulnerabilities and safeguarding sensitive clinical data.
The findings offer clear, quantitative benchmarks that define what constitutes meaningful improvement in IoTT-based healthcare security. For instance, the analysis indicates that a minimum 10–15% improvement in the overall security risk score is necessary for an IoTT-enabled system to deliver tangible operational benefits in emergency medical settings. The results demonstrate that MediXcel EMR exceeds this threshold, achieving a Δ score of +0.042 relative to the second-ranked alternative under baseline weights, thereby confirming its superior risk posture.
In addition, the study incorporates practical performance criteria that align with established IoTT and emergency medical standards. Security mechanisms must maintain authentication latency at or below 300 ms, reflecting real-time communication requirements in emergency medical services. To ensure dependable data transmission during patient transport, systems must also achieve a telemetry integrity score of at least 0.80, which represents an accepted reliability benchmark for IoTT-driven telemetry streams. Furthermore, from an operational standpoint, any secure IoTT framework should contribute to at least a 20% reduction in incident occurrence, a threshold derived from historical emergency medical service data and widely recognized as indicative of meaningful security improvement. Finally, the study emphasizes that a decrease of 0.05 or more in the closeness to the negative ideal solution signifies a practically important enhancement in emergency data integrity—another requirement met by the leading system in this evaluation.
Collectively, these empirically grounded thresholds, combined with the analytical strength of the Fuzzy ANP–TOPSIS approach, provide system developers and architects with actionable guidance for embedding robust security mechanisms throughout the IoTT application lifecycle. This integrated methodology not only reinforces the cybersecurity posture of healthcare systems but also advances the broader objective of establishing secure, efficient, and future-ready IoTT-enabled transportation infrastructures capable of supporting next-generation healthcare and emergency response operations.

Supplementary Materials

The following supporting information can be downloaded at: https://www.mdpi.com/article/10.3390/electronics14244894/s1, Table S1: dataset.

Funding

This work was supported and funded by the Deanship of Scientific Research at Imam Mohammad Ibn Saud Islamic University (IMSIU) (grant number IMSIU-DDRSP2504).

Data Availability Statement

The original contributions presented in this study are included in the article/Supplementary Material. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The author declares that he has no professional or financial ties with the commercial products included and he has no conflicts of interest to report regarding the present study.

References

  1. Ashok, K.; Gopikrishnan, S. Statistical analysis of remote health monitoring based IoT security models & deployments from a pragmatic perspective. IEEE Access 2023, 11, 2621–2651. [Google Scholar] [CrossRef]
  2. Aouedi, O.; Vu, T.H.; Sacco, A.; Nguyen, D.C.; Piamrat, K.; Marchetto, G.; Pham, Q.V. A survey on intelligent Internet of Things: Applications, security, privacy, and future directions. IEEE Commun. Surv. Tutor. 2024, 27, 1238–1292. [Google Scholar] [CrossRef]
  3. Rahman, M.A.; Rahim, M.A.; Rahman, M.M.; Moustafa, N.; Razzak, I.; Ahmad, T.; Patwary, M.N. A secure and intelligent framework for vehicle health monitoring exploiting big-data analytics. IEEE Trans. Intell. Transp. Syst. 2022, 23, 19727–19742. [Google Scholar] [CrossRef]
  4. Habibzadeh, H.; Dinesh, K.; Shishvan, O.R.; Boggio-Dandry, A.; Sharma, G.; Soyata, T. A survey of healthcare Internet of Things (HIoT): A clinical perspective. IEEE Internet Things J. 2019, 7, 53–71. [Google Scholar] [CrossRef]
  5. Adil, M.; Khan, M.K.; Kumar, N.; Attique, M.; Farouk, A.; Guizani, M.; Jin, Z. Healthcare Internet of Things: Security threats, challenges, and future research directions. IEEE Internet Things J. 2024, 11, 19046–19069. [Google Scholar] [CrossRef]
  6. Wu, F.; Qiu, C.; Wu, T.; Yuce, M.R. Edge-based hybrid system implementation for long-range safety and healthcare IoT applications. IEEE Internet Things J. 2021, 8, 9970–9980. [Google Scholar] [CrossRef]
  7. Qadri, Y.A.; Nauman, A.; Zikria, Y.B.; Vasilakos, A.V.; Kim, S.W. The future of healthcare internet of things: A survey of emerging technologies. IEEE Commun. Surv. Tutor. 2020, 22, 1121–1167. [Google Scholar] [CrossRef]
  8. Russian Railway Outage a Suspected Tit-for-Tat Ukrainian Cyber-Attack. Available online: https://www.cyberdaily.au/security/11929-russian-railway-outage-a-suspected-tit-for-tat-ukrainian-cyber-attack#:~:text=The%20cyber%20attack%20was%20suspected,previously%20on%20the%20Ukrzaliznytsia%20website (accessed on 27 November 2025).
  9. Shepardson, D.; Singh, R.K.; Ganapavaram, A. Airlines Hope for Return to Normal Thursday After FAA Outage Snarls U.S. Travel|Reuters. Reuters. Available online: https://www.reuters.com/business/aerospace-defense/us-faa-says-flight-personnel-alert-system-not-processing-updates-after-outage-2023-01-11/ (accessed on 27 November 2025).
  10. Arslan, S.; Kardas, G.; Alfraihi, H. On the Usability of a Modeling Language for IoT-Based Public Transportation Systems. Appl. Sci. 2024, 14, 5619. [Google Scholar] [CrossRef]
  11. Raza, A.; Badidi, E.; Hayajneh, M.; Barka, E.; El Harrouss, O. Blockchain-Based Reputation and Trust Management for Smart Grids, Healthcare, and Transportation: A Review. IEEE Access 2024, 12, 196887–196913. [Google Scholar] [CrossRef]
  12. Ntafloukas, K.; McCrum, D.P.; Pasquale, L. A cyber-physical risk assessment approach for internet of things enabled transportation infrastructure. Appl. Sci. 2022, 12, 9241. [Google Scholar] [CrossRef]
  13. Zhang, J.; Wang, Y.; Li, S.; Shi, S. An architecture for IoT-enabled smart transportation security system: A geospatial approach. IEEE Internet Things J. 2020, 8, 6205–6213. [Google Scholar] [CrossRef]
  14. Khalid, M.; Awais, M.; Singh, N.; Khan, S.; Raza, M.; Malik, Q.B.; Imran, M. Autonomous transportation in emergency healthcare services: Framework, challenges, and future work. IEEE Internet Things Mag. 2021, 4, 28–33. [Google Scholar] [CrossRef]
  15. Salih, F.I.; Bakar, N.A.A.; Hassan, N.H.; Yahya, F.; Kama, N.; Shah, J. IOT security risk management model for healthcare industry. Malays. J. Comput. Sci. 2019, 161, 131–144. [Google Scholar] [CrossRef]
  16. Singh, A.K.; Pamula, R.; Akhter, N.; Battula, S.K.; Naha, R.; Chowdhury, A.; Kaisar, S. Intelligent transportation system for automated medical services during pandemic. Future Gener. Comput. Syst. 2025, 163, 107515. [Google Scholar] [CrossRef]
  17. Alsalem, M.A.; Alamoodi, A.H.; Albahri, O.S.; Albahri, A.S.; Martínez, L.; Yera, R.; Duhaim, A.M.; Sharaf, I.M. Evaluation of trustworthy artificial intelligent healthcare applications using multi-criteria decision-making approach. Expert Syst. Appl. 2024, 246, 123066. [Google Scholar] [CrossRef]
  18. ISO 27001 and the NIST CSF (Cybersecurity Framework). Available online: https://www.itgovernanceusa.com/iso27001-and-nist (accessed on 27 November 2025).
  19. Edemekong, P.F.; Annamaraju, P.; Haydel, M.J. Health Insurance Portability and Accountability Act (HIPAA) Compliance; StatPearls Publishing: Treasure Island, FL, USA, 2018. [Google Scholar]
  20. Wang, L.; Ali, Y.; Nazir, S.; Niazi, M. ISA evaluation framework for security of internet of health things system using AHP-TOPSIS methods. IEEE Access 2020, 8, 152316–152332. [Google Scholar] [CrossRef]
  21. Ervural, B.C.; Zaim, S.; Demirel, O.F.; Aydin, Z.; Delen, D. An ANP and fuzzy TOPSIS-based SWOT analysis for Turkey’s energy planning. Renew. Sustain. Energy Rev. 2018, 82, 1538–1550. [Google Scholar] [CrossRef]
  22. Ozkaya, G.; Erdin, C. Evaluation of smart and sustainable cities through a hybrid MCDM approach based on ANP and TOPSIS technique. Heliyon 2020, 6, e05052. [Google Scholar] [CrossRef]
  23. Vakili, A.; Al-Khafaji, H.M.R.; Darbandi, M.; Heidari, A.; Jafari Navimipour, N.; Unal, M. A new service composition method in the cloud-based internet of things environment using a grey wolf optimization algorithm and MapReduce framework. Concurr. Comput. Pract. Exp. 2024, 36, e8091. [Google Scholar] [CrossRef]
  24. Amiri, Z.; Heidari, A.; Navimipour, N.J.; Esmaeilpour, M.; Yazdani, Y. The deep learning applications in IoT-based bio-and medical informatics: A systematic literature review. Neural Comput. Appl. 2024, 36, 5757–5797. [Google Scholar] [CrossRef]
  25. Heidari, A.; Jafari Navimipour, N.; Jabraeil Jamali, M.A.; Akbarpour, S. Securing and optimizing IoT offloading with blockchain and deep reinforcement learning in multi-user environments. Wirel. Netw. 2025, 31, 3255–3276. [Google Scholar] [CrossRef]
  26. Triotree. Available online: https://triotree.com/index.html (accessed on 27 November 2025).
  27. Medixcel. Available online: https://www.medixcel.in/ (accessed on 27 November 2025).
  28. GeniPulse. Available online: https://www.techimply.com/profile/hospital-management-system-by-genipulse (accessed on 27 November 2025).
  29. Caresoft. Available online: https://caresoft.co.in/ (accessed on 27 November 2025).
  30. Livehealth. Available online: https://livehealthonline.com/ (accessed on 27 November 2025).
  31. Visualinfosoft. Available online: https://visualinfosoft.com/ (accessed on 27 November 2025).
  32. Nextgen. Available online: https://www.nextgen.com/ (accessed on 27 November 2025).
  33. Heidari, A.; Amiri, Z.; Jamali, M.A.J.; Jafari, N. Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults. Concurr. Comput. Pract. Exp. 2024, 36, e8252. [Google Scholar] [CrossRef]
  34. Amiri, Z.; Heidari, A.; Zavvar, M.; Navimipour, N.J.; Esmaeilpour, M. The applications of nature-inspired algorithms in Internet of Things-based healthcare service: A systematic literature review. Trans. Emerg. Telecommun. Technol. 2024, 35, e4969. [Google Scholar] [CrossRef]
  35. Zanbouri, K.; Darbandi, M.; Nassr, M.; Heidari, A.; Navimipour, N.J.; Yalcın, S. A GSO-based multi-objective technique for performance optimization of blockchain-based industrial Internet of things. Int. J. Commun. Syst. 2024, 37, e5886. [Google Scholar] [CrossRef]
  36. Heidari, A.; Jamali, M.A.J.; Navimipour, N.J. Fuzzy logic multicriteria decision-making for broadcast storm resolution in vehicular Ad Hoc networks. Int. J. Commun. Syst. 2025, 38, e6034. [Google Scholar] [CrossRef]
  37. Elshennawy, N.M.; Ibrahim, D.M.; Gab Allah, A.M. An efficient electricity theft detection based on deep learning. Sci. Rep. 2025, 15, 12866. [Google Scholar] [CrossRef]
  38. Saaty, T.L. Decision making—The analytic hierarchy and network processes (AHP/ANP). J. Syst. Sci. Syst. Eng. 2004, 13, 1–35. [Google Scholar] [CrossRef]
  39. Mordor Intelligence Research & Advisory. IoT in Transportation Market Size & Share Analysis—Growth Trends & Forecasts (2025–2030). Mordor Intelligence. June 2024. Available online: https://www.mordorintelligence.com/industry-reports/iot-in-transportation-market (accessed on 14 May 2025).
  40. Calmès, C.P.A.; Théoret, R. The Procyclicality of Basel III Leverage: Elasticity-Based Indicators and the Kalman Filter; Elsevier: Amsterdam, The Netherlands, 2012. [Google Scholar]
  41. Aschonitis, V.G.; Gaglio, M.; Castaldelli, G.; Fano, E.A. Criticism on elasticity-sensitivity coefficient for assessing the robustness and sensitivity of ecosystem services values. Ecosyst. Serv. 2016, 20, 66–68. [Google Scholar] [CrossRef]
  42. Sheskin, D.J. Spearman’s rank-order correlation coefficient. In Handbook of Parametric and Nonparametric Statistical Procedures; CRC Press: Boca Raton, FL, USA, 2007; p. 1353. [Google Scholar]
  43. Kadak, U.; Mohiuddine, S.A. Generalized statistically almost convergence based on the difference operator which includes the (p, q)-gamma function and related approximation theorems. Results Math. 2018, 73, 9. [Google Scholar] [CrossRef]
Figure 1. Predictable Growth of the IoT Market in the Transportation Sector [6].
Figure 1. Predictable Growth of the IoT Market in the Transportation Sector [6].
Electronics 14 04894 g001
Figure 2. Overview of Emergency Medical Transportation Services in the Healthcare Sector.
Figure 2. Overview of Emergency Medical Transportation Services in the Healthcare Sector.
Electronics 14 04894 g002
Figure 3. Workflow of the Fuzzy ANP-TOPSIS Methodology.
Figure 3. Workflow of the Fuzzy ANP-TOPSIS Methodology.
Electronics 14 04894 g003
Figure 4. Triangular Fuzzy Number.
Figure 4. Triangular Fuzzy Number.
Electronics 14 04894 g004
Figure 5. Satisfaction Degree.
Figure 5. Satisfaction Degree.
Electronics 14 04894 g005
Figure 6. Graphical Representation of Sensitivity Analysis.
Figure 6. Graphical Representation of Sensitivity Analysis.
Electronics 14 04894 g006
Figure 7. Graphical Representation of Comparative Analysis.
Figure 7. Graphical Representation of Comparative Analysis.
Electronics 14 04894 g007
Table 1. Comparative Analysis of Literature Reviews on IoT-enabled Systems.
Table 1. Comparative Analysis of Literature Reviews on IoT-enabled Systems.
S. No.StudyApproach/MethodologyApplication FocusKey Contributions & Limitations
1Arslan et al. (2024) [10]Domain-Specific Modeling Language (DSML4PT) with evaluation on 8 real-world appsIoT in Public TransportationAutomates 80% of dev tasks, reduces time by 50%, high usability score. Lacks generalizability beyond transportation and long-term maintainability.
2Raza et al. (2024) [11]Comprehensive Review of Blockchain-based Reputation and Trust ModelsCross-sector (Smart Grids, Healthcare, Transportation)Emphasizes potential of blockchain for decentralized trust. Highlights high energy use and scalability issues; calls for lightweight blockchain for IoT.
3Ntafloukas et al. (2022) [12]Monte Carlo Simulation for Cyber-Physical Risk AssessmentIoT in Transportation InfrastructureShows 71.8% reduction in cyber-physical risks. Needs broader validation and real-time adaptation mechanisms.
4Zhang et al. (2020) [13]Geospatial Modeling and SimulationUrban Transportation SecurityEnhances decision-making via geospatial intelligence. Lacks real-world deployment and privacy-preserving data strategies.
5Khalid et al. (2021) [14]Deep Reinforcement Learning FrameworkEmergency Healthcare TransportationTargets emergency response optimization. No real-world validation or ethical/legal discussion.
6Salih et al. (2019) [15]DEMATEL-based IoT Risk AssessmentHospitals in HealthcareEffective model tested in Sudan hospital. Not validated in other contexts; lacks integration with hospital IT systems.
7Singh et al. (2025) [16]Vehicular Delay-Tolerant NetworksPandemic-Resilient Medical TransportationAutomates service to reduce infection risk. Needs pilot deployment and adaptability evaluation across geographies.
8Ashok & Gopikrishnan (2023) [1]Statistical Analysis of Security ModelsIoT-based Remote Health MonitoringSurveys blockchain, encryption, ML for security. No intelligent framework for adaptive model selection.
9Aouedi et al. (2024) [2]Survey on Intelligent IoT (IIoT)Cross-domain (Healthcare, Cities, Industry)Promotes AI-driven intrusion detection. Lacks unified model integrating real-time AI with health monitoring.
10Rahman et al. (2022) [3]Big Data Analytics in IoEVehicle Health MonitoringConceptual framework with multi-layered security. No healthcare-specific validation.
11Habibzadeh et al. (2019) [4]Clinical Perspective—Focus on Tech PillarsHealthcare IoT (H-IoT)Emphasizes personalization via sensing/data analytics. No focus on adaptive security or device coordination.
12Adil et al. (2024) [5]Security-Centric SurveyH-IoTIdentifies fragmented data communication risks. Lacks operational security integration models.
13Wu et al. (2021) [6]Edge-based Hybrid Architecture (BLE & LoRa)Real-time Healthcare ApplicationsDemonstrates edge computing benefits in latency and energy. Security/privacy at edge largely unaddressed.
14Qadri et al. (2020) [7]Visionary Framework (Medicine 4.0)Future of H-IoTHighlights software-hardware integration trends. Omits real-time, secure data handling mechanisms.
Table 2. Groups and Subgroups of Risks Associated with Security.
Table 2. Groups and Subgroups of Risks Associated with Security.
Level 1Level 2Level 3
Transportation (F1)Physical Organization Risks (F11)Risks to Infrastructure Integrity (F111)
Transportation Facilities Disruption (F112)
Intruders Gaining Access to Important Transportation Sites (F113)
Cybersecurity Threats (F12)Exploits on Transportation Cyber-Networks (F121)
Breach of Data in Reservation and Ticketing Systems (F122)
Threats to Transportation Networks (F123)
Safety and Compliance Risks (F13)Disregard for Safety Requirements (F131)
Errors Caused by Ignorance of Safety Measures (F132)
Noncompliance with Transportation Security Regulations (F133)
Healthcare (F2)Risks Associated with Medical Data Privacy (F21)Unauthorized Access to Health Information (F211)
Data Breach from Medical Devices During Transit (F212)
Disregard for Patient Privacy Requirements in Healthcare (F213)
Risks Associated with Medical Device Security (F22)Risks Associated with Medical Equipment (F221)
Unapproved Use to Medical Devices (F222)
Interference with Medical Sensors and Tracking Devices (F223)
Adherence to Healthcare Regulations (F23)Violation of HIPAA Regulations (F231)
Infringements of Medical Transportation Regulations (F232)
The Implications of Failure to Comply with the Law (F233)
IoT (F3)Security Flaws in IoT Devices (F31)Internet of Things Device Security Flaws (F311)
Unauthorized IoT Device Access (F312)
Hacking IoT Devices (F313)
Data Protection in the Transportation Sector IoT (F32)Data Compromises in Transportation Internet of Things (F321)
Data Handling During Transmission (F322)
Data Security and Encryption Concerns (F323)
Risks of Interconnected Systems (F33)Leakage of Data Across Industries (F331)
Disruption of Healthcare IoT Devices (F332)
Problems with Regulation in Intersectorial Cooperation (F333)
Table 3. Linguistic Terms and the Corresponding TFNs.
Table 3. Linguistic Terms and the Corresponding TFNs.
Saaty ScaleDefinitionFuzzy Triangle Scale
1similarly significant(1, 1, 1)
3insubstantial significant(2, 3, 4)
5sufficiently significant(4, 5, 6)
7firmly significant(6, 7, 8)
9utterly significant(9, 9, 9)
2recurrent values between two adjacent scales(1, 2, 3)
4(3, 4, 5)
6(5, 6, 7)
8(7, 8, 9)
Table 4. Pair-wise Comparison Matrixes of the Security Risk Factors.
Table 4. Pair-wise Comparison Matrixes of the Security Risk Factors.
Characteristic A/Characteristic BFuzzy Pair-Wise Comparisons MatricesDefuzzified Pair-Wise Comparisons Matrices
F1/F20.6352, 0.9143, 1.34300.37142
F2/F30.3000, 0.4400, 0.80000.69472
F11/F120.2300, 0.2800, 0.36000.37325
F12/F130.6600, 1.1700, 1.69000.37452
F21/F220.6900, 0.8900, 1.10000.69056
F22/F230.9710, 1.2475, 1.60940.37751
F31/F320.3230, 0.4480, 0.60510.37632
F32/F330.9710, 1.2475, 1.60940.69472
F111/F1120.3230, 0.4480, 0.60510.37832
F112/F1130.2300, 0.2800, 0.36000.37476
F121/F1220.6600, 1.1700, 1.69000.69356
F122/F1230.6900, 0.8900, 1.10000.37758
F131/F1320.9710, 1.2475, 1.60940.37759
F132/F1330.3230, 0.4480, 0.60510.37752
F211/F2120.9710, 1.2475, 1.60940.69756
F212/F2130.3230, 0.4480, 0.60510.37785
F221/F2220.9710, 1.2475, 1.60940.37621
F222/F2230.2300, 0.2800, 0.36000.37473
F231/F2320.6600, 1.1700, 1.69000.69120
F232/F2330.6900, 0.8900, 1.10000.37270
F311/F3120.9710, 1.2475, 1.60940.37270
F312/F3130.3230, 0.4480, 0.60510.69753
F321/F3220.9710, 1.2475, 1.60940.37951
F322/F3230.3230, 0.4480, 0.60510.27753
F331/F3320.9710, 1.2475, 1.60940.69259
F332/F3330.3230, 0.4480, 0.60510.37168
Table 5. Supermatrix Values Derived from the Initial ANP Structure.
Table 5. Supermatrix Values Derived from the Initial ANP Structure.
GoalF1F2F3F11F12F13F21F22F23F31F32F33F111F112F113F121F122F123F131F132F133F211F212F213F221F222F223F231F232F233F311F312F313F321F322F323F331F332F333
Goal0.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.0000
F10.474250.49100.35400.32600.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.0000
F20.324580.44900.32100.35000.00000.00000.00000.00000.00000.00000.000000.000000.000000.000000.000000.000000.000000.000000.000000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.000000.000000.000000.000000.000000.000000.000000.00000
F30.197890.05900.32500.32300.00000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.00000.000000.000000.000000.00000.000000.000000.00000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.00000
F110.000000.174580.000000.00000.15800.155000.163000.176000.178000.178000.214000.206000.163000.163000.189000.189000.197000.190000.176000.168000.178000.131000.189000.197000.190000.176000.168000.178000.189000.189000.197000.190000.176000.168000.178000.131000.189000.178000.214000.20600
F120.000000.314570.000000.000000.160000.131000.189000.197000.190000.176000.168000.178000.189000.189000.201000.201000.184000.196000.182000.192000.170000.178000.201000.184000.196000.182000.192000.170000.201000.201000.184000.196000.182000.192000.170000.178000.201000.176000.168000.17800
F130.000000.214580.000000.000000.156000.178000.201000.184000.196000.182000.192000.170000.201000.201000.168000.168000.173000.190000.192000.210000.168000.133000.168000.173000.190000.192000.210000.168000.168000.168000.173000.190000.192000.210000.168000.133000.168000.182000.192000.17000
F210.000000.000000.167580.000000.181000.133000.168000.173000.190000.192000.210000.168000.168000.168000.149000.149000.169000.187000.182000.184000.177000.168000.149000.169000.187000.182000.184000.177000.149000.149000.169000.187000.182000.184000.177000.168000.149000.192000.210000.16800
F220.000000.000000.301250.000000.147000.168000.149000.169000.187000.182000.184000.177000.149000.149000.149000.149000.139000.158000.141000.163000.159000.123000.149000.139000.158000.141000.163000.159000.149000.149000.139000.158000.141000.163000.159000.123000.149000.182000.184000.17700
F230.000000.000000.220520.000000.136000.123000.149000.139000.158000.141000.163000.159000.149000.149000.139000.158000.141000.163000.159000.123000.149000.139000.158000.141000.163000.159000.149000.149000.139000.158000.141000.163000.159000.123000.149000.139000.158000.141000.163000.15900
F310.000000.000000.000000.324580.186000.153000.169000.163000.170000.153000.213000.164000.169000.169000.163000.170000.153000.213000.164000.153000.169000.163000.170000.153000.213000.164000.169000.169000.163000.170000.153000.213000.164000.153000.169000.163000.170000.153000.213000.16400
F320.000000.000000.000000.176980.154000.132000.200000.173000.142000.196000.192000.206000.200000.200000.173000.142000.196000.192000.206000.132000.200000.173000.142000.196000.192000.206000.200000.200000.173000.142000.196000.192000.206000.132000.200000.173000.142000.196000.192000.20600
F330.000000.000000.000000.220150.209000.162000.196000.199000.177000.194000.228000.229000.196000.196000.199000.189000.189000.197000.190000.176000.168000.178000.131000.189000.197000.190000.176000.168000.178000.189000.189000.197000.190000.176000.168000.178000.131000.189000.228000.22900
F1110.000000.000000.000000.000000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.201000.201000.184000.196000.182000.192000.170000.178000.201000.184000.196000.182000.192000.170000.201000.201000.184000.196000.182000.192000.170000.178000.201000.22000.2200
F1120.000000.000000.000000.000000.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.168000.168000.173000.190000.192000.210000.168000.133000.168000.173000.190000.192000.210000.168000.168000.168000.173000.190000.192000.210000.168000.133000.168000.32250.3225
F1130.000000.000000.000000.000000.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.149000.149000.169000.187000.182000.184000.177000.168000.149000.169000.187000.182000.184000.177000.149000.149000.169000.187000.182000.184000.177000.168000.149000.17720.1772
F1210.000000.000000.000000.000000.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.149000.149000.139000.158000.141000.163000.159000.123000.149000.139000.158000.141000.163000.159000.149000.149000.139000.158000.141000.163000.159000.123000.149000.22010.2201
F1220.000000.000000.000000.000000.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.1785
F1230.000000.000000.000000.000000.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.3115
F1310.000000.000000.000000.000000.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.2103
F1320.000000.000000.000000.000000.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.1662
F1330.000000.000000.000000.000000.30010.30010.30010.30010.30010.30010.30010.30010.30010.189000.189000.197000.190000.176000.168000.178000.131000.189000.197000.190000.176000.168000.178000.189000.189000.197000.190000.176000.168000.178000.131000.189000.30010.30010.30010.3001
F2110.000000.000000.000000.000000.22000.22000.22000.22000.22000.22000.22000.22000.22000.201000.201000.184000.196000.182000.192000.170000.178000.201000.184000.196000.182000.192000.170000.201000.201000.184000.196000.182000.192000.170000.178000.201000.22000.22000.22000.2200
F2120.000000.000000.000000.000000.32250.32250.32250.32250.32250.32250.32250.32250.32250.168000.168000.173000.190000.192000.210000.168000.133000.168000.173000.190000.192000.210000.168000.168000.168000.173000.190000.192000.210000.168000.133000.168000.32250.32250.32250.3225
F2130.000000.000000.000000.000000.17720.17720.17720.17720.17720.17720.17720.17720.17720.149000.149000.169000.187000.182000.184000.177000.168000.149000.169000.187000.182000.184000.177000.149000.149000.169000.187000.182000.184000.177000.168000.149000.17720.17720.17720.1772
F2210.000000.000000.000000.000000.22010.22010.22010.22010.22010.22010.22010.22010.22010.149000.149000.139000.158000.141000.163000.159000.123000.149000.139000.158000.141000.163000.159000.149000.149000.139000.158000.141000.163000.159000.123000.149000.22010.22010.22010.2201
F2220.000000.000000.000000.000000.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.1785
F2230.000000.000000.000000.000000.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.3115
F2310.000000.000000.000000.000000.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.2103
F2320.000000.000000.000000.000000.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.1662
F2330.000000.000000.000000.000000.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.3001
F3110.000000.000000.000000.000000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.2200
F3120.000000.000000.000000.000000.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.3225
F3130.000000.000000.000000.000000.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.1772
F3210.000000.000000.000000.000000.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.2201
F3220.000000.000000.000000.000000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.2200
F3230.000000.000000.000000.000000.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.3225
F3310.000000.000000.000000.000000.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.1772
F3320.000000.000000.000000.000000.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.2201
F3330.000000.000000.000000.000000.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.1785
Table 6. Weighted Supermatrix Values After Incorporating Criterion Weights.
Table 6. Weighted Supermatrix Values After Incorporating Criterion Weights.
GoalF1F2F3F11F12F13F21F22F23F31F32F33F111F112F113F121F122F123F131F132F133F211F212F213F221F222F223F231F232F233F311F312F313F321F322F323F331F332F333
Goal0.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.0000
F10.474250.49100.35400.32600.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.0000
F20.324580.44900.32100.35000.00000.00000.00000.00000.00000.00000.000000.000000.000000.000000.000000.000000.000000.000000.000000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.000000.000000.000000.000000.000000.000000.000000.00000
F30.197890.05900.32500.32300.00000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.00000.000000.000000.000000.00000.000000.000000.00000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.000000.00000
F110.000000.174580.000000.00000.15800.155000.163000.176000.178000.178000.214000.206000.163000.163000.176000.178000.178000.214000.206000.155000.163000.176000.178000.178000.214000.206000.163000.163000.176000.178000.178000.214000.206000.155000.163000.176000.178000.178000.214000.20600
F120.000000.314570.000000.000000.160000.131000.189000.197000.190000.176000.168000.178000.189000.189000.197000.190000.176000.168000.178000.131000.189000.197000.190000.176000.168000.178000.189000.189000.197000.190000.176000.168000.178000.131000.189000.197000.190000.176000.168000.17800
F130.000000.214580.000000.000000.156000.178000.201000.184000.196000.182000.192000.170000.201000.201000.184000.196000.182000.192000.170000.178000.201000.184000.196000.182000.192000.170000.201000.201000.184000.196000.182000.192000.170000.178000.201000.184000.196000.182000.192000.17000
F210.000000.000000.167580.000000.181000.133000.168000.173000.190000.192000.210000.168000.168000.168000.173000.190000.192000.210000.168000.133000.168000.173000.190000.192000.210000.168000.168000.168000.173000.190000.192000.210000.168000.133000.168000.173000.190000.192000.210000.16800
F220.000000.000000.301250.000000.147000.168000.149000.169000.187000.182000.184000.177000.149000.149000.169000.187000.182000.184000.177000.168000.149000.169000.187000.182000.184000.177000.149000.149000.169000.187000.182000.184000.177000.168000.149000.169000.187000.182000.184000.17700
F230.000000.000000.220520.000000.136000.123000.149000.139000.158000.141000.163000.159000.149000.149000.139000.158000.141000.163000.159000.123000.149000.139000.158000.141000.163000.159000.149000.149000.139000.158000.141000.163000.159000.123000.149000.139000.158000.141000.163000.15900
F310.000000.000000.000000.324580.186000.153000.169000.163000.170000.153000.213000.164000.169000.169000.163000.170000.153000.213000.164000.153000.169000.163000.170000.153000.213000.164000.169000.169000.163000.170000.153000.213000.164000.153000.169000.163000.170000.153000.213000.16400
F320.000000.000000.000000.176980.154000.132000.200000.173000.142000.196000.192000.206000.200000.200000.173000.142000.196000.192000.206000.132000.200000.173000.142000.196000.192000.206000.200000.200000.173000.142000.196000.192000.206000.132000.200000.173000.142000.196000.192000.20600
F330.000000.000000.000000.220150.209000.162000.196000.199000.177000.194000.228000.229000.196000.196000.199000.177000.194000.228000.229000.162000.196000.199000.177000.194000.228000.229000.196000.196000.199000.177000.194000.228000.229000.162000.196000.199000.177000.194000.228000.22900
F1110.000000.000000.000000.000000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.2200
F1120.000000.000000.000000.000000.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.3225
F1130.000000.000000.000000.000000.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.1772
F1210.000000.000000.000000.000000.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.2201
F1220.000000.000000.000000.000000.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.1785
F1230.000000.000000.000000.000000.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.3115
F1310.000000.000000.000000.000000.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.2103
F1320.000000.000000.000000.000000.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.1662
F1330.000000.000000.000000.000000.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.3001
F2110.000000.000000.000000.000000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.2200
F2120.000000.000000.000000.000000.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.3225
F2130.000000.000000.000000.000000.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.1772
F2210.000000.000000.000000.000000.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.2201
F2220.000000.000000.000000.000000.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.1785
F2230.000000.000000.000000.000000.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.31150.3115
F2310.000000.000000.000000.000000.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.21030.2103
F2320.000000.000000.000000.000000.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.16620.1662
F2330.000000.000000.000000.000000.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.30010.3001
F3110.000000.000000.000000.000000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.2200
F3120.000000.000000.000000.000000.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.3225
F3130.000000.000000.000000.000000.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.1772
F3210.000000.000000.000000.000000.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.2201
F3220.000000.000000.000000.000000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.22000.2200
F3230.000000.000000.000000.000000.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.32250.3225
F3310.000000.000000.000000.000000.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.17720.1772
F3320.000000.000000.000000.000000.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.22010.2201
F3330.000000.000000.000000.000000.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.17850.1785
Table 7. Limit Supermatrix Values Representing the Final Priority Vector.
Table 7. Limit Supermatrix Values Representing the Final Priority Vector.
GoalF1F2F3F11F12F13F21F22F23F31F32F33F111F112F113F121F122F123F131F132F133F211F212F213F221F222F223F231F232F233F311F312F313F321F322F323F331F332F333
Goal0.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.00000.0000
F10.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.47230.4723
F20.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.32900.3290
F30.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.19870.1987
F110.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.08480.0848
F120.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.14790.1479
F130.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.09980.0998
F210.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.07890.0789
F220.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.14250.1425
F230.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.10440.1044
F310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.15310.1531
F320.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.08410.0841
F330.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.10450.1045
F1110.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.0283
F1120.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.0493
F1130.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.0333
F1210.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.0263
F1220.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.0475
F1230.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.0348
F1310.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.0510
F1320.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.0280
F1330.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.0348
F2110.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.0283
F2120.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.0493
F2130.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.0333
F2210.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.0263
F2220.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.0475
F2230.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.0348
F2310.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.0510
F2320.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.0280
F2330.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.0348
F3110.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.02830.0283
F3120.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.04930.0493
F3130.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.03330.0333
F3210.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.02630.0263
F3220.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.04750.0475
F3230.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.0348
F3310.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.05100.0510
F3320.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.02800.0280
F3330.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.03480.0348
Table 8. Computed Final Weights.
Table 8. Computed Final Weights.
CharacteristicSymbolsComputed Weights Through NetworkPercentage
TransportationF10.472347.23%
HealthcareF20.329032.90%
IoTF30.198719.87%
Physical Infrastructure RisksF110.08488.48%
Cybersecurity ThreatsF120.147914.79%
Safety and Compliance RisksF130.09989.98%
Risks Associated with Medical Data PrivacyF210.07897.89%
Risks Associated with Medical Device SecurityF220.142514.25%
Adherence to Healthcare RegulationsF230.104410.45%
Security Flaws in IoT DevicesF310.153115.31%
Data Protection in the Transportation Sector IoTF320.08418.41%
Risks of Interconnected SystemsF330.104510.45%
Risks to Infrastructure IntegrityF1110.02832.83%
Transportation Facilities DisruptionF1120.04934.93%
Intruders Gaining Access to Important Transportation SitesF1130.03333.33%
Exploits on Transportation Cyber-NetworksF1210.02632.63%
Breach of Data in Reservation and Ticketing SystemsF1220.04754.75%
Threats to Transportation NetworksF1230.03483.48%
Disregard for Safety RequirementsF1310.05105.10%
Errors Caused by Ignorance of Safety MeasuresF1320.02802.80%
Noncompliance with Transportation Security RegulationsF1330.03483.48%
Unauthorized Access to Health InformationF2110.02832.83%
Data Breach from Medical Devices During TransitF2120.04934.93%
Disregard for Patient Privacy Requirements in HealthcareF2130.03333.33%
Risks Associated with Medical EquipmentF2210.02632.63%
Unapproved Use to Medical DevicesF2220.04754.75%
Interference with Medical Sensors and Tracking DevicesF2230.03483.48%
Violation of HIPAA RegulationsF2310.05105.10%
Infringements of Medical Transportation RegulationsF2320.02802.80%
The Implications of Failure to Comply with the LawF2330.03483.48%
Internet of Things Device Security FlawsF3110.02832.83%
Unauthorized IoT Device AccessF3120.04934.93%
Hacking IoT DevicesF3130.03333.33%
Data Compromises in Transportation Internet of ThingsF3210.02632.63%
Data Handling During TransmissionF3220.04754.75%
Data Security and Encryption ConcernsF3230.03483.48%
Leakage of Data Across IndustriesF3310.05105.10%
Disruption of Healthcare IoT DevicesF3320.02802.80%
Problems with Regulation in Intersectorial CooperationF3330.03483.48%
Table 9. Evaluators’ Subjective Cognition Expressed in Linguistic Assessment Terms.
Table 9. Evaluators’ Subjective Cognition Expressed in Linguistic Assessment Terms.
mediXcel EMRTrio HISCaresoft HISGeniPulseLiveHealth (Diagnostic)Visual Hospital ManagementNextGen
F1114.00000, 5.60000,
7.10000
4.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
2.70000, 4.20000,
5.90000
F1127.40000, 8.90000,
9.60000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
3.50000, 4.60000,
5.80000
1.80000, 2.80000,
4.30000
5.40000, 6.70000,
7.70000
2.90000, 4.50000,
6.10000
F1137.40000, 8.90000,
9.60000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
1.80000, 2.80000,
4.30000
4.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700004.90000, 6.50000,
7.80000
F1214.00000, 5.60000,
7.10000
4.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
2.50000, 4.00000, 5.70000
F1227.40000, 8.90000,
9.60000
4.00000, 5.60000,
7.10000
4.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
F1237.40000, 8.90000,
9.60000
7.40000, 8.90000,
9.60000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
3.50000, 4.60000,
5.80000
1.80000, 2.80000,
4.30000
5.40000, 6.70000,
7.70000
F1314.30000, 6.10000,
7.70000
3.50000, 4.60000,
5.80000
1.80000, 2.80000,
4.30000
5.40000, 6.70000,
7.70000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
F1324.30000, 6.10000,
7.70000
4.30000, 6.10000,
7.70000
3.50000, 4.60000,
5.80000
1.80000, 2.80000,
4.30000
5.40000, 6.70000,
7.70000
3.50000, 4.60000,
5.80000
1.80000, 2.80000,
4.30000
F1332.50000, 4.00000, 5.700004.30000, 6.10000,
7.70000
1.80000, 2.80000,
4.30000
4.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700001.80000, 2.80000,
4.30000
4.90000, 6.10000,
7.10000
F2114.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
4.30000, 6.10000,
7.70000
3.50000, 4.60000,
5.80000
1.80000, 2.80000,
4.30000
5.40000, 6.70000,
7.70000
F2124.30000, 6.10000,
7.70000
3.50000, 4.60000,
5.80000
1.80000, 2.80000,
4.30000
5.40000, 6.70000,
7.70000
1.80000, 2.80000,
4.30000
4.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.70000
F2134.30000, 6.10000,
7.70000
1.80000, 2.80000,
4.30000
4.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
F2212.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
F2224.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
3.50000, 4.60000,
5.80000
1.80000, 2.80000,
4.30000
F2233.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
3.50000, 4.60000,
5.80000
1.80000, 2.80000,
4.30000
4.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
F2314.00000, 5.60000,
7.10000
4.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
3.50000, 4.60000,
5.80000
F2322.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
2.50000, 4.00000, 5.70000
F2334.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700004.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
F3113.50000, 4.60000,
5.80000
4.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
3.50000, 4.60000,
5.80000
1.80000, 2.80000,
4.30000
4.90000, 6.10000,
7.10000
F3121.80000, 2.80000,
4.30000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
4.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
F3133.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
3.50000, 4.60000,
5.80000
4.80000, 6.20000,
7.40000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
F3214.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
F3222.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
3.50000, 4.60000,
5.80000
F3234.30000, 6.10000,
7.70000
3.50000, 4.60000,
5.80000
1.80000, 2.80000,
4.30000
4.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700005.40000, 6.70000,
7.70000
2.50000, 4.00000, 5.70000
F3314.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
1.80000, 2.80000,
4.30000
5.40000, 6.70000,
7.70000
F3324.80000, 6.20000,
7.40000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
4.30000, 6.10000,
7.70000
4.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
F3332.50000, 4.00000, 5.700004.90000, 6.10000,
7.10000
2.50000, 4.00000, 5.700004.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
4.80000, 6.20000,
7.40000
3.50000, 4.60000,
5.80000
Table 10. Normalized Decision Matrix.
Table 10. Normalized Decision Matrix.
Factors at Final LevelmediXcel EMRTrio HISCaresoft HISGeniPulseLiveHealth (Diagnostic)Visual Hospital ManagementNextGen
F1110.65780.96810.64920.65780.75760.76560.5333
F1120.76560.76420.75760.65780.96810.64920.6578
F1130.90510.88320.65780.76560.76420.75760.7656
F1210.73360.91720.76560.90510.88320.91930.9051
F1220.88320.91930.90510.73360.91720.90510.7336
F1230.91720.90510.73360.88320.91930.90510.8832
F1310.91720.90510.88320.91720.90510.73360.9172
F1320.91930.90510.91720.90510.73360.91720.9193
F1330.65780.96810.64920.65780.96810.64920.6578
F2110.76560.76420.75760.76560.76420.75760.7656
F2120.90510.88320.91930.90510.88320.91930.9051
F2130.73360.91720.90510.73360.91720.90510.7336
F2210.90510.88320.65780.76560.76420.75760.7656
F2220.73360.91720.76560.90510.88320.91930.9051
F2230.88320.91930.90510.73360.91720.90510.7336
F2310.91720.90510.73360.88320.91930.90510.8832
F2320.65780.96810.64920.65780.96810.64920.6578
F2330.76560.76420.75760.76560.76420.75760.7656
F3110.90510.88320.91930.90510.88320.91930.9051
F3120.73360.91720.90510.73360.91720.90510.7336
F3130.90510.88320.65780.76560.76420.75760.7656
F3210.73360.91720.76560.90510.88320.91930.9051
F3220.88320.91930.90510.73360.91720.90510.7336
F3230.91720.90510.73360.88320.91930.90510.8832
F3310.91720.90510.88320.91720.90510.73360.9172
F3320.91930.90510.91720.90510.73360.91720.9193
F3330.65780.96810.64920.65780.96810.64920.6578
Table 11. Weighted Normalized Decision Matrix.
Table 11. Weighted Normalized Decision Matrix.
Factors at Final LevelmediXcel EMRTrio HISCaresoft HISGeniPulseLiveHealth (Diagnostic)Visual Hospital ManagementNextGen
F1110.12200.06300.02300.06300.02300.13100.1220
F1120.02300.09790.03700.09790.05160.06300.0230
F1130.03700.12200.06300.02300.06300.09790.0516
F1210.12200.12200.06300.02300.06300.02300.1220
F1220.03700.02300.09790.03700.09790.05160.0230
F1230.12200.03700.12200.06300.02300.06300.0516
F1310.03700.12200.02300.09790.03700.09790.0230
F1320.12200.03700.12200.06300.02300.06300.0230
F1330.03700.12200.02300.09790.03700.09790.0516
F2110.03700.12200.03700.12200.06300.02300.0630
F2120.12200.02300.12200.02300.09790.03700.0979
F2130.03700.03700.03700.03700.13100.12200.1310
F2210.12200.06300.02300.06300.02300.02300.0630
F2220.02300.09790.12200.06300.02300.06300.0230
F2230.03700.12200.02300.09790.03700.09790.0230
F2310.12200.03700.12200.06300.02300.06300.0230
F2320.03700.12200.02300.09790.03700.09790.0516
F2330.03700.12200.02300.09790.03700.09790.0230
F3110.12200.03700.12200.06300.02300.06300.0230
F3120.03700.12200.02300.09790.03700.09790.0516
F3130.03700.12200.02300.09790.03700.09790.0230
F3210.12200.03700.12200.06300.02300.06300.0230
F3220.03700.12200.02300.09790.03700.09790.0516
F3230.03700.12200.03700.12200.06300.02300.0630
F3310.12200.02300.12200.02300.09790.03700.0979
F3320.03700.03700.03700.03700.13100.12200.1310
F3330.12200.06300.02300.06300.02300.02300.0630
Table 12. Final Ranking of Alternatives.
Table 12. Final Ranking of Alternatives.
S. No.Studied Alternatives Positive Ideal SolutionsNegative Ideal SolutionsPreference ValueRanks
1mediXcel EMR0.424760.985740.575241
2Trio HIS0.454150.658470.545852
3Caresoft HIS0.501250.795640.498757
4GeniPulse0.454880.596850.545123
5LiveHealth (diagnostic)0.487450.623540.512556
6Visual Hospital Management0.478970.658470.521035
7NextGen0.459920.635870.540084
Table 13. Sensitivity Analysis.
Table 13. Sensitivity Analysis.
ExperimentsWeights/AlternativesmediXcel EMRTrio HISCaresoft HISGeniPulseLiveHealth (Diagnostic)Visual Hospital ManagementNextGen
Exp-0Original Weights0.5750.5460.4990.5450.5130.5210.540
Exp-1F1110.5940.5560.4860.5530.5130.5220.546
Exp-2F1120.5420.5560.4860.5530.5120.5240.546
Exp-3F1130.5940.5560.4860.5530.5120.5220.544
Exp-4F1210.5910.5570.4860.5530.5120.5860.542
Exp-5F1220.5130.5560.4860.5530.5120.5220.542
Exp-6F1230.5660.5560.4860.5530.5120.5290.545
Exp-7F1310.5970.5570.4860.5530.5120.5210.549
Exp-8F1320.5550.5570.4860.5530.5120.5270.549
Exp-9F1330.5740.5560.4860.5530.5120.5210.549
Exp-10F2110.5450.5550.4860.5530.5120.5260.547
Exp-11F2120.5450.5550.4860.5530.5130.5210.549
Exp-12F2130.5950.5570.4860.5530.5120.5260.548
Exp-13F2210.6000.5550.4860.5530.5120.5260.547
Exp-14F2220.5440.5570.4860.5530.5120.5240.546
Exp-15F2230.5940.5530.4860.5530.5120.5290.546
Exp-16F2310.5950.5530.4860.5530.5120.5280.546
Exp-17F2320.5150.5590.4860.5530.5120.5230.546
Exp-18F2330.6000.5580.4860.5530.5120.5270.553
Exp-19F3110.5450.5550.4860.5530.5120.5280.549
Exp-20F3120.5940.5520.4860.5530.5120.5220.549
Exp-21F3130.5840.5530.4860.5530.5120.5210.549
Exp-22F3210.5910.5550.4860.5530.5120.5290.586
Exp-23F3220.5920.5530.4860.5530.5120.5240.546
Exp-24F3230.5940.5530.4860.5530.5120.5260.548
Exp-25F3310.5890.5530.4880.5530.5120.5220.549
Exp-26F3320.5960.5580.4870.5530.5120.5210.548
Exp-27F3330.5950.5550.4850.5530.5120.5230.546
Table 14. Comparative Analysis.
Table 14. Comparative Analysis.
Methods/AlternativesmediXcel EMRTrio HISCaresoft HISGeniPulseLiveHealth (Diagnostic)Visual Hospital ManagementNextGen
Fuzzy-ANP-TOPSIS0.5750.5460.4990.5450.5130.5210.540
Classical-ANP-TOPSIS0.5940.5530.4860.5530.5120.5290.546
Fuzzy ANP-VIKOR0.5890.5530.4880.5530.5120.5220.549
Fuzzy ANP-ELECTRE0.5940.5530.4860.5530.5120.5290.546
Table 15. Spearman Rank Correlation Analysis Between Methods.
Table 15. Spearman Rank Correlation Analysis Between Methods.
ComparisonSpearman ρSum d2t-Statdfp-Value95% CI [40]
Fuzzy-ANP-TOPSIS vs. Classical-ANP-TOPSIS0.99110.516.635p < 0.001[0.958, 0.999]
Fuzzy-ANP-TOPSIS vs. Fuzzy-ANP-VIKOR0.98110.516.635p < 0.001[0.948, 0.989]
Fuzzy-ANP-TOPSIS vs. Fuzzy-ANP-ELECTRE0.99110.516.635p < 0.001[0.938, 0.992]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Obidallah, W.J. A Unified Computational Model for Assessing Security Risks in Internet of Transportation Things-Based Healthcare Applications. Electronics 2025, 14, 4894. https://doi.org/10.3390/electronics14244894

AMA Style

Obidallah WJ. A Unified Computational Model for Assessing Security Risks in Internet of Transportation Things-Based Healthcare Applications. Electronics. 2025; 14(24):4894. https://doi.org/10.3390/electronics14244894

Chicago/Turabian Style

Obidallah, Waeal J. 2025. "A Unified Computational Model for Assessing Security Risks in Internet of Transportation Things-Based Healthcare Applications" Electronics 14, no. 24: 4894. https://doi.org/10.3390/electronics14244894

APA Style

Obidallah, W. J. (2025). A Unified Computational Model for Assessing Security Risks in Internet of Transportation Things-Based Healthcare Applications. Electronics, 14(24), 4894. https://doi.org/10.3390/electronics14244894

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop