Zagazig University Digital Repository
Home
Thesis & Publications
All Contents
Publications
Thesis
Graduation Projects
Research Area
Research Area Reports
Search by Research Area
Universities Thesis
ACADEMIC Links
ACADEMIC RESEARCH
Zagazig University Authors
Africa Research Statistics
Google Scholar
Research Gate
Researcher ID
CrossRef
Evaluation based on multi-criteria decision-making methods and spherical fuzzy framework for security and privacy in metaverse technologies: A case study
Faculty
Computer Science
Year:
2024
Type of Publication:
ZU Hosted
Pages:
Authors:
Staff Zu Site
Abstract In Staff Site
Journal:
AIP Advances AIP
Volume:
Keywords :
Evaluation based , multi-criteria decision-making methods , spherical
Abstract:
Integrating the metaverse technology with the transportation system has several security and privacy issues. This study assesses the 12 security solutions to select the best one to overcome security and privacy issues (such as data theft, unauthorized access, and theft of personal data) when integrating the transportation system with metaverse technology. A suggested methodology is conducted by experts and decision-makers using linguistic terms and spherical fuzzy numbers to express their opinions on evaluating the criteria and alternatives. Selecting the best security solution (alternative) is critical because it includes several conflict security criteria, such as data theft, authentication, security attacks, and others. This paper introduces a methodology for multi-criteria decision-making (MCDM) in a spherical fuzzy (SF) environment. The MCDM method dealt with various conflicting criteria, and SF dealt with uncertainty and vague information while evaluating the criteria and alternatives. The suggested methodology consists of two main phases. The first phase introduces the analytic hierarchy process (SF-AHP) method to compute the criteria weights. The second phase introduces the Weighted Aggregates Sum Product Assessment (SF-WASPAS) method to rank and select the best alternative. The results show the end-to-end authentication protocol is the best alternative (security solution). This study conducted a sensitivity analysis of the stability of the rank by changing the criteria’s weights. The sensitivity analysis results show that the end-to-end authentication protocol is the best alternative (security solution) in different cases. We compare the suggested methodology with six other MCDM methods: SF-TOPSIS, SF-VIKOR, SF-MABAC, SF-CODAS, SF-MARCOS, and SF-COPRAS to show the effectiveness of the proposed method. The results show that the presented methodology is robust compared to other MCDM methods.
Author Related Publications
Department Related Publications
Mohammed Abdel Basset Metwally Attia, "Discrete greedy flower pollination algorithm for spherical traveling salesman problem", Springer, 2019
More
Mohammed Abdel Basset Metwally Attia, "A New Hybrid Flower Pollination Algorithm for Solving Constrained Global Optimization Problems", Natural Sciences Publishing Cor., 2014
More
Saber Mohamed, "Training and Testing a Self-Adaptive Multi-Operator Evolutionary Algorithm for Constrained Optimization", ELSEVEIR, 2015
More
Saber Mohamed, "An Improved Self-Adaptive Differential Evolution Algorithm for Optimization Problems", IEEE, 2013
More
Saber Mohamed, "Differential Evolution with Dynamic Parameters Selection for Optimization Problems", IEEE, 2014
More
جامعة المنصورة
جامعة الاسكندرية
جامعة القاهرة
جامعة سوهاج
جامعة الفيوم
جامعة بنها
جامعة دمياط
جامعة بورسعيد
جامعة حلوان
جامعة السويس
شراقوة
جامعة المنيا
جامعة دمنهور
جامعة المنوفية
جامعة أسوان
جامعة جنوب الوادى
جامعة قناة السويس
جامعة عين شمس
جامعة أسيوط
جامعة كفر الشيخ
جامعة السادات
جامعة طنطا
جامعة بنى سويف