SECURING HAZARDOUS IoT SENSOR DEVICE WITH PATCH MANAGEMENT USING TWO PHASE AUTHENTICATION

Authors

  • A. Suresh Research Scholar, Rayalaseema University, Kurnool, Andhra Pradesh, India Author
  • Prof.G.T.Naidu Dept.Of.Physics, Sri Krishnadevaraya University, Anantapur-515001, Andhra Pradesh, India Author

DOI:

https://doi.org/10.61841/qgzkjz21

Keywords:

IoT security, Patch management,, IoT gadgets, Two phase authentication

Abstract

Security in IoT security is the novelty zone concerned about defending linkeddigital media and systems in Internet of things (IoT). IoT comprised with adding web ease of use to an agreement of consistentbuildin gadgets, with advanced mechanical machines, items, creationswith add on’s digital content. Every "thing" as digital media is given an identifier and the ability to naturally transform information over information system. Permitting digital gadgets to edge with the web frees them up to various genuine weaknesses on the off probability that they are not properly secured. Secure IoT has been converted into the examination subsequent to various majorevents where a characteristic IoT gadget was utilized to invade and assault the bigger system. Actualizing hazardous safety efforts is basic to assurance the wellbeing of IoT gadgets associated with them. This work addresses IoT patch management is implemented in hazardous IoT devices that enhances automatic security as it seems to be crucial. The vulnerabilities in IoT rise when the IoT devices are updated. Using patch management the IoT devices uses two phase authentication for ensuring the devices are secured and free from vulnerabilities. The security is evaluated based on the device security implication and the device performance is degraded when there is a security flaw.

 

Downloads

Download data is not yet available.

References

1. Khan, Minhaj Ahmad, and Khaled Salah. "IoT security: Review, blockchain solutions, and open challenges." Future Generation Computer Systems 82 (2018): 395-411.

2. Hassan, Wan Haslina. "Current research on Internet of Things (IoT) security: A survey." Computer networks 148 (2019): 283-294.

3. Hassija, Vikas, et al. "A survey on IoT security: application areas, security threats, and solution architectures." IEEE Access 7 (2019): 82721-82743.

4. Li, Xiang, et al. "Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach." IEEE Access 7 (2019): 9368-9383.

5. HaddadPajouh, Hamed, et al. "A survey on internet of things security: Requirements, challenges, and solutions." Internet of Things (2019): 100129.

6. Zhang, Jiliang, and Gang Qu. "Physical unclonable function-based key sharing via machine learning for IoT security." IEEE Transactions on Industrial Electronics 67.8 (2019): 7025-7033.

7. Hou, Jianwei, Leilei Qu, and Wenchang Shi. "A survey on internet of things security from data perspectives." Computer Networks 148 (2019): 295-306.

8. Li, Fangyu, et al. "System statistics learning-based IoT security: Feasibility and suitability." IEEE Internet of Things Journal 6.4 (2019): 6396-6403.

Downloads

Published

30.11.2020

How to Cite

Suresh, A., & Naidu, G. (2020). SECURING HAZARDOUS IoT SENSOR DEVICE WITH PATCH MANAGEMENT USING TWO PHASE AUTHENTICATION. International Journal of Psychosocial Rehabilitation, 24(9), 4990-4994. https://doi.org/10.61841/qgzkjz21