SECURING HAZARDOUS IoT SENSOR DEVICE WITH PATCH MANAGEMENT USING TWO PHASE AUTHENTICATION
DOI:
https://doi.org/10.61841/qgzkjz21Keywords:
IoT security, Patch management,, IoT gadgets, Two phase authenticationAbstract
Security in IoT security is the novelty zone concerned about defending linkeddigital media and systems in Internet of things (IoT). IoT comprised with adding web ease of use to an agreement of consistentbuildin gadgets, with advanced mechanical machines, items, creationswith add on’s digital content. Every "thing" as digital media is given an identifier and the ability to naturally transform information over information system. Permitting digital gadgets to edge with the web frees them up to various genuine weaknesses on the off probability that they are not properly secured. Secure IoT has been converted into the examination subsequent to various majorevents where a characteristic IoT gadget was utilized to invade and assault the bigger system. Actualizing hazardous safety efforts is basic to assurance the wellbeing of IoT gadgets associated with them. This work addresses IoT patch management is implemented in hazardous IoT devices that enhances automatic security as it seems to be crucial. The vulnerabilities in IoT rise when the IoT devices are updated. Using patch management the IoT devices uses two phase authentication for ensuring the devices are secured and free from vulnerabilities. The security is evaluated based on the device security implication and the device performance is degraded when there is a security flaw.
Downloads
References
1. Khan, Minhaj Ahmad, and Khaled Salah. "IoT security: Review, blockchain solutions, and open challenges." Future Generation Computer Systems 82 (2018): 395-411.
2. Hassan, Wan Haslina. "Current research on Internet of Things (IoT) security: A survey." Computer networks 148 (2019): 283-294.
3. Hassija, Vikas, et al. "A survey on IoT security: application areas, security threats, and solution architectures." IEEE Access 7 (2019): 82721-82743.
4. Li, Xiang, et al. "Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach." IEEE Access 7 (2019): 9368-9383.
5. HaddadPajouh, Hamed, et al. "A survey on internet of things security: Requirements, challenges, and solutions." Internet of Things (2019): 100129.
6. Zhang, Jiliang, and Gang Qu. "Physical unclonable function-based key sharing via machine learning for IoT security." IEEE Transactions on Industrial Electronics 67.8 (2019): 7025-7033.
7. Hou, Jianwei, Leilei Qu, and Wenchang Shi. "A survey on internet of things security from data perspectives." Computer Networks 148 (2019): 295-306.
8. Li, Fangyu, et al. "System statistics learning-based IoT security: Feasibility and suitability." IEEE Internet of Things Journal 6.4 (2019): 6396-6403.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
