Identification and Remediation of Vulnerabilities in IoT based Health Monitor
E.R. Aruna1, A. Rama Mohana Reddy2, K.V.N. Sunitha3

1E.R. Aruna*, Department of IT, Vardhaman College of Engineering, Hyderabad, India
2A. Rama Mohana Reddy, Department of CSE, SVU Colege of Engineering, S.V University, India
3K.V.N. Sunitha, Department of CSE, BVRIT College of Engineering, Hyderabad, India

Manuscript received on November 14, 2019. | Revised Manuscript received on 25 November, 2019. | Manuscript published on December 10, 2019. | PP: 4361-4365 | Volume-9 Issue-2, December 2019. | Retrieval Number: B7805129219/2019©BEIESP| DOI: 10.35940/ijitee.B7805.129219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Internet of Things (IoT) changes the trend “Connect the unconnected” likes human or environmental and technical interactions, interactions among the machines through Radio Networks, Sensor Networks and many more simple devices like fitbits, thermostats etc. Besides this, they are highly prone to vulnerable due to its open and heterogeneous nature. To secure IoT Applications, we proposed a methodology called “Process to enhance software security” (PESS) method. The main Moto of PESS is to design Security aware Software Development Life Cycle (Sa-SDLC). In PESS methodology we are applying and assessing the secure assurance activities and security patterns. In our work, we have applied secure assurance activities and secure adapter pattern for securing user information of IoT based Health Monitor Application. Our PESS methodology accomplished the security implementation faults identification and remediation at early phases of IoT application development life cycle. Keywords: PESS Methodology, Secure Adapter Pattern, IoT Application
Keywords: PESS Methodology, Secure Adapter Pattern, IoT Application
Scope of the Article: Internet of Things (IoT)