Identification and Remediation of Vulnerabilities in IoT based Health Monitor

  • et al.
Citations of this article
Mendeley users who have this article in their library.
Get full text


Internet of Things (IoT) changes the trend “Connect the unconnected” likes human or environmental and technical interactions, interactions among the machines through Radio Networks, Sensor Networks and many more simple devices like fitbits, thermostats etc. Besides this, they are highly prone to vulnerable due to its open and heterogeneous nature. To secure IoT Applications, we proposed a methodology called “Process to enhance software security” (PESS) method. The main Moto of PESS is to design Security aware Software Development Life Cycle (Sa-SDLC). In PESS methodology we are applying and assessing the secure assurance activities and security patterns. In our work, we have applied secure assurance activities and secure adapter pattern for securing user information of IoT based Health Monitor Application. Our PESS methodology accomplished the security implementation faults identification and remediation at early phases of IoT application development life cycle.




Aruna*, E. R., Reddy, A. R. M., & Sunitha, K. V. N. (2019). Identification and Remediation of Vulnerabilities in IoT based Health Monitor. International Journal of Innovative Technology and Exploring Engineering, 2(9), 4361–4365.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free