2019
DOI: 10.1007/978-3-319-92384-0_6
|View full text |Cite
|
Sign up to set email alerts
|

Digital Forensics for IoT and WSNs

Abstract: In the last decade, wireless sensor networks (WSNs) and Internet-of-Things (IoT) devices are proliferated in many domains including critical infrastructures such as energy, transportation and manufacturing. Consequently, most of the daily operations now rely on the data coming from wireless sensors or IoT devices and their actions. In addition, personal IoT devices are heavily used for social media applications, which connect people as well as all critical infrastructures to each other under the cyber domain. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 54 publications
0
13
0
Order By: Relevance
“…WSNs node is not fundamentally secure [12]. They are deployed in the event prone area: either into the event or near to the event.…”
Section: Securitymentioning
confidence: 99%
“…WSNs node is not fundamentally secure [12]. They are deployed in the event prone area: either into the event or near to the event.…”
Section: Securitymentioning
confidence: 99%
“…For instance, identifying all connected networks and internal/external access points. On the other side, research by (Karabiyik & Akkaya, 2019) has discussed challenges and potential evidence sources in IoT. The categorized expected sources of evidence in IoT fall into several logs of data (i.e., network, web, cloud, and sensor), which mostly require some reconstruction of these recovered metadata.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [21] we see a review of current techniques and their approaches, which essentially decomposes the problem into three areas: device; network; and, cloud. IoTDots [1] focuses on the data capture and analysis, and is an important tool in the capture of data from devices and the subsequent reconstruction of events.…”
Section: Cyber Physical System Forensic Readinessmentioning
confidence: 99%