2019
DOI: 10.1007/978-3-030-34080-3_7
|View full text |Cite
|
Sign up to set email alerts
|

Forensic Analysis on IoT Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…The spatial dimension focuses on the potential sources of evidence, the temporal dimension focuses on the legal acceptance of evidence, and the technical dimension focuses on the needed tools and technologies for data collection and analysis. Jayakrishnan and Vasanthi [ 139 ] presented an analysis of IoT attacks on Wi-Fi cameras and side-channel attacks (SCAs) to obtain AES keys to aid investigators in understanding attack patterns. Qatawneh et al [ 140 ] proposed a new digital forensics investigation model (DFIM) for the IoT.…”
Section: Cyber Forensics In Smart Citiesmentioning
confidence: 99%
See 1 more Smart Citation
“…The spatial dimension focuses on the potential sources of evidence, the temporal dimension focuses on the legal acceptance of evidence, and the technical dimension focuses on the needed tools and technologies for data collection and analysis. Jayakrishnan and Vasanthi [ 139 ] presented an analysis of IoT attacks on Wi-Fi cameras and side-channel attacks (SCAs) to obtain AES keys to aid investigators in understanding attack patterns. Qatawneh et al [ 140 ] proposed a new digital forensics investigation model (DFIM) for the IoT.…”
Section: Cyber Forensics In Smart Citiesmentioning
confidence: 99%
“…Year Approach/Experiment IoT Zia et al [136] 2017 An application-specific digital forensics investigative model for the IoT Rizal et al [137] 2018 An evaluated network forensics method to detect flooding attacks Hou et al [138] 2019 A survey of IoT forensics in the technical, temporal, and spatial dimensions Jayakrishnan and Vasanthi [139] 2019 An attack simulation to identify advanced encryption standard (AES) keys Qatawneh et al [140] 2019 A digital forensics investigation model (DFIM) for the IoT Yaqoob et al [141] 2019 An IoT taxonomy based on different forensics processes Stoyanova et al [142] 2020 Cloud security challenges and data acquisition using blockchain Patil et al [143] 2020 A comparative analysis of IoT cyber forensics research Jayakrishnan and Vasanthi [144] 2020 A process model for forensics using an IoT HoneyNetCloud Atlam et al [145] 2020 IoT forensics techniques and the need for AI in IoT forensics Patel and Malek [146] 2020 Existing IoT forensics frameworks and their challenges Yang et al [147] 2020 Biometric-based authentication and forensics for the IoT Bandil and Al-Masri [148] 2020 Real-time events associated with IoT data streams Janarthanan et al [149] 2021 Challenges in smart home investigations and forensics Surange and Khatri [150] 2021 A survey of developments in IoT forensics and the identification of research gaps Kim et al [151] 2022 A data acquisition framework for smart devices Ganesh et al [152] 2022 AI use cases of forensics in blockchain, the IoT, and cloud computing…”
Section: Category Authorsmentioning
confidence: 99%