2018
DOI: 10.1109/mitp.2018.032501747
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things Forensics: The Need, Process Models, and Open Issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 46 publications
(27 citation statements)
references
References 14 publications
0
24
0
Order By: Relevance
“…Consecutively executed, all abovementioned steps constitute the Forensics Investigation Life Cycle [60], [61]. Although there are some variations in the way different scholars divide the investigation cycle into phases, one important detail should never be missed: the whole cycle should be executed using validated tools and scientifically proven methodology [62]. Since nowadays there are new platforms based on embedded technologies, DF investigators develop and validate new tools in order to keep pace with the advances, and guarantee the accurate and timely data extraction [63].…”
Section: A What Is Digital Forensics?mentioning
confidence: 99%
“…Consecutively executed, all abovementioned steps constitute the Forensics Investigation Life Cycle [60], [61]. Although there are some variations in the way different scholars divide the investigation cycle into phases, one important detail should never be missed: the whole cycle should be executed using validated tools and scientifically proven methodology [62]. Since nowadays there are new platforms based on embedded technologies, DF investigators develop and validate new tools in order to keep pace with the advances, and guarantee the accurate and timely data extraction [63].…”
Section: A What Is Digital Forensics?mentioning
confidence: 99%
“…Common attacks in IoT include DoS attack, Man-in-the-Middle Attack. IoT security demands research on the privacy of data [218,259,128], prevention of loss of data from personalized devices, leading to impersonation attacks and prevention of malware via botnets which leads to Distributed Denial of Service Attacks (DDoS) [51]. For IoT devices to be secured, it requires to ensure authentication, integrity, confidentiality, availability, authorization, secrecy, and non-repudiation [IoT device].…”
Section: Taxonomy For Iot Security Frameworkmentioning
confidence: 99%
“…In the past few years, lots of research efforts have been conducted in IoT forensics [18], [19], [20], including digital evidences identification, collection, storage, analysis, and distribution in IoT environments [19], which is very different with the existing computer forensics. The IoT systems contain many smart devices, heterogeneous networks, and diverse applications, where huge volumes of data and heterogeneous technologies create new challenges for forensic investigation [21], [22], [23]. Since 2017, the emerging blockchain technology have been applied in digital forensics to document evidence items, interaction actions, and preserving evidence in the blockchain [24], [25], [26], [27], [28], [29].…”
Section: A Related Workmentioning
confidence: 99%