2018
DOI: 10.1016/j.future.2017.07.060
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things security and forensics: Challenges and opportunities

Abstract: The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution, openness and relatively high processing power of IoT objects made them an ideal target for cyber attacks. Moreover, as many of IoT nodes are collecting and processing private information, they are becoming a goldmine of data for malicious actors. Therefore, security and specifically the ability to detect compromised nodes, together with collecting and pr… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
220
0
5

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 461 publications
(226 citation statements)
references
References 21 publications
1
220
0
5
Order By: Relevance
“…2. When the authenticator is a smart device, we have the flexibility to adopt conventional IoT security strategies [31]. The challenges lie in the cases that the authenticator is a dumb device which is not compatible with conventional strategies (e.g., key-based schemes).…”
Section: A System Modelmentioning
confidence: 99%
“…2. When the authenticator is a smart device, we have the flexibility to adopt conventional IoT security strategies [31]. The challenges lie in the cases that the authenticator is a dumb device which is not compatible with conventional strategies (e.g., key-based schemes).…”
Section: A System Modelmentioning
confidence: 99%
“…Most of IoT nodes are not storing any metadata including temporal information which makes origin of evidence a challenge for an investigator. In the case of modified data or temporal data are missed then correlation of evidences gathered from the different IoT devices is almost impossible task [7].…”
Section: Iot Forensic Stepsmentioning
confidence: 99%
“…Some smartphones manufactured by Samsung even have a thermometer, barometer, humidity sensor and heartbeat sensor built in the phones. One of the application that was developed that made use of the smartphone sensors was an activity recognition application [3]. 2) Medical Sensors -Examples of these type of sensors are heart rate sensors, pulse sensors, sensors for estimating pulse, body temperature, breath rate and blood glucose levels and so forth.…”
Section: Sensors and Actuatorsmentioning
confidence: 99%