Internet of Things Forensics: A Review

被引:36
|
作者
Atlam, Hany F. [1 ,2 ]
Hemdan, Ezz El-Din [2 ]
Alenezi, Ahmed [1 ]
Alassafi, Madini O. [3 ]
Wills, Gary B. [1 ]
机构
[1] Univ Southampton, Elect & Comp Sci Dept, Southampton, Hants, England
[2] Menoufia Univ, Comp Sci & Engn Dept, Fac Elect Engn, Menoufia, Egypt
[3] King Abdulaziz Univ, Fac Comp & IT, Dept Informat Technol, Jeddah, Saudi Arabia
关键词
Digital Forensics; Internet of Things; Security; Cybercrime; Internet of Things Forensics; FRAMEWORK; SECURITY; CHALLENGES;
D O I
10.1016/j.iot.2020.100220
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth of Internet of Things (IoT) devices brings countless benefits, but it also brings new security and forensics challenges. The IoT system with billions of devices generates a huge amount of evidence which causes big challenges to digital investigators and practitioners who are required to interact with IoT devices to investigate cybercrimes in a forensically sound and timely fashion. These challenges create more opportunities for cybercrimes to attack various IoT application and services resulting in a direct impact on IoT users. As the IoT has incorporated in most aspects of our life, cybercrimes will literally threaten human life, hence, IoT forensics is required to investigate and mitigate against such attacks. Therefore, this paper provides a detailed review of IoT forensics. It started by providing a comprehensive discussion of IoT security involving the need for security by design and security challenges of the IoT system. Then, a review of IoT forensics is presented by highlighting the need for Artificial Intelligence (AI) in IoT forensics, state-of-theart research and recent studies, opportunities and key requirements for a successful IoT forensics. Challenges and suggested solutions of IoT forensics are also discussed. Finally, a discussion of open research directions of IoT forensics is presented. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:19
相关论文
共 50 条
  • [31] Internet of Things: A Scientometric Review
    Ruiz-Rosero, Juan
    Ramirez-Gonzalez, Gustavo
    Williams, Jennifer M.
    Liu, Huaping
    Khanna, Rahul
    Pisharody, Greeshma
    SYMMETRY-BASEL, 2017, 9 (12):
  • [32] Internet of Things for gaming: A review
    Laghari, Asif Ali
    Li, Hang
    Shoulin, Yin
    Jumani, Awais Khan
    Khan, Abdullah Ayub
    Dahri, Fida Hussain
    ENTERTAINMENT COMPUTING, 2025, 52
  • [33] Internet of Things in the Philippines: A Review
    Illahi, Ana Antoniette C.
    Culaba, Alvin
    Dadios, Elmer P.
    2019 IEEE 11TH INTERNATIONAL CONFERENCE ON HUMANOID, NANOTECHNOLOGY, INFORMATION TECHNOLOGY, COMMUNICATION AND CONTROL, ENVIRONMENT, AND MANAGEMENT (HNICEM), 2019,
  • [34] A Review on Routing in Internet of Things
    J. Marietta
    B. Chandra Mohan
    Wireless Personal Communications, 2020, 111 : 209 - 233
  • [35] A Review of Security in Internet of Things
    Yasmine Harbi
    Zibouda Aliouat
    Saad Harous
    Abdelhak Bentaleb
    Allaoua Refoufi
    Wireless Personal Communications, 2019, 108 : 325 - 344
  • [36] Security in Internet of Things: A Review
    Khan, Naqash Azeem
    Awang, Azlan
    Karim, Samsul Ariffin Abdul
    IEEE ACCESS, 2022, 10 : 104649 - 104670
  • [37] Security Review On The Internet of Things
    Whitter-Jones, Jack
    2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2018, : 163 - 168
  • [38] Internet of things in manufacturing: A review
    Garg, Khushbu
    Goswami, Chandramani
    Chhatrawat, R. S.
    Dhakar, Shyam Kumar
    Kumar, Govind
    MATERIALS TODAY-PROCEEDINGS, 2022, 51 : 286 - 288
  • [39] Blockchain meets Internet of Things (IoT) forensics: A unified framework for IoT ecosystems
    Brotsis, Sotirios
    Grammatikakis, Konstantinos P.
    Kavallieros, Dimitrios
    Mazilu, Antonio I.
    Kolokotronis, Nicholas
    Limniotis, Konstantinos
    Vassilakis, Costas
    INTERNET OF THINGS, 2023, 24
  • [40] The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security
    Losavio, Michael M.
    Chow, K. P.
    Koltay, Andras
    James, Joshua
    SECURITY AND PRIVACY, 2018, 1 (03):