scispace - formally typeset
Open AccessJournal ArticleDOI

A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues

TLDR
The purpose of this paper is to identify and discuss the main issues involved in the complex process of IoT-based investigations, particularly all legal, privacy and cloud security challenges, as well as some promising cross-cutting data reduction and forensics intelligence techniques.
Abstract
Today is the era of the Internet of Things (IoT). The recent advances in hardware and information technology have accelerated the deployment of billions of interconnected, smart and adaptive devices in critical infrastructures like health, transportation, environmental control, and home automation. Transferring data over a network without requiring any kind of human-to-computer or human-to-human interaction, brings reliability and convenience to consumers, but also opens a new world of opportunity for intruders, and introduces a whole set of unique and complicated questions to the field of Digital Forensics. Although IoT data could be a rich source of evidence, forensics professionals cope with diverse problems, starting from the huge variety of IoT devices and non-standard formats, to the multi-tenant cloud infrastructure and the resulting multi-jurisdictional litigations. A further challenge is the end-to-end encryption which represents a trade-off between users’ right to privacy and the success of the forensics investigation. Due to its volatile nature, digital evidence has to be acquired and analyzed using validated tools and techniques that ensure the maintenance of the Chain of Custody. Therefore, the purpose of this paper is to identify and discuss the main issues involved in the complex process of IoT-based investigations, particularly all legal, privacy and cloud security challenges. Furthermore, this work provides an overview of the past and current theoretical models in the digital forensics science. Special attention is paid to frameworks that aim to extract data in a privacy-preserving manner or secure the evidence integrity using decentralized blockchain-based solutions. In addition, the present paper addresses the ongoing Forensics-as-a-Service (FaaS) paradigm, as well as some promising cross-cutting data reduction and forensics intelligence techniques. Finally, several other research trends and open issues are presented, with emphasis on the need for proactive Forensics Readiness strategies and generally agreed-upon standards.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal Article

Internet of Vehicles: From Intelligent Grid to Autonomous Cars and Vehicular Clouds

TL;DR: Calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs.
Journal ArticleDOI

Reliability in Internet of Things: Current Status and Future Perspectives

TL;DR: This article first identifies reliability challenges posed by specific enabling technologies of each layer of the layered IoT architecture, and presents a systematic synthesis and review of IoT reliability-related literature.
Journal ArticleDOI

Future smart cities: requirements, emerging technologies, applications, challenges, and future aspects

TL;DR: In this article , a survey on analyzing future technologies and requirements for future smart cities is presented, where the authors provide extensive research to identify and inspect the latest technology advancements, the foundation of the upcoming robust era, such as deep learning (DL), machine learning (ML), internet of things (IoT), mobile computing, big data, blockchain, sixth generation (6G) networks, WiFi-7, industry 5.0, robotic systems, heating ventilation, and air conditioning (HVAC), digital forensic, industrial control systems, connected and automated vehicles (CAVs), electric vehicles, product recycling, flying cars, pantry backup, calamity backup and vital integration of cybersecurity to keep the user concerns secured.
Journal ArticleDOI

A review of logistics Internet-of-Things: Current trends and scope for future research

TL;DR: In this paper, the authors provide a systematic and comprehensive literature review of recent papers to draw a framework of the past, and to shed light on potential directions for future research in Logistics Internet-of-Things (L-IoT).
Posted Content

Cellular, Wide-Area, and Non-Terrestrial IoT: A Survey on 5G Advances and the Road Towards 6G.

TL;DR: In this paper, the authors provide a comprehensive survey on existing and emerging communication solutions for serving IoT applications in the context of cellular, wide-area, as well as non-terrestrial networks.
References
More filters
Journal ArticleDOI

Internet of Things (IoT): A vision, architectural elements, and future directions

TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI

What Will 5G Be

TL;DR: This paper discusses all of these topics, identifying key challenges for future research and preliminary 5G standardization activities, while providing a comprehensive overview of the current literature, and in particular of the papers appearing in this special issue.
Journal ArticleDOI

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

TL;DR: The complexity of ML/DM algorithms is addressed, discussion of challenges for using ML/ DM for cyber security is presented, and some recommendations on when to use a given method are provided.
Journal ArticleDOI

Internet of Things: A survey on the security of IoT frameworks

TL;DR: This paper surveys the security of the main IoT frameworks, and shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties are shown.
Journal Article

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

TL;DR: A targeted literature survey of machine learning (ML) and data processing (DM) strategies for cyber analytics in support of intrusion detection as it applies to wired networks.
Related Papers (5)