{"title":"物联网取证取证方法研究","authors":"A. Renold","doi":"10.1109/ICNWC57852.2023.10127407","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) usage in different applications and the usage of open source communication band are vulnerable to different types of attacks. Determining the root cause of the attacks, isolating the nodes, and providing countermeasures to overcome such threats in the future are important aspects for the success of IoT and its usage in more areas of applications. This paper presents a survey of recent works on the evidence collection module in IoT forensics. The evidence collection is the second stage in the forensics investigation cycle. The classification of the evidence collection mechanisms based on the strategy adapted has been discussed. Additionally, the discussion on the evidence collection methodologies and the future directions for research in the evidence collection module pertaining to IoT forensics is presented.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Survey of Evidence Collection Methods for Internet of Things Forensics\",\"authors\":\"A. Renold\",\"doi\":\"10.1109/ICNWC57852.2023.10127407\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things (IoT) usage in different applications and the usage of open source communication band are vulnerable to different types of attacks. Determining the root cause of the attacks, isolating the nodes, and providing countermeasures to overcome such threats in the future are important aspects for the success of IoT and its usage in more areas of applications. This paper presents a survey of recent works on the evidence collection module in IoT forensics. The evidence collection is the second stage in the forensics investigation cycle. The classification of the evidence collection mechanisms based on the strategy adapted has been discussed. Additionally, the discussion on the evidence collection methodologies and the future directions for research in the evidence collection module pertaining to IoT forensics is presented.\",\"PeriodicalId\":197525,\"journal\":{\"name\":\"2023 International Conference on Networking and Communications (ICNWC)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Networking and Communications (ICNWC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNWC57852.2023.10127407\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Networking and Communications (ICNWC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNWC57852.2023.10127407","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

物联网(IoT)在不同应用中的使用以及开源通信频段的使用容易受到不同类型的攻击。确定攻击的根本原因,隔离节点,并提供应对措施以克服未来的此类威胁,是物联网成功及其在更多应用领域中使用的重要方面。本文介绍了物联网取证中证据收集模块的最新工作概况。证据收集是法医调查周期的第二阶段。根据所采用的策略对证据收集机制进行了分类。此外,还讨论了与物联网取证相关的证据收集模块的证据收集方法和未来研究方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Survey of Evidence Collection Methods for Internet of Things Forensics
Internet of Things (IoT) usage in different applications and the usage of open source communication band are vulnerable to different types of attacks. Determining the root cause of the attacks, isolating the nodes, and providing countermeasures to overcome such threats in the future are important aspects for the success of IoT and its usage in more areas of applications. This paper presents a survey of recent works on the evidence collection module in IoT forensics. The evidence collection is the second stage in the forensics investigation cycle. The classification of the evidence collection mechanisms based on the strategy adapted has been discussed. Additionally, the discussion on the evidence collection methodologies and the future directions for research in the evidence collection module pertaining to IoT forensics is presented.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Approach For Short Term Electricity Load Forecasting Real-time regional road sign detection and identification using Raspberry Pi ICNWC 2023 Cover Page A novel hybrid automatic intrusion detection system using machine learning technique for anomalous detection based on traffic prediction Towards Enhanced Deep CNN For Early And Precise Skin Cancer Diagnosis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1