A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues

Institute of Electrical and Electronics Engineers (IEEE) - Tập 22 Số 2 - Trang 1191-1221 - 2020
Maria Stoyanova1, Yannis Nikoloudakis2, Spyros Panagiotakis2, Evangelos Pallis2, Evangelos K. Markakis2
1Faculty of Mathematics and Natural Sciences, Institute of Physics, Technical University of Berlin, Berlin, Germany
2Department of Electrical and Computer Engineering, Hellenic Mediterranean University, Heraklion, Greece

Tóm tắt

Từ khóa


Tài liệu tham khảo

2019, ISO/IEC 30121 2015—Information Technology—Governance of Digital Forensic Risk Framework

2019, ISO/IEC 27018 2019—Information Technology—Security Techniques—Code of Practice for Protection of Personally Identifiable Information (PII) in Public Clouds Acting as PII Processors

2019, ISO/IEC 27017 2015—Information Technology—Security Techniques—Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services

2019, ISO/IEC WD 27031—Information Technology—Guidelines for ICT Readiness for Business Continuity

2014, ISO/IEC 27031 2011 BSI—Information Technology—Security Techniques—Guidelines for Information and Communication Technology Readiness for Business Continuity

2019, ISO/IEC 20546 2019—Information Technology—Big Data—Overview and Vocabulary

2019, ISO/IEC WD 27030—Information Technology—Security Techniques—Guidelines for Security and Privacy in Internet of Things (IoT) Title Missing

2019, ISO 22320 2018—Security and Resilience—Emergency Management—Guidelines for Incident Management

krivchenkov, 2019, Intelligent Methods in Digital Forensics State of the Art, 1

2019, ISO/IEC 27050-1 2016—Information Technology—Security Techniques—Electronic Discovery—Part 1 Overview and Concepts

2019, ISO/IEC FDIS 27050-1—Information Technology—Electronic Discovery—Part 1 Overview and Concepts

10.1109/ICCSE1.2018.8374228

10.1016/j.diin.2017.06.010

10.14299/ijser.2017.08.004

lillis, 2016, Current challenges and future research areas for digital forensic investigation, The 11th ADFSL Conference on Digital Forensics Security and Law (CDFSL)

10.5220/0007905401060115

10.1109/NTMS.2018.8328748

hossain, 2018, Towards a holistic framework for secure, privacy-aware, and trustworthy Internet of Things using resource-efficient cryptographic schemes

10.1007/978-3-030-28752-8_1

10.1016/j.future.2018.09.058

10.1109/HPCC-CSS-ICESS.2015.305

2017, 2017 Cost of Data Breach Study Global Overview, 1

chapman, 2018, Intruder detection through pattern matching and provenance driven data recovery, Proc of IEEE Cloud Computing, 58

10.1016/j.diin.2012.05.002

10.1080/15614263.2015.1128163

serenhov, 2018, Forensic breach response in compliance with GDPR

zhao, 2018, Could block chain technology help resolve the cloud forensic problem?, Proc 9th Int Conf Cloud Comput GRIDs Virtual Cloud Comput, 39

wen, 2013, Forensics-as-a-service (FaaS): Computer forensic workflow management and processing using cloud, Proc of IEEE Cloud Computing, 208

du, 2017, Evaluation of digital forensic process models with respect to digital forensics as a service, Proc 15th Eur Conf Cyber Warfare Security (ECCWS), 573

10.1109/COMST.2015.2494502

shalaginov, 2017, Big Data Analytics by Automated Generation of Fuzzy Rules for Network Forensics Readiness, 52

10.1109/ACCESS.2019.2905347

10.1080/02564602.2018.1444516

10.1007/978-3-030-01704-0_28

10.1016/j.future.2017.07.060

10.1109/COMST.2017.2661201

10.2139/ssrn.3351007

adeel, 2019, A Survey on the Role of Wireless Sensor Networks and IoT in Disaster Management, 57

10.1007/s11235-019-00557-9

10.1145/3317687

10.1109/JSAC.2014.2328098

10.1109/COMST.2018.2864779

10.1016/j.diin.2019.07.002

10.1109/SAS.2017.7894059

2019, Small Unmanned Air System (SUAS) Assessment

10.1016/j.procs.2015.05.003

10.1109/IWCMC.2019.8766538

2019, Gatwick Airport in Fresh Drone Drama as Flights Are Forced to Divert to Stansted When Device Is Spotted Nearby

10.1109/ACCESS.2019.2896065

10.1109/JIOT.2018.2847249

rahman, 2016, Internet of Things mobility forensics, Proc Inf Security Res Educ (INSuRE) Conf (INSuRECon), 1

10.1016/j.jvcir.2018.10.023

10.1016/j.diin.2018.04.017

10.1017/S1867299X00005754

10.1109/MITS.2016.2583491

joseph, 2019, An analysis of digital forensics in cyber security, Proc Adv Intell Syst Comput, 815, 701, 10.1007/978-981-13-1580-0_67

lone, 2017, Forensic-chain: Ethereum blockchain based digital forensics, Sci Practical Cyber Secur J, 1, 21

10.1007/s11227-019-02779-9

10.1109/Trustcom/BigDataSE/ICESS.2017.293

nieto, 2018, IoT-forensics meets privacy: Towards cooperative digital investigations, SENSORS, 18, 492e, 10.3390/s18020492

10.4108/icst.collaboratecom.2013.254159

10.1016/j.fsir.2019.100008

10.3390/computers8030058

10.1002/wfs2.1322

2019, ISO/IEC 27042 2015—Information Technology—Security Techniques—Guidelines for the Analysis and Interpretation of Digital Evidence

2014, ISO/IEC 27041—Guidance on Assuring Suitability and Adequacy of Incident Investigative Methods

2015, ISO/IEC 27040 2015(E)—Information Technology—Security Techniques—Storage Security

2005, ISO/IEC 27001 2005 Information Technology—Security Techniques—Specification for an Information Security Management System

2014, ISO/IEC 27037 2012—Information Technology—Security Techniques—Guidelines for Identification Collection Acquisition and Preservation of Digital Evidence

2019, ISO/IEC WD 27035-2—Information Technology—Security Techniques—Information Security Incident Management—Part 2 Guidelines to Plan and Prepare for Incident Management

2019, ISO/IEC 27035-2 2016—Information Technology—Security Techniques—Information Security Incident Management—Part 2 Guidelines to Plan and Prepare for Incident Response

2019, ISO/IEC WD 27035-1—Information Technology—Security Techniques—Information Security Incident Management—Part 1 Principles of Incident Management

lally, 2018, Towards a Framework for Testing the Security of IoT Devices Consistently, 88

2018, Global Economic Crime and Fraud Survey 2018

10.1002/spy2.72

10.1016/j.cosrev.2019.05.002

2019, ISO/IEC 27035–1 2016—Information Technology—Security Techniques—Information Security Incident Management—Part 1 Principles of Incident Management

10.1016/j.compeleceng.2016.03.004

10.1109/EuroSPW.2019.00007

10.1109/ACCESS.2019.2921729

2019, Scientific Working Group on Digital Evidence

leverett, 2017, Standardisation and certification of safety, security and privacy in the ‘Internet of Things

alenezi, 2017, The impact of cloud forensic readiness on security, Proc 7th Int Conf Cloud Comput Services Sci, 539, 10.5220/0006332705390545

10.1002/wfs2.1324

feng, 2018, A new digital forensics model of smart city automated vehicles, Proc IEEE Int Conf Internet Things IEEE Green Comput Commun IEEE Cyber Phys Soc Comput IEEE Smart Data iThings-GreenCom-CPSCom-SmartData, 274

10.1177/1550147716665500

10.1109/IEEE.ICIOT.2017.13

10.1109/ICCCN.2015.7288421

10.1109/MNET.2016.1600113NM

10.1016/j.future.2019.02.012

10.1109/TrustCom/BigDataSE.2019.00121

10.1080/00450618.2018.1554090

10.1016/j.diin.2019.01.012

abdul-ghani, 2018, A comprehensive IoT attacks survey based on a building-blocked reference model, Int J Adv Comput Sci Appl, 9, 355

10.1109/I-SMAC.2017.8058363

10.1109/ISMICT.2019.8743670

chi, 2019, A framework for IoT data acquisition and forensics analysis, Proc IEEE Int Conf Big Data, 5142

2017, Discover Key Trends & Insights on Disruptive Technologies & IoT Innovations

2019, Industrial IoT (IIoT) Market Size & Forecast to 2026

10.1007/978-3-319-98734-7

10.1016/j.scs.2019.101608

patel, 2013, Forensic investigation life cycle (FILC) using 6 ‘R’policy for digital evidence collection and legal prosecution, Int J Emerg Trends Sci Technol, 2, 129

10.1109/MITP.2018.032501747

cosic, 2012, Chain of custody and life cycle of digital evidence, Comput Technol Apl, 3, 126

10.1016/S1361-3723(15)30045-2

joshi, 2016, Computer Communications and Networks Fundamentals of Network Forensics A Research Perspective

10.1016/j.future.2017.10.012

10.1109/MSP.2017.4251117

2019, Major DDoS Attacks Involving IoT Devices

10.1109/ACCESS.2018.2867466

2019, Cybersecurity Vulnerabilities Identified in St Jude Medical’s Implantable Cardiac Devices and Merlin home Transmitter FDA Safety Communication

james, 2017, Jurisdictional issues in cloud forensics, Proc Int Symp Hum Aspects Inf Secur Assurance (HAISA), 225

2019, YouTube Hours of Video Uploaded Every Minute 2019—Statista

2018, Top 10 Strategic IoT Technologies and Trends

rughani, 2017, IoT evidence acquisition—Issues and challenges, Res India Publ, 10, 1285

garfinkel, 2006, Forensic feature extraction and cross-drive analysis, Journal of digital investigation, 3, 71, 10.1016/j.diin.2006.06.007

2015, National Technical Authority for Information Assurance “Good Practice Forensics Readiness Guideline ”

10.18517/ijaseit.8.1.2115

hegarty, 2014, Digital evidence challenges in the Internet of Things, Proc 10th Int Netw Conf (INC), 163

10.1109/ISDFS.2017.7916508

10.1002/9781119053385.ch16

10.1002/cpe.4277

kamble, 2015, Digital forensic tools: A comparative approach, Journal of Advanced Science and Engineering Research, 4, 157

10.1109/ISSA.2013.6641058

10.1109/IMF.2011.19

arshad, 2018, Digital forensics: Review of issues in scientific validation of digital evidence, J Inf Process Syst, 14, 346

2014, Cloud Computing Forensic Science Challenges—Draft NISTIR 8006

10.1016/j.diin.2014.09.002

2019, Merit Medical Endotek—Products

10.5120/ijca2016909390

10.1016/j.compeleceng.2017.02.006

2018, Autonomous Vehicle Sales Forecast 2018

10.1109/WF-IoT.2014.6803166

toldinas, 2016, Suitability of the digital forensic tools for investigation of cyber crime in the Internet of Things and Services, Proc 3rd Int Virtual Res Conf Tech Discip, 3, 86

10.1109/JIOT.2014.2302386

2019, The Drone Market Report 2019 Commercial Drone Market Size and Forecast (2019–2024)

rana, 2017, Taxonomy of digital forensics: Investigation tools and challenges, arXiv 1709 06529

10.1109/ICCNC.2013.6504250

2019, Smart Home Report 2019

2019, Digital Health Market Share Trends 2019–2025 Growth Forecast Report

2018, Forecast Wearable electronic devices worldwide

blanchard, 2019, Brexit GDPR and Data Protection What Happens If the U K Becomes a Third Country—Data Protection Network

10.1007/978-0-387-84927-0_1

oriwoh, 2014, Internet of Things: The argument for smart forensics, Handbook of Research on Digital Crime, 42, 1

2015, Forensics Science International

10.1145/2484313.2484342

10.1109/ICDIPC.2015.7323000

adjei, 2018, A review of digital forensic challenges in the Internet of Things (IoT), Int J Mech Eng Technol, 9, 915

10.1109/SCC.2015.46

2015, ISO/IEC-27043—Information Technology—Security Techniques—Incident Investigation Principles and Processes

10.1109/FiCloud.2016.57

10.1109/SmartIoT.2018.00-19

10.1145/3098954.3104052

10.1145/3317549.3326317

10.1080/00450618.2016.1267797

10.23919/ISTAFRICA.2017.8102362

2019, ISO/IEC 29100 2011/Amd 1 2018—Information Technology—Security Techniques—Privacy Framework—Amendment 1 Clarifications

babun, 2018, IoTDots: A digital forensics framework for smart environments

10.1109/ICIOT.2018.00012

10.5815/ijisa.2018.06.05

10.1016/j.ins.2019.04.011

10.1177/1550147719844159

10.1016/j.dcan.2017.10.006

10.1109/MCOM.2018.1800137

oham, 2018, A blockchain based liability attribution framework for autonomous vehicles, arXiv preprint arxiv 1802 05807

jonsson, 2019, Ericsson mobility report, 28

10.1007/978-3-319-99277-8_3

10.1109/ACCESS.2019.2913648

2018, Internet Security Threat Report (ISTR) Volume 23

10.1109/MCC.2017.39

verma, 2018, DF 2.0: Designing an automated, privacy preserving, and efficient digital forensic framework, Proc ADFSL Conf Digit Forensics Secur Law, 127

10.1109/NETSOFT.2019.8806675

le, 2019, BIFF: A blockchain-based IoT forensics framework with identity privacy, Proc IEEE Int Conf TENCON, 2372

ejaz, 2019, Blockchain Technology for Security and Privacy in Internet of Things, 47

10.1007/978-3-642-41148-9_20

10.1002/spy2.23

balogun, 2013, Privacy impacts of data encryption on the efficiency of digital forensics technology, Int J Adv Comput Sci Appl, 4, 36

2018, The State Of GDPR Readiness

2019, First Overview on the Implementation of the GDPR and the Roles and Means of the National Supervisory Authorities

duncan, 2018, Using unikernels to address the cloud forensic problem and help achieve EU GDPR compliance, Proc 9th Int Conf Cloud Comput GRIDs Virtual Cloud Comput, 71

cook, 2018, Internet of Cloud Security and Privacy Issues, 271

10.1016/j.procs.2017.06.124

10.1109/ICDCSW.2017.78

10.1016/j.future.2017.11.022

10.1016/j.jisa.2017.11.002

10.1016/j.iot.2019.100050

2016, JOURNEY to CLOUD

10.1016/j.future.2013.01.010

2016, Cloud Computing Top Threats in 2016

10.1109/JIOT.2018.2869847

10.1007/s11277-019-06407-w

2018, Forecast Public Cloud Services Worldwide (2010–2016)

c?olakovi?, 2018, Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues, Comput Netw, 144, 17, 10.1016/j.comnet.2018.07.017

10.1109/MNET.2016.1600087NM

10.5220/0006308703150324

ahmed, 2017, Minimization of security issues in cloud computing, J Inf Commun Technol Robot Appl, 3, 1

10.1145/3098954.3104053

hou, 2019, IaaS vs PaaS vs SaaS Enter the Ecommerce Vernacular What You Need to Know Examples & More

10.1016/j.im.2018.03.004

2019, The Definitive Guide to Encryption Key Management Fundamentals

stoyanov, 2014, An approach to use the Web services and open source software to store and share user applications and data, Proc Annu Univ Sci Conf NVU, 9, 92