计算机工程与应用 ›› 2022, Vol. 58 ›› Issue (8): 12-32.DOI: 10.3778/j.issn.1002-8331.2201-0014
梁广俊,辛建芳,王群,倪雪莉,郭向民,夏玲玲
出版日期:
2022-04-15
发布日期:
2022-04-15
LIANG Guangjun, XIN Jianfang, WANG Qun, NI Xueli, GUO Xiangmin, XIA Lingling
Online:
2022-04-15
Published:
2022-04-15
摘要: 物联网时代的到来为人们带来极大的便利,但也使得网络攻击的范围更广,带来了新的网络空间安全威胁。海量的物联网设备保留了丰富的数字痕迹,可以洞悉人们在家中和其他场所的各种行为,这对于数字取证具有重要意义。针对物联网取证展开深入讨论,从物联网取证的兴起、发展和研究现状入手,进一步探讨数字取证模型、1-2-3区域方法模型、并行结构-物联网取证模型、隐私保护取证模型以及针对特殊应用的取证模型。探讨了物联网取证的机遇和挑战。力求为读者在系统学习物联网取证技术的基础上致力于更深入的研究提供帮助和借鉴。
梁广俊, 辛建芳, 王群, 倪雪莉, 郭向民, 夏玲玲. 物联网取证综述[J]. 计算机工程与应用, 2022, 58(8): 12-32.
LIANG Guangjun, XIN Jianfang, WANG Qun, NI Xueli, GUO Xiangmin, XIA Lingling. Survey of IoT Forensics[J]. Computer Engineering and Applications, 2022, 58(8): 12-32.
[1] ZIA T,PENG L,HAN W.Application-specific digital forensics investigative model in Internet of Things(IoT)[C]//International Conference,Reggio Calabria,Italy,2017:1-7. [2] 杨伟,汪浩,万亚东,等.IETF 6TiSCH工业物联网研究综述:标准、关键技术与平台[J].计算机科学与探索,2020,14(3):361-376. YANG W,WANG H,WAN Y D,et al.Survey on IETF 6TiSCH industrial Internet of Things:standards,key technologies and platforms[J].Journal of Frontiers of Computer Science and Technology,2020,14(3):361-376. [3] 黄芹华,欧阳为民.手机及小型手持数字设备数字取证研究综述[J].计算机工程与应用,2009,45(18):81-84. HUANG Q H,OUYANG W M.A review of digital forensics research on mobile phones and small handheld digital devices[J].Computer Engineering and Applications,2009,45(18):81-84. [4] 程琳.加强计算机数字取证研究 提高数字化犯罪侦查能力[J].中国人民公安大学学报(社会科学版),2012,28(6):1-5. CHENG L.Strengthening computer digital forensics research to improve digital crime investigation capabilities[J].Journal of Chinese People’s Public Security University(Social Science Edition),2012,28(6):1-5. [5] 丁丽萍,岳晓萌,李彦峰.移动数字取证技术[J].中兴通讯技术,2015,21(3):30-33. DING L P,YUE X M,LI Y F.Mobile digital forensics technology[J].ZTE Technology,2015,21(3):30-33. [6] 张笑鲁.Android移动设备的数字取证关键问题研究[D].吉林:吉林大学,2016. ZHANG X L.Research on key issues in digital forensics of Android mobile devices[D].Jilin:Jilin University,2016. [7] 黄泽民.面向Android手机的数字取证系统设计与实现[D].厦门:厦门大学,2018. HUANG Z M.Design and implementation of digital forensics system for Android phones[D].Xiamen:Xiamen University,2018. [8] 苏芊.iOS终端数字取证研究[D].上海:上海交通大学,2013. SU Q.Research on iOS terminal digital forensics[D].Shanghai:Shanghai Jiaotong University,2013. [9] 许正达.iOS平台数字取证系统的设计与实现[D].厦门:厦门大学,2018. XU Z D.Design and implementation of digital forensics system on iOS platform[D].Xiamen:Xiamen University,2018. [10] 李萌,司成祥,祝烈煌.基于区块链的安全车联网数字取证系统[J].物联网学报,2020,4(2):49-57. LI M,SI C X,ZHU L H.Blockchain-based digital forensics system for secure Internet of Vehicles[J].Journal of the Internet of Things,2020,4(2):49-57. [11] WANG Y,CANNADY J,ROSENBLUTH J.Foundations of computer forensics:a technology for the fight against computer crime[J].Computer Law & Security Report,2005,21(2):119-127. [12] KENT K.Guide to integrating forensic techniques into incident response:recommendations of the National Institute of Standards and Technology[S].2006. [13] JOSEPH D P,NORMAN J.An analysis of digital forensics in cyber security[C]//First International Conference on Artificial Intelligence and Cognitive Computing.Singapore:Springer,2019:701-708. [14] PATEL J.Forensic investigation life cycle(FILC) using 6'R' policy for digital evidence collection and legal prosecution[J].International Journal of Emerging Trends & Technology in Computer Science,2013,2(1):129-132. [15] COSIC J,COSIC Z.Chain of custody and life cycle of digital evidence[J].Computer Technology & Application,2012,3(2):126-129. [16] CHERNYSHEV M,ZEADALLY S,BAIG Z,et al.Internet of Things forensics:the need,process models,and open issues[J].IT Professional,2018,20(3):40-49. [17] WATSON S,DEHGHANTANHA A.Digital forensics:the missing piece of the Internet of Things promise[J].Computer Fraud & Security,2016,2016(6):5-8. [18] National Institute of Justice(US).Technical Working Group for Electronic Crime Scene Investigation.Electronic crime scene investigation:a guide for first responders[R].US Department of Justice,Office of Justice Programs,National Institute of Justice,2001. [19] NIETO A,ROAMN R,LOPEZ J.Digital witness:safeguarding digital evidence by using secure architectures in personal devices[J].IEEE Network,2016,30(6):34-41. [20] CONTI M,DEHGHANTANHA A,FRANKE K,et al.Internet of Things security and forensics:challenges and opportunities[J].Future Generation Computer Systems,2018,78:544-546. [21] KARABIYIK U,AKKAYA K.Digital forensics for IoT and WSNS[M]//Mission-oriented sensor networks and systems:art and science.Cham:Springer,2019:171-207. [22] HOU J,QU L,SHI W.A survey on Internet of Things security from data perspectives[J].Computer Networks,2019,148(15):295-306. [23] MAKEMMISH R.When is digital evidence forensically sound?[C]//IFIP International Conference on Digital Forensics,2008:3-15. [24] AL-KUWARI S,WOLTHUSEN S D.On the feasibility of carrying out live real-time forensics for modern intelligent vehicles[C]//International Conference on Forensics in Telecommunications,Information,and Multimedia.Berlin,Heidelberg:Springer,2010:207-223. [25] WANG Y,LEE H C.Research on some relevant problems in computer forensics[C]//Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering,Hangzhou,China,2013:22-23. [26] ORIWOH E,JAZANI D,EPIPHANIOU G,et al.Internet of Things forensics:challenges and approaches[C]//2013 9th International Conference Conference on Collaborative Computing:Networking,Applications and Worksharing(Collaboratecom),Austin,TX,USA,2013:608-615. [27] QUICK D,CHOO K.Digital forensic intelligence:data subsets and open source intelligence(DFINT+OSINT):a timely and cohesive mix[J].Future Generation Computer Systems,2016,7(8):245-251. [28] WU S,ZHANG Y.Secure provenance for data forensics with efficient revocation of anonymous credentials in cloud computing[J].Wireless Personal Communications,2016,90(3):1-21. [29] GANTZ J,REINSEL D.The digital universe in 2020:big data,bigger digital shadows,and biggest growth in the far east[J].IDC iView:IDC Analyze the Future,2012(12):1-16. [30] TALLON-BALLESTEROS A J,RIQUELME J C.Data mining methods applied to a digital forensics task for supervised machine learning[M]//Computational intelligence in digital forensics:forensic investigation and applications.Cham:Springer,2014:413-428. [31] CHONG J,WU T,JIAN X,et al.A MapReduce-based distributed SVM ensemble for scalable image classification and annotation[J].Computers & Mathematics with Applications,2017,66(10):1920-1934. [32] TEING Y Y,DEHGHANTANHA A,CHOO K.CloudMe forensics:a case of big-data investigation[J].Concurrency and Computation:Practice and Experience,2018,30(5):4277-4284. [33] SINDHU K K.Digital forensics and cyber crime data mining[J].Journal of Information Security,2012,3(3):196-201. [34] HE J,CHANG C,PENG H,et al.Network forensics method based on evidence graph and vulnerability reasoning[J].Future Internet,2016,8(4):54-65. [35] 向继志.强化隐私保护技术与标准工作推进个人信息保护法治化进程——专访中国科学院院士冯登国[J].中国信息安全,2020(11):24-28. XIANG J Z.Strengthening privacy protection technology and standards to promote the legalization of personal information protection:an interview with Feng Dengguo,academician of the Chinese Academy of Sciences[J].China Information Security,2020(11):24-28. [36] CAHYANI N,MARTINI B,CHOO K.Using multimedia presentations to enhance the judiciary’s technical understanding of digital forensic concepts:an Indonesian case study[C]//Hawaii International Conference on System Sciences,2016. [37] CAHYANI N,MARTINI B,CHOO K,et al.An approach to enhance understanding of digital forensics technical terms in the presentation phase of a digital investigation using multimedia presentations[C]//International Conference on Security and Privacy in Communication Systems.Cham:Springer,2018:488-506. [38] RONDEAU C M,TEMPLE M A,LOPEZ J.Industrial IoT cross-layer forensic investigation[J].Wiley Interdisciplinary Reviews Forensic Science,2018,1(12):1-13. [39] ALHADRAMI Y,HUSSAIN F K.DDoS attacks in IoT networks:a comprehensive systematic literature review[J].World Wide Web,2021,24(3):971-1001. [40] QUICK D,CHOO K K R.IoT device forensics and data reduction[J].IEEE Access,2018:47566-47574. [41] KOLIAS C,KAMBOURAKIS G,STAVROU A,et al.DDoS in the IoT:Mirai and other botnets[J].Computer,2017,50(7):80-84. [42] DEOGIRIKAR J,VIDHATE A.Security attacks in IoT:a survey[C]//2017 International Conference on I-SMAC(IoT in Social,Mobile,Analytics and Cloud),2017:32-37. [43] ABDULGHANI H A,KONSTANTAS D,MAHYOUB M.A comprehensive IoT attacks survey based on a building-blocked reference model[J].International Journal of Advanced Computer Science and Applications,2018,9(3):355-373. [44] 王振东,张林,李大海.基于机器学习的物联网入侵检测系统综述[J].计算机工程与应用,2021,57(4):18-27. WANG Z D,ZHANG L,LI D H.Survey of intrusion detection systems for Internet of Things based on machine learning[J].Computer Engineering and Applications,2021,57(4):18-27. [45] NIETO A,RIOS R,LOPEZ J.Digital witness and privacy in IoT:anonymous witnessing approach[C]//Digital Witness and Privacy in IoT:Anonymous Witnessing Approach,2017:642-649. [46] NIETO A,RIOS R,LOPEZ J.IoT-forensics meets privacy:towards cooperative digital investigations[J].Sensors,2018,18(2):492-502. [47] YUSOFF Y,ISMAIL R,HASSAN Z.Common phases of computer forensics investigation models[J].International Journal of Computer Science & Information Technology,2011,3(1):17-31. [48] VLACHOPOULOS K,MAGKOS E,CHRISSIKOPOULOS V.A model for hybrid evidence investigation[J].International Journal of Digital Crime & Forensics,2012,4(4):47-62. [49] LEE I,SOKOLSKY O,CHEN S,et al.Challenges and research directions in medical cyber-physical systems[J].Proceedings of the IEEE,2011,100(1):75-90. [50] LI X,LU R,LIANG X,et al.Smart community:an Internet of Things application[J].IEEE Communications Magazine,2011,49(11):68-75. [51] KARABIYIK U.Building an intelligent assistant for digital forensics[D].The Florida State Universty,2015. [52] VAN B E,LIU V T.Digital evidence:challenging the presumption of reliability[J].Journal of Digital Forensic Practice,2006,1(1):19-26. [53] ZAWOAD S,HASAN R.FAIoT:towards building a forensics aware eco system for the Internet of Things[C]//IEEE International Conference on Services Computing,2015:279-284. [54] HARBAWI M,VAROL A,HARBAWI M,et al.An improved digital evidence acquisition model for the Internet of Things forensic I:a theoretical framework[C]//2017 5th International Symposium on Digital Forensic and Security(ISDFS),Tirgu Mures,Romania,2017:1-6. [55] PERUMAL S,NORWAWI N M,RAAN V.Internet of Things(IoT) digital forensic investigation model:top-down forensic approach methodology[C]//2015 Fifth International Conference on Digital Information Processing and Communications(ICDIPC),Sierre,Switzerland,2015:19-23. [56] KEBANDE V R,RAY I.A generic digital forensic investigation framework for Internet of Things(IoT)[C]//IEEE International Conference on Future Internet of Things & Cloud,2016:356-362. [57] International Organization for Standardization.Incident investigation principles and processes:ISO/IEC 27043[S]. 2015. [58] International Organization for Standardization.Guidelines for identification,collection,acquisition and preservation of digital evidence:ISO/IEC 27037[S].2012. [59] International Organization for Standardization.Hash-functions-Part 2:Hash-functions using an n-bit block cipher:ISO/IEC 10118-2[S].2010. [60] KEBANDE V R,MALAPANE S,KARIE N M,et al.Towards an integrated digital forensic investigation framework for an IoT-based ecosystem[C]//IEEE International Conference on Smart Internet of Things,2018:93-98. [61] CAVIGLIONE L,WENDZEL S,MAZURCZYK W.The future of digital forensics:challenges and the road ahead[J].IEEE Security & Privacy,2017,15(6):12-17. [62] KYEI K,ZAVARSKY P,LINDSKOG D,et al.A review and comparative study of digital forensic investigation models[C]//International Conference on Digital Forensics & Cyber Crime,2012:314-327. [63] International Organization for Standardization.Privacy framework:ISO/IEC 29100[S].2011. [64] NIETO A,RIOS R,LOPEZ J.A methodology for privacy-aware IoT-forensics[C]//2017 IEEE Trustcom/BigDataSE/ICESS,2017:626-633. [65] BANDAY M.Enhancing the security of IOT in forensics[C]//2017 International Conference on Computing and Communication Technologies for Smart Nation(IC3TSN),Gurgaon,India,2017:193-198. [66] ZIA T,LIU P,HAN W.Application-specific digital forensics investigative model in Internet of Things(IoT)[C]//International Conference on Availability,Reliability and Security,2017. [67] BABUN L,SIKDER A K,ACAR A,et al.A digital forensics framework for smart settings:poster[C]//Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks,Miami,FL,USA,2019:332-333. [68] BABUN L,SIKDER A K,ACAR A,et al.IoTDots:a digital forensics framework for smart environments[J].arXiv:1809.00745,2018. [69] KUMAR R,GUPTA K.Intelligent traffic management system[M].Singapore:Springer,2016. [70] MANIKONDA P,YERRAPRAGADA A K,ANNASAMUDRAM S S.Intelligent traffic management system[C]//2011 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology(STUDENT),Semenyih,Malaysia,2011:119-122. [71] ORIWOH E,SANT P.The forensics edge management system:a concept and design[C]//IEEE International Conference on Ubiquitous Intelligence & Computing & IEEE International Conference on Autonomic & Trusted Computing,2013:544-550. [72] HOSSAIN M M,FOTOUHI M,HASAN R.Towards an analysis of security issues,challenges,and open problems in the Internet of Things[C]//IEEE World Congress on Services,2015:21-28. [73] TEING Y Y,DEHGHANTANHA A,CHOO K K R,et al.Forensic investigation of P2P cloud storage services and backbone for IoT networks:BitTorrent Sync as a case study[J].Computers & Electrical Engineering,2016(9):25-32. [74] WATSON S,DEHGHANTANHA A.Digital forensics:the missing piece of the Internet of Things promise[J].Computer Fraud & Security,2016,2016(6):5-8. [75] MEHROUSH B.Enhancing the security of IOT in forensics[C]//2017 International Conference on Computing and Communication Technologies for Smart Nation(IC3TSN),Gurgaon,India,2017:193-198. [76] NIETO A,RIOS R,LOPEZ J.A methodology for privacy-aware IoT-forensics[C]//Trustcom/BigDatase/iCESS,2017. [77] ZIA T,LIU P,HAN W.Application-specific digital forensics investigative model in Internet of Things(IoT)[C]//International Conference on Availability,Reliability and Security,2017. [78] MEFFERT C,CLARK D,BAGGILI I,et al.Forensic state acquisition from Internet of Things(FSAIoT):a general framework and practical approach for IoT forensics through IoT device state acquisition[C]//12th International Conference on Availability,Reliability and Security,2017:223-241. [79] 刘铭.《刑事电子数据规定》侦查取证维度的分析[J].中国刑警学院学报,2017(2):5-10. LIU M.Analysis of the dimension of investigation and evidence collection in “Criminal electronic data regulations”[J].Journal of China Criminal Police Academy,2017(2):5-10. [80] MAXIM C,SHERALI Z,ZUBAIR B,et al.Internet of Things forensics:the need,process models,and open issues[J].IT Professional,2018,20(3):40-49. [81] ARSHED H,JANTAN A,ABIODUN O I.Digital forensics:review of issues in scientific validation of digital evidence[J].Journal of Information Processing Systems,2018,14(2):346-376. [82] MADINGER D.User-friendly interface for forensic analysis using raspberry pi[D].University of Colorado at Boulder,2018. [83] HOSSAIN M,KARIM Y,HASAN R.FIF-IoT:a forensic investigation framework for IoT using a public digital ledger[C]//2018 IEEE International Congress on Internet of Things(ICIOT),San Francisco,CA,USA,2018:33-40. [84] HONGMEI C,TEMILOLA A,BOBBY C G.A framework for IoT data acquisition and forensics analysis[C]//2018 IEEE International Conference on Big Data(Big Data),2018:5142-5146. [85] LE D P,MENG H,SU L,et al.BIFF:a blockchain-based IoT forensics framework with identity privacy[C]//TENCON 2018-2018 IEEE Region 10 Conference,2018:2372-2377. [86] RANDI R,IMAM R,YUDI P.Network forensics for detecting flooding attack on Internet of Things(IoT) device[C]//International Journal of Cyber-Security & Digital Forensics,2018:77-90. [87] HOSSAIN M,HASAN R,ZAWOAD S.Probe-IoT:a public digital ledger based forensic investigation framework for IoT[C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS),2018:425-438. [88] SAYAKKARA A,LE-KHAC N A,SCANLON M.Electromagnetic side-channel attacks:potential for progressing hindered digital forensic analysis[C]//European Conference on Object-oriented Programming & International Symposium on International Workshop on Speculative Side Channel Analysis,2018. [89] SNEHAL S,NITUL D,EMIL P.IoT forensic a digital investigation framework for IoT systems[C]//2018 10th International Conference on Electronics,Computers and Artificial Intelligence(ECAI),2018:1-4. [90] MACDERMOTT A,BAKER T,SHI Q.Iot forensics:challenges for the ioa era[C]//2018 9th IFIP International Conference on New Technologies,Mobility and Security(NTMS),2018. [91] SURBIRYALA J,RONG C.Secure customer data over cloud forensic reconstruction[C]//2018 IEEE International Conference on Consumer Electronics(ICCE),2018. [92] ZHANG X,CHOO K K R,BEEBE N L.How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform[J].IEEE Internet of Things Journal,2019:6850-6861. [93] FRANOIS B,GILLES G,THOMAS V.IoT Forensic:identification and classification of evidence in criminal investigations[C]//Proceedings of the 13th International Conference on Availability,Reliability and Security,2018:48-61. [94] GOKILA D,SHIVA H,IBRAHIM B.I know what you did last summer:your smart home Internet of Things and your iPhone forensically ratting you out[C]//Proceedings of the 13th International Conference on Availability,Reliability and Security,2018:147-161. [95] AL-SADI M B,CHEN L,HADDAD R J.Internet of Things digital forensic investigation using open source gears[C]//SoutheastCon,2018. [96] RANDI R,IMAM R,YUDI P.Network forensics for detecting flooding attack on Internet of Things(IoT) device[C]//International Journal of Cyber-Security & Digital Forensics,2018:77-90. [97] QUICK D,CHOO K K R.IoT device forensics and data reduction[J].IEEE Access,2018,6(2):47566-47574. [98] SERVIDA F,CASEY E.IoT forensic challenges and opportunities for digital traces[J].Digital Investigation,2019,28(2):22-29. [99] KORONIOTIS N,MOUSTAFA N,SITNIKOVA E.Forensics and deep learning mechanisms for botnets in Internet of Things:a survey of challenges and solutions[J].IEEE Access,2019,7:61764-61785. [100] YAQOOB I,HASHEM I A T,AHMED A,et al.Internet of Things forensics:recent advances,taxonomy,requirements,and open challenges[J].Future Generation Computer Systems,2019,92:265-275. [101] RIZAL R,HIKMATYAR M.Investigation Internet of Things(IoT) device using integrated digital forensics investigation framework(IDFIF)[J].Journal of Physics:Conference Series,2019,1179(1):12140-12146. [102] RYU J H,SHARMA P K,JO J H,et al.A blockchain-based decentralized efficient investigation framework for IoT digital forensics[J].The Journal of Supercomputing,2019,75(8):4372-4387. [103] LI S,QIN T,MIN G.Blockchain-based digital forensics investigation framework in the Internet of Things and social systems[J].IEEE Transactions on Computational Social Systems,2019,6(6):1433-1441. [104] LI S,LI S,CHOO K K R,et al.IoT forensics:Amazon echo as a use case[J].IEEE Internet of Things Journal,2019:6487-6497. [105] KRUGER J L,VENTER H.Requirements for IoT forensics[C]//2019 Conference on Next Generation Computing Applications(NextComp),Mauritius,2019:1-7. [106] JAYAKRISHNAN A R,VASANTHI V.Empirical survey on advances of network forensics in the emerging networks[J].International Journal of Cyber-Security & Digital Forensics,2018,7(1):38-46. [107] WU T,BREITINGER F,BAGGILI I.IoT Ignorance is digital forensics research bliss:a survey to understand IoT forensics definitions,challenges and future research directions[C]//14th International Conference on Availability,Reliability and Security,2019:1-15. [108] SAYAKKARA A,LE-KHAC N A,SCANLON M.A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics[J].Digital Investigation,2019,29:43-54. [109] SAYAKKARA A,LE-KHAC N A,SCANLON M.Leveraging electromagnetic side-channel analysis for the investigation of IoT devices[J].Digital Investigation,2019,29(5):94-103. [110] JO W,SHIN Y,KIM H,et al.Digital forensic practices and methodologies for AI speaker ecosystems[J].Digital Investigation,2019,29:80-93. [111] MOFFETT O.The digital forensics of Internet-of-Things devices[D].Utica College,2019. [112] DUAN H,ZHENG Y,WANG C,et al.Treasure collection on foggy islands:building secure network archives for Internet of Things[J].IEEE Internet of Things Journal,2019,6(2):2637-2650. [113] KORONIOTIS N,MOUSTAFA N,SITINIKOVA E.Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics:Bot-IoT dataset[J].Future Generation Computer Systems,2019:779-796. [114] KEBANDE V R,IKUESAN R A,KARIE N M,et al.Quantifying the need for supervised machine learning in conducting live forensic analysis of emergent configurations(ECO) in IoT environments[J].Forensic Science International Reports,2020,2:100-122. [115] ATLAM H F,HEMDAN E E D,ALENEZI A,et al.Internet of Things forensics:a review[J].Internet of Things,2020,11:348-359. [116] HOU J,LI Y,YU J,et al.A survey on digital forensics in Internet of Things[J].IEEE Internet of Things Journal,2020,7(1):1-15. [117] STOYANOVA M,NIKOLOUDAKIS Y,PANAGIOTAKIS S,et al.A survey on the Internet of Things(IoT) forensics:challenges,approaches and open issues[J].IEEE Communications Surveys & Tutorials,2020,22(2):1191-1221. [118] TORABI S,BOU-HARB E,ASSI C,et al.A scalable platform for enabling the forensic investigation of exploited IoT devices and their generated unsolicited activities[J].Digital Investigation,2020,32:248-262. [119] SINGH C G,PAL S V,MANINDER S.Cyber forensics framework for big data analytics in IoT environment using machine learning[J].Multimedia Tools and Applications,2020,79:15881-15900. [120] MALIK V R,GOBINATH K,KHADSARE S,et al.Security challenges in industry 4.0 SCADA systems-a digital forensic prospective[C]//2021 International Conference on Artificial Intelligence and Computer Science Technology(ICAICST),2021:229-233. [121] KEBANDE V R,MUDAU P,IKUESAN R A,et al.Holistic digital forensic readiness framework for IoT-enabled organizations[J].Forensicence International Reports,2020:100117-100131. [122] SAYAKKARA A,LE-KHAC N A,SCANLON M.Facilitating electromagnetic side-channel analysis for IoT investigation:evaluating the EMvidence framework[J].Forensicence International:Digital Investigation,2020,33:301003. [123] KANG S,KIM S,KIM J.Forensic analysis for IoT fitness trackers and its application[J].Peer-to-Peer Networking and Applications,2020,13(2):564-573. [124] NOURA H N,SALMAN O,CHEHAB A,et al.DistLog:a distributed logging scheme for IoT forensics[J].Ad Hoc Networks,2020,98:102061. [125] SCHEIDT N,ADDA M,CHATEAU L,et al.Forensic tools for IoT device investigations in regards to human trafficking[C]//2021 IEEE International Conference on Smart Internet of Things(SmartIoT),2021:1-7. [126] SHIN Y,KIM H,KIM S,et al.Certificate injection-based encrypted traffic forensics in AI speaker ecosystem[J].Forensic Science International:Digital Investigation,2020,33:301010. [127] SEYYAR M B,GERADTS Z J M H.Privacy impact assessment in large-scale digital forensic investigations[J].Forensic Science International Digital Investigation,2020:200906. [128] ARAFAT A.Digital forensics subdomains:the state of the art and future directions[J].IEEE Access,2021,9:152476-152502. [129] SAYAKKARA A P,LE-KHAC N A.Electromagnetic side-channel analysis for IoT forensics:challenges,framework,and datasets[J].IEEE Access,2021,9:113585-113598. [130] GEETANJALI S,PALLAVI K.IoT forensics:a review on current trends,approaches and foreseen challenges[C]//2021 8th International Conference on Computing for Sustainable Global Development(INDIACom),2021:909-913. [131] ALI M I,KAUR S,KHAMPARIA A,et al.Security challenges and cyber forensic ecosystem in IoT driven BYOD environment[J].IEEE Access,2020,8:172770-172782. [132] BOUCHAUD F,VANTROYS T,GRIMAUD G.Forensic analysis of IoT ecosystem[C]//2021 8th International Conference on Future Internet of Things and Cloud(FiCloud),2021:115-122. [133] ALI M I,KAUR S.The impact of india’s cyber security law and cyber forensic on building techno-centric smartcity IoT environment[C]//2021 International Conference on Computing,Communication,and Intelligent Systems(ICCCIS),2021:751-759. [134] WAEL A M,MAHMOUD F,SAAD M.An enhanced blockchain-based IoT digital forensics architecture using fuzzy hash[J] IEEE Access,2021,9:151327-151336. [135] LAKSHMINARAYANA S,EMMANUEL S P,et al.Ready-IoT:a novel forensic readiness model for Internet of Things[C]//2021 IEEE 7th World Forum on Internet of Things(WF-IoT),2021:89-94. [136] MOHAMMAD R A.Generic proactive IoT cybercrime evidence analysis model for digital forensics[C]//2021 International Conference on Information Technology(ICIT),2021:654-659. [137] MARYAM H,MOHSIN A.SeFACED:semantic-based forensic analysis and classification of E-mail data using deep learning[J].IEEE Access,2021,9:98398-98411. [138] DOHYUN K,YI P,JONG H P.A study on the digital forensic investigation method of clever malware in IoT devices[J].IEEE Access,2020,8:224487-224499. [139] GIUSEPPE P,DALEEP M.IoT innovations and forensic engineering in the digital age[J].IEEE Transactions on Industry Applications,2021,57(3):2098-2103. [140] CASTRO A,PEREZ-PONS A.Virtual assistant for forensics recovery of IoT devices[C]//2021 7th IEEE Intl Conference on Big Data Security on Cloud(BigData- Security),IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security(IDS),2021:186-190. |
[1] | 王梦婷, 王伟, 张强, 刘沫萌. 基于代理车辆的车载网络消息认证技术[J]. 计算机工程与应用, 2022, 58(5): 131-137. |
[2] | 刘发升, 孙起玄, 李江华. 融合双区块链的征信数据存储和查询方案[J]. 计算机工程与应用, 2022, 58(2): 123-128. |
[3] | 魏立斐,李梦思,张蕾,陈聪聪,陈玉娇,王勤. 基于安全两方计算的隐私保护线性回归算法[J]. 计算机工程与应用, 2021, 57(22): 139-146. |
[4] | 贺智明,徐亿达. 区块链与可搜索加密结合的电子病历共享方案[J]. 计算机工程与应用, 2021, 57(21): 140-147. |
[5] | 吕鑫,赵连成,余记远,谭彬,曾涛,陈娟. 基于轨迹聚类的连续查询隐私保护方法[J]. 计算机工程与应用, 2021, 57(2): 104-112. |
[6] | 谢裕清,王渊,江樱,杨苗,王永利. 便于数据共享的电网数据湖隐私保护方法[J]. 计算机工程与应用, 2021, 57(2): 113-118. |
[7] | 宋国超,初广辉,武绍欣. 基于区间区域的位置隐私保护方法[J]. 计算机工程与应用, 2020, 56(8): 66-73. |
[8] | 曾海燕,左开中,王永录,刘蕊. 路网环境下的语义多样性位置隐私保护方法[J]. 计算机工程与应用, 2020, 56(7): 102-108. |
[9] | 许斌,梁晓兵,沈博. 大数据环境中非交互式查询差分隐私保护模型[J]. 计算机工程与应用, 2020, 56(7): 116-121. |
[10] | 王杰,陈志刚,刘加玲,程宏兵. 基于聚类的云隐私行为挖掘技术[J]. 计算机工程与应用, 2020, 56(5): 80-84. |
[11] | 张思亮,凌捷,陈家辉. 可追踪的区块链账本隐私保护方案[J]. 计算机工程与应用, 2020, 56(23): 31-37. |
[12] | 杨婷,庞晓琼,陈文俊,王云婷,刘天野. 区块链环境下支持隐私保护的数字权限管理[J]. 计算机工程与应用, 2020, 56(23): 109-115. |
[13] | 李孟特,顾春华,温蜜. 基于区块链的充电交易数据安全存储平台设计[J]. 计算机工程与应用, 2020, 56(21): 79-84. |
[14] | 王佳贺,魏松杰,吴超. 差分隐私保护的Android应用流量行为混淆方法[J]. 计算机工程与应用, 2020, 56(2): 68-75. |
[15] | 朴杨鹤然,崔晓晖. 社交网络中用户隐私推理与保护研究综述[J]. 计算机工程与应用, 2020, 56(19): 1-12. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||