Computer Engineering and Applications ›› 2022, Vol. 58 ›› Issue (8): 12-32.DOI: 10.3778/j.issn.1002-8331.2201-0014

• Research Hotspots and Reviews • Previous Articles     Next Articles

Survey of IoT Forensics

LIANG Guangjun, XIN Jianfang, WANG Qun, NI Xueli, GUO Xiangmin, XIA Lingling   

  1. 1.Department of Computer Information and Cybersecurity, Jiangsu Police Institute, Nanjing 210031, China 
    2.National and Local Joint Engineering Laboratory of Radio Frequency Integration and Micro-assembly Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
    3.School of Intelligent Engineering, Nanjing Institute of Railway Technology, Nanjing 210031, China
    4.Jiangsu Engineering Research Center for Electronic Data Forensics and Analysis, Nanjing 210031, China 
    5.Key Laboratory of Digital Forensics, Public Security Department of Jiangsu Province, Nanjing 210031, China
  • Online:2022-04-15 Published:2022-04-15



  1. 1.江苏警官学院 计算机信息与网络安全系,南京 210031
    2.南京邮电大学 射频集成与微组装技术国家地方联合工程实验室,南京 210003
    3.南京铁道职业技术学院 智能工程学院,南京 210031
    4.江苏省电子数据取证分析工程研究中心,南京 210031
    5.江苏省公安厅 数字取证重点实验室,南京 210031

Abstract: The advent of the Internet of Things era brings great convenience to people, but it also makes the scope of cyberspace attacks wider and brings new cyberspace security threats. Massive IoT devices retain a wealth of digital traces, which can provide insight into people’s various behaviors at home and other places. This is of great significance for digital forensics. This article has an in-depth discussion on IoT forensics, starting with the rise, development and research status of IoT forensics, and further discusses digital forensics models, 1-2-3 regional method models, parallel structure-IoT forensics models, privacy protection forensics models, and forensic model for special applications. Finally, it elaborates on the opportunities and challenges of forensics in the Internet of Things. This article strives to provide readers with help and reference for more in-depth research on the basis of systematically learning IoT forensics technology.

Key words: IoT forensics, digital forensics, forensics model, privacy protection

摘要: 物联网时代的到来为人们带来极大的便利,但也使得网络攻击的范围更广,带来了新的网络空间安全威胁。海量的物联网设备保留了丰富的数字痕迹,可以洞悉人们在家中和其他场所的各种行为,这对于数字取证具有重要意义。针对物联网取证展开深入讨论,从物联网取证的兴起、发展和研究现状入手,进一步探讨数字取证模型、1-2-3区域方法模型、并行结构-物联网取证模型、隐私保护取证模型以及针对特殊应用的取证模型。探讨了物联网取证的机遇和挑战。力求为读者在系统学习物联网取证技术的基础上致力于更深入的研究提供帮助和借鉴。

关键词: 物联网取证, 数字取证, 取证模型, 隐私保护