Computer Engineering and Applications ›› 2022, Vol. 58 ›› Issue (8): 12-32.DOI: 10.3778/j.issn.1002-8331.2201-0014
• Research Hotspots and Reviews • Previous Articles Next Articles
LIANG Guangjun, XIN Jianfang, WANG Qun, NI Xueli, GUO Xiangmin, XIA Lingling
Online:
2022-04-15
Published:
2022-04-15
梁广俊,辛建芳,王群,倪雪莉,郭向民,夏玲玲
LIANG Guangjun, XIN Jianfang, WANG Qun, NI Xueli, GUO Xiangmin, XIA Lingling. Survey of IoT Forensics[J]. Computer Engineering and Applications, 2022, 58(8): 12-32.
梁广俊, 辛建芳, 王群, 倪雪莉, 郭向民, 夏玲玲. 物联网取证综述[J]. 计算机工程与应用, 2022, 58(8): 12-32.
Add to citation manager EndNote|Ris|BibTeX
URL: http://cea.ceaj.org/EN/10.3778/j.issn.1002-8331.2201-0014
[1] ZIA T,PENG L,HAN W.Application-specific digital forensics investigative model in Internet of Things(IoT)[C]//International Conference,Reggio Calabria,Italy,2017:1-7. [2] 杨伟,汪浩,万亚东,等.IETF 6TiSCH工业物联网研究综述:标准、关键技术与平台[J].计算机科学与探索,2020,14(3):361-376. YANG W,WANG H,WAN Y D,et al.Survey on IETF 6TiSCH industrial Internet of Things:standards,key technologies and platforms[J].Journal of Frontiers of Computer Science and Technology,2020,14(3):361-376. [3] 黄芹华,欧阳为民.手机及小型手持数字设备数字取证研究综述[J].计算机工程与应用,2009,45(18):81-84. HUANG Q H,OUYANG W M.A review of digital forensics research on mobile phones and small handheld digital devices[J].Computer Engineering and Applications,2009,45(18):81-84. [4] 程琳.加强计算机数字取证研究 提高数字化犯罪侦查能力[J].中国人民公安大学学报(社会科学版),2012,28(6):1-5. CHENG L.Strengthening computer digital forensics research to improve digital crime investigation capabilities[J].Journal of Chinese People’s Public Security University(Social Science Edition),2012,28(6):1-5. [5] 丁丽萍,岳晓萌,李彦峰.移动数字取证技术[J].中兴通讯技术,2015,21(3):30-33. DING L P,YUE X M,LI Y F.Mobile digital forensics technology[J].ZTE Technology,2015,21(3):30-33. [6] 张笑鲁.Android移动设备的数字取证关键问题研究[D].吉林:吉林大学,2016. ZHANG X L.Research on key issues in digital forensics of Android mobile devices[D].Jilin:Jilin University,2016. [7] 黄泽民.面向Android手机的数字取证系统设计与实现[D].厦门:厦门大学,2018. HUANG Z M.Design and implementation of digital forensics system for Android phones[D].Xiamen:Xiamen University,2018. [8] 苏芊.iOS终端数字取证研究[D].上海:上海交通大学,2013. SU Q.Research on iOS terminal digital forensics[D].Shanghai:Shanghai Jiaotong University,2013. [9] 许正达.iOS平台数字取证系统的设计与实现[D].厦门:厦门大学,2018. XU Z D.Design and implementation of digital forensics system on iOS platform[D].Xiamen:Xiamen University,2018. [10] 李萌,司成祥,祝烈煌.基于区块链的安全车联网数字取证系统[J].物联网学报,2020,4(2):49-57. LI M,SI C X,ZHU L H.Blockchain-based digital forensics system for secure Internet of Vehicles[J].Journal of the Internet of Things,2020,4(2):49-57. [11] WANG Y,CANNADY J,ROSENBLUTH J.Foundations of computer forensics:a technology for the fight against computer crime[J].Computer Law & Security Report,2005,21(2):119-127. [12] KENT K.Guide to integrating forensic techniques into incident response:recommendations of the National Institute of Standards and Technology[S].2006. [13] JOSEPH D P,NORMAN J.An analysis of digital forensics in cyber security[C]//First International Conference on Artificial Intelligence and Cognitive Computing.Singapore:Springer,2019:701-708. [14] PATEL J.Forensic investigation life cycle(FILC) using 6'R' policy for digital evidence collection and legal prosecution[J].International Journal of Emerging Trends & Technology in Computer Science,2013,2(1):129-132. [15] COSIC J,COSIC Z.Chain of custody and life cycle of digital evidence[J].Computer Technology & Application,2012,3(2):126-129. [16] CHERNYSHEV M,ZEADALLY S,BAIG Z,et al.Internet of Things forensics:the need,process models,and open issues[J].IT Professional,2018,20(3):40-49. [17] WATSON S,DEHGHANTANHA A.Digital forensics:the missing piece of the Internet of Things promise[J].Computer Fraud & Security,2016,2016(6):5-8. [18] National Institute of Justice(US).Technical Working Group for Electronic Crime Scene Investigation.Electronic crime scene investigation:a guide for first responders[R].US Department of Justice,Office of Justice Programs,National Institute of Justice,2001. [19] NIETO A,ROAMN R,LOPEZ J.Digital witness:safeguarding digital evidence by using secure architectures in personal devices[J].IEEE Network,2016,30(6):34-41. [20] CONTI M,DEHGHANTANHA A,FRANKE K,et al.Internet of Things security and forensics:challenges and opportunities[J].Future Generation Computer Systems,2018,78:544-546. [21] KARABIYIK U,AKKAYA K.Digital forensics for IoT and WSNS[M]//Mission-oriented sensor networks and systems:art and science.Cham:Springer,2019:171-207. [22] HOU J,QU L,SHI W.A survey on Internet of Things security from data perspectives[J].Computer Networks,2019,148(15):295-306. [23] MAKEMMISH R.When is digital evidence forensically sound?[C]//IFIP International Conference on Digital Forensics,2008:3-15. [24] AL-KUWARI S,WOLTHUSEN S D.On the feasibility of carrying out live real-time forensics for modern intelligent vehicles[C]//International Conference on Forensics in Telecommunications,Information,and Multimedia.Berlin,Heidelberg:Springer,2010:207-223. [25] WANG Y,LEE H C.Research on some relevant problems in computer forensics[C]//Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering,Hangzhou,China,2013:22-23. [26] ORIWOH E,JAZANI D,EPIPHANIOU G,et al.Internet of Things forensics:challenges and approaches[C]//2013 9th International Conference Conference on Collaborative Computing:Networking,Applications and Worksharing(Collaboratecom),Austin,TX,USA,2013:608-615. [27] QUICK D,CHOO K.Digital forensic intelligence:data subsets and open source intelligence(DFINT+OSINT):a timely and cohesive mix[J].Future Generation Computer Systems,2016,7(8):245-251. [28] WU S,ZHANG Y.Secure provenance for data forensics with efficient revocation of anonymous credentials in cloud computing[J].Wireless Personal Communications,2016,90(3):1-21. [29] GANTZ J,REINSEL D.The digital universe in 2020:big data,bigger digital shadows,and biggest growth in the far east[J].IDC iView:IDC Analyze the Future,2012(12):1-16. [30] TALLON-BALLESTEROS A J,RIQUELME J C.Data mining methods applied to a digital forensics task for supervised machine learning[M]//Computational intelligence in digital forensics:forensic investigation and applications.Cham:Springer,2014:413-428. [31] CHONG J,WU T,JIAN X,et al.A MapReduce-based distributed SVM ensemble for scalable image classification and annotation[J].Computers & Mathematics with Applications,2017,66(10):1920-1934. [32] TEING Y Y,DEHGHANTANHA A,CHOO K.CloudMe forensics:a case of big-data investigation[J].Concurrency and Computation:Practice and Experience,2018,30(5):4277-4284. [33] SINDHU K K.Digital forensics and cyber crime data mining[J].Journal of Information Security,2012,3(3):196-201. [34] HE J,CHANG C,PENG H,et al.Network forensics method based on evidence graph and vulnerability reasoning[J].Future Internet,2016,8(4):54-65. [35] 向继志.强化隐私保护技术与标准工作推进个人信息保护法治化进程——专访中国科学院院士冯登国[J].中国信息安全,2020(11):24-28. XIANG J Z.Strengthening privacy protection technology and standards to promote the legalization of personal information protection:an interview with Feng Dengguo,academician of the Chinese Academy of Sciences[J].China Information Security,2020(11):24-28. [36] CAHYANI N,MARTINI B,CHOO K.Using multimedia presentations to enhance the judiciary’s technical understanding of digital forensic concepts:an Indonesian case study[C]//Hawaii International Conference on System Sciences,2016. [37] CAHYANI N,MARTINI B,CHOO K,et al.An approach to enhance understanding of digital forensics technical terms in the presentation phase of a digital investigation using multimedia presentations[C]//International Conference on Security and Privacy in Communication Systems.Cham:Springer,2018:488-506. [38] RONDEAU C M,TEMPLE M A,LOPEZ J.Industrial IoT cross-layer forensic investigation[J].Wiley Interdisciplinary Reviews Forensic Science,2018,1(12):1-13. [39] ALHADRAMI Y,HUSSAIN F K.DDoS attacks in IoT networks:a comprehensive systematic literature review[J].World Wide Web,2021,24(3):971-1001. [40] QUICK D,CHOO K K R.IoT device forensics and data reduction[J].IEEE Access,2018:47566-47574. [41] KOLIAS C,KAMBOURAKIS G,STAVROU A,et al.DDoS in the IoT:Mirai and other botnets[J].Computer,2017,50(7):80-84. [42] DEOGIRIKAR J,VIDHATE A.Security attacks in IoT:a survey[C]//2017 International Conference on I-SMAC(IoT in Social,Mobile,Analytics and Cloud),2017:32-37. [43] ABDULGHANI H A,KONSTANTAS D,MAHYOUB M.A comprehensive IoT attacks survey based on a building-blocked reference model[J].International Journal of Advanced Computer Science and Applications,2018,9(3):355-373. [44] 王振东,张林,李大海.基于机器学习的物联网入侵检测系统综述[J].计算机工程与应用,2021,57(4):18-27. WANG Z D,ZHANG L,LI D H.Survey of intrusion detection systems for Internet of Things based on machine learning[J].Computer Engineering and Applications,2021,57(4):18-27. [45] NIETO A,RIOS R,LOPEZ J.Digital witness and privacy in IoT:anonymous witnessing approach[C]//Digital Witness and Privacy in IoT:Anonymous Witnessing Approach,2017:642-649. [46] NIETO A,RIOS R,LOPEZ J.IoT-forensics meets privacy:towards cooperative digital investigations[J].Sensors,2018,18(2):492-502. [47] YUSOFF Y,ISMAIL R,HASSAN Z.Common phases of computer forensics investigation models[J].International Journal of Computer Science & Information Technology,2011,3(1):17-31. [48] VLACHOPOULOS K,MAGKOS E,CHRISSIKOPOULOS V.A model for hybrid evidence investigation[J].International Journal of Digital Crime & Forensics,2012,4(4):47-62. [49] LEE I,SOKOLSKY O,CHEN S,et al.Challenges and research directions in medical cyber-physical systems[J].Proceedings of the IEEE,2011,100(1):75-90. [50] LI X,LU R,LIANG X,et al.Smart community:an Internet of Things application[J].IEEE Communications Magazine,2011,49(11):68-75. [51] KARABIYIK U.Building an intelligent assistant for digital forensics[D].The Florida State Universty,2015. [52] VAN B E,LIU V T.Digital evidence:challenging the presumption of reliability[J].Journal of Digital Forensic Practice,2006,1(1):19-26. [53] ZAWOAD S,HASAN R.FAIoT:towards building a forensics aware eco system for the Internet of Things[C]//IEEE International Conference on Services Computing,2015:279-284. [54] HARBAWI M,VAROL A,HARBAWI M,et al.An improved digital evidence acquisition model for the Internet of Things forensic I:a theoretical framework[C]//2017 5th International Symposium on Digital Forensic and Security(ISDFS),Tirgu Mures,Romania,2017:1-6. [55] PERUMAL S,NORWAWI N M,RAAN V.Internet of Things(IoT) digital forensic investigation model:top-down forensic approach methodology[C]//2015 Fifth International Conference on Digital Information Processing and Communications(ICDIPC),Sierre,Switzerland,2015:19-23. [56] KEBANDE V R,RAY I.A generic digital forensic investigation framework for Internet of Things(IoT)[C]//IEEE International Conference on Future Internet of Things & Cloud,2016:356-362. [57] International Organization for Standardization.Incident investigation principles and processes:ISO/IEC 27043[S]. 2015. [58] International Organization for Standardization.Guidelines for identification,collection,acquisition and preservation of digital evidence:ISO/IEC 27037[S].2012. [59] International Organization for Standardization.Hash-functions-Part 2:Hash-functions using an n-bit block cipher:ISO/IEC 10118-2[S].2010. [60] KEBANDE V R,MALAPANE S,KARIE N M,et al.Towards an integrated digital forensic investigation framework for an IoT-based ecosystem[C]//IEEE International Conference on Smart Internet of Things,2018:93-98. [61] CAVIGLIONE L,WENDZEL S,MAZURCZYK W.The future of digital forensics:challenges and the road ahead[J].IEEE Security & Privacy,2017,15(6):12-17. [62] KYEI K,ZAVARSKY P,LINDSKOG D,et al.A review and comparative study of digital forensic investigation models[C]//International Conference on Digital Forensics & Cyber Crime,2012:314-327. [63] International Organization for Standardization.Privacy framework:ISO/IEC 29100[S].2011. [64] NIETO A,RIOS R,LOPEZ J.A methodology for privacy-aware IoT-forensics[C]//2017 IEEE Trustcom/BigDataSE/ICESS,2017:626-633. [65] BANDAY M.Enhancing the security of IOT in forensics[C]//2017 International Conference on Computing and Communication Technologies for Smart Nation(IC3TSN),Gurgaon,India,2017:193-198. [66] ZIA T,LIU P,HAN W.Application-specific digital forensics investigative model in Internet of Things(IoT)[C]//International Conference on Availability,Reliability and Security,2017. [67] BABUN L,SIKDER A K,ACAR A,et al.A digital forensics framework for smart settings:poster[C]//Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks,Miami,FL,USA,2019:332-333. [68] BABUN L,SIKDER A K,ACAR A,et al.IoTDots:a digital forensics framework for smart environments[J].arXiv:1809.00745,2018. [69] KUMAR R,GUPTA K.Intelligent traffic management system[M].Singapore:Springer,2016. [70] MANIKONDA P,YERRAPRAGADA A K,ANNASAMUDRAM S S.Intelligent traffic management system[C]//2011 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology(STUDENT),Semenyih,Malaysia,2011:119-122. [71] ORIWOH E,SANT P.The forensics edge management system:a concept and design[C]//IEEE International Conference on Ubiquitous Intelligence & Computing & IEEE International Conference on Autonomic & Trusted Computing,2013:544-550. [72] HOSSAIN M M,FOTOUHI M,HASAN R.Towards an analysis of security issues,challenges,and open problems in the Internet of Things[C]//IEEE World Congress on Services,2015:21-28. [73] TEING Y Y,DEHGHANTANHA A,CHOO K K R,et al.Forensic investigation of P2P cloud storage services and backbone for IoT networks:BitTorrent Sync as a case study[J].Computers & Electrical Engineering,2016(9):25-32. [74] WATSON S,DEHGHANTANHA A.Digital forensics:the missing piece of the Internet of Things promise[J].Computer Fraud & Security,2016,2016(6):5-8. [75] MEHROUSH B.Enhancing the security of IOT in forensics[C]//2017 International Conference on Computing and Communication Technologies for Smart Nation(IC3TSN),Gurgaon,India,2017:193-198. [76] NIETO A,RIOS R,LOPEZ J.A methodology for privacy-aware IoT-forensics[C]//Trustcom/BigDatase/iCESS,2017. [77] ZIA T,LIU P,HAN W.Application-specific digital forensics investigative model in Internet of Things(IoT)[C]//International Conference on Availability,Reliability and Security,2017. [78] MEFFERT C,CLARK D,BAGGILI I,et al.Forensic state acquisition from Internet of Things(FSAIoT):a general framework and practical approach for IoT forensics through IoT device state acquisition[C]//12th International Conference on Availability,Reliability and Security,2017:223-241. [79] 刘铭.《刑事电子数据规定》侦查取证维度的分析[J].中国刑警学院学报,2017(2):5-10. LIU M.Analysis of the dimension of investigation and evidence collection in “Criminal electronic data regulations”[J].Journal of China Criminal Police Academy,2017(2):5-10. [80] MAXIM C,SHERALI Z,ZUBAIR B,et al.Internet of Things forensics:the need,process models,and open issues[J].IT Professional,2018,20(3):40-49. [81] ARSHED H,JANTAN A,ABIODUN O I.Digital forensics:review of issues in scientific validation of digital evidence[J].Journal of Information Processing Systems,2018,14(2):346-376. [82] MADINGER D.User-friendly interface for forensic analysis using raspberry pi[D].University of Colorado at Boulder,2018. [83] HOSSAIN M,KARIM Y,HASAN R.FIF-IoT:a forensic investigation framework for IoT using a public digital ledger[C]//2018 IEEE International Congress on Internet of Things(ICIOT),San Francisco,CA,USA,2018:33-40. [84] HONGMEI C,TEMILOLA A,BOBBY C G.A framework for IoT data acquisition and forensics analysis[C]//2018 IEEE International Conference on Big Data(Big Data),2018:5142-5146. [85] LE D P,MENG H,SU L,et al.BIFF:a blockchain-based IoT forensics framework with identity privacy[C]//TENCON 2018-2018 IEEE Region 10 Conference,2018:2372-2377. [86] RANDI R,IMAM R,YUDI P.Network forensics for detecting flooding attack on Internet of Things(IoT) device[C]//International Journal of Cyber-Security & Digital Forensics,2018:77-90. [87] HOSSAIN M,HASAN R,ZAWOAD S.Probe-IoT:a public digital ledger based forensic investigation framework for IoT[C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS),2018:425-438. [88] SAYAKKARA A,LE-KHAC N A,SCANLON M.Electromagnetic side-channel attacks:potential for progressing hindered digital forensic analysis[C]//European Conference on Object-oriented Programming & International Symposium on International Workshop on Speculative Side Channel Analysis,2018. [89] SNEHAL S,NITUL D,EMIL P.IoT forensic a digital investigation framework for IoT systems[C]//2018 10th International Conference on Electronics,Computers and Artificial Intelligence(ECAI),2018:1-4. [90] MACDERMOTT A,BAKER T,SHI Q.Iot forensics:challenges for the ioa era[C]//2018 9th IFIP International Conference on New Technologies,Mobility and Security(NTMS),2018. [91] SURBIRYALA J,RONG C.Secure customer data over cloud forensic reconstruction[C]//2018 IEEE International Conference on Consumer Electronics(ICCE),2018. [92] ZHANG X,CHOO K K R,BEEBE N L.How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform[J].IEEE Internet of Things Journal,2019:6850-6861. [93] FRANOIS B,GILLES G,THOMAS V.IoT Forensic:identification and classification of evidence in criminal investigations[C]//Proceedings of the 13th International Conference on Availability,Reliability and Security,2018:48-61. [94] GOKILA D,SHIVA H,IBRAHIM B.I know what you did last summer:your smart home Internet of Things and your iPhone forensically ratting you out[C]//Proceedings of the 13th International Conference on Availability,Reliability and Security,2018:147-161. [95] AL-SADI M B,CHEN L,HADDAD R J.Internet of Things digital forensic investigation using open source gears[C]//SoutheastCon,2018. [96] RANDI R,IMAM R,YUDI P.Network forensics for detecting flooding attack on Internet of Things(IoT) device[C]//International Journal of Cyber-Security & Digital Forensics,2018:77-90. [97] QUICK D,CHOO K K R.IoT device forensics and data reduction[J].IEEE Access,2018,6(2):47566-47574. [98] SERVIDA F,CASEY E.IoT forensic challenges and opportunities for digital traces[J].Digital Investigation,2019,28(2):22-29. [99] KORONIOTIS N,MOUSTAFA N,SITNIKOVA E.Forensics and deep learning mechanisms for botnets in Internet of Things:a survey of challenges and solutions[J].IEEE Access,2019,7:61764-61785. [100] YAQOOB I,HASHEM I A T,AHMED A,et al.Internet of Things forensics:recent advances,taxonomy,requirements,and open challenges[J].Future Generation Computer Systems,2019,92:265-275. [101] RIZAL R,HIKMATYAR M.Investigation Internet of Things(IoT) device using integrated digital forensics investigation framework(IDFIF)[J].Journal of Physics:Conference Series,2019,1179(1):12140-12146. [102] RYU J H,SHARMA P K,JO J H,et al.A blockchain-based decentralized efficient investigation framework for IoT digital forensics[J].The Journal of Supercomputing,2019,75(8):4372-4387. [103] LI S,QIN T,MIN G.Blockchain-based digital forensics investigation framework in the Internet of Things and social systems[J].IEEE Transactions on Computational Social Systems,2019,6(6):1433-1441. [104] LI S,LI S,CHOO K K R,et al.IoT forensics:Amazon echo as a use case[J].IEEE Internet of Things Journal,2019:6487-6497. [105] KRUGER J L,VENTER H.Requirements for IoT forensics[C]//2019 Conference on Next Generation Computing Applications(NextComp),Mauritius,2019:1-7. [106] JAYAKRISHNAN A R,VASANTHI V.Empirical survey on advances of network forensics in the emerging networks[J].International Journal of Cyber-Security & Digital Forensics,2018,7(1):38-46. [107] WU T,BREITINGER F,BAGGILI I.IoT Ignorance is digital forensics research bliss:a survey to understand IoT forensics definitions,challenges and future research directions[C]//14th International Conference on Availability,Reliability and Security,2019:1-15. [108] SAYAKKARA A,LE-KHAC N A,SCANLON M.A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics[J].Digital Investigation,2019,29:43-54. [109] SAYAKKARA A,LE-KHAC N A,SCANLON M.Leveraging electromagnetic side-channel analysis for the investigation of IoT devices[J].Digital Investigation,2019,29(5):94-103. [110] JO W,SHIN Y,KIM H,et al.Digital forensic practices and methodologies for AI speaker ecosystems[J].Digital Investigation,2019,29:80-93. [111] MOFFETT O.The digital forensics of Internet-of-Things devices[D].Utica College,2019. [112] DUAN H,ZHENG Y,WANG C,et al.Treasure collection on foggy islands:building secure network archives for Internet of Things[J].IEEE Internet of Things Journal,2019,6(2):2637-2650. [113] KORONIOTIS N,MOUSTAFA N,SITINIKOVA E.Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics:Bot-IoT dataset[J].Future Generation Computer Systems,2019:779-796. [114] KEBANDE V R,IKUESAN R A,KARIE N M,et al.Quantifying the need for supervised machine learning in conducting live forensic analysis of emergent configurations(ECO) in IoT environments[J].Forensic Science International Reports,2020,2:100-122. [115] ATLAM H F,HEMDAN E E D,ALENEZI A,et al.Internet of Things forensics:a review[J].Internet of Things,2020,11:348-359. [116] HOU J,LI Y,YU J,et al.A survey on digital forensics in Internet of Things[J].IEEE Internet of Things Journal,2020,7(1):1-15. [117] STOYANOVA M,NIKOLOUDAKIS Y,PANAGIOTAKIS S,et al.A survey on the Internet of Things(IoT) forensics:challenges,approaches and open issues[J].IEEE Communications Surveys & Tutorials,2020,22(2):1191-1221. [118] TORABI S,BOU-HARB E,ASSI C,et al.A scalable platform for enabling the forensic investigation of exploited IoT devices and their generated unsolicited activities[J].Digital Investigation,2020,32:248-262. [119] SINGH C G,PAL S V,MANINDER S.Cyber forensics framework for big data analytics in IoT environment using machine learning[J].Multimedia Tools and Applications,2020,79:15881-15900. [120] MALIK V R,GOBINATH K,KHADSARE S,et al.Security challenges in industry 4.0 SCADA systems-a digital forensic prospective[C]//2021 International Conference on Artificial Intelligence and Computer Science Technology(ICAICST),2021:229-233. [121] KEBANDE V R,MUDAU P,IKUESAN R A,et al.Holistic digital forensic readiness framework for IoT-enabled organizations[J].Forensicence International Reports,2020:100117-100131. [122] SAYAKKARA A,LE-KHAC N A,SCANLON M.Facilitating electromagnetic side-channel analysis for IoT investigation:evaluating the EMvidence framework[J].Forensicence International:Digital Investigation,2020,33:301003. [123] KANG S,KIM S,KIM J.Forensic analysis for IoT fitness trackers and its application[J].Peer-to-Peer Networking and Applications,2020,13(2):564-573. [124] NOURA H N,SALMAN O,CHEHAB A,et al.DistLog:a distributed logging scheme for IoT forensics[J].Ad Hoc Networks,2020,98:102061. [125] SCHEIDT N,ADDA M,CHATEAU L,et al.Forensic tools for IoT device investigations in regards to human trafficking[C]//2021 IEEE International Conference on Smart Internet of Things(SmartIoT),2021:1-7. [126] SHIN Y,KIM H,KIM S,et al.Certificate injection-based encrypted traffic forensics in AI speaker ecosystem[J].Forensic Science International:Digital Investigation,2020,33:301010. [127] SEYYAR M B,GERADTS Z J M H.Privacy impact assessment in large-scale digital forensic investigations[J].Forensic Science International Digital Investigation,2020:200906. [128] ARAFAT A.Digital forensics subdomains:the state of the art and future directions[J].IEEE Access,2021,9:152476-152502. [129] SAYAKKARA A P,LE-KHAC N A.Electromagnetic side-channel analysis for IoT forensics:challenges,framework,and datasets[J].IEEE Access,2021,9:113585-113598. [130] GEETANJALI S,PALLAVI K.IoT forensics:a review on current trends,approaches and foreseen challenges[C]//2021 8th International Conference on Computing for Sustainable Global Development(INDIACom),2021:909-913. [131] ALI M I,KAUR S,KHAMPARIA A,et al.Security challenges and cyber forensic ecosystem in IoT driven BYOD environment[J].IEEE Access,2020,8:172770-172782. [132] BOUCHAUD F,VANTROYS T,GRIMAUD G.Forensic analysis of IoT ecosystem[C]//2021 8th International Conference on Future Internet of Things and Cloud(FiCloud),2021:115-122. [133] ALI M I,KAUR S.The impact of india’s cyber security law and cyber forensic on building techno-centric smartcity IoT environment[C]//2021 International Conference on Computing,Communication,and Intelligent Systems(ICCCIS),2021:751-759. [134] WAEL A M,MAHMOUD F,SAAD M.An enhanced blockchain-based IoT digital forensics architecture using fuzzy hash[J] IEEE Access,2021,9:151327-151336. [135] LAKSHMINARAYANA S,EMMANUEL S P,et al.Ready-IoT:a novel forensic readiness model for Internet of Things[C]//2021 IEEE 7th World Forum on Internet of Things(WF-IoT),2021:89-94. [136] MOHAMMAD R A.Generic proactive IoT cybercrime evidence analysis model for digital forensics[C]//2021 International Conference on Information Technology(ICIT),2021:654-659. [137] MARYAM H,MOHSIN A.SeFACED:semantic-based forensic analysis and classification of E-mail data using deep learning[J].IEEE Access,2021,9:98398-98411. [138] DOHYUN K,YI P,JONG H P.A study on the digital forensic investigation method of clever malware in IoT devices[J].IEEE Access,2020,8:224487-224499. [139] GIUSEPPE P,DALEEP M.IoT innovations and forensic engineering in the digital age[J].IEEE Transactions on Industry Applications,2021,57(3):2098-2103. [140] CASTRO A,PEREZ-PONS A.Virtual assistant for forensics recovery of IoT devices[C]//2021 7th IEEE Intl Conference on Big Data Security on Cloud(BigData- Security),IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security(IDS),2021:186-190. |
[1] | WANG Mengting, WANG Wei, ZHANG Qiang, LIU Momeng. Vehicular Network Message Authentication Technology Based on Proxy Vehicle [J]. Computer Engineering and Applications, 2022, 58(5): 131-137. |
[2] | LIU Fasheng, SUN Qixuan, LI Jianghua. Fusion of Double Block Chain Credit Data Storage and Query Scheme [J]. Computer Engineering and Applications, 2022, 58(2): 123-128. |
[3] | NI Xueli, LIANG Guangjun. Recovery Method of WeChat Revoking Message Based on Dynamic Memory Analysis [J]. Computer Engineering and Applications, 2021, 57(23): 146-153. |
[4] | WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin. Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation [J]. Computer Engineering and Applications, 2021, 57(22): 139-146. |
[5] | HE Zhiming, XU Yida. Electronic Medical Record Sharing Scheme Based on Blockchain and Searchable Encryption [J]. Computer Engineering and Applications, 2021, 57(21): 140-147. |
[6] | LYU Xin, ZHAO Liancheng, YU Jiyuan, TAN Bin, ZENG Tao, CHEN Juan. Trajectory-Clustering Based Privacy Protection Method for Continuous Query in LBS [J]. Computer Engineering and Applications, 2021, 57(2): 104-112. |
[7] | XIE Yuqing, WANG Yuan, JIANG Ying, YANG Miao, WANG Yongli. Privacy Protection Method Facilitating Data Sharing for Grid Manufacturing Data Lake [J]. Computer Engineering and Applications, 2021, 57(2): 113-118. |
[8] | SONG Guochao, CHU Guanghui, WU Shaoxin. Location Privacy Protection Approach Based on Interval Region [J]. Computer Engineering and Applications, 2020, 56(8): 66-73. |
[9] | ZENG Haiyan, ZUO Kaizhong, WANG Yonglu, LIU Rui. Semantic Diversity Location Privacy Protection Method in Road Network Environment [J]. Computer Engineering and Applications, 2020, 56(7): 102-108. |
[10] | XU Bin, LIANG Xiaobing, SHEN Bo. Non-interactive Queries Differential Privacy Protection Model in Big Data Environment [J]. Computer Engineering and Applications, 2020, 56(7): 116-121. |
[11] | ZHANG Siliang, LING Jie, CHEN Jiahui. Traceable Blockchain Ledger Privacy Protection Scheme [J]. Computer Engineering and Applications, 2020, 56(23): 31-37. |
[12] | YANG Ting, PANG Xiaoqiong, CHEN Wenjun, WANG Yunting, LIU Tianye. Digital Rights Management Supporting Privacy Protection in Blockchain Environment [J]. Computer Engineering and Applications, 2020, 56(23): 109-115. |
[13] | WANG Jiahe, WEI Songjie, WU Chao. Android Apps Traffic Behavior Obfuscation Method Based on Differential Privacy Protection [J]. Computer Engineering and Applications, 2020, 56(2): 68-75. |
[14] | PIAO Yangheran, CUI Xiaohui. Review on User Privacy Inference and Protection in Social Networks [J]. Computer Engineering and Applications, 2020, 56(19): 1-12. |
[15] | MA Yuanyuan, LIU Zhoubin, WANG Zixiang. Research on Heterogeneous Terminal Security Access Technology in Edge Computing Scenario [J]. Computer Engineering and Applications, 2020, 56(17): 115-120. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||