Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Article . 2023
License: CC BY NC
Data sources: ZENODO
ZENODO
Article . 2023
License: CC BY NC
Data sources: Datacite
ZENODO
Article . 2023
License: CC BY NC
Data sources: Datacite
versions View all 2 versions
addClaim

Tackling the Security Challenges of IoT using Forensic Perspective

Authors: Karlapalem Sujitha; A. Mounika Rajeswari;

Tackling the Security Challenges of IoT using Forensic Perspective

Abstract

From home automation to business control systems, the Internet of Things (IoT) has transformed how we interact with the environment. But as the quantity of IoT devices increases, so do the forensic and security concerns. The problems and prospects in IoT security and forensics are briefly discussed in this paper. The first issue is that IoT devices lack security, leaving them open to threats like denial-of-service attacks, data theft, and hacking. This is brought on by the lack of a uniform security protocol for IoT devices. The lack of forensic tools and methods to look into crimes involving IoT is the second problem. The third difficulty is gathering and analysing massive amounts of data produced by IoT devices. The paper also discusses ways to address these issues, including the creation of a standardised security protocol for IoT devices, advancements in forensic methods and tools for the investigation of crimes involving IoT, and the use of AI and machine learning to process and interpret massive amounts of IoT data. The report also looks at the part stakeholders play in assuring IoT security and forensics, including manufacturers, regulators, and end users. This paper's conclusion emphasises the urgent need for forensic and IoT security solutions to resolve the issues brought on by the vulnerabilities of IoT devices. The possibilities discussed in this paper offer stakeholders a road map for taking proactive steps in safeguarding IoT devices and looking into IoT-related crimes.

Keywords

Digital Forensic, Internet of Things, Cyber Security

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average