Internet of Things security and forensics: Challenges and opportunities
The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution, openness and relatively high processing power of IoT objects made them an ideal target for cyber attacks. Moreover, as many of IoT nodes are...
Saved in:
Published in: | Future generation computer systems Vol. 78; pp. 544 - 546 |
---|---|
Main Authors: | , , , |
Format: | Journal Article |
Language: | English |
Published: |
Elsevier B.V
01-01-2018
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution, openness and relatively high processing power of IoT objects made them an ideal target for cyber attacks. Moreover, as many of IoT nodes are collecting and processing private information, they are becoming a goldmine of data for malicious actors. Therefore, security and specifically the ability to detect compromised nodes, together with collecting and preserving evidences of an attack or malicious activities emerge as a priority in successful deployment of IoT networks. In this paper, we first introduce existing major security and forensics challenges within IoT domain and then briefly discuss about papers published in this special issue targeting identified challenges. |
---|---|
AbstractList | The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution, openness and relatively high processing power of IoT objects made them an ideal target for cyber attacks. Moreover, as many of IoT nodes are collecting and processing private information, they are becoming a goldmine of data for malicious actors. Therefore, security and specifically the ability to detect compromised nodes, together with collecting and preserving evidences of an attack or malicious activities emerge as a priority in successful deployment of IoT networks. In this paper, we first introduce existing major security and forensics challenges within IoT domain and then briefly discuss about papers published in this special issue targeting identified challenges. |
Author | Franke, Katrin Conti, Mauro Dehghantanha, Ali Watson, Steve |
Author_xml | – sequence: 1 givenname: Mauro surname: Conti fullname: Conti, Mauro email: conti@math.unipd.it organization: Department of Mathematics, University of Padua, Italy – sequence: 2 givenname: Ali surname: Dehghantanha fullname: Dehghantanha, Ali organization: Department of Computer Science, University of Salford, UK – sequence: 3 givenname: Katrin surname: Franke fullname: Franke, Katrin organization: Testimon Forensics Group, Norwegian University of Science and Technology, Norway – sequence: 4 givenname: Steve surname: Watson fullname: Watson, Steve organization: VTO Labs, Denver, CO, USA |
BookMark | eNp9kEFLAzEUhIMo2Fb_gYf9A7vmJbubXQ-CFK2FgpcK3kJMXtqUmpQkK_Tfu7WehYE5vJnh8U3JpQ8eCbkDWgGF9n5X2SEPEStGQVR0VEsvyAQ6wUoB0FySyRgTpeD9xzWZprSjdExymJDF0meMHnMRbLHeOr9JRUI9RJePhfKmsCGiT06nh2K-Vfs9-g2m30s4HELMg3fZYbohV1btE97--Yy8vzyv56_l6m2xnD-tSs0Fy2WnFRPdJxWM0qaF2hiAXqHSCLyvlW66WtUWuOpZYxurWmy6tjeG1ZwZrZDPSH3e1TGkFNHKQ3RfKh4lUHmCIXfyDEOeYEg6qqVj7fFcw_G3b4dRJu3QazQuos7SBPf_wA_m-21c |
CitedBy_id | crossref_primary_10_3390_s19122692 crossref_primary_10_1007_s12083_020_00933_2 crossref_primary_10_1109_JSYST_2020_2993323 crossref_primary_10_31590_ejosat_961437 crossref_primary_10_1016_j_comnet_2019_01_023 crossref_primary_10_1109_TCAD_2023_3313097 crossref_primary_10_1016_j_future_2018_07_006 crossref_primary_10_1109_ACCESS_2024_3368377 crossref_primary_10_1007_s00607_022_01070_9 crossref_primary_10_1108_SCM_03_2018_0142 crossref_primary_10_1177_0961463X20940471 crossref_primary_10_1016_j_adhoc_2021_102680 crossref_primary_10_1145_3351881 crossref_primary_10_29048_makufebed_1273073 crossref_primary_10_1016_j_fsidi_2024_301748 crossref_primary_10_1007_s11277_019_06576_8 crossref_primary_10_1007_s11277_020_07730_3 crossref_primary_10_1007_s42979_020_00428_0 crossref_primary_10_48175_IJARSCT_3355 crossref_primary_10_1007_s00170_020_05445_0 crossref_primary_10_1002_spe_2739 crossref_primary_10_1002_jnm_2892 crossref_primary_10_1016_j_jnca_2022_103371 crossref_primary_10_3390_su10124342 crossref_primary_10_1016_j_comnet_2018_11_026 crossref_primary_10_5902_2236117063798 crossref_primary_10_1186_s13638_019_1542_x crossref_primary_10_3390_jsan9030037 crossref_primary_10_1016_j_future_2019_04_035 crossref_primary_10_1109_ACCESS_2020_2993553 crossref_primary_10_1016_j_future_2018_06_055 crossref_primary_10_1109_ACCESS_2020_2988359 crossref_primary_10_1007_s40745_022_00408_6 crossref_primary_10_33317_ssurj_421 crossref_primary_10_3390_s22082895 crossref_primary_10_3390_buildings12030388 crossref_primary_10_1109_ACCESS_2018_2882941 crossref_primary_10_1109_JIOT_2020_2997651 crossref_primary_10_1016_j_sysarc_2019_04_003 crossref_primary_10_3390_s18092997 crossref_primary_10_3390_s21041113 crossref_primary_10_3390_iot2030022 crossref_primary_10_1016_j_nanoen_2020_105275 crossref_primary_10_1109_ACCESS_2020_3029280 crossref_primary_10_1109_ACCESS_2019_2947652 crossref_primary_10_32604_csse_2022_020504 crossref_primary_10_1155_2021_5585062 crossref_primary_10_1007_s42488_020_00030_2 crossref_primary_10_1109_TEM_2020_2980733 crossref_primary_10_1016_j_trpro_2021_01_040 crossref_primary_10_1109_ACCESS_2020_3040914 crossref_primary_10_3390_geriatrics4020034 crossref_primary_10_3390_math10071071 crossref_primary_10_1016_j_future_2018_11_008 crossref_primary_10_1109_ACCESS_2019_2916717 crossref_primary_10_1109_JIOT_2019_2940713 crossref_primary_10_1007_s11042_018_5774_2 crossref_primary_10_1007_s11042_023_15788_x crossref_primary_10_1007_s40747_021_00280_6 crossref_primary_10_3390_electronics10080880 crossref_primary_10_1007_s10257_021_00537_0 crossref_primary_10_1016_j_comcom_2023_06_020 crossref_primary_10_1108_IJLM_12_2022_0480 crossref_primary_10_3390_fi11060127 crossref_primary_10_1371_journal_pone_0271436 crossref_primary_10_1007_s13369_020_04476_9 crossref_primary_10_1016_j_jnca_2019_04_013 crossref_primary_10_1016_j_cose_2020_102162 crossref_primary_10_1016_j_jnca_2019_02_024 crossref_primary_10_1142_S0219691320500939 crossref_primary_10_1109_ACCESS_2020_2988055 crossref_primary_10_1002_cpe_5173 crossref_primary_10_1007_s40747_023_01000_y crossref_primary_10_1007_s41870_021_00632_y crossref_primary_10_47164_ijngc_v13i2_386 crossref_primary_10_1145_3480462 crossref_primary_10_1109_MC_2018_3011051 crossref_primary_10_1109_JSEN_2020_3028872 crossref_primary_10_2174_2210327911666210111124057 crossref_primary_10_1016_j_comcom_2022_06_016 crossref_primary_10_1016_j_scs_2019_101957 crossref_primary_10_1109_ACCESS_2022_3227644 crossref_primary_10_1016_j_future_2018_08_029 crossref_primary_10_1177_1550147720901680 crossref_primary_10_3233_JCS_220131 crossref_primary_10_1109_JIOT_2019_2933518 crossref_primary_10_1109_ACCESS_2022_3230944 crossref_primary_10_1109_COMST_2019_2962586 crossref_primary_10_1007_s13369_020_04907_7 crossref_primary_10_3390_vehicles6010020 crossref_primary_10_3390_app10124102 crossref_primary_10_1515_bmt_2019_0123 crossref_primary_10_1587_transcom_2022EBP3169 crossref_primary_10_3390_electronics10202501 crossref_primary_10_1016_j_compeleceng_2019_02_022 crossref_primary_10_3390_app11041847 crossref_primary_10_1016_j_future_2018_07_045 crossref_primary_10_1016_j_future_2018_09_058 crossref_primary_10_1007_s11277_022_09850_4 crossref_primary_10_1016_j_future_2020_03_042 crossref_primary_10_1108_INTR_08_2019_0361 crossref_primary_10_15219_em85_1470 crossref_primary_10_17100_nevbiltek_557886 crossref_primary_10_1016_j_fsisyn_2024_100475 crossref_primary_10_1007_s00500_023_08229_2 crossref_primary_10_1145_3508392 crossref_primary_10_1155_2020_8815651 crossref_primary_10_3390_s19071492 crossref_primary_10_1109_TIFS_2020_3042049 crossref_primary_10_1109_TIFS_2020_2988602 crossref_primary_10_1002_wfs2_1496 crossref_primary_10_1155_2021_5537041 crossref_primary_10_36548_jismac_2019_2_001 crossref_primary_10_1007_s42488_021_00063_1 crossref_primary_10_1108_VJIKMS_10_2018_0091 crossref_primary_10_1109_JIOT_2021_3059570 crossref_primary_10_1080_08839514_2022_2145634 crossref_primary_10_1016_j_ins_2020_09_051 crossref_primary_10_1016_j_heliyon_2024_e28585 crossref_primary_10_1108_JSIT_10_2018_0137 crossref_primary_10_3390_s20205897 crossref_primary_10_1109_JSEN_2024_3367735 crossref_primary_10_1007_s11042_018_6338_1 crossref_primary_10_1109_JIOT_2022_3163469 crossref_primary_10_1007_s10479_019_03502_w crossref_primary_10_3390_info15060363 crossref_primary_10_1109_TSC_2020_2966970 crossref_primary_10_3390_su12229755 crossref_primary_10_1002_ett_4664 crossref_primary_10_3390_electronics9111925 crossref_primary_10_3390_info12050203 crossref_primary_10_31590_ejosat_494066 crossref_primary_10_32604_iasc_2023_026799 crossref_primary_10_1109_ACCESS_2019_2930933 crossref_primary_10_1109_JIOT_2019_2926321 crossref_primary_10_1002_cpe_7445 crossref_primary_10_1145_3635030 crossref_primary_10_1109_TC_2020_3015584 crossref_primary_10_1155_2020_4280156 crossref_primary_10_3390_electronics12030524 crossref_primary_10_1109_TNSM_2021_3122147 crossref_primary_10_1109_JIOT_2019_2953549 crossref_primary_10_25046_aj060213 crossref_primary_10_1109_TII_2019_2962759 crossref_primary_10_3233_AIS_220511 crossref_primary_10_1109_JIOT_2023_3285513 crossref_primary_10_1007_s00521_022_07656_w crossref_primary_10_1007_s11277_023_10695_8 crossref_primary_10_36548_jismac_2021_4_005 crossref_primary_10_1007_s11280_020_00855_2 crossref_primary_10_1126_sciadv_adk6042 crossref_primary_10_1109_ACCESS_2018_2844794 crossref_primary_10_1016_j_fsidi_2022_301470 crossref_primary_10_1016_j_comnet_2018_07_020 crossref_primary_10_1177_21582440221130300 crossref_primary_10_1002_cpe_6861 crossref_primary_10_61513_tead_1269279 crossref_primary_10_1016_j_fsir_2021_100198 crossref_primary_10_1109_ACCESS_2019_2916340 crossref_primary_10_3390_s19081909 crossref_primary_10_1109_ACCESS_2019_2903723 crossref_primary_10_1007_s11042_021_11841_9 crossref_primary_10_1016_j_fsidi_2023_301510 crossref_primary_10_1016_j_future_2020_11_010 crossref_primary_10_1109_TEM_2021_3083330 crossref_primary_10_1007_s10207_022_00645_z crossref_primary_10_3390_s22103607 crossref_primary_10_3390_su15021275 crossref_primary_10_1016_j_iot_2024_101172 crossref_primary_10_1109_JIOT_2022_3218524 crossref_primary_10_1007_s11227_019_03076_1 crossref_primary_10_1371_journal_pone_0230722 crossref_primary_10_32604_cmc_2023_030831 crossref_primary_10_1016_j_future_2017_12_041 crossref_primary_10_1016_j_future_2019_09_049 crossref_primary_10_1007_s11227_019_02779_9 crossref_primary_10_14483_23448350_18470 crossref_primary_10_22363_2313_2329_2023_31_4_700_711 crossref_primary_10_3390_app131810169 crossref_primary_10_1109_JIOT_2020_2971463 |
Cites_doi | 10.1016/j.jnca.2017.04.002 10.1016/j.future.2016.12.032 10.1109/JIOT.2016.2569094 10.1109/MM.2016.101 10.1016/j.future.2017.04.045 10.1016/S1361-3723(15)30045-2 10.1016/j.future.2017.06.008 10.1145/3013520 10.1109/TIFS.2015.2505632 10.1016/j.jnca.2017.02.009 10.1016/j.future.2016.06.003 10.1016/j.future.2016.02.020 10.1016/j.future.2016.12.036 10.1016/j.future.2015.09.016 10.1016/j.jnca.2016.12.008 10.1016/j.future.2017.04.031 |
ContentType | Journal Article |
Copyright | 2017 Elsevier B.V. |
Copyright_xml | – notice: 2017 Elsevier B.V. |
DBID | AAYXX CITATION |
DOI | 10.1016/j.future.2017.07.060 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1872-7115 |
EndPage | 546 |
ExternalDocumentID | 10_1016_j_future_2017_07_060 S0167739X17316667 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29H 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SES SEW SPC SPCBC SSV SSZ T5K UHS WUQ XPP ZMT ~G- AAXKI AAYXX ABDPE AFJKZ CITATION |
ID | FETCH-LOGICAL-c372t-8ca278b072005614dd119aeace1394ac584a4f13a925f5fa6e5869dd2432dcae3 |
ISSN | 0167-739X |
IngestDate | Fri Nov 22 01:07:41 EST 2024 Fri Feb 23 02:30:17 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Internet of Things Digital forensics Cyber security |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c372t-8ca278b072005614dd119aeace1394ac584a4f13a925f5fa6e5869dd2432dcae3 |
PageCount | 3 |
ParticipantIDs | crossref_primary_10_1016_j_future_2017_07_060 elsevier_sciencedirect_doi_10_1016_j_future_2017_07_060 |
PublicationCentury | 2000 |
PublicationDate | January 2018 2018-01-00 |
PublicationDateYYYYMMDD | 2018-01-01 |
PublicationDate_xml | – month: 01 year: 2018 text: January 2018 |
PublicationDecade | 2010 |
PublicationTitle | Future generation computer systems |
PublicationYear | 2018 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | Quick, Choo (b22) 2018; 78 Chifor, Bica, Patriciu, Pop (b2) 2017 Bertino, Choo, Georgakopolous, Nepal (b9) 2016; 16 Mai, Khalil (b3) 2017; 72 Lopez, Rios, Bao, Wang (b12) 2017; 75 Wu, Xu, Kumari, Li, Shen, Choo (b7) 2017; 89 Li, Hong, Omala (b11) 2017 Watson, Dehghantanha (b20) 2016; 2016 Henze, Hermerschmidt, Kerpen, Häußling, Rumpe, Wehrle (b13) 2016; 56 Dehghantanha, Franke (b19) 2014 Raza, Helgason, Papadimitratos, Voigt (b14) 2017 D’Orazio, Choo, Yang (b18) 2017; 4 Moosavi, Gia, Nigussie, Rahmani, Virtanen, Tenhunen, Isoaho (b10) 2016; 64 Harbawi, Varol (b17) 2017 Ambrosin, Anzanpour, Conti, Dargahi, Moosavi, Rahmani, Liljeberg (b1) 2016; 36 Alaba, Othman, Hashem, Alotaibi (b6) 2017; 88 Stergiou, Psannis, Kim, Gupta (b15) 2016 Haddad Pajouh, Javidan, Khayami, Ali, Choo (b16) 2016 Zarpelão, Miani, Kawakani, de Alvarenga (b4) 2017; 84 Yang, Cai, Wei, Lu, Choo (b8) 2016 Tonyali, Akkaya, Saputro, Selcuk Uluagac, Nojoumian (b21) 2018; 78 Giaretta, Balasubramaniam, Conti (b5) 2016; 11 Ge, Hong, Yusuf, Kim (b23) 2017 Dehghantanha (10.1016/j.future.2017.07.060_b19) 2014 Chifor (10.1016/j.future.2017.07.060_b2) 2017 Zarpelão (10.1016/j.future.2017.07.060_b4) 2017; 84 Alaba (10.1016/j.future.2017.07.060_b6) 2017; 88 Watson (10.1016/j.future.2017.07.060_b20) 2016; 2016 Lopez (10.1016/j.future.2017.07.060_b12) 2017; 75 Ge (10.1016/j.future.2017.07.060_b23) 2017 Ambrosin (10.1016/j.future.2017.07.060_b1) 2016; 36 Stergiou (10.1016/j.future.2017.07.060_b15) 2016 D’Orazio (10.1016/j.future.2017.07.060_b18) 2017; 4 Bertino (10.1016/j.future.2017.07.060_b9) 2016; 16 Yang (10.1016/j.future.2017.07.060_b8) 2016 Wu (10.1016/j.future.2017.07.060_b7) 2017; 89 Haddad Pajouh (10.1016/j.future.2017.07.060_b16) 2016 Giaretta (10.1016/j.future.2017.07.060_b5) 2016; 11 Tonyali (10.1016/j.future.2017.07.060_b21) 2018; 78 Moosavi (10.1016/j.future.2017.07.060_b10) 2016; 64 Li (10.1016/j.future.2017.07.060_b11) 2017 Henze (10.1016/j.future.2017.07.060_b13) 2016; 56 Mai (10.1016/j.future.2017.07.060_b3) 2017; 72 Raza (10.1016/j.future.2017.07.060_b14) 2017 Harbawi (10.1016/j.future.2017.07.060_b17) 2017 Quick (10.1016/j.future.2017.07.060_b22) 2018; 78 |
References_xml | – volume: 72 start-page: 327 year: 2017 end-page: 338 ident: b3 article-title: Design and implementation of a secure cloud-based billing model for smart meters as an Internet of Things using homomorphic cryptography publication-title: Future Gener. Comput. Syst. contributor: fullname: Khalil – year: 2017 ident: b11 article-title: Efficient certificateless access control for industrial Internet of Things publication-title: Future Gener. Comput. Syst. contributor: fullname: Omala – year: 2017 ident: b2 article-title: A security authorization scheme for smart home Internet of Things devices publication-title: Future Gener. Comput. Syst. contributor: fullname: Pop – volume: 75 start-page: 46 year: 2017 end-page: 57 ident: b12 article-title: Evolving privacy: from sensors to the Internet of Things publication-title: Future Gener. Comput. Syst. contributor: fullname: Wang – start-page: 265 year: 2016 end-page: 280 ident: b8 publication-title: Towards Lightweight Anonymous Entity Authentication for IoT Applications contributor: fullname: Choo – volume: 56 start-page: 701 year: 2016 end-page: 718 ident: b13 article-title: A comprehensive approach to privacy in the cloud-based Internet of Things publication-title: Future Gener. Comput. Syst. contributor: fullname: Wehrle – volume: 78 start-page: 547 year: 2018 end-page: 557 ident: b21 article-title: Privacy-preserving protocols for secure and reliable data aggregation in iot-enabled smart metering systems publication-title: Future Gener. Comput. Syst. contributor: fullname: Nojoumian – volume: 64 start-page: 108 year: 2016 end-page: 124 ident: b10 article-title: End-to-end security scheme for mobility enabled healthcare Internet of Things publication-title: Future Gener. Comput. Syst. contributor: fullname: Isoaho – year: 2017 ident: b23 article-title: Internet of Things; Software-defined networking; attack graphs; security modeling publication-title: Future Gener. Comput. Syst. contributor: fullname: Kim – volume: 11 start-page: 665 year: 2016 end-page: 676 ident: b5 article-title: Security vulnerabilities and countermeasures for target localization in bio-nanothings communication networks publication-title: EEE Trans. Inf. Forensics Secur. contributor: fullname: Conti – volume: 2016 start-page: 5 year: 2016 end-page: 8 ident: b20 article-title: Digital forensics: the missing piece of the Internet of Things promise publication-title: Comput. Fraud & Secur. contributor: fullname: Dehghantanha – volume: 16 start-page: 1 year: 2016 end-page: 7 ident: b9 article-title: Internet of Things (IoT): smart and secure service delovery publication-title: ACM Trans. Internet Technol. contributor: fullname: Nepal – year: 2016 ident: b15 article-title: Secure integration of IoT and cloud computing publication-title: Future Gener. Comput. Syst. contributor: fullname: Gupta – volume: 78 start-page: 558 year: 2018 end-page: 567 ident: b22 article-title: Digital forensic intelligence: Data subsets and open source intelligence (DFINT+OSINT): a timely and cohesive mix publication-title: Future Gener. Comput. Syst. contributor: fullname: Choo – volume: 84 start-page: 25 year: 2017 end-page: 37 ident: b4 article-title: A survey of intrusion detection in Internet of Things publication-title: J. Netw. Comput. Appl. contributor: fullname: de Alvarenga – start-page: 1 year: 2016 ident: b16 article-title: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks publication-title: IEEE Trans. Emerg. Top. Comput. contributor: fullname: Choo – start-page: 1 year: 2017 end-page: 6 ident: b17 article-title: An improved digital evidence acquisition model for the Internet of Things forensic I: A theoretical framework publication-title: 2017 5th International Symposium on Digital Forensic and Security, ISDFS contributor: fullname: Varol – start-page: 129 year: 2014 end-page: 138 ident: b19 article-title: Privacy-respecting digital investigation publication-title: Proceedings of 2014 Twelfth Annual International Conference on Privacy, Security and Trust, PST contributor: fullname: Franke – volume: 36 start-page: 25 year: 2016 end-page: 35 ident: b1 article-title: On the feasibility of attribute-based encryption on Internet of Things devices publication-title: IEEE Micro contributor: fullname: Liljeberg – volume: 88 start-page: 10 year: 2017 end-page: 28 ident: b6 article-title: Internet of Things security: A survey publication-title: J. Netw. Comput. Appl. contributor: fullname: Alotaibi – volume: 89 start-page: 72 year: 2017 end-page: 85 ident: b7 article-title: An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment publication-title: J. Netw. Comput. Appl. contributor: fullname: Choo – year: 2017 ident: b14 article-title: SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things publication-title: Future Gener. Comput. Syst. contributor: fullname: Voigt – volume: 4 start-page: 524 year: 2017 end-page: 535 ident: b18 article-title: Data exfiltration from Internet of Things devices: IoS devices as case studies publication-title: IEEE Internet of Things J. contributor: fullname: Yang – volume: 88 start-page: 10 year: 2017 ident: 10.1016/j.future.2017.07.060_b6 article-title: Internet of Things security: A survey publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2017.04.002 contributor: fullname: Alaba – volume: 78 start-page: 558 year: 2018 ident: 10.1016/j.future.2017.07.060_b22 article-title: Digital forensic intelligence: Data subsets and open source intelligence (DFINT+OSINT): a timely and cohesive mix publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2016.12.032 contributor: fullname: Quick – start-page: 1 year: 2016 ident: 10.1016/j.future.2017.07.060_b16 article-title: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks publication-title: IEEE Trans. Emerg. Top. Comput. contributor: fullname: Haddad Pajouh – start-page: 265 year: 2016 ident: 10.1016/j.future.2017.07.060_b8 contributor: fullname: Yang – volume: 4 start-page: 524 issue: 2 year: 2017 ident: 10.1016/j.future.2017.07.060_b18 article-title: Data exfiltration from Internet of Things devices: IoS devices as case studies publication-title: IEEE Internet of Things J. doi: 10.1109/JIOT.2016.2569094 contributor: fullname: D’Orazio – year: 2017 ident: 10.1016/j.future.2017.07.060_b23 article-title: Internet of Things; Software-defined networking; attack graphs; security modeling publication-title: Future Gener. Comput. Syst. contributor: fullname: Ge – volume: 36 start-page: 25 issue: 6 year: 2016 ident: 10.1016/j.future.2017.07.060_b1 article-title: On the feasibility of attribute-based encryption on Internet of Things devices publication-title: IEEE Micro doi: 10.1109/MM.2016.101 contributor: fullname: Ambrosin – volume: 75 start-page: 46 year: 2017 ident: 10.1016/j.future.2017.07.060_b12 article-title: Evolving privacy: from sensors to the Internet of Things publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.04.045 contributor: fullname: Lopez – volume: 2016 start-page: 5 issue: 6 year: 2016 ident: 10.1016/j.future.2017.07.060_b20 article-title: Digital forensics: the missing piece of the Internet of Things promise publication-title: Comput. Fraud & Secur. doi: 10.1016/S1361-3723(15)30045-2 contributor: fullname: Watson – year: 2017 ident: 10.1016/j.future.2017.07.060_b14 article-title: SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.06.008 contributor: fullname: Raza – start-page: 1 year: 2017 ident: 10.1016/j.future.2017.07.060_b17 article-title: An improved digital evidence acquisition model for the Internet of Things forensic I: A theoretical framework contributor: fullname: Harbawi – start-page: 129 year: 2014 ident: 10.1016/j.future.2017.07.060_b19 article-title: Privacy-respecting digital investigation contributor: fullname: Dehghantanha – volume: 16 start-page: 1 issue: 4 year: 2016 ident: 10.1016/j.future.2017.07.060_b9 article-title: Internet of Things (IoT): smart and secure service delovery publication-title: ACM Trans. Internet Technol. doi: 10.1145/3013520 contributor: fullname: Bertino – year: 2017 ident: 10.1016/j.future.2017.07.060_b2 article-title: A security authorization scheme for smart home Internet of Things devices publication-title: Future Gener. Comput. Syst. contributor: fullname: Chifor – volume: 11 start-page: 665 issue: 4 year: 2016 ident: 10.1016/j.future.2017.07.060_b5 article-title: Security vulnerabilities and countermeasures for target localization in bio-nanothings communication networks publication-title: EEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2505632 contributor: fullname: Giaretta – volume: 84 start-page: 25 year: 2017 ident: 10.1016/j.future.2017.07.060_b4 article-title: A survey of intrusion detection in Internet of Things publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2017.02.009 contributor: fullname: Zarpelão – volume: 72 start-page: 327 year: 2017 ident: 10.1016/j.future.2017.07.060_b3 article-title: Design and implementation of a secure cloud-based billing model for smart meters as an Internet of Things using homomorphic cryptography publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2016.06.003 contributor: fullname: Mai – volume: 64 start-page: 108 year: 2016 ident: 10.1016/j.future.2017.07.060_b10 article-title: End-to-end security scheme for mobility enabled healthcare Internet of Things publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2016.02.020 contributor: fullname: Moosavi – year: 2017 ident: 10.1016/j.future.2017.07.060_b11 article-title: Efficient certificateless access control for industrial Internet of Things publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2016.12.036 contributor: fullname: Li – volume: 56 start-page: 701 year: 2016 ident: 10.1016/j.future.2017.07.060_b13 article-title: A comprehensive approach to privacy in the cloud-based Internet of Things publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2015.09.016 contributor: fullname: Henze – year: 2016 ident: 10.1016/j.future.2017.07.060_b15 article-title: Secure integration of IoT and cloud computing publication-title: Future Gener. Comput. Syst. contributor: fullname: Stergiou – volume: 89 start-page: 72 year: 2017 ident: 10.1016/j.future.2017.07.060_b7 article-title: An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2016.12.008 contributor: fullname: Wu – volume: 78 start-page: 547 year: 2018 ident: 10.1016/j.future.2017.07.060_b21 article-title: Privacy-preserving protocols for secure and reliable data aggregation in iot-enabled smart metering systems publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.04.031 contributor: fullname: Tonyali |
SSID | ssj0001731 |
Score | 2.6707425 |
Snippet | The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution,... |
SourceID | crossref elsevier |
SourceType | Aggregation Database Publisher |
StartPage | 544 |
SubjectTerms | Cyber security Digital forensics Internet of Things |
Title | Internet of Things security and forensics: Challenges and opportunities |
URI | https://dx.doi.org/10.1016/j.future.2017.07.060 |
Volume | 78 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Pb9MwFLa67sKF_QDE2A_5wDWodmI72a3aug0OXLaJ3SLHdlgnlE5d-__z7Gen3YoQICFVUeU2aeT31f7y7Pd9hHzUOXPO6CarpJVZwV2V6Rz-eE1jC6dYW-UupC6u1de78nxSTAaDpMmwavuvkYY2iLWvnP2LaPcXhQZ4DzGHI0Qdjn8Ud0zxubDAH005n6JHXVgoAJLq96ybsBXuLFmpoFLz7NGz8WUXVFbXaetFUB7xdssuIsZEN4goBd0zc692NcUioOV81tNkd__9HmKoO1xfGv-Y9sDxrvEubuyYT3usftOLWAwWjNfWsxOsfJGd2CybwSwmjM4qDx66MAnhyFsqoPoMazvT0IzuPnFsFSgUGadpgZnLjRkAkxEPn1CSxe_dU0GdFV0LXmhrX_s78TfCvIGXlGqLbHMYsYoh2R5_ntx96Sd1_4UkE-9PSFWYYavg5m_9muWsMZebXfI6PnLQMWJljwxct092kp0HjaP7G3KZoENnLUXo0AQdCvCgPXRO6Qo44ZNnwHlLbi8mN2dXWfTZyEyu-CIrjeaqbEaKozCstYxVGmZkB48HhTbAUXXRslxXXLSi1dKJUlbW8iLn1miXvyPDbta594SKlhW6NcAbW6C6vCmlEVI7LqwW1jF7QLLUL_UjyqnUaZ_hQ439WPt-rEfwkqMDolLn1ZESItWrId6_PfPDP595SF6tkHxEhov50h2TrSe7PImo-AkpCYlH |
link.rule.ids | 315,782,786,27934,27935 |
linkProvider | Elsevier |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Internet+of+Things+security+and+forensics%3A+Challenges+and+opportunities&rft.jtitle=Future+generation+computer+systems&rft.au=Conti%2C+Mauro&rft.au=Dehghantanha%2C+Ali&rft.au=Franke%2C+Katrin&rft.au=Watson%2C+Steve&rft.date=2018-01-01&rft.pub=Elsevier+B.V&rft.issn=0167-739X&rft.eissn=1872-7115&rft.volume=78&rft.spage=544&rft.epage=546&rft_id=info:doi/10.1016%2Fj.future.2017.07.060&rft.externalDocID=S0167739X17316667 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-739X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-739X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-739X&client=summon |