Internet of Things security and forensics: Challenges and opportunities

The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution, openness and relatively high processing power of IoT objects made them an ideal target for cyber attacks. Moreover, as many of IoT nodes are...

Full description

Saved in:
Bibliographic Details
Published in:Future generation computer systems Vol. 78; pp. 544 - 546
Main Authors: Conti, Mauro, Dehghantanha, Ali, Franke, Katrin, Watson, Steve
Format: Journal Article
Language:English
Published: Elsevier B.V 01-01-2018
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution, openness and relatively high processing power of IoT objects made them an ideal target for cyber attacks. Moreover, as many of IoT nodes are collecting and processing private information, they are becoming a goldmine of data for malicious actors. Therefore, security and specifically the ability to detect compromised nodes, together with collecting and preserving evidences of an attack or malicious activities emerge as a priority in successful deployment of IoT networks. In this paper, we first introduce existing major security and forensics challenges within IoT domain and then briefly discuss about papers published in this special issue targeting identified challenges.
AbstractList The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution, openness and relatively high processing power of IoT objects made them an ideal target for cyber attacks. Moreover, as many of IoT nodes are collecting and processing private information, they are becoming a goldmine of data for malicious actors. Therefore, security and specifically the ability to detect compromised nodes, together with collecting and preserving evidences of an attack or malicious activities emerge as a priority in successful deployment of IoT networks. In this paper, we first introduce existing major security and forensics challenges within IoT domain and then briefly discuss about papers published in this special issue targeting identified challenges.
Author Franke, Katrin
Conti, Mauro
Dehghantanha, Ali
Watson, Steve
Author_xml – sequence: 1
  givenname: Mauro
  surname: Conti
  fullname: Conti, Mauro
  email: conti@math.unipd.it
  organization: Department of Mathematics, University of Padua, Italy
– sequence: 2
  givenname: Ali
  surname: Dehghantanha
  fullname: Dehghantanha, Ali
  organization: Department of Computer Science, University of Salford, UK
– sequence: 3
  givenname: Katrin
  surname: Franke
  fullname: Franke, Katrin
  organization: Testimon Forensics Group, Norwegian University of Science and Technology, Norway
– sequence: 4
  givenname: Steve
  surname: Watson
  fullname: Watson, Steve
  organization: VTO Labs, Denver, CO, USA
BookMark eNp9kEFLAzEUhIMo2Fb_gYf9A7vmJbubXQ-CFK2FgpcK3kJMXtqUmpQkK_Tfu7WehYE5vJnh8U3JpQ8eCbkDWgGF9n5X2SEPEStGQVR0VEsvyAQ6wUoB0FySyRgTpeD9xzWZprSjdExymJDF0meMHnMRbLHeOr9JRUI9RJePhfKmsCGiT06nh2K-Vfs9-g2m30s4HELMg3fZYbohV1btE97--Yy8vzyv56_l6m2xnD-tSs0Fy2WnFRPdJxWM0qaF2hiAXqHSCLyvlW66WtUWuOpZYxurWmy6tjeG1ZwZrZDPSH3e1TGkFNHKQ3RfKh4lUHmCIXfyDEOeYEg6qqVj7fFcw_G3b4dRJu3QazQuos7SBPf_wA_m-21c
CitedBy_id crossref_primary_10_3390_s19122692
crossref_primary_10_1007_s12083_020_00933_2
crossref_primary_10_1109_JSYST_2020_2993323
crossref_primary_10_31590_ejosat_961437
crossref_primary_10_1016_j_comnet_2019_01_023
crossref_primary_10_1109_TCAD_2023_3313097
crossref_primary_10_1016_j_future_2018_07_006
crossref_primary_10_1109_ACCESS_2024_3368377
crossref_primary_10_1007_s00607_022_01070_9
crossref_primary_10_1108_SCM_03_2018_0142
crossref_primary_10_1177_0961463X20940471
crossref_primary_10_1016_j_adhoc_2021_102680
crossref_primary_10_1145_3351881
crossref_primary_10_29048_makufebed_1273073
crossref_primary_10_1016_j_fsidi_2024_301748
crossref_primary_10_1007_s11277_019_06576_8
crossref_primary_10_1007_s11277_020_07730_3
crossref_primary_10_1007_s42979_020_00428_0
crossref_primary_10_48175_IJARSCT_3355
crossref_primary_10_1007_s00170_020_05445_0
crossref_primary_10_1002_spe_2739
crossref_primary_10_1002_jnm_2892
crossref_primary_10_1016_j_jnca_2022_103371
crossref_primary_10_3390_su10124342
crossref_primary_10_1016_j_comnet_2018_11_026
crossref_primary_10_5902_2236117063798
crossref_primary_10_1186_s13638_019_1542_x
crossref_primary_10_3390_jsan9030037
crossref_primary_10_1016_j_future_2019_04_035
crossref_primary_10_1109_ACCESS_2020_2993553
crossref_primary_10_1016_j_future_2018_06_055
crossref_primary_10_1109_ACCESS_2020_2988359
crossref_primary_10_1007_s40745_022_00408_6
crossref_primary_10_33317_ssurj_421
crossref_primary_10_3390_s22082895
crossref_primary_10_3390_buildings12030388
crossref_primary_10_1109_ACCESS_2018_2882941
crossref_primary_10_1109_JIOT_2020_2997651
crossref_primary_10_1016_j_sysarc_2019_04_003
crossref_primary_10_3390_s18092997
crossref_primary_10_3390_s21041113
crossref_primary_10_3390_iot2030022
crossref_primary_10_1016_j_nanoen_2020_105275
crossref_primary_10_1109_ACCESS_2020_3029280
crossref_primary_10_1109_ACCESS_2019_2947652
crossref_primary_10_32604_csse_2022_020504
crossref_primary_10_1155_2021_5585062
crossref_primary_10_1007_s42488_020_00030_2
crossref_primary_10_1109_TEM_2020_2980733
crossref_primary_10_1016_j_trpro_2021_01_040
crossref_primary_10_1109_ACCESS_2020_3040914
crossref_primary_10_3390_geriatrics4020034
crossref_primary_10_3390_math10071071
crossref_primary_10_1016_j_future_2018_11_008
crossref_primary_10_1109_ACCESS_2019_2916717
crossref_primary_10_1109_JIOT_2019_2940713
crossref_primary_10_1007_s11042_018_5774_2
crossref_primary_10_1007_s11042_023_15788_x
crossref_primary_10_1007_s40747_021_00280_6
crossref_primary_10_3390_electronics10080880
crossref_primary_10_1007_s10257_021_00537_0
crossref_primary_10_1016_j_comcom_2023_06_020
crossref_primary_10_1108_IJLM_12_2022_0480
crossref_primary_10_3390_fi11060127
crossref_primary_10_1371_journal_pone_0271436
crossref_primary_10_1007_s13369_020_04476_9
crossref_primary_10_1016_j_jnca_2019_04_013
crossref_primary_10_1016_j_cose_2020_102162
crossref_primary_10_1016_j_jnca_2019_02_024
crossref_primary_10_1142_S0219691320500939
crossref_primary_10_1109_ACCESS_2020_2988055
crossref_primary_10_1002_cpe_5173
crossref_primary_10_1007_s40747_023_01000_y
crossref_primary_10_1007_s41870_021_00632_y
crossref_primary_10_47164_ijngc_v13i2_386
crossref_primary_10_1145_3480462
crossref_primary_10_1109_MC_2018_3011051
crossref_primary_10_1109_JSEN_2020_3028872
crossref_primary_10_2174_2210327911666210111124057
crossref_primary_10_1016_j_comcom_2022_06_016
crossref_primary_10_1016_j_scs_2019_101957
crossref_primary_10_1109_ACCESS_2022_3227644
crossref_primary_10_1016_j_future_2018_08_029
crossref_primary_10_1177_1550147720901680
crossref_primary_10_3233_JCS_220131
crossref_primary_10_1109_JIOT_2019_2933518
crossref_primary_10_1109_ACCESS_2022_3230944
crossref_primary_10_1109_COMST_2019_2962586
crossref_primary_10_1007_s13369_020_04907_7
crossref_primary_10_3390_vehicles6010020
crossref_primary_10_3390_app10124102
crossref_primary_10_1515_bmt_2019_0123
crossref_primary_10_1587_transcom_2022EBP3169
crossref_primary_10_3390_electronics10202501
crossref_primary_10_1016_j_compeleceng_2019_02_022
crossref_primary_10_3390_app11041847
crossref_primary_10_1016_j_future_2018_07_045
crossref_primary_10_1016_j_future_2018_09_058
crossref_primary_10_1007_s11277_022_09850_4
crossref_primary_10_1016_j_future_2020_03_042
crossref_primary_10_1108_INTR_08_2019_0361
crossref_primary_10_15219_em85_1470
crossref_primary_10_17100_nevbiltek_557886
crossref_primary_10_1016_j_fsisyn_2024_100475
crossref_primary_10_1007_s00500_023_08229_2
crossref_primary_10_1145_3508392
crossref_primary_10_1155_2020_8815651
crossref_primary_10_3390_s19071492
crossref_primary_10_1109_TIFS_2020_3042049
crossref_primary_10_1109_TIFS_2020_2988602
crossref_primary_10_1002_wfs2_1496
crossref_primary_10_1155_2021_5537041
crossref_primary_10_36548_jismac_2019_2_001
crossref_primary_10_1007_s42488_021_00063_1
crossref_primary_10_1108_VJIKMS_10_2018_0091
crossref_primary_10_1109_JIOT_2021_3059570
crossref_primary_10_1080_08839514_2022_2145634
crossref_primary_10_1016_j_ins_2020_09_051
crossref_primary_10_1016_j_heliyon_2024_e28585
crossref_primary_10_1108_JSIT_10_2018_0137
crossref_primary_10_3390_s20205897
crossref_primary_10_1109_JSEN_2024_3367735
crossref_primary_10_1007_s11042_018_6338_1
crossref_primary_10_1109_JIOT_2022_3163469
crossref_primary_10_1007_s10479_019_03502_w
crossref_primary_10_3390_info15060363
crossref_primary_10_1109_TSC_2020_2966970
crossref_primary_10_3390_su12229755
crossref_primary_10_1002_ett_4664
crossref_primary_10_3390_electronics9111925
crossref_primary_10_3390_info12050203
crossref_primary_10_31590_ejosat_494066
crossref_primary_10_32604_iasc_2023_026799
crossref_primary_10_1109_ACCESS_2019_2930933
crossref_primary_10_1109_JIOT_2019_2926321
crossref_primary_10_1002_cpe_7445
crossref_primary_10_1145_3635030
crossref_primary_10_1109_TC_2020_3015584
crossref_primary_10_1155_2020_4280156
crossref_primary_10_3390_electronics12030524
crossref_primary_10_1109_TNSM_2021_3122147
crossref_primary_10_1109_JIOT_2019_2953549
crossref_primary_10_25046_aj060213
crossref_primary_10_1109_TII_2019_2962759
crossref_primary_10_3233_AIS_220511
crossref_primary_10_1109_JIOT_2023_3285513
crossref_primary_10_1007_s00521_022_07656_w
crossref_primary_10_1007_s11277_023_10695_8
crossref_primary_10_36548_jismac_2021_4_005
crossref_primary_10_1007_s11280_020_00855_2
crossref_primary_10_1126_sciadv_adk6042
crossref_primary_10_1109_ACCESS_2018_2844794
crossref_primary_10_1016_j_fsidi_2022_301470
crossref_primary_10_1016_j_comnet_2018_07_020
crossref_primary_10_1177_21582440221130300
crossref_primary_10_1002_cpe_6861
crossref_primary_10_61513_tead_1269279
crossref_primary_10_1016_j_fsir_2021_100198
crossref_primary_10_1109_ACCESS_2019_2916340
crossref_primary_10_3390_s19081909
crossref_primary_10_1109_ACCESS_2019_2903723
crossref_primary_10_1007_s11042_021_11841_9
crossref_primary_10_1016_j_fsidi_2023_301510
crossref_primary_10_1016_j_future_2020_11_010
crossref_primary_10_1109_TEM_2021_3083330
crossref_primary_10_1007_s10207_022_00645_z
crossref_primary_10_3390_s22103607
crossref_primary_10_3390_su15021275
crossref_primary_10_1016_j_iot_2024_101172
crossref_primary_10_1109_JIOT_2022_3218524
crossref_primary_10_1007_s11227_019_03076_1
crossref_primary_10_1371_journal_pone_0230722
crossref_primary_10_32604_cmc_2023_030831
crossref_primary_10_1016_j_future_2017_12_041
crossref_primary_10_1016_j_future_2019_09_049
crossref_primary_10_1007_s11227_019_02779_9
crossref_primary_10_14483_23448350_18470
crossref_primary_10_22363_2313_2329_2023_31_4_700_711
crossref_primary_10_3390_app131810169
crossref_primary_10_1109_JIOT_2020_2971463
Cites_doi 10.1016/j.jnca.2017.04.002
10.1016/j.future.2016.12.032
10.1109/JIOT.2016.2569094
10.1109/MM.2016.101
10.1016/j.future.2017.04.045
10.1016/S1361-3723(15)30045-2
10.1016/j.future.2017.06.008
10.1145/3013520
10.1109/TIFS.2015.2505632
10.1016/j.jnca.2017.02.009
10.1016/j.future.2016.06.003
10.1016/j.future.2016.02.020
10.1016/j.future.2016.12.036
10.1016/j.future.2015.09.016
10.1016/j.jnca.2016.12.008
10.1016/j.future.2017.04.031
ContentType Journal Article
Copyright 2017 Elsevier B.V.
Copyright_xml – notice: 2017 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.future.2017.07.060
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-7115
EndPage 546
ExternalDocumentID 10_1016_j_future_2017_07_060
S0167739X17316667
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29H
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABJNI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
AEBSH
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
UHS
WUQ
XPP
ZMT
~G-
AAXKI
AAYXX
ABDPE
AFJKZ
CITATION
ID FETCH-LOGICAL-c372t-8ca278b072005614dd119aeace1394ac584a4f13a925f5fa6e5869dd2432dcae3
ISSN 0167-739X
IngestDate Fri Nov 22 01:07:41 EST 2024
Fri Feb 23 02:30:17 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Internet of Things
Digital forensics
Cyber security
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c372t-8ca278b072005614dd119aeace1394ac584a4f13a925f5fa6e5869dd2432dcae3
PageCount 3
ParticipantIDs crossref_primary_10_1016_j_future_2017_07_060
elsevier_sciencedirect_doi_10_1016_j_future_2017_07_060
PublicationCentury 2000
PublicationDate January 2018
2018-01-00
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – month: 01
  year: 2018
  text: January 2018
PublicationDecade 2010
PublicationTitle Future generation computer systems
PublicationYear 2018
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Quick, Choo (b22) 2018; 78
Chifor, Bica, Patriciu, Pop (b2) 2017
Bertino, Choo, Georgakopolous, Nepal (b9) 2016; 16
Mai, Khalil (b3) 2017; 72
Lopez, Rios, Bao, Wang (b12) 2017; 75
Wu, Xu, Kumari, Li, Shen, Choo (b7) 2017; 89
Li, Hong, Omala (b11) 2017
Watson, Dehghantanha (b20) 2016; 2016
Henze, Hermerschmidt, Kerpen, Häußling, Rumpe, Wehrle (b13) 2016; 56
Dehghantanha, Franke (b19) 2014
Raza, Helgason, Papadimitratos, Voigt (b14) 2017
D’Orazio, Choo, Yang (b18) 2017; 4
Moosavi, Gia, Nigussie, Rahmani, Virtanen, Tenhunen, Isoaho (b10) 2016; 64
Harbawi, Varol (b17) 2017
Ambrosin, Anzanpour, Conti, Dargahi, Moosavi, Rahmani, Liljeberg (b1) 2016; 36
Alaba, Othman, Hashem, Alotaibi (b6) 2017; 88
Stergiou, Psannis, Kim, Gupta (b15) 2016
Haddad Pajouh, Javidan, Khayami, Ali, Choo (b16) 2016
Zarpelão, Miani, Kawakani, de Alvarenga (b4) 2017; 84
Yang, Cai, Wei, Lu, Choo (b8) 2016
Tonyali, Akkaya, Saputro, Selcuk Uluagac, Nojoumian (b21) 2018; 78
Giaretta, Balasubramaniam, Conti (b5) 2016; 11
Ge, Hong, Yusuf, Kim (b23) 2017
Dehghantanha (10.1016/j.future.2017.07.060_b19) 2014
Chifor (10.1016/j.future.2017.07.060_b2) 2017
Zarpelão (10.1016/j.future.2017.07.060_b4) 2017; 84
Alaba (10.1016/j.future.2017.07.060_b6) 2017; 88
Watson (10.1016/j.future.2017.07.060_b20) 2016; 2016
Lopez (10.1016/j.future.2017.07.060_b12) 2017; 75
Ge (10.1016/j.future.2017.07.060_b23) 2017
Ambrosin (10.1016/j.future.2017.07.060_b1) 2016; 36
Stergiou (10.1016/j.future.2017.07.060_b15) 2016
D’Orazio (10.1016/j.future.2017.07.060_b18) 2017; 4
Bertino (10.1016/j.future.2017.07.060_b9) 2016; 16
Yang (10.1016/j.future.2017.07.060_b8) 2016
Wu (10.1016/j.future.2017.07.060_b7) 2017; 89
Haddad Pajouh (10.1016/j.future.2017.07.060_b16) 2016
Giaretta (10.1016/j.future.2017.07.060_b5) 2016; 11
Tonyali (10.1016/j.future.2017.07.060_b21) 2018; 78
Moosavi (10.1016/j.future.2017.07.060_b10) 2016; 64
Li (10.1016/j.future.2017.07.060_b11) 2017
Henze (10.1016/j.future.2017.07.060_b13) 2016; 56
Mai (10.1016/j.future.2017.07.060_b3) 2017; 72
Raza (10.1016/j.future.2017.07.060_b14) 2017
Harbawi (10.1016/j.future.2017.07.060_b17) 2017
Quick (10.1016/j.future.2017.07.060_b22) 2018; 78
References_xml – volume: 72
  start-page: 327
  year: 2017
  end-page: 338
  ident: b3
  article-title: Design and implementation of a secure cloud-based billing model for smart meters as an Internet of Things using homomorphic cryptography
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Khalil
– year: 2017
  ident: b11
  article-title: Efficient certificateless access control for industrial Internet of Things
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Omala
– year: 2017
  ident: b2
  article-title: A security authorization scheme for smart home Internet of Things devices
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Pop
– volume: 75
  start-page: 46
  year: 2017
  end-page: 57
  ident: b12
  article-title: Evolving privacy: from sensors to the Internet of Things
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Wang
– start-page: 265
  year: 2016
  end-page: 280
  ident: b8
  publication-title: Towards Lightweight Anonymous Entity Authentication for IoT Applications
  contributor:
    fullname: Choo
– volume: 56
  start-page: 701
  year: 2016
  end-page: 718
  ident: b13
  article-title: A comprehensive approach to privacy in the cloud-based Internet of Things
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Wehrle
– volume: 78
  start-page: 547
  year: 2018
  end-page: 557
  ident: b21
  article-title: Privacy-preserving protocols for secure and reliable data aggregation in iot-enabled smart metering systems
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Nojoumian
– volume: 64
  start-page: 108
  year: 2016
  end-page: 124
  ident: b10
  article-title: End-to-end security scheme for mobility enabled healthcare Internet of Things
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Isoaho
– year: 2017
  ident: b23
  article-title: Internet of Things; Software-defined networking; attack graphs; security modeling
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Kim
– volume: 11
  start-page: 665
  year: 2016
  end-page: 676
  ident: b5
  article-title: Security vulnerabilities and countermeasures for target localization in bio-nanothings communication networks
  publication-title: EEE Trans. Inf. Forensics Secur.
  contributor:
    fullname: Conti
– volume: 2016
  start-page: 5
  year: 2016
  end-page: 8
  ident: b20
  article-title: Digital forensics: the missing piece of the Internet of Things promise
  publication-title: Comput. Fraud & Secur.
  contributor:
    fullname: Dehghantanha
– volume: 16
  start-page: 1
  year: 2016
  end-page: 7
  ident: b9
  article-title: Internet of Things (IoT): smart and secure service delovery
  publication-title: ACM Trans. Internet Technol.
  contributor:
    fullname: Nepal
– year: 2016
  ident: b15
  article-title: Secure integration of IoT and cloud computing
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Gupta
– volume: 78
  start-page: 558
  year: 2018
  end-page: 567
  ident: b22
  article-title: Digital forensic intelligence: Data subsets and open source intelligence (DFINT+OSINT): a timely and cohesive mix
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Choo
– volume: 84
  start-page: 25
  year: 2017
  end-page: 37
  ident: b4
  article-title: A survey of intrusion detection in Internet of Things
  publication-title: J. Netw. Comput. Appl.
  contributor:
    fullname: de Alvarenga
– start-page: 1
  year: 2016
  ident: b16
  article-title: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
  publication-title: IEEE Trans. Emerg. Top. Comput.
  contributor:
    fullname: Choo
– start-page: 1
  year: 2017
  end-page: 6
  ident: b17
  article-title: An improved digital evidence acquisition model for the Internet of Things forensic I: A theoretical framework
  publication-title: 2017 5th International Symposium on Digital Forensic and Security, ISDFS
  contributor:
    fullname: Varol
– start-page: 129
  year: 2014
  end-page: 138
  ident: b19
  article-title: Privacy-respecting digital investigation
  publication-title: Proceedings of 2014 Twelfth Annual International Conference on Privacy, Security and Trust, PST
  contributor:
    fullname: Franke
– volume: 36
  start-page: 25
  year: 2016
  end-page: 35
  ident: b1
  article-title: On the feasibility of attribute-based encryption on Internet of Things devices
  publication-title: IEEE Micro
  contributor:
    fullname: Liljeberg
– volume: 88
  start-page: 10
  year: 2017
  end-page: 28
  ident: b6
  article-title: Internet of Things security: A survey
  publication-title: J. Netw. Comput. Appl.
  contributor:
    fullname: Alotaibi
– volume: 89
  start-page: 72
  year: 2017
  end-page: 85
  ident: b7
  article-title: An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
  publication-title: J. Netw. Comput. Appl.
  contributor:
    fullname: Choo
– year: 2017
  ident: b14
  article-title: SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Voigt
– volume: 4
  start-page: 524
  year: 2017
  end-page: 535
  ident: b18
  article-title: Data exfiltration from Internet of Things devices: IoS devices as case studies
  publication-title: IEEE Internet of Things J.
  contributor:
    fullname: Yang
– volume: 88
  start-page: 10
  year: 2017
  ident: 10.1016/j.future.2017.07.060_b6
  article-title: Internet of Things security: A survey
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2017.04.002
  contributor:
    fullname: Alaba
– volume: 78
  start-page: 558
  year: 2018
  ident: 10.1016/j.future.2017.07.060_b22
  article-title: Digital forensic intelligence: Data subsets and open source intelligence (DFINT+OSINT): a timely and cohesive mix
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2016.12.032
  contributor:
    fullname: Quick
– start-page: 1
  year: 2016
  ident: 10.1016/j.future.2017.07.060_b16
  article-title: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
  publication-title: IEEE Trans. Emerg. Top. Comput.
  contributor:
    fullname: Haddad Pajouh
– start-page: 265
  year: 2016
  ident: 10.1016/j.future.2017.07.060_b8
  contributor:
    fullname: Yang
– volume: 4
  start-page: 524
  issue: 2
  year: 2017
  ident: 10.1016/j.future.2017.07.060_b18
  article-title: Data exfiltration from Internet of Things devices: IoS devices as case studies
  publication-title: IEEE Internet of Things J.
  doi: 10.1109/JIOT.2016.2569094
  contributor:
    fullname: D’Orazio
– year: 2017
  ident: 10.1016/j.future.2017.07.060_b23
  article-title: Internet of Things; Software-defined networking; attack graphs; security modeling
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Ge
– volume: 36
  start-page: 25
  issue: 6
  year: 2016
  ident: 10.1016/j.future.2017.07.060_b1
  article-title: On the feasibility of attribute-based encryption on Internet of Things devices
  publication-title: IEEE Micro
  doi: 10.1109/MM.2016.101
  contributor:
    fullname: Ambrosin
– volume: 75
  start-page: 46
  year: 2017
  ident: 10.1016/j.future.2017.07.060_b12
  article-title: Evolving privacy: from sensors to the Internet of Things
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.04.045
  contributor:
    fullname: Lopez
– volume: 2016
  start-page: 5
  issue: 6
  year: 2016
  ident: 10.1016/j.future.2017.07.060_b20
  article-title: Digital forensics: the missing piece of the Internet of Things promise
  publication-title: Comput. Fraud & Secur.
  doi: 10.1016/S1361-3723(15)30045-2
  contributor:
    fullname: Watson
– year: 2017
  ident: 10.1016/j.future.2017.07.060_b14
  article-title: SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.06.008
  contributor:
    fullname: Raza
– start-page: 1
  year: 2017
  ident: 10.1016/j.future.2017.07.060_b17
  article-title: An improved digital evidence acquisition model for the Internet of Things forensic I: A theoretical framework
  contributor:
    fullname: Harbawi
– start-page: 129
  year: 2014
  ident: 10.1016/j.future.2017.07.060_b19
  article-title: Privacy-respecting digital investigation
  contributor:
    fullname: Dehghantanha
– volume: 16
  start-page: 1
  issue: 4
  year: 2016
  ident: 10.1016/j.future.2017.07.060_b9
  article-title: Internet of Things (IoT): smart and secure service delovery
  publication-title: ACM Trans. Internet Technol.
  doi: 10.1145/3013520
  contributor:
    fullname: Bertino
– year: 2017
  ident: 10.1016/j.future.2017.07.060_b2
  article-title: A security authorization scheme for smart home Internet of Things devices
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Chifor
– volume: 11
  start-page: 665
  issue: 4
  year: 2016
  ident: 10.1016/j.future.2017.07.060_b5
  article-title: Security vulnerabilities and countermeasures for target localization in bio-nanothings communication networks
  publication-title: EEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2505632
  contributor:
    fullname: Giaretta
– volume: 84
  start-page: 25
  year: 2017
  ident: 10.1016/j.future.2017.07.060_b4
  article-title: A survey of intrusion detection in Internet of Things
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2017.02.009
  contributor:
    fullname: Zarpelão
– volume: 72
  start-page: 327
  year: 2017
  ident: 10.1016/j.future.2017.07.060_b3
  article-title: Design and implementation of a secure cloud-based billing model for smart meters as an Internet of Things using homomorphic cryptography
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2016.06.003
  contributor:
    fullname: Mai
– volume: 64
  start-page: 108
  year: 2016
  ident: 10.1016/j.future.2017.07.060_b10
  article-title: End-to-end security scheme for mobility enabled healthcare Internet of Things
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2016.02.020
  contributor:
    fullname: Moosavi
– year: 2017
  ident: 10.1016/j.future.2017.07.060_b11
  article-title: Efficient certificateless access control for industrial Internet of Things
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2016.12.036
  contributor:
    fullname: Li
– volume: 56
  start-page: 701
  year: 2016
  ident: 10.1016/j.future.2017.07.060_b13
  article-title: A comprehensive approach to privacy in the cloud-based Internet of Things
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2015.09.016
  contributor:
    fullname: Henze
– year: 2016
  ident: 10.1016/j.future.2017.07.060_b15
  article-title: Secure integration of IoT and cloud computing
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Stergiou
– volume: 89
  start-page: 72
  year: 2017
  ident: 10.1016/j.future.2017.07.060_b7
  article-title: An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2016.12.008
  contributor:
    fullname: Wu
– volume: 78
  start-page: 547
  year: 2018
  ident: 10.1016/j.future.2017.07.060_b21
  article-title: Privacy-preserving protocols for secure and reliable data aggregation in iot-enabled smart metering systems
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.04.031
  contributor:
    fullname: Tonyali
SSID ssj0001731
Score 2.6707425
Snippet The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution,...
SourceID crossref
elsevier
SourceType Aggregation Database
Publisher
StartPage 544
SubjectTerms Cyber security
Digital forensics
Internet of Things
Title Internet of Things security and forensics: Challenges and opportunities
URI https://dx.doi.org/10.1016/j.future.2017.07.060
Volume 78
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Pb9MwFLa67sKF_QDE2A_5wDWodmI72a3aug0OXLaJ3SLHdlgnlE5d-__z7Gen3YoQICFVUeU2aeT31f7y7Pd9hHzUOXPO6CarpJVZwV2V6Rz-eE1jC6dYW-UupC6u1de78nxSTAaDpMmwavuvkYY2iLWvnP2LaPcXhQZ4DzGHI0Qdjn8Ud0zxubDAH005n6JHXVgoAJLq96ybsBXuLFmpoFLz7NGz8WUXVFbXaetFUB7xdssuIsZEN4goBd0zc692NcUioOV81tNkd__9HmKoO1xfGv-Y9sDxrvEubuyYT3usftOLWAwWjNfWsxOsfJGd2CybwSwmjM4qDx66MAnhyFsqoPoMazvT0IzuPnFsFSgUGadpgZnLjRkAkxEPn1CSxe_dU0GdFV0LXmhrX_s78TfCvIGXlGqLbHMYsYoh2R5_ntx96Sd1_4UkE-9PSFWYYavg5m_9muWsMZebXfI6PnLQMWJljwxct092kp0HjaP7G3KZoENnLUXo0AQdCvCgPXRO6Qo44ZNnwHlLbi8mN2dXWfTZyEyu-CIrjeaqbEaKozCstYxVGmZkB48HhTbAUXXRslxXXLSi1dKJUlbW8iLn1miXvyPDbta594SKlhW6NcAbW6C6vCmlEVI7LqwW1jF7QLLUL_UjyqnUaZ_hQ439WPt-rEfwkqMDolLn1ZESItWrId6_PfPDP595SF6tkHxEhov50h2TrSe7PImo-AkpCYlH
link.rule.ids 315,782,786,27934,27935
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Internet+of+Things+security+and+forensics%3A+Challenges+and+opportunities&rft.jtitle=Future+generation+computer+systems&rft.au=Conti%2C+Mauro&rft.au=Dehghantanha%2C+Ali&rft.au=Franke%2C+Katrin&rft.au=Watson%2C+Steve&rft.date=2018-01-01&rft.pub=Elsevier+B.V&rft.issn=0167-739X&rft.eissn=1872-7115&rft.volume=78&rft.spage=544&rft.epage=546&rft_id=info:doi/10.1016%2Fj.future.2017.07.060&rft.externalDocID=S0167739X17316667
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-739X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-739X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-739X&client=summon