A review study on blockchain-based IoT security and forensics

被引:21
作者
Kamal, Randa [1 ]
Hemdan, Ezz El-Din [1 ]
El-Fishway, Nawal [1 ]
机构
[1] Menoufia Univ, Dept Comp Sci & Engn, Fac Elect Engn, Menoufia, Egypt
关键词
Cybercrimes; Digital forensics; IoT security; Blockchain; IoT forensics; LAYER ATTACKS; INTERNET; CHALLENGES; THINGS; INTEGRATION; MANAGEMENT; FRAMEWORK; TAXONOMY; THREATS; ACCESS;
D O I
10.1007/s11042-021-11350-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The term Internet of Things (IoT) represents all communicating countless heterogeneous devices to share data and resources via the internet. The speedy advance of IoT devices proposes limitless benefits, but it also brings new challenges regarding security and forensics. Likewise, IoT devices can generate a massive amount of data that desires integrity and security during its handling and processing in an efficient way. IoT devices and data can be vulnerable to various types of cyber-crimes at each IoT layer. For combating these cyber-crimes in IoT infrastructure, IoT forensic term has shown up. The IoT forensic is the process of performing digital forensic investigation in the IoT environment in a forensically sound and timely fashion manner. Sundry challenges face the IoT forensics that requires urgent solutions and mitigation methods; digital evidence needs to be collected, preserved, analyzed, processed, and reported in a trusted manner to be acceptable for presenting in the court of law. Preserving the evidence unchanged or tampered with is the most critical challenge in digital forensics. Authentication is another challenge facing digital forensics; who is allowed to deal with the evidence? One of the most recent solutions for supporting IoT forensics is the use of Blockchain. Using Blockchain in digital forensics guarantees data integrity, immutability, scalability, and security. Therefore, this paper presents a comprehensive review of IoT security and forensics with the integration with Blockchain technology. It begins by providing an inclusive discussion of IoT security, as well as the need for IoT forensics, and the concepts of Blockchain. Then, a review of Blockchain-based IoT security and forensics issues is presented. Finally, a discussion of open research directions is provided.
引用
收藏
页码:36183 / 36214
页数:32
相关论文
共 146 条
[1]  
Abomhara M., 2015, Journal of Cyber Security and Mobility, V4, P65, DOI [10.13052/jcsm2245-1439.414, DOI 10.13052/JCSM2245-1439.414]
[2]  
Adhikary, 2019, INT C INT COMP COMM
[3]  
Ahmed Z, 2019, IEEE INT WORKSH COMP, DOI [10.1109/SCCS.2019.8852596, 10.1109/camad.2019.8858484]
[4]   A Survey on the Roles of Communication Technologies in IoT-Based Personalized Healthcare Applications [J].
Alam, Muhammad Mahtab ;
Malik, Hassan ;
Khan, Muhidul Islam ;
Pardy, Tamas ;
Kuusik, Alar ;
Le Moullec, Yannick .
IEEE ACCESS, 2018, 6 :36611-36631
[5]   IoT and the Risk of Internet Exposure: Risk Assessment using Shodan Queries [J].
Albataineh, Areej ;
Alsmadi, Izzat .
2019 IEEE 20TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2019,
[6]  
AlHammadi A., 2019, 2019 28th IEEE International Conference on Robot and Human Interactive Communication, P1
[7]   Scalable Analysis of Interaction Threats in IoT Systems [J].
Alhanahnah, Mohannad ;
Stevens, Clay ;
Bagheri, Hamid .
PROCEEDINGS OF THE 29TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2020, 2020, :272-285
[8]  
Alhasnawi B., 2020, J XIAN U ARCHIT, V63, P1006
[9]  
[Anonymous], 2001, Report No.: DTRT00101
[10]  
Arcenegui J, 2020, INT C APPL CRYPT NET