Internet of Things security and forensics: Challenges and opportunities

被引:281
作者
Conti, Mauro [1 ]
Dehghantanha, Ali [2 ]
Franke, Katrin [3 ]
Watson, Steve [4 ]
机构
[1] Univ Padua, Dept Math, Padua, Italy
[2] Univ Salford, Dept Comp Sci, Salford, Lancs, England
[3] Norwegian Univ Sci & Technol, Testimon Forens Grp, Trondheim, Norway
[4] VTO Labs, Denver, CO USA
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 78卷
关键词
Internet of Things; Cyber security; Digital forensics; PRIVACY;
D O I
10.1016/j.future.2017.07.060
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution, openness and relatively high processing power of loT objects made them an ideal target for cyber attacks. Moreover, as many of loT nodes are collecting and processing private information, they are becoming a goldmine of data for malicious actors. Therefore, security and specifically the ability to detect compromised nodes, together with collecting and preserving evidences of an attack or malicious activities emerge as a priority in successful deployment of IoT networks. In this paper, we first introduce existing major security and forensics challenges within IoT domain and then briefly discuss about papers published in this special issue targeting identified challenges. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:544 / 546
页数:3
相关论文
共 23 条
[1]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[2]   ON THE FEASIBILITY OF ATTRIBUTE-BASED ENCRYPTION ON INTERNET OF THINGS DEVICES [J].
Ambrosin, Moreno ;
Anzanpour, Arman ;
Conti, Mauro ;
Dargahi, Tooska ;
Moosavi, Sanaz Rahimi ;
Rahmani, Amir M. ;
Liljeberg, Pasi .
IEEE MICRO, 2016, 36 (06) :25-35
[3]   Internet of Things (IoT): Smart and Secure Service Delivery [J].
Bertino, Elisa ;
Choo, Kim-Kwang Raymond ;
Georgakopolous, Dimitrios ;
Nepal, Surya .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2016, 16 (04)
[4]  
Chifor B.-C., 2017, FUTURE GENER COMPUT
[5]   Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies [J].
D'Orazio, Christian J. ;
Choo, Kim-Kwang Raymond ;
Yang, Laurence T. .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02) :524-535
[6]  
Dehghantanha A, 2014, ANN CONF PRIV SECUR, P129, DOI 10.1109/PST.2014.6890932
[7]  
Ge Mengmeng, 2017, FUTURE GENE IN PRESS
[8]   Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks [J].
Giaretta, Alberto ;
Balasubramaniam, Sasitharan ;
Conti, Mauro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) :665-676
[9]  
Haddad Pajouh H., 2016, IEEE T EMERG TOP COM, P1
[10]  
Harbawi Malek., 2017, Digital Forensic and Security (ISDFS), 2017 5th International Symposium on, P1, DOI DOI 10.1109/.2017.7916508