Threats in the Internet of Things Pertaining to Digital Data

被引:0
作者
ul Arafeen, Qamar [1 ]
Kamran, Asif [2 ]
ul Arifeen, Najam [3 ]
Shaikh, Asad Ali [1 ]
Syed, Nadeem A. [2 ]
机构
[1] ILMA Univ, Fac Sci & Technol, Karachi, Pakistan
[2] ILMA Univ, Fac Management Sci, Karachi, Pakistan
[3] Fed Urdu Univ, Dept Commerce, Karachi, Pakistan
来源
PROCEEDINGS OF THE THIRTEENTH INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING MANAGEMENT, VOL 1 | 2020年 / 1001卷
关键词
Digital forensics; Challenges; IoT; Education; Evidence; FORENSICS;
D O I
10.1007/978-3-030-21248-3_2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the advent of Internet of Things (IoT) and the rapid advancements in this area, it is predicted that there will be over ten billions wireless accessories linked to the world of internet. Such devices will serve as the foundations in the field of computer science, impacting the everyday course of life. These wireless devices will be capable of absorbing a huge number of personal and sensitive information to enhance the results. The IoT technology puts the collective data to good use by integrating different data sets together that generates amazing outcomes. This technology, however, poses significant challenges to certain agencies aiming to apply this system in their routine businesses. This paper further highlights various threats and challenges that the IoT presents in digital forensics and assists in the identification of important areas which should be modified in future. Finally, the paper highlights the lack of digital forensic education in Pakistan.
引用
收藏
页码:13 / 29
页数:17
相关论文
共 48 条
  • [1] Abdmeziem R., 2014, INTERNET THINGS CONC, P1
  • [2] Adams R, 2013, J DIGIT FORENSICS SE, V8, P25
  • [3] [Anonymous], 2002, International Journal of Digital Evidence, Volume, DOI DOI 10.1109/SADFE.2009.8
  • [4] [Anonymous], AD HOC NETW
  • [5] [Anonymous], 1999, WHAT IS FORENSIC COM
  • [6] [Anonymous], 2007, Int. Conf. Advanced Info. Netw. and Applicat. Workshops
  • [7] Arafeen Q., 2016, INT J LATEST RES ENG, V2, P72
  • [8] Threat-based Security Analysis for the Internet of Things
    Atamli, Ahmad W.
    Martin, Andrew
    [J]. 2014 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2014, : 35 - 43
  • [9] Basic concepts and taxonomy of dependable and secure computing
    Avizienis, A
    Laprie, JC
    Randell, B
    Landwehr, C
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) : 11 - 33
  • [10] Azhar Salman., 2008, Building Information Modeling (BIM): Benefits, Risks and Challenges