{"title":"Survey of Evidence Collection Methods for Internet of Things Forensics","authors":"A. Renold","doi":"10.1109/ICNWC57852.2023.10127407","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) usage in different applications and the usage of open source communication band are vulnerable to different types of attacks. Determining the root cause of the attacks, isolating the nodes, and providing countermeasures to overcome such threats in the future are important aspects for the success of IoT and its usage in more areas of applications. This paper presents a survey of recent works on the evidence collection module in IoT forensics. The evidence collection is the second stage in the forensics investigation cycle. The classification of the evidence collection mechanisms based on the strategy adapted has been discussed. Additionally, the discussion on the evidence collection methodologies and the future directions for research in the evidence collection module pertaining to IoT forensics is presented.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Networking and Communications (ICNWC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNWC57852.2023.10127407","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Internet of Things (IoT) usage in different applications and the usage of open source communication band are vulnerable to different types of attacks. Determining the root cause of the attacks, isolating the nodes, and providing countermeasures to overcome such threats in the future are important aspects for the success of IoT and its usage in more areas of applications. This paper presents a survey of recent works on the evidence collection module in IoT forensics. The evidence collection is the second stage in the forensics investigation cycle. The classification of the evidence collection mechanisms based on the strategy adapted has been discussed. Additionally, the discussion on the evidence collection methodologies and the future directions for research in the evidence collection module pertaining to IoT forensics is presented.