Wencheng Yang, Michael N. Johnstone, L. Sikos, Song Wang
{"title":"Security and Forensics in the Internet of Things: Research Advances and Challenges","authors":"Wencheng Yang, Michael N. Johnstone, L. Sikos, Song Wang","doi":"10.1109/ETSecIoT50046.2020.00007","DOIUrl":null,"url":null,"abstract":"Considering the billions of Internet of Things (IoT) devices around the world, the IoT has brought convenience to people’s lives, but also created a larger attack surface. Therefore, specific attention should be paid to IoT, especially from two aspects, namely, security and forensics. Security properties, especially authentication, ensure the integrity of large amounts of data processed in IoT networks, while forensic investigations can identify, collect, and retain evidence when abuse in IoT systems occurs. Regarding these two critical aspects, this article introduces and analyzes the latest biometric-based authentication research effort in IoT, as well as some IoT forensic investigation models/frameworks. In addition, we also investigate some unresolved challenges that IoT research still faces and provide a direction for future work.","PeriodicalId":193628,"journal":{"name":"2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETSecIoT50046.2020.00007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Considering the billions of Internet of Things (IoT) devices around the world, the IoT has brought convenience to people’s lives, but also created a larger attack surface. Therefore, specific attention should be paid to IoT, especially from two aspects, namely, security and forensics. Security properties, especially authentication, ensure the integrity of large amounts of data processed in IoT networks, while forensic investigations can identify, collect, and retain evidence when abuse in IoT systems occurs. Regarding these two critical aspects, this article introduces and analyzes the latest biometric-based authentication research effort in IoT, as well as some IoT forensic investigation models/frameworks. In addition, we also investigate some unresolved challenges that IoT research still faces and provide a direction for future work.