{"title":"使用第三方日志库的物联网(IoT)取证模型","authors":"Ahmed Hambouz, Yousef Shaheen, M. Ababneh","doi":"10.1145/3460620.3460746","DOIUrl":null,"url":null,"abstract":"Since the last decade, the number of Internet of Things (IoT) devices has increased dramatically. Consequently, the number of effected users and persons has also grown. By 2025 the number of connected IoT devices will reach 75.44 billion. This tremendous increase in IoT devices environments has increased the IoT threats, risks, and digital crimes. Thus, an efficient IoT forensic model should be laid out to fulfill the investigation requirements in IoT environments. In this paper, a new IoT forensics model has been introduced to face the IoT forensics challenges. The proposed model has satisfied the security, confidentiality, integrity, availability, authentication, and non-repudiation requirements.","PeriodicalId":36824,"journal":{"name":"Data","volume":"13 1","pages":""},"PeriodicalIF":2.2000,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"An Internet Of Things (IoT) Forensics Model Using Third-Party Logs-Vault\",\"authors\":\"Ahmed Hambouz, Yousef Shaheen, M. Ababneh\",\"doi\":\"10.1145/3460620.3460746\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since the last decade, the number of Internet of Things (IoT) devices has increased dramatically. Consequently, the number of effected users and persons has also grown. By 2025 the number of connected IoT devices will reach 75.44 billion. This tremendous increase in IoT devices environments has increased the IoT threats, risks, and digital crimes. Thus, an efficient IoT forensic model should be laid out to fulfill the investigation requirements in IoT environments. In this paper, a new IoT forensics model has been introduced to face the IoT forensics challenges. The proposed model has satisfied the security, confidentiality, integrity, availability, authentication, and non-repudiation requirements.\",\"PeriodicalId\":36824,\"journal\":{\"name\":\"Data\",\"volume\":\"13 1\",\"pages\":\"\"},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2021-04-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Data\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://doi.org/10.1145/3460620.3460746\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Data","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.1145/3460620.3460746","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
An Internet Of Things (IoT) Forensics Model Using Third-Party Logs-Vault
Since the last decade, the number of Internet of Things (IoT) devices has increased dramatically. Consequently, the number of effected users and persons has also grown. By 2025 the number of connected IoT devices will reach 75.44 billion. This tremendous increase in IoT devices environments has increased the IoT threats, risks, and digital crimes. Thus, an efficient IoT forensic model should be laid out to fulfill the investigation requirements in IoT environments. In this paper, a new IoT forensics model has been introduced to face the IoT forensics challenges. The proposed model has satisfied the security, confidentiality, integrity, availability, authentication, and non-repudiation requirements.