Abstract

Internet of Things (IoT) usage in different applications and the usage of open source communication band are vulnerable to different types of attacks. Determining the root cause of the attacks, isolating the nodes, and providing countermeasures to overcome such threats in the future are important aspects for the success of IoT and its usage in more areas of applications. This paper presents a survey of recent works on the evidence collection module in IoT forensics. The evidence collection is the second stage in the forensics investigation cycle. The classification of the evidence collection mechanisms based on the strategy adapted has been discussed. Additionally, the discussion on the evidence collection methodologies and the future directions for research in the evidence collection module pertaining to IoT forensics is presented.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.