A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues

M Stoyanova, Y Nikoloudakis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Today is the era of the Internet of Things (IoT). The recent advances in hardware and
information technology have accelerated the deployment of billions of interconnected, smart …

Blockchain technology on smart grid, energy trading, and big data: security issues, challenges, and recommendations

MK Hasan, A Alkhalifah, S Islam… - Wireless …, 2022 - Wiley Online Library
The smart grid idea was implemented as a modern interpretation of the traditional power
grid to find out the most efficient way to combine renewable energy and storage …

Internet of Things (IoT) cybersecurity research: A review of current research topics

Y Lu, L Da Xu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
As an emerging technology, the Internet of Things (IoT) revolutionized the global network
comprising of people, smart devices, intelligent objects, data, and information. The …

Security requirements for the internet of things: A systematic approach

S Pal, M Hitchens, T Rabehaja, S Mukhopadhyay - Sensors, 2020 - mdpi.com
There has been a tremendous growth in the number of smart devices and their applications
(eg, smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday …

A framework for Internet of Things-enabled smart government: A case of IoT cybersecurity policies and use cases in US federal government

AT Chatfield, CG Reddick - Government Information Quarterly, 2019 - Elsevier
Abstract Internet of Things (IoT) is ubiquitous in society. IoT-enabled dynamic capabilities in
real-time sensing and responding can spur digital transformation in unlocking the potential …

FIF-IoT: A forensic investigation framework for IoT using a public digital ledger

M Hossain, Y Karim, R Hasan - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
The increased deployment of Internet of Things (IoT) devices will make them targets for
attacks. IoT devices can also be used as tools for committing crimes. In this regard, we …

A comprehensive survey on secure software‐defined network for the Internet of Things

M Babiker Mohamed, O Matthew Alofe… - Transactions on …, 2022 - Wiley Online Library
Abstract The Internet of Things (IoT) is the network of smart devices, sensors, and machines
that continuously monitored the surrounding environment and execute meaningful decisions …

D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks

Y Meidan, D Benatar, R Bitton, D Avraham… - Computers & Security, 2023 - Elsevier
IoT devices are known to be vulnerable to various cyber-attacks, such as data exfiltration
and the execution of flooding attacks as part of a DDoS attack. When it comes to detecting …

A multigranularity forensics and analysis method on privacy leakage in cloud environment

D Zou, J Zhao, W Li, Y Wu, W Qiang… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
The problem of cloud forensics aims at processing multidimensional, massive, and
heterogeneous data to collect and recover evidence in cloud environment. Existing …

Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security

M Qasaimeh, RS Al-Qassas, S Tedmori - Multimedia Tools and …, 2018 - Springer
In the past few years, various lightweight cryptographic algorithms have been proposed to
balance the trade-offs between the requirements of resource constrained IoT devices and …