Uncovering Network Vulnerabilities and Conducting Digital Forensics Analysis for IoT Device Security in 6G.

Shams Tabrez Siddiqui, Mohammad Shahid Kamal, Khalid Ali Qidwai,Md Imran Alam,Haneef Khan,Malik Zaib Alam,Ishan Budhiraja, Sandeep Chintham

International Conference on Advanced Networks and Telecommuncations Systems(2023)

引用 0|浏览0
暂无评分
摘要
The proliferation of IoT gadgets has introduced game-changing technologies across a range of sectors. This widespread use has, however, revealed serious security holes, underscoring the importance of rigorous security measures and digital forensics investigation. Everyday objects are getting online connections, including eyewear, smart-watches, stoves, microwaves, door locks, etc., with most of their data being stored in the cloud. Information is the lifeblood of digital forensics. There was a time when digital forensics only dealt with devices like computers and mobile phones that were physically present at a crime scene. Forensic investigators face new challenges and opportunities as a result of the proliferation of digital data outside traditional storage mediums. This paper explains, what are security breaches, and different IoT security challenges, due to the increase in IoT devices day by day. And investigate the IoT devices by using a digital forensics investigation process that consists of different phases. And finally, discussed recent IoT forensics approaches and frameworks overview
更多
查看译文
关键词
Internet of Things (IoT) gadgets,Digital forensics,Security,Smart devices,Cloud
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要