{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:27:45Z","timestamp":1769722065843,"version":"3.49.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030105907","type":"print"},{"value":"9783030105914","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"vor","delay-in-days":14,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This chapter provides an overview of research opportunities and issues in IoT forensics. It gives a quick introduction to forensics and digital forensics. Key specifics of IoT forensics are explained. Issues that arise from IoT related challenges in all phases of a forensic investigation are presented. Some opportunities that IoT brings to forensics are pointed out. An example of an IoT forensics case is provided. A detailed research overview is given, providing information on the main research directions with a brief overview of relevant papers. The chapter concludes with some ideas for future research.<\/jats:p>","DOI":"10.1007\/978-3-030-10591-4_13","type":"book-chapter","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T14:06:41Z","timestamp":1610633201000},"page":"215-229","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["IoT Forensics"],"prefix":"10.1007","author":[{"given":"Sasa","family":"Mrdovic","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,15]]},"reference":[{"issue":"5","key":"13_CR10","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1941487.1941508","volume":"54","author":"Mikhail Afanasyev","year":"2011","unstructured":"Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, and Geoffrey M. Voelker. Privacy-preserving network forensics. Commun. ACM, 54(5):78\u201387, May 2011.","journal-title":"Commun. ACM"},{"issue":"6","key":"13_CR131","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MSP.2017.4251117","volume":"15","author":"Luca Caviglione","year":"2017","unstructured":"Luca Caviglione, Steffen Wendzel, and Wojciech Mazurczyk. The future of digital forensics: Challenges and the road ahead. IEEE Security & Privacy, 15(6):12\u201317, 2017.","journal-title":"IEEE Security & Privacy"},{"key":"13_CR145","doi-asserted-by":"publisher","first-page":"S15","DOI":"10.1016\/j.diin.2017.06.010","volume":"22","author":"Hyunji Chung","year":"2017","unstructured":"Hyunji Chung, Jungheum Park, and Sangjin Lee. Digital forensic approaches for amazon alexa ecosystem. Digital Investigation, 22:S15\u2013S25, 2017.","journal-title":"Digital Investigation"},{"key":"13_CR152","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.future.2017.07.060","volume":"78","author":"Mauro Conti","year":"2018","unstructured":"Mauro Conti, Ali Dehghantanha, Katrin Franke, and Steve Watson. Internet of things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78:544\u2013546, 2018.","journal-title":"Future Generation Computer Systems"},{"key":"13_CR174","unstructured":"Sherri Davidoff and Jonathan Ham. Network forensics: tracking hackers through cyberspace, volume 2014. Prentice hall Upper Saddle River, 2012."},{"key":"13_CR188","unstructured":"Christian D\u2019Orazio, Kim-Kwang Raymond Choo, and Laurence T. Yang. Data exfiltration from internet of things devices: ios devices as case studies. IEEE Internet of Things Journal, 4(2):524\u2013535, 2017."},{"key":"13_CR208","volume-title":"Forensic Discovery","author":"Dan Farmer","year":"2005","unstructured":"Dan Farmer and Wietse Venema. Forensic Discovery. Addison-Wesley Professional, 2005."},{"key":"13_CR258","doi-asserted-by":"crossref","unstructured":"Malek Harbawi and Asaf Varol. An improved digital evidence acquisition model for the internet of things forensic i: A theoretical framework. In 2017 5th International Symposium on Digital Forensic and Security (ISDFS), pages 1\u20136, April 2017.","DOI":"10.1109\/ISDFS.2017.7916508"},{"key":"13_CR264","unstructured":"Robert Hegarty, David J Lamb, and Andrew Attwood. Digital evidence challenges in the internet of things. In Tenth International Network Conference (INC 2014), 2014."},{"key":"13_CR286","volume-title":"Fundamentals of Forensic Science","author":"Max Houck","year":"2015","unstructured":"Max Houck and Jay Siegel. Fundamentals of Forensic Science. Academic Press. Elsevier Science & Technology Books, 2015."},{"key":"13_CR302","unstructured":"Joshua James and Eoghan Casey. dfrws2017-challenge. https:\/\/github.com\/dfrws\/dfrws2017-challenge, 2018."},{"key":"13_CR305","volume-title":"Real Digital Forensics: Computer Security and Incident Response","author":"Keith J Jones","year":"2005","unstructured":"Keith J. Jones, Richard Bejtlich, and Curtis W. Rose. Real Digital Forensics: Computer Security and Incident Response. Addison-Wesley Professional, 2005."},{"key":"13_CR318","doi-asserted-by":"crossref","unstructured":"Victor R. Kebande and Indrakshi Ray. A generic digital forensic investigation framework for internet of things (IoT). In 4th IEEE International Conference on Future Internet of Things and Cloud, FiCloud 2016, Vienna, Austria, August 22\u201324, 2016, pages 356\u2013362, 2016.","DOI":"10.1109\/FiCloud.2016.57"},{"key":"13_CR374","unstructured":"Jigang Liu. Iot forensics issues, strategies, and challenges. In A presentation at 12th IDF Annual Conference, 2015."},{"key":"13_CR405","unstructured":"Christopher Meffert, Devon Clark, Ibrahim Baggili, and Frank Breitinger. Forensic state acquisition from internet of things (fsaiot): A general framework and practical approach for iot forensics through iot device state acquisition. In Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES \u201917, pages 56:1\u201356:11, New York, NY, USA, 2017. ACM."},{"key":"13_CR433","unstructured":"Kiran-Kumar Muniswamy-Reddy, David A. Holland, Uri Braun, and Margo Seltzer. Provenance-aware storage systems. In Proceedings of the Annual Conference on USENIX \u201906 Annual Technical Conference, ATEC \u201906, pages 4\u20134, Berkeley, CA, USA, 2006. USENIX Association."},{"key":"13_CR440","doi-asserted-by":"crossref","unstructured":"Ana Nieto, Ruben Rios, and Javier Lopez. A methodology for privacy-aware iot-forensics. In 2017 IEEE Trustcom\/BigDataSE\/ICESS, pages 626\u2013633, Aug 2017.","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.293"},{"key":"13_CR441","doi-asserted-by":"crossref","unstructured":"Ana Nieto, Ruben Rios, and Javier Lopez. Iot-forensics meets privacy: Towards cooperative digital investigations. Sensors, 18(2), 2018.","DOI":"10.3390\/s18020492"},{"issue":"6","key":"13_CR442","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MNET.2016.1600087NM","volume":"30","author":"Ana Nieto","year":"2016","unstructured":"Ana Nieto, Rodrigo Roman, and Javier L\u00f3pez. Digital witness: Safeguarding digital evidence by using secure architectures in personal devices. IEEE Network, 30(6):34\u201341, 2016.","journal-title":"IEEE Network"},{"key":"13_CR455","unstructured":"Edewede Oriwoh, David Jazani, Gregory Epiphaniou, and Paul Sant. Internet of things forensics: Challenges and approaches. In 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20\u201323, 2013, pages 608\u2013615, 2013."},{"key":"13_CR456","doi-asserted-by":"crossref","unstructured":"Edewede Oriwoh and Paul Sant. The forensics edge management system: A concept and design. In 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, UIC\/ATC 2013, Vietri sul Mare, Sorrento Peninsula, Italy, December 18\u201321, 2013, pages 544\u2013550, 2013.","DOI":"10.1109\/UIC-ATC.2013.71"},{"key":"13_CR470","doi-asserted-by":"crossref","unstructured":"Sundresan Perumal, Norita M. Norwawi, and Valliappan Raman. Internet of things (IoT) digital forensic investigation model: Top-down forensic approach methodology. In 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC), pages 19\u201323, Oct 2015.","DOI":"10.1109\/ICDIPC.2015.7323000"},{"key":"13_CR483","unstructured":"Ameer Pichan, Mihai Lazarescu, and Sie Teng Soh. Cloud forensics: Technical challenges, solutions and comparative analysis. Digital Investigation, 13:38\u201357, 2015."},{"key":"13_CR494","unstructured":"KM Sabidur Rahman, Matt Bishop, and Albert Holt. Internet of things mobility forensics. Researchgate. net, 2017."},{"key":"13_CR559","unstructured":"Jevgenijus Toldinas, Algimantas Ven\u010dkauskas, \u0160ar\u016bnas Grigali\u016bnas, Robertas Dama\u0161evi\u010dius, and Vacius Jusas. Suitability of the digital forensic tools for investigation of cyber crime in the internet of things and services. In The 3rd International Virtual Research Conference In Technical Disciplines, pages 86\u201397, October 2015."},{"key":"13_CR572","doi-asserted-by":"crossref","unstructured":"Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl Gunter. Fear and logging in the internet of things. Network and Distributed Systems Symposium, Feb 2018.","DOI":"10.14722\/ndss.2018.23282"},{"issue":"6","key":"13_CR576","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1361-3723(15)30045-2","volume":"2016","author":"Steve Watson","year":"2016","unstructured":"Steve Watson and Ali Dehghantanha. Digital forensics: the missing piece of the internet of things promise. Computer Fraud & Security, 2016(6):5\u20138, 2016.","journal-title":"Computer Fraud & Security"},{"key":"13_CR592","doi-asserted-by":"crossref","unstructured":"Shams Zawoad and Ragib Hasan. FAIoT: Towards building a forensics aware eco system for the internet of things. In 2015 IEEE International Conference on Services Computing, SCC 2015, New York City, NY, USA, June 27 - July 2, 2015, pages 279\u2013284, 2015.","DOI":"10.1109\/SCC.2015.46"},{"key":"13_CR602","unstructured":"Tanveer Zia, Peng Liu, and Weili Han. Application-specific digital forensics investigative model in internet of things (iot). In Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES \u201917, pages 55:1\u201355:7, New York, NY, USA, 2017. ACM."}],"container-title":["Security of Ubiquitous Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-10591-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T15:32:35Z","timestamp":1610638355000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-10591-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030105907","9783030105914"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-10591-4_13","relation":{},"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"15 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}