{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T11:46:50Z","timestamp":1747914410001,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030287511"},{"type":"electronic","value":"9783030287528"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-28752-8_1","type":"book-chapter","created":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T11:02:31Z","timestamp":1565089351000},"page":"3-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A Holistic Forensic Model for the Internet of Things"],"prefix":"10.1007","author":[{"given":"Lakshminarayana","family":"Sadineni","sequence":"first","affiliation":[]},{"given":"Emmanuel","family":"Pilli","sequence":"additional","affiliation":[]},{"given":"Ramesh Babu","family":"Battula","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,7]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"F. Alaba, M. Othman, I. Hashem and F. Alotaibi, Internet of Things security: A survey, Journal of Network and Computer Applications, vol. 88, pp. 10\u201328, 2017.","DOI":"10.1016\/j.jnca.2017.04.002"},{"key":"1_CR2","unstructured":"M. Ali, J. Nelson, R. Shea and M. Freedman, Blockstack: A global naming and storage system secured by blockchains, Proceedings of the USENIX Annual Technical Conference, pp. 181\u2013194, 2016."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"E. Al-Masri, Y. Bai and J. Li, A fog-based digital forensics investigation framework for IoT systems, Proceedings of the Third IEEE International Conference on Smart Cloud, pp. 196\u2013201, 2018.","DOI":"10.1109\/SmartCloud.2018.00040"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"V. Asati, E. Pilli, S. Vipparthi, S. Garg, S. Singhal and S. Pancholi, RMDD: Cross-layer attack in Internet of Things, Proceedings of the International Conference on Advances in Computing, Communications and Informatics, pp. 172\u2013178, 2018.","DOI":"10.1109\/ICACCI.2018.8554471"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"L. Babun, A. Sikder, A. Acar and A. Uluagac, IoTDots: A Digital Forensics Framework for Smart Environments, arXiv:1809.00745 (arxiv.org\/abs\/1809.00745), 2018.","DOI":"10.1145\/3317549.3326317"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"M. Banerjee, J. Lee and K. Choo, A blockchain future for Internet of Things security: A position paper, Digital Communications and Networks, vol. 4(3), pp. 149\u2013160, 2018.","DOI":"10.1016\/j.dcan.2017.10.006"},{"issue":"3","key":"1_CR7","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MITP.2018.032501747","volume":"20","author":"M Chernyshev","year":"2018","unstructured":"M. Chernyshev, S. Zeadally, Z. Baig and A. Woodward, Internet of Things forensics: The need, process models and open issues, IT Professional, vol. 20(3), pp. 40\u201349, 2018.","journal-title":"IT Professional"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"M. Conti, A. Dehghantanha, K. Franke and S. Watson, Internet of Things security and forensics: Challenges and opportunities, Future Generation Computer Systems, vol. 78(2), pp. 544\u2013546, 2018.","DOI":"10.1016\/j.future.2017.07.060"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"K. Dolui and S. Datta, Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing, Proceedings of the Global Internet of Things Summit, 2017.","DOI":"10.1109\/GIOTS.2017.8016213"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"T. Fernandez-Carames and P. Fraga-Lamas, A review of the use of blockchain for the Internet of Things, IEEE Access, vol. 6, pp. 32979\u201333001, 2018.","DOI":"10.1109\/ACCESS.2018.2842685"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"M. Harbawi and A. Varol, An improved digital evidence acquisition model for Internet of Things forensics I: A theoretical framework, Proceedings of the Fifth International Symposium on Digital Forensics and Security, 2017.","DOI":"10.1109\/ISDFS.2017.7916508"},{"key":"1_CR12","unstructured":"R. Hegarty, D. Lamb and A. Attwood, Digital evidence challenges in the Internet of Things, Proceedings of the Ninth International Workshop on Digital Forensics and Incident Analysis, pp. 163\u2013172, 2014."},{"key":"1_CR13","unstructured":"International Organization for Standardization and International Telecommunication Union, ISO\/IEC 27043:2015: Information Technology \u2013 Security Techniques \u2013 Incident Investigation Principles and Processes, Geneva, Switzerland, 2015."},{"key":"1_CR14","unstructured":"International Telecommunication Union, Recommendation ITU-T Y.2060: Overview of the Internet of Things, Geneva, Switzerland, 2012."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"V. Kebande and I. Ray, A generic digital forensic investigation framework for Internet of Things (IoT), Proceedings of the Fourth IEEE International Conference on Future Internet of Things and Cloud, pp. 356\u2013362, 2016.","DOI":"10.1109\/FiCloud.2016.57"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"C. Meffert, D. Clark, I. Baggili and F. Breitinger, Forensic state acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition, Proceedings of the Twelfth International Conference on Availability, Reliability and Security, article no. 65, 2017.","DOI":"10.1145\/3098954.3104053"},{"key":"1_CR17","unstructured":"R. Minerva, A. Biru and D. Rotondi, Towards a Definition of the Internet of Things (IoT), Revision 1, IEEE Internet Initiative, Piscataway, New Jersey (http:\/\/www.iot.ieee.org\/images\/files\/pdf\/IEEE_IoT_Towards_Definition_Internet_of_Things_Revision1_27MAY15.pdf)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"E. Oriwoh and P. Sant, The Forensics Edge Management System: A concept and design, Proceedings of the Tenth IEEE International Conference on Ubiquitous Intelligence and Computing and the Tenth IEEE International Conference on Autonomic and Trusted Computing, pp. 544\u2013550, 2013.","DOI":"10.1109\/UIC-ATC.2013.71"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"S. Perumal, N. Norwawi and V. Raman, Internet of Things (IoT) digital forensic investigation model: Top-down forensic approach methodology, Proceedings of the Fifth International Conference on Digital Information Processing and Communications, pp. 19\u201323, 2015.","DOI":"10.1109\/ICDIPC.2015.7323000"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"C. Shin, P. Chandok, R. Liu, S. Nielson and T. Leschke, Potential forensic analysis of IoT data: An overview of the state-of-the-art and future possibilities, Proceedings of the IEEE International Conference on the Internet of Things, IEEE Green Computing and Communications, IEEE Cyber, Physical and Social Computing and IEEE Smart Data, pp. 705\u2013710, 2017.","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.182"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"S. Watson and A. Dehghantanha, Digital forensics: The missing piece of the Internet of Things promise, Computer Fraud and Security, vol. 2016(6), pp. 5\u20138, 2016.","DOI":"10.1016\/S1361-3723(15)30045-2"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"K. Yeow, A. Gani, R. Ahmad, J. Rodrigues and K. Ko, Decentralized consensus for edge-centric Internet of Things: A review, taxonomy and research issues, IEEE Access, vol. 6, pp. 1513\u20131524, 2017.","DOI":"10.1109\/ACCESS.2017.2779263"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"S. Zawoad and R. Hasan, FAIoT: Towards building a forensics aware ecosystem for the Internet of Things, Proceedings of the IEEE International Conference on Services Computing, pp. 279\u2013284, 2015.","DOI":"10.1109\/SCC.2015.46"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"T. Zia, P. Liu and W. Han, Application-specific digital forensics investigative model in Internet of Things (IoT), Proceedings of the Twelfth International Conference on Availability, Reliability and Security, article no. 55, 2017.","DOI":"10.1145\/3098954.3104052"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-28752-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,6]],"date-time":"2023-08-06T00:06:11Z","timestamp":1691280371000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-28752-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030287511","9783030287528"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-28752-8_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"7 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 January 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 January 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/ConferenceProgramCommittee2019.pdf","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}