{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:45:47Z","timestamp":1726044347084},"publisher-location":"Cham","reference-count":96,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319923833"},{"type":"electronic","value":"9783319923840"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-92384-0_6","type":"book-chapter","created":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T10:08:42Z","timestamp":1568801322000},"page":"171-207","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Digital Forensics for IoT and WSNs"],"prefix":"10.1007","author":[{"given":"Umit","family":"Karabiyik","sequence":"first","affiliation":[]},{"given":"Kemal","family":"Akkaya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,19]]},"reference":[{"issue":"12","key":"6_CR1","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MC.2012.325","volume":"45","author":"I Ahmed","year":"2012","unstructured":"Ahmed, I., Obermeier, S., Naedele, M., Richard III, G.G.: Scada systems: challenges for forensic investigators. Computer 45(12), 44\u201351 (2012)","journal-title":"Computer"},{"issue":"3","key":"6_CR2","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.adhoc.2003.09.010","volume":"3","author":"K Akkaya","year":"2005","unstructured":"Akkaya, K., Younis, M.: A survey on routing protocols for wireless sensor networks. Ad Hoc Netw. 3(3), 325\u2013349 (2005)","journal-title":"Ad Hoc Netw."},{"issue":"8","key":"6_CR3","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102\u2013114 (2002)","journal-title":"IEEE Commun. Mag."},{"key":"6_CR4","unstructured":"Alba, A.: Police, attorneys are using fitness trackers as court evidence (2016). http:\/\/www.nydailynews.com\/news\/national\/police-attorneys-fitness-trackers-court-evidence-article-1.2607432"},{"key":"6_CR5","unstructured":"Anderson, D.: White paper: red hat crash utility (2008)"},{"issue":"5","key":"6_CR6","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1016\/j.comnet.2004.06.007","volume":"46","author":"A Arora","year":"2004","unstructured":"Arora, A., Dutta, P., Bapat, S., Kulathumani, V., Zhang, H., Naik, V., Mittal, V., Cao, H., Demirbas, M., Gouda, M., et al.: A line in the sand: a wireless sensor network for target detection, classification, and tracking. Comput. Netw. 46(5), 605\u2013634 (2004)","journal-title":"Comput. Netw."},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Arora, M., Challa, R.K., Bansal, D.: Performance evaluation of routing protocols based on wormhole attack in wireless mesh networks. In: Second International Conference on Computer and Network Technology, pp. 102\u2013104. IEEE (2010)","DOI":"10.1109\/ICCNT.2010.34"},{"issue":"7","key":"6_CR8","first-page":"97","volume":"22","author":"K Ashton","year":"2009","unstructured":"Ashton, K.: That internet of things thing. RFiD J. 22(7), 97\u2013114 (2009)","journal-title":"RFiD J."},{"issue":"15","key":"6_CR9","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Ayers, R., Brothers, S., Jansen, W.: Guidelines on Mobile Device Forensics (draft), vol. 800, p. 101. NIST Special Publication (2013)","DOI":"10.6028\/NIST.SP.800-101r1"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Baccelli, E., Hahm, O., Gunes, M., Wahlisch, M., Schmidt, T.C.: Riot os: towards an os for the internet of things. In: 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 79\u201380. IEEE (2013)","DOI":"10.1109\/INFCOMW.2013.6970748"},{"issue":"7","key":"6_CR12","doi-asserted-by":"publisher","first-page":"1655","DOI":"10.1016\/j.comcom.2006.12.020","volume":"30","author":"P Baronti","year":"2007","unstructured":"Baronti, P., Pillai, P., Chook, V.W., Chessa, S., Gotta, A., Hu, Y.F.: Wireless sensor networks: A survey on the state of the art and the 802.15. 4 and zigbee standards. Comput. Commun. 30(7), 1655\u20131695 (2007)","journal-title":"Comput. Commun."},{"key":"6_CR13","unstructured":"S. Bluetooth: Bluetooth specification version 1.1 (2001). http:\/\/www.bluetooth.com"},{"key":"6_CR14","unstructured":"Boyer, S.A.: SCADA: Supervisory Control and Data Acquisition. International Society of Automation (2009)"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"S65","DOI":"10.1016\/j.diin.2008.05.008","volume":"5","author":"A Case","year":"2008","unstructured":"Case, A., Cristina, A., Marziale, L., Richard, G.G., Roussev, V.: Face: automated digital evidence discovery and correlation. Digital Invest. 5, S65\u2013S75 (2008)","journal-title":"Digital Invest."},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Chen, Y.-K.: Challenges and opportunities of internet of things. In: 17th Asia and South Pacific Design Automation Conference, pp. 383\u2013388. IEEE (2012)","DOI":"10.1109\/ASPDAC.2012.6164978"},{"key":"6_CR17","unstructured":"Christin, D., Reinhardt, A., Mogre, P.S., Steinmetz, R., et al.: Wireless sensor networks and the internet of things: selected challenges. In: Proceedings of the 8th GI\/ITG KuVS Fachgespr\u00e4ch Drahtlose sensornetze, pp. 31\u201334 (2009)"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Clarke, G.R., Reynders, D., Wright, E.: Practical modern SCADA protocols: DNP3, 60870.5 and related systems, Newnes (2004)","DOI":"10.1016\/B978-075065799-0\/50019-X"},{"key":"6_CR19","unstructured":"Committee, I.S., et al.: Isa100. 11a, wireless systems for industrial automation: process control and related applications. Technical Report, Research Triangle Park, North Carolina (2009)"},{"key":"6_CR20","unstructured":"C. Computing: Toward a multi-tenancy authorization system for cloud services (2010)"},{"key":"6_CR21","unstructured":"Cyr, B., Horn, W., Miao, D., Specter, M.: Security analysis of wearable fitness devices (fitbit), p. 1. Massachusets Institute of Technology (2014)"},{"issue":"4","key":"6_CR22","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/MCOM.2006.1632658","volume":"44","author":"I Demirkol","year":"2006","unstructured":"Demirkol, I., Ersoy, C., Alagoz, F.: Mac protocols for wireless sensor networks: a survey. IEEE Commun. Mag. 44(4), 115\u2013121 (2006)","journal-title":"IEEE Commun. Mag."},{"key":"6_CR23","unstructured":"I. Devices. Various iot devices (2016). http:\/\/iotlist.co"},{"key":"6_CR24","unstructured":"DoJ: Electronic crime scene investigation: a guide for first responders (2001)"},{"key":"6_CR25","unstructured":"Dunkels, A., Gronvall, B., Voigt, T.: Contiki-a lightweight and flexible operating system for tiny networked sensors. In: 2004 29th Annual IEEE International Conference on Local Computer Networks, pp. 455\u2013462. IEEE (2004)"},{"key":"6_CR26","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-319-33331-1_3","volume-title":"Critical Information Infrastructures Security","author":"Peter Eden","year":"2016","unstructured":"Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Soulsby, H., Stoddart, K.: A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure, pp. 27\u201339. Springer International Publishing, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33331-1_3 . ISBN 978-3-319-33331-1"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Estrin, D., Govindan, R., Heidemann, J., Kumar, S.: Next century challenges: scalable coordination in sensor networks. In: Proceedings of the 5th annual ACM\/IEEE International Conference on Mobile Computing and Networking, pp. 263\u2013270. ACM (1999)","DOI":"10.1145\/313451.313556"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Gaura, E., Newman, R.: Smart MEMS and Sensor Systems. World Scientific (2006)","DOI":"10.1142\/p355"},{"key":"6_CR29","unstructured":"Google: Android things (2016). https:\/\/developer.android.com\/things\/index.html"},{"key":"6_CR30","unstructured":"Google: Google trends (2016). https:\/\/www.google.com\/trends"},{"issue":"7","key":"6_CR31","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (iot): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Future Gener. Comput. Syst."},{"key":"6_CR32","unstructured":"Hegarty, R., Lamb, D., Attwood, A.: Digital evidence challenges in the internet of things. In: Proceedings of the Tenth International Network Conference (INC 2014), p. 163 (2014). www.Lulu.com"},{"key":"6_CR33","unstructured":"Hosain, S.: Reality check: 50b iot devices connected by 2020 beyond the hype and into reality (2016). http:\/\/www.rcrwireless.com\/20160628\/opinion\/reality-check-50b-iot-devices-connected-2020-beyond-hype-reality"},{"key":"6_CR34","unstructured":"iFixit. Fitbit flex teardown (2016). https:\/\/www.ifixit.com\/Teardown\/Fitbit+Flex+Teardown\/16050"},{"key":"6_CR35","unstructured":"B. Intelligence: Chip-off forensics (2016). http:\/\/www.binaryintel.com\/services\/jtag-chip-off-forensics\/chip-off_forensics\/"},{"issue":"5","key":"6_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14257\/ijdta.2013.6.5.01","volume":"6","author":"A Jahanbin","year":"2013","unstructured":"Jahanbin, A., Ghafarian, A., Seno, S.A.H., Nikookar, S.: Computer forensics approach based on autonomous intelligent multi-agent system. Int. J. Database Theory Appl. 6(5), 1\u201312 (2013)","journal-title":"Int. J. Database Theory Appl."},{"issue":"2","key":"6_CR37","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1109\/TII.2014.2306384","volume":"10","author":"L Jiang","year":"2014","unstructured":"Jiang, L., Da Xu, L., Cai, H., Jiang, Z., Bu, F., Xu, B.: An iot-oriented data storage framework in cloud computing platform. IEEE Trans. Ind. Inform. 10(2), 1443\u20131451 (2014)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"6","key":"6_CR38","doi-asserted-by":"publisher","first-page":"589750","DOI":"10.1155\/2013\/589750","volume":"9","author":"Y Jiang","year":"2013","unstructured":"Jiang, Y., Zhang, L., Wang, L.: Wireless sensor networks and the internet of things. Int. J. Distrib. Sens. Netw. 9(6), 589750 (2013). https:\/\/doi.org\/10.1155\/2013\/589750","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"6_CR39","unstructured":"Karabiyik, U.: Building an intelligent assistant for digital forensics. Ph.D Thesis, The Florida State University (2015)"},{"issue":"2","key":"6_CR40","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1109\/JSYST.2014.2322503","volume":"9","author":"SK Khaitan","year":"2015","unstructured":"Khaitan, S.K., McCalley, J.D.: Design techniques and applications of cyberphysical systems: a survey. IEEE Syst. J. 9(2), 350\u2013365 (2015)","journal-title":"IEEE Syst. J."},{"issue":"2","key":"6_CR41","first-page":"4","volume":"9","author":"A Kleinmann","year":"2014","unstructured":"Kleinmann, A., Wool, A.: Accurate modeling of the siemens s7 scada protocol for intrusion detection and digital forensics. J. Digit. Forensics Secur. Law 9(2), 4 (2014)","journal-title":"J. Digit. Forensics Secur. Law"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Ko, J., Terzis, A., Dawson-Haggerty, S., Culler, D.E., Hui, J.W., Levis, P.: Connecting low-power and lossy networks to the internet. IEEE Commun. Mag. 49(4) (2011)","DOI":"10.1109\/MCOM.2011.5741163"},{"key":"6_CR43","unstructured":"Koll\u00e1r, I.: Forensic Ram Dump Image Analyzer (2010)"},{"key":"6_CR44","unstructured":"Krutz, R.L.: Securing SCADA Systems. Wiley (2005)"},{"key":"6_CR45","doi-asserted-by":"publisher","first-page":"S66","DOI":"10.1016\/j.diin.2014.05.005","volume":"11","author":"V Kumar","year":"2014","unstructured":"Kumar, V., Oikonomou, G., Tryfonas, T., Page, D., Phillips, I.: Digital investigations for ipv6-based wireless sensor networks. Digit. Investig. 11, S66\u2013S75 (2014)","journal-title":"Digit. Investig."},{"key":"6_CR46","doi-asserted-by":"crossref","unstructured":"Kumar, V., Oikonomou, G., Tryfonas, T.: Traffic forensics for ipv6-based wireless sensor networks and the internet of things. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 633\u2013638. IEEE (2016)","DOI":"10.1109\/WF-IoT.2016.7845515"},{"key":"6_CR47","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-27139-2_7","volume":"35","author":"P Levis","year":"2005","unstructured":"Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., et al.: Tinyos: an operating system for sensor networks. Ambient Intell. 35, 115\u2013148 (2005)","journal-title":"Ambient Intell."},{"issue":"10","key":"6_CR48","doi-asserted-by":"publisher","first-page":"3677","DOI":"10.1109\/JSEN.2013.2262271","volume":"13","author":"F Li","year":"2013","unstructured":"Li, F., Xiong, P.: Practical secure communication for integrating wireless sensor networks into the internet of things. IEEE Sens. J. 13(10), 3677\u20133684 (2013)","journal-title":"IEEE Sens. J."},{"key":"6_CR49","doi-asserted-by":"crossref","unstructured":"Li, T., Liu, Y., Tian, Y., Shen, S., Mao, W.: A storage solution for massive iot data based on nosql. In: 2012 IEEE International Conference on Green Computing and Communications (GreenCom), pp. 50\u201357. IEEE (2012)","DOI":"10.1109\/GreenCom.2012.18"},{"key":"6_CR50","unstructured":"Mainetti, L., Patrono, L., Vilei, A.: Evolution of wireless sensor networks towards the internet of things: a survey. In: 2011 19th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1\u20136. IEEE (2011)"},{"key":"6_CR51","unstructured":"Manjrasoft: Aneka: enabling .net-based enterprise grid and cloud computing (2016). http:\/\/www.manjrasoft.com"},{"key":"6_CR52","unstructured":"Minerva, R., Biru, A., Rotondi, D.: Towards a definition of the internet of things (iot). IEEE Internet Initiative 1 (2015)"},{"issue":"7","key":"6_CR53","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497\u20131516 (2012)","journal-title":"Ad Hoc Netw."},{"key":"6_CR54","unstructured":"I. Modbus: Modbus application protocol specification v1. 1a. North Grafton, Massachusetts (2004). www.modbus.org\/specs.php"},{"key":"6_CR55","unstructured":"Mouton, F., Venter, H.: A secure communication protocol for wireless sensor networks. In: Proceedings of the Annual Security Conference, Security Assurance and Privacy: Organizational Challenges, Las Vegas (2009)"},{"key":"6_CR56","doi-asserted-by":"crossref","unstructured":"Mouton, F., Venter, H.: A prototype for achieving digital forensic readiness on wireless sensor networks. In: AFRICON, pp. 1\u20136. IEEE (2011)","DOI":"10.1109\/AFRCON.2011.6072117"},{"key":"6_CR57","unstructured":"Mouton, F., Venter, H.S.: Requirements for wireless sensor networks in order to achieve digital forensic readiness. In: WDFIA, pp. 108\u2013121 (2011)"},{"key":"6_CR58","unstructured":"Muniswamy-Reddy, K.-K., Holland, D.A., Braun, U., Seltzer, M.I.: Provenance-aware storage systems. In: USENIX Annual Technical Conference, General Track, pp. 43\u201356 (2006)"},{"key":"6_CR59","unstructured":"News4JAX: Fitness tracker data used in court cases (2016). http:\/\/www.click2houston.com\/news\/fitness-tracker-data-used-in-court-cases"},{"issue":"2","key":"6_CR60","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.diin.2007.06.001","volume":"4","author":"BJ Nikkel","year":"2007","unstructured":"Nikkel, B.J.: An introduction to investigating ipv6 networks. Digit. Invest. 4(2), 59\u201367 (2007)","journal-title":"Digit. Invest."},{"key":"6_CR61","unstructured":"OpenEmbedded: Openembedded, the build framework for embedded linux (2017). http:\/\/www.openembedded.org\/wiki\/Main_Page"},{"key":"6_CR62","doi-asserted-by":"crossref","unstructured":"Oriwoh, E.,Sant, P.: The forensics edge management system: a concept and design. In: Ubiquitous Intelligence and Computing, 2013 IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing (UIC\/ATC), pp. 544\u2013550. IEEE (2013)","DOI":"10.1109\/UIC-ATC.2013.71"},{"key":"6_CR63","unstructured":"Patzlaff, H.: D7. 1 preliminary report on forensic analysis for industrial systems. In: CRISALIS Consortium, Symantec, Sophia Antipolis, France (2013)"},{"key":"6_CR64","unstructured":"Pe\u00f1a-L\u00f3pez, I.: ITU internet report 2005: the internet of things (2005)"},{"key":"6_CR65","doi-asserted-by":"crossref","unstructured":"Pereira, P.P., Eliasson, J., Kyusakov, R., Delsing, J., Raayatinezhad, A., Johansson, M.: Enabling cloud connectivity for mobile internet of things applications. In: 2013 IEEE 7th International Symposium on Service Oriented System Engineering (SOSE), pp. 518\u2013526. IEEE (2013)","DOI":"10.1109\/SOSE.2013.33"},{"key":"6_CR66","doi-asserted-by":"crossref","unstructured":"Perumal, S., Norwawi, N.M., Raman, V.: Internet of things (iot) digital forensic investigation model: top-down forensic approach methodology. In: 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 19\u201323. IEEE (2015)","DOI":"10.1109\/ICDIPC.2015.7323000"},{"key":"6_CR67","doi-asserted-by":"crossref","unstructured":"Rabieh, K., Akkaya, K., Karabiyik, U., Qamruddin, J.: A secure and cloud-based medical records access scheme for on-road emergencies. In: 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/CCNC.2018.8319175"},{"key":"6_CR68","doi-asserted-by":"crossref","unstructured":"Rajkumar, R.R., Lee, I., Sha, L., Stankovic, J.: Cyber-physical systems: the next computing revolution. In: Proceedings of the 47th Design Automation Conference, pp. 731\u2013736. ACM (2010)","DOI":"10.1145\/1837274.1837461"},{"key":"6_CR69","doi-asserted-by":"crossref","unstructured":"Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics. In: IFIP International Conference on Digital Forensics, pp. 35\u201346. Springer (2011)","DOI":"10.1007\/978-3-642-24212-0_3"},{"key":"6_CR70","unstructured":"Saltaformaggio, B., Bhatia, R., Zhang, X., Xu, D., Richard III, G.G.: Screen after previous screens: Spatial-temporal recreation of android app displays from memory images. In: USENIX Security Symposium, pp. 1137\u20131151 (2016)"},{"key":"6_CR71","doi-asserted-by":"crossref","unstructured":"Shahzad, A., Musa, S., Aborujilah, A., Irfan, M.: Industrial control systems (icss) vulnerabilities analysis and scada security enhancement using testbed encryption. In: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, pp. 7. ACM (2014)","DOI":"10.1145\/2557977.2558061"},{"key":"6_CR72","unstructured":"Shelby, Z., Bormann, C.: 6LoWPAN: the wireless embedded Internet, vol. 43. Wiley (2011)"},{"issue":"6","key":"6_CR73","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MWC.2013.6704479","volume":"20","author":"Z Sheng","year":"2013","unstructured":"Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., Leung, K.: A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities. IEEE Wirel. Commun. 20(6), 91\u201398 (2013)","journal-title":"IEEE Wirel. Commun."},{"key":"6_CR74","unstructured":"Siegal, J.: One Womans Fitbit just Decided a Criminal Case (2016). http:\/\/bgr.com\/2016\/04\/20\/fitbit-fitness-tracker-legal-case\/"},{"key":"6_CR75","unstructured":"SiliconLabs: Battery size matters (2016). http:\/\/www.silabs.com\/products\/wireless\/Pages\/battery-life-in-connected-wireless-iot-devices.aspx"},{"key":"6_CR76","unstructured":"Skorobogatov, S.: The bumpy road towards iphone 5c nand mirroring (2016). arXiv:1609.04327"},{"key":"6_CR77","unstructured":"Song, J., Han, S., Mok, A., Chen, D., Lucas, M., Nixon, M., Pratt, W.: Wirelesshart: applying wireless technology in real-time industrial process control. In: Real-Time and Embedded Technology and Applications Symposium, 2008. RTAS\u201908. IEEE, pp. 377\u2013386. IEEE (2008)"},{"key":"6_CR78","unstructured":"Stirland, J., Jones, K., Janicke, H., Wu, T.: Developing cyber forensics for scada industrial control systems. In: The International Conference on Information Security and Cyber Forensics (InfoSec2014), pp. 98\u2013111. The Society of Digital Information and Wireless Communication (2014)"},{"key":"6_CR79","unstructured":"Stouffer, K., Falco, J., Scarfone, K.: Guide to Industrial Control Systems (ICS) Security, vol. 800, no. 82, pp. 16\u201316. NIST Special Publication (2011)"},{"key":"6_CR80","unstructured":"Sundmaeker, H., Guillemin, P., Friess, P., Woelffl\u00e9, S.: Vision and challenges for realising the internet of things. Cluster of European Research Projects on the Internet of Things, European Commision (2010)"},{"key":"6_CR81","unstructured":"Swauger, J.: Chip-off Forensics (2012)"},{"issue":"3","key":"6_CR82","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.diin.2011.10.003","volume":"8","author":"J Sylve","year":"2012","unstructured":"Sylve, J., Case, A., Marziale, L., Richard, G.G.: Acquisition and analysis of volatile memory from android devices. Digit. Invest. 8(3), 175\u2013184 (2012)","journal-title":"Digit. Invest."},{"key":"6_CR83","doi-asserted-by":"crossref","unstructured":"Szewczyk, R., Mainwaring, A., Polastre, J., Anderson, J., Culler, D.: An analysis of a large scale habitat monitoring application. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 214\u2013226. ACM (2004)","DOI":"10.1145\/1031495.1031521"},{"key":"6_CR84","unstructured":"Tan, J.: Forensic Readiness. Cambridge, MA, Stake, pp. 1\u201323 (2001)"},{"key":"6_CR85","unstructured":"Taveras, P.: Scada live forensics: real time data acquisition process to detect, prevent or evaluate critical situations. Eur. Sci. J. ESJ, 9(21) (2013)"},{"key":"6_CR86","unstructured":"Tillman, K.: How many internet connections are in the world? right now (2013). http:\/\/blogs.cisco.com\/news\/cisco-connections-counter"},{"key":"6_CR87","doi-asserted-by":"crossref","unstructured":"Triki, B., Rekhis, S., Boudriga, N.: Digital investigation of wormhole attacks in wireless sensor networks. In: 2009 Eighth IEEE International Symposium on Network Computing and Applications, NCA 2009, pp. 179\u2013186. IEEE (2009)","DOI":"10.1109\/NCA.2009.10"},{"key":"6_CR88","doi-asserted-by":"crossref","unstructured":"Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless sensor network security: a survey. In: Security in Distributed, Grid, Mobile, and Pervasive Computing vol. 1, p. 367 (2007)","DOI":"10.1201\/9780849379253.ch16"},{"issue":"3","key":"6_CR89","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MNET.2006.1637930","volume":"20","author":"C Wang","year":"2006","unstructured":"Wang, C., Sohraby, K., Li, B., Daneshmand, M., Hu, Y.: A survey of transport protocols for wireless sensor networks. IEEE Netw. 20(3), 34\u201340 (2006)","journal-title":"IEEE Netw."},{"issue":"2","key":"6_CR90","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MIC.2006.26","volume":"10","author":"G Werner-Allen","year":"2006","unstructured":"Werner-Allen, G., Lorincz, K., Ruiz, M., Marcillo, O., Johnson, J., Lees, J., Welsh, M.: Deploying a wireless sensor network on an active volcano. IEEE Internet Comput. 10(2), 18\u201325 (2006)","journal-title":"IEEE Internet Comput."},{"key":"6_CR91","unstructured":"Williams, W.: How friday\u2019s cyberattack shut down netflix, twitter, and spotify (2016). http:\/\/www.csmonitor.com\/Technology\/2016\/1023\/How-Friday-s-cyberattack-shut-down-Netflix-Twitter-and-Spotify"},{"key":"6_CR92","doi-asserted-by":"crossref","unstructured":"Wu, T., Disso, J.F.P., Jones, K., Campos, A.: Towards a scada forensics architecture. In: Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security Research 2013, pp. 12\u201321. BCS (2013)","DOI":"10.14236\/ewic\/ICSCSR2013.2"},{"issue":"8","key":"6_CR93","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"N Xu","year":"2002","unstructured":"Xu, N.: A survey of sensor network applications. IEEE Commun. Mag. 40(8), 102\u2013114 (2002)","journal-title":"IEEE Commun. Mag."},{"key":"6_CR94","doi-asserted-by":"crossref","unstructured":"Yang, H., Zhuge, J., Liu, H., Liu, W.: A tool for volatile memory acquisition from android devices. In: IFIP International Conference on Digital Forensics, pp. 365\u2013378. Springer (2016)","DOI":"10.1007\/978-3-319-46279-0_19"},{"key":"6_CR95","doi-asserted-by":"crossref","unstructured":"Zaharis, A., Martini, A.I., Perlepes, L., Stamoulis, G., Kikiras, P.: Live forensics framework for wireless sensor nodes using sandboxing. In: Proceedings of the 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks, pp. 70\u201377. ACM (2010)","DOI":"10.1145\/1868630.1868643"},{"key":"6_CR96","doi-asserted-by":"crossref","unstructured":"Zawoad, S., Hasan, R.: Faiot: Towards building a forensics aware eco system for the internet of things. In: 2015 IEEE International Conference on Services Computing (SCC), pp. 279\u2013284. IEEE (2015)","DOI":"10.1109\/SCC.2015.46"}],"container-title":["Studies in Systems, Decision and Control","Mission-Oriented Sensor Networks and Systems: Art and Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92384-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,7]],"date-time":"2019-12-07T08:55:00Z","timestamp":1575708900000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92384-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783319923833","9783319923840"],"references-count":96,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92384-0_6","relation":{},"ISSN":["2198-4182","2198-4190"],"issn-type":[{"type":"print","value":"2198-4182"},{"type":"electronic","value":"2198-4190"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"19 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}