{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:12:34Z","timestamp":1772554354329,"version":"3.50.1"},"reference-count":254,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:00:00Z","timestamp":1619568000000},"content-version":"vor","delay-in-days":117,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality and comfort. IoT has contributed significantly to numerous application areas. The stormy expansion of smart devices and their credence for data transfer using wireless mechanics boost their susceptibility to cyberattacks. Consequently, the cybercrime rate is increasing day by day. Hence, the study of IoT security threats and possible corrective measures can benefit researchers in identifying appropriate solutions to deal with various challenges in cybercrime investigation. IoT forensics plays a vital role in cybercrime investigations. This review paper presents an overview of the IoT framework consisting of IoT architecture, protocols, and technologies. Various security issues at each layer and corrective measures are also discussed in detail. This paper also presents the role of IoT forensics in cybercrime investigation in various domains like smart homes, smart cities, automated vehicles, and healthcare. The role of advanced technologies like artificial intelligence, machine learning, cloud computing, edge computing, fog computing, and blockchain technology in cybercrime investigation is also discussed. Lastly, various open research challenges in IoT to assist cybercrime investigation are explained to provide a new direction for further research.<\/jats:p>","DOI":"10.1155\/2021\/5579148","type":"journal-article","created":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T18:33:26Z","timestamp":1619634806000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2778-0214","authenticated-orcid":false,"given":"Sita","family":"Rani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5634-3465","authenticated-orcid":false,"given":"Aman","family":"Kataria","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7470-6506","authenticated-orcid":false,"given":"Vishal","family":"Sharma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2943-5908","authenticated-orcid":false,"given":"Smarajit","family":"Ghosh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3760-9480","authenticated-orcid":false,"given":"Vinod","family":"Karar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3551-6130","authenticated-orcid":false,"given":"Kyungroul","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2276-2378","authenticated-orcid":false,"given":"Chang","family":"Choi","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,4,28]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2953364"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2856368"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"e_1_2_11_4_2","doi-asserted-by":"crossref","unstructured":"Forsstr\u00f6mS. ButunI. EldefrawyM. JennehagU. andGidlundM. Challenges of securing the industrial internet of things value chain 2018 Workshop on Metrology for Industry 4.0 and IoT April 2018 Brescia Italy 218\u2013223 https:\/\/doi.org\/10.1109\/metroi4.2018.8428344 2-s2.0-85052506472.","DOI":"10.1109\/METROI4.2018.8428344"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42559-7"},{"key":"e_1_2_11_6_2","volume-title":"Cyber-physical Systems: Foundations, Principles and Applications","author":"Song H.","year":"2016"},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3034096"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20185084"},{"key":"e_1_2_11_9_2","doi-asserted-by":"publisher","DOI":"10.1049\/el.2016.3487"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7850-7"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2869847"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.01.012"},{"key":"e_1_2_11_13_2","doi-asserted-by":"crossref","unstructured":"KebandeV. R. KarieN. M. MichaelA. MalapaneS. M. G. andVenterH. S. How an IoT-enabled \u201csmart refrigerator\u201d can play a clandestine role in perpetuating cyber-crime 2017 IST-Africa Week Conference (IST-Africa) May 2017 Windhoek Namibia 1\u201310 https:\/\/doi.org\/10.23919\/istafrica.2017.8102362 2-s2.0-85030449510.","DOI":"10.23919\/ISTAFRICA.2017.8102362"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.10.012"},{"key":"e_1_2_11_15_2","first-page":"735","volume-title":"Advances in Electromechanical Technologies","author":"Singholi A. K."},{"key":"e_1_2_11_16_2","doi-asserted-by":"crossref","unstructured":"AbdullahA. HamadR. AbdulrahmanM. MoalaH. andElkhediriS. CyberSecurity: a review of internet of things (IoT) security issues challenges and techniques 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS) May 2019 Riyadh Saudi Arabia 1\u20136 https:\/\/doi.org\/10.1109\/cais.2019.8769560 2-s2.0-85073889332.","DOI":"10.1109\/CAIS.2019.8769560"},{"key":"e_1_2_11_17_2","first-page":"460","article-title":"A review of cyber-crime in internet of things: technologies, investigation methods and digital forensics","volume":"4","author":"Ven\u010dkauskas A.","year":"2015","journal-title":"International Journal of Engineering Sciences and Research Technology"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.027"},{"key":"e_1_2_11_19_2","first-page":"34","article-title":"Vision and challenges for realising the internet of things","volume":"3","author":"Sundmaeker H.","year":"2010","journal-title":"Cluster of European Research Projects on the Internet of Things, European Commision"},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.384"},{"key":"e_1_2_11_21_2","unstructured":"LiebrandK. MoserK. Kn\u00fcsliS. CopigneauxB. Le GallF. AndrushevichP. S. A. andMelakessouF. Ethics privacy and data protection in BUTLER Project Title: Ubiquitous Secure Internet-of-Things with Location and Contex-Awareness Project No: 287901 2013 SWC."},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9060923"},{"key":"e_1_2_11_23_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2018.090596"},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700434"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.809"},{"key":"e_1_2_11_26_2","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.4.07"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"e_1_2_11_28_2","article-title":"The council of Europe\u2019s cyber crime treaty: an exercise in symbolic legislation","volume":"4","author":"Marion N. E.","year":"2010","journal-title":"International Journal of Cyber Criminology"},{"key":"e_1_2_11_29_2","first-page":"202","article-title":"Cyber-crimes and their impacts: a review","volume":"2","author":"Saini H.","year":"2012","journal-title":"International Journal of Engineering Research and Applications"},{"key":"e_1_2_11_30_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.331"},{"key":"e_1_2_11_31_2","first-page":"1","article-title":"Opportunity makes the thief","volume":"98","author":"Felson M.","year":"1998","journal-title":"Police Research Series, Paper"},{"key":"e_1_2_11_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_2_11_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"e_1_2_11_34_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18061888"},{"key":"e_1_2_11_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_2_11_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6309-2_12"},{"key":"e_1_2_11_37_2","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2013.09.007"},{"key":"e_1_2_11_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2013.042313.00197"},{"key":"e_1_2_11_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"e_1_2_11_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"e_1_2_11_41_2","doi-asserted-by":"crossref","unstructured":"AbomharaM.andK\u00f8ienG. M. Security and privacy in the internet of things: current status and open issues 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS) 2014 Aalborg Denmark 1\u20138.","DOI":"10.1109\/PRISMS.2014.6970594"},{"key":"e_1_2_11_42_2","doi-asserted-by":"crossref","unstructured":"MahmoudR. YousufT. AloulF. andZualkernanI. Internet of things (IoT) security: current status challenges and prospective measures 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 2015 London UK 336\u2013341.","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"e_1_2_11_43_2","volume-title":"Securing the Internet of Things Survey","author":"Pescatore J.","year":"2014"},{"key":"e_1_2_11_44_2","doi-asserted-by":"publisher","DOI":"10.3390\/s16071069"},{"key":"e_1_2_11_45_2","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2015900728"},{"key":"e_1_2_11_46_2","first-page":"417","article-title":"Security on internet of things (IoT) with challenges and countermeasures","volume":"5","author":"Vignesh R.","year":"2017","journal-title":"International Journal of Engineering Development and Research, IJEDR"},{"key":"e_1_2_11_47_2","article-title":"Security issues in the internet of things (IoT): a comprehensive study","volume":"8","author":"Razzaq M. A.","year":"2017","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"e_1_2_11_48_2","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2017.1366536"},{"key":"e_1_2_11_49_2","first-page":"1285","article-title":"IoT evidence acquisition\u2014issues and challenges","volume":"10","author":"Rughani P. H.","year":"2017","journal-title":"Advances in Computational Sciences and Technology"},{"key":"e_1_2_11_50_2","volume-title":"Internet of Things (IoT) Security Best Practices; IEEE Internet Technology Policy Community; White Paper","author":"Corser G.","year":"2017"},{"key":"e_1_2_11_51_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18092796"},{"key":"e_1_2_11_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"e_1_2_11_53_2","doi-asserted-by":"crossref","unstructured":"MacDermottA. BakerT. andShiQ. IoT forensics: challenges for the IoA era 2018 9th IFIP International Conference on New Technologies Mobility and Security (NTMS) 2018 Paris France 1\u20135 https:\/\/doi.org\/10.1109\/ntms.2018.8328748 2-s2.0-85049484230.","DOI":"10.1109\/NTMS.2018.8328748"},{"key":"e_1_2_11_54_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.04.003"},{"key":"e_1_2_11_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"e_1_2_11_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2847733"},{"key":"e_1_2_11_57_2","doi-asserted-by":"publisher","DOI":"10.1177\/0020294019837991"},{"key":"e_1_2_11_58_2","doi-asserted-by":"publisher","DOI":"10.5455\/aim.2019.27.253-258"},{"key":"e_1_2_11_59_2","doi-asserted-by":"crossref","unstructured":"TabassumK. IbrahimA. andEl RahmanS. A. Security issues and challenges in IoT 2019 International Conference on Computer and Information Sciences (ICCIS) 2019 Sakaka Saudi Arabia 1\u20135.","DOI":"10.1109\/ICCISci.2019.8716460"},{"key":"e_1_2_11_60_2","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz005"},{"key":"e_1_2_11_61_2","first-page":"245","volume-title":"Data, Engineering and Applications","author":"Adesola F.","year":"2019"},{"key":"e_1_2_11_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2962586"},{"key":"e_1_2_11_63_2","doi-asserted-by":"publisher","DOI":"10.3390\/app10124102"},{"key":"e_1_2_11_64_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33596-0_22"},{"key":"e_1_2_11_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3011259"},{"key":"e_1_2_11_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2020.3038387"},{"key":"e_1_2_11_67_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4245"},{"key":"e_1_2_11_68_2","doi-asserted-by":"crossref","unstructured":"SheikhM. U. RiazM. JameelF. J\u00e4nttiR. SharmaN. SharmaV. andAlazabM. Quality-aware trajectory planning of cellular connected UAVs Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond 2020 London United Kingdom 79\u201385 https:\/\/doi.org\/10.1145\/3414045.3415943.","DOI":"10.1145\/3414045.3415943"},{"key":"e_1_2_11_69_2","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/3978193"},{"key":"e_1_2_11_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2710379"},{"key":"e_1_2_11_71_2","doi-asserted-by":"crossref","unstructured":"WuM. LuT.-J. LingF.-Y. SunJ. andDuH.-Y. Research on the architecture of internet of things 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) 2010 Chengdu China V5-484\u2013V5-487 https:\/\/doi.org\/10.1109\/ICACTE.2010.5579493 2-s2.0-78149352226.","DOI":"10.1109\/ICACTE.2010.5579493"},{"key":"e_1_2_11_72_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0731-0"},{"key":"e_1_2_11_73_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"e_1_2_11_74_2","article-title":"Transmission of IPv6 packets over IEEE 802.15.4 networks","volume":"4944","author":"Montenegro G.","year":"2007","journal-title":"Internet proposed standard RFC"},{"key":"e_1_2_11_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2013.2277656"},{"key":"e_1_2_11_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/344588.344609"},{"key":"e_1_2_11_77_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20226680"},{"key":"e_1_2_11_78_2","first-page":"218","article-title":"A comprehensive performance study of IEEE 802.15.4","volume":"4","author":"Zheng J.","year":"2006","journal-title":"Sensor Network Operations"},{"key":"e_1_2_11_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2444095"},{"key":"e_1_2_11_80_2","doi-asserted-by":"crossref","unstructured":"KovatschM. CoAP for the web of things: from tiny resource-constrained devices to the web browser Proceedings of the 2013 ACM conference on Pervasive and Ubiquitous Computing Adjunct Publication 2013 Zurich Switzerland 1495\u20131504 https:\/\/doi.org\/10.1145\/2494091.2497583 2-s2.0-84885201726.","DOI":"10.1145\/2494091.2497583"},{"key":"e_1_2_11_81_2","doi-asserted-by":"crossref","unstructured":"GlombitzaN. PfistererD. andFischerS. LTP: an efficient web service transport protocol for resource constrained devices 2010 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON) 2010 Boston MA USA 1\u20139 https:\/\/doi.org\/10.1109\/secon.2010.5508255 2-s2.0-77955117262.","DOI":"10.1109\/SECON.2010.5508255"},{"key":"e_1_2_11_82_2","unstructured":"da CruzM. A. RodriguesJ. J. ParadelloE. S. LorenzP. SolicP. andAlbuquerqueV. H. C. A proposal for bridging the message queuing telemetry transport protocol to HTTP on IoT solutions 2018 3rd International Conference on Smart and Sustainable Technologies (SpliTech) 2018 Split Croatia 1\u20135."},{"key":"e_1_2_11_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2012.2183878"},{"key":"e_1_2_11_84_2","doi-asserted-by":"crossref","unstructured":"HornsbyA.andWalshR. From instant messaging to cloud computing an XMPP review IEEE International Symposium on Consumer Electronics (ISCE 2010) 2010 Braunschweig Germany 1\u20136 https:\/\/doi.org\/10.1109\/ISCE.2010.5523293 2-s2.0-77956027835.","DOI":"10.1109\/ISCE.2010.5523293"},{"key":"e_1_2_11_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/mic.2006.116"},{"key":"e_1_2_11_86_2","article-title":"TSMP: time synchronized mesh protocol","volume":"391","author":"Pister K.","year":"2008","journal-title":"IASTED Distributed Sensor Networks"},{"key":"e_1_2_11_87_2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6520"},{"key":"e_1_2_11_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2011.5741151"},{"key":"e_1_2_11_89_2","volume-title":"TCP\/IP Protocol Suite","author":"Forouzan B. A.","year":"2009"},{"key":"e_1_2_11_90_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0288-5"},{"key":"e_1_2_11_91_2","doi-asserted-by":"crossref","unstructured":"LiM. WuM.-Y. LiY. CaoJ. HuangL. DengQ. LinX. JiangC. TongW. GuiY. ZhouA. WuX. andJiangS. Shanghai grid as an information service grid: an overview 2005 IEEE International Conference on Services Computing (SCC\u203205) Vol-1 2005 Orlando FL USA 351\u2013354 https:\/\/doi.org\/10.1109\/scc.2005.91 2-s2.0-33749055340.","DOI":"10.1109\/SCC.2005.91"},{"key":"e_1_2_11_92_2","unstructured":"de Saint-ExuperyA. Internet of Things Strategic Research Roadmap Corpus ID: 6436852 2009."},{"key":"e_1_2_11_93_2","volume-title":"Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems","author":"Vermesan O.","year":"2013"},{"key":"e_1_2_11_94_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5537-5"},{"key":"e_1_2_11_95_2","unstructured":"TanL.andWangN. Future internet: the internet of things 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) 2010 Chengdu China V5-376\u2013V5-380."},{"key":"e_1_2_11_96_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17226-7_15"},{"key":"e_1_2_11_97_2","first-page":"309","article-title":"Identity authentication and capability based access control (IACAC) for the internet of things","volume":"1","author":"Mahalle P. N.","year":"2013","journal-title":"Journal of Cyber Security and Mobility"},{"key":"e_1_2_11_98_2","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i3.13.17329"},{"key":"e_1_2_11_99_2","doi-asserted-by":"crossref","unstructured":"WenQ. DongX. andZhangR. Application of dynamic variable cipher security certificate in internet of things 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems 2012 Hangzhou China 1062\u20131066 https:\/\/doi.org\/10.1109\/ccis.2012.6664544 2-s2.0-84890345792.","DOI":"10.1109\/CCIS.2012.6664544"},{"key":"e_1_2_11_100_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4637-6"},{"key":"e_1_2_11_101_2","doi-asserted-by":"crossref","unstructured":"ZhaoK.andGeL. A survey on the internet of things security 2013 Ninth International Conference on Computational Intelligence and Security 2013 Emeishan China 663\u2013667 https:\/\/doi.org\/10.1109\/CIS.2013.145 2-s2.0-84900625968.","DOI":"10.1109\/CIS.2013.145"},{"key":"e_1_2_11_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.291"},{"key":"e_1_2_11_103_2","doi-asserted-by":"crossref","unstructured":"AlexenkoT. JenneM. RoyS. D. andZengW. Cross-site request forgery: attack and defense 2010 7th IEEE Consumer Communications and Networking Conference 2010 Las Vegas NV USA 1\u20132 https:\/\/doi.org\/10.1109\/ccnc.2010.5421782 2-s2.0-77951262803.","DOI":"10.1109\/CCNC.2010.5421782"},{"key":"e_1_2_11_104_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.01.005"},{"key":"e_1_2_11_105_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2013.2262271"},{"key":"e_1_2_11_106_2","doi-asserted-by":"crossref","unstructured":"SundaramB. V. RamnathM. PrasanthM. andSundaramV. Encryption and Hash based security in internet of things 2015 3rd International Conference on Signal Processing Communication and Networking (ICSCN) 2015 Chennai India 1\u20136 https:\/\/doi.org\/10.1109\/icscn.2015.7219926 2-s2.0-84954151771.","DOI":"10.1109\/ICSCN.2015.7219926"},{"key":"e_1_2_11_107_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"e_1_2_11_108_2","doi-asserted-by":"crossref","unstructured":"LiZ. YinX. GengZ. ZhangH. LiP. SunY. ZhangH. andLiL. Research on PKI-like protocol for the internet of things 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation 2013 Hong Kong China 915\u2013918 https:\/\/doi.org\/10.1109\/icmtma.2013.227 2-s2.0-84876553247.","DOI":"10.1109\/ICMTMA.2013.227"},{"key":"e_1_2_11_109_2","doi-asserted-by":"publisher","DOI":"10.3390\/a6020197"},{"key":"e_1_2_11_110_2","doi-asserted-by":"crossref","unstructured":"Hammer-LahavE. RecordonD. andHardtD. The oauth 1.0 protocol 2010 RFC 5849.","DOI":"10.17487\/rfc5849"},{"key":"e_1_2_11_111_2","doi-asserted-by":"publisher","DOI":"10.1109\/mdt.2007.178"},{"key":"e_1_2_11_112_2","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015049"},{"key":"e_1_2_11_113_2","doi-asserted-by":"crossref","unstructured":"BabarS. StangoA. PrasadN. SenJ. andPrasadR. Proposed embedded security framework for internet of things (IoT) 2011 2nd International Conference on Wireless Communication Vehicular Technology Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE) 2011 Chennai India 1\u20135 https:\/\/doi.org\/10.1109\/wirelessvitae.2011.5940923 2-s2.0-79960904737.","DOI":"10.1109\/WIRELESSVITAE.2011.5940923"},{"key":"e_1_2_11_114_2","doi-asserted-by":"crossref","unstructured":"HorrowS.andSardanaA. Identity management framework for cloud based internet of things Proceedings of the First International Conference on Security of Internet of Things\u2014SecurIT \u203212 2012 Kollam India 200\u2013203 https:\/\/doi.org\/10.1145\/2490428.2490456 2-s2.0-84879822870.","DOI":"10.1145\/2490428.2490456"},{"key":"e_1_2_11_115_2","doi-asserted-by":"crossref","unstructured":"AbieH.andBalasinghamI. Risk-based adaptive security for smart IoT in eHealth Proceedings of the 7th International Conference on Body Area Networks 2012 Oslo Norway 269\u2013275 https:\/\/doi.org\/10.4108\/icst.bodynets.2012.250235.","DOI":"10.4108\/icst.bodynets.2012.250235"},{"key":"e_1_2_11_116_2","doi-asserted-by":"crossref","unstructured":"Al ShuhaimiF. JoseM. andSinghA. V. Software defined network as solution to overcome security challenges in IoT 2016 5th International Conference on Reliability Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) 2016 Noida India 491\u2013496 https:\/\/doi.org\/10.1109\/icrito.2016.7785005 2-s2.0-85010534864.","DOI":"10.1109\/ICRITO.2016.7785005"},{"key":"e_1_2_11_117_2","doi-asserted-by":"crossref","unstructured":"BucheggerS.andLe BoudecJ.-Y. Performance analysis of the CONFIDANT protocol Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing 2002 Lausanne Switzerland 226\u2013236 https:\/\/doi.org\/10.1145\/513800.513828.","DOI":"10.1145\/513800.513828"},{"key":"e_1_2_11_118_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"e_1_2_11_119_2","first-page":"23","article-title":"Two layers trust-based intrusion prevention system for wireless sensor networks","volume":"1","author":"Oke J. T.","year":"2018","journal-title":"Advances inElectrical and Telecommunication Engineering"},{"key":"e_1_2_11_120_2","first-page":"204","article-title":"A group preference-based privacy-preserving POI recommender system","volume":"6","author":"Wang X.","year":"2020","journal-title":"Information & Communications Technology Express (ICT Express)"},{"key":"e_1_2_11_121_2","doi-asserted-by":"crossref","unstructured":"TaoH.andPeiranW. Preference-based privacy protection mechanism for the internet of things 2010 Third International Symposium on Information Science and Engineering 2010 Shanghai China 531\u2013534 https:\/\/doi.org\/10.1109\/isise.2010.135 2-s2.0-79961199197.","DOI":"10.1109\/ISISE.2010.135"},{"key":"e_1_2_11_122_2","doi-asserted-by":"publisher","DOI":"10.1109\/mic.2012.29"},{"key":"e_1_2_11_123_2","doi-asserted-by":"crossref","unstructured":"GuptaK.andShuklaS. Internet of things: security challenges for next generation networks 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) 2016 Greater Noida India 315\u2013318 https:\/\/doi.org\/10.1109\/iciccs.2016.7542301 2-s2.0-84985961094.","DOI":"10.1109\/ICICCS.2016.7542301"},{"key":"e_1_2_11_124_2","doi-asserted-by":"crossref","unstructured":"GyoryN.andChuahM. IoTOne: integrated platform for heterogeneous IoT devices 2017 International Conference on Computing Networking and Communications (ICNC) 2017 Silicon Valley CA USA 783\u2013787 https:\/\/doi.org\/10.1109\/iccnc.2017.7876230 2-s2.0-85017336477.","DOI":"10.1109\/ICCNC.2017.7876230"},{"key":"e_1_2_11_125_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-008-9475-4"},{"key":"e_1_2_11_126_2","doi-asserted-by":"crossref","unstructured":"HuC. ZhangJ. andWenQ. An identity-based personal location system with protected privacy in IoT 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology 2011 Shenzen China 192\u2013195 https:\/\/doi.org\/10.1109\/icbnmt.2011.6155923 2-s2.0-84863233964.","DOI":"10.1109\/ICBNMT.2011.6155923"},{"key":"e_1_2_11_127_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2917135"},{"key":"e_1_2_11_128_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1580-0_67"},{"key":"e_1_2_11_129_2","doi-asserted-by":"publisher","DOI":"10.1016\/s0167-4048(03)00405-x"},{"key":"e_1_2_11_130_2","doi-asserted-by":"crossref","unstructured":"YouI. YimK. SharmaV. ChoudharyG. ChenR. andChoJ.-H. On IoT misbehavior detection in cyber physical systems 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC) 2018 Taipei Taiwan 189\u2013190 https:\/\/doi.org\/10.1109\/prdc.2018.00033 2-s2.0-85062846413.","DOI":"10.1109\/PRDC.2018.00033"},{"key":"e_1_2_11_131_2","series-title":"IFIP Advances in Information and Communication Technology","volume-title":"Advances in Digital Forensics XIV. Digital Forensics 2018","author":"Alabdulsalam S."},{"key":"e_1_2_11_132_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.058"},{"key":"e_1_2_11_133_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.024"},{"key":"e_1_2_11_134_2","doi-asserted-by":"crossref","unstructured":"OriwohE.andSantP. The forensics edge management system: a concept and design 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing 2013 Vietri sul Mare Italy 544\u2013550 https:\/\/doi.org\/10.1109\/uic-atc.2013.71 2-s2.0-84894132546.","DOI":"10.1109\/UIC-ATC.2013.71"},{"key":"e_1_2_11_135_2","volume-title":"Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance","author":"Oriwoh E.","year":"2014"},{"key":"e_1_2_11_136_2","doi-asserted-by":"crossref","unstructured":"GoudbeekA. ChooK.-K. R. andLe-KhacN.-A. A forensic investigation framework for smart home environment 2018 17th IEEE International Conference On Trust Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE) 2018 New York NY USA 1446\u20131451 https:\/\/doi.org\/10.1109\/trustcom\/bigdatase.2018.00201 2-s2.0-85054104528.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00201"},{"key":"e_1_2_11_137_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.060"},{"key":"e_1_2_11_138_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98734-7"},{"key":"e_1_2_11_139_2","doi-asserted-by":"crossref","unstructured":"YouI. YimK. SharmaV. ChoudharyG. ChenI.-R. andChoJ.-H. Misbehavior detection of embedded IoT devices in medical cyber physical systems Proceedings of the 2018 IEEE\/ACM International Conference on Connected Health: Applications Systems and Engineering Technologies 2018 Washington DC 88\u201393.","DOI":"10.1145\/3278576.3278601"},{"key":"e_1_2_11_140_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2019.101608"},{"key":"e_1_2_11_141_2","doi-asserted-by":"crossref","unstructured":"HossainM. M. HasanR. andZawoadS. Trust-IoV: a trustworthy forensic investigation framework for the internet of vehicles (IoV) 2017 IEEE International Congress on Internet of Things (ICIOT) 2017 Honolulu HI USA 25\u201332 https:\/\/doi.org\/10.1109\/ieee.iciot.2017.13 2-s2.0-85032306022.","DOI":"10.1109\/IEEE.ICIOT.2017.13"},{"key":"e_1_2_11_142_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022661"},{"key":"e_1_2_11_143_2","doi-asserted-by":"crossref","unstructured":"FengX. DawamE. S. andAminS. A new digital forensics model of smart city automated vehicles 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) 2017 Exeter UK 274\u2013279 https:\/\/doi.org\/10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.47 2-s2.0-85047390431.","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.47"},{"key":"e_1_2_11_144_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.06.013"},{"key":"e_1_2_11_145_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.08.020"},{"key":"e_1_2_11_146_2","first-page":"24","article-title":"Service-oriented middleware for multi-UAV guided ad hoc networks","volume":"2","author":"Sharma V.","year":"2014","journal-title":"IT CoNvergence PRActice (INPRA)"},{"key":"e_1_2_11_147_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893775"},{"key":"e_1_2_11_148_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.05.005"},{"key":"e_1_2_11_149_2","doi-asserted-by":"crossref","unstructured":"AbieH. Cognitive cybersecurity for CPS-IoT enabled healthcare ecosystems 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT) 2019 Oslo Norway 1\u20136 https:\/\/doi.org\/10.1109\/ISMICT.2019.8743670 2-s2.0-85069049566.","DOI":"10.1109\/ISMICT.2019.8743670"},{"key":"e_1_2_11_150_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73676-1_11"},{"key":"e_1_2_11_151_2","volume-title":"Digital Health Market Share Trends 2019\u20132025 Growth Forecast Report","author":"Insights G. M.","year":"2019"},{"key":"e_1_2_11_152_2","volume-title":"Forecast: wearable electronic devices, worldwide","author":"McIntyre A.","year":"2016"},{"key":"e_1_2_11_153_2","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(15)30045-2"},{"key":"e_1_2_11_154_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.009"},{"key":"e_1_2_11_155_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.12.004"},{"key":"e_1_2_11_156_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2867466"},{"key":"e_1_2_11_157_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1600087NM"},{"key":"e_1_2_11_158_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.06.010"},{"key":"e_1_2_11_159_2","doi-asserted-by":"crossref","unstructured":"HossainM. M. HasanR. andZawoadS. Probe-IoT: a public digital ledger based forensic investigation framework for IoT INFOCOM Workshops 2018 Birmingham USA 1\u20132.","DOI":"10.1109\/INFCOMW.2018.8406875"},{"key":"e_1_2_11_160_2","doi-asserted-by":"crossref","unstructured":"NietoA. RiosR. andLopezJ. A methodology for privacy-aware IoT-forensics 2017 IEEE Trustcom\/BigDataSE\/ICESS 2017 Sydney NSW Australia 626\u2013633 https:\/\/doi.org\/10.1109\/Trustcom\/BigDataSE\/ICESS.2017.293 2-s2.0-85032355625.","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.293"},{"key":"e_1_2_11_161_2","doi-asserted-by":"crossref","unstructured":"OriwohE. JazaniD. EpiphaniouG. andSantP. Internet of things forensics: challenges and approaches 9th IEEE International Conference on Collaborative Computing: Networking Applications and Worksharing 2013 Austin TX USA 608\u2013615 https:\/\/doi.org\/10.4108\/icst.collaboratecom.2013.254159 2-s2.0-84893605482.","DOI":"10.4108\/icst.collaboratecom.2013.254159"},{"key":"e_1_2_11_162_2","unstructured":"PerlepesL. StamoulisG. andKikirasP. An End-to-End Framework for Securing the Internet of Things 2011."},{"key":"e_1_2_11_163_2","doi-asserted-by":"crossref","unstructured":"PerumalS. NorwawiN. M. andRamanV. Internet of things (IoT) digital forensic investigation model: top-down forensic approach methodology 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC) 2015 Sierre Switzerland 19\u201323 https:\/\/doi.org\/10.1109\/ICDIPC.2015.7323000 2-s2.0-84962815572.","DOI":"10.1109\/ICDIPC.2015.7323000"},{"key":"e_1_2_11_164_2","doi-asserted-by":"crossref","unstructured":"ZawoadS.andHasanR. Faiot: towards building a forensics aware eco system for the internet of things 2015 IEEE International Conference on Services Computing 2015 New york NY USA 279\u2013284 https:\/\/doi.org\/10.1109\/SCC.2015.46 2-s2.0-84953432852.","DOI":"10.1109\/SCC.2015.46"},{"key":"e_1_2_11_165_2","unstructured":"LillisD. BeckerB. O\u2032SullivanT. andScanlonM. Current challenges and future research areas for digital forensic investigation 2016 https:\/\/arxiv.org\/abs\/1604.03850."},{"key":"e_1_2_11_166_2","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.10.5.287-293"},{"key":"e_1_2_11_167_2","doi-asserted-by":"crossref","unstructured":"SharmaV. YouI. andKulG. Socializing drones for inter-service operability in ultra-dense wireless networks using blockchain Proceedings of the 2017 International Workshop on Managing Insider Security Threats 2017 Dallas Texas USA 81\u201384 https:\/\/doi.org\/10.1145\/3139923.3139932 2-s2.0-85043360077.","DOI":"10.1145\/3139923.3139932"},{"key":"e_1_2_11_168_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8885269"},{"key":"e_1_2_11_169_2","doi-asserted-by":"publisher","DOI":"10.48009\/4_iis_2020_253-263"},{"key":"e_1_2_11_170_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"e_1_2_11_171_2","doi-asserted-by":"publisher","DOI":"10.18178\/ijmlc.2019.9.4.814"},{"key":"e_1_2_11_172_2","doi-asserted-by":"crossref","unstructured":"HodoE. BellekensX. HamiltonA. DubouilhP.-L. IorkyaseE. TachtatzisC. andAtkinsonR. Threat analysis of IoT networks using artificial neural network intrusion detection system 2016 International Symposium on Networks Computers and Communications (ISNCC) 2016 Yasmine Hammamet Tunisia 1\u20136 https:\/\/doi.org\/10.1109\/isncc.2016.7746067 2-s2.0-85006054848.","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"e_1_2_11_173_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-020-00747-w"},{"key":"e_1_2_11_174_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.11.027"},{"key":"e_1_2_11_175_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102468"},{"key":"e_1_2_11_176_2","article-title":"How blockchain can change the future of IoT","volume":"20","author":"Dickson B.","year":"2016","journal-title":"Venture Beat"},{"key":"e_1_2_11_177_2","doi-asserted-by":"crossref","unstructured":"SharmaV. KimJ. KwonS. YouI. andLeuF.-Y. An overview of 802.21a-2012 and its incorporation into IoT-fog networks using osmotic framework International Conference on Internet of Things as a Service 2017 Taichun Taiwan 64\u201372 https:\/\/doi.org\/10.1007\/978-3-030-00410-1_9 2-s2.0-85055852130.","DOI":"10.1007\/978-3-030-00410-1_9"},{"key":"e_1_2_11_178_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2018.1700863"},{"key":"e_1_2_11_179_2","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3273917"},{"key":"e_1_2_11_180_2","doi-asserted-by":"crossref","unstructured":"AlrowailyM.andLuZ. Secure edge computing in IoT systems: review and case studies 2018 IEEE\/ACM Symposium on Edge Computing (SEC) 2018 Seattle WA USA 440\u2013444 https:\/\/doi.org\/10.1109\/sec.2018.00060 2-s2.0-85060244997.","DOI":"10.1109\/SEC.2018.00060"},{"key":"e_1_2_11_181_2","doi-asserted-by":"crossref","unstructured":"LiY.andWangS. An energy-aware edge server placement algorithm in mobile edge computing 2018 IEEE International Conference on Edge Computing (EDGE) 2018 San Francisco CA USA 66\u201373 https:\/\/doi.org\/10.1109\/edge.2018.00016 2-s2.0-85054853637.","DOI":"10.1109\/EDGE.2018.00016"},{"key":"e_1_2_11_182_2","doi-asserted-by":"crossref","unstructured":"OyekanluE. NelaturyC. FatadeA. O. AlabaO. andAbassO. Edge computing for industrial IoT and the smart grid: channel capacity for M2M communication over the power line 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON) 2017 Owerri Nigeria 1\u201311 https:\/\/doi.org\/10.1109\/nigercon.2017.8281938 2-s2.0-85046935406.","DOI":"10.1109\/NIGERCON.2017.8281938"},{"key":"e_1_2_11_183_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2922039"},{"key":"e_1_2_11_184_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73951-9_15"},{"key":"e_1_2_11_185_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4277"},{"key":"e_1_2_11_186_2","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2017.1600421"},{"key":"e_1_2_11_187_2","doi-asserted-by":"publisher","DOI":"10.1109\/mce.2019.2959108"},{"key":"e_1_2_11_188_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18020492"},{"key":"e_1_2_11_189_2","doi-asserted-by":"crossref","unstructured":"NietoA. RiosR. andLopezJ. Digital witness and privacy in IoT: anonymous witnessing approach 2017 IEEE Trustcom\/BigDataSE\/ICESS 2017 Sydney NSW 642\u2013649 https:\/\/doi.org\/10.1109\/trustcom\/bigdatase\/icess.2017.295 2-s2.0-85032382314.","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.295"},{"key":"e_1_2_11_190_2","unstructured":"SharmaV. KimJ. KwonS. YouI. LeeK. andYimK. A framework for mitigating zero-day attacks in IoT 2018 https:\/\/arxiv.org\/abs\/1804.05549."},{"key":"e_1_2_11_191_2","doi-asserted-by":"crossref","unstructured":"DorriA. KanhereS. S. JurdakR. andGauravaramP. Blockchain for IoT security and privacy: the case study of a smart home 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) 2017 Kona HI USA 618\u2013623 https:\/\/doi.org\/10.1109\/percomw.2017.7917634 2-s2.0-85019031448.","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"e_1_2_11_192_2","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.001.1900662"},{"key":"e_1_2_11_193_2","unstructured":"GuptaO. RaniS. andPantD. C. Impact of parallel computing on bioinformatics algorithms Proceedings 5th IEEE International Conference on Advanced Computing and Communication Technologies 2011 Rohtak Haryana India 206\u2013209."},{"key":"e_1_2_11_194_2","doi-asserted-by":"crossref","unstructured":"AlharbiR.andAspinallD. An IoT analysis framework: an investigation of IoT smart cameras\u2032 vulnerabilities Living in the Internet of Things: Cybersecurity of the IoT\u20142018 2018 London UK https:\/\/doi.org\/10.1049\/cp.2018.0047.","DOI":"10.1049\/cp.2018.0047"},{"key":"e_1_2_11_195_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystemseng.2018.10.014"},{"key":"e_1_2_11_196_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-815369-7.00001-X"},{"key":"e_1_2_11_197_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7399-2"},{"key":"e_1_2_11_198_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.051"},{"key":"e_1_2_11_199_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.019"},{"key":"e_1_2_11_200_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.08.002"},{"key":"e_1_2_11_201_2","doi-asserted-by":"crossref","unstructured":"ZulkipliN. H. N. AleneziA. andWillsG. B. IoT forensic: bridging the challenges in digital forensic and the internet of things Proceedings of the 2nd International Conference on Internet of Things Big Data and Security 2017 Porto Portugal 315\u2013324 https:\/\/doi.org\/10.5220\/0006308703150324.","DOI":"10.5220\/0006308703150324"},{"key":"e_1_2_11_202_2","doi-asserted-by":"crossref","unstructured":"HusamuddinM.andQayyumM. Internet of things: a study on security and privacy threats 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) 2017 Abha 93\u201397.","DOI":"10.1109\/Anti-Cybercrime.2017.7905270"},{"key":"e_1_2_11_203_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.03.008"},{"key":"e_1_2_11_204_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2017.10.009"},{"key":"e_1_2_11_205_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2016.1600553cm"},{"key":"e_1_2_11_206_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.005"},{"key":"e_1_2_11_207_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.059"},{"key":"e_1_2_11_208_2","doi-asserted-by":"crossref","unstructured":"DepuruS. S. S. R. WangL. DevabhaktuniV. andGudiN. Smart meters for power grid\u2014challenges issues advantages and status 2011 IEEE\/PES Power Systems Conference and Exposition 2011 Phoenix AZ USA 1\u20137 https:\/\/doi.org\/10.1109\/psce.2011.5772451 2-s2.0-79958784687.","DOI":"10.1109\/PSCE.2011.5772451"},{"key":"e_1_2_11_209_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2705045"},{"key":"e_1_2_11_210_2","doi-asserted-by":"crossref","unstructured":"SuoH. WanJ. ZouC. andLiuJ. Security in the internet of things: a review 2012 International Conference on Computer Science and Electronics Engineering 2012 Hangzhou China 648\u2013651 https:\/\/doi.org\/10.1109\/ICCSEE.2012.373 2-s2.0-84861019658.","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"e_1_2_11_211_2","doi-asserted-by":"crossref","unstructured":"VashiS. RamJ. ModiJ. VermaS. andPrakashC. Internet of things (IoT): a vision architectural elements and security issues 2017 International Conference on I-SMAC (IoT in Social Mobile Analytics and Cloud) (I-SMAC) 2017 Palladam India 492\u2013496 https:\/\/doi.org\/10.1109\/I-SMAC.2017.8058399 2-s2.0-85034595585.","DOI":"10.1109\/I-SMAC.2017.8058399"},{"key":"e_1_2_11_212_2","first-page":"37","article-title":"Security architecture of the internet of things oriented to perceptual layer","volume":"2","author":"Zhang W.","year":"2013","journal-title":"International Journal on Computer, Consumer and Control (IJ3C)"},{"key":"e_1_2_11_213_2","doi-asserted-by":"publisher","DOI":"10.2174\/221032790703180619101356"},{"key":"e_1_2_11_214_2","doi-asserted-by":"publisher","DOI":"10.1108\/intr-07-2014-0173"},{"key":"e_1_2_11_215_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.05.003"},{"key":"e_1_2_11_216_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-53103-8_7"},{"key":"e_1_2_11_217_2","doi-asserted-by":"crossref","unstructured":"KebandeV. R.andRayI. A generic digital forensic investigation framework for internet of things (IoT) 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) 2016 Vienna Austria 356\u2013362 https:\/\/doi.org\/10.1109\/ficloud.2016.57 2-s2.0-84992109620.","DOI":"10.1109\/FiCloud.2016.57"},{"key":"e_1_2_11_218_2","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.23"},{"key":"e_1_2_11_219_2","doi-asserted-by":"crossref","unstructured":"CavalloB. Di CrescenzoG. KahrobaeiD. andShpilrainV. Efficient and secure delegation of group exponentiation to a single server International Workshop on Radio Frequency Identification: Security and Privacy Issues 2015 New york USA 156\u2013173 https:\/\/doi.org\/10.1007\/978-3-319-24837-0_10 2-s2.0-84951041666.","DOI":"10.1007\/978-3-319-24837-0_10"},{"key":"e_1_2_11_220_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2561241"},{"key":"e_1_2_11_221_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2705076"},{"key":"e_1_2_11_222_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0559-3"},{"key":"e_1_2_11_223_2","article-title":"A comparative survey on symmetric key encryption techniques","volume":"4","author":"Agrawal M.","year":"2012","journal-title":"International Journal on Computer Science and Engineering"},{"key":"e_1_2_11_224_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_16"},{"key":"e_1_2_11_225_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2013.37"},{"key":"e_1_2_11_226_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2017.2673843"},{"key":"e_1_2_11_227_2","doi-asserted-by":"crossref","unstructured":"SalonikiasS. MavridisI. andGritzalisD. Access control issues in utilizing fog computing for transport infrastructure International Conference on Critical Information Infrastructures Security 2015 Berlin Germany 15\u201326 https:\/\/doi.org\/10.1007\/978-3-319-33331-1_2 2-s2.0-84978731887.","DOI":"10.1007\/978-3-319-33331-1_2"},{"key":"e_1_2_11_228_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2015.2500568"},{"key":"e_1_2_11_229_2","doi-asserted-by":"publisher","DOI":"10.3390\/s17071611"},{"key":"e_1_2_11_230_2","doi-asserted-by":"crossref","unstructured":"ZhuoG. JiaQ. GuoL. LiM. andLiP. Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing IEEE INFOCOM 2016\u2014The 35th Annual IEEE International Conference on Computer Communications 2016 San Francisco CA USA 1\u20139 https:\/\/doi.org\/10.1109\/infocom.2016.7524547 2-s2.0-84983314455.","DOI":"10.1109\/INFOCOM.2016.7524547"},{"key":"e_1_2_11_231_2","unstructured":"IC3 2020 March 2021 https:\/\/www.ic3.gov\/."},{"key":"e_1_2_11_232_2","article-title":"A review on internet of things (IoT): security and privacy requirements and the solution approaches","volume":"16","author":"Iqbal M. A.","year":"2017","journal-title":"Global Journal of Computer Science and Technology"},{"key":"e_1_2_11_233_2","doi-asserted-by":"crossref","unstructured":"FathyA. TarradI. F. HamedH. F. andAwadA. I. Advanced encryption standard algorithm: issues and implementation aspects International Conference on Advanced Machine Learning Technologies and Applications 2012 Cairo Egypt 516\u2013523.","DOI":"10.1007\/978-3-642-35326-0_51"},{"key":"e_1_2_11_234_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2967469"},{"key":"e_1_2_11_235_2","unstructured":"MonsenF.andGlissonK. Differencing Engine for Digital Forensics 2020 Google Patents."},{"key":"e_1_2_11_236_2","unstructured":"McEachronJ. D. Forensic Investigation Tool 2019 Google Patents."},{"key":"e_1_2_11_237_2","unstructured":"MorimotoM. ShiraiY. andTakedaH. Forensic System Forensic Method and Forensic Program 2016 Google Patents."},{"key":"e_1_2_11_238_2","unstructured":"SeongKuK. MincheolJ. YoungjunC. ChoiJ. SinKyuK. andJungtaekS. Device and Method for Providing Security in Remote Digital Forensic Environment 2017 Google Patents."},{"key":"e_1_2_11_239_2","unstructured":"ChoiY. H. KimT. G. OhH. G. andLeeD. H. Method and Apparatus for Digital Forensics 2012 Google Patents."},{"key":"e_1_2_11_240_2","unstructured":"ShannonM. M.andDeckerM. J. Systems and Methods for Provisioning Digital Forensics Services Remotely over Public and Private Networks 2015 Google Patents."},{"key":"e_1_2_11_241_2","unstructured":"BuchananW. J. GravesJ. R. andBoseN. Digital Forensics 2014 Google Patents."},{"key":"e_1_2_11_242_2","unstructured":"GilY. H. LeeJ. Y. JoS. H. KimY. S. KimK. W. LeeS. S.et al. Method for Data Analysis and Digital Forensics and System Using the Same 2014 Google Patents."},{"key":"e_1_2_11_243_2","unstructured":"LevyK. L. Forensic Digital Watermarking with Variable Orientation and Protocols 2008 Google Patents."},{"key":"e_1_2_11_244_2","unstructured":"CarpenterT. L.andWesterinenW. J. Secure digital forensics 2011 Google Patents."},{"key":"e_1_2_11_245_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2757955"},{"key":"e_1_2_11_246_2","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2017.1800116"},{"key":"e_1_2_11_247_2","doi-asserted-by":"crossref","unstructured":"JavaidU. AmanM. N. andSikdarB. DrivMan: driving trust management and data sharing in VANETS with blockchain and smart contracts 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring) 2019 Kuala Lumpur Malaysia 1\u20135 https:\/\/doi.org\/10.1109\/vtcspring.2019.8746499 2-s2.0-85068782025.","DOI":"10.1109\/VTCSpring.2019.8746499"},{"key":"e_1_2_11_248_2","doi-asserted-by":"publisher","DOI":"10.1109\/mce.2018.2880806"},{"key":"e_1_2_11_249_2","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2018.2883629"},{"key":"e_1_2_11_250_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2900514"},{"key":"e_1_2_11_251_2","doi-asserted-by":"crossref","unstructured":"JavaidU. SiangA. K. AmanM. N. andSikdarB. Mitigating IoT device based DDoS attacks using blockchain Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems 2018 Munich Germany 71\u201376 https:\/\/doi.org\/10.1145\/3211933.3211946 2-s2.0-85051659750.","DOI":"10.1145\/3211933.3211946"},{"key":"e_1_2_11_252_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2812239"},{"key":"e_1_2_11_253_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2907599"},{"key":"e_1_2_11_254_2","doi-asserted-by":"crossref","unstructured":"JavaidU. AmanM. N. andSikdarB. Blockpro: blockchain based data provenance and integrity for secure iot environments Proceedings of the 1st Workshop on Blockchain-Enabled Networked Sensor Systems 2018 Shenzhen China 13\u201318 https:\/\/doi.org\/10.1145\/3282278.3282281 2-s2.0-85061804298.","DOI":"10.1145\/3282278.3282281"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/5579148.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/5579148.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/5579148","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T10:48:10Z","timestamp":1723027690000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/5579148"}},"subtitle":[],"editor":[{"given":"Dario","family":"Bruneo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":254,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/5579148"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5579148","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-01-05","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-31","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5579148"}}