{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T15:37:15Z","timestamp":1766331435318,"version":"3.38.0"},"reference-count":57,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JHS"],"published-print":{"date-parts":[[2023,4,21]]},"abstract":"<jats:p>The Internet of Things (IoT) is the most secure platform for making human existence easier and more comfortable. IoT has made a big contribution to a variety of software programs. The rapid proliferation of smart devices, as well as their trust in data transfer and the use of Wi-Fi mechanics, has increased their vulnerability to cyber-attacks. As a result, the cost of cybercrime is rising every day. As a result, investigating IoT security threats and possible countermeasures can assist researchers in creating acceptable ways to deal with a variety of stressful scenarios in cybercrime research. The IoT framework, as well as IoT architecture, protocols, and technology, are all covered in this assessment research. Various protection issues at each tier, as well as correction strategies, are also detailed. In addition, this article discusses the use of IoT forensics in cybercrime investigations in a variety of areas, including cybercrime research, Artificial intelligence, system learning, cloud computing, fog computing, and blockchain technology all play a role in this discussion. Finally, some open research on challenging situations in IoT is detailed to enhance cybercrime investigations, providing a cutting-edge course for future research.<\/jats:p>","DOI":"10.3233\/jhs-222042","type":"journal-article","created":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T15:57:02Z","timestamp":1680278222000},"page":"105-120","source":"Crossref","is-referenced-by-count":5,"title":["Cyber security threats in IoT: A review"],"prefix":"10.1177","volume":"29","author":[{"given":"Pragati","family":"Rana","sequence":"first","affiliation":[{"name":"Army Institute of Technology and Research Scholar at Pimpri Chinchwad College of Engineering, Nigdi, Pune, India"}]},{"given":"B.P.","family":"Patil","sequence":"additional","affiliation":[{"name":"Army Institute of Technology, Dighi, Pune, India"}]}],"member":"179","reference":[{"doi-asserted-by":"crossref","unstructured":"A.\u00a0Abdullah, R.\u00a0Hamad, M.\u00a0Abdulrahman, H.\u00a0Moala and S.\u00a0Elkhediri, CyberSecurity: A review of Internet of Things (IoT) security issues, challenges and techniques, in: 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), IEEE, 2019, pp.\u00a01\u20136.","key":"10.3233\/JHS-222042_ref2","DOI":"10.1109\/CAIS.2019.8769560"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref3","DOI":"10.13052\/jcsm2245-1439.414"},{"issue":"20","key":"10.3233\/JHS-222042_ref4","doi-asserted-by":"publisher","first-page":"16205","DOI":"10.1007\/s00521-020-04874-y","article-title":"Machine learning and data analytics for the IoT","volume":"32","author":"Adi","year":"2020","journal-title":"Neural computing and applications"},{"issue":"6","key":"10.3233\/JHS-222042_ref5","doi-asserted-by":"publisher","first-page":"966","DOI":"10.1007\/s40846-017-0349-7","article-title":"Celal Ceken, and Yunus Emre Erdemli. \u201cIoT-based healthcare framework for biomedical applications.\u201d","volume":"38","author":"Aktas","year":"2018","journal-title":"Journal of Medical and Biological Engineering"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref6","DOI":"10.1109\/SmartCloud.2018.00040"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref7","DOI":"10.1109\/CSCI49370.2019.00036"},{"issue":"2","key":"10.3233\/JHS-222042_ref8","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MIC.2017.37","article-title":"Fog computing for the Internet of Things: Security and privacy issues","volume":"21","author":"Alrawais","year":"2017","journal-title":"IEEE Internet Computing"},{"key":"10.3233\/JHS-222042_ref9","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.jpdc.2020.09.012","article-title":"IoT architecture for adaptation to transient devices","volume":"148","author":"Ariza","year":"2021","journal-title":"Journal of Parallel and Distributed Computing"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref10","DOI":"10.1007\/978-3-030-33596-0_22"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref11","DOI":"10.1016\/j.iot.2020.100220"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref12","DOI":"10.1016\/j.iot.2020.100220"},{"issue":"1","key":"10.3233\/JHS-222042_ref13","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s11277-019-06407-w","article-title":"IoT technology, applications and challenges: A contemporary survey","volume":"108","author":"Balaji","year":"2019","journal-title":"Wireless personal communications"},{"key":"10.3233\/JHS-222042_ref14","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.scs.2017.12.034","article-title":"The IoT for smart sustainable cities of the future: An analytical framework for sensor-based big data applications for environmental sustainability","volume":"38","author":"Bibri","year":"2018","journal-title":"Sustainable cities and society"},{"key":"10.3233\/JHS-222042_ref16","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.procs.2019.01.108","article-title":"Information systems for supply chain management: Uncertainties, risks and cyber security","volume":"149","author":"Boiko","year":"2019","journal-title":"Procedia computer science"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref17","DOI":"10.1109\/IMIS.2015.86"},{"unstructured":"I.\u00a0Cvitic and M.\u00a0Vujic, Classification of security risks in the iot environment, in: Annals of DAAAM & Proceedings, Vol.\u00a026, 2015.","key":"10.3233\/JHS-222042_ref19"},{"doi-asserted-by":"crossref","unstructured":"L.\u00a0Dawson and A.\u00a0Akinbi, Challenges and opportunities for wearable IoT forensics: TomTom Spark 3 as a case study, Forensic Science International: Reports 3 (2021), 100198.","key":"10.3233\/JHS-222042_ref20","DOI":"10.1016\/j.fsir.2021.100198"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref21","DOI":"10.1109\/I-SMAC.2017.8058363"},{"issue":"6","key":"10.3233\/JHS-222042_ref22","doi-asserted-by":"publisher","first-page":"4486","DOI":"10.1109\/JIOT.2018.2822842","article-title":"IIoT cybersecurity risk modeling for SCADA systems","volume":"5","author":"Falco","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JHS-222042_ref23","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.simpat.2016.09.007","article-title":"Using virtual environments for the assessment of cybersecurity issues in IoT scenarios","volume":"73","author":"Furfaro","year":"2017","journal-title":"Simulation Modelling Practice and Theory"},{"key":"10.3233\/JHS-222042_ref24","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","article-title":"Current research on Internet of Things (IoT) security: A survey","volume":"148","author":"Hassan","year":"2019","journal-title":"Computer networks"},{"key":"10.3233\/JHS-222042_ref25","doi-asserted-by":"publisher","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","article-title":"A survey on IoT security: Application areas, security threats, and solution architectures","volume":"7","author":"Hassija","year":"2019","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Y.H.\u00a0Hwang, Iot security & privacy: Threats and challenges, in: Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015, pp.\u00a01\u20131.","key":"10.3233\/JHS-222042_ref26","DOI":"10.1145\/2732209.2732216"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref27","DOI":"10.1109\/ICICT52872.2021.00040"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref28","DOI":"10.1007\/978-3-030-60425-7_10"},{"issue":"1","key":"10.3233\/JHS-222042_ref32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-020-00111-0","article-title":"IoT cyber risk: A holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process","volume":"2020","author":"Kandasamy","year":"2020","journal-title":"EURASIP Journal on Information Security"},{"doi-asserted-by":"crossref","unstructured":"D.-Y.\u00a0Kao, Y.-T.\u00a0Chao, F.\u00a0Tsai and C.-Y.\u00a0Huang, Digital evidence analytics applied in cybercrime investigations, in: 2018 IEEE Conference on Application, Information and Network Security (AINS), IEEE, 2018, pp.\u00a0111\u2013116.","key":"10.3233\/JHS-222042_ref33","DOI":"10.1109\/AINS.2018.8631403"},{"doi-asserted-by":"crossref","unstructured":"V.R.\u00a0Kebande, N.M.\u00a0Karie, A.\u00a0Michael, S.M.\u00a0Malapane and H.S.\u00a0Venter, How an IoT-enabled \u201csmart refrigerator\u201d can play a clandestine role in perpetuating cyber-crime, in: 2017 IST-Africa Week Conference (IST-Africa), IEEE, 2017, pp.\u00a01\u201310.","key":"10.3233\/JHS-222042_ref34","DOI":"10.23919\/ISTAFRICA.2017.8102362"},{"issue":"2","key":"10.3233\/JHS-222042_ref35","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1007\/s11277-020-07446-4","article-title":"Internet of things (IoT), applications and challenges: A comprehensive review","volume":"114","author":"Khanna","year":"2020","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/JHS-222042_ref36","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.ijcip.2019.01.001","article-title":"Cyber security challenges for IoT-based smart grid networks","volume":"25","author":"Kimani","year":"2019","journal-title":"International Journal of Critical Infrastructure Protection"},{"issue":"2","key":"10.3233\/JHS-222042_ref37","doi-asserted-by":"publisher","first-page":"2770","DOI":"10.1109\/JIOT.2018.2874626","article-title":"Design of a piezoelectric-based physically unclonable function for IoT security","volume":"6","author":"Labrado","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JHS-222042_ref38","first-page":"21","article-title":"Forensic-chain: Ethereum blockchain based digital forensics chain of custody","volume":"1","author":"Lone","year":"2018","journal-title":"Sci. Pract. Cyber Secur. J"},{"key":"10.3233\/JHS-222042_ref39","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.diin.2019.01.002","article-title":"Forensic-chain: Blockchain based digital forensics chain of custody with PoC in hyperledger composer","volume":"28","author":"Lone","year":"2019","journal-title":"Digital investigation"},{"issue":"5","key":"10.3233\/JHS-222042_ref40","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1007\/s12559-018-9543-3","article-title":"A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications","volume":"10","author":"Mahmud","year":"2018","journal-title":"Cognitive Computation"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref41","DOI":"10.1007\/978-981-16-3448-2_5"},{"issue":"1","key":"10.3233\/JHS-222042_ref42","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s10586-018-2823-6","article-title":"Internet of things: Information security challenges and solutions","volume":"22","author":"Miloslavskaya","year":"2019","journal-title":"Cluster Computing"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref43","DOI":"10.1002\/nem.2038"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref44","DOI":"10.3390\/s20133625"},{"issue":"5","key":"10.3233\/JHS-222042_ref45","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MITP.2017.3680959","article-title":"Security risk assessment in Internet of Things systems","volume":"19","author":"Nurse","year":"2017","journal-title":"IT professional"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref46","DOI":"10.1016\/j.cose.2021.102494"},{"issue":"4","key":"10.3233\/JHS-222042_ref47","first-page":"21","article-title":"Stochastic quantification of cyber attacks impact on smart grid contingency analysis","volume":"8","author":"Phiri","year":"2022","journal-title":"Journal of Electrical Engineering, Electronics, Control and Computer Science"},{"issue":"2","key":"10.3233\/JHS-222042_ref50","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42452-019-1931-0","article-title":"Future developments in standardisation of cyber risk in the Internet of Things (IoT)","volume":"2","author":"Radanliev","year":"2020","journal-title":"SN Applied Sciences"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref51","DOI":"10.3390\/app12031598"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref53","DOI":"10.1007\/978-3-030-35291-2_10"},{"key":"10.3233\/JHS-222042_ref54","doi-asserted-by":"publisher","first-page":"31695","DOI":"10.1109\/ACCESS.2021.3057655","article-title":"Web of things: Security challenges and mechanisms","volume":"9","author":"Sardar","year":"2021","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"A.\u00a0Shalaginov, A.\u00a0Iqbal and J.\u00a0Oleg\u00e5rd, Iot digital forensics readiness in the edge: A roadmap for acquiring digital evidences from intelligent smart applications, in: International Conference on Edge Computing, Springer, Cham, 2020, pp.\u00a01\u201317.","key":"10.3233\/JHS-222042_ref55","DOI":"10.1007\/978-3-030-59824-2_1"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref56","DOI":"10.4018\/978-1-5225-4100-4.ch009"},{"doi-asserted-by":"crossref","unstructured":"L.F.\u00a0Sikos, AI in digital forensics: Ontology engineering for cybercrime investigations, Wiley Interdisciplinary Reviews: Forensic Science 3(3) (2021), e1394.","key":"10.3233\/JHS-222042_ref57","DOI":"10.1002\/wfs2.1394"},{"unstructured":"G.\u00a0Surange and P.\u00a0Khatri, IoT forensics: A review on current trends, approaches and foreseen challenges, in: 2021 8th International Conference on Computing for Sustainable Global Development (INDIACom), IEEE, 2021, pp.\u00a0909\u2013913.","key":"10.3233\/JHS-222042_ref58"},{"doi-asserted-by":"publisher","key":"10.3233\/JHS-222042_ref60","DOI":"10.3390\/app10124102"},{"issue":"1","key":"10.3233\/JHS-222042_ref61","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s11277-017-4434-6","article-title":"Cyber security threats to IoT applications and service domains","volume":"95","author":"Tweneboah-Koduah","year":"2017","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"10.3233\/JHS-222042_ref62","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1049\/iet-cps.2017.0068","article-title":"Developing IoT applications: Challenges and frameworks","volume":"3","author":"Udoh","year":"2018","journal-title":"IET Cyber-Physical Systems: Theory & Applications"},{"key":"10.3233\/JHS-222042_ref63","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/OJCS.2020.2993259","article-title":"Personalized federated learning for intelligent IoT applications: A cloud-edge based framework","volume":"1","author":"Wu","year":"2020","journal-title":"IEEE Open Journal of the Computer Society"},{"doi-asserted-by":"crossref","unstructured":"T.\u00a0Wu, F.\u00a0Breitinger and I.\u00a0Baggili, IoT ignorance is digital forensics research bliss: A survey to understand IoT forensics definitions, challenges and future research directions, in: Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019, pp.\u00a01\u201315.","key":"10.3233\/JHS-222042_ref64","DOI":"10.1145\/3339252.3340504"},{"issue":"5","key":"10.3233\/JHS-222042_ref65","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2018.2825478","article-title":"IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?","volume":"35","author":"Xiao","year":"2018","journal-title":"IEEE Signal Processing Magazine"},{"key":"10.3233\/JHS-222042_ref66","doi-asserted-by":"publisher","first-page":"74586","DOI":"10.1109\/ACCESS.2020.2988059","article-title":"IoT-assisted ECG monitoring framework with secure data transmission for health care applications","volume":"8","author":"Xu","year":"2020","journal-title":"IEEE Access"},{"issue":"4","key":"10.3233\/JHS-222042_ref67","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1109\/JSSC.2017.2776302","article-title":"Recryptor: A reconfigurable cryptographic cortex-M0 processor with in-memory and near-memory computing for IoT security","volume":"53","author":"Zhang","year":"2018","journal-title":"IEEE Journal of Solid-State Circuits"}],"container-title":["Journal of High Speed Networks"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JHS-222042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T15:20:13Z","timestamp":1741620013000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JHS-222042"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,21]]},"references-count":57,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/jhs-222042","relation":{},"ISSN":["1875-8940","0926-6801"],"issn-type":[{"type":"electronic","value":"1875-8940"},{"type":"print","value":"0926-6801"}],"subject":[],"published":{"date-parts":[[2023,4,21]]}}}