{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:10:34Z","timestamp":1775067034245,"version":"3.50.1"},"reference-count":40,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The advancement of Internet of Things (IoT), robots, drones, and vehicles signifies ongoing progress, accompanied by increasing complexities and challenges in forensic investigations. Globally, investigators encounter obstacles when extracting evidence from these vast landscapes, which include diverse devices, networks, and cloud environments. Of particular concern is the process of evidence collection, especially regarding fingerprints and facial recognition within the realm of vehicle forensics. Moreover, ensuring the integrity of forensic evidence is a critical issue, as it is vulnerable to attacks targeting data centres and server farms. Mitigating these challenges, along with addressing evidence mobility, presents additional complexities. This paper introduces a groundbreaking infrastructure known as SpiderNet, which is based on cloud computing principles. We will illustrate how this architecture facilitates the identification of devices, secures the integrity of evidence both at its source and during transit, and enables investigations into individuals involved in criminal activities. Through case studies, we will demonstrate the potential of SpiderNet to assist law enforcement agencies in addressing crimes perpetrated within IoT environments.<\/jats:p>","DOI":"10.3390\/fi17020092","type":"journal-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T12:36:57Z","timestamp":1739795817000},"page":"92","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Investigation of Smart Machines with DNAs in SpiderNet"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8741-6986","authenticated-orcid":false,"given":"Mo","family":"Adda","sequence":"first","affiliation":[{"name":"School of Computing, University of Portsmouth, University House Winston Churchill Ave, Portsmouth PO1 2UP, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7653-1711","authenticated-orcid":false,"given":"Nancy","family":"Scheidt","sequence":"additional","affiliation":[{"name":"Department of Policing, Criminology and Forensics, University of Winchester, Sparkford Road, Winchester SO22 4NR, UK"}]}],"member":"1968","published-online":{"date-parts":[[2025,2,17]]},"reference":[{"key":"ref_1","unstructured":"Zinno, S., Rotbei, S., Gallo, L., Botta, A., and Ventre, G. (2025, February 12). Robots and Forensics: A Focused Survey. Available online: https:\/\/ssrn.com\/abstract=4530982."},{"key":"ref_2","first-page":"200237","article-title":"Cyber security of robots: A comprehensive survey","volume":"18","author":"Botta","year":"2023","journal-title":"Intell. Syst. Appl."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1016\/j.trpro.2021.01.040","article-title":"Enabling Digital Forensics Readiness for Internet of Vehicles","volume":"52","author":"Alexakos","year":"2021","journal-title":"Transp. Res. Procedia"},{"key":"ref_4","first-page":"301440","article-title":"Digital forensic analysis of mobile automotive maintenance applications","volume":"43","author":"Sumaila","year":"2022","journal-title":"Forensic Sci. Int. Digit. Investig."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1049\/iet-its.2019.0565","article-title":"Controller area network reliability: Overview of design challenges and safety related perspectives of future transportation systems","volume":"14","author":"Nasri","year":"2020","journal-title":"IET Intell. Transp. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"103340","DOI":"10.1016\/j.cose.2023.103340","article-title":"Unmanned Aerial Vehicle (UAV) Forensics: The Good, The Bad, and the Unaddressed","volume":"132","author":"Studiawan","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Al-Dhaqm, A., Ikuesan, R.A., Kebande, V.R., Razak, S., and Ghabban, F.M. (2021). Research Challenges and Opportunities in Drone Forensics Models. Electronics, 10.","DOI":"10.3390\/electronics10131519"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"MacDermott, A., Baker, T., and Shi, Q. (2018, January 26\u201328). Iot Forensics: Challenges for the Ioa Era. Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France.","DOI":"10.1109\/NTMS.2018.8328748"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"S22","DOI":"10.1016\/j.diin.2019.01.012","article-title":"IoT forensic challenges and opportunities for digital traces","volume":"28","author":"Servida","year":"2019","journal-title":"Digit. Investig."},{"key":"ref_10","unstructured":"Alazab, A., Khraisat, A., and Singh, S. (2025, February 12). A Review on the Internet of Things (IoT) Forensics: Challenges, Techniques, and Evaluation of Digital Forensic Tools. Available online: https:\/\/www.intechopen.com\/online-first\/86010."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Scheidt, N., and Adda, M. (2020, January 28\u201330). Identification of IoT devices for forensic investigation. Proceedings of the 2020 IEEE 10th International Conference on Intelligent Systems (IS), Varna, Bulgaria.","DOI":"10.1109\/IS48319.2020.9200150"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Hossain, M., Kayas, G., Hasan, R., Skjellum, A., Noor, S., and Islam, S.M.R. (2024). A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives. Future Internet, 16.","DOI":"10.3390\/fi16020040"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"102210","DOI":"10.1016\/j.cose.2021.102210","article-title":"NLP-based digital forensic investigation platform for online communications","volume":"104","author":"Sun","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Wickramasekara, A., and Scanlon, M. (2024, January 29\u201330). A Framework for Integrated Digital Forensic Investigation Employing AutoGen AI Agents. Proceedings of the 2024 12th International Symposium on Digital Forensics and Security (ISDFS), San Antonio, TX, USA.","DOI":"10.1109\/ISDFS60797.2024.10527235"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1109\/TC.2022.3157996","article-title":"A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things","volume":"72","author":"Liu","year":"2022","journal-title":"IEEE Trans. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"3346","DOI":"10.1109\/JIOT.2020.3022033","article-title":"IoTCop: A Blockchain-Based Monitoring Framework for Detection and Isolation of Malicious Devices in Internet-of-Things Systems","volume":"8","author":"Seshadri","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Alqahtani, F., Almutairi, M., and Sheldon, F.T. (2024). Cloud Security Using Fine-Grained Efficient Information Flow Tracking. Future Internet, 16.","DOI":"10.3390\/fi16040110"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"100016","DOI":"10.1016\/j.csa.2023.100016","article-title":"Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends","volume":"1","author":"Javaid","year":"2023","journal-title":"Cyber Secur. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"19","DOI":"10.21833\/ijaas.2022.03.003","article-title":"A survey on issues in cloud forensics with an experiment on time consumption","volume":"9","author":"Hettige","year":"2022","journal-title":"Int. J. Adv. Appl. Sci."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.procs.2023.11.059","article-title":"Evaluation and analysis of forest carbon sequestration and oxygen release value under cloud computing framework","volume":"228","author":"Han","year":"2023","journal-title":"Procedia Comput. Sci."},{"key":"ref_21","first-page":"122","article-title":"An Overview of Cloud Computing and Leading Cloud Service Providers","volume":"15","author":"Borra","year":"2024","journal-title":"Int. J. Comput. Eng. Technol. (IJCET)"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1177\/02683962221141456","article-title":"Building data management capabilities to address data protection regulations: Learnings from EU-GDPR","volume":"38","author":"Labadie","year":"2023","journal-title":"J. Inf. Technol."},{"key":"ref_23","unstructured":"Fraser, S., and Portillo-Dominguez, A. (2025, February 12). A Systematic Review of How Cloud Infrastructure and GDPR Have Affected Digital Investigations in a Multinational Business Context. Available online: https:\/\/arrow.tudublin.ie\/buschrsmoth."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Akbarfam, A.J., Heidaripour, M., Maleki, H., Dorai, G., and Agrawal, G. (2023, January 1\u20134). ForensiBlock: A Provenance-Driven Blockchain Framework for Data Forensics and Auditability. Proceedings of the 2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2023, Atlanta, GA, USA.","DOI":"10.1109\/TPS-ISA58951.2023.00025"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Herman, M., Iorga, M., Salim, A.M., Jackson, R.H., Hurst, M.R., Leo, R.A., Mishra, A.K., Landreville, N.M., and Wang, Y. (2024). NIST Cloud Computing Forensic Reference Architecture, National Institute of Standards and Technology.","DOI":"10.6028\/NIST.SP.800-201.ipd"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1186\/s13677-019-0133-z","article-title":"Experts reviews of a cloud forensic readiness framework for organizations","volume":"8","author":"Alenezi","year":"2019","journal-title":"J. Cloud Comput."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"173","DOI":"10.30574\/ijsra.2023.8.1.0023","article-title":"The cloud forensics frameworks and tools: A brief review","volume":"8","author":"Mohammed","year":"2023","journal-title":"Int. J. Sci. Res. Arch."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Alshabibi, M.M., Dookhi, A.K.B., and Rahman, M.M.H. (2024). Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review. Computers, 13.","DOI":"10.3390\/computers13080213"},{"key":"ref_29","unstructured":"Scheidt, N. (2022). An IoT Forensic Framework Based on DNA, a Hybrid Forensic Server and Confidence Value Models, University of Portsmouth."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"133","DOI":"10.3390\/standards4030008","article-title":"Formal Language for Objects\u2019 Transactions","volume":"4","author":"Adda","year":"2024","journal-title":"Standards"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Zhou, J., Fu, W., Hu, W., Sun, Z., He, T., and Zhang, Z. (2024). Challenges and Advances in Analyzing TLS 1.3-Encrypted Traffic: A Comprehensive Survey. Electronics, 13.","DOI":"10.3390\/electronics13204000"},{"key":"ref_32","first-page":"277","article-title":"An Evaluation of the Proposed Security Access Control for BYOD Devices with Mobile Device Management (MDM)","volume":"12","author":"Jimshith","year":"2024","journal-title":"Int. J. Electr. Electron. Res."},{"key":"ref_33","unstructured":"Schwarz, E. (2025, February 12). The Hacker Way: Moral Decision Logics with Lethal Autonomous Weapons Systems. Available online: https:\/\/intimacies-of-remote-warfare.nl\/events\/the-hacker-way-moral-decision-logics-with-lethal-autonomous-weapons-systems\/."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"239","DOI":"10.21827\/GroJIL.9.2.239-265","article-title":"Defining Weapon Systems with Autonomy: The Critical Functions in Theory and Practice","volume":"9","author":"Hayir","year":"2022","journal-title":"Gron. J. Int. Law"},{"key":"ref_35","unstructured":"Hernandez, J. (2024, September 05). A Military Drone with a Mind of Its Own Was Used in Combat, U.N. Says. NPR News, Available online: https:\/\/www.npr.org\/2021\/06\/01\/1002196245\/a-u-n-report-suggests-libya-saw-the-first-battlefield-killing-by-an-autonomous-d."},{"key":"ref_36","unstructured":"Atkinson, E. (2024, September 05). Man crushed to death by robot in South Korea. BBC News, Available online: https:\/\/www.bbc.co.uk\/news\/world-asia-67354709."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"3303","DOI":"10.1016\/j.matpr.2020.04.736","article-title":"Fundamentals and development of self-driving cars","volume":"33","author":"Yoganandhan","year":"2020","journal-title":"Mater. Today Proc."},{"key":"ref_38","unstructured":"Riess, R. (2024, September 05). Uber Self-Driving Car Test Driver Pleads Guilty to Endangerment in Pedestrian Death Case. CNN, Available online: https:\/\/edition.cnn.com\/2023\/07\/29\/business\/uber-self-driving-car-death-guilty\/index.html."},{"key":"ref_39","unstructured":"Madiega, T. (2024, September 12). Legislative Train 08.2024 2 a Europe Fit for the Digital Age. Available online: https:\/\/www.europarl.europa.eu\/legislative-train\/carriage\/ai-liability-directive\/report?sid=8301."},{"key":"ref_40","unstructured":"Mahmood, S. (2024, September 12). UK Signs First International Treaty Addressing Risks of Artificial Intelligence. Ministry of Justice. [Online], Available online: https:\/\/www.gov.uk\/government\/news\/uk-signs-first-international-treaty-addressing-risks-of-artificial-intelligence."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/2\/92\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:36:27Z","timestamp":1760027787000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/2\/92"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,17]]},"references-count":40,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["fi17020092"],"URL":"https:\/\/doi.org\/10.3390\/fi17020092","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,17]]}}}