90
Views
0
CrossRef citations to date
0
Altmetric
Research Article

IoT forensics: What kind of personal data can be found on discarded, recycled, or re-sold IoT devices

, , &

References

  • Alenezi, Ahmed, et al., IoT forensics: A state-of-the-art review, challenges, and future directions, In: Proceedings of the 4th International Conference on Complexity, Future Information Systems, (2019).
  • Atlam H.F., et al., Security, Cybercrime and Digital Forensics for IoT, Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm. Intelligent Systems Reference Library, Springer, (2020).
  • Bruce Schneier, Security Economics of the Internet of Things. URL: https://www.schneier.com/crypto-gram/archives/2016/1015.html, (2021).
  • Giese D, and Noubir G, Amazon echo dot or the reverberating secrets of IoT devices, In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (2021).
  • G. K. J, et al., Identification of Cyber Threats and Parsing of Data, 2021 5th International Conference on Trends in Electronics and Informatics (ICOEI), 2021, pp. 556-564.
  • Ming Di, Shah Nazir, Fucheng Deng, and Sikandar Ali, Influencing User’s Behavior Concerning Android Privacy Policy: An Overview, Mobile Information Systems, pp. 1-19, (2021). doi: https://doi.org/10.1155/2021/3452700
  • Nieto, et al., IoT-forensics meets privacy: towards cooperative digital investigations, in: sensors, (2018).
  • Singh and Nanhay, An ensemble hyper-tuned model for IoT sensors attacks and anomaly detection, Journal of Information and Optimization Sciences, 41.7, Taylor & Francis, (2020).
  • Tamilvizhi T, Parvatha Varthini B. and R. Surendran, An improved solution for resource management based on elastic cloud balancing and job shop scheduling, ARPN Journal of Engineering and Applied Sciences, 10.18, (2015).
  • Conacher, et al. Caveat Venditor, Used USB Drive Owner, SSRN Electronic Journal, (2020).
  • Pantaleon Luttaa, Mohamed Sedkya, Mohamed Hassana, Uchitha Jayawickramab and Benhur Bakhtiari Bastakia, The complexity of internet of things forensics: A state-of-the-art review, Forensic Science International: Digital Investigation, 38, 301210, (2021).
  • Bhanu Chander and Kumaravelan, Secure authentication in IoT and cloud server: An ECC based practice, Journal of Discrete Mathematical Sciences and Cryptography, 24.5, pp. 1229-1240 (2021). doi: https://doi.org/10.1080/09720529.2021.1932906

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.