2016
DOI: 10.5120/ijca2016909390
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Prospects and Challenges of Internet of Things

Abstract: The Internet of Things (IoT) connects physical objects such as baby monitors, cars, tablet computers, fridges through the internet and they are equipped with capabilities to communicate with each other. They exchange information about themselves and their surroundings and provide improved efficiencies for the benefit of users. The future Internet is an emerging world of highly networked smart items that will be able to independently communicate with each other with little or no human intervention as the world … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 21 publications
(34 reference statements)
0
7
0
1
Order By: Relevance
“…The first and probably the most essential part of any forensic examination is the search for evidence [29]. Hegarty et al [95] assert that identification in the IoT context is especially difficult, since in some cases the examiners do not even know where the investigated data is physically stored [96]. Even a simple task like finding the compromised IoT device and reconstructing the crime scene could be challenging.…”
Section: A Evidence Identificationmentioning
confidence: 99%
See 1 more Smart Citation
“…The first and probably the most essential part of any forensic examination is the search for evidence [29]. Hegarty et al [95] assert that identification in the IoT context is especially difficult, since in some cases the examiners do not even know where the investigated data is physically stored [96]. Even a simple task like finding the compromised IoT device and reconstructing the crime scene could be challenging.…”
Section: A Evidence Identificationmentioning
confidence: 99%
“…2) Device and Data Proliferation: The increasing number of interconnected devices and the amount of digital forensic data requiring analysis, has been discussed over many years [98]. A report conducted by the International Data Corporation (IDC) states that the estimated growth of data from 2005 to 2020 is expected to be 40.000 exabytes [96]. Hence, the traditional digital forensics tools are incapable of handling such tremendous increase in volume, variety and velocity [34].…”
Section: ) Scope Of the Compromise And Crime Scenementioning
confidence: 99%
“…Menurut Osman (Osman, Osei, & Narendra, 2016), masa depan internet adalah sebuah dunia baru berupa jaringan yang kuat dari perangkat smart yang secara independen dapat berkomunikasi satu sama lain dengan sedikit intervensi manusia, atau bahkan tanpa intervensi sama sekali. Imbas dari hal tersebut akan memunculkan teknologi baru bernama internet of things (IoT).…”
Section: Pendahuluanunclassified
“…The protocol is designed in a way that provides permissions to prevent eavesdropping, manipulating or forging massages for server and client applications. DTLS protocol is located in the transport layer security (TLS) 35 protocol and this protocol provides equivalent security guarantees (Iglesias et al, 2017) 36 . Since some of the IOT devices are placed in the environments in which power supply is not accessible, only have little energy to execute planed capabilities and heavy security instructions can discharge devices' sources (Yang et al, 2017) 37 .…”
Section:  An Overview Of the Research Backgroundmentioning
confidence: 99%
“…The first kind is among the smart devices and the IOT devices, sensors and home appliances and the second kind is among the smart devices and tools control centers. The first data flow can be run among the wireless connections like LowPAN, Zigbee and 33 Internet Protocol Version 34 Babovic, Protic&Milutinovic 35 Transport Layer Security 36 Iglesias, Orive&Urbieta 37 Yang, Wu, Yin & Zhao 38 Navas, Lagos, Toutain&Vijayasan 39 Chavan, K.Nighot Z-wave. The second data flow cab be run using cellular communications or through internet.…”
Section:  An Overview Of the Research Backgroundmentioning
confidence: 99%