Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future

by   Shams Forruque Ahmed, et al.

Given the exponential expansion of the internet, the possibilities of security attacks and cybercrimes have increased accordingly. However, poorly implemented security mechanisms in the Internet of Things (IoT) devices make them susceptible to cyberattacks, which can directly affect users. IoT forensics is thus needed for investigating and mitigating such attacks. While many works have examined IoT applications and challenges, only a few have focused on both the forensic and security issues in IoT. Therefore, this paper reviews forensic and security issues associated with IoT in different fields. Future prospects and challenges in IoT research and development are also highlighted. As demonstrated in the literature, most IoT devices are vulnerable to attacks due to a lack of standardized security measures. Unauthorized users could get access, compromise data, and even benefit from control of critical infrastructure. To fulfil the security-conscious needs of consumers, IoT can be used to develop a smart home system by designing a FLIP-based system that is highly scalable and adaptable. Utilizing a blockchain-based authentication mechanism with a multi-chain structure can provide additional security protection between different trust domains. Deep learning can be utilized to develop a network forensics framework with a high-performing system for detecting and tracking cyberattack incidents. Moreover, researchers should consider limiting the amount of data created and delivered when using big data to develop IoT-based smart systems. The findings of this review will stimulate academics to seek potential solutions for the identified issues, thereby advancing the IoT field.


Security Threats and Research Challenges of IoT-A Review

Internet of things (IoT) is the epitome of sustainable development. It h...

The Challenges with Internet of Things for Business

Many companies consider IoT as a central element for increasing competit...

On-Chain IoT Data Modification in Blockchains

In recent years, the interest growth in the Blockchains (BC) and Interne...

Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review

Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks ...

Social-Feature Enabled Communications among Devices towards Smart IoT Community

Future IoT is expected to get ubiquitous connection and access in a glob...

Reinforcement Learning for IoT Security: A Comprehensive Survey

The number of connected smart devices has been increasing exponentially ...

Effectiveness of Transformer Models on IoT Security Detection in StackOverflow Discussions

The Internet of Things (IoT) is an emerging concept that directly links ...

Please sign up or login with your details

Forgot password? Click here to reset