物联网取证综述  被引量:7

Survey of IoT Forensics

在线阅读下载全文

作  者:梁广俊 辛建芳 王群[1] 倪雪莉 郭向民 夏玲玲 LIANG Guangjun;XIN Jianfang;WANG Qun;NI Xueli;GUO Xiangmin;XIA Lingling(Department of Computer Information and Cybersecurity,Jiangsu Police Institute,Nanjing 210031,China;National and Local Joint Engineering Laboratory of Radio Frequency Integration and Micro-assembly Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,China;School of Intelligent Engineering,Nanjing Institute of Railway Technology,Nanjing 210031,China;Jiangsu Engineering Research Center for Electronic Data Forensics and Analysis,Nanjing 210031,China;Key Laboratory of Digital Forensics,Public Security Department of Jiangsu Province,Nanjing 210031,China)

机构地区:[1]江苏警官学院计算机信息与网络安全系,南京210031 [2]南京邮电大学射频集成与微组装技术国家地方联合工程实验室,南京210003 [3]南京铁道职业技术学院智能工程学院,南京210031 [4]江苏省电子数据取证分析工程研究中心,南京210031 [5]江苏省公安厅数字取证重点实验室,南京210031

出  处:《计算机工程与应用》2022年第8期12-32,共21页Computer Engineering and Applications

基  金:国家自然科学基金(61802155);江苏警官学院高层次引进人才科研启动项目(JSPI19GKZL407);南京邮电大学射频集成与微组装技术国家地方联合工程实验室开放课题(KFJJ20200201);江苏省教育厅重大项目-物联网取证建模分析研究(20KJA520004);公安技术、网络空间安全“十四五”江苏省重点学科。

摘  要:物联网时代的到来为人们带来极大的便利,但也使得网络攻击的范围更广,带来了新的网络空间安全威胁。海量的物联网设备保留了丰富的数字痕迹,可以洞悉人们在家中和其他场所的各种行为,这对于数字取证具有重要意义。针对物联网取证展开深入讨论,从物联网取证的兴起、发展和研究现状入手,进一步探讨数字取证模型、1-2-3区域方法模型、并行结构-物联网取证模型、隐私保护取证模型以及针对特殊应用的取证模型。探讨了物联网取证的机遇和挑战。力求为读者在系统学习物联网取证技术的基础上致力于更深入的研究提供帮助和借鉴。The advent of the Internet of Things era brings great convenience to people, but it also makes the scope of cyberspace attacks wider and brings new cyberspace security threats. Massive IoT devices retain a wealth of digital traces,which can provide insight into people’s various behaviors at home and other places. This is of great significance for digital forensics. This article has an in-depth discussion on IoT forensics, starting with the rise, development and research status of IoT forensics, and further discusses digital forensics models, 1-2-3 regional method models, parallel structure-IoT forensics models, privacy protection forensics models, and forensic model for special applications. Finally, it elaborates on the opportunities and challenges of forensics in the Internet of Things. This article strives to provide readers with help and reference for more in-depth research on the basis of systematically learning IoT forensics technology.

关 键 词:物联网取证 数字取证 取证模型 隐私保护 

分 类 号:TP399[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象