Digital Forensics and Internet of Things. Группа авторов
target="_blank" rel="nofollow" href="#u5099c0a5-48b0-57a2-b139-d78f1d8cf011">8 IoT Sensors: Security in Network Forensics 8.1 Introduction 8.2 Cybersecurity Versus IoT Security and Cyber-Physical Systems 8.3 The IoT of the Future and the Need to Secure 8.4 Security Engineering for IoT Development 8.5 Building Security Into Design and Development 8.6 Security in Agile Developments 8.7 Focusing on the IoT Device in Operation 8.8 Cryptographic Fundamentals for IoT Security Engineering 8.9 Cloud Security for the IoT 8.10 Conclusion References
13 9 Xilinx FPGA and Xilinx IP Cores: A Boon to Curb Digital Crime 9.1 Introduction 9.2 Literature Review 9.3 Proposed Work 9.4 Xilinx IP Core Square Root 9.5 RTL View of the 8-Bit Multiplier 9.6 RTL View of 8-Bit Down Counter 9.7 Up/Down Counter Simulation Results 9.8 Square Root Simulation Results 9.9 Hardware Device Utilization Reports of Binary Down Counter 9.10 Comparison of Proposed and Existing Work for Binary Up/Down Counter 9.11 Conclusion References
14 10 Human-Robot Interaction: An Artificial Cognition-Based Study for Criminal Investigations 10.1 Introduction 10.2 Methodology 10.3 Architecture Models for Robots 10.4 Cognitive Architecture 10.5 Challenges in the Existing Social Robots and the Future Scopes 10.6 Conclusion 10.7 Robots in Future Pandemics References
15 11 VANET: An IoT Forensic-Based Model for Maintaining Chain of Custody 11.1 Introduction 11.2 Cluster Performance Parameters 11.3 Routing Protocols in VANET 11.4 Internet of Vehicles 11.5 IoT Forensic in Vehicular Ad Hoc Networks 11.6 Conclusion References
16 12 Cognitive Radio Networks: A Merit for Teleforensics 12.1 Introduction 12.2 Contribution of Work 12.3 Conclusion and Future Scope Acknowledgement References
17 13 Fingerprint Image Identification System: An Asset for Security of Bank Lockers 13.1 Introduction 13.2 Result and Discussion 13.3 Conclusion 13.4 Future Scope References
18 14 IoT Forensics: Interconnection and Sensing Frameworks 14.1 Introduction 14.2 The Need for IoT Forensics 14.3 Various Types of Evidences Encountered 14.4 Protocols and Frameworks in IoT Forensics 14.5 IoT Forensics Process Model 14.6 Suggestive Solutions 14.7 Conclusion References
19
15 IoT Forensics: A Pernicious Repercussions
15.1 Introduction: Challenges in IoT Forensics
15.2 Scope of the Compromise and Crime Scene Reconstruction
15.3 Device and Data Proliferation
15.4 Multiple Data Location and Jurisdiction Challenges
15.5 Device Type
15.6 Lack of Training and Weak Knowledge Management
15.7 Data Encryption
15.8 Heterogeneous Software and/or Hardware Specifications