Threats and Corrective Measures for Iot Security with Observance of Cybercrime: a Survey
Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey Sita Rania, Aman Katariab, Vishal Sharmac, Smarajit Ghoshd, Vinod Karare, Kyungroul Leef, and Chang Choig aDepartment of Computer Science & Engineering, Gulzar Group of Institutes, Khanna-141401, Punjab, INDIA. bOptical Devices and Systems, CSIR, CSIO, Chandigarh-160030, INDIA c* EEECS, Queen’s University Belfast, Northern Ireland, UK d Department of Electrical and Instrumentation Engineering, Thapar Institute of Engineering and Technology, Patiala, INDIA. eChief Scientist, Optical Devices and Systems, CSIR-CSIO, Chandigarh-160030, INDIA. fSchool of Computer Software, Daegu Catholic University, Gyeongsan-si, KOREA gDepartment of Computer Engineering, Gachon University, Seongnam, KOREA A B S T R A C T Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality and comfort. IoT has contributed significantly to numerous application areas. The stormy expansion of smart devices and their credence for data transfer using wireless mechanics boosts their susceptibility to cyber-attacks. Consequently, the rate of cybercrime is increasing day by day. Hence, the study of IoT security threats and possible corrective measures can benefit the researchers to identify appropriate solutions to deal with various challenges in cybercrime investigation. IoT forensics plays a vital role in cybercrime investigations. This review paper presents an overview of the IoT framework consisting of IoT architecture, protocols, and technologies. Various security issues at each layer and corrective measures are also discussed in detail. This paper also presents the role of IoT forensics in cybercrime investigation in various domains like smart homes, smart cities, automated vehicles, healthcare, etc. Along with, the role of advanced technologies like Artificial Intelligence, Machine Learning, Cloud computing, Edge computing, Fog computing, and Blockchain technology in cybercrime investigation are also discussed.
[Show full text]