Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

A Review of Prospects and Challenges of Internet of Things

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Osman Yakubu, Osei Adjei, Narendra Babu C.
10.5120/ijca2016909390

Osman Yakubu, Osei Adjei and Narendra Babu C.. Article: A Review of Prospects and Challenges of Internet of Things. International Journal of Computer Applications 139(10):33-39, April 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Osman Yakubu and Osei Adjei and Narendra Babu C.},
	title = {Article: A Review of Prospects and Challenges of Internet of Things},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {139},
	number = {10},
	pages = {33-39},
	month = {April},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

The Internet of Things (IoT) connects physical objects such as baby monitors, cars, tablet computers, fridges through the internet and they are equipped with capabilities to communicate with each other. They exchange information about themselves and their surroundings and provide improved efficiencies for the benefit of users. The future Internet is an emerging world of highly networked smart items that will be able to independently communicate with each other with little or no human intervention as the world moves into the era of smart phones, smart homes, smart offices, smart vehicles, smart classrooms, smart factories to smart everything. As the Internet of Things (IoT) continues to grow security including new attack vectors, new vulnerabilities, and perhaps most concerning of all, a vastly increased ability to use remote access to cause physical destruction becomes a major concern. In this paper we seek to explain what the Internet of Things is, its future impact, challenges and how Digital Forensics Technology can be used to get evidence to prosecute offenders in the law court.

References

  1. ACPO (2012) ACPO Good Practice Guide for Digital Evidence,Available at: http://www.digital-detective.net/digital-forensics-documents/ACPO_Good_Practice_Guide_for_Digital_Evidence_v5.pdf (Accessed: 20th October 2015).
  2. ASHTON, K. (2009) 'That 'Internet of Things' Thing', RFiD Journal , 22 (), pp. 97–114.
  3. BBC News (2015) How the internet of things is changing the way we live, Available at:http://www.bbc.com/future/sponsored/story/20150706-how-the-internet-of-things-is-changing-the-way-we-live (Accessed: 5th October 2015).
  4. Bos, H., Ioannidis, S., Jonsson, E., Kird, E. and Kruegel, C. (2009 ) 'Future Threats to Future Trust', Proceedings of the First International Conference Future of Trust in Computing Springer,(), pp. pp. 49-54.
  5. Bradley, J., Barbier, J., and Handler, D., (2013) 'Embracing the Internet of Everything To Capture Your Share of $14.4 Trillion More Relevant, Valuable Connections Will Improve Innovation, Productivity, Efficiency & Customer Experience', CISCO White Paper, (), pp. [Online]. Available at:http://www.cisco.com/web/about/ac79/docs/innov/IoE_Economy.pdf(Accessed: 29th September 2015).
  6. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J. and Brandic, I. (2009) ' Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility', Future Generation Computer Systems, Elsevier, 25(6), pp. 599-616.
  7. Cassidy, A. (2014) The “Internet of Things“ Revolution and Digital Forensics, Available at:http://www.nuix.com/2014/02/19/the-internet-of-things-revolution-and-digital-forensics (Accessed: 30th October 2015).
  8. Coughlin, T (2014) Digital Storage and The Internet Of Things,Available at:http://www.forbes.com/sites/tomcoughlin/2014/11/30/digital-storage-and-the-internet-of-things/ (Accessed: 25th September 2015).
  9. Davies, R (2015) 'The Internet of Things Opportunities and challenges', European Parliamentary Research Service, PE 557.012(), pp. [Online]. Available at:http://www.europarl.europa.eu/RegData/etudes/BRIE/2015/557012/EPRS_BRI(2015)557012_EN.pdf(Accessed: 15th September 2015).
  10. Dlamini, M., Eloff, M. and Eloff, J. (2009) 'Internet of things: emerging and future scenarios from an information security perspective', Southern Africa Telecommunication Networks and Applications Conference, (), pp. 6.
  11. Drozhzhin, A. (2015) Internet of Crappy Things, Available at:https://blog.kaspersky.com/internet-of-crappy-things/7667/(Accessed: 2nd October 2015).
  12. Fremantle, P., Scott, P. (2015) 'A security survey of middleware for the Internet of Things', PeerJ PrePrints 3:e1521, PeerJ PrePrints 3:e1521(), pp. [Online]. Available at:https://dx.doi.org/10.7287/peerj.preprints.1241v1 (Accessed: 21st October 2015).
  13. Friedewald, M., Vildjiounaite, E., Punie, Y. and Wright (2007) 'Privacy, identity and security in ambient intelligence: A scenario analysis', Telematics and Informatics, 24(1), pp. 15–29.
  14. Goodin, D. (2011) Insulin pump hack delivers fatal dosage over the air, Available at:http://www.theregister.co.uk/2011/10/27/fatal_insulin_pump_attack/(Accessed: 19th October 2015).
  15. Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M (2013) 'Internet of Things (IoT): A vision, architectural elements, and future directions', Future Generation Computer Systems Elsevier,29(7), pp. 1645–1660.
  16. Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T. and Maisel, W.H. (2008) 'Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses', IEEE Symposium on Security and Privacy., (), pp. 129 - 142.
  17. Hegarty, R.C. , Lamb, D.J. and Attwood, A. (2014) 'Digital Evidence Challenges in the Internet of Things ', International Workshop on Digital Forensics and Incident Analysis , (), pp. 163-172.
  18. Induruwa, A. (2011) 'Hidden in the clouds: The impact on data security and forensic investigation', IEEE International Conference on Advances in ICT for Emerging Regions, (), pp. 77.
  19. Intenational Telecommunication Union (ITU), (2005) Intenational Telecommunication Union (ITU), , Available at:http://www.itu.int/osg/spu/publications/internetofthings/InternetofThings_summary.pdf(Accessed: 5th September 2015).
  20. KrebsOnSecurity (2012) FBI: Smart Meter Hacks Likely to Spread,Available at: http://krebsonsecurity.com/2012/04/fbi-smart-meter-hacks-likely-to-spread/ (Accessed: 17th October 2015).
  21. Kvochko, E., O’Halloran (2015) Industrial Internet of Things: unleashing the potential of connected products and services, Geneva: World Economic Forum.
  22. Lane, N.D., Miluzzo, E., Lu, H., Peebles, D., Choudhury, T. and Campbell, A.T. (2010) 'A survey of mobile phone sensing',Communications Magazine, IEEE , 48(9), pp. 140 - 150.
  23. Markoff, J. (2011) Researchers Show How a Car’s Electronics Can Be Taken Over Remotely, Available at:http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0(Accessed: 11th October 2015).
  24. Mattern, F., Floerkemeier, C. (2010) 'From the internet of computers to the internet of things', Springer-Verlag, (), pp. 242-259.
  25. McKemmish, R. (1999) 'What is Forensic Computing?', Australian Institute of Criminology, Trends and Issues in Crime and Criminal Justice, (118), pp. .
  26. Microsoft (2011) SQL Injection, Available at:https://technet.microsoft.com/en-us/library/ms161953(v=SQL.105).aspx (Accessed: 15th September 2015).
  27. Miorandi, D., Sicari, S., De Pellegrini, F., and Chlamtac, I. (2012) 'Internet of Things: Vision, Applications and Research Challenges',Elsevier Ad Hoc Networks, 10(7 ), pp. 1497–1516. doi:10.1016/j.adhoc.2012.02.016.
  28. Oriwoh, E., & Williams, G. (2015) ' Internet of Things: The Argument for Smart Forensics', Handbook of Research on Digital Crime, Cyberspace Security and Information Assurance, (), pp. 407-423. doi:10.4018/978-1-4666-6324-4.ch026.
  29. Oriwoh, E., Jazani, D., Epiphaniou, G. (2013) 'Internet of Things Forensics: Challenges and Approaches', Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, DOI 10.4108/icst.collaboratecom.2013.254159(), pp. .
  30. Osborne, G., and Slay, J. (2011) 'Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence',IEEE 2011 Sixth International Conference on Availability, Reliability and Security, (), pp. 196–201. doi:10.1109/ARES.2011.36.
  31. Pereira, P., P. ,Eliasson, J., Kyusakov, R., Delsing, J., Raayatinezhad, A. and Johansson, M. (2013) 'Enabling Cloud Connectivity for Mobile Internet of Things Applications',Proceedings of the 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering, (), pp. 518-526.
  32. Ramirez, E. (2015) 'Opening Remarks of FTC Chairwoman Edith Ramirez, Privacy and the IoT: Navigating Policy Issues',International Consumer Electronics Show Las Vegas, Nevada, (), pp. [Online]. Available at:https://www.ftc.gov/system/files/documents/public_statements/617191/150106cesspeech.pdf(Accessed: 15th October 2015).
  33. Sen, J. (2013) 'Security and privacy issues in cloud computing',Architectures and Protocols for Secure Information Technology Infrastructures, (), pp. 1-45.
  34. Shawish, A. and Salama, M. (2014) 'Cloud Computing: Paradigms and Technologies', Inter-cooperative Collective Intelligence: Techniques and Applications, Studies in Computational Intelligence, Springer, 495(), pp. 39-67, DOI: 10.1007/978-3-642-35016-0_2,.
  35. Taylor, M., Haggerty, J., Gresty, D. and Hegarty, R. (2010) 'Digital evidence in Cloud Computing Systems', Elsevier Computer Law & Security Review, 26(3), pp. 304–308 doi:10.1016/j.clsr.2010.03.002.
  36. The President’s National Security Telecommunications Advisory Committee (n.d.) 'NSTAC Report to the President on the Internet of Things', , (), pp. [Online]. Available at:http://www.dhs.gov/sites/default/files/publications/IoT%20Final%20Draft%20Report%2011-2014.pdf (Accessed: 19th October 2015).
  37. Veracode (n.d.) 'The Internet of Things: Security Research Study',Veracode White Paper , (), pp. [Online]. Available at:https://www.veracode.com/sites/default/files/Resources/Whitepapers/internet-of-things-whitepaper.pdf (Accessed: 18th October 2015).
  38. Weber, R.H. and Weber, R. (2010) Internet of Things: Legal Perspectives, Zurich: Springer.
  39. Weiser, M (1991) 'The Computer for the 21st Century', Scientific American , 265(), pp. [Online]. Available at:https://www.ics.uci.edu/~corps/phaseii/Weiser-Computer21stCentury-SciAm.pdf (Accessed: 30th September 2015).
  40. Wind River Systems, Inc. (2015) 'Security in the Internet of Things, Lessons from the Past for the Connected Future', Wind White Paper, (), pp. [Online]. Available at:http://www.windriver.com/whitepapers/security-in-the-internet-of-things/wr_security-in-the-internet-of-things.pdf (Accessed: 21st October 2015).
  41. Yusoff, Y., Ismail, R. and Hassan, Z. (2011) 'Common Phases of Computer Forensics Investigation Models', International Journal of Computer Science and Information Technology, 3(3), pp. 17-31. DOI : 10.5121/ijcsit.2011.3302 .
  42. Garcia, J. (2005) Proactive & Reactive Proactive & Reactive Forensics Forensics, Available at:https://www.rediris.es/cert/doc/reuniones/af05/proactive_n_reactive_forensics.pdf(Accessed: 9th November 2015).
  43. Kovatsch, M., Lanter, M. and Shelby, Z., 2014, October. Californium: Scalable cloud services for the internet of things with coap. In Internet of Things (IOT), 2014 International Conference on the (pp. 1-6). IEEE.

Keywords

Internet of Things, smart, forensics, tools