dc.identifier.citation |
[1] F. M. Bencic and I. P. Zarko, “Distributed ledger technology: Blockchain compared to directed acyclic graph,” in 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS). IEEE, Jul. 2018. [Online]. Available: https://doi.org/10.1109/icdcs.2018.00171 [2] M. M. Hossain, R. Hasan, and S. Zawoad, “Probe-iot: A public digital ledger based forensic investigation framework for iot.” in INFOCOM workshops, 2018, pp. 1–2. [3] A. Shahaab, C. Hewage, and I. Khan, “Preventing spoliation of evidence with blockchain: A perspective from south asia,” in 2021 The 3rd International Conference on Blockchain Technology, 2021, pp. 45–52. [4] Y. Aumann and Y. Lindell, “Security against covert adversaries: Efficient protocols for realistic adversaries,” Journal of Cryptology, vol. 23, no. 2, pp. 281–343, 2010. [5] X. Xu, I. Weber, M. Staples, L. Zhu, J. Bosch, L. Bass, C. Pautasso, and P. Rimba, “A taxonomy of blockchain-based systems for architecture design,” in 2017 IEEE international conference on software architecture (ICSA). IEEE, 2017, pp. 243–252. [6] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,” in 2016 IEEE symposium on security and privacy (SP). IEEE, 2016, pp. 839–858. [7] D. Ongaro and J. Ousterhout, “In search of an understandable consensus algorithm,” in 2014 USENIX Annual Technical Conference (Usenix ATC 14), 2014, pp. 305–319. [8] A. H. Lone and R. N. Mir, “Forensic-chain: Blockchain based digital forensics chain of custody with poc in hyperledger composer,” Digital investigation, vol. 28, pp. 44–55, 2019. [9] I. Eyal, A. E. Gencer, E. G. Sirer, and R. V. Renesse, “Bitcoin-ng: A scalable blockchain protocol,” in 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). Santa Clara, CA: USENIX Association, Mar. 2016, pp. 45–59. [Online]. Available: https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/eyal 29 REFERENCES 30 [10] Z. Tian, M. Li, M. Qiu, Y. Sun, and S. Su, “Block-DEF: A secure digital evidence framework using blockchain,” Information Sciences, vol. 491, pp. 151–165, Jul. 2019. [Online]. Available: https://doi.org/10.1016/j.ins.2019.04.011 [11] D. Kim, S.-Y. Ihm, and Y. Son, “Two-level blockchain system for digital crime evidence management,” Sensors, vol. 21, no. 9, p. 3051, Apr. 2021. [Online]. Available: https://doi.org/10.3390/s21093051 [12] F.-C. Cheng, “Automatic and secure wi-fi connection mechanisms for iot end-devices and gateways,” in International conference for emerging technologies in computing. Springer, 2018, pp. 98–106. [13] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, “Ddos in the iot: Mirai and other botnets,” Computer, vol. 50, no. 7, pp. 80–84, 2017. [14] A. MacDermott, T. Baker, and Q. Shi, “Iot forensics: Challenges for the ioa era,” in 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2018, pp. 1–5. [15] T. D. Nguyen, S. Marchal, M. Miettinen, M. H. Dang, N. Asokan, and A.-R. Sadeghi, “D¨ıot: A crowdsourced self-learning approach for detecting compromised iot devices,” arXiv preprint arXiv:1804.07474, 2018. [16] H. Haddadi, V. Christophides, R. Teixeira, K. Cho, S. Suzuki, and A. Perrig, “Siotome: An edge-isp collaborative architecture for iot security,” Proc. IoTSec, 2018. [17] P. Andriotis, G. Oikonomou, and T. Tryfonas, “Forensic analysis of wireless networking evidence of android smartphones,” in 2012 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2012, pp. 109–114. [18] M. A. Khan and K. Salah, “Iot security: Review, blockchain solutions, and open challenges,” Future generation computer systems, vol. 82, pp. 395–411, 2018. [19] O. Yousuf and R. N. Mir, “A survey on the internet of things security: State-of-art, architecture, issues and countermeasures,” Information & Computer Security, 2019. [20] S. Bonomi, M. Casini, and C. Ciccotelli, “B-coc: A blockchain-based chain of custody for evidences management in digital forensics,” arXiv preprint arXiv:1807.10359, 2018. [21] A. Nieto, R. Roman, and J. Lopez, “Digital witness: Safeguarding digital evidence by using secure architectures in personal devices,” IEEE Network, vol. 30, no. 6, pp. 34–41, 2016. [22] R. C. Merkle, “A digital signature based on a conventional encryption function,” in Conference on the theory and application of cryptographic techniques. Springer, 1987, pp. 369–378. REFERENCES 31 [23] Y. Liu, K. Wang, Y. Lin, and W. Xu, “$\mathsf{LightChain}$: A lightweight blockchain system for industrial internet of things,” IEEE Transactions on Industrial Informatics, vol. 15, no. 6, pp. 3571–3581, Jun. 2019. [Online]. Available: https://doi.org/10.1109/tii.2019.2904049 [24] J. Kang, R. Yu, X. Huang, M. Wu, S. Maharjan, S. Xie, and Y. Zhang, “Blockchain for secure and efficient data sharing in vehicular edge computing and networks,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4660–4670, Jun. 2019. [Online]. Available: https://doi.org/10.1109/jiot.2018.2875542 |
en_US |