Research Article

Research on IoT Forensics System Based on Blockchain Technology

Table 2

IoT forensics VS traditional digital forensics.

Traditional digital forensicsIoT forensics

Source of evidenceTraditional storage media such as computers, mobile phones, USB flash drives, cameras, and servers such as switches and routersSmart terminals such as cars, drones, smartwatches, smart bracelets, smart sensors, smart industrial equipment, smart appliances, smart wearable devices
Equipment quantityTens of billions of magnitudesTrillions of magnitude
Type of evidenceElectronic documents, standard format files (JPG, MP3, MP4, etc.)Added a large number of nonstandard data files for IoT smart terminals
Evidence data sizeMegabyteExabytes
Network typeWired network, WIFI, Bluetooth, wireless network, internet, mobile communication networkAdded RFID, wireless sensor network, Internet of things (Internet of vehicles, industrial Internet of things, etc.)
ProtocolEthernet, wireless (802.11a/b/g/n), bluetooth, IPv4, IPv6, TCP/IP, etc.RFID,TCP/IP,B/S和C/S,HTTP, Ajax,Websocket, MQTT,CoAP, etc.
Owner of the evidence (equipment)Victims, suspects, related contactsAnyone
JudicialThe relevant legislation is basically completeThe relevant legislation is not yet complete
PrivacyInfringement of citizens' privacy is less problematicLegislation and borders are not clear, and privacy issues are involved