Blockchain solutions and chain-of-custody
Sotirios Brotsis, Nicholas Kolokotronis, 5 July 2020 The technological evolution, which is derived from the development of the Internet of things (IoT) is accompanied by new forms of cyber-attacks that exploit the heterogeneity of IoT ecosystems and the existence of vulnerabilities in IoT devices. Thus, the detection of attacked IoT devices, as well as, the accumulation and maintenance of forensic evidences emerge as areas of immense priority [1, 4]. Most of the IoT devices are highly resource-constrained, while their computational…