
The issues of IoT forensics include from monitoring to detecting IoT devices, as well as the relevance of detected evidence, jurisdiction, blurry boundaries, inappropriate evidence management, securing the chain of custody, and lack of standardization. However, investigators confront a number of challenges while undertaking IoT forensics, as the conventional tools and techniques used in digital forensics cannot be employed directly in the IoT environment. Thanks to technical advancements, IoT devices now play a critical role in the forensics investigations process, assisting in the identification and location of suspects/attackers via motion detectors, microphones, cameras, and other sensors. IoT forensics is a specialized extension of the digital forensic investigations process that deals with IoT infrastructure and investigations within the IoT environment. Motivated by this, in this paper, we have discussed recent challenges and security issues of the IoT devices along with different types of evidence for IoT forensics and the significance of digital forensics. The responsibility of IoT forensics experts is to explore tools and techniques for recovering evidence from IoT devices. Most common users are more concerned with the benefits of IoT services rather than the challenges and problems that arise with security and privacy issues.

Millions of devices link to each other via communication networks on the Internet of Things era, and this trend keeps growing at an exponential rate. The increasing use of smart technology with smart sensors that read the human mind and act accordingly has made life easier for humans. IoT network needs to have a separate module for analyzing and identifying vulnerable points to constantly provide online services to users.

IoT network is vulnerable to system failure and cyberattack. IoT has evolved into a diverse day-to-day applications, including smart homes, smart buildings, smart cities, navigation systems, logistics systems, medical implants, and sensors or tag readers, used in public transport systems or financial services. Although some IoT devices remain passive to preserve energy for long periods and only become active when needed, others are always connected, operated, and accessible over internet from practically anywhere. In recent years, the IoT domain has blossomed with the expansion of various IoT devices and applications. Additionally, a comparative analysis of three popular digital forensic tools is also conducted. This review paper presents several forensic methodologies, techniques, and challenges in IoT device forensics, a comprehensive review of prominent recent works, with an overview of tools that are frequently used for performing digital forensics investigations. Additionally, the bulk of IoT devices has flash memory or limited memory, which makes generating and converting evidence for presenting forensic data in court problematic. The primary challenge in performing forensic analysis on the IoT is the heterogeneity of IoT devices.


Due to the increasing prevalence of IoT-related cybercrimes, forensic investigators and researchers face numerous obstacles when attempting to recover evidence from a variety of different types of IoT smart devices. This extensive connection between IoT devices results in numerous security breaches and violations. Recently, the exponential growth of Internet of Things (IoT) network-connected devices has resulted in the exchange of large amounts of data via a smart grid.
