The Forensics Edge Management System: A Concept and Design

This paper describes the design of the Forensics Edge Management System (FEMS), a system that autonomously provides security and forensic services within the home Internet of Things (IoT) or smart home context. Within smart homes, users are increasingly being allowed the flexibility to manage and maintain all the solutions that entail. This is evident from the growing number of commercial smart home IoT solutions which are being designed to be manageable by end users. This IoT requirement for user-manageable solutions (without direct or indirect input from vendors beyond the provision of robust systems and solutions) presents a challenge to the traditional concept of Digital Forensics (DF) which is currently an expert-led domain. The FEMS design aims to meet these requirements for autonomy and independence, it is a system that can be integrated into a home-IoT network to conduct preliminary forensic investigations and to provide basic security services.

[1]  Chen Lin,et al.  Automated Analysis of Multi-Source Logs for Network Forensics , 2009, 2009 First International Workshop on Education Technology and Computer Science.

[2]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[3]  Christopher Hargreaves,et al.  An automated timeline reconstruction approach for digital forensic investigations , 2012 .

[4]  Roy H. Campbell,et al.  Secure smart homes using Jini and UIUC SESAME , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[5]  Y. S. Lohith,et al.  6PANview: Application performance conscious network monitoring for 6LoWPAN based WSNs , 2012, 2012 National Conference on Communications (NCC).

[6]  David W. J. Stringer-Calvert,et al.  Digital Evidence , 2002, Commun. ACM.

[7]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[8]  Christoph P. Mayer Electronic Communications of the EASST Volume 17 ( 2009 ) Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen 2009 ( WowKiVS 2009 ) Security and Privacy Challenges in the Internet of Things , 2008 .

[9]  Simson L. Garfinkel,et al.  Digital forensics research: The next 10 years , 2010, Digit. Investig..

[10]  Kamin Whitehouse,et al.  Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.

[11]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[12]  Ali Dehghantanha,et al.  A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS , 2014 .

[13]  Stephen J Esposito Analysis of Forensic Super Timelines , 2012 .

[14]  Jacky Hartnett,et al.  Deckard: A System to Detect Change of RFID Tag Ownership , 2007 .

[15]  David Preston,et al.  A New Approach of Digital Forensic Model for Digital Forensic Investigation , 2011 .

[16]  S. V. R. Anand,et al.  6PANview: A network monitoring system for the “Internet of Things” , 2011 .

[17]  Rodney McKemmish,et al.  When is Digital Evidence Forensically Sound? , 2008, IFIP Int. Conf. Digital Forensics.

[18]  Ling Zhihao,et al.  The research and implement of smart home system based on Internet of Things , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).

[19]  Eugene Libster,et al.  A proposal for an integrated memory acquisition mechanism , 2008, OPSR.

[20]  R. Sridhar,et al.  Intrusion detection in RFID systems , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[21]  Joe Grand,et al.  A hardware-based memory acquisition procedure for digital investigations , 2004, Digit. Investig..

[22]  Fabio Marturana,et al.  A Machine Learning-based Triage methodology for automated categorization of digital media , 2013, Digit. Investig..

[23]  K. Takeda,et al.  A Product Based Security Model for Smart Home Appliances , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[24]  Yoginder S. Dandass,et al.  Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model , 2012, Comput. Inf. Sci..

[25]  Nasir D. Memon,et al.  ForNet: A Distributed Forensics Network , 2003, MMM-ACNS.

[26]  Paul Turner,et al.  Forensic Computing Theory & Practice: Towards developing a methodology for a standardised approach to Computer misuse , 2003, Australian Computer, Network & Information Forensics Conference.

[27]  Golden G. Richard,et al.  FACE: Automated digital evidence discovery and correlation , 2008, Digit. Investig..

[28]  Mark Pollitt,et al.  A History of Digital Forensics , 2010, IFIP Int. Conf. Digital Forensics.