IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things

The smart devices have been used in the most major domain like the healthcare, transportation, smart home, smart city and more. However, this technology has been exposed to many vulnerabilities, which may lead to cybercrime through the devices. With the IoT constraints and low-security mechanisms applied, the device could be easily been attacked, treated and exploited by cyber criminals where the smart devices could provide wrong data where it can lead to wrong interpretation and actuation to the legitimate users. To comply with the IoT characteristics, two approaches towards of having the investigation for IoT forensic is proposed by emphasizing the pre-investigation phase and implementing the real-time investigation to ensure the data and potential evidence is collected and preserved throughout the investigation.

[1]  Sebastiaan H. von Solms,et al.  A Multi-component View of Digital Forensics , 2010, 2010 International Conference on Availability, Reliability and Security.

[2]  Paul Sant,et al.  The Forensics Edge Management System: A Concept and Design , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.

[3]  Valérie Issarny,et al.  Ontologies for the internet of things , 2011, MDS '11.

[4]  Payam M. Barnaghi,et al.  An Internet of Things Platform for Real-World and Digital Objects , 2012, Scalable Comput. Pract. Exp..

[5]  Andrew P. Martin,et al.  Threat-Based Security Analysis for the Internet of Things , 2014, 2014 International Workshop on Secure Internet of Things.

[6]  Eugene H. Spafford,et al.  An Event-Based Digital Forensic Investigation Framework , 2004 .

[7]  Escola Politécnica,et al.  Improving Chain of Custody in Forensic Investigation of Electronic Digital Systems , 2011 .

[8]  Sriram Raghavan,et al.  Digital forensic research: current state of the art , 2012, CSI Transactions on ICT.

[9]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[10]  Simson L. Garfinkel,et al.  Digital forensics research: The next 10 years , 2010, Digit. Investig..

[11]  Damir Isovic Components in Real-Time Systems , 2002 .

[12]  Shahrin Sahib,et al.  Mapping Process of Digital Forensic Investigation Framework , 2008 .

[13]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[14]  Peter G. Neumann,et al.  Reliability and Security , 1995 .

[15]  Xu Xiaohui,et al.  Study on Security Problems and Key Technologies of the Internet of Things , 2013, 2013 International Conference on Computational and Information Sciences.

[16]  Issa Traoré,et al.  The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review , 2011, ISA.

[17]  Gregory Epiphaniou,et al.  Internet of Things Forensics: Challenges and approaches , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[18]  Hung-Min Sun,et al.  Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[19]  Baber Aslam,et al.  Digital forensics: Latest challenges and response , 2013, 2013 2nd National Conference on Information Assurance (NCIA).

[20]  Kim-Kwang Raymond Choo,et al.  An integrated conceptual digital forensic framework for cloud computing , 2012, Digit. Investig..

[21]  Ragib Hasan,et al.  FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things , 2015, 2015 IEEE International Conference on Services Computing.

[22]  Djamel Tandjaoui,et al.  Internet of Things: Concept, Building blocks, Applications and Challenges , 2014, ArXiv.

[23]  Richard C. Linger,et al.  Computational Evaluation of Software Security Attributes , 2009, 2009 42nd Hawaii International Conference on System Sciences.

[24]  Mark Taylor,et al.  Digital evidence in cloud computing systems , 2010, Comput. Law Secur. Rev..

[25]  Sonja Meyer,et al.  Introducing Entity-Based Concepts to Business Process Modeling , 2011, BPMN.

[26]  B.J.B. Bredenoord,et al.  Authentication and Authorization for the Internet of Things for Health , 2019 .

[27]  Miroslav Bača,et al.  An Ontological Approach to Study and Manage Digital Chain of Custody of Digital Evidence , 2011 .

[28]  Timothy Grance,et al.  Guide to Integrating Forensic Techniques into Incident Response , 2006 .

[29]  Ralf Huuck,et al.  IoT: The internet of threats and static program analysis defense , 2015 .

[30]  Changguang Wang,et al.  The Research of Security Technology in the Internet of Things , 2011, CSISE.

[31]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[32]  Paul Fergus,et al.  SCCIR: Smart Cities Critical Infrastructure Response Framework , 2011, 2011 Developments in E-systems Engineering.

[33]  Felix C. Freiling,et al.  A Common Process Model for Incident Response and Computer Forensics , 2007, IMF.

[34]  Ghita Mezzour,et al.  Securing the Internet of Things (IoT) , 2018, 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM).

[35]  Giuseppe Lipari,et al.  Toward Parametric Timed Interfaces for Real-Time Components , 2014, SynCoP.

[36]  Eugene H. Spafford,et al.  Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..

[37]  Zubair A. Baig Securing the Internet of Things Infrastructure - Standards and Techniques , 2014 .

[38]  Gregg H. Gunsch,et al.  An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..

[39]  Muhammad Saad,et al.  Cyber security in internet of things , 2019, Review of Computer Engineering Studies.