Towards a Holistic Approach to Medical IoT Forensics

Since Computer Forensics emerged at the beginning of the century, this new discipline has grown overwhelmingly due to rapid advancement in technology and enormous changes in society. From Computer Forensics to Digital Forensics and then to Internet of Things (IoT) Forensics, the study domain of the discipline has been expanded considerably. As Medical IoT (MIoT) technology is moving to the center stage of the current development, the need for exploring MIoT Forensics is obvious. To deal with new issues and challenges, a holistic approach to MIoT Forensics is proposed in this paper. Through the analysis on the difference between MIoT Forensics and others, the new approach presents what should be studied and developed in MIoT Forensics according to the reality we are facing. It is believed that the new approach will have a promising impact on the research and development in MIoT Forensics.

[1]  Tetsutaro Uehara,et al.  Malware Behavior Ontology for Digital Evidence , 2017, 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[2]  R. S. Guadron,et al.  Computer forensics , 2016 .

[3]  Hamid Jahankhani,et al.  Digital Forensic Investigation For The Internet Of Medical Things (IoMT) , 2019, Journal of Forensic, Legal & Investigative Sciences.

[4]  David Vandervort Medical Device Data Goes to Court , 2016, Digital Health.

[5]  Gary B. Wills,et al.  IoT Forensics: A State-of-the-Art Review, Challenges and Future Directions , 2019, COMPLEXIS.

[6]  Fang Liu,et al.  Security and Privacy in the Medical Internet of Things: A Review , 2018, Secur. Commun. Networks.

[7]  Ragib Hasan,et al.  FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things , 2015, 2015 IEEE International Conference on Services Computing.

[8]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[9]  Lakshminarayana Sadineni,et al.  A Holistic Forensic Model for the Internet of Things , 2019, IFIP Int. Conf. Digital Forensics.

[10]  William Bradley Glisson,et al.  Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack , 2020, HICSS.