Internet of Things(IoT) digital forensic investigation model: Top-down forensic approach methodology

The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Typically, internet of things (IoT) is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications. The interconnection of these embedded devices including smart objects, is expected to usher in automation in nearly all fields, while also enabling advanced applications like a Smart Grid. The main research challenge in Internet of things (IoT) for the forensic investigators is based size of the objects of forensic interest, relevancy, blurry network boundaries and edgeless networks, especially on method for conducting the investigation. The aim of this paper is to identify the best approach by designing a novel model to conduct the investigation situations for digital forensic professionals and experts. There was existing research works which introduce models for identifying the objects of forensics interest in investigations, but there were no rigorous testing for accepting the approach. Currently in this work, an integrated model is designed based on triage model and 1-2-3 zone model for volatile based data preservation.

[1]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[2]  David Preston,et al.  A New Approach of Digital Forensic Model for Digital Forensic Investigation , 2011 .

[3]  Ali Dehghantanha,et al.  A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS , 2014 .

[4]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[5]  Y. S. Lohith,et al.  6PANview: Application performance conscious network monitoring for 6LoWPAN based WSNs , 2012, 2012 National Conference on Communications (NCC).

[6]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[7]  Gian Marco Revel,et al.  A wireless sensor network for intelligent building energy management based on multi communication standards - a case study , 2012, J. Inf. Technol. Constr..

[8]  M. Eloff,et al.  Internet of things: emerging and future scenarios from an information security perspective , 2009 .

[9]  Jarmo Laaksolahti,et al.  Internet of things marries social media , 2011, Mobile HCI.

[10]  Jiming Chen,et al.  Smart community: an internet of things application , 2011, IEEE Communications Magazine.

[11]  Daniel E. O'Leary,et al.  'Big Data', the 'Internet of Things' and the 'Internet of Signs' , 2013, Intell. Syst. Account. Finance Manag..

[12]  Chang-Tsun Li Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security , 2013 .

[13]  Paul Sant,et al.  The Forensics Edge Management System: A Concept and Design , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.

[14]  Emmanouil Magkos,et al.  A Model for Hybrid Evidence Investigation , 2012, Int. J. Digit. Crime Forensics.

[15]  John Gantz,et al.  The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East , 2012 .

[16]  Ling Zhihao,et al.  The research and implement of smart home system based on Internet of Things , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).

[17]  Louis Coetzee,et al.  Contents , 2011, 2011 6th International Conference on Pervasive Computing and Applications.

[18]  Mark Pollitt,et al.  A History of Digital Forensics , 2010, IFIP Int. Conf. Digital Forensics.

[19]  Jorge Oliveira e Sá,et al.  Internet-of-Things: Strategic research agenda evolution , 2016, CISTI 2016.

[20]  Daniel E. O'Leary Semiotics and the 'Internet of Signs' , 2012 .

[21]  Christopher Hargreaves,et al.  An automated timeline reconstruction approach for digital forensic investigations , 2012 .

[22]  Erland Jonsson,et al.  Future threats to future trust , 2009 .

[23]  Stephan Fischer,et al.  Challenges of the Internet of Services , 2014, Towards the Internet of Services.

[24]  Insup Lee,et al.  Challenges and Research Directions in Medical Cyber–Physical Systems , 2012, Proceedings of the IEEE.

[25]  Zainuddin Hassan,et al.  COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS , 2011 .