The Need for a Technical Approach to Digital Forensic Evidence Collection for Wireless Technologies

Whilst 802.11a/b/g wireless security is well documented by academic literature, there is little work discussing the forensic issues associated with the technology. This paper aims to discuss how 802.11-based wireless technologies may be misused compared with current electronic evidence collection and analysis techniques. The lack of procedural guides in the identification of wireless networks is noted, and the need for a technological solution in the evidence collection process of potential electronic evidence

[1]  Massimo Bernaschi,et al.  Access points vulnerabilities to DoS attacks in 802.11 networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[2]  Ryan Russell,et al.  Stealing the Network: How to Own an Identity (Stealing the Network) , 2005 .

[3]  W.A. Arbaugh Wireless Security Is Different , 2003, Computer.

[4]  D.A. Dai Zovi,et al.  Attacking automatic wireless network selection , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[5]  B. Turnbull,et al.  The 802.11 Technology Gap - Case Studies in Crime , 2005, TENCON 2005 - 2005 IEEE Region 10 Conference.

[6]  M. B. Mukasey,et al.  Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition , 2008 .