A thesis submitted to the University of Bedfordshire in partial ful lment of the requirements for... more A thesis submitted to the University of Bedfordshire in partial ful lment of the requirements for the degree of Doctor of Philosophy
The Internet of Things (IoT) introduces a unique dimension to our relationships with smart Things... more The Internet of Things (IoT) introduces a unique dimension to our relationships with smart Things as objects that belong to us and/or fulfil a direct or indirect objective for us. This relationship can be expected to gradually become one of reliance and maybe eventually one of complete trust. This paper argues that although human agents may increasingly rely on smart Things for achievement of goal states, there should be a recognition of responsibility by owners, users, designers, vendors and all other stakeholders where Things and actions by Things are concerned. The paper utilizes the tools for Responsibility Modeling (RM) of Sommerville, and the further developments by Lock, et al., to construct a consequential Responsibility Model for a typical IoT task assignment scenario - a film ticket purchase. The model illustrates that in any IoT construct the consequential responsibility for actions of smart, independent, decision-making non-human agents is always on a human agent(s).
This work is an attempt to provide a definition of the word ‘Things’ in the context of the Intern... more This work is an attempt to provide a definition of the word ‘Things’ in the context of the Internet of Things (IoT). It does this partly by reviewing the existing descriptions of, and variations to, the IoT phrase as well as the alternative terms that have so far been used to replace the word ‘Things’ in the phrase. This review was done to draw from these different terms and descriptions a sense of the wide breadth of the examples of ways that ‘Things’ in the IoT can manifest. An attempt is made to relate all the relevant but varied definitions and descriptions in order to draw up a definitive definition which can serve as a reference for stakeholders who are keen to understand the IoT concept as it exists presently as well as in the future.
2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
ABSTRACT This paper describes the design of the Forensics Edge Management System (FEMS), a system... more ABSTRACT This paper describes the design of the Forensics Edge Management System (FEMS), a system that autonomously provides security and forensic services within the home Internet of Things (IoT) or smart home context. Within smart homes, users are increasingly being allowed the flexibility to manage and maintain all the solutions that entail. This is evident from the growing number of commercial smart home IoT solutions which are being designed to be manageable by end users. This IoT requirement for user-manageable solutions (without direct or indirect input from vendors beyond the provision of robust systems and solutions) presents a challenge to the traditional concept of Digital Forensics (DF) which is currently an expert-led domain. The FEMS design aims to meet these requirements for autonomy and independence, it is a system that can be integrated into a home-IoT network to conduct preliminary forensic investigations and to provide basic security services.
This work is an attempt to provide a definition of the word ‘Things’ in the context of the Intern... more This work is an attempt to provide a definition of the word ‘Things’ in the context of the Internet of Things (IoT). It does this partly by reviewing the existing descriptions of, and variations to, the IoT phrase as well as the alternative terms that have so far been used to replace the word ‘Things’ in the phrase. This review was done to draw from these different terms and descriptions a sense of the wide breadth of the examples of ways that ‘Things’ in the IoT can manifest. An attempt is made to relate all the relevant but varied definitions and descriptions in order to draw up a definitive definition which can serve as a reference for stakeholders who are keen to understand the IoT concept as it exists presently as well as in the future.
The Internet of Things (IoT) introduces a unique dimension to our relationships
with smart Things... more The Internet of Things (IoT) introduces a unique dimension to our relationships with smart Things as objects that belong to us and/or fulfil a direct or indirect objective for us. This relationship can be expected to gradually become one of reliance and maybe eventually one of complete trust. This paper argues that although human agents may increasingly rely on smart Things for achievement of goal states, there should be a recognition of responsibility by owners, users, designers, vendors and all other stakeholders where Things and actions by Things are concerned. The paper utilizes the tools for Responsibility Modeling (RM) of Sommerville, and the further developments by Lock, et al., to construct a consequential Responsibility Model for a typical IoT task assignment scenario - a film ticket purchase. The model illustrates that in any IoT construct the consequential responsibility for actions of smart, independent, decision-making non-human agents is always on a human agent(s).
The scope of this paper is two-fold: firstly it proposes the application of a 1-2-3 Zones approac... more The scope of this paper is two-fold: firstly it proposes the application of a 1-2-3 Zones approach to Internet of Things (IoT)-related Digital Forensics (DF) investigations. Secondly, it introduces a Next-Best-Thing Triage (NBT) Model for use in conjunction with the 1-2-3 Zones approach where necessary and vice versa. These two `approaches' are essential for the DF process from an IoT perspective: the atypical nature of IoT sources of evidence (i.e. Objects of Forensic Interest - OOFI), the pervasiveness of the IoT environment and its other unique attributes - and the combination of these attributes - dictate the necessity for a systematic DF approach to incidents. The two approaches proposed are designed to serve as a beacon to incident responders, increasing the efficiency and effectiveness of their IoT-related investigations by maximizing the use of the available time and ensuring relevant evidence identification and acquisition. The approaches can also be applied in conjunction with existing, recognised DF models, methodologies and frameworks.
The Internet of Things (IoT) describes the interconnection of objects (or Things) for various pur... more The Internet of Things (IoT) describes the interconnection of objects (or Things) for various purposes including identification, communication, sensing, and data collection. “Things” in this context range from traditional computing devices like Personal Computers (PC) to general household objects embedded with capabilities for sensing and/or communication through the use of technologies such as Radio Frequency Identification (RFID). This conceptual paper, from a philosophical viewpoint, introduces an initial set of guiding principles - also referred to in the paper as commandments - that can be applied by all the stakeholders involved in the IoT during its introduction, deployment and thereafter.
Abstract
--
This paper describes the design of the Forensics
Edge Management System (FEMS), a ... more Abstract
--
This paper describes the design of the Forensics
Edge Management System (FEMS), a system that
autonomously provides security and forensic services within
the home Internet of Things (IoT) or smart home context.
Within smart homes, users are increasingly being allowed the
flexibility to manage and maintain all the solutions that entail.
This is evident from the growing number of commercial smart
home IoT solutions which are being designed to be
manageable by end users. This IoT requirement for user-
manageable solutions (without direct or indirect input from
vendors beyond the provision of robust systems and solutions)
presents a challenge to the traditional concept of Digital
Forensics (DF) which is currently an expert-led domain. The
FEMS design aims to meet these requirements for autonomy
and independence; it is a system that can be integrated into a
home-IoT network to conduct preliminary forensic
investigations and to provide basic security services.
A thesis submitted to the University of Bedfordshire in partial ful lment of the requirements for... more A thesis submitted to the University of Bedfordshire in partial ful lment of the requirements for the degree of Doctor of Philosophy
The Internet of Things (IoT) introduces a unique dimension to our relationships with smart Things... more The Internet of Things (IoT) introduces a unique dimension to our relationships with smart Things as objects that belong to us and/or fulfil a direct or indirect objective for us. This relationship can be expected to gradually become one of reliance and maybe eventually one of complete trust. This paper argues that although human agents may increasingly rely on smart Things for achievement of goal states, there should be a recognition of responsibility by owners, users, designers, vendors and all other stakeholders where Things and actions by Things are concerned. The paper utilizes the tools for Responsibility Modeling (RM) of Sommerville, and the further developments by Lock, et al., to construct a consequential Responsibility Model for a typical IoT task assignment scenario - a film ticket purchase. The model illustrates that in any IoT construct the consequential responsibility for actions of smart, independent, decision-making non-human agents is always on a human agent(s).
This work is an attempt to provide a definition of the word ‘Things’ in the context of the Intern... more This work is an attempt to provide a definition of the word ‘Things’ in the context of the Internet of Things (IoT). It does this partly by reviewing the existing descriptions of, and variations to, the IoT phrase as well as the alternative terms that have so far been used to replace the word ‘Things’ in the phrase. This review was done to draw from these different terms and descriptions a sense of the wide breadth of the examples of ways that ‘Things’ in the IoT can manifest. An attempt is made to relate all the relevant but varied definitions and descriptions in order to draw up a definitive definition which can serve as a reference for stakeholders who are keen to understand the IoT concept as it exists presently as well as in the future.
2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
ABSTRACT This paper describes the design of the Forensics Edge Management System (FEMS), a system... more ABSTRACT This paper describes the design of the Forensics Edge Management System (FEMS), a system that autonomously provides security and forensic services within the home Internet of Things (IoT) or smart home context. Within smart homes, users are increasingly being allowed the flexibility to manage and maintain all the solutions that entail. This is evident from the growing number of commercial smart home IoT solutions which are being designed to be manageable by end users. This IoT requirement for user-manageable solutions (without direct or indirect input from vendors beyond the provision of robust systems and solutions) presents a challenge to the traditional concept of Digital Forensics (DF) which is currently an expert-led domain. The FEMS design aims to meet these requirements for autonomy and independence, it is a system that can be integrated into a home-IoT network to conduct preliminary forensic investigations and to provide basic security services.
This work is an attempt to provide a definition of the word ‘Things’ in the context of the Intern... more This work is an attempt to provide a definition of the word ‘Things’ in the context of the Internet of Things (IoT). It does this partly by reviewing the existing descriptions of, and variations to, the IoT phrase as well as the alternative terms that have so far been used to replace the word ‘Things’ in the phrase. This review was done to draw from these different terms and descriptions a sense of the wide breadth of the examples of ways that ‘Things’ in the IoT can manifest. An attempt is made to relate all the relevant but varied definitions and descriptions in order to draw up a definitive definition which can serve as a reference for stakeholders who are keen to understand the IoT concept as it exists presently as well as in the future.
The Internet of Things (IoT) introduces a unique dimension to our relationships
with smart Things... more The Internet of Things (IoT) introduces a unique dimension to our relationships with smart Things as objects that belong to us and/or fulfil a direct or indirect objective for us. This relationship can be expected to gradually become one of reliance and maybe eventually one of complete trust. This paper argues that although human agents may increasingly rely on smart Things for achievement of goal states, there should be a recognition of responsibility by owners, users, designers, vendors and all other stakeholders where Things and actions by Things are concerned. The paper utilizes the tools for Responsibility Modeling (RM) of Sommerville, and the further developments by Lock, et al., to construct a consequential Responsibility Model for a typical IoT task assignment scenario - a film ticket purchase. The model illustrates that in any IoT construct the consequential responsibility for actions of smart, independent, decision-making non-human agents is always on a human agent(s).
The scope of this paper is two-fold: firstly it proposes the application of a 1-2-3 Zones approac... more The scope of this paper is two-fold: firstly it proposes the application of a 1-2-3 Zones approach to Internet of Things (IoT)-related Digital Forensics (DF) investigations. Secondly, it introduces a Next-Best-Thing Triage (NBT) Model for use in conjunction with the 1-2-3 Zones approach where necessary and vice versa. These two `approaches' are essential for the DF process from an IoT perspective: the atypical nature of IoT sources of evidence (i.e. Objects of Forensic Interest - OOFI), the pervasiveness of the IoT environment and its other unique attributes - and the combination of these attributes - dictate the necessity for a systematic DF approach to incidents. The two approaches proposed are designed to serve as a beacon to incident responders, increasing the efficiency and effectiveness of their IoT-related investigations by maximizing the use of the available time and ensuring relevant evidence identification and acquisition. The approaches can also be applied in conjunction with existing, recognised DF models, methodologies and frameworks.
The Internet of Things (IoT) describes the interconnection of objects (or Things) for various pur... more The Internet of Things (IoT) describes the interconnection of objects (or Things) for various purposes including identification, communication, sensing, and data collection. “Things” in this context range from traditional computing devices like Personal Computers (PC) to general household objects embedded with capabilities for sensing and/or communication through the use of technologies such as Radio Frequency Identification (RFID). This conceptual paper, from a philosophical viewpoint, introduces an initial set of guiding principles - also referred to in the paper as commandments - that can be applied by all the stakeholders involved in the IoT during its introduction, deployment and thereafter.
Abstract
--
This paper describes the design of the Forensics
Edge Management System (FEMS), a ... more Abstract
--
This paper describes the design of the Forensics
Edge Management System (FEMS), a system that
autonomously provides security and forensic services within
the home Internet of Things (IoT) or smart home context.
Within smart homes, users are increasingly being allowed the
flexibility to manage and maintain all the solutions that entail.
This is evident from the growing number of commercial smart
home IoT solutions which are being designed to be
manageable by end users. This IoT requirement for user-
manageable solutions (without direct or indirect input from
vendors beyond the provision of robust systems and solutions)
presents a challenge to the traditional concept of Digital
Forensics (DF) which is currently an expert-led domain. The
FEMS design aims to meet these requirements for autonomy
and independence; it is a system that can be integrated into a
home-IoT network to conduct preliminary forensic
investigations and to provide basic security services.
Uploads
Papers by Dr. Edewede Oriwoh
with smart Things as objects that belong to us and/or fulfil a direct or indirect
objective for us. This relationship can be expected to gradually become one of
reliance and maybe eventually one of complete trust. This paper argues that
although human agents may increasingly rely on smart Things for achievement of
goal states, there should be a recognition of responsibility by owners, users,
designers, vendors and all other stakeholders where Things and actions by Things
are concerned. The paper utilizes the tools for Responsibility Modeling (RM) of
Sommerville, and the further developments by Lock, et al., to construct a
consequential Responsibility Model for a typical IoT task assignment scenario - a
film ticket purchase. The model illustrates that in any IoT construct the
consequential responsibility for actions of smart, independent, decision-making
non-human agents is always on a human agent(s).
--
This paper describes the design of the Forensics
Edge Management System (FEMS), a system that
autonomously provides security and forensic services within
the home Internet of Things (IoT) or smart home context.
Within smart homes, users are increasingly being allowed the
flexibility to manage and maintain all the solutions that entail.
This is evident from the growing number of commercial smart
home IoT solutions which are being designed to be
manageable by end users. This IoT requirement for user-
manageable solutions (without direct or indirect input from
vendors beyond the provision of robust systems and solutions)
presents a challenge to the traditional concept of Digital
Forensics (DF) which is currently an expert-led domain. The
FEMS design aims to meet these requirements for autonomy
and independence; it is a system that can be integrated into a
home-IoT network to conduct preliminary forensic
investigations and to provide basic security services.
with smart Things as objects that belong to us and/or fulfil a direct or indirect
objective for us. This relationship can be expected to gradually become one of
reliance and maybe eventually one of complete trust. This paper argues that
although human agents may increasingly rely on smart Things for achievement of
goal states, there should be a recognition of responsibility by owners, users,
designers, vendors and all other stakeholders where Things and actions by Things
are concerned. The paper utilizes the tools for Responsibility Modeling (RM) of
Sommerville, and the further developments by Lock, et al., to construct a
consequential Responsibility Model for a typical IoT task assignment scenario - a
film ticket purchase. The model illustrates that in any IoT construct the
consequential responsibility for actions of smart, independent, decision-making
non-human agents is always on a human agent(s).
--
This paper describes the design of the Forensics
Edge Management System (FEMS), a system that
autonomously provides security and forensic services within
the home Internet of Things (IoT) or smart home context.
Within smart homes, users are increasingly being allowed the
flexibility to manage and maintain all the solutions that entail.
This is evident from the growing number of commercial smart
home IoT solutions which are being designed to be
manageable by end users. This IoT requirement for user-
manageable solutions (without direct or indirect input from
vendors beyond the provision of robust systems and solutions)
presents a challenge to the traditional concept of Digital
Forensics (DF) which is currently an expert-led domain. The
FEMS design aims to meet these requirements for autonomy
and independence; it is a system that can be integrated into a
home-IoT network to conduct preliminary forensic
investigations and to provide basic security services.