Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3098954.3104052acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT)

Published: 29 August 2017 Publication History

Abstract

Besides its enormous benefits to the industry and community the Internet of Things (IoT) has introduced unique security challenges to its enablers and adopters. As the trend in cybersecurity threats continue to grow, it is likely to influence IoT deployments. Therefore it is eminent that besides strengthening the security of IoT systems we develop effective digital forensics techniques that when breaches occur we can track the sources of attacks and bring perpetrators to the due process with reliable digital evidence. The biggest challenge in this regard is the heterogeneous nature of devices in IoT systems and lack of unified standards. In this paper we investigate digital forensics from IoT perspectives. We argue that besides traditional digital forensics practices it is important to have application-specific forensics in place to ensure collection of evidence in context of specific IoT applications. We consider top three IoT applications and introduce a model which deals with not just traditional forensics but is applicable in digital as well as application-specific forensics process. We believe that the proposed model will enable collection, examination, analysis and reporting of forensically sound evidence in an IoT application-specific digital forensics investigation.

References

[1]
D. Evans. 2011. The Internet of Things: How the Next Evolution of the Internet is Changing Everything. {Online} Available: www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf {Accessed on 26 April 2017}
[2]
C. MacGillivray, M. Torchia, M. Kalal, M. Kumar, R. Membrilla, A. Siviero, Y. Torisu, N. Wallis, and S. Chaturvedi. 2016. Worldwide Internet of Things Forecast Update, 2016--2020. IDC Research. {Online} Available. https://www.idc.com/getdoc.jsp?containerId=US42082716. {Accessed on 26 April 2017}
[3]
C, Kolias, A. Stavrou, J., Voas, I. Bojanova, and R. Kuhn. 2016. Learning Internet-of-Things Security "hands-On". IEEE Security & Privacy. January/February 2016
[4]
Android Things. {Online} Available: https://developer.android.com/things/index.html {Accessed on 26 April 2017}
[5]
Microsoft Azure IoT Hub. https://azure.microsoft.com/en-au/services/iot-hub/ {Accessed on 26 April 2017}
[6]
Samsung Atrik. {Online} Available: https://www.artik.io/ {Accessed on 26 April 2017}
[7]
Intel Edison. {Online} Available: https://software.intel.com/en-us/get-started-edison-windows {Accessed on 26 April 2017}
[8]
Google Weave. {Online} Available: https://developers.google.com/weave/ {Accessed on 26 April 2017}
[9]
Apple HomeKit. {Online} Available: https://developer.apple.com/homekit/ {Accessed on 26 April 2017}
[10]
IBM Bluemix. {Online} Available: https://www.ibm.com/cloud-computing/bluemix/ {Accessed on 26 April 2017}
[11]
Amazon AWS IoT. {Online} Available: https://aws.amazon.com/iot-platform/ {Accessed on 26 April 2017}
[12]
C. Suchitra, and C.P. Vandana. 2016. Internet of Things and Security Issues. International Journal of Computer Science and Mobile Computing. Vol. 5, Issue 1. 2016.
[13]
Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao. 2017. A Survey on Security and Privacy Issues in Internet-of-Things. IEEE Internet of Things Journal. 2017.
[14]
J. S. Kumar, and D. R. Patel. 2014. A Survey on Internet of Things: Security and Privacy Issues. International Journal of Computer Applications. Vol. 90, No. 11. 2014
[15]
K. Zhao, and L. Ge. 2013. A Survey on the Internet of Things Security. Ninth International Conference on Computational Intelligence and Security. December 14-15, 2013. Emei Mountain, China.
[16]
K. Ashton. 2017. Making Sense of IoT: How the Internet of Things became humanity's nervous system. Hewlett Packard Enterprise. {Online} Available www.arubanetworks.com/assets/eo/HPE_Aruba_IoT_Research_Report.pd {Accessed on 5 April 2017}
[17]
Internet of Things Research Study. Hewlett Packard Enterprise 2015 Report. {Online} Available: http://h20195.www2.hpe.com/V4/getpdf.aspx/4aa5-4759enw {Accessed on 5 April 2017}
[18]
K. Karen, S. Chevalier, T. Grance, and H. Dang. 2006. Guide to Integrating Techniques into Incident response. National Institute of Satndards and Technology (NIST). Special Publication 800--86. {Online} Available: www.nist.gov/publications/guide-integrating-forensic-techniques-incident-response {Accessed on 25 April 2017}
[19]
Scientific Working Group on Digital Evidence (SWDGE) Best Practices for Vehicle Infotainments and Telematics Systems. Version 2.0 (June 23, 2016). {Online} Available https://www.swgde.org/documents {Accessed on 25 April 2017}
[20]
The 10 most popular Internet of Things applications. IoT Analytics. {Online} Available: https://iot-analytics.com/10-internet-of-things-applications/ {Accessed on 25 April 2017}
[21]
Nest Smart. {Online} Available: https://nest.com/thermostat/meet-nest-thermostat/ {Accessed on 27 April 2017}
[22]
VitalPatch Health Monitor. {Online} Available: https://vitalconnect.com/solutions/vitalpatch/ {Accessed on 27 April 2017}
[23]
Verizon Intelligent Traffic Management System. {Online} Available: http://www.verizonenterprise.com/products/internet-of-things/smart-cities/intelligent-traffic-management/ {Accessed on 27 April 2017}
[24]
R. C. Hegarty, D. J. Lamb, and A. Attwood. 2014. Digital Evidence Challenges in the Internet of Things. The 9th International Workshop on Digital Forensics and Incident Analysis
[25]
V. R. Kebande, and I. Ray. 2016. A Generic Digital Forensics Investigation Framework for Internet of Things (IoT). 2016 IEEE 4th International Conference on Future Internet of Things and Cloud
[26]
S. Zawoad, and R. Hasan. 2015. FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things. 2015 IEEE International Conference in Services Computing (SCC)
[27]
A. Valjarevic, and H. S. Venter. 2015. A Comprehensive and Harmonized Digital Forensic Investigation Process Model. Journal of forensic sciences, 60(6), 1467--1483.
[28]
R. Hasan, R. Sion, and M. Winslett. 2009. The case of the fake Picasso: Preventing history forgery with secure provenance. 7th USENIX Conference on File and Storage Technologies. (FAST'i09). USENIX Association
[29]
E. Oriwoh, and P. Sant. 2013. The Forensics Edge Management System: A Concept and Design. 2013 IEEE 10th International Conference on Automatic and Trusted Computing (UIC/ATC). Dec 18-21, 2013. Vietri sul Mere, Italy.
[30]
G. Chong, L. Zhihao and Y. Yifeng. 2011. The research and implement of smart home system based on internet of things. 2011 International Conference in Electronics, Communications and Control (ICECC), September 9-11, 2011. Ningbo, China.
[31]
M. U. Farooq, M. Waseem, A. Khairi, and S. Mazhar. 2015. A Critical Analysis on the Security Concerns of Internet of Things (IoT). International Journal of Computer Applications. Vol. 111, No. 7.
[32]
H. Suo, J. Wan, C. Zou, J. Liu. 2012. Security in the Internet of Things: A Review, in Computer Science and Electronics Engineering (ICCSEE), 2012, pp. 648--651
[33]
W. Zhang, B. Qu. 2013. Security Architecture of the Internet of Things Oriented to Perceptual Layer, in International Journal on Computer, Consumer and Control (IJ3C), Volume 2, No.2 (2013)
[34]
M. M. Hossain, M. Fotouhi, and R. Hasan, R. 2015. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things. 2015 IEEE World Congress on Services.
[35]
M. Diaz, C. Martin, and B. Rubio. 2016. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing. Journal of Network and Computer Applications. 67 (2016) 99--117.
[36]
J. Granjal, E. Monteiro and J. S. Silva. 2015. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues. IEEE Communication Surveys & Tutorials. Vol. 17. No. 3
[37]
S. Khan, A. Gani, A. W. A. Wahab, M. Shiraz, and I. Ahmad. 2016. Network forensics: Review, taxonomy, and open challenges. Elsevier Journal of Network and Computer Applications.
[38]
Q. Jing, A. V. Vasilakos, J.Wan, J. Lu, and D. Qiu. 2014. Security of the Internet of Things: Perspectives and challenges.' Wireless Network. vol. 20, no. 8, pp. 2481_2501, Nov. 2014.
[39]
M. S. Hossain, G. Muhammad, S. M. M Rahman, W. Abdul, A. Alelaiwi, and A. Alamri. 2016. Toward End-To-End Biometrics-Based Security for IoT Infrastructure. IEEE Wireless Communications
[40]
S. Perumal, N. M. Norwawi, and V. Raman. 2015. Internet of Things (IoT) digital forensic investigation model: Top-down forensic approach methodology. The Fifth International Conference on Digital Information Processing and Communications (ICDIPC 2015). October 7-9, 2015. Sierre/Siders, Switzerland.

Cited By

View all
  • (2023)A Review on the Internet of Things (IoT) Forensics: Challenges, Techniques, and Evaluation of Digital Forensic ToolsDigital Forensics - Challenges and New Frontiers [Working Title]10.5772/intechopen.109840Online publication date: 27-Feb-2023
  • (2023)Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future DirectionsACM Computing Surveys10.1145/363503056:5(1-37)Online publication date: 9-Dec-2023
  • (2023)Cybersecurity Awareness Training: A Use Case Model2023 IEEE International Conference on Electro Information Technology (eIT)10.1109/eIT57321.2023.10187349(242-247)Online publication date: 18-May-2023
  • Show More Cited By

Index Terms

  1. Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT)

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security
    August 2017
    853 pages
    ISBN:9781450352574
    DOI:10.1145/3098954
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 August 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Digital Forensics
    2. Digital Forensics Model
    3. Internet of Things
    4. IoT
    5. IoT Applications
    6. IoT Forensics
    7. IoT Security

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ARES '17
    ARES '17: International Conference on Availability, Reliability and Security
    August 29 - September 1, 2017
    Reggio Calabria, Italy

    Acceptance Rates

    ARES '17 Paper Acceptance Rate 100 of 191 submissions, 52%;
    Overall Acceptance Rate 228 of 451 submissions, 51%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)48
    • Downloads (Last 6 weeks)11
    Reflects downloads up to 05 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)A Review on the Internet of Things (IoT) Forensics: Challenges, Techniques, and Evaluation of Digital Forensic ToolsDigital Forensics - Challenges and New Frontiers [Working Title]10.5772/intechopen.109840Online publication date: 27-Feb-2023
    • (2023)Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future DirectionsACM Computing Surveys10.1145/363503056:5(1-37)Online publication date: 9-Dec-2023
    • (2023)Cybersecurity Awareness Training: A Use Case Model2023 IEEE International Conference on Electro Information Technology (eIT)10.1109/eIT57321.2023.10187349(242-247)Online publication date: 18-May-2023
    • (2023)Using The Cooja Simulator, Analysing The Routing Protocol (RPL) For Low Power And Lossy Networks In IoT2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)10.1109/SCEECS57921.2023.10061823(1-4)Online publication date: 18-Feb-2023
    • (2023)Explainable IoT Forensics: Investigation on Digital Evidence2023 IEEE International Conference on Contemporary Computing and Communications (InC4)10.1109/InC457730.2023.10262942(1-6)Online publication date: 21-Apr-2023
    • (2023)Cooja Simulator and Wireshark Traffic Capturing Are Used To Analyse User Datagram Protocol Communication For Low Power And Lossy Networks in IoT2023 International Conference for Advancement in Technology (ICONAT)10.1109/ICONAT57137.2023.10080778(1-4)Online publication date: 24-Jan-2023
    • (2023)Survey of Evidence Collection Methods for Internet of Things Forensics2023 International Conference on Networking and Communications (ICNWC)10.1109/ICNWC57852.2023.10127407(1-7)Online publication date: 5-Apr-2023
    • (2023)A Comprehensive Review of Digital Forensics Frameworks for Internet of Things (IoT) Devices2023 International Conference on Information Technology (ICIT)10.1109/ICIT58056.2023.10226145(89-96)Online publication date: 9-Aug-2023
    • (2023)A Survey of Internet of Things (IoT) Forensics Frameworks and Challenges2023 International Conference on Information Technology (ICIT)10.1109/ICIT58056.2023.10226103(373-377)Online publication date: 9-Aug-2023
    • (2023)Contiki Based Routing Protocol (RPL) Analysis Using IPV6 Sensor Networks For IoT With Low Power And Lossy Networks2023 IEEE 8th International Conference for Convergence in Technology (I2CT)10.1109/I2CT57861.2023.10126366(1-3)Online publication date: 7-Apr-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media