IoT Forensic A digital investigation framework for IoT systems

被引:15
作者
Sathwara, Snehal [1 ]
Dutta, Nitul [1 ]
Pricop, Emil [2 ]
机构
[1] Marwadi Univ, Comp Engn Dept, Rajkot, Gujarat, India
[2] Petr Gas Univ Ploiesti, Automat Comp & Elect Dept, Ploiesti, Romania
来源
PROCEEDINGS OF THE 2018 10TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI) | 2018年
关键词
Digital Forensic; IoT Security; Threats; Security breach;
D O I
10.1109/ECAI.2018.8679017
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security issues, threats, and attacks in relation with the IoT have been identified as promising and challenging area of research. Eventually, the need for a forensics methodology for investigating IoT-related crime is therefore essential. However, the IoT poses many challenges for forensics investigators. These include the wide range and variety of information, the unclear lines of differentiation between networks, for example private networks increasingly fading into public networks. Further, integration of a large number of objects in IoT forensic interest, along with the relevance of identified and collected devices makes forensic of IoT devices more complicated. The scope of this paper is to present a framework for IoT forensic. We aimed at the study and development of the link to support digital investigations of IoT devices and tackle emerging challenges in digital forensics. We emphasize on various steps for digital forensic with respect to IoT devices.
引用
收藏
页数:4
相关论文
共 50 条
[31]   A trust computed framework for IoT devices and fog computing environment [J].
Rathee, Geetanjali ;
Sandhu, Rajinder ;
Saini, Hemraj ;
Sivaram, M. ;
Dhasarathan, Vigneswaran .
WIRELESS NETWORKS, 2020, 26 (04) :2339-2351
[32]   Secure framework for IoT technology based on RSA and DNA cryptography [J].
Elamir, Mona M. ;
Mabrouk, May S. ;
Marzouk, Samir Y. .
EGYPTIAN JOURNAL OF MEDICAL HUMAN GENETICS, 2022, 23 (01)
[33]   A trust computed framework for IoT devices and fog computing environment [J].
Geetanjali Rathee ;
Rajinder Sandhu ;
Hemraj Saini ;
M. Sivaram ;
Vigneswaran Dhasarathan .
Wireless Networks, 2020, 26 :2339-2351
[34]   Digital Forensics and Incident Response (DFIR) Challenges in IoT Platforms [J].
Itodo, Cornelius ;
Varlioglu, Said ;
Elsayed, Nelly .
2021 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT 2021), 2021, :199-203
[35]   Deep Learning Analytics for IoT Security over a Configurable BigData Platform Data-Driven IoT Systems [J].
Astaras, Stefanos ;
Efremidis, Sofoklis ;
Despotopoulou, Angela-Maria ;
Soldatos, John ;
Kefalakis, Nikos .
2019 22ND INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2019,
[36]   Analysis of Digital Forensic Tools and Investigation Process [J].
Yadav, Seema ;
Ahmad, Khaleel ;
Shekhar, Jayant .
HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 :435-441
[37]   Securing the Internet of Things (IoT): A Security Taxonomy for IoT [J].
Rizvi, Syed ;
Pfeffer, Joseph, III ;
Kurtz, Andrew ;
Rizvi, Mohammad .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :163-168
[38]   Probabilistic yoking proofs for large scale IoT systems [J].
de Fuentes, Jose M. ;
Peris-Lopez, Pedro ;
Tapiador, Juan E. ;
Pastrana, Sergio .
AD HOC NETWORKS, 2015, 32 :43-52
[39]   Securing Blockchain-Based IoT Systems: A Review [J].
Commey, Daniel ;
Mai, Bin ;
Hounsinou, Sena G. ;
Crosby, Garth V. .
IEEE ACCESS, 2024, 12 :98856-98881
[40]   Intelligent Dynamic Heterogeneous Redundancy Architecture for IoT Systems [J].
Zhang, Han ;
Wang, Yu ;
Liu, Hao ;
Lin, Hongyu ;
Chen, Liquan .
CHINA COMMUNICATIONS, 2024, 21 (07) :291-306