Skip to main content
Top
Published in:
Cover of the book

2020 | OriginalPaper | Chapter

IoT Digital Forensics Readiness in the Edge: A Roadmap for Acquiring Digital Evidences from Intelligent Smart Applications

Authors : Andrii Shalaginov, Asif Iqbal, Johannes Olegård

Published in: Edge Computing – EDGE 2020

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Entering the era of the Internet of Things, the traditional Computer Forensics is no longer as trivial as decades ago with a rather limited pool of possible computer components. It has been demonstrated recently how the complexity and advancement of IoT are being used by malicious actors attack digital and physical infrastructures and systems. The investigative methodology, therefore, faces multiple challenges related to the fact that billions of interconnected devices generate tiny pieces of data that easily comprehend the Big Data paradigm. As a result, Computer Forensics is no longer a simple methodology of the straightforward process. In this paper, we study the complexity and readiness of community-accepted devices in a smart application towards assistance in criminal investigations. In particular, we present a clear methodology and involved tools related to Smart Applications. Relevant artefacts are discussed and analysed using the prism of the Digital Forensics Process. This research contributes towards increased awareness of the IoT Forensics in the Edge, corresponding challenges and opportunities.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference The application of reverse engineering techniques against the Arduino microcontroller to acquire uploaded applications (2014). Accessed 19 Nov 2019 The application of reverse engineering techniques against the Arduino microcontroller to acquire uploaded applications (2014). Accessed 19 Nov 2019
3.
go back to reference Alenezi, A., Atlam, H., Alsagri, R., Alassafi, M., Wills, G.: IoT forensics: a state-of-the-art review, challenges and future directions. In: Proceedings of the 4th International Conference on Complexity, Future Information Systems and Risk (2019) Alenezi, A., Atlam, H., Alsagri, R., Alassafi, M., Wills, G.: IoT forensics: a state-of-the-art review, challenges and future directions. In: Proceedings of the 4th International Conference on Complexity, Future Information Systems and Risk (2019)
4.
go back to reference Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th USENIX Security Symposium, pp. 1093–1110 (2017) Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th USENIX Security Symposium, pp. 1093–1110 (2017)
5.
go back to reference Damshenas, M., Dehghantanha, A., Mahmoud, R., bin Shamsuddin, S.: Forensics investigation challenges in cloud computing environments. In: Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 190–194. IEEE (2012) Damshenas, M., Dehghantanha, A., Mahmoud, R., bin Shamsuddin, S.: Forensics investigation challenges in cloud computing environments. In: Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 190–194. IEEE (2012)
6.
go back to reference Delicato, F.C., Pires, P.F., Batista, T., Cavalcante, E., Costa, B., Barros, T.: Towards an IoT ecosystem. In: Proceedings of the First International Workshop on Software Engineering for Systems-of-Systems, pp. 25–28. ACM (2013) Delicato, F.C., Pires, P.F., Batista, T., Cavalcante, E., Costa, B., Barros, T.: Towards an IoT ecosystem. In: Proceedings of the First International Workshop on Software Engineering for Systems-of-Systems, pp. 25–28. ACM (2013)
7.
go back to reference Dengler, S., Awad, A., Dressler, F.: Sensor/actuator networks in smart homes for supporting elderly and handicapped people. In: 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 2007), vol. 2, pp. 863–868. IEEE (2007) Dengler, S., Awad, A., Dressler, F.: Sensor/actuator networks in smart homes for supporting elderly and handicapped people. In: 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 2007), vol. 2, pp. 863–868. IEEE (2007)
9.
go back to reference Esposito, C., Castiglione, A., Pop, F., Choo, K.K.R.: Challenges of connecting edge and cloud computing: a security and forensic perspective. IEEE Cloud Comput. 4(2), 13–17 (2017)CrossRef Esposito, C., Castiglione, A., Pop, F., Choo, K.K.R.: Challenges of connecting edge and cloud computing: a security and forensic perspective. IEEE Cloud Comput. 4(2), 13–17 (2017)CrossRef
11.
go back to reference Goudbeek, A., Choo, K.K.R., Le-Khac, N.A.: A forensic investigation framework for smart home environment. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 1446–1451. IEEE (2018) Goudbeek, A., Choo, K.K.R., Le-Khac, N.A.: A forensic investigation framework for smart home environment. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 1446–1451. IEEE (2018)
12.
go back to reference Grance, T., Chevalier, S., Scarfone, K.K., Dang, H.: Guide to integrating forensic techniques into incident response. Technical report (2006) Grance, T., Chevalier, S., Scarfone, K.K., Dang, H.: Guide to integrating forensic techniques into incident response. Technical report (2006)
13.
go back to reference Hegarty, R., Lamb, D.J., Attwood, A.: Digital evidence challenges in the internet of things. In: INC, pp. 163–172 (2014) Hegarty, R., Lamb, D.J., Attwood, A.: Digital evidence challenges in the internet of things. In: INC, pp. 163–172 (2014)
14.
go back to reference Koen, R., Olivier, M.S.: The use of file timestamps in digital forensics. In: ISSA, pp. 1–16. Citeseer (2008) Koen, R., Olivier, M.S.: The use of file timestamps in digital forensics. In: ISSA, pp. 1–16. Citeseer (2008)
15.
go back to reference Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)CrossRef Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)CrossRef
16.
go back to reference Kononenko, I., Kukar, M.: Machine Learning and Data Mining: Introduction to Principles and Algorithms. Horwood Publishing Limited (2007) Kononenko, I., Kukar, M.: Machine Learning and Data Mining: Introduction to Principles and Algorithms. Horwood Publishing Limited (2007)
17.
go back to reference Lillis, D., Becker, B., O’Sullivan, T., Scanlon, M.: Current challenges and future research areas for digital forensic investigation. arXiv (2016) Lillis, D., Becker, B., O’Sullivan, T., Scanlon, M.: Current challenges and future research areas for digital forensic investigation. arXiv (2016)
18.
go back to reference Oriwoh, E., Jazani, D., Epiphaniou, G., Sant, P.: Internet of things forensics: challenges and approaches. In: 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 608–615. IEEE (2013) Oriwoh, E., Jazani, D., Epiphaniou, G., Sant, P.: Internet of things forensics: challenges and approaches. In: 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 608–615. IEEE (2013)
19.
go back to reference Perumal, S., Norwawi, N.M., Raman, V.: Internet of things (IoT) digital forensic investigation model: top-down forensic approach methodology. In: 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 19–23. IEEE (2015) Perumal, S., Norwawi, N.M., Raman, V.: Internet of things (IoT) digital forensic investigation model: top-down forensic approach methodology. In: 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 19–23. IEEE (2015)
23.
go back to reference Sadeghi, A., Wachsmann, C., Waidner, M.: Security and privacy challenges in industrial internet of things. In: 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1–6, June 2015 Sadeghi, A., Wachsmann, C., Waidner, M.: Security and privacy challenges in industrial internet of things. In: 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1–6, June 2015
24.
go back to reference Satyanarayanan, M.: The emergence of edge computing. Computer 50(1), 30–39 (2017)CrossRef Satyanarayanan, M.: The emergence of edge computing. Computer 50(1), 30–39 (2017)CrossRef
25.
go back to reference Schatsky, D., Kumar, N., Bumb, S.: Intelligent IoT: Bringing the power of AI to the internet of things (2017) Schatsky, D., Kumar, N., Bumb, S.: Intelligent IoT: Bringing the power of AI to the internet of things (2017)
26.
go back to reference Shalaginov, A.: Soft computing and hybrid intelligence for decision support in forensics science. In: IEEE Intelligence and Security Informatics, pp. 304–309 (2016) Shalaginov, A.: Soft computing and hybrid intelligence for decision support in forensics science. In: IEEE Intelligence and Security Informatics, pp. 304–309 (2016)
27.
go back to reference Shalaginov, A.: Advancing Neuro-Fuzzy Algorithm for Automated Classification in Largescale Forensic and Cybercrime Investigations: Adaptive Machine Learning for Big Data Forensic. Ph.D. thesis, Norwegian University of Science and Technology (2018) Shalaginov, A.: Advancing Neuro-Fuzzy Algorithm for Automated Classification in Largescale Forensic and Cybercrime Investigations: Adaptive Machine Learning for Big Data Forensic. Ph.D. thesis, Norwegian University of Science and Technology (2018)
28.
go back to reference Shalaginov, A., Semeniuta, O., Alazab, M.: MEML: resource-aware MQTT-based machine learning for network attacks detection on IoT edge devices. In: Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion, pp. 123–128. ACM (2019) Shalaginov, A., Semeniuta, O., Alazab, M.: MEML: resource-aware MQTT-based machine learning for network attacks detection on IoT edge devices. In: Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion, pp. 123–128. ACM (2019)
30.
go back to reference Yusoff, Y., Ismail, R., Hassan, Z.: Common phases of computer forensics investigation models. Int. J. Comput. Sci. Inf. Technol. 3(3), 17–31 (2011) Yusoff, Y., Ismail, R., Hassan, Z.: Common phases of computer forensics investigation models. Int. J. Comput. Sci. Inf. Technol. 3(3), 17–31 (2011)
31.
go back to reference Zulkipli, N.H.N., Alenezi, A., Wills, G.B.: IoT forensic: bridging the challenges in digital forensic and the internet of things. In: International Conference on Internet of Things, Big Data and Security, vol. 2, pp. 315–324. SCITEPRESS (2017) Zulkipli, N.H.N., Alenezi, A., Wills, G.B.: IoT forensic: bridging the challenges in digital forensic and the internet of things. In: International Conference on Internet of Things, Big Data and Security, vol. 2, pp. 315–324. SCITEPRESS (2017)
Metadata
Title
IoT Digital Forensics Readiness in the Edge: A Roadmap for Acquiring Digital Evidences from Intelligent Smart Applications
Authors
Andrii Shalaginov
Asif Iqbal
Johannes Olegård
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-59824-2_1

Premium Partner