Related Papers
IEEE Communications Surveys & Tutorials
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues
Spyros Panagiotakis
Future Generation Computer Systems
Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges
ahsan kazmi
Journal of Computer Security
A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement
2021 •
Md Morshed Alam
Data provenance collects comprehensive information about the events and operations in a computer system at both application and kernel levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are leveraged by the analyzer to understand the attack behavior and discover the level of damage. Existing literature demonstrates a number of research efforts on information capture, management, and analysis of data provenance. In recent years, provenance in IoT devices attracts several research efforts because of the proliferation of commodity IoT devices. In this survey paper, we present a comparative study of the state-of-the-art approaches to provenance by classifying them based on frameworks, deployed techniques, and subjects of interest. We also discuss the emergence and scope of data pr...
Rasel Ahmed
Secured Communication Using Advanced Digital Forensic IoT
2021 •
Rasel Ahmed
The internet of things (IoT) brings the power of the internet, data processing, and analytics to the physical world. Consumers will be able to communicate with the global information network without the use of a keyboard or screen; many of their daily objects and equipment will be able to take instructions from the network with minimal human interference.Due to the widespread applicability of the Internet of Things (IoT), it is critical that IoT designers and architects provide ensuring protection of communication in IoT as a key requirement. Communication in IoT is a new field of study concerned with ensuring safe coordination between smart sensors, actuators, and computers, as well as the external world, which makes up the IoT's overarching arena.IoT architecture must provide several features such as scalability, reliability, usability, availability, and flexibility so that applications that support both public and private entities can be developed. A precise specification of security criteria, as well as various security measures that must be implemented, will be critical to the IoT's success.This paper uses an innovative digital forensic technique for security enhancement to provide an overview of security and privacy aspects of IoT communications. In the investigation of IoT security violations, the researchers face a variety of obstacles. The difficulties are amplified by the fact that cloud service providers use advanced strategies such as virtualization and a multi-tenant usage model to efficiently assign resources to users.The proposed technique, which uses an innovative digital forensic approach, outlines an improved, accessible, and accurate method for determining the source of the crime and collecting evidence related to a security breach during contact.
(IoT) Forensics Challenges, Approaches and Open Issues
shweta tripathi
International Journal of Engineering Research and Technology (IJERT)
IJERT-Internet of Things (IoT) Applications and Security Challenges: A Review
2019 •
IJERT Journal
An evolving topic in today's era is Data Mining and Knowledge Discovery. Data mining and knowledge discovery in databases is attracting a lot of researchers, industry persons, academicians. Why this area is so emerging? This article provides an overview of this emerging field, gives an overview that how data mining and knowledge discovery in databases are related to each other and also to other related fields, such as machine learning, statistics, and databases. The article also mentions particular real-world applications, specific data-mining techniques, challenges involved in real-world applications of knowledge discovery, and current and future research directions in the field
International Journal of Digital Crime and Forensics
The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics
Farkhund Iqbal
The Internet of Things (IoT) represents the seamless merging of the real and digital world, with new devices created that store and pass around data. Processing large quantities of IoT data will proportionately increase workloads of data centres, leaving providers with new security, capacity, and analytics challenges. Handling this data conveniently is a critical challenge, as the overall application performance is highly dependent on the properties of the data management service. This article explores the challenges posed by cybercrime investigations and digital forensics concerning the shifting landscape of crime – the IoT and the evident investigative complexity – moving to the Internet of Anything (IoA)/Internet of Everything (IoE) era. IoT forensics requires a multi-faceted approach where evidence may be collected from a variety of sources such as sensor devices, communication devices, fridges, cars and drones, to smart swarms and intelligent buildings.
Mobile Networks and Applications
Editorial: Securing Internet of Things Through Big Data Analytics
fazl ullah
Dfim: A New Digital Forensics Investigation Model for Internet of Things
2020 •
Dr.mohammad Qatawneh
The Internet of Things (IoT) smart devices have been used widely in several applications such as healthcare, education, environment, transportation, smart city, etc. These objects are resource-constrained devices which involve lacks regarding security and may lead to cyber-crime. Therefore, the IoT devices may contain evidence that are considered as an important need to investigators and can be admitted in courts. To tackle this problem most current research focuses on security issues for different IoT architectures rather than approaches and techniques of forensic acquisition and analysis for IoT objects. In this paper, we propose a new Digital Forensics Investigation Model for IoT (DFIM). The DFIM has two main components: The Data Provider Zone (DPZ) which responsible for grouping all data gathered by sensor nodes into a set of groups, where each group contains data or documents related to each other, and the investigation authority which receives the requests from the claimers fo...
Electronics
Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework
Habib Hamam
The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis estimates how much damage has been done to the devices due to various attacks. In this paper, we have proposed an intelligent forensic analysis mechanism that automatically detects the attack performed on IoT devices using a machine-to-machine (M2M) framework. Further, the M2M framework has been developed using different forensic analysis tools and machine learning to detect the type of attacks. Additionally, the problem of an evidence acquisition (attack on IoT devices) has been resolved by introducing a third-party logging server. Forensic analysis is also performed on logs using forensic server (security onion) to determine the effect and nature of the attacks. The proposed framework inc...