Skip to main content

Internet of Things in Forensics Investigation in Comparison to Digital Forensics

  • Chapter
  • First Online:
Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario's

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1132))

Abstract

The Internet of Things (IoT)-based forensic investigations have raised new challenges with the increase in the number of objects of legal significance, the applicability of identified and collected devices, indistinct network boundaries, and edgeless networks. IoT releases new opportunities in forensic investigations. Relying on pieces of evidence from the IoT environment, forensic investigators and examiners can face many challenges from the identification, collection, organization and the preservation of shreds of evidence and the clues encountered besides, to the security challenges of IoT devices. Understanding different entities and approaches of IoT, as well as the differences between digital and IoT forensics, is becoming a crucial skill for forensic investigators. In the present manuscript, a plan has been clearly explained to assess different features of IoT forensics. An elucidation has been proposed to foster the connection and support for realistic investigations and challenges in different areas of forensic investigations in forensic science.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Atlam, H.F., Alenezi, A., Alassafi, M.O., Wills, G.B.: Blockchain with Internet of Things: benefits, challenges, and future directions. Int. J. Intell. Syst. Appl. 6, 40–48 (2018)

    Google Scholar 

  2. Farooq, M.U., Waseem, M., Mazhar, S., Khairi, A., Kamal, T.: A review on Internet of Things (IoT). Int. J. Comput. Appl. 113(1), 1–7 (2015)

    Google Scholar 

  3. Index IEEE Internet of Things Journal vol. 4. IEEE Internet Things J. 4(6), 2362–2392 (2017)

    Google Scholar 

  4. Taylor, M., Haggerty, J., Gresty, D., Hegarty, R.: Digital evidence in cloud computing systems. Comput. Law Secur. Rep. 26(3), 304–308 (2010)

    Article  Google Scholar 

  5. Tillman, K.: How Many Internet Connections are in the World? Right. Now (2013). https://blogs.cisco.com/news/cisco-connections-counter

  6. Jiang, L., Da Xu, L., Cai, H., Jiang, Z., Bu, F., Xu, B.: An IoT-oriented data storage framework in cloud computing platform. IEEE Trans. Ind. Inf. 10(2), 1443–1451 (2014)

    Article  Google Scholar 

  7. Williams, W.: How friday’s cyberattack shut down netflix, twitter, and spotify (2016). http://www.csmonitor.com/Technology/2016/1023/How-Friday-s-cyberattack-shut-down-Netflix-Twitter-and-Spotify

  8. Herold, R.: The criticality of security in the Internet of Things. Inf. Syst. Audit Control Assoc. J. 6, 18–24 (2015)

    Google Scholar 

  9. Truong, H., Narendra, N., Lin, K.: Notes on ensembles of IoT, network functions and clouds for service-oriented computing and applications. SOCA 12(1), 1–10 (2018)

    Article  Google Scholar 

  10. Blumenthal, E., Weise, E.: Hacked home devices caused massive Internet outage (2016). https://www.usatoday.com/story/tech/2016/10/21/cyber-attack-takes-down-east-coast-netflix-spotify-twitter/92507806/

  11. Hegarty, R.C., Lamb, D.J., Attwood, A.: Digital evidence challenges in the internet of things. In: Proceedings of the Ninth International Workshop on Digital Forensics and Incident Analysis, pp. 163–172 (2014)

    Google Scholar 

  12. Zawoad, S., Hasan, R.: FAIot: towards building a forensics aware eco system for the Internet of Things. In: 2015 IEEE International Conference on Services Computing (SCC), pp. 279–284 (2015)

    Google Scholar 

  13. Kolias, C., Stavrou, A., Voas, J., Bojanova, I., Kuhn, R.: Learning Internet-of-Things security “Hands-On”. IEEE Secur. Priv. 14(1), 37–46 (2016)

    Article  Google Scholar 

  14. Riazul Islam, S.M., Kwak, D., Kabir, M.H., Hossain, M.S., Kwak, K.S.: The Internet of Things for health care: a comprehensive survey. IEEE Access 3, 678–708 (2015)

    Article  Google Scholar 

  15. Roman, R., Najera, P., Lopez, J.: Securing the Internet of Things. Computer 44(9), 51–58 (2011)

    Article  Google Scholar 

  16. Sun, X., Wang, C.: The research of security technology in the Internet of Things. In: Advances in Computer Science, Intelligent System and Environment, vol. 105, pp. 113–119 (2011)

    Chapter  Google Scholar 

  17. Oriwoh, E., Jazani, D., Epiphaniou, G., Sant, P.: Internet of Things forensics: challenges and approaches. In: Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, pp. 608–615 (2013)

    Google Scholar 

  18. Zareen, M.S., Waqar, A., Aslam, B.: Digital forensics: latest challenges and response. In: 2013 2nd National Conference on Information Assurance, NCIA, pp. 21–29 (2013)

    Google Scholar 

  19. Gao, L., Liu, L., Zhang, J., Hou, L.: Building of smart home medical system based on Internet of Things. Internet Things Cloud Comput. 4(3), 34–38 (2016)

    Article  Google Scholar 

  20. Alenezi, A., Hussein, R.K., Walters, R.J., Wills, G.B.: A framework for cloud forensic readiness in organizations. In: 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp. 199–204 (2017)

    Google Scholar 

  21. Servida, F., Casey, E.: IoT forensic challenges and opportunities for digital traces. Digit. Invest. 28(Supplement), S22–S29 (2019)

    Article  Google Scholar 

  22. Perumal, S., Norwawi, N.M., Raman, V.: Internet of Things (IoT) digital forensic investigation model: top-down forensic approach methodology. In: 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 1923 (2015)

    Google Scholar 

  23. Tilva, M., Rohokale, V.: Network forensics for detection of malicious packets in Internet of Things (IoT). Int. J. Recent Innov. Trends Comput. Commun. 4(6), 114–118 (2016)

    Google Scholar 

  24. Karabiyik, U., Akkaya, K.: Digital forensics of IoT and WSNs. In: Lecture Notes in Computer Science: Authors’ Instructions (2018)

    Google Scholar 

  25. Ruan, K., Carthy, J., Kechadi, T., Baggili, I.: Cloud forensics definitions and critical criteria for cloud forensic capability: an overview of survey results. Digit. Invest. 10(1), 34–43 (2013)

    Article  Google Scholar 

  26. Clint, M.R., Reith, M., Carr, C., Gunsch, G.: An examination of digital forensic models (2002). Int. J. Digit. Evid. 1(3), 1–12 (2002)

    Google Scholar 

  27. Zia, T., Liu, P., Han, W.: Application-specific digital forensics investigative model in Internet of Things (IoT). In: Proceedings Of The 12th International Conference On Availability, Reliability And Security - ARES 2017, pp. 1–7 (2017)

    Google Scholar 

  28. Hunton, P.: The stages of cybercrime investigations: Bridging the gap between technology examination and law enforcement investigation. Comput. Law Secur. Rev. 27(1), 61–67 (2011)

    Article  Google Scholar 

  29. Grance, T., Chevalier, S., Scarfone, K.K., Dang, H.: Guide to integrating forensic techniques into incident response. National Institute of Standards and Technology (NIST). Special Publication 800–86 (2006)

    Google Scholar 

  30. Hassan, N.A.: Digital Forensics Basics: A Practical Guide Using Windows OS, 1st edn. Apress, New York (2019)

    Book  Google Scholar 

  31. Agarwal, A., Gupta, M., Gupta, S., Gupta, S.C.: Systematic digital forensic investigation model. Int. J. Comput. Sci. Secur. (IJCSS) 5(1), 118–131 (2011)

    Google Scholar 

  32. Zulkipli, N., Alenezi, A., Wills, G.: IoT forensic: bridging the challenges in digital forensic and the Internet of Things. In: Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, pp. 315–324 (2017)

    Google Scholar 

  33. Garfinkel, S.L.: Digital forensics research: the next 10 years. Digit. Invest. 7, S64–S73 (2010)

    Article  Google Scholar 

  34. Casey, E.: Triage in digital forensics. Digit. Invest. Int. J. Digit. Forensics Incident Response 10(2), 85–86 (2013)

    Google Scholar 

  35. Ambrosin, M., Anzanpour, A., Conti, M., Dargahi, T., Moosavi, S., Rahmani, A., Liljeberg, P.: On the feasibility of attribute-based encryption on Internet of Things devices. IEEE Micro Spec. Issue Internet Things 36(6), 25–35 (2016)

    Google Scholar 

  36. Naranje, V., Kumar, S.: Knowledge-based system for design of deep drawing die for axisymmetric parts. In: Kumar, S., Hussein, H. (eds.) AI Applications in Sheet Metal Forming. Topics in Mining, Metallurgy and Materials Engineering, pp. 93–119. Springer, Singapore (2017)

    Chapter  Google Scholar 

  37. Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y. (eds.) Futuristic Trends in Network and Communication Technologies. FTNCT 2018. Communications in Computer and Information Science, vol 958. Springer, Singapore

    Google Scholar 

  38. Attwood, A., Merabti, M., Abuelmaatti, O.: IoMANETs: mobility architecture for wireless M2M networks. In: 2011 IEEE GLOBECOM Workshops (GC Wkshps), pp. 399–404 (2012)

    Google Scholar 

  39. Grobler, T., Louwrens, C.P., Von Solms, S.H.: A multi-component view of digital forensics. In: 2010 International Conference on Availability, Reliability and Security, pp. 647–652 (2010)

    Google Scholar 

  40. Alqahtany, S., Clarke, N., Furnell, S., Reich, S.: Cloud forensics: a review of challenges, solutions and open problems. In: 2015 International Conference on Cloud Computing (ICCC), pp. 1–9 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhoopesh Kumar Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sharma, B.K., Hachem, M., Mishra, V.P., Kaur, M.J. (2020). Internet of Things in Forensics Investigation in Comparison to Digital Forensics. In: Singh, P., Bhargava, B., Paprzycki, M., Kaushal, N., Hong, WC. (eds) Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario's. Advances in Intelligent Systems and Computing, vol 1132. Springer, Cham. https://doi.org/10.1007/978-3-030-40305-8_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-40305-8_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-40304-1

  • Online ISBN: 978-3-030-40305-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics