Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1001))

Abstract

With the advent of Internet of Things (IoT) and the rapid advancements in this area, it is predicted that there will be over ten billions wireless accessories linked to the world of internet. Such devices will serve as the foundations in the field of computer science, impacting the everyday course of life. These wireless devices will be capable of absorbing a huge number of personal and sensitive information to enhance the results. The IoT technology puts the collective data to good use by integrating different data sets together that generates amazing outcomes. This technology, however, poses significant challenges to certain agencies aiming to apply this system in their routine businesses. This paper further highlights various threats and challenges that the IoT presents in digital forensics and assists in the identification of important areas which should be modified in future. Finally, the paper highlights the lack of digital forensic education in Pakistan.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdmeziem, R., Tandjaoui, D.: Internet of things: Concept. building blocks, applications and challenges, 1–17 (2014)

    Google Scholar 

  2. Adams, R., Hobbs, V., Mann, G.: The advanced data acquisition model (Adam): A process model for digital forensic practice. J. Digit. Forensics 8(4), 25–48 (2013)

    Google Scholar 

  3. Arafeen, Q., Arifeen, N., Ahmed, M.: Digital forensics education in Pakistan -a new way to understand the digital world. Int. J. Latest Res. Eng. Technol. (IJLRET) 2(4), 72–74 (2016)

    Google Scholar 

  4. Atamli, A.W., Martin, A.: Threat-based security analysis for the internet of things. In: Workshop on Secure Internet of Things, pp. 35–43

    Google Scholar 

  5. Avizienis, A., Laprie, J., et al.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secur. Comput. 1(1), 1–23 (2004)

    Article  Google Scholar 

  6. Azhar, S., Hein, M., Sketo, B.: Building information modeling (bim): benefits, risks and challenges (2008). http://ascpro.ascweb.org/chair/paper/CPGT182002008.pdf

  7. Azmat, Z.: Country’s first digital forensic science center opens at KU. The News International (2016). https://www.thenews.com.pk/print/136097-Countrys-first-digital-forensic-science-centre-opens-at-KU

  8. Bennett, D.: The challenges facing computer forensics investigators in obtaining information from mobile devices for use in criminal investigations. Inf. Secur. J.: Glob. Perspect. 21(3), 159–168 (2012)

    Google Scholar 

  9. Buskirk, V., Liu, V.: Digital evidence: Challenging the presumption of reliability. J. Digit. Forensic Pract. 1(1), 19–26 (2006)

    Article  Google Scholar 

  10. Chirgwin, R.: SPAM supposedly spotted leaving the fridge. The Register (2014). Retrieved from http://www.theregister.co.uk/2014/01/20/spam_spotted_leaving_the_fridge/

  11. Chen, B.: Computer-forensics-in-criminal-investigations (2013). Retrieved from dartmouth.edu: https://sites.dartmouth.edu/dujs/2013/03/13/computer-forensics-in-criminal-investigations/

  12. Cui, Q., Wang, Y. et al.: Big data analytics and network calculus enabling intelligent management of autonomous vehicles in a smart city. IEEE Internet Things J. 1 (2018)

    Google Scholar 

  13. Duranti, L., Endicott-Popovsky, B.: Digital records forensics: A new science and academic program for forensic readiness. J. Digit. Forensics, Secur. Law 5(2), 45–62 (2010)

    Google Scholar 

  14. Geers, K.: The cyber threat to national critical infrastructures: beyond theory. J. Digit. Forensic Pract. 3(2–4), 124–130 (2010)

    Article  Google Scholar 

  15. Gogolin, G., Jones, J.: Law enforcement’s ability to deal with digital crime and the implications for business. J. Digit. Forensic Pract. 3(2–4), 131–139 (2010)

    Article  Google Scholar 

  16. Garinkel, S.: Digital forensics research: The next 10 years. Digit. Investig. 7, 64–73 (2010)

    Article  Google Scholar 

  17. Gil, D., Ferrandez, A., et al.: Internet of things: A review of surveys based on context aware intelligent services. Sensors 16(7), 1069 (2016)

    Article  Google Scholar 

  18. Guo, H., Ren, J. et al.: A scalable and manageable IoT architecture based on transparent computing. J. Parallel Distrib. Comput. 111 (2017)

    Google Scholar 

  19. Haines, L.: Cops may check crash drivers’ mobile records ? The Register. The Register (2007). http://www.theregister.co.uk/2007/02/27/mobile_phone_proposal/

  20. Islam, S., Kwak, D., et al.: The internet of things for health care: A comprehensive survey. IEEE Access 3, 678–708 (2015)

    Article  Google Scholar 

  21. Iqbal, M., Olaleye, O., Bayoum, M.: A review on internet of things (IoT): Security and privacy requirements and the solution approaches. Glob. J. Comput. Sci. Technol.: E Netw., Web Secur. 16(7), 1–11 (2016)

    Google Scholar 

  22. Jazayeri, M., Liang, S., Huang, C.: Implementation and evaluation of four interoperable open standards for the internet of things. Sensors 15(9), 24343–24373 (2015)

    Article  Google Scholar 

  23. Lillis, D., Becker, B. et al.: Current challenges and future research areas for digital forensic investigation. In: The 11th ADFSL Conference on Digital Forensics Security and Law (CDFSL) (2016)

    Google Scholar 

  24. Li, C.: Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, 1st edn, pp. 123–125. Idea Group Inc., Pennsylvania (2013)

    Book  Google Scholar 

  25. McKemmish, R.: What is Forensic Computing? Trends and Issues in Crime and Criminal Justice, p. 118 (1999)

    Google Scholar 

  26. Miorandi, D., Sicari, S., et al.: Internet of things: Vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)

    Article  Google Scholar 

  27. Mohay, G.: Technical challenges and directions for digital forensics. In: First International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 155– 161 (2005)

    Google Scholar 

  28. Mushtaque, K.: Digital forensic investigation models, an evolution study. J. Inf. Syst. Technol. Manag. 12(2), 233–243 (2015)

    Google Scholar 

  29. Naqvi, S., Dallons, G., Ponsard, C.: Applying digital forensics in the future internet enterprise systems. In: European SMEs’ Perspective, Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) (2016)

    Google Scholar 

  30. Oriwoh, E., Jazani, D. et al.: Internet of Things Forensics: Challenges and approaches. In: 2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing, vol. 2014, pp. 608–615 (2013)

    Google Scholar 

  31. Osborne, G., Slay, J.: Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence. In: Sixth International Conference on Availability, Reliability and Security (ARES), pp. 196–201. Vienna, Austria (2011)

    Google Scholar 

  32. Park, K., Park, J., et al.: Anti-forensic trace detection in digital forensic triage investigations. J. Digit. Forensics, Secur. Law 12(8), 31–40 (2017)

    Google Scholar 

  33. Pollitt, M., Nance, K., et al.: Virtualization and digital forensics: A research and education agenda. J. Digit. Forensic Pract. 2(2), 62–73 (2008)

    Article  Google Scholar 

  34. Rahman, S., Bishop, M., Holt, A.: Internet of Things Mobility Forensics. In: Proceedings of the 2016 Information Security Research and Education (INSuRE) Conference (INSuRECon-16) (2016)

    Google Scholar 

  35. Reith, M., Carr, C., Gunsch, G.: An Examination of digital forensic model. Int. Digit. Evid. 1(3), 1–12 (2002)

    Google Scholar 

  36. Rose, K., Eldridge, S., Chapin, L.: The Internet of Things: An overview. Proc. Internet Soc. (ISOC), 1–53 (2015)

    Google Scholar 

  37. Sethi, P., Sarangi, S.: Internet of things: Architectures, protocols, and applications. J. Electr. Comput. Eng. 2017, 1–25 (2017)

    Article  Google Scholar 

  38. Information Models, N., Salim, F., et al.: Physical access control administration using building information models. Cyberspace Saf. Secur. 7672, 236–250 (2012)

    Article  Google Scholar 

  39. Shaikh, A.: Cyber-security-inside-pakistans-first-digital-forensic-research-lab (2016). Retrieved from Tribune: https://tribune.com.pk/story/1246290/cyber-security-inside-pakistans-first-digital-forensic-research-lab/

  40. Sharif, S.: Assessing Forensic Science Landscape in Pakistan. MIT Technology Review Pakistan (2017). http://www.technologyreview.pk/assessing-forensic-science-landscape-pakistan/

  41. Slay, J., Lin, Y., et al.: Advances in Digital Forensics V: Chapter 3: Towards a Formalization of Digital Forensics, 5th edn, pp. 34–47. Springer, Florida (2009)

    Google Scholar 

  42. Srivastava, A., Vatsal, P.: Forensic importance of SIM cards as a digital evidence. J. Forensic Res. 07(322), 2 (2016)

    Google Scholar 

  43. Sun, H., Hsu, S., Chen, C.: Mobile jamming attack and its countermeasure in wireless sensor networks. In: AINAW ’07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 457–462 (2007)

    Google Scholar 

  44. Taylor, M., Haggerty, J., et al.: Digital evidence in cloud computing systems. Comput. Law Secur. Rev. 26(3), 304–308 (2010)

    Article  Google Scholar 

  45. Tu, M., Xu, D., et al.: On the development of a digital forensics curriculum. J. Digit. Forensics, Secur. Law 7(3), 13–32 (2012)

    Google Scholar 

  46. Zawoad, S., Hasan, R.: FAIoT: Towards building a forensics aware eco system for the internet of things. In: IEEE International Conference on Services Computing. IEEE Computer Society (2015)

    Google Scholar 

  47. Zhang, J., Wang, L.: An integrated open forensic environment for digital evidence investigation. Wuhan Univ. J. Nat. Sci. 17(6), 511–515 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Arafeen, Q.u., Kamran, A., Arifeen, N.u., Shaikh, A.A., Syed, N.A. (2020). Threats in the Internet of Things Pertaining to Digital Data. In: Xu, J., Ahmed, S., Cooke, F., Duca, G. (eds) Proceedings of the Thirteenth International Conference on Management Science and Engineering Management. ICMSEM 2019. Advances in Intelligent Systems and Computing, vol 1001. Springer, Cham. https://doi.org/10.1007/978-3-030-21248-3_2

Download citation

Publish with us

Policies and ethics