Abstract
IoT devices are becoming more prevalent in society, with an expected 21.5 Billion devices connected by 2025 [24], and when an incident occurs in the vicinity of such devices then they should be considered as potential digital evidence. A network of IoT devices is often referred to as a smart environment, or more frequently as a cyber physical system [17]. Is there a need for yet another framework? It could be questioned that: (i) there is no need for such frameworks since the IoT devices are not that important; or, (ii) that there are adequate SOPs and frameworks already in place? This chapter aims to provide answers to these questions.
Keywords
- Cyber physical systems
- Digital forensic frameworks
- Blockchain
- Cloud
- IoT
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
N.B. Many cyber-physical systems with wireless sensors are used with livestock.
References
Babun L, Sikder AK, Acar, A, Selcuk Uluagac A (2018) Iotdots: a digital forensics framework for smart environments. arXiv preprint arXiv:1809.00745
Bashir I (2018) Mastering blockchain. Packt, 2 edn.
BBC (2020) Ring doorbell’gives Facebook and Google user data. https://www.bbc.co.uk/news/technology-51281476. Accessed Jan 2020
Beavers JL, Faulks M, Marchang J (2019) Hacking NHS pacemakers: a feasibility study. In: Global security, safety and sustainability the security challenges of the connected world
Beebe NL, Clark JG (2005) A hierarchical, objectives-based framework for the digital investigations process. Digit Invest 2(2),147–167
Camara C, Peris-Lopez P, Tapiador JE (2015) Security and privacy issues in implantable medical devices: a comprehensive survey. J Biomed Inform 55, 272–289
Carrier B, Spafford EH (2004) An event-based digital forensic investigation framework. In: Digital forensic research workshop, pp 11–13
Casey E, Blitz A, Steuart C (2005) Digital evidence and computer crime
Chirgwin R (2020) Finns chilling as DDoS knocks out building control system. https://www.theregister.co.uk/2016/11/09/finns_chilling_as_ddos_knocks_out_building_control_system/. Accessed Jan 2020
Clack CD, Bakshi, VA Braine L (2016) Smart contract templates: essential requirements and design options. arXiv preprint arXiv:1612.04496
Clack CD, Bakshi VA, Braine L (2016) Smart contract templates: foundations, design landscape and research directions. arXiv preprint arXiv:1608.00771
Council of European Union. Council Regulation (EU) no 2016/679. http://eur-lex.europa.eu/legal-content/en/LSU/?uri=CELEX%3A32016R0679. Accessed July 2018
Divya M, Biradar NB (2018) IOTA-next generation block chain. Int J Eng Comput Sci 7(4), 23823–23826
El Ioini N, Pahl C (2018) A review of distributed ledger technologies. In: OTM confederated international conferences “On the Move to Meaningful Internet Systems”. Springer, pp 277–288
Forensic Science Regulator (FSR). Codes of practice and conduct for forensic science providers and practitioners in the criminal justice system. Technical report, UK Govt, Birmingham, UK
Garrie DB (2014) Digital forensic evidence in the courtroom: understanding content and quality. Northwest J Technol Intellect Prop 12, 1–128
Griffor ER, Greer C, Wollman DA, Burns MJ (2017) Framework for cyber-physical systems: Volume 1, overview. Technical report, National Institute of Standards and Technology
Ibarra J (2019) Digital forensic investigation process model (DFIPM) to IoMT ensuring data privacy. Master’s thesis, Northumbria University, Newcastle, UK
ISO17025:2017 (2017). General requirements for the competence of testing and calibrating laboratories. Technical report, International Organisation for Standardization (ISO), Geneva, CH
Jones KJ, Bejtlich R, Rose CW (2005) Real digital forensics: computer security and incident response. Addison-Wesley Professional
Karabiyik U, Akkaya K (2019) Digital forensics for IoT and WSNS. In: Mission-oriented sensor networks and systems: art and science. Springer, pp 171–207
Kent K, Chevalier S, Grance T, Dang H (2006). Guide to integrating forensic techniques into incident response. Technical report, National Institute of Standards and Technology
Kirk PL (1953) Crime investigation: Physical evidence and the police laboratory, New York
Lueth KL (2020) State of the IoT 2018: number of IoT devices now at 7b market accelerating. https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b/. Accessed: Jan 2020
Mitchell, I, Cockerton T, Hara S, Evans C. (2018) SMERF: social media, ethics and risk framework. Cyber Criminol
Mitchell I, Hara S, Jahankhani H, Neilson D (2019) Blockchain of custody, BoC. Cyber Secur Pract Guide
Montasari R (2016) The comprehensive digital forensic investigation process model. PhD thesis, University of Derby
Montasari R (2016) A comprehensive digital forensic investigation process model. Int J Electron Secur Digit Forensics 8(4):285–302
Montasari R, Peltola P (2015) Computer forensic analysis of private browsing modes. In: International conference on global security, safety, and sustainability. Springer, pp 96–109
Mouton F, Venter HS (2011) A prototype for achieving digital forensic readiness on wireless sensor networks. In: IEEE Africon’11. IEEE, pp 1–6
Nagasai A (2020) Classification of IoT devices. https://www.ciscoplatform.com/profiles/blogs/classification-of-iot-devices. Accessed Jan 2020
Oriwoh E, Sant P, Epiphaniou G (2013) Guidelines for Internet of Things deployment approaches—The thing commandments. Procedia Computer Science 21:122–131
Palmer GL (2002) A roadmap for digital forensics research report from the first digital forensics workshop (technical report dtr-t001-01-final). Air Force Research Lab, Rome Research Site, Utica, pp 1–48
Serguei Popov. The tangle. http://tanglereport.com/wp-content/uploads/2018/01/IOTA_Whitepaper.pdf. Accessed Jan 2020
Popov S, Moog H, Camargo D, Capossele A, Dimitrov V, Gal A, Greve A, Kusmierz B, Mueller S, Penzkofer A (2020) The coordicide, pp 1–30. Accessed Jan 2020
Uribe F (2018) The classification of Internet of Things (IoT) devices based on their impact on living things. SSRN: https://ssrn.com/abstract=3350094 or http://dx.doi.org/10.2139/ssrn.3350094. Accessed Jan 2020
U.S. Department of Justice (2009) Electronic crime scene investigation: an on-the scene reference for first responders. National Institute of Justice, November 2009
Vilandrie A (2020) Survey: Nearly half of U.S. firms using internet of things hit by security breaches. https://www.businesswire.com/news/home/20170601006165/en. Accessed Jan 2020
Watson D, Jones AJ (2013) Digital forensics processing and procedures: meeting the requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements, 1st edn. Elsevier
Williams J (2018) Good practice guide for digital evidence, March 2012. http://library.college.police.uk/docs/acpo/digital-evidence-2012.pdf. Accessed March 2018
Yaga D, Mell P, Roby N, Scarfone K (2018) Blockchain technology overview. Technical report, National Institute of Standards and Technology
Conflicting Interests
None identified.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Mitchell, I., Hara, S., Ibarra Jimenez, J., Jahankhani, H., Montasari, R. (2020). IoT and Cloud Forensic Investigation Guidelines. In: Jahankhani, H., Akhgar, B., Cochrane, P., Dastbaz, M. (eds) Policing in the Era of AI and Smart Societies. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-50613-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-50613-1_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-50612-4
Online ISBN: 978-3-030-50613-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)