Abstract
Entering the era of the Internet of Things, the traditional Computer Forensics is no longer as trivial as decades ago with a rather limited pool of possible computer components. It has been demonstrated recently how the complexity and advancement of IoT are being used by malicious actors attack digital and physical infrastructures and systems. The investigative methodology, therefore, faces multiple challenges related to the fact that billions of interconnected devices generate tiny pieces of data that easily comprehend the Big Data paradigm. As a result, Computer Forensics is no longer a simple methodology of the straightforward process. In this paper, we study the complexity and readiness of community-accepted devices in a smart application towards assistance in criminal investigations. In particular, we present a clear methodology and involved tools related to Smart Applications. Relevant artefacts are discussed and analysed using the prism of the Digital Forensics Process. This research contributes towards increased awareness of the IoT Forensics in the Edge, corresponding challenges and opportunities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
Joint Test Action Group standard.
- 5.
In System Programmer.
- 6.
Universal Asynchronous Receiver/Transmitter serial convertor.
- 7.
- 8.
- 9.
- 10.
References
The application of reverse engineering techniques against the Arduino microcontroller to acquire uploaded applications (2014). Accessed 19 Nov 2019
Ahlberg, F.: esptool (2020). https://github.com/espressif/esptool. Accessed 29 May 2020
Alenezi, A., Atlam, H., Alsagri, R., Alassafi, M., Wills, G.: IoT forensics: a state-of-the-art review, challenges and future directions. In: Proceedings of the 4th International Conference on Complexity, Future Information Systems and Risk (2019)
Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th USENIX Security Symposium, pp. 1093–1110 (2017)
Damshenas, M., Dehghantanha, A., Mahmoud, R., bin Shamsuddin, S.: Forensics investigation challenges in cloud computing environments. In: Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 190–194. IEEE (2012)
Delicato, F.C., Pires, P.F., Batista, T., Cavalcante, E., Costa, B., Barros, T.: Towards an IoT ecosystem. In: Proceedings of the First International Workshop on Software Engineering for Systems-of-Systems, pp. 25–28. ACM (2013)
Dengler, S., Awad, A., Dressler, F.: Sensor/actuator networks in smart homes for supporting elderly and handicapped people. In: 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 2007), vol. 2, pp. 863–868. IEEE (2007)
Ericsson: Internet of things forecast (2019). https://www.ericsson.com/en/mobility-report/internet-of-things-forecast. Accessed 04 Oct 2019
Esposito, C., Castiglione, A., Pop, F., Choo, K.K.R.: Challenges of connecting edge and cloud computing: a security and forensic perspective. IEEE Cloud Comput. 4(2), 13–17 (2017)
Espressif: Esp32-wroom-32d (2019). https://www.espressif.com/sites/default/files/documentation/esp32-wroom-32d_esp32-wroom-32u_datasheet_en.pdf. Accessed 29 May 2020
Goudbeek, A., Choo, K.K.R., Le-Khac, N.A.: A forensic investigation framework for smart home environment. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 1446–1451. IEEE (2018)
Grance, T., Chevalier, S., Scarfone, K.K., Dang, H.: Guide to integrating forensic techniques into incident response. Technical report (2006)
Hegarty, R., Lamb, D.J., Attwood, A.: Digital evidence challenges in the internet of things. In: INC, pp. 163–172 (2014)
Koen, R., Olivier, M.S.: The use of file timestamps in digital forensics. In: ISSA, pp. 1–16. Citeseer (2008)
Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)
Kononenko, I., Kukar, M.: Machine Learning and Data Mining: Introduction to Principles and Algorithms. Horwood Publishing Limited (2007)
Lillis, D., Becker, B., O’Sullivan, T., Scanlon, M.: Current challenges and future research areas for digital forensic investigation. arXiv (2016)
Oriwoh, E., Jazani, D., Epiphaniou, G., Sant, P.: Internet of things forensics: challenges and approaches. In: 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 608–615. IEEE (2013)
Perumal, S., Norwawi, N.M., Raman, V.: Internet of things (IoT) digital forensic investigation model: top-down forensic approach methodology. In: 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 19–23. IEEE (2015)
Pollitt, M.: A history of digital forensics. In: Chow, K.-P., Shenoi, S. (eds.) DigitalForensics 2010. IFIP AICT, vol. 337, pp. 3–15. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15506-2_1
Pomeranz, H.: Linux forensics (for non-linux folks). http://www.deer-run.com/~hal/LinuxForensicsForNon-LinuxFolks.pdf. Accessed 21 Nov 2019
Postscapes: IoT standards and protocols (2019). https://www.postscapes.com/internet-of-things-protocols/. Accessed 04 Oct 2019
Sadeghi, A., Wachsmann, C., Waidner, M.: Security and privacy challenges in industrial internet of things. In: 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1–6, June 2015
Satyanarayanan, M.: The emergence of edge computing. Computer 50(1), 30–39 (2017)
Schatsky, D., Kumar, N., Bumb, S.: Intelligent IoT: Bringing the power of AI to the internet of things (2017)
Shalaginov, A.: Soft computing and hybrid intelligence for decision support in forensics science. In: IEEE Intelligence and Security Informatics, pp. 304–309 (2016)
Shalaginov, A.: Advancing Neuro-Fuzzy Algorithm for Automated Classification in Largescale Forensic and Cybercrime Investigations: Adaptive Machine Learning for Big Data Forensic. Ph.D. thesis, Norwegian University of Science and Technology (2018)
Shalaginov, A., Semeniuta, O., Alazab, M.: MEML: resource-aware MQTT-based machine learning for network attacks detection on IoT edge devices. In: Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion, pp. 123–128. ACM (2019)
Willis, C.: Forensics with linux 101 or how to do forensics for free (2003). https://www.blackhat.com/presentations/bh-usa-03/bh-us-03-willis-c/bh-us-03-willis.pdf. Accessed 21 Nov 2019
Yusoff, Y., Ismail, R., Hassan, Z.: Common phases of computer forensics investigation models. Int. J. Comput. Sci. Inf. Technol. 3(3), 17–31 (2011)
Zulkipli, N.H.N., Alenezi, A., Wills, G.B.: IoT forensic: bridging the challenges in digital forensic and the internet of things. In: International Conference on Internet of Things, Big Data and Security, vol. 2, pp. 315–324. SCITEPRESS (2017)
Acknowledgement
Authors would like to thank to the Department of Information Security and Communication Technology (IIK) at the Norwegian University of Science and Technology for support and funding of this contribution. Moreover, this research has received funding from the Swedish Civil Contingencies Agency (MSB) through the research center Resilient Information and Control Systems (RICS).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Shalaginov, A., Iqbal, A., Olegård, J. (2020). IoT Digital Forensics Readiness in the Edge: A Roadmap for Acquiring Digital Evidences from Intelligent Smart Applications. In: Katangur, A., Lin, SC., Wei, J., Yang, S., Zhang, LJ. (eds) Edge Computing – EDGE 2020. EDGE 2020. Lecture Notes in Computer Science(), vol 12407. Springer, Cham. https://doi.org/10.1007/978-3-030-59824-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-59824-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59823-5
Online ISBN: 978-3-030-59824-2
eBook Packages: Computer ScienceComputer Science (R0)