Digital Forensics and Internet of Things

Book description

DIGITAL FORENSICS AND INTERNET OF THINGS

It pays to be ahead of the criminal, and this book helps organizations and people to create a path to achieve this goal.

The book discusses applications and challenges professionals encounter in the burgeoning field of IoT forensics. IoT forensics attempts to align its workflow to that of any forensics practice—investigators identify, interpret, preserve, analyze and present any relevant data. As with any investigation, a timeline is constructed, and, with the aid of smart devices providing data, investigators might be able to capture much more specific data points than in a traditional crime. However, collecting this data can often be a challenge, as it frequently doesn’t live on the device itself, but rather in the provider’s cloud platform. If you can get the data off the device, you’ll have to employ one of a variety of methods given the diverse nature of IoT devices hardware, software, and firmware. So, while robust and insightful data is available, acquiring it is no small undertaking.

Digital Forensics and Internet of Things encompasses:

  • State-of-the-art research and standards concerning IoT forensics and traditional digital forensics
  • Compares and contrasts IoT forensic techniques with those of traditional digital forensics standards
  • Identifies the driving factors of the slow maturation of IoT forensic standards and possible solutions
  • Applies recommended standards gathered from IoT forensic literature in hands-on experiments to test their effectiveness across multiple IoT devices
  • Provides educated recommendations on developing and establishing IoT forensic standards, research, and areas that merit further study.

Audience

Researchers and scientists in forensic sciences, computer sciences, electronics engineering, embedded systems, information technology.

Table of contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Preface
  5. 1 Face Recognition–Based Surveillance System: A New Paradigm for Criminal Profiling
    1. 1.1 Introduction
    2. 1.2 Image Processing
    3. 1.3 Deep Learning
    4. 1.4 Methodology
    5. 1.5 Conclusion
    6. References
  6. 2 Smart Healthcare Monitoring System: An IoT-Based Approach
    1. 2.1 Introduction
    2. 2.2 Healthcare at Clinics
    3. 2.3 Remote Healthcare
    4. 2.4 Technological Framework
    5. 2.5 Standard UIs, Shows, and User Requirements
    6. 2.6 Cloud-Based Health Monitoring Using IoT
    7. 2.7 Information Acquisition
    8. 2.8 The Processing of Cloud
    9. 2.9 IoT-Based Health Monitoring Using Raspberry Pi
    10. 2.10 IoT-Based Health Monitoring Using RFID
    11. 2.11 Arduino and IoT-Based Health Monitoring System
    12. 2.12 IoT-Based Health Monitoring System Using ECG Signal
    13. 2.13 IoT-Based Health Monitoring System Using Android App
    14. 2.14 Conclusion and Future Perspectives
    15. References
  7. 3 Design of Gesture-Based Hand Gloves Using Arduino UNO: A Grace to Abled Mankind
    1. 3.1 Introduction
    2. 3.2 Result and Discussion
    3. 3.3 Conclusion
    4. 3.4 Future Scope
    5. References
  8. 4 Playing With Genes: A Pragmatic Approach in Genetic Engineering
    1. 4.1 Introduction
    2. 4.2 Literature Review
    3. 4.3 Methodology
    4. 4.4 Food and Agriculture
    5. 4.5 Impact on Farmers
    6. 4.6 Diseases: Gene Editing and Curing
    7. 4.7 Conclusion
    8. 4.8 Future Scope
    9. References
  9. 5 Digital Investigative Model in IoT: Forensic View
    1. 5.1 Introduction
    2. 5.2 Application of AI for Different Purposes in Forensic Science
    3. 5.3 Future of AI
    4. 5.4 Challenges While Implementing AI
    5. 5.5 Conclusion
    6. References
  10. 6 Internet of Things Mobility Forensics
    1. 6.1 Introduction
    2. 6.2 Smart Device and IoT
    3. 6.3 Relation of Internet of Things with Mobility Forensics
    4. 6.4 Mobility Forensics IoT Investigation Model
    5. 6.5 Internet of Things Mobility Forensics: A Source of Information
    6. 6.6 Drawbacks in IoT Devices Data Extraction
    7. 6.7 Future Perspective of Internet of Things Mobility Forensics
    8. 6.8 Conclusion
    9. References
  11. 7 A Generic Digital Scientific Examination System for Internet of Things
    1. 7.1 Introduction
    2. 7.2 Internet of Things
    3. 7.3 IoT Architecture
    4. 7.4 Characteristics of IoT
    5. 7.5 IoT Security Challenges and Factors of Threat
    6. 7.6 Role of Digital Forensics in Cybercrime Investigation for IoT
    7. 7.7 IoT Security Steps
    8. 7.8 Conclusion
    9. References
  12. 8 IoT Sensors: Security in Network Forensics
    1. 8.1 Introduction
    2. 8.2 Cybersecurity Versus IoT Security and Cyber-Physical Systems
    3. 8.3 The IoT of the Future and the Need to Secure
    4. 8.4 Security Engineering for IoT Development
    5. 8.5 Building Security Into Design and Development
    6. 8.6 Security in Agile Developments
    7. 8.7 Focusing on the IoT Device in Operation
    8. 8.8 Cryptographic Fundamentals for IoT Security Engineering
    9. 8.9 Cloud Security for the IoT
    10. 8.10 Conclusion
    11. References
  13. 9 Xilinx FPGA and Xilinx IP Cores: A Boon to Curb Digital Crime
    1. 9.1 Introduction
    2. 9.2 Literature Review
    3. 9.3 Proposed Work
    4. 9.4 Xilinx IP Core Square Root
    5. 9.5 RTL View of the 8-Bit Multiplier
    6. 9.6 RTL View of 8-Bit Down Counter
    7. 9.7 Up/Down Counter Simulation Results
    8. 9.8 Square Root Simulation Results
    9. 9.9 Hardware Device Utilization Reports of Binary Down Counter
    10. 9.10 Comparison of Proposed and Existing Work for Binary Up/Down Counter
    11. 9.11 Conclusion
    12. References
  14. 10 Human-Robot Interaction: An Artificial Cognition-Based Study for Criminal Investigations
    1. 10.1 Introduction
    2. 10.2 Methodology
    3. 10.3 Architecture Models for Robots
    4. 10.4 Cognitive Architecture
    5. 10.5 Challenges in the Existing Social Robots and the Future Scopes
    6. 10.6 Conclusion
    7. 10.7 Robots in Future Pandemics
    8. References
  15. 11 VANET: An IoT Forensic-Based Model for Maintaining Chain of Custody
    1. 11.1 Introduction
    2. 11.2 Cluster Performance Parameters
    3. 11.3 Routing Protocols in VANET
    4. 11.4 Internet of Vehicles
    5. 11.5 IoT Forensic in Vehicular Ad Hoc Networks
    6. 11.6 Conclusion
    7. References
  16. 12 Cognitive Radio Networks: A Merit for Teleforensics
    1. 12.1 Introduction
    2. 12.2 Contribution of Work
    3. 12.3 Conclusion and Future Scope
    4. Acknowledgement
    5. References
  17. 13 Fingerprint Image Identification System: An Asset for Security of Bank Lockers
    1. 13.1 Introduction
    2. 13.2 Result and Discussion
    3. 13.3 Conclusion
    4. 13.4 Future Scope
    5. References
  18. 14 IoT Forensics: Interconnection and Sensing Frameworks
    1. 14.1 Introduction
    2. 14.2 The Need for IoT Forensics
    3. 14.3 Various Types of Evidences Encountered
    4. 14.4 Protocols and Frameworks in IoT Forensics
    5. 14.5 IoT Forensics Process Model
    6. 14.6 Suggestive Solutions
    7. 14.7 Conclusion
    8. References
  19. 15 IoT Forensics: A Pernicious Repercussions
    1. 15.1 Introduction: Challenges in IoT Forensics
    2. 15.2 Scope of the Compromise and Crime Scene Reconstruction
    3. 15.3 Device and Data Proliferation
    4. 15.4 Multiple Data Location and Jurisdiction Challenges
    5. 15.5 Device Type
    6. 15.6 Lack of Training and Weak Knowledge Management
    7. 15.7 Data Encryption
    8. 15.8 Heterogeneous Software and/or Hardware Specifications
    9. 15.9 Privacy and Ethical Considerations by Accessing Personal Data
    10. 15.10 Lack of a Common Forensic Model in IoT Devices
    11. 15.11 Securing the Chain of Custody
    12. 15.12 Lifespan Limitation
    13. 15.13 The Cloud Forensic Problem
    14. 15.14 The Minimum or Maximum Period in Which Data is Stored in the Cloud
    15. 15.15 Evidence Analysis and Correlation
    16. 15.16 Conclusion
    17. References
  20. About the Editors
  21. Index
  22. End User License Agreement

Product information

  • Title: Digital Forensics and Internet of Things
  • Author(s): Anita Gehlot, Rajesh Singh, Jaskaran Singh, Neeta Raj Sharma
  • Release date: April 2022
  • Publisher(s): Wiley-Scrivener
  • ISBN: 9781119768784