2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2018
DOI: 10.1109/ntms.2018.8328748
|View full text |Cite
|
Sign up to set email alerts
|

Iot Forensics: Challenges for the Ioa Era

Abstract: Abstract-Challenges for IoT-based forensic investigations include the increasing amount of objects of forensic interest, relevance of identified and collected devices, blurry network boundaries, and edgeless networks. As we look ahead to a world of expanding ubiquitous computing, the challenge of forensic processes such as data acquisition (logical and physical) and extraction and analysis of data grows in this space. Containing an IoT breach is increasingly challenging -evidence is no longer restricted to a P… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
47
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 75 publications
(47 citation statements)
references
References 10 publications
0
47
0
Order By: Relevance
“…Current models are criticised from different aspects, such as being too specific (Reith, M., Carr, C., & Gunsch, 2002), too broad (Rogers, 2006), or too complex (Selamat, S. R., Yusof, R., & Sahib, 2008). In contrast, "CFSAP" (Computer Forensics -Secure, Analyse, Present) comprises the four key elements of computer forensics (identification, preservation, analysis, and presentation) into three steps to follow: Secure (identify sources of digital evidence, preserve digital evidence), Analyse (forensic analysis of digital evidence: extract, process, interpret), Present (Presentation of digital evidence, expert opinion and testimony) (Macdermott et al, 2018). "Framework for Reliable Experimental Design" (FRED) proposed by Horsman, focuses on the underpinning procedures involved within undertaking the reverse engineering of digital data structures and the process of extracting and interpreting digital content in a reliable way.…”
Section: Cybercrime Investigations and Digital Forensicsmentioning
confidence: 99%
See 2 more Smart Citations
“…Current models are criticised from different aspects, such as being too specific (Reith, M., Carr, C., & Gunsch, 2002), too broad (Rogers, 2006), or too complex (Selamat, S. R., Yusof, R., & Sahib, 2008). In contrast, "CFSAP" (Computer Forensics -Secure, Analyse, Present) comprises the four key elements of computer forensics (identification, preservation, analysis, and presentation) into three steps to follow: Secure (identify sources of digital evidence, preserve digital evidence), Analyse (forensic analysis of digital evidence: extract, process, interpret), Present (Presentation of digital evidence, expert opinion and testimony) (Macdermott et al, 2018). "Framework for Reliable Experimental Design" (FRED) proposed by Horsman, focuses on the underpinning procedures involved within undertaking the reverse engineering of digital data structures and the process of extracting and interpreting digital content in a reliable way.…”
Section: Cybercrime Investigations and Digital Forensicsmentioning
confidence: 99%
“…In the infancy of computer forensics, cases were limited to the analysis of a single device; increasingly cases require the analysis of multiple devices followed by the correlation of the collected evidence. Issues identified within the study are still prominent now in 2018 (Horsman, 2018), and the rapid embrace of the IoT/IoA era enhances these concerns (Macdermott et al, 2018).…”
Section: Cybercrime Investigations and Digital Forensicsmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, the elimination of the proof form of these devices is also seen as another IoT concern as most vendors are facing distinctive levels, operating frames and phones. The CCTV forensic [12], in which CCTV producers are organized into their devices to connect the distinctive document framework. It is still a challenge to legally retrieve curiosities from the storage devices of CCTV.…”
Section: Forensic Iot Challengesmentioning
confidence: 99%
“…mobile device forensics), the diversity in IoT devices (e.g. 3D printers, roadside units in a smart transportation system, smart healthcare devices in a hospital, and smart military uniforms) and the different evidence and privacy regulations compound the challenges of such investigations [12]. Some of these challenges are as follows:…”
Section: Introductionmentioning
confidence: 99%