Digital Forensic Investigation of Internet of Things (IoT) Devices

2021 ◽  

Considering the large number of devices connected to the Internet of Things(IoT), identifying malicious devices for the purpose of “search & seizure” remainsa critical issue for digital investigators. Consequently, the need for techniques that automatically identify malicious devices can speed up the process of digital investigation. However, few conceptual approaches were proposed to identify malicious devices during IoT forensic investigation. To overcome that, a formal approach is proposed to automatically triage and fingerprint IoT Malicious devices with their respective states. It is expected that with the proposed formal approach, investigators can simply identify malicious devices, their states as well as determine the scope of investigation.


The advancement of Internet of Things (IoT) devices is continuously progressing and such development also enables a number of issues to arise which increases the complexity in the forensic investigation of the IoT. Globally, investigators are faced with challenges in ways of retrieving evidence from the different areas of the IoT environment, which includes Devices, Networks and the Cloud. One of the most crucial steps during forensic investigations is the writing up and creation of a case report which then needs to be presented in the court of law. In this paper, we propose models to estimate the confidence values of evidence, investigators and case reports to ensure case investigation accuracy and improve the evidential values of case presentation as well as evidence sharing of sensitive data worldwide.


2022 ◽  
Vol 12 (2) ◽  
pp. 730
Author(s):  
Funmilola Ikeolu Fagbola ◽  
Hein Venter

Internet of Things (IoT) is the network of physical objects for communication and data sharing. However, these devices can become shadow IoT devices when they connect to an existing network without the knowledge of the organization’s Information Technology team. More often than not, when shadow devices connect to a network, their inherent vulnerabilities are easily exploited by an adversary and all traces are removed after the attack or criminal activity. Hence, shadow connections pose a challenge for both security and forensic investigations. In this respect, a forensic readiness model for shadow device-inclusive networks is sorely needed for the purposes of forensic evidence gathering and preparedness, should a security or privacy breach occur. However, the hidden nature of shadow IoT devices does not facilitate the effective adoption of the most conventional digital and IoT forensic methods for capturing and preserving potential forensic evidence that might emanate from shadow devices in a network. Therefore, this paper aims to develop a conceptual model for smart digital forensic readiness of organizations with shadow IoT devices. This model will serve as a prototype for IoT device identification, IoT device monitoring, as well as digital potential evidence capturing and preservation for forensic readiness.


Electronics ◽  
2021 ◽  
Vol 10 (18) ◽  
pp. 2310
Author(s):  
Hyungchan Kim ◽  
Sungbum Kim ◽  
Yeonghun Shin ◽  
Wooyeon Jo ◽  
Seokjun Lee ◽  
...  

Recently, the number of Internet of Things (IoT) devices, such as artificial intelligence (AI) speakers and smartwatches, using a Linux-based file system has increased. Moreover, these devices are connected to the Internet and generate vast amounts of data. To efficiently manage these generated data and improve the processing speed, the function is improved by updating the file system version or using new file systems, such as an Extended File System (XFS), B-tree file system (Btrfs), or Flash-Friendly File System (F2FS). However, in the process of updating the existing file system, the metadata structure may be changed or the analysis of the newly released file system may be insufficient, making it impossible for existing commercial tools to extract and restore deleted files. In an actual forensic investigation, when deleted files become unrecoverable, important clues may be missed, making it difficult to identify the culprit. Accordingly, a framework for extracting and recovering files based on The Sleuth Kit (TSK) is proposed by deriving the metadata changed in Ext4 file system journal checksum v3 and XFS file system v5. Thereafter, by comparing the accuracy and recovery rate of the proposed framework with existing commercial tools using the experimental dataset, we conclude that sustained research on file systems should be conducted from the perspective of forensics.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Sign in / Sign up

Export Citation Format

Share Document