A Review of Prospects and Challenges of Internet of Things (original) (raw)

The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics

International Journal of Digital Crime and Forensics

The Internet of Things (IoT) represents the seamless merging of the real and digital world, with new devices created that store and pass around data. Processing large quantities of IoT data will proportionately increase workloads of data centres, leaving providers with new security, capacity, and analytics challenges. Handling this data conveniently is a critical challenge, as the overall application performance is highly dependent on the properties of the data management service. This article explores the challenges posed by cybercrime investigations and digital forensics concerning the shifting landscape of crime – the IoT and the evident investigative complexity – moving to the Internet of Anything (IoA)/Internet of Everything (IoE) era. IoT forensics requires a multi-faceted approach where evidence may be collected from a variety of sources such as sensor devices, communication devices, fridges, cars and drones, to smart swarms and intelligent buildings.

"Internet of Things - the argument for Smart Forensics", a Book Chapter in the 'Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance'

The Internet of Things (IoT), a metaphor for smart, functional Cyberphysical Environments (CPE) is finding some usefulness in various sectors including healthcare, security, transportation and the Smart Home (SH). Within the IoT, objects potentially operate autonomously to provide specified services and complete assigned tasks. However, the introduction of new technologies and/or the novel application of existing ones usually herald the discovery of unfamiliar security vulnerabilities which lead to exploits and sometimes to security breaches. There is existing research which identifies IoT-related security concerns and breaches. This chapter discusses existing Digital Forensics (DF) models and methodologies for their applicability (or not) within the IoT domain using the SH as a case in point. The chapter also makes the argument for Smart forensics, the use of a smart autonomous system (tagged the Forensics Edge Management System (FEMS)) to provide forensic services within the self-managed CPE of the SH.

The Opportunities and Challenges of Internet of Things Evidence in Regard to Criminal Investigations

2021

As internet-connected devices become more prevalent, the need for police and law enforcement to be able to utilize these devices when solving crimes steadily increases. Law enforcement agencies are already aware of the opportunities and challenges when interacting with computers and mobile cellular devices, but many agencies are unable to utilize these avenues of evidence because of limited access to resources able to forensically examine computing devices. In addition, the introduction of internet of things devices, such as Amazon Alexa and other microphone or camera connected devices, allows new opportunities for law enforcement agencies to gather digital forensic evidence either to convict a criminal or to solve a crime. This study will explore both the opportunities and challenges of using Internet of Things evidence for law enforcement purposes by analyzing Internet of Things legal cases as well as articles and research about the Internet of Things and digital evidence

A Review of Cyber-Crime in Internet of Things: Technologies, Investigation Methods and Digital Forensics

2016

The Internet of Things (IoT) is a novel design paradigm, which allows communication among different kinds of physical objects over the common Internet infrastructure. Operations and application models of the IoT, which differ from the traditional networks, have brought great challenges and opportunities to digital forensic technology. In this paper we analyse the state of cybercrime in the IoT, current methods and tools of digital forensics readiness and investigation and possibilities of their application for the investigation of cybercrime in the IoT.

Dfim: A New Digital Forensics Investigation Model for Internet of Things

2020

The Internet of Things (IoT) smart devices have been used widely in several applications such as healthcare, education, environment, transportation, smart city, etc. These objects are resource-constrained devices which involve lacks regarding security and may lead to cyber-crime. Therefore, the IoT devices may contain evidence that are considered as an important need to investigators and can be admitted in courts. To tackle this problem most current research focuses on security issues for different IoT architectures rather than approaches and techniques of forensic acquisition and analysis for IoT objects. In this paper, we propose a new Digital Forensics Investigation Model for IoT (DFIM). The DFIM has two main components: The Data Provider Zone (DPZ) which responsible for grouping all data gathered by sensor nodes into a set of groups, where each group contains data or documents related to each other, and the investigation authority which receives the requests from the claimers fo...

Secured Communication Using Advanced Digital Forensic IoT

Rasel Ahmed, 2021

The internet of things (IoT) brings the power of the internet, data processing, and analytics to the physical world. Consumers will be able to communicate with the global information network without the use of a keyboard or screen; many of their daily objects and equipment will be able to take instructions from the network with minimal human interference.Due to the widespread applicability of the Internet of Things (IoT), it is critical that IoT designers and architects provide ensuring protection of communication in IoT as a key requirement. Communication in IoT is a new field of study concerned with ensuring safe coordination between smart sensors, actuators, and computers, as well as the external world, which makes up the IoT's overarching arena.IoT architecture must provide several features such as scalability, reliability, usability, availability, and flexibility so that applications that support both public and private entities can be developed. A precise specification of security criteria, as well as various security measures that must be implemented, will be critical to the IoT's success.This paper uses an innovative digital forensic technique for security enhancement to provide an overview of security and privacy aspects of IoT communications. In the investigation of IoT security violations, the researchers face a variety of obstacles. The difficulties are amplified by the fact that cloud service providers use advanced strategies such as virtualization and a multi-tenant usage model to efficiently assign resources to users.The proposed technique, which uses an innovative digital forensic approach, outlines an improved, accessible, and accurate method for determining the source of the crime and collecting evidence related to a security breach during contact.

IoT Forensics: Challenges For The IoA Era

Challenges for IoT-based forensic investigations include the increasing amount of objects of forensic interest, relevance of identified and collected devices, blurry network boundaries, and edgeless networks. As we look ahead to a world of expanding ubiquitous computing, the challenge of forensic processes such as data acquisition (logical and physical) and extraction and analysis of data grows in this space. Containing an IoT breach is increasingly challenging – evidence is no longer restricted to a PC or mobile device, but can be found in vehicles, RFID cards, and smart devices. Through the combination of cloud-native forensics with client-side forensics (forensics for companion devices), we can study and develop the connection to support practical digital investigations and tackle emerging challenges in digital forensics. With the IoT bringing investigative complexity, this enhances challenges for the Internet of Anything (IoA) era. IoA brings anything and everything " online " in a connectedness that generates an explosion of connected devices, from fridges, cars and drones, to smart swarms, smart grids and intelligent buildings. Research to identify methods for performing IoT-based digital forensic analysis is essential. The long-term goal is the development of digital forensic standards that can be used as part of overall IoT and IoA security and aid IoT-based investigations.

The Value and Use of the Internet of Things During the Pre-trial Investigation of Criminal Offenses

Proceedings of the International Conference on Social Science, Psychology and Legal Regulation (SPL 2021), 2021

This article introduces the active dissemination and development of new social relations related to the Internet of Things. The concept of the Internet of Things (IoT) is seen as a growing network of facilities, from industrial devices to consumer goods and services that can share information and perform their tasks while working, relaxing or playing sports. The main problems of the Internet of Things include information security and protection of personal data. Internet of Things technologies significantly increase the risks of violating the confidentiality of personal data due to the fact that they involve the accumulation, circulation and use of a large, territorially and technologically distributed amount of information (data) about a particular person. This raises quite natural questions about the reliability of storage of such data and ensuring their protection against unauthorized use. The article also discusses the need to implement EU legal standards on personal data protection defined by EU legislation (Data

A Review on the Internet of Things (IoT) Forensics: Challenges, Techniques, and Evaluation of Digital Forensic Tools

Digital Forensics - Challenges and New Frontiers [Working Title]

Recently, the exponential growth of Internet of Things (IoT) network-connected devices has resulted in the exchange of large amounts of data via a smart grid. This extensive connection between IoT devices results in numerous security breaches and violations. Due to the increasing prevalence of IoT-related cybercrimes, forensic investigators and researchers face numerous obstacles when attempting to recover evidence from a variety of different types of IoT smart devices. The primary challenge in performing forensic analysis on the IoT is the heterogeneity of IoT devices. Additionally, the bulk of IoT devices has flash memory or limited memory, which makes generating and converting evidence for presenting forensic data in court problematic. This review paper presents several forensic methodologies, techniques, and challenges in IoT device forensics, a comprehensive review of prominent recent works, with an overview of tools that are frequently used for performing digital forensics inv...

Internet of Things Forensics: Challenges and Approaches

Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2013

The scope of this paper is two-fold: firstly it proposes the application of a 1-2-3 Zones approach to Internet of Things (IoT)-related Digital Forensics (DF) investigations. Secondly, it introduces a Next-Best-Thing Triage (NBT) Model for use in conjunction with the 1-2-3 Zones approach where necessary and vice versa. These two 'approaches' are essential for the DF process from an IoT perspective: the atypical nature of IoT sources of evidence (i.e. Objects of Forensic Interest -OOFI), the pervasiveness of the IoT environment and its other unique attributes -and the combination of these attributes -dictate the necessity for a systematic DF approach to incidents. The two approaches proposed are designed to serve as a beacon to incident responders, increasing the efficiency and effectiveness of their IoT-related investigations by maximizing the use of the available time and ensuring relevant evidence identification and acquisition. The approaches can also be applied in conjunction with existing, recognised DF models, methodologies and frameworks.