Skip to main content

IoT Digital Forensics Readiness in the Edge: A Roadmap for Acquiring Digital Evidences from Intelligent Smart Applications

  • Conference paper
  • First Online:
Edge Computing – EDGE 2020 (EDGE 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12407))

Included in the following conference series:

Abstract

Entering the era of the Internet of Things, the traditional Computer Forensics is no longer as trivial as decades ago with a rather limited pool of possible computer components. It has been demonstrated recently how the complexity and advancement of IoT are being used by malicious actors attack digital and physical infrastructures and systems. The investigative methodology, therefore, faces multiple challenges related to the fact that billions of interconnected devices generate tiny pieces of data that easily comprehend the Big Data paradigm. As a result, Computer Forensics is no longer a simple methodology of the straightforward process. In this paper, we study the complexity and readiness of community-accepted devices in a smart application towards assistance in criminal investigations. In particular, we present a clear methodology and involved tools related to Smart Applications. Relevant artefacts are discussed and analysed using the prism of the Digital Forensics Process. This research contributes towards increased awareness of the IoT Forensics in the Edge, corresponding challenges and opportunities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://playground.arduino.cc/Code/Time/.

  2. 2.

    https://docs.kali.org/general-use/kali-linux-forensics-mode.

  3. 3.

    http://robotics.hobbizine.com/arduinoann.html.

  4. 4.

    Joint Test Action Group standard.

  5. 5.

    In System Programmer.

  6. 6.

    Universal Asynchronous Receiver/Transmitter serial convertor.

  7. 7.

    https://www.sans.org/reading-room/whitepapers/tools/ettercap-primer-1406.

  8. 8.

    https://www.nongnu.org/avrdude/.

  9. 9.

    https://www.sleuthkit.org/.

  10. 10.

    https://rada.re/n/.

References

  1. The application of reverse engineering techniques against the Arduino microcontroller to acquire uploaded applications (2014). Accessed 19 Nov 2019

    Google Scholar 

  2. Ahlberg, F.: esptool (2020). https://github.com/espressif/esptool. Accessed 29 May 2020

  3. Alenezi, A., Atlam, H., Alsagri, R., Alassafi, M., Wills, G.: IoT forensics: a state-of-the-art review, challenges and future directions. In: Proceedings of the 4th International Conference on Complexity, Future Information Systems and Risk (2019)

    Google Scholar 

  4. Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th USENIX Security Symposium, pp. 1093–1110 (2017)

    Google Scholar 

  5. Damshenas, M., Dehghantanha, A., Mahmoud, R., bin Shamsuddin, S.: Forensics investigation challenges in cloud computing environments. In: Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 190–194. IEEE (2012)

    Google Scholar 

  6. Delicato, F.C., Pires, P.F., Batista, T., Cavalcante, E., Costa, B., Barros, T.: Towards an IoT ecosystem. In: Proceedings of the First International Workshop on Software Engineering for Systems-of-Systems, pp. 25–28. ACM (2013)

    Google Scholar 

  7. Dengler, S., Awad, A., Dressler, F.: Sensor/actuator networks in smart homes for supporting elderly and handicapped people. In: 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 2007), vol. 2, pp. 863–868. IEEE (2007)

    Google Scholar 

  8. Ericsson: Internet of things forecast (2019). https://www.ericsson.com/en/mobility-report/internet-of-things-forecast. Accessed 04 Oct 2019

  9. Esposito, C., Castiglione, A., Pop, F., Choo, K.K.R.: Challenges of connecting edge and cloud computing: a security and forensic perspective. IEEE Cloud Comput. 4(2), 13–17 (2017)

    Article  Google Scholar 

  10. Espressif: Esp32-wroom-32d (2019). https://www.espressif.com/sites/default/files/documentation/esp32-wroom-32d_esp32-wroom-32u_datasheet_en.pdf. Accessed 29 May 2020

  11. Goudbeek, A., Choo, K.K.R., Le-Khac, N.A.: A forensic investigation framework for smart home environment. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 1446–1451. IEEE (2018)

    Google Scholar 

  12. Grance, T., Chevalier, S., Scarfone, K.K., Dang, H.: Guide to integrating forensic techniques into incident response. Technical report (2006)

    Google Scholar 

  13. Hegarty, R., Lamb, D.J., Attwood, A.: Digital evidence challenges in the internet of things. In: INC, pp. 163–172 (2014)

    Google Scholar 

  14. Koen, R., Olivier, M.S.: The use of file timestamps in digital forensics. In: ISSA, pp. 1–16. Citeseer (2008)

    Google Scholar 

  15. Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)

    Article  Google Scholar 

  16. Kononenko, I., Kukar, M.: Machine Learning and Data Mining: Introduction to Principles and Algorithms. Horwood Publishing Limited (2007)

    Google Scholar 

  17. Lillis, D., Becker, B., O’Sullivan, T., Scanlon, M.: Current challenges and future research areas for digital forensic investigation. arXiv (2016)

    Google Scholar 

  18. Oriwoh, E., Jazani, D., Epiphaniou, G., Sant, P.: Internet of things forensics: challenges and approaches. In: 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 608–615. IEEE (2013)

    Google Scholar 

  19. Perumal, S., Norwawi, N.M., Raman, V.: Internet of things (IoT) digital forensic investigation model: top-down forensic approach methodology. In: 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 19–23. IEEE (2015)

    Google Scholar 

  20. Pollitt, M.: A history of digital forensics. In: Chow, K.-P., Shenoi, S. (eds.) DigitalForensics 2010. IFIP AICT, vol. 337, pp. 3–15. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15506-2_1

    Chapter  Google Scholar 

  21. Pomeranz, H.: Linux forensics (for non-linux folks). http://www.deer-run.com/~hal/LinuxForensicsForNon-LinuxFolks.pdf. Accessed 21 Nov 2019

  22. Postscapes: IoT standards and protocols (2019). https://www.postscapes.com/internet-of-things-protocols/. Accessed 04 Oct 2019

  23. Sadeghi, A., Wachsmann, C., Waidner, M.: Security and privacy challenges in industrial internet of things. In: 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1–6, June 2015

    Google Scholar 

  24. Satyanarayanan, M.: The emergence of edge computing. Computer 50(1), 30–39 (2017)

    Article  Google Scholar 

  25. Schatsky, D., Kumar, N., Bumb, S.: Intelligent IoT: Bringing the power of AI to the internet of things (2017)

    Google Scholar 

  26. Shalaginov, A.: Soft computing and hybrid intelligence for decision support in forensics science. In: IEEE Intelligence and Security Informatics, pp. 304–309 (2016)

    Google Scholar 

  27. Shalaginov, A.: Advancing Neuro-Fuzzy Algorithm for Automated Classification in Largescale Forensic and Cybercrime Investigations: Adaptive Machine Learning for Big Data Forensic. Ph.D. thesis, Norwegian University of Science and Technology (2018)

    Google Scholar 

  28. Shalaginov, A., Semeniuta, O., Alazab, M.: MEML: resource-aware MQTT-based machine learning for network attacks detection on IoT edge devices. In: Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion, pp. 123–128. ACM (2019)

    Google Scholar 

  29. Willis, C.: Forensics with linux 101 or how to do forensics for free (2003). https://www.blackhat.com/presentations/bh-usa-03/bh-us-03-willis-c/bh-us-03-willis.pdf. Accessed 21 Nov 2019

  30. Yusoff, Y., Ismail, R., Hassan, Z.: Common phases of computer forensics investigation models. Int. J. Comput. Sci. Inf. Technol. 3(3), 17–31 (2011)

    Google Scholar 

  31. Zulkipli, N.H.N., Alenezi, A., Wills, G.B.: IoT forensic: bridging the challenges in digital forensic and the internet of things. In: International Conference on Internet of Things, Big Data and Security, vol. 2, pp. 315–324. SCITEPRESS (2017)

    Google Scholar 

Download references

Acknowledgement

Authors would like to thank to the Department of Information Security and Communication Technology (IIK) at the Norwegian University of Science and Technology for support and funding of this contribution. Moreover, this research has received funding from the Swedish Civil Contingencies Agency (MSB) through the research center Resilient Information and Control Systems (RICS).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrii Shalaginov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shalaginov, A., Iqbal, A., Olegård, J. (2020). IoT Digital Forensics Readiness in the Edge: A Roadmap for Acquiring Digital Evidences from Intelligent Smart Applications. In: Katangur, A., Lin, SC., Wei, J., Yang, S., Zhang, LJ. (eds) Edge Computing – EDGE 2020. EDGE 2020. Lecture Notes in Computer Science(), vol 12407. Springer, Cham. https://doi.org/10.1007/978-3-030-59824-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59824-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59823-5

  • Online ISBN: 978-3-030-59824-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics