Abstract
The weakness of the security measures implemented on Internet of Things (IoT) devices, added to the sensitivity of the data that they handle, has created an attractive environment for cybercriminals to carry out attacks. This has caused a substantial increase in the number of cyberincidents, requiring the opening of digital investigations in order to shed light on what has occurred. However, the characteristics of this new environment, such as its variety of contexts, make it impossible to use the methodology followed until now in conventional analysis. Therefore, a new common procedure is needed to ensure that IoT examinations are carried out in a complete and efficient manner. In this article, after reviewing the methodological requirements of IoT forensics, and studying the suggestions made by the research community, a methodology to perform investigations in a certain context of the IoT environment is proposed. In addition, its practicality is evaluated in three different security incident scenarios, proving its effectiveness and appropriateness to be used in future cases.



















Similar content being viewed by others
Notes
The output of the “mount” command has been cropped in order to reduce the size of the image, only showing the most relevant partitions in the system.
The output of the “mount” command has been cropped in order to reduce the size of the image, only showing the most relevant partitions in the system.
The IP addresses shown in the image that were used to download the bash files were no longer operative when the case study was carried out, so in order to execute them, the addresses were replaced by local ones.
References
Lueth, K.L.: Why it is called Internet of Things: definition, history, disambiguation. https://iot-analytics.com/internet-of-things-definition/. Accessed 18 Mar 2020
Postel, J., Reynolds, J.K.: Telnet protocol specification. https://tools.ietf.org/html/rfc854. Library Catalog: tools.ietf.org. Accessed 18 Mar 2020
Ylonen, T., Lonvick, C.: The secure shell (SSH) authentication protocol. https://tools.ietf.org/html/rfc4252. Library Catalog: tools.ietf.org. Accessed 18 Mar 2020
Demeter, D., Preuss, M., Shmelev, Y.: IoT: a malware story—securelist. https://securelist.com/iot-a-malware-story/94451/. Accessed 18 Mar 2020
Lueth, K.L.: State of the IoT 2018: number of IoT devices now at 7B. Market accelerating - IoT Analytics. https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b/. Accessed 18 Mar 2020
Scully, P.: The top 10 IoT segments in 2018 based on 1,600 real IoT projects—IoT analytics. https://iot-analytics.com/top-10-iot-segments-2018-real-iot-projects/. Accessed 18 Mar 2020
Gartner Inc. Gartner says 8.4 billion connected “Tthings” will be in use in 2017, up 31 percent from 2016. https://www.gartner.com/en/newsroom/press-releases/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016. Accessed 4 Mar 2020
Yusoff, Y., Ismail, R., Hassan, Z.: Int. J. Comput. Sci. Inf. Technol. 3 (2011). https://doi.org/10.5121/ijcsit.2011.3302
Brezinski, D., Killalea, T.: RFC 3227: guidelines for evidence collection and archiving. https://www.ietf.org/rfc/rfc3227.txt. Accessed 13 Mar 2020
International Organization for Standardization. ISO: ISO/IEC 27037:2012—information technology—security techniques—guidelines for identification, collection, acquisition and preservation of digital evidence. https://www.iso.org/standard/44381.html?browse=tc. Accessed 2 Apr 2020
International Organization for Standardization. ISO: ISO/IEC 27041:2015—information technology—security techniques—guidance on assuring suitability and adequacy of incident investigative method. https://www.iso.org/standard/44405.html?browse=tc. Accessed 2 Apr 2020
International Organization for Standardization. ISO: ISO/IEC 27042:2015—information technology—security techniques—guidelines for the analysis and interpretation of digital evidence. https://www.iso.org/standard/44406.html?browse=tc. Accessed 2 Apr 2020
International Organization for Standardization. ISO: ISO/IEC 27043:2015—information technology—security techniques—incident investigation principles and processes. https://www.iso.org/standard/44407.html?browse=tc. Accessed 2 Apr 2020
International Organization for Standardization. ISO: ISO/IEC 27050-1:2016—information technology—security techniques—electronic discovery—part 1: overview and concepts. https://www.iso.org/standard/63081.html. Accessed 2 Apr 2020
Du, X., Le-Khac, N., Scanlon, M.: CoRR (2017). arXiv:1708.01730
Oriwoh, E., Jazani, D., Epiphaniou, G., Sant, P.: In: 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 608–615 (2013)
Lillis, D., Becker, B., O’Sullivan, T., Scanlon, M.: CoRR (2016). arXiv:1604.03850
Yaqoob, I., Hashem, I.A.T., Ahmed, A., Kazmi, S.A., Hong, C.S.: Future Gener. Comput. Syst. 92, 265 (2019). https://doi.org/10.1016/j.future.2018.09.058. http://www.sciencedirect.com/science/article/pii/S0167739X18315644
Hou, J., Li, Y., Yu, J., Shi, W.: IEEE Internet Things J. 7(1), 1 (2020)
Nieto, A., Rios, R., Lopez, J.: In: 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 626–633 (2017). https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.293
Perumal, S., Norwawi, N.M., Raman, V.: In: 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 19–23 (2015). https://doi.org/10.1109/ICDIPC.2015.7323000
Kebande, V.R., Ray, I.: In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 356–362 (2016). https://doi.org/10.1109/FiCloud.2016.57
Zawoad, S., Hasan, R.: In: 2015 IEEE International Conference on Services Computing, pp. 279–284 (2015). https://doi.org/10.1109/SCC.2015.46
Goudbeek, A., Choo, K.K.R., Le-Khac, N.A.: pp. 1446–1451 (2018).https://doi.org/10.1109/TrustCom/BigDataSE.2018.00201
Al-Sadi, M.B., Chen, L., Haddad, R.J.: In: SoutheastCon 2018, pp. 1–5 (2018). https://doi.org/10.1109/SECON.2018.8479042
Carrier, Brian: Sleuthkit.org. Autopsy—The Sleuth Kit. http://www.sleuthkit.org/autopsy/. Accessed 6 Apr 2020
Wireshark Foundation. Wireshark.org. Wireshark—network protocol analyzer. https://www.wireshark.org/. Accessed 6 Apr 2020
Voncken, Guy.: Guymager.net. Guymager free forensic imager. http://guymager.sourceforge.net/. Accessed 6 Apr 2020
Costa, G., De Franceschi, A.: Xplico.org. Xplico—open source network forensic analysis tool (NFAT). http://www.xplico.org/. Accessed 6 Apr 2020
Oriwoh, E., Sant, P.: In: 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, pp. 544–550 (2013).https://doi.org/10.1109/UIC-ATC.2013.71
Jo, W., Shin, Y., Kim, H., Yoo, D., Kim, D., Kang, C., Jin, J., Oh, J., Na, B., Shon, T.: Digit. Invest. 29, S80 (2019). https://doi.org/10.1016/j.diin.2019.04.013. http://www.sciencedirect.com/science/article/pii/S1742287619301628
Baggili, I., Oduro, J., Anthony, K., Breitinger, F., McGee, G.: In: 2015 10th International Conference on Availability, Reliability and Security, pp. 303–311 (2015). https://doi.org/10.1109/ARES.2015.39
Chung, H., Park, J., Lee, S.: Digit. Invest. 22, S15 (2017).https://doi.org/10.1016/j.diin.2017.06.010. http://www.sciencedirect.com/science/article/pii/S1742287617301974
Castelo Gómez, J.M., Roldán Gómez, J., Carrillo Mondéjar, J., Martínez Martínez, J.L.: Entropy 21(12) (2019). https://doi.org/10.3390/e21121141. https://www.mdpi.com/1099-4300/21/12/1141
Windows Dev Center. Overview of Windows 10 IoT Core—Windows IoT-Microsoft Docs. https://docs.microsoft.com/es-es/windows/iot-core/windows-iot-core. Accessed 20 Mar 2020
Android Developers. Android Things. https://developer.android.com/things. Accessed 20 Mar 2020
Canonical Group. Ubuntu Core—Ubuntu. https://ubuntu.com/core. Accessed 20 Mar 2020
Smith, D.: Android developers blog: an update on Android Things. https://android-developers.googleblog.com/2019/02/an-update-on-android-things.html. Accessed 20 Mar 2020
OpenWrt Project: Welcome to the OpenWrt Project. https://openwrt.org/. Accessed 20 Mar 2020
Le-Khac, N.A., Jacobs, D., Nijhoff, J., Bertens, K., Choo, K.K.R.: Future Gener. Comput. Syst. (2018). https://doi.org/10.1016/j.future.2018.05.081. http://www.sciencedirect.com/science/article/pii/S0167739X17322422
Badenhop, C.W., Ramsey, B.W., Mullins, B.E., Mailloux, L.O.: Digit. Invest. 17, 14 (2016). https://doi.org/10.1016/j.diin.2016.02.002. http://www.sciencedirect.com/science/article/pii/S1742287616300214
Wurm, J., Hoang, K., Arias, O., Sadeghi, A., Jin, Y.: In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 519–524 (2016). https://doi.org/10.1109/ASPDAC.2016.7428064
Elstner, J., Roeloffs, M.: Digit. Invest. 16, 29 (2016). https://doi.org/10.1016/j.diin.2016.01.016. http://www.sciencedirect.com/science/article/pii/S174228761630010X
Computer Hope. Computerhope.com. Linux and Unix dd Command. http://www.computerhope.com/unix/dd.htm. Accessed 6 Apr 2020
Google Developers. Android Debug Bridge—Android Developers. https://developer.android.com/studio/command-line/adb?hl=es-419. Accessed 6 Apr 2020
The GNU Netcat—Official homepage. http://netcat.sourceforge.net/. Accessed 20 Mar 2020
Rob Landley. What is toybox? http://landley.net/toybox/about.html. Accessed 20 Mar 2020
AccessData Corp. Forensic Toolkit (FTK). Using command line imager. https://accessdata.com/product-download. Accessed 20 Mar 2020
CGSecurity. CGSecurity.org. PhotoRec ES—CGSecurity. http://www.cgsecurity.org/wiki/PhotoRec_ES. Accessed 20 Mar 2020
United States Air Force Office of Special Investigations. Foremost.org. Foremost—recovery tool. http://foremost.sourceforge.net/. Accessed 20 Mar 2020
Metz, Joachim.: Github.com. Log2timeline Supertimeline Tool. https://github.com/log2timeline/plaso. Accessed 20 Mar 2020
Phil Harvey. ExifTool by Phil Harvey. Read, write and edit meta information. https://www.sno.phy.queensu.ca/~phil/exiftool/. Accessed 20 Mar 2020
Zimmerman, Eric.: Github.com. Eric Zimmerman’s tools. https://ericzimmerman.github.io/. Accessed 20 Mar 2020
Zimmerman, Eric.: Kroll artifact parser and extractor—KAPE. https://www.kroll.com/en/insights/publications/cyber/kroll-artifact-parser-extractor-kape. Accessed 20 Mar 2020
Windows Hardware Dev Center. Install Windows configuration designer (Windows 10)—configure Windows. https://docs.microsoft.com/en-us/windows/configuration/provisioning-packages/provisioning-install-icd. Accessed 27 Aug 2020
Windows Hardware Dev Center. Windows 10 IoT Core recovery. https://docs.microsoft.com/en-us/windows-hardware/service/iot/recovery. Accessed 27 Aug 2020
Cloud Computing Services | Microsoft Azure. https://azure.microsoft.com/en-gb/. Accessed 27 Aug 2020
Windows Hardware Dev Center. Windows 10 IoT Core reset. https://docs.microsoft.com/en-us/windows-hardware/service/iot/reset. Accessed 27 Aug 2020
Ubuntu IoT Developer Documentation | Ubuntu for IoT developers documentation. https://core.docs.ubuntu.com/en/image/custom-images. Accessed 28 Aug 2020
Snapcraft IO. Snapshots | Snapcraft documentation. https://snapcraft.io/docs/snapshots. Accessed 27 Aug 2020
Android Developers. Create an Android Things product. https://developer.android.com/things/console/create. Accessed 27 Aug 2020
Android Developers. Manually flash Android Things. https://developer.android.com/things/hardware/fastboot. Accessed 27 Aug 2020
Raspberry Pi Foundation. Buy a Raspberry Pi 3 Model B Raspberry Pi. https://www.raspberrypi.org/products/raspberry-pi-3-model-b/. Accessed 19 Apr 2020
Intel Corporation. Introduction to Intel Galileo Boards. https://www.intel.co.uk/content/www/uk/en/support/articles/000005912/boards-and-kits/intel-galileo-boards.html. Accessed 19 Apr 2020
Bassetti, N.: CAINE Live USB/DVD—computer forensics digital forensics. https://www.caine-live.net/. Accessed 19 Apr 2020
BionicBeaver/ReleaseNotes—Ubuntu Wiki. https://wiki.ubuntu.com/BionicBeaver/ReleaseNotes. Accessed 20 Mar 2020
Shinotsuka, H.: Linux.Dofloo—Symantec. https://www.symantec.com/security-center/writeup/2015-070812-0012-99. Accessed 27 Apr 2020
Funding
This research was supported by the University of Castilla La Mancha under the contract 2018-PREDUCLM-7476 and the Project 2020-GRIN-28846, by the Spanish Ministry of Science and Innovation under Grants FPU 17/03105 and FPU 17/02007, by the Spanish Ministry of Economic Affairs and Digital Transformation under the Project RTI2018-098156-B-C52 and by the Regional Government of Castilla-La Mancha under the Project SBPLY/17/180501/000353.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Availability of data and material
Not applicable.
Code availability
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Castelo Gómez, J.M., Carrillo Mondéjar, J., Roldán Gómez, J. et al. A context-centered methodology for IoT forensic investigations. Int. J. Inf. Secur. 20, 647–673 (2021). https://doi.org/10.1007/s10207-020-00523-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-020-00523-6