ABSTRACT
Users utilize IoT devices and sensors in a co-operative manner to enable the concept of a smart environment. This integration generate data with high forensic value. Nonetheless, current smart app programming platforms do not provide any digital forensics capability to identify, trace, store, and analyze the data produced in these settings. To overcome these limitations, in this poster, we present our ongoing work to introduce a novel digital forensic framework for a smart environment.
- H. Aksu, L. Babun, M. Conti, G. Tolomei, and A. S. Uluagac. 2018. Advertising in the IoT Era: Vision and Challenges. IEEE Communications Magazine (2018), 1--7.Google Scholar
- Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A. Selcuk Uluagac. 2018. Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD. https://www.usenix.org/conference/usenixsecurity18/presentation/celik Google ScholarDigital Library
- Sudhir Chitnis, Neha Deshpande, and Arvind Shaligram. 2016. An investigative study for smart home security: Issues, challenges and countermeasures. Wireless Sensor Network (2016), 61.Google Scholar
- Malware found in surveillance cameras sold through Amazon. 2017. https://www.techworm.net/2016/04/malware-found-surveillance-cameras-sold-amazon.html. {Online; accessed 10-January-2018}.Google Scholar
- Sukhvir Notra, Muhammad Siddiqi, Hassan Habibi Gharakheili, Vijay Sivaraman, and Roksana Boreli. 2014. An experimental study of security and privacy risks with emerging household appliances. In Communications and Network Security (CNS), 2014 IEEE Conference on. IEEE, 79--84.Google ScholarCross Ref
- SaINT Project, L. Babun, Z. Berkay Celik and A. Kumar Sikder. {n. d.}. http://saint-project.appspot.com/. {Online; accessed August-2018}.Google Scholar
- Amit Kumar Sikder, Hidayet Aksu, and A. Selcuk Uluagac. 2017. 6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices. In USENIX Security. Google ScholarDigital Library
- SmartThings Logging, Matt J Frank. {n. d.}. https://github.com/krlaframboise/SmartThings/blob/\master/smartapps/krlaframboise/simple-event-logger.src/simple-event-logger.groovy. {Online; accessed May-2018}.Google Scholar
- Biljana L Risteska Stojkoska and Kire V Trivodaliev. 2017. A review of Internet of Things for smart home: Challenges and solutions. Journal of Cleaner Production 140 (2017), 1454--1464.Google ScholarCross Ref
Recommendations
Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT)
ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and SecurityBesides its enormous benefits to the industry and community the Internet of Things (IoT) has introduced unique security challenges to its enablers and adopters. As the trend in cybersecurity threats continue to grow, it is likely to influence IoT ...
Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National Level
SADFE '10: Proceedings of the 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic EngineeringAbstract: Revolution in Internet and ease in use of latest technology is significantly increasing the use of latest technology worldwide, day by day. Advancement in digital devices such as computers and cell phones also helped the people to work both ...
Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models
Digital technology for transferring and controlling data has made substantial advances in recent years. It is important to protect innovations and to curb the copyright infringements in computer-based systems. Copyright is a legal framework of basic ...
Comments