logo

Digital Forensics in Mobile Devices

   

Added on  2023-01-23

25 Pages4299 Words83 Views
1
[Title Here, up to 12 Words, on One to Two Lines]
[Author Name(s), First M. Last, Omit Titles and Degrees]
[Institutional Affiliation(s)]
Author Note
[Include any grant/funding information and a complete correspondence address.]

2
Digital Forensics in IoT
Introduction
IoT and WSN(Wireless Sensor Networks) have increased in their use cases from the traditional
military usage to more commercial uses. Some IoT devices have been adopted for monitoring of
the environment especially health, agriculture, and other applications. In a typical WSN sensor
are deployed act as gateways for application data processing capabilities. Much interest has been
drawn to the security issues within the IoT world since they have been reported misusing by
adversaries with little ability to have the offenders comprehended. The amount of data being
processed by the IoT devices is enormous thanks to the advancement in technology. This has
been a challenge for digital forensic experts who find it difficult to have the forensic
investigators uses the available tools to process data from IoT devices. This research paper
attempts to provide a framework that can be utilized to have the investigators reduce the amount
of data processing scope by narrowing down to the critical data segments.
background
The evolution of the IoT world is due to the increasing advancements in the microsensors used to
drive the IoT world. To be more specific, the advancement in micro memory, microprocessors,
and micro-sensing technology have made it possible to have numerous IoT devices. The IoT era
has changed the needs to have security improved on these devices. This lack of proper security

3
has led to several reported attacks on the IoT devices and ironically, the digital forensic experts
have been unable to recover the identity of the attackers in most of these instances. This has led
to the researcher coming up with a framework that can be used to aid the investigator's recovered
data from these IoT objects of cyber attacks. Despite numerous attempts, no particular study has
overcome the enormous need to process the data for digital forensic purposes.
This paper proposes a model that can be adapted to efficiently reduce the enormous data to be
processed by use of selective algorithms to have critical data to be analyzed by the investigators.
Methodology
The research paper followed the quantitative research design where the current algorithms were
analyzed in terms of performance and each model was quantitatively analyzed using statistical
methods to have a better understanding on how the investigators have trouble using some of this
tools (Birkel & Hartmann, 2019). This followed the design of the proposed model which undergo
several tests and each test was used as a benchmark against the performance of the current tool in
the given environment. The results were analyzed by the statistical methods and presented to
have a clear performance outlook of the proposed model. The result clearly shows the model
performance relatively efficient due to the use of data selection algorithm which reduces the
scope of data uses in the forensic investigation (Nieto, Rios, & Lopez, 2018)
Conclusion
In conclusion, it is seen that despite the increasing developments in the prior technology which
has led to the advent of IoT devices, the security frameworks behind this technology are still at
the infancy stage and this has led to several lawsuits involving security violations by this IoT
devices. Forensic experts have problems recovering data from these devices due to the enormous

4
data being processed by these sensors hence making it inefficient to reliable rely on the outcome
hence not easily admissible in lawsuits. The research has proposed a better model that can
leverage on the data selection algorithm which reduces the scope of data to be processed by the
forensic tools increasing efficiency exponentially
Future works
Future enhancement onto the work included the automation of the selection processed of the IoT
devices. This provides a more efficient approach to improving the working of the algorithm

5
[Title Here, up to 12 Words, on One to Two Lines]
[Author Name(s), First M. Last, Omit Titles and Degrees]
[Institutional Affiliation(s)]
Author Note
[Include any grant/funding information and a complete correspondence address.]

6
Digital Forensics in IoT
Introduction
IoT technology has quickly experienced advancement due to the continued networking of
Internet-enabled devices. The devices interact with each using microsensors on a daily basis,
creating the concept of smart environments. These environments have improved the quality of
life of the different individuals who handle these new data sets.
Despite these enormous advantages that come with the IoT devices, the solutions do does not
have solid means to enable forensic analysis. There is the limitation of resources needed and the
current cloud-based IoT architecture has made it very challenging to have data stored on these
IoT devices for purposes of forensic analysis.
This paper introduces IoTDots, which is a unique digital forensic framework design purposefully
for the IoT smart environments
background
The advent of micro memory, microprocessor, and microsensors saw the birth of IoT devices
which has revolutionized the smart office and smart homes environments. This is due to the
increasing interconnection of the devices which communicate with each other using

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Forensics in IoT
|48
|1058
|52

Investigation Internet of Things (IoT) Device using Integrated Digital Forensics Investigation Framework (IDFIF)
|8
|2846
|482

Analyzing The Security Challenges of IoT Devices
|12
|4267
|74

Assignment about Data Forensics
|6
|1137
|27

IFN643 Ransomware Removal Report
|11
|1954
|42

(PDF) Research Methods in Computing
|26
|6517
|161