logo

Investigation Internet of Things (IoT) Device using Integrated Digital Forensics Investigation Framework (IDFIF)

8 Pages2846 Words482 Views
   

Added on  2021-09-30

About This Document

This paper discusses the investigation of network forensic attacks on the Internet of Things (IoT) devices using the Integrated Digital Forensics Investigation Framework (IDFIF) method. It covers the methodology, scenario of attack IoT device, and the results of the investigation.

Investigation Internet of Things (IoT) Device using Integrated Digital Forensics Investigation Framework (IDFIF)

   Added on 2021-09-30

ShareRelated Documents
Journal of Physics: Conference Series
PAPER • OPEN ACCESS
Investigation Internet of Things (IoT) Device using
Integrated Digital Forensics Investigation
Framework (IDFIF)
To cite this article: Randi Rizal and Missi Hikmatyar 2019 J. Phys.: Conf. Ser. 1179 012140

View the article online for updates and enhancements.
Recent citations
IoT Open-Source Architecture for the
Maintenance of Building Facilities
Valentina Villa et al
-
This content was downloaded from IP address 197.159.135.157 on 07/09/2021 at 16:25
Investigation Internet of Things (IoT) Device using Integrated Digital Forensics Investigation Framework (IDFIF)_1
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd
ICCOMSET 2018
IOP Conf. Series: Journal of Physics: Conf. Series 1179 (2019) 012140
IOP Publishing
doi:10.1088/1742-6596/1179/1/012140
1






Investigation Internet of Things (IoT) Device using Integrated
Digital Forensics Investigation Framework (IDFIF)
Randi Rizal 1, Missi Hikmatyar1
1Department of Informatics, Universitas Perjuangan, Tasikmalaya, Indonesia


*randirizal@unper.ac.id1

Abstract. The Internet of Things (IoT) in the Industrial Revolution 4.0 refers to networks of
objects, objects, or devices that are connected on a large scale connected to the Internet. These
objects, become smart, feel the environment and collect and exchange data with other objects.
Devices on the internet of things are interconnected with other devices for the purpose of
securely exchanging data. This new technology appears in various fields of human life.
Therefore there are many new challenges for forensic investigators in finding digital evidence
on these IoT devices. A digital forensic researcher will face many challenges to gather
evidence from infected components on an Internet of Things (IoT) device and also face
difficulties in analyzing the evidence. In this study, there will be an investigation of network
forensic attacks on the Internet of Things (IoT) devices using the IDFIF method.

1. Introduction
The current progress of digitalization and Internet connectivity, more leads to the development of new
designs and prototypes that are full of creativity, namely the Internet of Things (IoT). Internet of
Things (IoT) is a long-term investment by converting objects from traditional to intelligent by utilizing
the basic technology that processes the Machine-to-Machine (M2M) and Radio Frequency
Identification (RFID) devices [1]. The main goal in the use of Internet of Things (IoT) is to exchange
data between devices and applications safely. In recent years the Internet of Things (IoT) has become
very popular and implemented in various fields of life. A growing number of devices that are
connected to the internet include many different capabilities [2]. Internet of Things (IoT) include
personal computers, laptops, smartphones, tablets and other devices [4]. These devices are
interconnected and share the same network to communicate with each other. All of these devices are
connected to the internet with various conditions to analyze the situation and work accordingly.
Connected devices are also programmed to make decisions automatically or properly inform users so
that users can make the best decisions. The network between various connected devices can bring
many advancements in application technology and services that can benefit development in various
fields of human needs, one of which is in the business field. Many devices are connected to the
internet to share local information with cyberspace. Some IoT elements such as RFID (Radio
Frequency Identification), WSN (Wireless Sensor Network), WPAN (Wireless Personal Area
Network), WBAN (Wireless Body Area Network), HAN (Home Area Network), NAN (Neighborhood
Area Network), M2M ( Machine to Machine), CC (Cloud Computing), and DC (Data Center) have
influence in life such as the IoT sensing process. According to analysis reports, many devices
connected to the Internet of Things (IoT) attract hackers to solve network security mechanisms in the
Internet of Things (IoT) device [3]. To investigate such attacks, it is necessary to apply the parameters
Investigation Internet of Things (IoT) Device using Integrated Digital Forensics Investigation Framework (IDFIF)_2
ICCOMSET 2018
IOP Conf. Series: Journal of Physics: Conf. Series 1179 (2019) 012140
IOP Publishing
doi:10.1088/1742-6596/1179/1/012140
2






of the digital forensic Internet of Things (IoT) parameter [5] called Forensic IoT [1]. Digital forensic
investigations on the Internet of Things (IoT) devices are very challenging and diverse, traditional
forensic models do not fit into the current Internet of Things (IoT) environment. many large devices
will also bring new challenges to data and network management. A number of Internet of Things (IoT)
devices will generate large data making it difficult for researchers to analyze data [6].
2. Methodology
2.1. Arduino Bluetooth Configuration Scheme
Preparing the Arduino package which is the main package needed in the system, the package used is
the Arduino driver package that can be installed directly. The Arduino configuration with Bluetooth
Hc-05.

Figure 1. Bluetooth Arduino Configuration Scheme with

Some configurations on Arduino connect Arduino to a computer, carrying out serial communication
such as sending and receiving sensor data via a serial terminal on the Arduino IDE via the USB
Connector. Power Jack: Input voltage to activate Arduino, IC ATMEGA 328p: ATMel
microcontroller IC with Arduino bootloader. Digital I/O is used for digital input and output, at pin
3,5,6,9,10,11 has a sign (~) which indicates that the pin other than having Digital I / O facilities also
has PWM (Pulse Width) Modulation) the output value range is 8 bits or an equivalent value between
0-255. Next is Analog Input which is used for sensor data input, potentiometer, and other analog input
devices. Then Power is used to take the power of 5V, 3.3V, GND.
Configuration is also done on Bluetooth HC-05 devices. When configuring Bluetooth, the Bluetooth
position is not associated with an Arduino device that uses wireless. The default Bluetooth setting is
Baudrate: 9600bps, Name Bray with Code: 1234. Any changes to the above configuration will be
saved even when the power is turned off. All commands sent to Bluetooth do not have to be newline
characters. Furthermore, the procedure to do that Bluetooth configuration is to connect Bluetooth to
the PC, the LED must blink, open the Arduino IDE software, select the correct COM port that is
connected to Bluetooth.
2.2. Scenario of Attack IoT Device
Stage of scenario attacks on the Internet of Things (IoT) devices to implement network forensics on
the Internet of Things (IoT) devices. System simulation aims to conduct Bluetooth forensic testing of
the Internet of Things (IoT) network of devices in detecting attacks. Simulation is done using the
LOIC tool used to detect attacks. Training starts with sending IP packets on the target and the port will
be attacked. The following is an example of an attack system simulation against an Internet of Things
(IoT) device:
Investigation Internet of Things (IoT) Device using Integrated Digital Forensics Investigation Framework (IDFIF)_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IFN643 Ransomware Removal Report
|11
|1954
|42

Computing Technology TABLE OF CONTENTS ACTIVITY 2.11 INTERNET OF THINGS (IoT)
|7
|1505
|91

Overview of Network Security in Internet of Things
|4
|2832
|54

Technology Driven Strategies for IoT
|10
|3250
|89

Analyzing The Security Challenges of IoT Devices
|12
|4267
|74