Abstract
With the advent of Internet of Things (IoT) and the rapid advancements in this area, it is predicted that there will be over ten billions wireless accessories linked to the world of internet. Such devices will serve as the foundations in the field of computer science, impacting the everyday course of life. These wireless devices will be capable of absorbing a huge number of personal and sensitive information to enhance the results. The IoT technology puts the collective data to good use by integrating different data sets together that generates amazing outcomes. This technology, however, poses significant challenges to certain agencies aiming to apply this system in their routine businesses. This paper further highlights various threats and challenges that the IoT presents in digital forensics and assists in the identification of important areas which should be modified in future. Finally, the paper highlights the lack of digital forensic education in Pakistan.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abdmeziem, R., Tandjaoui, D.: Internet of things: Concept. building blocks, applications and challenges, 1–17 (2014)
Adams, R., Hobbs, V., Mann, G.: The advanced data acquisition model (Adam): A process model for digital forensic practice. J. Digit. Forensics 8(4), 25–48 (2013)
Arafeen, Q., Arifeen, N., Ahmed, M.: Digital forensics education in Pakistan -a new way to understand the digital world. Int. J. Latest Res. Eng. Technol. (IJLRET) 2(4), 72–74 (2016)
Atamli, A.W., Martin, A.: Threat-based security analysis for the internet of things. In: Workshop on Secure Internet of Things, pp. 35–43
Avizienis, A., Laprie, J., et al.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secur. Comput. 1(1), 1–23 (2004)
Azhar, S., Hein, M., Sketo, B.: Building information modeling (bim): benefits, risks and challenges (2008). http://ascpro.ascweb.org/chair/paper/CPGT182002008.pdf
Azmat, Z.: Country’s first digital forensic science center opens at KU. The News International (2016). https://www.thenews.com.pk/print/136097-Countrys-first-digital-forensic-science-centre-opens-at-KU
Bennett, D.: The challenges facing computer forensics investigators in obtaining information from mobile devices for use in criminal investigations. Inf. Secur. J.: Glob. Perspect. 21(3), 159–168 (2012)
Buskirk, V., Liu, V.: Digital evidence: Challenging the presumption of reliability. J. Digit. Forensic Pract. 1(1), 19–26 (2006)
Chirgwin, R.: SPAM supposedly spotted leaving the fridge. The Register (2014). Retrieved from http://www.theregister.co.uk/2014/01/20/spam_spotted_leaving_the_fridge/
Chen, B.: Computer-forensics-in-criminal-investigations (2013). Retrieved from dartmouth.edu: https://sites.dartmouth.edu/dujs/2013/03/13/computer-forensics-in-criminal-investigations/
Cui, Q., Wang, Y. et al.: Big data analytics and network calculus enabling intelligent management of autonomous vehicles in a smart city. IEEE Internet Things J. 1 (2018)
Duranti, L., Endicott-Popovsky, B.: Digital records forensics: A new science and academic program for forensic readiness. J. Digit. Forensics, Secur. Law 5(2), 45–62 (2010)
Geers, K.: The cyber threat to national critical infrastructures: beyond theory. J. Digit. Forensic Pract. 3(2–4), 124–130 (2010)
Gogolin, G., Jones, J.: Law enforcement’s ability to deal with digital crime and the implications for business. J. Digit. Forensic Pract. 3(2–4), 131–139 (2010)
Garinkel, S.: Digital forensics research: The next 10 years. Digit. Investig. 7, 64–73 (2010)
Gil, D., Ferrandez, A., et al.: Internet of things: A review of surveys based on context aware intelligent services. Sensors 16(7), 1069 (2016)
Guo, H., Ren, J. et al.: A scalable and manageable IoT architecture based on transparent computing. J. Parallel Distrib. Comput. 111 (2017)
Haines, L.: Cops may check crash drivers’ mobile records ? The Register. The Register (2007). http://www.theregister.co.uk/2007/02/27/mobile_phone_proposal/
Islam, S., Kwak, D., et al.: The internet of things for health care: A comprehensive survey. IEEE Access 3, 678–708 (2015)
Iqbal, M., Olaleye, O., Bayoum, M.: A review on internet of things (IoT): Security and privacy requirements and the solution approaches. Glob. J. Comput. Sci. Technol.: E Netw., Web Secur. 16(7), 1–11 (2016)
Jazayeri, M., Liang, S., Huang, C.: Implementation and evaluation of four interoperable open standards for the internet of things. Sensors 15(9), 24343–24373 (2015)
Lillis, D., Becker, B. et al.: Current challenges and future research areas for digital forensic investigation. In: The 11th ADFSL Conference on Digital Forensics Security and Law (CDFSL) (2016)
Li, C.: Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, 1st edn, pp. 123–125. Idea Group Inc., Pennsylvania (2013)
McKemmish, R.: What is Forensic Computing? Trends and Issues in Crime and Criminal Justice, p. 118 (1999)
Miorandi, D., Sicari, S., et al.: Internet of things: Vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)
Mohay, G.: Technical challenges and directions for digital forensics. In: First International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 155– 161 (2005)
Mushtaque, K.: Digital forensic investigation models, an evolution study. J. Inf. Syst. Technol. Manag. 12(2), 233–243 (2015)
Naqvi, S., Dallons, G., Ponsard, C.: Applying digital forensics in the future internet enterprise systems. In: European SMEs’ Perspective, Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) (2016)
Oriwoh, E., Jazani, D. et al.: Internet of Things Forensics: Challenges and approaches. In: 2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing, vol. 2014, pp. 608–615 (2013)
Osborne, G., Slay, J.: Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence. In: Sixth International Conference on Availability, Reliability and Security (ARES), pp. 196–201. Vienna, Austria (2011)
Park, K., Park, J., et al.: Anti-forensic trace detection in digital forensic triage investigations. J. Digit. Forensics, Secur. Law 12(8), 31–40 (2017)
Pollitt, M., Nance, K., et al.: Virtualization and digital forensics: A research and education agenda. J. Digit. Forensic Pract. 2(2), 62–73 (2008)
Rahman, S., Bishop, M., Holt, A.: Internet of Things Mobility Forensics. In: Proceedings of the 2016 Information Security Research and Education (INSuRE) Conference (INSuRECon-16) (2016)
Reith, M., Carr, C., Gunsch, G.: An Examination of digital forensic model. Int. Digit. Evid. 1(3), 1–12 (2002)
Rose, K., Eldridge, S., Chapin, L.: The Internet of Things: An overview. Proc. Internet Soc. (ISOC), 1–53 (2015)
Sethi, P., Sarangi, S.: Internet of things: Architectures, protocols, and applications. J. Electr. Comput. Eng. 2017, 1–25 (2017)
Information Models, N., Salim, F., et al.: Physical access control administration using building information models. Cyberspace Saf. Secur. 7672, 236–250 (2012)
Shaikh, A.: Cyber-security-inside-pakistans-first-digital-forensic-research-lab (2016). Retrieved from Tribune: https://tribune.com.pk/story/1246290/cyber-security-inside-pakistans-first-digital-forensic-research-lab/
Sharif, S.: Assessing Forensic Science Landscape in Pakistan. MIT Technology Review Pakistan (2017). http://www.technologyreview.pk/assessing-forensic-science-landscape-pakistan/
Slay, J., Lin, Y., et al.: Advances in Digital Forensics V: Chapter 3: Towards a Formalization of Digital Forensics, 5th edn, pp. 34–47. Springer, Florida (2009)
Srivastava, A., Vatsal, P.: Forensic importance of SIM cards as a digital evidence. J. Forensic Res. 07(322), 2 (2016)
Sun, H., Hsu, S., Chen, C.: Mobile jamming attack and its countermeasure in wireless sensor networks. In: AINAW ’07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 457–462 (2007)
Taylor, M., Haggerty, J., et al.: Digital evidence in cloud computing systems. Comput. Law Secur. Rev. 26(3), 304–308 (2010)
Tu, M., Xu, D., et al.: On the development of a digital forensics curriculum. J. Digit. Forensics, Secur. Law 7(3), 13–32 (2012)
Zawoad, S., Hasan, R.: FAIoT: Towards building a forensics aware eco system for the internet of things. In: IEEE International Conference on Services Computing. IEEE Computer Society (2015)
Zhang, J., Wang, L.: An integrated open forensic environment for digital evidence investigation. Wuhan Univ. J. Nat. Sci. 17(6), 511–515 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Arafeen, Q.u., Kamran, A., Arifeen, N.u., Shaikh, A.A., Syed, N.A. (2020). Threats in the Internet of Things Pertaining to Digital Data. In: Xu, J., Ahmed, S., Cooke, F., Duca, G. (eds) Proceedings of the Thirteenth International Conference on Management Science and Engineering Management. ICMSEM 2019. Advances in Intelligent Systems and Computing, vol 1001. Springer, Cham. https://doi.org/10.1007/978-3-030-21248-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-21248-3_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-21247-6
Online ISBN: 978-3-030-21248-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)