SlideShare a Scribd company logo
5
Most read
10
Most read
12
Most read
Maulana Abul Kalam Azad University of Technology, W.B.
IoT Forensics
Submitted By
Aakashjit Bhattacharya
Roll Number:- 30011218021
Registration Number:- 183000410054 of 2018-2019
Guided By
Professor Debashish De & Dr. Koushik Majumder
Computer Science & Engineering Department
M.A.K.A.U.T., W.B.
IoT Forensics Issues
• Internet Of Things
• Characteristics of IoT
• Digital Forensics
• IoT Forensics
• Categories of Evidences With Respect To a Crime Scene
• Cyber Security challenges in IoT
• Open Issues and Scope of work
• Conclusion
• Reference
Content
Internet of Things Forensics
Internet of Things
• Building block for Smart homes and Smart Cities.
• 3 layers:- Sensing layer, Communication layer, Transmission layer.
• Lot of things work parallel, to complete the entire architecture of an IoT System, which
includes low-power embedded system, big-data, Machine Learning and networking.
• Provides M2M connectivity across all the connected devices.
Characteristics of IoT
• Scalable
• Low power consumption
• Efficient
• Low computational power
Digital Forensics
Digital forensics (sometimes known as digital forensic science) is a
branch of forensic science encompassing the recovery and
investigation of material found in digital devices, often in relation
to computer crime.
A digital forensic investigation commonly consists of 3 stages:
acquisition or imaging of exhibits, analysis, and reporting.
Evidences used in digital forensics are : hard drive of the criminals’ computer, laptop, external hard drives,
USB devices, mobile devices, etc. [2].
Three Possible Roles of A Computer Digital Forensics [4]
1. Computer can be the aim of the crime.
2. It can be responsible/ source of the crime.
3. It can act as an evidence/ proof of information that contains criminal acts.
IoT Forensics
Deals with IoT-related cybercrimes that includes investigation of connected devices, sensors and
the data stored on all possible platforms.
As security breach can take place in any of the three layers of this IoT Architecture, so IoT
forensics need to inspect all the three layers well in order to detect the crime.
Categories of Evidences With Respect To A Crime Scene
1. Smart devices and sensors : It includes sensors, smart devices, automation tools those
are powered by IoT Architecture, in other words, the
gadgets those are present in the Crime Scene.
2. Hardware and Software : Communication link between smart devices and the external
world which includes IPS, Firewalls, Computers.
3. External resources : Areas outside networks under investigation, that includes
Cloud, Social Media, ISPs, Network Providers.
Reference:- https://hub.packtpub.com/iot-forensics-security-connected-world/
Timeline of Evolution of IoT Forensics from Computer Forensic [3]
Reference :- Ana Nieto, Ruben Rios, Javier Lopez, IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations, MDPI, February 2018
Security Challenges in IoT[1]
Secure constrained devices Limited amounts of storage, memory, and processing capability and they
often need to be able to operate on lower power, so many encryption
algorithms can’t be used and so can’t transmit data securely in real-time.
Authorize and authenticate
devices
Many IoT device fails to establish their identity before accessing gateways,
upstream services and apps as they fail in device authentication.
Applying Device Updates 1. There is a need to keep track of which updates are available and apply
those updates consistently across distributed environments with
heterogeneous devices that communicate through a range of different
networking protocols.
2. Only Some devices support over-the-air updates, or updates without
downtime, but the other devices might need to be physically accessed
or temporarily pulled from production to apply updates.
Secure Communication Many IoT device do not encrypt message before transmitting.
https://developer.ibm.com/articles/iot-top-10-iot-security-challenges/Reference [1]
Security Challenges in IoT (contd.)
Ensure Data Privacy and
Integrity
The application of data privacy includes anonimizing sensitive data before
it is stored or using data separation to separate personally identifiable
information from IoT data payloads. Unrequired data must be securely
disposed of, and if data is stored, compliance should be maintained with
legal and regulatory frameworks is also an important challenge.
Secure web, mobile, and
cloud applications
As a part of multi-layered approach of IoT security, WEB MOBILE and
CLOUD APPS and SERVICES that are used to manage, access and process
IoT devices and data must be secured
Detect vulnerabilities and
incidents
When there is large scale implementation of IoT systems, then the
complexity of the system from the perspective of the variety of devices
connected, apps and services, and communication protocols involved, can
make it difficult to identify when an incident has occurred.
Predict and preempt security
issues
IoT security challenge in long term is to apply security intelligence for
detecting and mitigating issues, predicting and proactively protecting
against potential security threats.
Threat modelling[7] is one approach to predict security issues.
1. Identification, collection and preservation of Evidence
2. Co-relation and analysis of evidence.
3. Attack or deficit attribution.
& Scope of work
[1] https://developer.ibm.com/articles/iot-top-10-iot-security-challenges/
[2] Áine MacDermott, Thar Baker, Qi Shi, IoT Forensics: Challenges For The IoA Era, IEEE Xplore 2nd April 2018.
[3] Ana Nieto, Ruben Rios, Javier Lopez, IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations, MDPI, DOI:
https://doi.org/10.3390/s18020492. Received: 28 December 2017 / Revised: 25 January 2018 / Accepted: 4 February 2018 /
Published: 7 February 2018
[4] Gianni Fenu and Fabrizio Solinas , COMPUTER FORENSICS INVESTIGATION AN APPROACH TO EVIDENCE IN CYBERSPACE,
Conference: The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013)
[5] https://hub.packtpub.com/iot-forensics-security-connected-world/
[6] https://www.owasp.org/index.php/Application_Threat_Modeling
References
Aakashjit Bhattacharya
Roll:- 30011218021
Reg. No:- 183000410054 of 2018-2019

More Related Content

PDF
IOT Forensic Challenges
PPTX
Iot forensics
PDF
IoT Notes Syllabus .pdf
PDF
Security in IoT
PDF
Security challenges in IoT
PPTX
IoT Security proposal.pptx
PDF
Top Technology Trends in IoT for 2022
PPTX
security and privacy-Internet of things
IOT Forensic Challenges
Iot forensics
IoT Notes Syllabus .pdf
Security in IoT
Security challenges in IoT
IoT Security proposal.pptx
Top Technology Trends in IoT for 2022
security and privacy-Internet of things

What's hot (20)

PPTX
Mobile Forensics
PPTX
mobile forensic.pptx
PPTX
Computer forensics toolkit
PPTX
Encase Forensic
PDF
Digital forensic principles and procedure
PPTX
Digital Forensics
PDF
Digital Evidence in Computer Forensic Investigations
PPTX
IOT Forensics
PPTX
Data Acquisition
PPTX
Cyber Forensics Overview
PDF
A brief Intro to Digital Forensics
PPT
Collecting and preserving digital evidence
PPTX
Mobile Forensics and Cybersecurity
PPT
Digital Forensic
PPTX
Cyber forensics ppt
PDF
Incident response methodology
PPTX
Digital evidence
PPTX
Introduction to Cyber Forensics Module 1
PPTX
L6 Digital Forensic Investigation Tools.pptx
PPTX
Network Forensics
Mobile Forensics
mobile forensic.pptx
Computer forensics toolkit
Encase Forensic
Digital forensic principles and procedure
Digital Forensics
Digital Evidence in Computer Forensic Investigations
IOT Forensics
Data Acquisition
Cyber Forensics Overview
A brief Intro to Digital Forensics
Collecting and preserving digital evidence
Mobile Forensics and Cybersecurity
Digital Forensic
Cyber forensics ppt
Incident response methodology
Digital evidence
Introduction to Cyber Forensics Module 1
L6 Digital Forensic Investigation Tools.pptx
Network Forensics
Ad

Similar to Internet of Things Forensics (20)

DOCX
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
PDF
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
PDF
Trend Internet of Things
PDF
Security Issues & Threats in IoT Infrastructure
PPTX
Challenges and application of Internet of Things
PPTX
Introduction to IOT security
PDF
A new algorithm to enhance security against cyber threats for internet of thi...
PDF
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
PDF
Io t security_review_blockchain_solutions
PPTX
Not IN Cybersecurity Connectivity,Cloud Platforms,Security.pptx
PPTX
IoT Security Risks and Challenges
PDF
Is IoT Security A Challenge? Surefire Target Plan Explained | USCSI®
PDF
White Paper: IoT Security – Protecting the Networked Society
PDF
509286-Aki_Koivu-Review
PDF
Internet of things-blockchain lightweight cryptography to data security and ...
PPTX
Data Science for IoT
PDF
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
PDF
Internet of things (IoT) Architecture Security Analysis
PDF
Security Issues in IoT-Based Environments
PPTX
Introduction to IoT Security
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
Trend Internet of Things
Security Issues & Threats in IoT Infrastructure
Challenges and application of Internet of Things
Introduction to IOT security
A new algorithm to enhance security against cyber threats for internet of thi...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Io t security_review_blockchain_solutions
Not IN Cybersecurity Connectivity,Cloud Platforms,Security.pptx
IoT Security Risks and Challenges
Is IoT Security A Challenge? Surefire Target Plan Explained | USCSI®
White Paper: IoT Security – Protecting the Networked Society
509286-Aki_Koivu-Review
Internet of things-blockchain lightweight cryptography to data security and ...
Data Science for IoT
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
Internet of things (IoT) Architecture Security Analysis
Security Issues in IoT-Based Environments
Introduction to IoT Security
 
Ad

More from Aakashjit Bhattacharya (6)

PPTX
Internet of Things and i's Applications
PPTX
Project management
PPTX
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
PPTX
FPGA using IoT
PPTX
Software Testing
PPSX
Touch Less touch screen
Internet of Things and i's Applications
Project management
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
FPGA using IoT
Software Testing
Touch Less touch screen

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Electronic commerce courselecture one. Pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation_ Review paper, used for researhc scholars
The AUB Centre for AI in Media Proposal.docx
Empathic Computing: Creating Shared Understanding
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Unlocking AI with Model Context Protocol (MCP)
Reach Out and Touch Someone: Haptics and Empathic Computing
Building Integrated photovoltaic BIPV_UPV.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Diabetes mellitus diagnosis method based random forest with bat algorithm
20250228 LYD VKU AI Blended-Learning.pptx

Internet of Things Forensics

  • 1. Maulana Abul Kalam Azad University of Technology, W.B. IoT Forensics Submitted By Aakashjit Bhattacharya Roll Number:- 30011218021 Registration Number:- 183000410054 of 2018-2019 Guided By Professor Debashish De & Dr. Koushik Majumder Computer Science & Engineering Department M.A.K.A.U.T., W.B.
  • 3. • Internet Of Things • Characteristics of IoT • Digital Forensics • IoT Forensics • Categories of Evidences With Respect To a Crime Scene • Cyber Security challenges in IoT • Open Issues and Scope of work • Conclusion • Reference Content
  • 5. Internet of Things • Building block for Smart homes and Smart Cities. • 3 layers:- Sensing layer, Communication layer, Transmission layer. • Lot of things work parallel, to complete the entire architecture of an IoT System, which includes low-power embedded system, big-data, Machine Learning and networking. • Provides M2M connectivity across all the connected devices.
  • 6. Characteristics of IoT • Scalable • Low power consumption • Efficient • Low computational power
  • 7. Digital Forensics Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. A digital forensic investigation commonly consists of 3 stages: acquisition or imaging of exhibits, analysis, and reporting. Evidences used in digital forensics are : hard drive of the criminals’ computer, laptop, external hard drives, USB devices, mobile devices, etc. [2].
  • 8. Three Possible Roles of A Computer Digital Forensics [4] 1. Computer can be the aim of the crime. 2. It can be responsible/ source of the crime. 3. It can act as an evidence/ proof of information that contains criminal acts.
  • 9. IoT Forensics Deals with IoT-related cybercrimes that includes investigation of connected devices, sensors and the data stored on all possible platforms. As security breach can take place in any of the three layers of this IoT Architecture, so IoT forensics need to inspect all the three layers well in order to detect the crime.
  • 10. Categories of Evidences With Respect To A Crime Scene 1. Smart devices and sensors : It includes sensors, smart devices, automation tools those are powered by IoT Architecture, in other words, the gadgets those are present in the Crime Scene. 2. Hardware and Software : Communication link between smart devices and the external world which includes IPS, Firewalls, Computers. 3. External resources : Areas outside networks under investigation, that includes Cloud, Social Media, ISPs, Network Providers. Reference:- https://hub.packtpub.com/iot-forensics-security-connected-world/
  • 11. Timeline of Evolution of IoT Forensics from Computer Forensic [3] Reference :- Ana Nieto, Ruben Rios, Javier Lopez, IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations, MDPI, February 2018
  • 12. Security Challenges in IoT[1] Secure constrained devices Limited amounts of storage, memory, and processing capability and they often need to be able to operate on lower power, so many encryption algorithms can’t be used and so can’t transmit data securely in real-time. Authorize and authenticate devices Many IoT device fails to establish their identity before accessing gateways, upstream services and apps as they fail in device authentication. Applying Device Updates 1. There is a need to keep track of which updates are available and apply those updates consistently across distributed environments with heterogeneous devices that communicate through a range of different networking protocols. 2. Only Some devices support over-the-air updates, or updates without downtime, but the other devices might need to be physically accessed or temporarily pulled from production to apply updates. Secure Communication Many IoT device do not encrypt message before transmitting. https://developer.ibm.com/articles/iot-top-10-iot-security-challenges/Reference [1]
  • 13. Security Challenges in IoT (contd.) Ensure Data Privacy and Integrity The application of data privacy includes anonimizing sensitive data before it is stored or using data separation to separate personally identifiable information from IoT data payloads. Unrequired data must be securely disposed of, and if data is stored, compliance should be maintained with legal and regulatory frameworks is also an important challenge. Secure web, mobile, and cloud applications As a part of multi-layered approach of IoT security, WEB MOBILE and CLOUD APPS and SERVICES that are used to manage, access and process IoT devices and data must be secured Detect vulnerabilities and incidents When there is large scale implementation of IoT systems, then the complexity of the system from the perspective of the variety of devices connected, apps and services, and communication protocols involved, can make it difficult to identify when an incident has occurred. Predict and preempt security issues IoT security challenge in long term is to apply security intelligence for detecting and mitigating issues, predicting and proactively protecting against potential security threats. Threat modelling[7] is one approach to predict security issues.
  • 14. 1. Identification, collection and preservation of Evidence 2. Co-relation and analysis of evidence. 3. Attack or deficit attribution. & Scope of work
  • 15. [1] https://developer.ibm.com/articles/iot-top-10-iot-security-challenges/ [2] Áine MacDermott, Thar Baker, Qi Shi, IoT Forensics: Challenges For The IoA Era, IEEE Xplore 2nd April 2018. [3] Ana Nieto, Ruben Rios, Javier Lopez, IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations, MDPI, DOI: https://doi.org/10.3390/s18020492. Received: 28 December 2017 / Revised: 25 January 2018 / Accepted: 4 February 2018 / Published: 7 February 2018 [4] Gianni Fenu and Fabrizio Solinas , COMPUTER FORENSICS INVESTIGATION AN APPROACH TO EVIDENCE IN CYBERSPACE, Conference: The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) [5] https://hub.packtpub.com/iot-forensics-security-connected-world/ [6] https://www.owasp.org/index.php/Application_Threat_Modeling References
  • 16. Aakashjit Bhattacharya Roll:- 30011218021 Reg. No:- 183000410054 of 2018-2019