SlideShare a Scribd company logo
1 of 16
Maulana Abul Kalam Azad University of Technology, W.B.
IoT Forensics
Submitted By
Aakashjit Bhattacharya
Roll Number:- 30011218021
Registration Number:- 183000410054 of 2018-2019
Guided By
Professor Debashish De & Dr. Koushik Majumder
Computer Science & Engineering Department
M.A.K.A.U.T., W.B.
IoT Forensics Issues
• Internet Of Things
• Characteristics of IoT
• Digital Forensics
• IoT Forensics
• Categories of Evidences With Respect To a Crime Scene
• Cyber Security challenges in IoT
• Open Issues and Scope of work
• Conclusion
• Reference
Content
Internet of Things
• Building block for Smart homes and Smart Cities.
• 3 layers:- Sensing layer, Communication layer, Transmission layer.
• Lot of things work parallel, to complete the entire architecture of an IoT System, which
includes low-power embedded system, big-data, Machine Learning and networking.
• Provides M2M connectivity across all the connected devices.
Characteristics of IoT
• Scalable
• Low power consumption
• Efficient
• Low computational power
Digital Forensics
Digital forensics (sometimes known as digital forensic science) is a
branch of forensic science encompassing the recovery and
investigation of material found in digital devices, often in relation
to computer crime.
A digital forensic investigation commonly consists of 3 stages:
acquisition or imaging of exhibits, analysis, and reporting.
Evidences used in digital forensics are : hard drive of the criminals’ computer, laptop, external hard drives,
USB devices, mobile devices, etc. [2].
Three Possible Roles of A Computer Digital Forensics [4]
1. Computer can be the aim of the crime.
2. It can be responsible/ source of the crime.
3. It can act as an evidence/ proof of information that contains criminal acts.
IoT Forensics
Deals with IoT-related cybercrimes that includes investigation of connected devices, sensors and
the data stored on all possible platforms.
As security breach can take place in any of the three layers of this IoT Architecture, so IoT
forensics need to inspect all the three layers well in order to detect the crime.
Categories of Evidences With Respect To A Crime Scene
1. Smart devices and sensors : It includes sensors, smart devices, automation tools those
are powered by IoT Architecture, in other words, the
gadgets those are present in the Crime Scene.
2. Hardware and Software : Communication link between smart devices and the external
world which includes IPS, Firewalls, Computers.
3. External resources : Areas outside networks under investigation, that includes
Cloud, Social Media, ISPs, Network Providers.
Reference:- https://hub.packtpub.com/iot-forensics-security-connected-world/
Timeline of Evolution of IoT Forensics from Computer Forensic [3]
Reference :- Ana Nieto, Ruben Rios, Javier Lopez, IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations, MDPI, February 2018
Security Challenges in IoT[1]
Secure constrained devices Limited amounts of storage, memory, and processing capability and they
often need to be able to operate on lower power, so many encryption
algorithms can’t be used and so can’t transmit data securely in real-time.
Authorize and authenticate
devices
Many IoT device fails to establish their identity before accessing gateways,
upstream services and apps as they fail in device authentication.
Applying Device Updates 1. There is a need to keep track of which updates are available and apply
those updates consistently across distributed environments with
heterogeneous devices that communicate through a range of different
networking protocols.
2. Only Some devices support over-the-air updates, or updates without
downtime, but the other devices might need to be physically accessed
or temporarily pulled from production to apply updates.
Secure Communication Many IoT device do not encrypt message before transmitting.
https://developer.ibm.com/articles/iot-top-10-iot-security-challenges/Reference [1]
Security Challenges in IoT (contd.)
Ensure Data Privacy and
Integrity
The application of data privacy includes anonimizing sensitive data before
it is stored or using data separation to separate personally identifiable
information from IoT data payloads. Unrequired data must be securely
disposed of, and if data is stored, compliance should be maintained with
legal and regulatory frameworks is also an important challenge.
Secure web, mobile, and
cloud applications
As a part of multi-layered approach of IoT security, WEB MOBILE and
CLOUD APPS and SERVICES that are used to manage, access and process
IoT devices and data must be secured
Detect vulnerabilities and
incidents
When there is large scale implementation of IoT systems, then the
complexity of the system from the perspective of the variety of devices
connected, apps and services, and communication protocols involved, can
make it difficult to identify when an incident has occurred.
Predict and preempt security
issues
IoT security challenge in long term is to apply security intelligence for
detecting and mitigating issues, predicting and proactively protecting
against potential security threats.
Threat modelling[7] is one approach to predict security issues.
1. Identification, collection and preservation of Evidence
2. Co-relation and analysis of evidence.
3. Attack or deficit attribution.
& Scope of work
[1] https://developer.ibm.com/articles/iot-top-10-iot-security-challenges/
[2] Áine MacDermott, Thar Baker, Qi Shi, IoT Forensics: Challenges For The IoA Era, IEEE Xplore 2nd April 2018.
[3] Ana Nieto, Ruben Rios, Javier Lopez, IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations, MDPI, DOI:
https://doi.org/10.3390/s18020492. Received: 28 December 2017 / Revised: 25 January 2018 / Accepted: 4 February 2018 /
Published: 7 February 2018
[4] Gianni Fenu and Fabrizio Solinas , COMPUTER FORENSICS INVESTIGATION AN APPROACH TO EVIDENCE IN CYBERSPACE,
Conference: The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013)
[5] https://hub.packtpub.com/iot-forensics-security-connected-world/
[6] https://www.owasp.org/index.php/Application_Threat_Modeling
References
Aakashjit Bhattacharya
Roll:- 30011218021
Reg. No:- 183000410054 of 2018-2019

More Related Content

What's hot

Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionSeccuris Inc.
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System ForensicsArunJS5
 
computer forensics
computer forensicscomputer forensics
computer forensicsshivi123456
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolsN.Jagadish Kumar
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Accessing Forensic Images
Accessing Forensic ImagesAccessing Forensic Images
Accessing Forensic ImagesCTIN
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Securitynoornabi16
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
data hiding techniques.ppt
data hiding techniques.pptdata hiding techniques.ppt
data hiding techniques.pptMuzamil Amin
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 

What's hot (20)

Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and prevention
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System Forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Accessing Forensic Images
Accessing Forensic ImagesAccessing Forensic Images
Accessing Forensic Images
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
data hiding techniques.ppt
data hiding techniques.pptdata hiding techniques.ppt
data hiding techniques.ppt
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 

Similar to Internet of Things Forensics

Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...cyberprosocial
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptnadoje
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IJCI JOURNAL
 
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...RSIS International
 
Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...RSIS International
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 

Similar to Internet of Things Forensics (20)

Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
76 s201918
76 s20191876 s201918
76 s201918
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
 
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
 
Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
sample assignment
sample assignmentsample assignment
sample assignment
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 

More from Aakashjit Bhattacharya

More from Aakashjit Bhattacharya (6)

Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's Applications
 
Project management
Project managementProject management
Project management
 
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P ApplicationsA Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
 
FPGA using IoT
FPGA using IoT FPGA using IoT
FPGA using IoT
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Touch Less touch screen
Touch Less touch screenTouch Less touch screen
Touch Less touch screen
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 

Internet of Things Forensics

  • 1. Maulana Abul Kalam Azad University of Technology, W.B. IoT Forensics Submitted By Aakashjit Bhattacharya Roll Number:- 30011218021 Registration Number:- 183000410054 of 2018-2019 Guided By Professor Debashish De & Dr. Koushik Majumder Computer Science & Engineering Department M.A.K.A.U.T., W.B.
  • 3. • Internet Of Things • Characteristics of IoT • Digital Forensics • IoT Forensics • Categories of Evidences With Respect To a Crime Scene • Cyber Security challenges in IoT • Open Issues and Scope of work • Conclusion • Reference Content
  • 4.
  • 5. Internet of Things • Building block for Smart homes and Smart Cities. • 3 layers:- Sensing layer, Communication layer, Transmission layer. • Lot of things work parallel, to complete the entire architecture of an IoT System, which includes low-power embedded system, big-data, Machine Learning and networking. • Provides M2M connectivity across all the connected devices.
  • 6. Characteristics of IoT • Scalable • Low power consumption • Efficient • Low computational power
  • 7. Digital Forensics Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. A digital forensic investigation commonly consists of 3 stages: acquisition or imaging of exhibits, analysis, and reporting. Evidences used in digital forensics are : hard drive of the criminals’ computer, laptop, external hard drives, USB devices, mobile devices, etc. [2].
  • 8. Three Possible Roles of A Computer Digital Forensics [4] 1. Computer can be the aim of the crime. 2. It can be responsible/ source of the crime. 3. It can act as an evidence/ proof of information that contains criminal acts.
  • 9. IoT Forensics Deals with IoT-related cybercrimes that includes investigation of connected devices, sensors and the data stored on all possible platforms. As security breach can take place in any of the three layers of this IoT Architecture, so IoT forensics need to inspect all the three layers well in order to detect the crime.
  • 10. Categories of Evidences With Respect To A Crime Scene 1. Smart devices and sensors : It includes sensors, smart devices, automation tools those are powered by IoT Architecture, in other words, the gadgets those are present in the Crime Scene. 2. Hardware and Software : Communication link between smart devices and the external world which includes IPS, Firewalls, Computers. 3. External resources : Areas outside networks under investigation, that includes Cloud, Social Media, ISPs, Network Providers. Reference:- https://hub.packtpub.com/iot-forensics-security-connected-world/
  • 11. Timeline of Evolution of IoT Forensics from Computer Forensic [3] Reference :- Ana Nieto, Ruben Rios, Javier Lopez, IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations, MDPI, February 2018
  • 12. Security Challenges in IoT[1] Secure constrained devices Limited amounts of storage, memory, and processing capability and they often need to be able to operate on lower power, so many encryption algorithms can’t be used and so can’t transmit data securely in real-time. Authorize and authenticate devices Many IoT device fails to establish their identity before accessing gateways, upstream services and apps as they fail in device authentication. Applying Device Updates 1. There is a need to keep track of which updates are available and apply those updates consistently across distributed environments with heterogeneous devices that communicate through a range of different networking protocols. 2. Only Some devices support over-the-air updates, or updates without downtime, but the other devices might need to be physically accessed or temporarily pulled from production to apply updates. Secure Communication Many IoT device do not encrypt message before transmitting. https://developer.ibm.com/articles/iot-top-10-iot-security-challenges/Reference [1]
  • 13. Security Challenges in IoT (contd.) Ensure Data Privacy and Integrity The application of data privacy includes anonimizing sensitive data before it is stored or using data separation to separate personally identifiable information from IoT data payloads. Unrequired data must be securely disposed of, and if data is stored, compliance should be maintained with legal and regulatory frameworks is also an important challenge. Secure web, mobile, and cloud applications As a part of multi-layered approach of IoT security, WEB MOBILE and CLOUD APPS and SERVICES that are used to manage, access and process IoT devices and data must be secured Detect vulnerabilities and incidents When there is large scale implementation of IoT systems, then the complexity of the system from the perspective of the variety of devices connected, apps and services, and communication protocols involved, can make it difficult to identify when an incident has occurred. Predict and preempt security issues IoT security challenge in long term is to apply security intelligence for detecting and mitigating issues, predicting and proactively protecting against potential security threats. Threat modelling[7] is one approach to predict security issues.
  • 14. 1. Identification, collection and preservation of Evidence 2. Co-relation and analysis of evidence. 3. Attack or deficit attribution. & Scope of work
  • 15. [1] https://developer.ibm.com/articles/iot-top-10-iot-security-challenges/ [2] Áine MacDermott, Thar Baker, Qi Shi, IoT Forensics: Challenges For The IoA Era, IEEE Xplore 2nd April 2018. [3] Ana Nieto, Ruben Rios, Javier Lopez, IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations, MDPI, DOI: https://doi.org/10.3390/s18020492. Received: 28 December 2017 / Revised: 25 January 2018 / Accepted: 4 February 2018 / Published: 7 February 2018 [4] Gianni Fenu and Fabrizio Solinas , COMPUTER FORENSICS INVESTIGATION AN APPROACH TO EVIDENCE IN CYBERSPACE, Conference: The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) [5] https://hub.packtpub.com/iot-forensics-security-connected-world/ [6] https://www.owasp.org/index.php/Application_Threat_Modeling References
  • 16. Aakashjit Bhattacharya Roll:- 30011218021 Reg. No:- 183000410054 of 2018-2019