SlideShare a Scribd company logo
1 of 52
· Quantitative
Quantitative vs. Qualitative Analysis Assignments
For this assignment, you will need to perform a quantitative
analysis on the below scenario. Please write your response in a
brief APA formatted report.
Quantitative Analysis
You are the manager of desktop support for NASA. You are
responsible for purchasing and managing all of the laptops
NASA distributes to employees. There are 700 laptops
currently in service. All of the laptops randomly leave the
building and serve a mobile workforce. Read the following
articles your CIO brought to you for consideration:
http://www.pcworld.com/article/251318/48_nasa_laptops_stolen
_in_two_years_a_case_for_better_encryption_practices.html
http://www.pcworld.com/article/181124/laptops_that_go_ghost.
html
Compute the SLE, ARO, ALE and safeguard value based on the
information in these articles for a report your CIO plans to
submit as a solution. For the safeguard value, find and price an
appropriate physical and software solution(s) to safeguard theft
and data loss. Once you pick a product, include a link to the
page for pricing and item description. Present the realized
savings in your report and the benefits of the solution you
choose for safeguarding the laptops. Don’t forget to include
your equations for ARO, ALE, safeguard value and realized
savings calculations.
Qualitative
Quantitative vs. Qualitative Analysis Assignments
For this assignment, you will need to perform a qualitative
analysis on the below scenario. Please write your response in a
spreadsheet.
Qualitative Analysis
For this part of the assignment, you can use the work you
performed for last week. Take those 7 risks and arrange them
into a spreadsheet. Perform a probability assessment and write
about the impact of the risk for each of the 7, based on the
geographical location of last week's assignment. Use the
following format:
Category
Probability (0.0-1.0)
Impact (0-100)
Risk Level (P x I)
Description
Zombies
.02
90
1.8
Zombie Apocalypse causes wide spread panic and physical
security threats to staff, property and business operations.
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS
AND SECURITY, VOL. 14, NO. 11, NOVEMBER 2019
Interdependent Strategic Security Risk Management
With Bounded Rationality in the Internet of Things
Juntao Chen , Student Member, IEEE, and Quanyan Zhu,
Member, IEEE
Abstract— With the increasing connectivity enabled by the
Internet of Things (IoT), security becomes a critical concern,
and users should invest to secure their IoT applications. Due to
the massive devices in the IoT network, users cannot be aware
of the security policies taken by all its connected neighbors.
Instead, a user makes security decisions based on the cyber
risks that he perceives by observing a selected number of
nodes. To this end, we propose a model which incorporates
the limited attention or bounded rationality nature of players
in the IoT. Specifically, each individual builds a sparse
cognitive
network of nodes to respond to. Based on this simplified
cognitive
network representation, each user then determines his security
management policy by minimizing his own real-world security
cost. The bounded rational decision-makings of players and
their
cognitive network formations are interdependent and thus
should
be addressed in a holistic manner. We establish a games-in-
games framework and propose a Gestalt Nash equilibrium
(GNE)
solution concept to characterize the decisions of agents and
quantify their risk of bounded perception due to the limited
attention. In addition, we design a proximal-based iterative
algorithm to compute the GNE. With case studies of smart
communities, the designed algorithm can successfully identify
the critical users whose decisions need to be taken into account
by the other users during the security management.
Index Terms— Risk management, bounded rationality, cogni-
tive networks, Internet of Things, smart community.
I. INTRODUCTION
RECENT years have witnessed a significant growthof urban
population. As the growth continues, cities
need to become more efficient to serve the surging pop-
ulation. To achieve this objective, cities need to become
smarter with the integration of information and communication
techniques (ICTs) and urban infrastructures. Driven by the
advances in sensing, computing, storage and cloud technolo-
gies, the Internet of Things (IoT) plays a central role in
supporting the development of smart city. Though IoT enables
a highly connected world, the security of IoT becomes a
critical concern. There are 5.5 million new things connected
Manuscript received May 21, 2018; revised March 4, 2019;
accepted
April 9, 2019. Date of publication April 15, 2019; date of
current ver-
sion July 2, 2019. This work was supported in part by the
National Sci-
ence Foundation under Award SES-1541164 and Award ECCS-
1847056,
in part by the Army Research Office (ARO) under Grant
W911NF1910041,
and in part by a grant through the Critical Infrastructure
Resilience
Institute (CIRI). The associate editor coordinating the review of
this
manuscript and approving it for publication was Prof. Karen
Renaud.
(Corresponding author: Juntao Chen.)
The authors are with the Department of Electrical and Computer
Engi-
neering, Tandon School of Engineering, New York University,
Brooklyn,
NY 11201 USA (e-mail: [email protected]; [email protected]).
Digital Object Identifier 10.1109/TIFS.2019.2911112
Fig. 1. IoT-enabled interconnected smart community. The
connectivity,
on one hand, enhances the situational awareness of smart
homes. However,
it increases the cyber risks of the community. Hence, the cyber
security of
each household not only dependents on its own risk
management strategy but
also the ones of connected neighbors.
every day in 2016, as we head toward more than 20 billion
by 2020 [1]. These IoT devices come from different manufac-
turers, and they have heterogeneous functionalities and secu-
rity configurations and policies. No uniform security standards
are used for IoT devices as they are developed using different
system platforms for various functionalities. Moreover, due
to the connections between IoT devices, the security of one
device is also dependent on the security of other devices
to which it connects. Therefore, the heterogeneity and the
interconnectivity of massive heterogeneous IoT have created
significant challenges for security management. Fig. 1 depicts
a highly connected smart community enabled by IoT devices.
Each household needs to take into account the cyber risks
coming from their connected neighbors when securing their
devices.
In cyber networks, security management and practices of
users are often viewed as the weakest link [2]. The lack of
security awareness and expertise at the user’s end creates
human-induced vulnerabilities that can be easily exploited
by an adversary, exacerbating the insecurity of IoT. To this
end, it is critical to enhance the security by strengthening
security management in a decentralized way. Hence, in the
IoT, each device owner or system manager needs to allocate
resources (e.g. human resources, computing resources, invest-
ments or cognition) to secure his applications. For example,
the smart building operator can spend resources on upgrading
the hardware, hiring staff members for network monitoring
and forensics, and developing tailored security solutions to
1556-6013 © 2019 IEEE. Personal use is permitted, but
republication/redistribution requires IEEE permission.
See
http://www.ieee.org/publications_standards/publications/rights/i
ndex.html for more information.
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC
from IEEE Xplore. Restrictions apply.
https://orcid.org/0000-0001-7726-4926
CHEN AND ZHU: INTERDEPENDENT STRATEGIC
SECURITY RISK MANAGEMENT WITH BOUNDED
RATIONALITY 2959
the smart building. A smart home user, on the other hand, can
safely configure its network and regularly updates its software
and password of the IoT devices as illustrated in Fig. 1.
The devices in the IoT networks and their interconnections
can be modeled as nodes and links, respectively. The security
policy of one device can have an impact on the security
risk of nodes that are connected to it. Since various users
own different devices, the security management in IoT is
decentralized in nature. Therefore, the process of decentralized
security decision-making can be modeled as a game problem
in which each user strategically allocates his resources to
secure the devices [3]. In this game, the users’ risks are
reduced when their connected neighbors are of high-level
security. Due to the complex and massive connections, users
cannot be aware of the security policies taken by all its
connected neighbors. Instead, a user can only make security
decisions based on the cyber risk he perceives by observing
a selected number of nodes. This fact indicates that the game
model needs to take into account the bounded rationality
of players [4]. Therefore, in the game framework, we use a
cognition vector representing the observation structure of each
IoT user. Specifically, a sparser cognition vector represents a
user with weaker cognition ability, and he observes a smaller
number of other users’ behaviors when deciding his strategy.
Thus, the limited attention nature of users creates a bounded
perception of cyber risks.
In the established bounded rational game model, the users
need to make security management decisions as well as design
their cognition networks in a holistic manner. In order to
achieve this goal, we define a new solution concept called
Gestalt Nash equilibrium (GNE) to capture the cognitive
network formation and the security management under the
bounded rationality simultaneously. The analysis of the GNE
provides a quantitative method to understand the risk of mas-
sive IoTs and gives tractable security management policies.
We further design a proximal-based iterative algorithm to
compute the GNE of the game. The GNE resulting from
the algorithm reveals several typical phenomena that match
well with the real-world observations. For example, when the
network contains two groups of users, then under the limited
attention, all users will allocate their cognition resources to
the same group which demonstrates the law of partisanship.
Further, in a heterogeneous massive IoT, the equilibrium
successfully identifies the set of agents that are invariably paid
attention to by other users, demonstrating the phenomenon
of attraction of the mighty. Since the framework predicts the
high-level systemic risk of the IoT network, it also can be
used to inform the design of security standards and incentive
mechanisms, e.g., through contracts and cyber insurance.
The developed security management model provides an
essential framework to assess IoT security risks when applied
to various applications. For example, in smart home commu-
nities, the households are connected together to share hetero-
geneous information, e.g., electricity prices and temperature
readings through smart meters, and real-time information of
items in local stores and shops by wireless sensors. The con-
nections of IoT devices thus create security interdependencies
between households. Another broader application lies in the
different components in smart cities. Due to the interconnec-
tivity between large-scale infrastructures including the trans-
portation, power grids, and communications, the manager of
each sector needs to take into account the cyber risks coming
from other components when adopting security solutions.
The contributions of this paper are summarized as follows:
1) We propose a holistic framework to investigate the
security management of users with bounded rationality
in the IoT networks.
2) We model the cognition of users with a sparse vector
and quantify users’ risk of bounded perception resulting
from the underperceived cyber threats in the network.
3) We design a proximal-based algorithm to compute the
GNE which contains security management strategy and
cognitive network of agents. The algorithm discovers
several phenomena including emergence of partisanship,
filling the inattention, and attraction of the mighty.
4) We apply the proposed model to a smart community, and
demonstrate that the designed algorithm can identify the
most critical households in the network.
A. Related Work
Security management has been investigated in various
research fields including computer networks [5], communica-
tions [6], cloud computing [7] and infrastructures [8]. With the
advances in ICTs, a growing number of works have focused
on the emerging critical issue of IoT security [9]–[11]. Due
to the interconnectivity between different agents, the security
of one agent is also dependent on its connected ones which
gives rise to the notion of “interdependent security” [12].
The authors in [13]–[15] have further investigated the security
interdependencies in multilayer cyber-physical systems.
Games over networks have caught a lot of attention recently
especially from the economics perspective [16]–[19]. The
couplings between players in the network can be either in
a strategic exclusive or strategic complement manner. Based
on the features of security management in IoT, our problem
falls into the latter class. For the engineering applications,
the authors in [8], [20] have studied the resource allocation
game over interdependent critical infrastructures where both
players aim to increase the connectivity of the network.
Huang et al. [21], [22] have adopted a stochastic Markov
game model to design resilient operating strategies for multi-
layer networks. Zhu et al. [23] have proposed a game-theoretic
framework for collaborative intrusion detection systems
through resource management to mitigate network cyber
threats. Our work differs from [23] in that we take into account
the cognitive factors of human behaviors during decision
making.
Humans with limited knowledge or cognitive resources are
bounded rational, since they cannot pay attention to all the
information [24], [25]. Gabaix has proposed a “sparse max”
operator to model the limited attention of players in which
each agent builds a simplified model of the network based
on an l1 norm [4]. Our work leverages on the established
“sparse max” operator and formulates a constrained game
program to capture the bounded cognition ability of players in
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC
from IEEE Xplore. Restrictions apply.
2960 IEEE TRANSACTIONS ON INFORMATION FORENSICS
AND SECURITY, VOL. 14, NO. 11, NOVEMBER 2019
TABLE I
NOMENCLATURE
the IoT. In addition, we further consider the risk management
of each user based on their underperceived cyber risks over
the network.
B. Organization of the Paper
The rest of the paper is organized as follows. Section II
formulates a security management game over IoT networks
with bounded rational players. Section III analyzes the prob-
lem. Section IV designs a proximal-based iterative algorithm
to compute the GNE. Case studies are given in Section V, and
Section VI concludes the paper.
C. Summary of Notations
For convenience, we summarize the notations used in the
paper in Table I. Note that notations associated with ∗ refer
to the value at equilibrium. Furthermore, notations with index
k stands for its value at step k during the iterative updates.
II. PROBLEM FORMULATION
In this section, we formulate a problem involving strategic
security decision making and cognitive network formation of
players in the IoT networks.
A. Security Management Game Over Networks
In an IoT user network including a set N of nodes,1 where
N := {1, 2, . . . , N}, each node can be seen as a player
1The terms of node, agent and player refer to the user in the
IoT, and they
are used interchangeably.
that makes strategic decisions on the security management to
secure their IoT devices. For instance, in Fig. 1, each smart
home is a player securing their smart things to mitigate the
cyber threats. We define U := {u1, . . . , uN } by the decision
profile of all the players. Specifically, ui is a one-dimensional
decision variable representing player i ’s security management
effort. For convenience, we denote u−i := U  {ui }. The
objective of player i , i ∈ N , is to minimize his security risk
strategically by taking the costly action ui . We define by Fi1 :
R+ → R+ the cost of security management effort of player
i which is an increasing function of ui . The corresponding
benefit of security management is captured by a function
Fi2 : R+ → R+. Intuitively, a larger ui yields a higher
return, and hence Fi2 is monotonically increasing. Due to
the interconnections in the IoT, the risk of player i is also
dependent on his connected users. Then, we use a function
Fi3 : R+ × RN−1+ → R+ to represent the influence of player
i ’s connected users on his security. The coupling between
players in the IoT is in a strategic complement fashion with
respect to the security decisions. More specifically, a larger
security investment u j of player j , a connected node of player
i , decreases the cyber risks of player i as well. Therefore,
the cost function of player i can be expressed as the following
form:
J i (ui , u−i ) = Fi1(ui ) − Fi2(ui ) − Fi3(ui , u−i ), (1)
where J i : R+ × RN−1+ → R. To facilitate the analysis
and design of security risk management strategies, we spec-
ify some appropriate forms of functions in (1). In the fol-
lowing, we focus on player i taking the quadratic form:
Fi1(ui ) = 12 Riii u2i , Fi2(ui ) = ri ui , and Fi3(ui , u−i ) =∑
j �=i, j∈ N Rii j ui u j . Thus, (1) can be detailed as
J i (ui , u−i ) = 1
2
Riii u
2
i − ri ui −
∑
j �=i, j∈ N
Rii j ui u j , (2)
where Riii > 0, ri > 0, ∀ i , and Rii j ≥ 0, ∀ j �= i, i ∈ N . Note
that parameters Rii j , i, j ∈ N , represent the risk dependence
network of player i in the IoT, and the value of Rii j indicates
the strength of risk influence of player j on player i which
is given as a prior. The first term 12 R
i
ii u
2
i in (2) is the cost
of security management with an increasing marginal price.
The second term ri ui denotes the corresponding payoff of
cyber risk reduction. Then, the first two terms capture the fact
that increasing a certain level of cyber security becomes more
difficult in a secure network than a less secure one. The last
term
∑N
j=1, j �=i Rii j ui u j is the aggregated security risk effect
from connected users of player i . Specifically, the structure of
Fi3 in ui and u j indicates that the risk measure J
i of player
i decreases linearly with respect to user j ’s action. Hence,
in the established model, larger investment from a user helps
reduce cyber risk influence in a linear way. We have following
assumption on the security influence parameters.
Assumption 1: Riii >
∑
j �=i, j∈ N Rii j , ∀ i ∈ N .
Assumption 1 has a natural interpretation which indicates
that the security of a user is mainly determined by his own
strategy rather than other users’ decisions in the IoT network.
Moreover, based on the heterogeneous influence networks
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC
from IEEE Xplore. Restrictions apply.
CHEN AND ZHU: INTERDEPENDENT STRATEGIC
SECURITY RISK MANAGEMENT WITH BOUNDED
RATIONALITY 2961
characterized by Assumption 1, each node designs its own
security investment strategy which enables the decentralized
decision-making. The strategies of nodes are interdependent
due to the coupling between their cost functions shown in (2).
Through the first order optimality condition (FOC),
we obtain
Riii ui −
∑
j �=i, j∈ N
Rii j u j − ri = 0, ∀ i ∈ N . (3)
Putting (3) in a matrix form yields
⎡
⎢
⎢
⎢
⎣
R111 −R112 · · · −R11N−R221 R222 · · · −R22N
...
...
. . .
...
−RNN1 −RNN2 · · · RNN N
⎤
⎥
⎥
⎥
⎦
⎡
⎢
⎢
⎢
⎣
u1
u2
...
uN
⎤
⎥
⎥
⎥
⎦
=
⎡
⎢
⎢
⎢
⎣
r1
r2
...
rN
⎤
⎥
⎥
⎥
⎦
⇔Ru = r,
(4)
where r := [ri ]i∈ N , u := [ui ]i∈ N .
For convenience, we denote this security management game
by G. One solution concept of game G is Nash equilib-
rium (NE) which is defined as follows.
Definition 1 (Nash Equilibrium of Game G [3]): The strt-
egy profile u∗ = [u∗ i ]i∈ N constitutes a Nash equilibrium of
game G if J i (ui , u∗ −i ) ≥ J i (u∗ i , u∗ −i ), ∀ i ∈ N , ∀ ui ∈ Ui
.
The NE of game G yields strategic security management
policies of players under the condition that they can perceive
all the cyber risks in the IoT network.
B. Bounded Rational Security Management Game
In reality, the users in IoT are connected with numerous
other agents. For example, a single household can be con-
nected with a number of other houses in terms of various
types of IoT products in the smart communities. Therefore,
when making security management strategies, each user may
not be capable to observe all its connected neighbors. Instead,
a user can only respond to a selected number of other players’
decisions. Then, this bounded rational response mechanism
creates a cognitive network formation process for the players
in the network. Specifically, player i ’s irrationality is captured
by a vector mi := [mij ] j �=i, j∈ N , mij ∈ [0, 1], which stands
for the attention network that player i builds. When mij = 0,
user i pays no attention to user j ’s behavior; when mij = 1,
user i observes the true value of security management u j
of user j . The value that mij admits between 0 and 1 can be
interpreted as the trustfulness of user i on the perceived u j .
Another interpretation of mij can be the probability that user i
observes the behavior of user j at each time instance on the
security investment over a long period. Hence, the decision of
player j perceived by player i becomes ucij = mij u j . Then,
player i minimizes the modified cost function with bounded
rationality defined as:
J̃ i (ui , u
ci−i , m
i ) = 1
2
Riii u
2
i − ri ui −
∑
j �=i, j∈ N
mij R
i
i j ui u j
= 1
2
Riii u
2
i − ri ui −
∑
j �=i, j∈ N
Rii j ui u
ci
j , (5)
where J̃ i : R+ × RN−1+ × [0, 1]N−1 → R.
The FOC of (5) gives Riii ui −
∑
j �=i, j∈ N Rii j u
ci
j − ri =
0, ∀ i ∈ N , which is equivalent to
⎡
⎢
⎢
⎢
⎣
R111 −m12 R112 · · · −m1N R11N−m21 R221 R222 · · · −m2N
R22N
...
...
. . .
...
−mN1 RNN1 −mN2 RNN2 · · · RNN N
⎤
⎥
⎥
⎥
⎦
⎡
⎢
⎢
⎢
⎣
u1
u2
...
uN
⎤
⎥
⎥
⎥
⎦
=
⎡
⎢
⎢
⎢
⎣
r1
r2
...
rN
⎤
⎥
⎥
⎥
⎦
⇔Rsu = r. (6)
The bounded rational best-response of player i , i ∈ N , then
becomes
ui = B Ri (uci−i ) =
1
Riii
⎛
⎝
∑
j �=i, j∈ N
Rii j u
ci
j + ri
⎞
⎠ , (7)
where ucij = mij u j .
We denote the security management game of players with
limited attention by G̃ . Comparing with the solution concept
NE of game G, the one of game G̃ is generalized to bounded
rational Nash equilibrium (BRNE). The formal definition of
BRNE is as follows.
Definition 2 (Bounded Rational Nash Equilibrium of
Game G̃ ): With given cognition vectors mi , ∀ i ∈ N ,
the strategy profile u∗ = [u∗ i ]i∈ N constitutes a BRNE of
game
G̃ if J̃ i (ui , u∗−i , mi ) ≥ J̃ i (u∗ i , u∗ −i , mi ), ∀ i ∈ N , ∀ ui
∈ Ui .
Note that the cognitive network each user built has an
impact on the BRNE of game G̃ . Hence, how the users
determine the cognition vector mi , i ∈ N , becomes a critical
issue. In the ensuing section, we introduce the cognitive
network formation of players in the IoT.
C. Cognitive Network Formation
Due to the massive connections in IoT, each user builds
a sparse cognitive network containing the agents to observe.
To this end, the real cost of user i by taking the bounded
rationality into account becomes
J i (B Ri (uci−i ), u−i )
= 1
2Riii
⎛
⎝
∑
j �=i, j∈ N
Rii j u
ci
j + ri
⎞
⎠
2
−
∑
k �=i,k∈ N
⎡
⎣ 1
Riii
Riik uk
⎛
⎝
∑
j �=i, j∈ N
Rii j u
ci
j + ri
⎞
⎠
⎤
⎦
− ri
Riii
⎛
⎝
∑
j �=i, j∈ N
Rii j u
ci
j + ri
⎞
⎠
= 1
2
∑
j �=i, j∈ N
∑
k �=i,k∈ N
1
Riii
Rii j R
i
ik u
ci
j u
ci
k −
1
2Riii
(ri )
2
−
∑
k �=i,k∈ N
⎛
⎝
∑
j �=i, j∈ N
ucij R
i
i j
⎞
⎠
1
Riii
Riik uk
−
∑
k �=i,k∈ N
1
Riii
ri R
i
ik uk .
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC
from IEEE Xplore. Restrictions apply.
2962 IEEE TRANSACTIONS ON INFORMATION FORENSICS
AND SECURITY, VOL. 14, NO. 11, NOVEMBER 2019
Incorporating the cognition vector mi into the real cost of
player i further yields
J i (B Ri (uci−i ), u−i )
= 1
2
∑
j �=i, j∈ N
∑
k �=i,k∈ N
mij
1
Riii
Rii j R
i
ikm
i
ku j uk −
1
2Riii
(ri )
2
−
∑
k �=i,k∈ N
∑
j �=i, j∈ N
mij
1
Riii
Rii j R
i
iku j uk
−
∑
k �=i,k∈ N
1
Riii
ri R
i
ik uk . (8)
Recall that each user aims to minimize the security risk
based on the risks he perceives. Thus, by considering the real
cost induced by the bounded rationality constraint, the strategic
cognitive network formation problem of player i can be
formulated as
mi∗ = arg min
mij , j �=i, j∈ N
J i (B Ri (uci−i ), u−i ) + αi‖mi‖1
= arg min
mij , j �=i, j∈ N
1
2
∑
j �=i, j∈ N
∑
k �=i,k∈ N
1
Riii
Rii j R
i
ik u j ukm
i
j m
i
k
−
∑
j �=i, j∈ N
∑
k �=i,k∈ N
1
Riii
Rii j R
i
ikuku j m
i
j + αi‖mi‖1
= arg min
mij , j �=i, j∈ N
1
2
mi
T
�i mi − eTN−1�i mi + αi‖mi‖1,
where �i := [�ij k] j �=i,k �=i, j∈ N ,k∈ N , �ij k = 1Riii R
i
i j R
i
iku j uk ,
eN−1 is an N − 1-dimensional column vector with all one
entries, and αi is a weighting factor capturing the unit cost
of cognition of player i and it can be tuned to match with
experimental data. The term ‖mi‖1 is a convex relaxed version
of ‖mi‖0 which approximately maintains the sparse property
of player i ’s cognitive network [26], [27]. The integrated term
αi‖mi‖1 can be interpreted as the cognitive cost of user i .
Therefore, for player i , we need to solve the following
constrained optimization problem:
min
mij , j �=i, j∈ N
1
2
mi
T
�i mi − eTN−1�i mi + αi‖mi‖1
s.t. 0 ≤ mij ≤ 1, j �= i, j ∈ N , (Risk perception), (9)
where the constraints mij ∈ [0, 1], ∀ j �= i , indicate the risk
perception behavior of user i .
The number of cognitive links that player i can form is
generally a positive integer, i.e., ‖mi‖1 = βi ∈ N+. Note that
βi here and αi in (9) have the same interpretation which both
quantify the cognition ability of player i . Then, by choosing αi
strategically, the problem in (9) is equivalent to the following
problem:
min
mij , j �=i, j∈ N
1
2
mi
T
�i mi − eTN−1�i mi
s.t. 0 ≤ mij ≤ 1, j �= i, j ∈ N , (Risk perception),
‖mi‖1 = βi , (Limited attention), (10)
where βi ∈ N+ ≤ N − 1 is the total number of links that
player i can form in his cognitive network, quantifying his
Fig. 2. IoT user and cognitive network-of-networks. Users make
strategic
security management decisions in the IoT network as well as
determine their
cognitive networks. The security management game in layer G2
and the
cognitive network formation game in layer G1 are
interdependent which create
a games-of-games framework.
limited attention. Simulation studies in Section V reflect that
considering ‖mi‖1 = βi yields sparser cognitive networks.
Note that we still solve (9) by selecting a proper αi which
yields equivalent (9) and (10).
D. Gestalt Nash Equilibrium
The formulated security management under bounded ratio-
nality problem boasts a games-of-games structure. The users
make decisions strategically in the IoT network as well as
form their cognitive networks selfishly. The security man-
agement game and cognitive network formation game are
interdependent. Therefore, the cognitive and IoT user layers
shown in Fig. 2 constitute a network-of-networks framework.
In this paper, we aim to design an integrated algorithm to
design the cognitive networks and determine the security risk
management decisions of users in a holistic manner.
To this end, we present the solution concept, Gestalt Nash
equilibrium, of the bounded rational security risk management
game as follows.
Definition 3 (Gestalt Nash Equilibrium): The Gestalt Nash
equilibrium (GNE) of the security risk management game
under bounded rationality is a profile (mi∗ , u∗ i ), ∀ i ∈ N , that
satisfies
J̃ i (u∗i , u∗−i , mi∗)≤ J̃ i (ui , u∗ −i , mi ), ∀ ui ∈ Ui , ∀ mi
∈ [0, 1]N−1.
At the GNE, all the players in the network do not change their
action ui and cognition vector mi , ∀ i ∈ N , simultaneously.
Remark: The strategic security management profile
u∗ = [u∗ i ]i∈ N at GNE is also a BRNE.
In the following, we aim to analyze the GNE of the game
and compute it by designing algorithms.
III. PROBLEM ANALYSIS
We first analyze the convergence of the bounded rational
best-response dynamics of players in Section II-B. Then,
we quantify the risk of bounded perception due to limited
attention of players. We further reformulate the cognitive
network formation problem presented in Section II-C.
A. Bounded Rational Best Response Dynamics
Based on Section II-B, the bounded rational best-response
dynamics of player i under cognitive network mi , i ∈ N , can
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at …
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1,
JANUARY 2020 1
A Survey on Digital Forensics in Internet of Things
Jianwei Hou , Yuewei Li, Jingyang Yu, and Wenchang Shi
Abstract—Internet of Things (IoT) is increasingly permeat-
ing peoples’ lives, gradually revolutionizing our way of life.
Due
to the tight connection between people and IoT, now civil and
criminal investigations or internal probes must take IoT into
account. From the forensic perspective, the IoT environment
con-
tains a rich set of artifacts that could benefit investigations,
while
the forensic investigation in IoT paradigm may have to alter to
accommodate characteristics of IoT. Therefore, in this article,
we
analyze the impact of IoT on digital forensics and systematize
the research efforts made by previous researchers from 2010 to
2018. We sketch the landscape of IoT forensics and examine the
state of IoT forensics under a 3-D framework. The 3-D frame-
work consists of a temporal dimension, a spatial dimension, and
a technical dimension. The temporal dimension walks through
the standard digital forensic process while the spatial dimension
explores where to identify sources of evidence in IoT environ-
ment. These two dimensions attempt to provide principles and
guidelines for standardizing digital investigations in the context
of IoT. The technical dimension guides a way to the exploration
of
tools and techniques to ensure the enforcement of digital
forensics
in the ever-evolving IoT environment. Put together, we present
a holistic overview of digital forensics in IoT. We also
highlight
open issues and outline promising suggestions to inspire future
study.
Index Terms—Cybercrime, digital forensics, Internet of
Things (IoT).
I. INTRODUCTION
W ITH the Internet of Things (IoT) permeating our dailylives,
people are becoming more reliant on various
kinds of smart IoT services, leaving traces on various IoT
devices. These rich repositories of digital traces in IoT envi-
ronment can provide insight into people’s daily activities in
their home and elsewhere, which are of great value to digital
forensics [1]. On the other hand, the number of both civil and
criminal cases involving IoT devices or services has grown.
IoT devices may not only be targets for attacks, but also tools
for committing crimes. Security vulnerabilities in IoT systems
can be leveraged to remotely control the systems, for exam-
ple, to control the accelerator and brake system of the smart
Manuscript received May 9, 2019; revised July 9, 2019;
accepted August
26, 2019. Date of publication September 11, 2019; date of
current version
January 10, 2020. This work was supported in part by the
National Natural
Science Foundation of China under Grant 61472429, in part by
the Natural
Science Foundation of Beijing Municipality under Grant
4122041, and in
part by the National High Technology Research and
Development Program of
China under Grant 2007AA01Z414. (Corresponding author:
Wenchang Shi.)
J. Hou, Y. Li, and W. Shi are with the School of Information,
Renmin
University of China, Beijing 100872, China (e-mail:
[email protected];
[email protected]; [email protected]).
J. Yu is with the School of Information, Renmin University of
China,
Beijing 100872, China, and also with the School of Computer
and
Information Engineering, Henan University, Kaifeng 475004,
China (e-mail:
[email protected]).
Digital Object Identifier 10.1109/JIOT.2019.2940713
vehicle to cause an incident. Therefore, there is an urgent need
for IoT forensics research to assist in determining the who,
what, where, when, and how for cases.
The rapid adoption of IoT expands the range of digi-
tal evidence from the PC or laptops to a wide range of
IoT devices (e.g., wearable devices and automobiles) as well
as various cloud-based IoT services, which presents multi-
faceted challenges for investigators. Although current forensic
methodologies and tools still prove useful at some stages of
forensics in IoT domain, there is still a pressing need to update
current tools, procedures, and legislation to deal with unique
characteristics of IoT [2].
The main goal of this survey is to have an overview of
the state of IoT forensics and provide guidelines for future
research and practices on it. We try to provide a comprehensive
and structured landscape of IoT forensics under a 3-D frame-
work. The framework encompasses a temporal dimension, a
spatial dimension, and a technical dimension.
From the temporal dimension, IoT forensics follows the
standard digital forensic process including collection, exam-
ination, analysis, and reporting to transform media into evi-
dence and calls for appropriate forensic models to support the
reasonable and appropriate use of forensic tools for practi-
cal investigations involving IoT. From the spatial dimension,
we explore IoT forensics with respect to the forensic envi-
ronment where potential evidence may exist. Based on the
typical architecture of IoT, the major sources of evidence in
IoT forensics can be divided into three domains, i.e., device,
network, and cloud. From the technical dimension, we inves-
tigate IoT forensics by exploring the enabling methods, tools,
or techniques that can provide the ability to collect and exam-
ine volatile or nonvolatile data and to perform quick reviews
or in-depth analysis of data from various sources of evidence
in IoT environment.
Together with the three dimensions, we make a system-
atic analysis of existing efforts on digital forensics in IoT
paradigm to present a holistic overview of this domain. We
also point out open issues that IoT forensics faces and put for-
ward promising suggestions to assist with future research. The
main contributions of this article are highlighted as follows.
1) We discuss and summarize the impact of IoT on digi-
tal forensics according to fundamental characteristics of
IoT.
2) We provide an overview of existing research efforts from
2010 to 2018 on IoT forensics and briefly introduce the
development of IoT forensics.
3) We sketch the landscape of IoT forensics and review the
state of it under a 3-D framework.
4) We highlight the open issues in the field of IoT forensics
and propose corresponding suggestions.
2327-4662 c© 2019 IEEE. Personal use is permitted, but
republication/redistribution requires IEEE permission.
See
http://www.ieee.org/publications_standards/publications/rights/i
ndex.html for more information.
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC
from IEEE Xplore. Restrictions apply.
https://orcid.org/0000-0001-5503-8143
2 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1,
JANUARY 2020
The remainder of this article is organized as follows. In
Section II, we introduce the background of digital forensics
and discuss the impact of IoT on digital forensics. We also
introduce smart home as a typical IoT scene that helps to
illustrate digital forensics in IoT environment later in the fol-
lowing sections. In Section III, we select and investigate the
recent literature on IoT forensics and clarify the development
of IoT forensics research. We sketch the landscape of IoT
forensics under a 3-D framework in Section IV and illustrate
each dimension in detail in Sections V–VII, respectively. In
Section VIII, from the three dimensions, we highlight the open
issues and present promising suggestions for future research
and practices in the field of IoT forensics. Finally, we conclude
this article in Section IX.
II. BACKGROUND
A. Digital Forensics
Digital forensics aims to gain a better understanding of an
event of interest by finding and analyzing the facts related
to that event [3]. The digital forensic investigators reveal the
truth of an event by discovering and exposing the remnants
(footprints or artifacts) of an event left on the digital system.
The NIST Recommendation [4] has divided the digi-
tal forensic investigation process into four consecutive (or
iterative if necessary) phases, i.e., collection, examination,
analysis, and reporting. Although different sources of evidence
may call for different methodologies and generate different
types of evidence, digital investigations in IoT environment
still need to be carried out under this process to support the
admissibility of evidence in legal processing.
B. Forensic Soundness
Forensic soundness is the basic principle for forensic inves-
tigations. On the one hand, it refers to the fact that the digital
forensic process must follow a certain standard so that it can
be admissible in a court of law. On the other hand, the applica-
tion or development of forensic tools and techniques should be
undertaken in accordance with the relevant rules of forensics
to protect the evidence from damage. A process is consid-
ered to be forensically sound if it meets the following four
criteria [5].
1) Meaning: The forensic process cannot change the orig-
inal meaning of evidence or should try to have the
minimum change.
2) Errors: The forensic process should avoid undetectable
errors and any error in the process should be properly
documented.
3) Transparency and Trustworthiness: The reliability and
accuracy of the forensic process are capable of being
tested and/or verified by, for example, an external exam-
ination of the forensic procedures by a court of law.
4) Experience: The individuals undertaking the forensic
investigation should have sufficient experience or knowl-
edge and should not undertake an examination that is
beyond his/her current level of knowledge and skill.
Fig. 1. Impact of IoT on digital forensics.
C. Impact of IoT on Digital Forensics
IoT enables more and more devices “online,” providing
various kinds of smart services (e.g., smart city, medical
care, and smart home) that are bound up with peoples’ lives.
Considering the fundamental characteristics of IoT, we discuss
the impact of IoT on digital forensics, summarized in Fig. 1.
1) Ubiquitous Sensing: With temperature sensors, motion
detectors, or pressure sensors, IoT devices have the ubiquitous
sensing ability so that they contain potential evidence closely
related to the behavior of their owners and other devices
in their environments [6]. More diverse sources of evidence
and fine-grained sensing in IoT contribute to reconstructing
the context of cases, which also produces a large volume of
forensic data needing to be dealt with.
2) Dynamic Changes: The state of IoT devices changes
dynamically. That is, a device may join or leave a network
autonomously or with the movement of users at any
time. Due to such temporal and spatial change properties,
network topologies change dynamically and network bound-
aries become blurry, which would make it more difficult
to identify the boundaries of cases [7]. The dynamic fea-
ture of IoT calls for real-time logging to record temporal
information, such as modified time, accessed time, and cre-
ated time, which can help to correlate and sequence the digital
evidence gathered from different devices.
3) Automated Execution: There are real-time and auto-
mated interactions between IoT devices to facilitate the col-
laboration between different IoT applications [8]. Devices
may operate automatically according to the information from
surroundings or other entities, reducing human intervention.
Within automated systems, there are questions of control
(who/what did it?) and responsibility (who/what is at fault?)
while the increase of interactions makes it prohibitively com-
plex to trace back incidents through a chain of different
devices.
4) Resource-Limited Characteristic of Devices: Due to the
limited resources of some IoT devices, data on the devices
may have a short survival period before being overwritten by
the latest data and is usually sent to cloud or other data cen-
ter. Therefore, it is more difficult to locate where potential
evidence may exist. On the other hand, these resource-limited
devices may be in the absence of adequate security guarantee,
so that malicious users may easily modify or destroy the logs
and relevant data on the devices [9].
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC
from IEEE Xplore. Restrictions apply.
HOU et al.: SURVEY ON DIGITAL FORENSICS IN IoT 3
Fig. 2. IoT forensics paradigm of smart home.
5) Highly Heterogeneous: Based on different hardware,
software, and networks, IoT devices are heterogeneous with
multiple protocols, diverse data formats, and proprietary
interfaces. Types of data in IoT forensics may be diverse
in various vendor-specific formats. Heterogeneous devices
may call for different tools or methods for data collection,
examination, and analysis, which requires more efforts for
investigators. The contemporary forensic tools may not be able
to deal with every source of evidence, which calls for new
tools. New tools should be properly tested and assessed prior
to their use [5] because unreliable tools may lead to uncer-
tainty and loss, and affect the soundness of evidence and even
the final conclusion.
6) Special Security Characteristic: IoT bridges the gap
between the cyber world and the physical world, so that secu-
rity threats in the cyber world can bring safety threats to the
real-world and vice versa [10]. IoT enables the communica-
tion abilities to various kinds of devices (e.g., smart appliances,
connected vehicles, and personal health devices) and connects
them to the network, which may lead to broad attack faces. A
single IoT device can be used to compromise other connected
devices due to the connection between devices, which will
transfer or expand the impact and increase the complexity of
forensics. Moreover, due to the integration of the cyber world
and the physical world, IoT devices can be remotely controlled
to operate the physical world. Therefore, unsafe and insecure
operations on IoT devices may result in a real loss of services
and even the loss of life. There is a growing need for foren-
sics to reconstruct security/safety incidents or troubleshoot the
operational problems in IoT systems. And the security threat
that adversaries can remotely control the device to remove or
modify traces (e.g., logs and videos) or even destroy the device
may make the evidence fragile and compromise the integrity
of evidence.
D. Typical IoT Scene
Smart home is a typical application scenario in IoT includ-
ing three layers of a typical IoT architecture: 1) a sensing
layer; 2) a networking and data communication layer; and
3) an application layer.
A smart home system is usually composed of a hub,
multiple IoT devices, and a back-end server (e.g., a cloud), as
shown in Fig. 2. Thermostats, lightings, cameras, and voice
assistants are endpoint IoT devices in the sensing layer to
measure, collect, and process the state information associ-
ated with these things. These devices use wired or wireless
communication protocols to communicate in the network and
data communication layer. They can communicate through the
Internet via the hub or directly through a local network. The
hub can send the data from devices to the back-end cloud
for storage, processing, and application. Users can control the
devices or obtain status information of devices by sending
commands to the cloud through Apps on mobile phones or
Webs. Then the hub receives commands from the server and
sends them to the devices, so that devices will execute relevant
operations according to the commands. Devices may also col-
laborate with each other automatically according to predefined
conditions.
We will take this typical IoT scene as an example to illus-
trate in detail the digital forensics in the IoT environment from
different perspectives later.
III. LITERATURE REVIEW ON IOT FORENSICS
A. Literature Selection Process
In order to have a clear picture of digital forensics in the
IoT environment, this section provides an extensive literature
review of the research on IoT forensics. This article selection
strategy consists of three main stages.
1) Stage 1: Define the keywords to search relevant papers
from electronic databases (DBLP, IEEE Xplorer, and
Science Direct). Considering the alternatives and other
synonyms of essential components of the keywords, the
subsequent exploration string was defined:
(“Forensic” OR “Investigation” OR “Evidence”) AND
(“Things” OR “Internet of Things” OR “IoT” OR
“Smart”).
2) Stage 2: Select papers based on the title, publication
year, and language of them (only includes the papers
written in English). To ensure that only high-quality pub-
lications were included in the study, we focus on jour-
nal publications and conferences papers published by
Elsevier, IEEE, Springer, ACM, and Wiley. Moreover,
opinion-driven reports (editorials, commentaries, and
letters) and books were excluded.
3) Stage 3: Review the abstracts and full texts of the
selected papers to verify the relevance of these papers.
The cited information, abstracts, and keywords of the
papers were recorded for further analysis.
Finally, 58 papers published between 2010 and 2018 were
extracted through the three phases, as shown in Table I.
B. Overview of Existing Research on IoT Forensics
From the distribution of the papers by the year of publi-
cation from 2010 to 2018, there is a sharp increase number
of papers in 2018 and all the other years witness a grad-
ual increase. Research on IoT forensics has entered a new
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC
from IEEE Xplore. Restrictions apply.
4 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1,
JANUARY 2020
TABLE I
DISTRIBUTION OF EXISTING RESEARCH ON IOT
FORENSICS
period of significant growth since 2016 with the wide appli-
cation of IoT devices in production and life. The 58 papers
are classified under five categories including survey papers,
models/frameworks, forensic methods, forensic systems, and
forensic techniques/tools.
From 2010 to 2018, there was ongoing research on forensic
methods to provide guidelines for investigations on differ-
ent sources of evidence in IoT and explore feasible forensic
methods and techniques. The greater part of the work stud-
ies enabling forensic techniques and tools for the coming
new demands and challenges of digital forensics in IoT envi-
ronment, concerning evidence collection, examination, and
analysis.
Early work on IoT forensics was predominantly theoretical
in nature, and aimed to deal with issues about frameworks
and models. In 2013, Oriwoh et al. [2] first explored the
conceptual digital forensic models for IoT forensics to guide
forensic investigations involving the IoT, which provided the
basis for further research on forensic models and frameworks.
At the same time, they also explored the automated forensic
system that aims to make the IoT environment forensically
ready before potential cases occur [14]. The two research
efforts laid the foundation of research on IoT forensics. Since
then, there have been a great number of papers exploring
IoT forensic frameworks/models to guide procedures for rou-
tine forensic tasks and developing forensic systems to ensure
forensic readiness abilities for IoT.
Some survey papers [9], [46]–[48], [56], [57], [64] have
made a preliminary exploration of challenges in IoT forensics.
Chernyshev et al. [46] mainly focused on conceptual digi-
tal forensic models that can be applied to IoT environment.
Bréda et al. [48] analyzed the minimal functional forensic
requirements of IoT devices to provide reliable information.
The requirements are defined in the user data protection class
by the access control policy, the access control functions, the
data authentication, and integrity requirements of the stored
data to maintain a minimum level of data integrity in the IoT
environment. Losavio et al. [64] analyzed in detail the legal
concerns on data collection and analysis in IoT forensics.
There are also some surveys investigating IoT forensics in
different IoT applications. The works in [15], [29], [30], [42]
focus on forensic challenges associated with smart TVs,
health and fitness related devices, vehicles, and smart cities,
respectively.
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC
from IEEE Xplore. Restrictions apply.
HOU et al.: SURVEY ON DIGITAL FORENSICS IN IoT 5
In this article, we aim to outline the landscape of digital
forensics in the IoT paradigm to provide guidance for forensic
practitioners and researchers. We conduct a systematic review
of the research status of IoT forensics under a 3-D framework
and indicate future research directions.
IV. LANDSCAPE OF IOT FORENSICS
IoT forensics is a branch of digital forensics that carries out
digital forensics in the IoT environment. Forensic researchers
and practitioners have tried to make digital forensics applicable
to the context of IoT. Therefore, IoT forensics still follows the
principles of digital forensics. It consists of two basic aspects.
One is the forensic investigation itself and the other is the
ability that enables the forensic investigation.
Within a forensic investigation process, data is extracted
from various media, then is transformed into information, and
finally becomes evidence that can be legally acceptable in a
court of law [4]. Therefore, from the perspective of foren-
sic investigations, there are two core questions, including how
to obtain evidence and where to find evidence. The tempo-
ral dimension explores how to generate legally accepted and
reliable evidence in line with a standard forensic process in
IoT environment, including collection, examination, analysis,
and reporting. The spatial dimension focuses on completely
identifying potential sources of evidence, that is, to answer
where to find evidence. Case-related information in IoT can
be collected from different data sources that can be grouped
into three types, i.e., device, network, and cloud, based on the
typical IoT architecture.
On the other hand, technical abilities to enable forensic
investigations also play important roles in the landscape of IoT
forensics. The technical dimension aims to explore appropriate
techniques/tools for data collection, examination, and analysis.
As the forensic environment changes, IoT poses challenges to
existing forensic techniques/tools that need to update to deal
with the forensics task in IoT environment. Based on our sur-
vey, contemporary research on technical preparations for IoT
forensics can be broadly divided into three categories includ-
ing forensic readiness techniques, evidence extraction tools or
techniques for different data sources, and some other forensic
techniques to resolve challenges in IoT forensics.
Moreover, IoT forensics is under the legal principle. All
activities and actions within investigations start with autho-
rization and must comply with laws and regulations in the
jurisdictions.
We then survey the literature on forensics in IoT environ-
ment under a unified framework consisting of three orthogonal
coordinates, as shown in Fig. 3. We try to illustrate in detail
various aspects of IoT forensics, which may help forensic
researchers and practitioners with a systematic understanding
of this domain.
V. IOT FORENSICS FROM THE TEMPORAL DIMENSION
From the temporal dimension, a forensic investigation in IoT
environment should be conducted within the standard process,
so that the collected evidence can be admissible on the court.
Fig. 3. Landscape of IoT forensics with three dimensions.
A. Forensic Process in Smart Home Scene
When performing a forensic investigation in a smart home
scene described in Section II, investigators need to identify
objects of forensic interest (OOFIs) on the spot first, includ-
ing smart camera, voice assistants and some other appliances.
These smart appliances on the spot connect to network devices
(i.e., smart hub) to communicate with the external environ-
ment. So network traffic, cloud, and companion Apps on cell
phones or PCs also need to be included in the investigation.
First responders should consider the possible need to col-
lect volatile data, which can be collected only from a live
system that has not been rebooted or shut down since the
event occurred.
Then, investigators need to examine the data obtained from
OOFIs using specialized forensic toolkits to screen out the data
related to the case. Therefore, investigators need to parse the
data of different formats, which not only includes the data with
relatively uniform formats from the phones and PCs but also
the data with proprietary formats from various IoT devices.
Next, investigators correlate the data from different sources
to identify people, places, items, events, and their relations
to construct the facts of the case. For example, thermostat
readings and lighting records may prove the presence of users
when someone claimed he was out of the home and videos
from cameras may show the individuals’ behaviors at home.
The three phases above can be iterative because new sources
of evidence could be revealed during the analysis of data.
Finally, investigators need to review the actions performed
in the above three phases to ensure that all evidence reaches
a definitive explanation of what happened. They also need to
report in detail the results of the analysis, which may include
describing the actions already performed, explaining how tools
and procedures were selected, and determining what other
actions need to be performed.
B. Research on Forensic Models for IoT Forensics
As a branch of digital forensics, there is a consensus that IoT
forensics follows the four-phase forensic process. However,
there is no accepted digital forensic model that can help to con-
duct digital investigations in an IoT-based environment. Some
research aims to explore general and standard forensic mod-
els to facilitate consistent, effective, and accurate actions in
forensic investigations involving IoT.
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC
from IEEE Xplore. Restrictions apply.
6 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1,
JANUARY 2020
Oriwoh et al. [2] proposed a 1-2-3 zone approach and a nest-
best-thing (NBT) approach for evidence acquisition within the
IoT domain. The 1-2-3 zone approach divided the investigation
area into three zones: 1) the internal network; 2) the middle;
and 3) the external network. The evidence extraction process in
each zone can be conducted in parallel. The NBT triage model
assists with the identification of additional sources of evidence
when the primary source is unavailable. The two models are
of guiding significance in the identification stage in IoT-based
investigations.
Perumal et al. [22] have proposed a top-down model that
follows the standard operating procedures (SoPs). During the
investigation, this model starts with authorization and plan-
ning. It introduces machine to machine (M2M) communication
and integrates 1-2-3 zone model and triage model with the
general forensic process to deal with IoT-based investiga-
tions. Although this paper gives a complete model covering
each stage of the digital forensic process, it mainly focuses
on identification without dealing with analysis and other
processes.
Rahman et al. [26] have highlighted the importance of
forensic readiness and proposed a forensic-by-design frame-
work for cyber-physical cloud systems (CPCSs) based on
ISO/IEC 27043:2015 [66]. The framework has defined the
design principles of CPCS to facilitate forensic investigations.
The principles comprise six factors, including risk manage-
ment principles and practices, forensic readiness principles
and practices, incident-handling principles and practices,
laws and regulations, CPCS hardware and software require-
ments, and industry-specific requirements.
DFIF-IoT [27] is a complete forensic framework to guide
digital investigations in IoT-based infrastructures. The frame-
work is composed of proactive process, IoT forensics, reac-
tive process, and concurrent process. Proactive process aims
to make IoT environment forensically ready. IoT forensics
consists of cloud forensics, network forensics, and device
level forensics. Reactive process is consistent with the tra-
ditional forensic investigation process and will be performed
in response to an incident of forensic concerns. Concurrent
process is conducted throughout the whole process involv-
ing obtaining authorization, documentation, preservation of
the chain of custody, physical investigation, and interaction
with physical investigations. Under the consideration of a
complex set of relationships among different IoT entities,
IDFIF-IoT [65] extended DFIF-IoT framework. Discussion of
interactions in IoT ecosystems can assist with the planning
process for gathering, storing, and handling digital evidence
in advance before investigation. The two frameworks cover the
complete forensic process, and are insightful in standardiza-
tion of IoT-based forensic process. However, the recognition
of the frameworks still needs to be discussed further by all
stakeholders.
FSAIoT [41] pointed out that states of IoT devices or the
changes of states could be of forensic value. It proposed a
model for the state acquisition of plenty of IoT devices to
deal with forensics on IoT devices. This paper implemented
the prototype of the framework, which can acquire states of
devices from devices, clouds, and controllers, to prove its
availability.
Zia et al. [1] proposed an application-specific digital foren-
sic model for IoT forensics. The model provides guidelines
for forensic investigations …

More Related Content

Similar to · QuantitativeQuantitative vs. Qualitative Analysis Assignment.docx

Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
Shyam Goyal
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
jeffevans62972
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
odiliagilby
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
Samir SEHIL
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
Aki Koivu
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
aulasnilda
 

Similar to · QuantitativeQuantitative vs. Qualitative Analysis Assignment.docx (20)

A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
sample assignment
sample assignmentsample assignment
sample assignment
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
Privacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkPrivacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor network
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 

More from alinainglis

· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docx· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docx
alinainglis
 
· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docx· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docx
alinainglis
 
· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docx· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docx
alinainglis
 
· How many employees are working for youtotal of 5 employees .docx
· How many employees are working for youtotal of 5 employees  .docx· How many employees are working for youtotal of 5 employees  .docx
· How many employees are working for youtotal of 5 employees .docx
alinainglis
 
· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx
alinainglis
 
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
alinainglis
 
· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docx· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docx
alinainglis
 
· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docx· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docx
alinainglis
 
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
alinainglis
 
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
alinainglis
 
· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docx· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docx
alinainglis
 
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
alinainglis
 

More from alinainglis (20)

· Present a discussion of what team is. What type(s) of team do .docx
· Present a discussion of what team is. What type(s) of team do .docx· Present a discussion of what team is. What type(s) of team do .docx
· Present a discussion of what team is. What type(s) of team do .docx
 
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
 
· Prepare a research proposal, mentioning a specific researchabl.docx
· Prepare a research proposal, mentioning a specific researchabl.docx· Prepare a research proposal, mentioning a specific researchabl.docx
· Prepare a research proposal, mentioning a specific researchabl.docx
 
· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docx· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docx
 
· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docx· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docx
 
· Please use Firefox for access to cronometer.com16 ye.docx
· Please use Firefox for access to cronometer.com16 ye.docx· Please use Firefox for access to cronometer.com16 ye.docx
· Please use Firefox for access to cronometer.com16 ye.docx
 
· Please share theoretical explanations based on social, cultural an.docx
· Please share theoretical explanations based on social, cultural an.docx· Please share theoretical explanations based on social, cultural an.docx
· Please share theoretical explanations based on social, cultural an.docx
 
· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docx· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docx
 
· How many employees are working for youtotal of 5 employees .docx
· How many employees are working for youtotal of 5 employees  .docx· How many employees are working for youtotal of 5 employees  .docx
· How many employees are working for youtotal of 5 employees .docx
 
· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx
 
· How does the distribution mechanism control the issues address.docx
· How does the distribution mechanism control the issues address.docx· How does the distribution mechanism control the issues address.docx
· How does the distribution mechanism control the issues address.docx
 
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
 
· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docx· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docx
 
· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docx· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docx
 
· Find current events regarding any issues in public health .docx
· Find current events regarding any issues in public health .docx· Find current events regarding any issues in public health .docx
· Find current events regarding any issues in public health .docx
 
· Explore and assess different remote access solutions.Assig.docx
· Explore and assess different remote access solutions.Assig.docx· Explore and assess different remote access solutions.Assig.docx
· Explore and assess different remote access solutions.Assig.docx
 
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
 
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
 
· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docx· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docx
 
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
 

Recently uploaded

Recently uploaded (20)

AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 

· QuantitativeQuantitative vs. Qualitative Analysis Assignment.docx

  • 1. · Quantitative Quantitative vs. Qualitative Analysis Assignments For this assignment, you will need to perform a quantitative analysis on the below scenario. Please write your response in a brief APA formatted report. Quantitative Analysis You are the manager of desktop support for NASA. You are responsible for purchasing and managing all of the laptops NASA distributes to employees. There are 700 laptops currently in service. All of the laptops randomly leave the building and serve a mobile workforce. Read the following articles your CIO brought to you for consideration: http://www.pcworld.com/article/251318/48_nasa_laptops_stolen _in_two_years_a_case_for_better_encryption_practices.html http://www.pcworld.com/article/181124/laptops_that_go_ghost. html Compute the SLE, ARO, ALE and safeguard value based on the information in these articles for a report your CIO plans to submit as a solution. For the safeguard value, find and price an appropriate physical and software solution(s) to safeguard theft and data loss. Once you pick a product, include a link to the page for pricing and item description. Present the realized savings in your report and the benefits of the solution you choose for safeguarding the laptops. Don’t forget to include your equations for ARO, ALE, safeguard value and realized savings calculations. Qualitative Quantitative vs. Qualitative Analysis Assignments For this assignment, you will need to perform a qualitative
  • 2. analysis on the below scenario. Please write your response in a spreadsheet. Qualitative Analysis For this part of the assignment, you can use the work you performed for last week. Take those 7 risks and arrange them into a spreadsheet. Perform a probability assessment and write about the impact of the risk for each of the 7, based on the geographical location of last week's assignment. Use the following format: Category Probability (0.0-1.0) Impact (0-100) Risk Level (P x I) Description Zombies .02 90 1.8 Zombie Apocalypse causes wide spread panic and physical security threats to staff, property and business operations.
  • 3. 2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 11, NOVEMBER 2019 Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things Juntao Chen , Student Member, IEEE, and Quanyan Zhu, Member, IEEE Abstract— With the increasing connectivity enabled by the Internet of Things (IoT), security becomes a critical concern, and users should invest to secure their IoT applications. Due to the massive devices in the IoT network, users cannot be aware of the security policies taken by all its connected neighbors. Instead, a user makes security decisions based on the cyber risks that he perceives by observing a selected number of nodes. To this end, we propose a model which incorporates the limited attention or bounded rationality nature of players in the IoT. Specifically, each individual builds a sparse cognitive network of nodes to respond to. Based on this simplified cognitive network representation, each user then determines his security management policy by minimizing his own real-world security cost. The bounded rational decision-makings of players and their cognitive network formations are interdependent and thus should be addressed in a holistic manner. We establish a games-in- games framework and propose a Gestalt Nash equilibrium (GNE) solution concept to characterize the decisions of agents and quantify their risk of bounded perception due to the limited attention. In addition, we design a proximal-based iterative
  • 4. algorithm to compute the GNE. With case studies of smart communities, the designed algorithm can successfully identify the critical users whose decisions need to be taken into account by the other users during the security management. Index Terms— Risk management, bounded rationality, cogni- tive networks, Internet of Things, smart community. I. INTRODUCTION RECENT years have witnessed a significant growthof urban population. As the growth continues, cities need to become more efficient to serve the surging pop- ulation. To achieve this objective, cities need to become smarter with the integration of information and communication techniques (ICTs) and urban infrastructures. Driven by the advances in sensing, computing, storage and cloud technolo- gies, the Internet of Things (IoT) plays a central role in supporting the development of smart city. Though IoT enables a highly connected world, the security of IoT becomes a critical concern. There are 5.5 million new things connected Manuscript received May 21, 2018; revised March 4, 2019; accepted April 9, 2019. Date of publication April 15, 2019; date of current ver- sion July 2, 2019. This work was supported in part by the National Sci- ence Foundation under Award SES-1541164 and Award ECCS- 1847056, in part by the Army Research Office (ARO) under Grant W911NF1910041, and in part by a grant through the Critical Infrastructure Resilience Institute (CIRI). The associate editor coordinating the review of this
  • 5. manuscript and approving it for publication was Prof. Karen Renaud. (Corresponding author: Juntao Chen.) The authors are with the Department of Electrical and Computer Engi- neering, Tandon School of Engineering, New York University, Brooklyn, NY 11201 USA (e-mail: [email protected]; [email protected]). Digital Object Identifier 10.1109/TIFS.2019.2911112 Fig. 1. IoT-enabled interconnected smart community. The connectivity, on one hand, enhances the situational awareness of smart homes. However, it increases the cyber risks of the community. Hence, the cyber security of each household not only dependents on its own risk management strategy but also the ones of connected neighbors. every day in 2016, as we head toward more than 20 billion by 2020 [1]. These IoT devices come from different manufac- turers, and they have heterogeneous functionalities and secu- rity configurations and policies. No uniform security standards are used for IoT devices as they are developed using different system platforms for various functionalities. Moreover, due to the connections between IoT devices, the security of one device is also dependent on the security of other devices to which it connects. Therefore, the heterogeneity and the interconnectivity of massive heterogeneous IoT have created significant challenges for security management. Fig. 1 depicts a highly connected smart community enabled by IoT devices. Each household needs to take into account the cyber risks coming from their connected neighbors when securing their
  • 6. devices. In cyber networks, security management and practices of users are often viewed as the weakest link [2]. The lack of security awareness and expertise at the user’s end creates human-induced vulnerabilities that can be easily exploited by an adversary, exacerbating the insecurity of IoT. To this end, it is critical to enhance the security by strengthening security management in a decentralized way. Hence, in the IoT, each device owner or system manager needs to allocate resources (e.g. human resources, computing resources, invest- ments or cognition) to secure his applications. For example, the smart building operator can spend resources on upgrading the hardware, hiring staff members for network monitoring and forensics, and developing tailored security solutions to 1556-6013 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/i ndex.html for more information. Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC from IEEE Xplore. Restrictions apply. https://orcid.org/0000-0001-7726-4926 CHEN AND ZHU: INTERDEPENDENT STRATEGIC SECURITY RISK MANAGEMENT WITH BOUNDED RATIONALITY 2959 the smart building. A smart home user, on the other hand, can safely configure its network and regularly updates its software and password of the IoT devices as illustrated in Fig. 1.
  • 7. The devices in the IoT networks and their interconnections can be modeled as nodes and links, respectively. The security policy of one device can have an impact on the security risk of nodes that are connected to it. Since various users own different devices, the security management in IoT is decentralized in nature. Therefore, the process of decentralized security decision-making can be modeled as a game problem in which each user strategically allocates his resources to secure the devices [3]. In this game, the users’ risks are reduced when their connected neighbors are of high-level security. Due to the complex and massive connections, users cannot be aware of the security policies taken by all its connected neighbors. Instead, a user can only make security decisions based on the cyber risk he perceives by observing a selected number of nodes. This fact indicates that the game model needs to take into account the bounded rationality of players [4]. Therefore, in the game framework, we use a cognition vector representing the observation structure of each IoT user. Specifically, a sparser cognition vector represents a user with weaker cognition ability, and he observes a smaller number of other users’ behaviors when deciding his strategy. Thus, the limited attention nature of users creates a bounded perception of cyber risks. In the established bounded rational game model, the users need to make security management decisions as well as design their cognition networks in a holistic manner. In order to achieve this goal, we define a new solution concept called Gestalt Nash equilibrium (GNE) to capture the cognitive network formation and the security management under the bounded rationality simultaneously. The analysis of the GNE provides a quantitative method to understand the risk of mas- sive IoTs and gives tractable security management policies. We further design a proximal-based iterative algorithm to compute the GNE of the game. The GNE resulting from
  • 8. the algorithm reveals several typical phenomena that match well with the real-world observations. For example, when the network contains two groups of users, then under the limited attention, all users will allocate their cognition resources to the same group which demonstrates the law of partisanship. Further, in a heterogeneous massive IoT, the equilibrium successfully identifies the set of agents that are invariably paid attention to by other users, demonstrating the phenomenon of attraction of the mighty. Since the framework predicts the high-level systemic risk of the IoT network, it also can be used to inform the design of security standards and incentive mechanisms, e.g., through contracts and cyber insurance. The developed security management model provides an essential framework to assess IoT security risks when applied to various applications. For example, in smart home commu- nities, the households are connected together to share hetero- geneous information, e.g., electricity prices and temperature readings through smart meters, and real-time information of items in local stores and shops by wireless sensors. The con- nections of IoT devices thus create security interdependencies between households. Another broader application lies in the different components in smart cities. Due to the interconnec- tivity between large-scale infrastructures including the trans- portation, power grids, and communications, the manager of each sector needs to take into account the cyber risks coming from other components when adopting security solutions. The contributions of this paper are summarized as follows: 1) We propose a holistic framework to investigate the security management of users with bounded rationality in the IoT networks. 2) We model the cognition of users with a sparse vector
  • 9. and quantify users’ risk of bounded perception resulting from the underperceived cyber threats in the network. 3) We design a proximal-based algorithm to compute the GNE which contains security management strategy and cognitive network of agents. The algorithm discovers several phenomena including emergence of partisanship, filling the inattention, and attraction of the mighty. 4) We apply the proposed model to a smart community, and demonstrate that the designed algorithm can identify the most critical households in the network. A. Related Work Security management has been investigated in various research fields including computer networks [5], communica- tions [6], cloud computing [7] and infrastructures [8]. With the advances in ICTs, a growing number of works have focused on the emerging critical issue of IoT security [9]–[11]. Due to the interconnectivity between different agents, the security of one agent is also dependent on its connected ones which gives rise to the notion of “interdependent security” [12]. The authors in [13]–[15] have further investigated the security interdependencies in multilayer cyber-physical systems. Games over networks have caught a lot of attention recently especially from the economics perspective [16]–[19]. The couplings between players in the network can be either in a strategic exclusive or strategic complement manner. Based on the features of security management in IoT, our problem falls into the latter class. For the engineering applications, the authors in [8], [20] have studied the resource allocation game over interdependent critical infrastructures where both players aim to increase the connectivity of the network. Huang et al. [21], [22] have adopted a stochastic Markov
  • 10. game model to design resilient operating strategies for multi- layer networks. Zhu et al. [23] have proposed a game-theoretic framework for collaborative intrusion detection systems through resource management to mitigate network cyber threats. Our work differs from [23] in that we take into account the cognitive factors of human behaviors during decision making. Humans with limited knowledge or cognitive resources are bounded rational, since they cannot pay attention to all the information [24], [25]. Gabaix has proposed a “sparse max” operator to model the limited attention of players in which each agent builds a simplified model of the network based on an l1 norm [4]. Our work leverages on the established “sparse max” operator and formulates a constrained game program to capture the bounded cognition ability of players in Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC from IEEE Xplore. Restrictions apply. 2960 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 11, NOVEMBER 2019 TABLE I NOMENCLATURE the IoT. In addition, we further consider the risk management of each user based on their underperceived cyber risks over the network. B. Organization of the Paper
  • 11. The rest of the paper is organized as follows. Section II formulates a security management game over IoT networks with bounded rational players. Section III analyzes the prob- lem. Section IV designs a proximal-based iterative algorithm to compute the GNE. Case studies are given in Section V, and Section VI concludes the paper. C. Summary of Notations For convenience, we summarize the notations used in the paper in Table I. Note that notations associated with ∗ refer to the value at equilibrium. Furthermore, notations with index k stands for its value at step k during the iterative updates. II. PROBLEM FORMULATION In this section, we formulate a problem involving strategic security decision making and cognitive network formation of players in the IoT networks. A. Security Management Game Over Networks In an IoT user network including a set N of nodes,1 where N := {1, 2, . . . , N}, each node can be seen as a player 1The terms of node, agent and player refer to the user in the IoT, and they are used interchangeably. that makes strategic decisions on the security management to secure their IoT devices. For instance, in Fig. 1, each smart home is a player securing their smart things to mitigate the cyber threats. We define U := {u1, . . . , uN } by the decision profile of all the players. Specifically, ui is a one-dimensional decision variable representing player i ’s security management effort. For convenience, we denote u−i := U {ui }. The
  • 12. objective of player i , i ∈ N , is to minimize his security risk strategically by taking the costly action ui . We define by Fi1 : R+ → R+ the cost of security management effort of player i which is an increasing function of ui . The corresponding benefit of security management is captured by a function Fi2 : R+ → R+. Intuitively, a larger ui yields a higher return, and hence Fi2 is monotonically increasing. Due to the interconnections in the IoT, the risk of player i is also dependent on his connected users. Then, we use a function Fi3 : R+ × RN−1+ → R+ to represent the influence of player i ’s connected users on his security. The coupling between players in the IoT is in a strategic complement fashion with respect to the security decisions. More specifically, a larger security investment u j of player j , a connected node of player i , decreases the cyber risks of player i as well. Therefore, the cost function of player i can be expressed as the following form: J i (ui , u−i ) = Fi1(ui ) − Fi2(ui ) − Fi3(ui , u−i ), (1) where J i : R+ × RN−1+ → R. To facilitate the analysis and design of security risk management strategies, we spec- ify some appropriate forms of functions in (1). In the fol- lowing, we focus on player i taking the quadratic form: Fi1(ui ) = 12 Riii u2i , Fi2(ui ) = ri ui , and Fi3(ui , u−i ) =∑ j �=i, j∈ N Rii j ui u j . Thus, (1) can be detailed as J i (ui , u−i ) = 1 2 Riii u 2 i − ri ui − ∑
  • 13. j �=i, j∈ N Rii j ui u j , (2) where Riii > 0, ri > 0, ∀ i , and Rii j ≥ 0, ∀ j �= i, i ∈ N . Note that parameters Rii j , i, j ∈ N , represent the risk dependence network of player i in the IoT, and the value of Rii j indicates the strength of risk influence of player j on player i which is given as a prior. The first term 12 R i ii u 2 i in (2) is the cost of security management with an increasing marginal price. The second term ri ui denotes the corresponding payoff of cyber risk reduction. Then, the first two terms capture the fact that increasing a certain level of cyber security becomes more difficult in a secure network than a less secure one. The last term ∑N j=1, j �=i Rii j ui u j is the aggregated security risk effect from connected users of player i . Specifically, the structure of Fi3 in ui and u j indicates that the risk measure J i of player i decreases linearly with respect to user j ’s action. Hence, in the established model, larger investment from a user helps reduce cyber risk influence in a linear way. We have following assumption on the security influence parameters. Assumption 1: Riii > ∑
  • 14. j �=i, j∈ N Rii j , ∀ i ∈ N . Assumption 1 has a natural interpretation which indicates that the security of a user is mainly determined by his own strategy rather than other users’ decisions in the IoT network. Moreover, based on the heterogeneous influence networks Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC from IEEE Xplore. Restrictions apply. CHEN AND ZHU: INTERDEPENDENT STRATEGIC SECURITY RISK MANAGEMENT WITH BOUNDED RATIONALITY 2961 characterized by Assumption 1, each node designs its own security investment strategy which enables the decentralized decision-making. The strategies of nodes are interdependent due to the coupling between their cost functions shown in (2). Through the first order optimality condition (FOC), we obtain Riii ui − ∑ j �=i, j∈ N Rii j u j − ri = 0, ∀ i ∈ N . (3) Putting (3) in a matrix form yields ⎡ ⎢ ⎢
  • 15. ⎢ ⎣ R111 −R112 · · · −R11N−R221 R222 · · · −R22N ... ... . . . ... −RNN1 −RNN2 · · · RNN N ⎤ ⎥ ⎥ ⎥ ⎦ ⎡ ⎢ ⎢ ⎢ ⎣ u1 u2 ... uN ⎤ ⎥
  • 16. ⎥ ⎥ ⎦ = ⎡ ⎢ ⎢ ⎢ ⎣ r1 r2 ... rN ⎤ ⎥ ⎥ ⎥ ⎦ ⇔Ru = r, (4) where r := [ri ]i∈ N , u := [ui ]i∈ N . For convenience, we denote this security management game by G. One solution concept of game G is Nash equilib- rium (NE) which is defined as follows.
  • 17. Definition 1 (Nash Equilibrium of Game G [3]): The strt- egy profile u∗ = [u∗ i ]i∈ N constitutes a Nash equilibrium of game G if J i (ui , u∗ −i ) ≥ J i (u∗ i , u∗ −i ), ∀ i ∈ N , ∀ ui ∈ Ui . The NE of game G yields strategic security management policies of players under the condition that they can perceive all the cyber risks in the IoT network. B. Bounded Rational Security Management Game In reality, the users in IoT are connected with numerous other agents. For example, a single household can be con- nected with a number of other houses in terms of various types of IoT products in the smart communities. Therefore, when making security management strategies, each user may not be capable to observe all its connected neighbors. Instead, a user can only respond to a selected number of other players’ decisions. Then, this bounded rational response mechanism creates a cognitive network formation process for the players in the network. Specifically, player i ’s irrationality is captured by a vector mi := [mij ] j �=i, j∈ N , mij ∈ [0, 1], which stands for the attention network that player i builds. When mij = 0, user i pays no attention to user j ’s behavior; when mij = 1, user i observes the true value of security management u j of user j . The value that mij admits between 0 and 1 can be interpreted as the trustfulness of user i on the perceived u j . Another interpretation of mij can be the probability that user i observes the behavior of user j at each time instance on the security investment over a long period. Hence, the decision of player j perceived by player i becomes ucij = mij u j . Then, player i minimizes the modified cost function with bounded rationality defined as: J̃ i (ui , u ci−i , m
  • 18. i ) = 1 2 Riii u 2 i − ri ui − ∑ j �=i, j∈ N mij R i i j ui u j = 1 2 Riii u 2 i − ri ui − ∑ j �=i, j∈ N Rii j ui u ci j , (5) where J̃ i : R+ × RN−1+ × [0, 1]N−1 → R. The FOC of (5) gives Riii ui − ∑ j �=i, j∈ N Rii j u
  • 19. ci j − ri = 0, ∀ i ∈ N , which is equivalent to ⎡ ⎢ ⎢ ⎢ ⎣ R111 −m12 R112 · · · −m1N R11N−m21 R221 R222 · · · −m2N R22N ... ... . . . ... −mN1 RNN1 −mN2 RNN2 · · · RNN N ⎤ ⎥ ⎥ ⎥ ⎦ ⎡ ⎢ ⎢ ⎢ ⎣
  • 21. ⇔Rsu = r. (6) The bounded rational best-response of player i , i ∈ N , then becomes ui = B Ri (uci−i ) = 1 Riii ⎛ ⎝ ∑ j �=i, j∈ N Rii j u ci j + ri ⎞ ⎠ , (7) where ucij = mij u j . We denote the security management game of players with limited attention by G̃ . Comparing with the solution concept NE of game G, the one of game G̃ is generalized to bounded rational Nash equilibrium (BRNE). The formal definition of BRNE is as follows. Definition 2 (Bounded Rational Nash Equilibrium of Game G̃ ): With given cognition vectors mi , ∀ i ∈ N , the strategy profile u∗ = [u∗ i ]i∈ N constitutes a BRNE of
  • 22. game G̃ if J̃ i (ui , u∗−i , mi ) ≥ J̃ i (u∗ i , u∗ −i , mi ), ∀ i ∈ N , ∀ ui ∈ Ui . Note that the cognitive network each user built has an impact on the BRNE of game G̃ . Hence, how the users determine the cognition vector mi , i ∈ N , becomes a critical issue. In the ensuing section, we introduce the cognitive network formation of players in the IoT. C. Cognitive Network Formation Due to the massive connections in IoT, each user builds a sparse cognitive network containing the agents to observe. To this end, the real cost of user i by taking the bounded rationality into account becomes J i (B Ri (uci−i ), u−i ) = 1 2Riii ⎛ ⎝ ∑ j �=i, j∈ N Rii j u ci j + ri ⎞ ⎠
  • 23. 2 − ∑ k �=i,k∈ N ⎡ ⎣ 1 Riii Riik uk ⎛ ⎝ ∑ j �=i, j∈ N Rii j u ci j + ri ⎞ ⎠ ⎤ ⎦ − ri Riii
  • 24. ⎛ ⎝ ∑ j �=i, j∈ N Rii j u ci j + ri ⎞ ⎠ = 1 2 ∑ j �=i, j∈ N ∑ k �=i,k∈ N 1 Riii Rii j R i ik u ci
  • 25. j u ci k − 1 2Riii (ri ) 2 − ∑ k �=i,k∈ N ⎛ ⎝ ∑ j �=i, j∈ N ucij R i i j ⎞ ⎠ 1 Riii Riik uk
  • 26. − ∑ k �=i,k∈ N 1 Riii ri R i ik uk . Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC from IEEE Xplore. Restrictions apply. 2962 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 11, NOVEMBER 2019 Incorporating the cognition vector mi into the real cost of player i further yields J i (B Ri (uci−i ), u−i ) = 1 2 ∑ j �=i, j∈ N ∑
  • 27. k �=i,k∈ N mij 1 Riii Rii j R i ikm i ku j uk − 1 2Riii (ri ) 2 − ∑ k �=i,k∈ N ∑ j �=i, j∈ N mij 1 Riii Rii j R
  • 28. i iku j uk − ∑ k �=i,k∈ N 1 Riii ri R i ik uk . (8) Recall that each user aims to minimize the security risk based on the risks he perceives. Thus, by considering the real cost induced by the bounded rationality constraint, the strategic cognitive network formation problem of player i can be formulated as mi∗ = arg min mij , j �=i, j∈ N J i (B Ri (uci−i ), u−i ) + αi‖mi‖1 = arg min mij , j �=i, j∈ N 1 2 ∑
  • 29. j �=i, j∈ N ∑ k �=i,k∈ N 1 Riii Rii j R i ik u j ukm i j m i k − ∑ j �=i, j∈ N ∑ k �=i,k∈ N 1 Riii Rii j R i ikuku j m
  • 30. i j + αi‖mi‖1 = arg min mij , j �=i, j∈ N 1 2 mi T �i mi − eTN−1�i mi + αi‖mi‖1, where �i := [�ij k] j �=i,k �=i, j∈ N ,k∈ N , �ij k = 1Riii R i i j R i iku j uk , eN−1 is an N − 1-dimensional column vector with all one entries, and αi is a weighting factor capturing the unit cost of cognition of player i and it can be tuned to match with experimental data. The term ‖mi‖1 is a convex relaxed version of ‖mi‖0 which approximately maintains the sparse property of player i ’s cognitive network [26], [27]. The integrated term αi‖mi‖1 can be interpreted as the cognitive cost of user i . Therefore, for player i , we need to solve the following constrained optimization problem: min mij , j �=i, j∈ N
  • 31. 1 2 mi T �i mi − eTN−1�i mi + αi‖mi‖1 s.t. 0 ≤ mij ≤ 1, j �= i, j ∈ N , (Risk perception), (9) where the constraints mij ∈ [0, 1], ∀ j �= i , indicate the risk perception behavior of user i . The number of cognitive links that player i can form is generally a positive integer, i.e., ‖mi‖1 = βi ∈ N+. Note that βi here and αi in (9) have the same interpretation which both quantify the cognition ability of player i . Then, by choosing αi strategically, the problem in (9) is equivalent to the following problem: min mij , j �=i, j∈ N 1 2 mi T �i mi − eTN−1�i mi s.t. 0 ≤ mij ≤ 1, j �= i, j ∈ N , (Risk perception), ‖mi‖1 = βi , (Limited attention), (10) where βi ∈ N+ ≤ N − 1 is the total number of links that player i can form in his cognitive network, quantifying his
  • 32. Fig. 2. IoT user and cognitive network-of-networks. Users make strategic security management decisions in the IoT network as well as determine their cognitive networks. The security management game in layer G2 and the cognitive network formation game in layer G1 are interdependent which create a games-of-games framework. limited attention. Simulation studies in Section V reflect that considering ‖mi‖1 = βi yields sparser cognitive networks. Note that we still solve (9) by selecting a proper αi which yields equivalent (9) and (10). D. Gestalt Nash Equilibrium The formulated security management under bounded ratio- nality problem boasts a games-of-games structure. The users make decisions strategically in the IoT network as well as form their cognitive networks selfishly. The security man- agement game and cognitive network formation game are interdependent. Therefore, the cognitive and IoT user layers shown in Fig. 2 constitute a network-of-networks framework. In this paper, we aim to design an integrated algorithm to design the cognitive networks and determine the security risk management decisions of users in a holistic manner. To this end, we present the solution concept, Gestalt Nash equilibrium, of the bounded rational security risk management game as follows. Definition 3 (Gestalt Nash Equilibrium): The Gestalt Nash equilibrium (GNE) of the security risk management game under bounded rationality is a profile (mi∗ , u∗ i ), ∀ i ∈ N , that satisfies
  • 33. J̃ i (u∗i , u∗−i , mi∗)≤ J̃ i (ui , u∗ −i , mi ), ∀ ui ∈ Ui , ∀ mi ∈ [0, 1]N−1. At the GNE, all the players in the network do not change their action ui and cognition vector mi , ∀ i ∈ N , simultaneously. Remark: The strategic security management profile u∗ = [u∗ i ]i∈ N at GNE is also a BRNE. In the following, we aim to analyze the GNE of the game and compute it by designing algorithms. III. PROBLEM ANALYSIS We first analyze the convergence of the bounded rational best-response dynamics of players in Section II-B. Then, we quantify the risk of bounded perception due to limited attention of players. We further reformulate the cognitive network formation problem presented in Section II-C. A. Bounded Rational Best Response Dynamics Based on Section II-B, the bounded rational best-response dynamics of player i under cognitive network mi , i ∈ N , can Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at … IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1 A Survey on Digital Forensics in Internet of Things Jianwei Hou , Yuewei Li, Jingyang Yu, and Wenchang Shi
  • 34. Abstract—Internet of Things (IoT) is increasingly permeat- ing peoples’ lives, gradually revolutionizing our way of life. Due to the tight connection between people and IoT, now civil and criminal investigations or internal probes must take IoT into account. From the forensic perspective, the IoT environment con- tains a rich set of artifacts that could benefit investigations, while the forensic investigation in IoT paradigm may have to alter to accommodate characteristics of IoT. Therefore, in this article, we analyze the impact of IoT on digital forensics and systematize the research efforts made by previous researchers from 2010 to 2018. We sketch the landscape of IoT forensics and examine the state of IoT forensics under a 3-D framework. The 3-D frame- work consists of a temporal dimension, a spatial dimension, and a technical dimension. The temporal dimension walks through the standard digital forensic process while the spatial dimension explores where to identify sources of evidence in IoT environ- ment. These two dimensions attempt to provide principles and guidelines for standardizing digital investigations in the context of IoT. The technical dimension guides a way to the exploration of tools and techniques to ensure the enforcement of digital forensics in the ever-evolving IoT environment. Put together, we present a holistic overview of digital forensics in IoT. We also highlight open issues and outline promising suggestions to inspire future study. Index Terms—Cybercrime, digital forensics, Internet of Things (IoT). I. INTRODUCTION
  • 35. W ITH the Internet of Things (IoT) permeating our dailylives, people are becoming more reliant on various kinds of smart IoT services, leaving traces on various IoT devices. These rich repositories of digital traces in IoT envi- ronment can provide insight into people’s daily activities in their home and elsewhere, which are of great value to digital forensics [1]. On the other hand, the number of both civil and criminal cases involving IoT devices or services has grown. IoT devices may not only be targets for attacks, but also tools for committing crimes. Security vulnerabilities in IoT systems can be leveraged to remotely control the systems, for exam- ple, to control the accelerator and brake system of the smart Manuscript received May 9, 2019; revised July 9, 2019; accepted August 26, 2019. Date of publication September 11, 2019; date of current version January 10, 2020. This work was supported in part by the National Natural Science Foundation of China under Grant 61472429, in part by the Natural Science Foundation of Beijing Municipality under Grant 4122041, and in part by the National High Technology Research and Development Program of China under Grant 2007AA01Z414. (Corresponding author: Wenchang Shi.) J. Hou, Y. Li, and W. Shi are with the School of Information, Renmin University of China, Beijing 100872, China (e-mail: [email protected]; [email protected]; [email protected]). J. Yu is with the School of Information, Renmin University of
  • 36. China, Beijing 100872, China, and also with the School of Computer and Information Engineering, Henan University, Kaifeng 475004, China (e-mail: [email protected]). Digital Object Identifier 10.1109/JIOT.2019.2940713 vehicle to cause an incident. Therefore, there is an urgent need for IoT forensics research to assist in determining the who, what, where, when, and how for cases. The rapid adoption of IoT expands the range of digi- tal evidence from the PC or laptops to a wide range of IoT devices (e.g., wearable devices and automobiles) as well as various cloud-based IoT services, which presents multi- faceted challenges for investigators. Although current forensic methodologies and tools still prove useful at some stages of forensics in IoT domain, there is still a pressing need to update current tools, procedures, and legislation to deal with unique characteristics of IoT [2]. The main goal of this survey is to have an overview of the state of IoT forensics and provide guidelines for future research and practices on it. We try to provide a comprehensive and structured landscape of IoT forensics under a 3-D frame- work. The framework encompasses a temporal dimension, a spatial dimension, and a technical dimension. From the temporal dimension, IoT forensics follows the standard digital forensic process including collection, exam- ination, analysis, and reporting to transform media into evi- dence and calls for appropriate forensic models to support the reasonable and appropriate use of forensic tools for practi- cal investigations involving IoT. From the spatial dimension,
  • 37. we explore IoT forensics with respect to the forensic envi- ronment where potential evidence may exist. Based on the typical architecture of IoT, the major sources of evidence in IoT forensics can be divided into three domains, i.e., device, network, and cloud. From the technical dimension, we inves- tigate IoT forensics by exploring the enabling methods, tools, or techniques that can provide the ability to collect and exam- ine volatile or nonvolatile data and to perform quick reviews or in-depth analysis of data from various sources of evidence in IoT environment. Together with the three dimensions, we make a system- atic analysis of existing efforts on digital forensics in IoT paradigm to present a holistic overview of this domain. We also point out open issues that IoT forensics faces and put for- ward promising suggestions to assist with future research. The main contributions of this article are highlighted as follows. 1) We discuss and summarize the impact of IoT on digi- tal forensics according to fundamental characteristics of IoT. 2) We provide an overview of existing research efforts from 2010 to 2018 on IoT forensics and briefly introduce the development of IoT forensics. 3) We sketch the landscape of IoT forensics and review the state of it under a 3-D framework. 4) We highlight the open issues in the field of IoT forensics and propose corresponding suggestions. 2327-4662 c© 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/i
  • 38. ndex.html for more information. Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC from IEEE Xplore. Restrictions apply. https://orcid.org/0000-0001-5503-8143 2 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 The remainder of this article is organized as follows. In Section II, we introduce the background of digital forensics and discuss the impact of IoT on digital forensics. We also introduce smart home as a typical IoT scene that helps to illustrate digital forensics in IoT environment later in the fol- lowing sections. In Section III, we select and investigate the recent literature on IoT forensics and clarify the development of IoT forensics research. We sketch the landscape of IoT forensics under a 3-D framework in Section IV and illustrate each dimension in detail in Sections V–VII, respectively. In Section VIII, from the three dimensions, we highlight the open issues and present promising suggestions for future research and practices in the field of IoT forensics. Finally, we conclude this article in Section IX. II. BACKGROUND A. Digital Forensics Digital forensics aims to gain a better understanding of an event of interest by finding and analyzing the facts related to that event [3]. The digital forensic investigators reveal the truth of an event by discovering and exposing the remnants (footprints or artifacts) of an event left on the digital system.
  • 39. The NIST Recommendation [4] has divided the digi- tal forensic investigation process into four consecutive (or iterative if necessary) phases, i.e., collection, examination, analysis, and reporting. Although different sources of evidence may call for different methodologies and generate different types of evidence, digital investigations in IoT environment still need to be carried out under this process to support the admissibility of evidence in legal processing. B. Forensic Soundness Forensic soundness is the basic principle for forensic inves- tigations. On the one hand, it refers to the fact that the digital forensic process must follow a certain standard so that it can be admissible in a court of law. On the other hand, the applica- tion or development of forensic tools and techniques should be undertaken in accordance with the relevant rules of forensics to protect the evidence from damage. A process is consid- ered to be forensically sound if it meets the following four criteria [5]. 1) Meaning: The forensic process cannot change the orig- inal meaning of evidence or should try to have the minimum change. 2) Errors: The forensic process should avoid undetectable errors and any error in the process should be properly documented. 3) Transparency and Trustworthiness: The reliability and accuracy of the forensic process are capable of being tested and/or verified by, for example, an external exam- ination of the forensic procedures by a court of law. 4) Experience: The individuals undertaking the forensic
  • 40. investigation should have sufficient experience or knowl- edge and should not undertake an examination that is beyond his/her current level of knowledge and skill. Fig. 1. Impact of IoT on digital forensics. C. Impact of IoT on Digital Forensics IoT enables more and more devices “online,” providing various kinds of smart services (e.g., smart city, medical care, and smart home) that are bound up with peoples’ lives. Considering the fundamental characteristics of IoT, we discuss the impact of IoT on digital forensics, summarized in Fig. 1. 1) Ubiquitous Sensing: With temperature sensors, motion detectors, or pressure sensors, IoT devices have the ubiquitous sensing ability so that they contain potential evidence closely related to the behavior of their owners and other devices in their environments [6]. More diverse sources of evidence and fine-grained sensing in IoT contribute to reconstructing the context of cases, which also produces a large volume of forensic data needing to be dealt with. 2) Dynamic Changes: The state of IoT devices changes dynamically. That is, a device may join or leave a network autonomously or with the movement of users at any time. Due to such temporal and spatial change properties, network topologies change dynamically and network bound- aries become blurry, which would make it more difficult to identify the boundaries of cases [7]. The dynamic fea- ture of IoT calls for real-time logging to record temporal information, such as modified time, accessed time, and cre- ated time, which can help to correlate and sequence the digital evidence gathered from different devices. 3) Automated Execution: There are real-time and auto-
  • 41. mated interactions between IoT devices to facilitate the col- laboration between different IoT applications [8]. Devices may operate automatically according to the information from surroundings or other entities, reducing human intervention. Within automated systems, there are questions of control (who/what did it?) and responsibility (who/what is at fault?) while the increase of interactions makes it prohibitively com- plex to trace back incidents through a chain of different devices. 4) Resource-Limited Characteristic of Devices: Due to the limited resources of some IoT devices, data on the devices may have a short survival period before being overwritten by the latest data and is usually sent to cloud or other data cen- ter. Therefore, it is more difficult to locate where potential evidence may exist. On the other hand, these resource-limited devices may be in the absence of adequate security guarantee, so that malicious users may easily modify or destroy the logs and relevant data on the devices [9]. Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC from IEEE Xplore. Restrictions apply. HOU et al.: SURVEY ON DIGITAL FORENSICS IN IoT 3 Fig. 2. IoT forensics paradigm of smart home. 5) Highly Heterogeneous: Based on different hardware, software, and networks, IoT devices are heterogeneous with multiple protocols, diverse data formats, and proprietary interfaces. Types of data in IoT forensics may be diverse in various vendor-specific formats. Heterogeneous devices may call for different tools or methods for data collection,
  • 42. examination, and analysis, which requires more efforts for investigators. The contemporary forensic tools may not be able to deal with every source of evidence, which calls for new tools. New tools should be properly tested and assessed prior to their use [5] because unreliable tools may lead to uncer- tainty and loss, and affect the soundness of evidence and even the final conclusion. 6) Special Security Characteristic: IoT bridges the gap between the cyber world and the physical world, so that secu- rity threats in the cyber world can bring safety threats to the real-world and vice versa [10]. IoT enables the communica- tion abilities to various kinds of devices (e.g., smart appliances, connected vehicles, and personal health devices) and connects them to the network, which may lead to broad attack faces. A single IoT device can be used to compromise other connected devices due to the connection between devices, which will transfer or expand the impact and increase the complexity of forensics. Moreover, due to the integration of the cyber world and the physical world, IoT devices can be remotely controlled to operate the physical world. Therefore, unsafe and insecure operations on IoT devices may result in a real loss of services and even the loss of life. There is a growing need for foren- sics to reconstruct security/safety incidents or troubleshoot the operational problems in IoT systems. And the security threat that adversaries can remotely control the device to remove or modify traces (e.g., logs and videos) or even destroy the device may make the evidence fragile and compromise the integrity of evidence. D. Typical IoT Scene Smart home is a typical application scenario in IoT includ- ing three layers of a typical IoT architecture: 1) a sensing layer; 2) a networking and data communication layer; and 3) an application layer.
  • 43. A smart home system is usually composed of a hub, multiple IoT devices, and a back-end server (e.g., a cloud), as shown in Fig. 2. Thermostats, lightings, cameras, and voice assistants are endpoint IoT devices in the sensing layer to measure, collect, and process the state information associ- ated with these things. These devices use wired or wireless communication protocols to communicate in the network and data communication layer. They can communicate through the Internet via the hub or directly through a local network. The hub can send the data from devices to the back-end cloud for storage, processing, and application. Users can control the devices or obtain status information of devices by sending commands to the cloud through Apps on mobile phones or Webs. Then the hub receives commands from the server and sends them to the devices, so that devices will execute relevant operations according to the commands. Devices may also col- laborate with each other automatically according to predefined conditions. We will take this typical IoT scene as an example to illus- trate in detail the digital forensics in the IoT environment from different perspectives later. III. LITERATURE REVIEW ON IOT FORENSICS A. Literature Selection Process In order to have a clear picture of digital forensics in the IoT environment, this section provides an extensive literature review of the research on IoT forensics. This article selection strategy consists of three main stages. 1) Stage 1: Define the keywords to search relevant papers from electronic databases (DBLP, IEEE Xplorer, and Science Direct). Considering the alternatives and other
  • 44. synonyms of essential components of the keywords, the subsequent exploration string was defined: (“Forensic” OR “Investigation” OR “Evidence”) AND (“Things” OR “Internet of Things” OR “IoT” OR “Smart”). 2) Stage 2: Select papers based on the title, publication year, and language of them (only includes the papers written in English). To ensure that only high-quality pub- lications were included in the study, we focus on jour- nal publications and conferences papers published by Elsevier, IEEE, Springer, ACM, and Wiley. Moreover, opinion-driven reports (editorials, commentaries, and letters) and books were excluded. 3) Stage 3: Review the abstracts and full texts of the selected papers to verify the relevance of these papers. The cited information, abstracts, and keywords of the papers were recorded for further analysis. Finally, 58 papers published between 2010 and 2018 were extracted through the three phases, as shown in Table I. B. Overview of Existing Research on IoT Forensics From the distribution of the papers by the year of publi- cation from 2010 to 2018, there is a sharp increase number of papers in 2018 and all the other years witness a grad- ual increase. Research on IoT forensics has entered a new Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC from IEEE Xplore. Restrictions apply.
  • 45. 4 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 TABLE I DISTRIBUTION OF EXISTING RESEARCH ON IOT FORENSICS period of significant growth since 2016 with the wide appli- cation of IoT devices in production and life. The 58 papers are classified under five categories including survey papers, models/frameworks, forensic methods, forensic systems, and forensic techniques/tools. From 2010 to 2018, there was ongoing research on forensic methods to provide guidelines for investigations on differ- ent sources of evidence in IoT and explore feasible forensic methods and techniques. The greater part of the work stud- ies enabling forensic techniques and tools for the coming new demands and challenges of digital forensics in IoT envi- ronment, concerning evidence collection, examination, and analysis. Early work on IoT forensics was predominantly theoretical in nature, and aimed to deal with issues about frameworks and models. In 2013, Oriwoh et al. [2] first explored the conceptual digital forensic models for IoT forensics to guide forensic investigations involving the IoT, which provided the basis for further research on forensic models and frameworks. At the same time, they also explored the automated forensic system that aims to make the IoT environment forensically ready before potential cases occur [14]. The two research efforts laid the foundation of research on IoT forensics. Since then, there have been a great number of papers exploring IoT forensic frameworks/models to guide procedures for rou- tine forensic tasks and developing forensic systems to ensure
  • 46. forensic readiness abilities for IoT. Some survey papers [9], [46]–[48], [56], [57], [64] have made a preliminary exploration of challenges in IoT forensics. Chernyshev et al. [46] mainly focused on conceptual digi- tal forensic models that can be applied to IoT environment. Bréda et al. [48] analyzed the minimal functional forensic requirements of IoT devices to provide reliable information. The requirements are defined in the user data protection class by the access control policy, the access control functions, the data authentication, and integrity requirements of the stored data to maintain a minimum level of data integrity in the IoT environment. Losavio et al. [64] analyzed in detail the legal concerns on data collection and analysis in IoT forensics. There are also some surveys investigating IoT forensics in different IoT applications. The works in [15], [29], [30], [42] focus on forensic challenges associated with smart TVs, health and fitness related devices, vehicles, and smart cities, respectively. Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC from IEEE Xplore. Restrictions apply. HOU et al.: SURVEY ON DIGITAL FORENSICS IN IoT 5 In this article, we aim to outline the landscape of digital forensics in the IoT paradigm to provide guidance for forensic practitioners and researchers. We conduct a systematic review of the research status of IoT forensics under a 3-D framework and indicate future research directions. IV. LANDSCAPE OF IOT FORENSICS
  • 47. IoT forensics is a branch of digital forensics that carries out digital forensics in the IoT environment. Forensic researchers and practitioners have tried to make digital forensics applicable to the context of IoT. Therefore, IoT forensics still follows the principles of digital forensics. It consists of two basic aspects. One is the forensic investigation itself and the other is the ability that enables the forensic investigation. Within a forensic investigation process, data is extracted from various media, then is transformed into information, and finally becomes evidence that can be legally acceptable in a court of law [4]. Therefore, from the perspective of foren- sic investigations, there are two core questions, including how to obtain evidence and where to find evidence. The tempo- ral dimension explores how to generate legally accepted and reliable evidence in line with a standard forensic process in IoT environment, including collection, examination, analysis, and reporting. The spatial dimension focuses on completely identifying potential sources of evidence, that is, to answer where to find evidence. Case-related information in IoT can be collected from different data sources that can be grouped into three types, i.e., device, network, and cloud, based on the typical IoT architecture. On the other hand, technical abilities to enable forensic investigations also play important roles in the landscape of IoT forensics. The technical dimension aims to explore appropriate techniques/tools for data collection, examination, and analysis. As the forensic environment changes, IoT poses challenges to existing forensic techniques/tools that need to update to deal with the forensics task in IoT environment. Based on our sur- vey, contemporary research on technical preparations for IoT forensics can be broadly divided into three categories includ- ing forensic readiness techniques, evidence extraction tools or techniques for different data sources, and some other forensic
  • 48. techniques to resolve challenges in IoT forensics. Moreover, IoT forensics is under the legal principle. All activities and actions within investigations start with autho- rization and must comply with laws and regulations in the jurisdictions. We then survey the literature on forensics in IoT environ- ment under a unified framework consisting of three orthogonal coordinates, as shown in Fig. 3. We try to illustrate in detail various aspects of IoT forensics, which may help forensic researchers and practitioners with a systematic understanding of this domain. V. IOT FORENSICS FROM THE TEMPORAL DIMENSION From the temporal dimension, a forensic investigation in IoT environment should be conducted within the standard process, so that the collected evidence can be admissible on the court. Fig. 3. Landscape of IoT forensics with three dimensions. A. Forensic Process in Smart Home Scene When performing a forensic investigation in a smart home scene described in Section II, investigators need to identify objects of forensic interest (OOFIs) on the spot first, includ- ing smart camera, voice assistants and some other appliances. These smart appliances on the spot connect to network devices (i.e., smart hub) to communicate with the external environ- ment. So network traffic, cloud, and companion Apps on cell phones or PCs also need to be included in the investigation. First responders should consider the possible need to col- lect volatile data, which can be collected only from a live system that has not been rebooted or shut down since the event occurred.
  • 49. Then, investigators need to examine the data obtained from OOFIs using specialized forensic toolkits to screen out the data related to the case. Therefore, investigators need to parse the data of different formats, which not only includes the data with relatively uniform formats from the phones and PCs but also the data with proprietary formats from various IoT devices. Next, investigators correlate the data from different sources to identify people, places, items, events, and their relations to construct the facts of the case. For example, thermostat readings and lighting records may prove the presence of users when someone claimed he was out of the home and videos from cameras may show the individuals’ behaviors at home. The three phases above can be iterative because new sources of evidence could be revealed during the analysis of data. Finally, investigators need to review the actions performed in the above three phases to ensure that all evidence reaches a definitive explanation of what happened. They also need to report in detail the results of the analysis, which may include describing the actions already performed, explaining how tools and procedures were selected, and determining what other actions need to be performed. B. Research on Forensic Models for IoT Forensics As a branch of digital forensics, there is a consensus that IoT forensics follows the four-phase forensic process. However, there is no accepted digital forensic model that can help to con- duct digital investigations in an IoT-based environment. Some research aims to explore general and standard forensic mod- els to facilitate consistent, effective, and accurate actions in forensic investigations involving IoT.
  • 50. Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC from IEEE Xplore. Restrictions apply. 6 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 Oriwoh et al. [2] proposed a 1-2-3 zone approach and a nest- best-thing (NBT) approach for evidence acquisition within the IoT domain. The 1-2-3 zone approach divided the investigation area into three zones: 1) the internal network; 2) the middle; and 3) the external network. The evidence extraction process in each zone can be conducted in parallel. The NBT triage model assists with the identification of additional sources of evidence when the primary source is unavailable. The two models are of guiding significance in the identification stage in IoT-based investigations. Perumal et al. [22] have proposed a top-down model that follows the standard operating procedures (SoPs). During the investigation, this model starts with authorization and plan- ning. It introduces machine to machine (M2M) communication and integrates 1-2-3 zone model and triage model with the general forensic process to deal with IoT-based investiga- tions. Although this paper gives a complete model covering each stage of the digital forensic process, it mainly focuses on identification without dealing with analysis and other processes. Rahman et al. [26] have highlighted the importance of forensic readiness and proposed a forensic-by-design frame- work for cyber-physical cloud systems (CPCSs) based on ISO/IEC 27043:2015 [66]. The framework has defined the design principles of CPCS to facilitate forensic investigations.
  • 51. The principles comprise six factors, including risk manage- ment principles and practices, forensic readiness principles and practices, incident-handling principles and practices, laws and regulations, CPCS hardware and software require- ments, and industry-specific requirements. DFIF-IoT [27] is a complete forensic framework to guide digital investigations in IoT-based infrastructures. The frame- work is composed of proactive process, IoT forensics, reac- tive process, and concurrent process. Proactive process aims to make IoT environment forensically ready. IoT forensics consists of cloud forensics, network forensics, and device level forensics. Reactive process is consistent with the tra- ditional forensic investigation process and will be performed in response to an incident of forensic concerns. Concurrent process is conducted throughout the whole process involv- ing obtaining authorization, documentation, preservation of the chain of custody, physical investigation, and interaction with physical investigations. Under the consideration of a complex set of relationships among different IoT entities, IDFIF-IoT [65] extended DFIF-IoT framework. Discussion of interactions in IoT ecosystems can assist with the planning process for gathering, storing, and handling digital evidence in advance before investigation. The two frameworks cover the complete forensic process, and are insightful in standardiza- tion of IoT-based forensic process. However, the recognition of the frameworks still needs to be discussed further by all stakeholders. FSAIoT [41] pointed out that states of IoT devices or the changes of states could be of forensic value. It proposed a model for the state acquisition of plenty of IoT devices to deal with forensics on IoT devices. This paper implemented the prototype of the framework, which can acquire states of devices from devices, clouds, and controllers, to prove its
  • 52. availability. Zia et al. [1] proposed an application-specific digital foren- sic model for IoT forensics. The model provides guidelines for forensic investigations …