SlideShare a Scribd company logo
1 of 50
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS
AND SECURITY, VOL. 14, NO. 11, NOVEMBER 2019
Interdependent Strategic Security Risk Management
With Bounded Rationality in the Internet of Things
Juntao Chen , Student Member, IEEE, and Quanyan Zhu,
Member, IEEE
Abstract— With the increasing connectivity enabled by the
Internet of Things (IoT), security becomes a critical concern,
and users should invest to secure their IoT applications. Due to
the massive devices in the IoT network, users cannot be aware
of the security policies taken by all its connected neighbors.
Instead, a user makes security decisions based on the cyber
risks that he perceives by observing a selected number of
nodes. To this end, we propose a model which incorporates
the limited attention or bounded rationality nature of players
in the IoT. Specifically, each individual builds a sparse
cognitive
network of nodes to respond to. Based on this simplified
cognitive
network representation, each user then determines his security
management policy by minimizing his own real-world security
cost. The bounded rational decision-makings of players and
their
cognitive network formations are interdependent and thus
should
be addressed in a holistic manner. We establish a games-in-
games framework and propose a Gestalt Nash equilibrium
(GNE)
solution concept to characterize the decisions of agents and
quantify their risk of bounded perception due to the limited
attention. In addition, we design a proximal-based iterative
algorithm to compute the GNE. With case studies of smart
communities, the designed algorithm can successfully identify
the critical users whose decisions need to be taken into account
by the other users during the security management.
Index Terms— Risk management, bounded rationality, cogni-
tive networks, Internet of Things, smart community.
I. INTRODUCTION
RECENT years have witnessed a significant growthof urban
population. As the growth continues, cities
need to become more efficient to serve the surging pop-
ulation. To achieve this objective, cities need to become
smarter with the integration of information and communication
techniques (ICTs) and urban infrastructures. Driven by the
advances in sensing, computing, storage and cloud technolo-
gies, the Internet of Things (IoT) plays a central role in
supporting the development of smart city. Though IoT enables
a highly connected world, the security of IoT becomes a
critical concern. There are 5.5 million new things connected
Manuscript received May 21, 2018; revised March 4, 2019;
accepted
April 9, 2019. Date of publication April 15, 2019; date of
current ver-
sion July 2, 2019. This work was supported in part by the
National Sci-
ence Foundation under Award SES-1541164 and Award ECCS-
1847056,
in part by the Army Research Office (ARO) under Grant
W911NF1910041,
and in part by a grant through the Critical Infrastructure
Resilience
Institute (CIRI). The associate editor coordinating the review of
this
manuscript and approving it for publication was Prof. Karen
Renaud.
(Corresponding author: Juntao Chen.)
The authors are with the Department of Electrical and Computer
Engi-
neering, Tandon School of Engineering, New York University,
Brooklyn,
NY 11201 USA (e-mail: [email protected]; [email protected]).
Digital Object Identifier 10.1109/TIFS.2019.2911112
Fig. 1. IoT-enabled interconnected smart community. The
connectivity,
on one hand, enhances the situational awareness of smart
homes. However,
it increases the cyber risks of the community. Hence, the cyber
security of
each household not only dependents on its own risk
management strategy but
also the ones of connected neighbors.
every day in 2016, as we head toward more than 20 billion
by 2020 [1]. These IoT devices come from different manufac-
turers, and they have heterogeneous functionalities and secu-
rity configurations and policies. No uniform security standards
are used for IoT devices as they are developed using different
system platforms for various functionalities. Moreover, due
to the connections between IoT devices, the security of one
device is also dependent on the security of other devices
to which it connects. Therefore, the heterogeneity and the
interconnectivity of massive heterogeneous IoT have created
significant challenges for security management. Fig. 1 depicts
a highly connected smart community enabled by IoT devices.
Each household needs to take into account the cyber risks
coming from their connected neighbors when securing their
devices.
In cyber networks, security management and practices of
users are often viewed as the weakest link [2]. The lack of
security awareness and expertise at the user’s end creates
human-induced vulnerabilities that can be easily exploited
by an adversary, exacerbating the insecurity of IoT. To this
end, it is critical to enhance the security by strengthening
security management in a decentralized way. Hence, in the
IoT, each device owner or system manager needs to allocate
resources (e.g. human resources, computing resources, invest-
ments or cognition) to secure his applications. For example,
the smart building operator can spend resources on upgrading
the hardware, hiring staff members for network monitoring
and forensics, and developing tailored security solutions to
1556-6013 © 2019 IEEE. Personal use is permitted, but
republication/redistribution requires IEEE permission.
See
http://www.ieee.org/publications_standards/publications/rights/i
ndex.html for more information.
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC
from IEEE Xplore. Restrictions apply.
https://orcid.org/0000-0001-7726-4926
CHEN AND ZHU: INTERDEPENDENT STRATEGIC
SECURITY RISK MANAGEMENT WITH BOUNDED
RATIONALITY 2959
the smart building. A smart home user, on the other hand, can
safely configure its network and regularly updates its software
and password of the IoT devices as illustrated in Fig. 1.
The devices in the IoT networks and their interconnections
can be modeled as nodes and links, respectively. The security
policy of one device can have an impact on the security
risk of nodes that are connected to it. Since various users
own different devices, the security management in IoT is
decentralized in nature. Therefore, the process of decentralized
security decision-making can be modeled as a game problem
in which each user strategically allocates his resources to
secure the devices [3]. In this game, the users’ risks are
reduced when their connected neighbors are of high-level
security. Due to the complex and massive connections, users
cannot be aware of the security policies taken by all its
connected neighbors. Instead, a user can only make security
decisions based on the cyber risk he perceives by observing
a selected number of nodes. This fact indicates that the game
model needs to take into account the bounded rationality
of players [4]. Therefore, in the game framework, we use a
cognition vector representing the observation structure of each
IoT user. Specifically, a sparser cognition vector represents a
user with weaker cognition ability, and he observes a smaller
number of other users’ behaviors when deciding his strategy.
Thus, the limited attention nature of users creates a bounded
perception of cyber risks.
In the established bounded rational game model, the users
need to make security management decisions as well as design
their cognition networks in a holistic manner. In order to
achieve this goal, we define a new solution concept called
Gestalt Nash equilibrium (GNE) to capture the cognitive
network formation and the security management under the
bounded rationality simultaneously. The analysis of the GNE
provides a quantitative method to understand the risk of mas-
sive IoTs and gives tractable security management policies.
We further design a proximal-based iterative algorithm to
compute the GNE of the game. The GNE resulting from
the algorithm reveals several typical phenomena that match
well with the real-world observations. For example, when the
network contains two groups of users, then under the limited
attention, all users will allocate their cognition resources to
the same group which demonstrates the law of partisanship.
Further, in a heterogeneous massive IoT, the equilibrium
successfully identifies the set of agents that are invariably paid
attention to by other users, demonstrating the phenomenon
of attraction of the mighty. Since the framework predicts the
high-level systemic risk of the IoT network, it also can be
used to inform the design of security standards and incentive
mechanisms, e.g., through contracts and cyber insurance.
The developed security management model provides an
essential framework to assess IoT security risks when applied
to various applications. For example, in smart home commu-
nities, the households are connected together to share hetero-
geneous information, e.g., electricity prices and temperature
readings through smart meters, and real-time information of
items in local stores and shops by wireless sensors. The con-
nections of IoT devices thus create security interdependencies
between households. Another broader application lies in the
different components in smart cities. Due to the interconnec-
tivity between large-scale infrastructures including the trans-
portation, power grids, and communications, the manager of
each sector needs to take into account the cyber risks coming
from other components when adopting security solutions.
The contributions of this paper are summarized as follows:
1) We propose a holistic framework to investigate the
security management of users with bounded rationality
in the IoT networks.
2) We model the cognition of users with a sparse vector
and quantify users’ risk of bounded perception resulting
from the underperceived cyber threats in the network.
3) We design a proximal-based algorithm to compute the
GNE which contains security management strategy and
cognitive network of agents. The algorithm discovers
several phenomena including emergence of partisanship,
filling the inattention, and attraction of the mighty.
4) We apply the proposed model to a smart community, and
demonstrate that the designed algorithm can identify the
most critical households in the network.
A. Related Work
Security management has been investigated in various
research fields including computer networks [5], communica-
tions [6], cloud computing [7] and infrastructures [8]. With the
advances in ICTs, a growing number of works have focused
on the emerging critical issue of IoT security [9]–[11]. Due
to the interconnectivity between different agents, the security
of one agent is also dependent on its connected ones which
gives rise to the notion of “interdependent security” [12].
The authors in [13]–[15] have further investigated the security
interdependencies in multilayer cyber-physical systems.
Games over networks have caught a lot of attention recently
especially from the economics perspective [16]–[19]. The
couplings between players in the network can be either in
a strategic exclusive or strategic complement manner. Based
on the features of security management in IoT, our problem
falls into the latter class. For the engineering applications,
the authors in [8], [20] have studied the resource allocation
game over interdependent critical infrastructures where both
players aim to increase the connectivity of the network.
Huang et al. [21], [22] have adopted a stochastic Markov
game model to design resilient operating strategies for multi-
layer networks. Zhu et al. [23] have proposed a game-theoretic
framework for collaborative intrusion detection systems
through resource management to mitigate network cyber
threats. Our work differs from [23] in that we take into account
the cognitive factors of human behaviors during decision
making.
Humans with limited knowledge or cognitive resources are
bounded rational, since they cannot pay attention to all the
information [24], [25]. Gabaix has proposed a “sparse max”
operator to model the limited attention of players in which
each agent builds a simplified model of the network based
on an l1 norm [4]. Our work leverages on the established
“sparse max” operator and formulates a constrained game
program to capture the bounded cognition ability of players in
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC
from IEEE Xplore. Restrictions apply.
2960 IEEE TRANSACTIONS ON INFORMATION FORENSICS
AND SECURITY, VOL. 14, NO. 11, NOVEMBER 2019
TABLE I
NOMENCLATURE
the IoT. In addition, we further consider the risk management
of each user based on their underperceived cyber risks over
the network.
B. Organization of the Paper
The rest of the paper is organized as follows. Section II
formulates a security management game over IoT networks
with bounded rational players. Section III analyzes the prob-
lem. Section IV designs a proximal-based iterative algorithm
to compute the GNE. Case studies are given in Section V, and
Section VI concludes the paper.
C. Summary of Notations
For convenience, we summarize the notations used in the
paper in Table I. Note that notations associated with ∗ refer
to the value at equilibrium. Furthermore, notations with index
k stands for its value at step k during the iterative updates.
II. PROBLEM FORMULATION
In this section, we formulate a problem involving strategic
security decision making and cognitive network formation of
players in the IoT networks.
A. Security Management Game Over Networks
In an IoT user network including a set N of nodes,1 where
N := {1, 2, . . . , N}, each node can be seen as a player
1The terms of node, agent and player refer to the user in the
IoT, and they
are used interchangeably.
that makes strategic decisions on the security management to
secure their IoT devices. For instance, in Fig. 1, each smart
home is a player securing their smart things to mitigate the
cyber threats. We define U := {u1, . . . , uN } by the decision
profile of all the players. Specifically, ui is a one-dimensional
decision variable representing player i ’s security management
effort. For convenience, we denote u−i := U  {ui }. The
objective of player i , i ∈ N , is to minimize his security risk
strategically by taking the costly action ui . We define by Fi1 :
R+ → R+ the cost of security management effort of player
i which is an increasing function of ui . The corresponding
benefit of security management is captured by a function
Fi2 : R+ → R+. Intuitively, a larger ui yields a higher
return, and hence Fi2 is monotonically increasing. Due to
the interconnections in the IoT, the risk of player i is also
dependent on his connected users. Then, we use a function
Fi3 : R+ × RN−1+ → R+ to represent the influence of player
i ’s connected users on his security. The coupling between
players in the IoT is in a strategic complement fashion with
respect to the security decisions. More specifically, a larger
security investment u j of player j , a connected node of player
i , decreases the cyber risks of player i as well. Therefore,
the cost function of player i can be expressed as the following
form:
J i (ui , u−i ) = Fi1(ui ) − Fi2(ui ) − Fi3(ui , u−i ), (1)
where J i : R+ × RN−1+ → R. To facilitate the analysis
and design of security risk management strategies, we spec-
ify some appropriate forms of functions in (1). In the fol-
lowing, we focus on player i taking the quadratic form:
Fi1(ui ) = 12 Riii u2i , Fi2(ui ) = ri ui , and Fi3(ui , u−i ) =∑
j �=i, j∈ N Rii j ui u j . Thus, (1) can be detailed as
J i (ui , u−i ) = 1
2
Riii u
2
i − ri ui −
∑
j �=i, j∈ N
Rii j ui u j , (2)
where Riii > 0, ri > 0, ∀ i , and Rii j ≥ 0, ∀ j �= i, i ∈ N . Note
that parameters Rii j , i, j ∈ N , represent the risk dependence
network of player i in the IoT, and the value of Rii j indicates
the strength of risk influence of player j on player i which
is given as a prior. The first term 12 R
i
ii u
2
i in (2) is the cost
of security management with an increasing marginal price.
The second term ri ui denotes the corresponding payoff of
cyber risk reduction. Then, the first two terms capture the fact
that increasing a certain level of cyber security becomes more
difficult in a secure network than a less secure one. The last
term
∑N
j=1, j �=i Rii j ui u j is the aggregated security risk effect
from connected users of player i . Specifically, the structure of
Fi3 in ui and u j indicates that the risk measure J
i of player
i decreases linearly with respect to user j ’s action. Hence,
in the established model, larger investment from a user helps
reduce cyber risk influence in a linear way. We have following
assumption on the security influence parameters.
Assumption 1: Riii >
∑
j �=i, j∈ N Rii j , ∀ i ∈ N .
Assumption 1 has a natural interpretation which indicates
that the security of a user is mainly determined by his own
strategy rather than other users’ decisions in the IoT network.
Moreover, based on the heterogeneous influence networks
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC
from IEEE Xplore. Restrictions apply.
CHEN AND ZHU: INTERDEPENDENT STRATEGIC
SECURITY RISK MANAGEMENT WITH BOUNDED
RATIONALITY 2961
characterized by Assumption 1, each node designs its own
security investment strategy which enables the decentralized
decision-making. The strategies of nodes are interdependent
due to the coupling between their cost functions shown in (2).
Through the first order optimality condition (FOC),
we obtain
Riii ui −
∑
j �=i, j∈ N
Rii j u j − ri = 0, ∀ i ∈ N . (3)
Putting (3) in a matrix form yields
⎡
⎢
⎢
⎢
⎣
R111 −R112 · · · −R11N−R221 R222 · · · −R22N
...
...
. . .
...
−RNN1 −RNN2 · · · RNN N
⎤
⎥
⎥
⎥
⎦
⎡
⎢
⎢
⎢
⎣
u1
u2
...
uN
⎤
⎥
⎥
⎥
⎦
=
⎡
⎢
⎢
⎢
⎣
r1
r2
...
rN
⎤
⎥
⎥
⎥
⎦
⇔Ru = r,
(4)
where r := [ri ]i∈ N , u := [ui ]i∈ N .
For convenience, we denote this security management game
by G. One solution concept of game G is Nash equilib-
rium (NE) which is defined as follows.
Definition 1 (Nash Equilibrium of Game G [3]): The strt-
egy profile u∗ = [u∗ i ]i∈ N constitutes a Nash equilibrium of
game G if J i (ui , u∗ −i ) ≥ J i (u∗ i , u∗ −i ), ∀ i ∈ N , ∀ ui ∈ Ui
.
The NE of game G yields strategic security management
policies of players under the condition that they can perceive
all the cyber risks in the IoT network.
B. Bounded Rational Security Management Game
In reality, the users in IoT are connected with numerous
other agents. For example, a single household can be con-
nected with a number of other houses in terms of various
types of IoT products in the smart communities. Therefore,
when making security management strategies, each user may
not be capable to observe all its connected neighbors. Instead,
a user can only respond to a selected number of other players’
decisions. Then, this bounded rational response mechanism
creates a cognitive network formation process for the players
in the network. Specifically, player i ’s irrationality is captured
by a vector mi := [mij ] j �=i, j∈ N , mij ∈ [0, 1], which stands
for the attention network that player i builds. When mij = 0,
user i pays no attention to user j ’s behavior; when mij = 1,
user i observes the true value of security management u j
of user j . The value that mij admits between 0 and 1 can be
interpreted as the trustfulness of user i on the perceived u j .
Another interpretation of mij can be the probability that user i
observes the behavior of user j at each time instance on the
security investment over a long period. Hence, the decision of
player j perceived by player i becomes ucij = mij u j . Then,
player i minimizes the modified cost function with bounded
rationality defined as:
J̃ i (ui , u
ci−i , m
i ) = 1
2
Riii u
2
i − ri ui −
∑
j �=i, j∈ N
mij R
i
i j ui u j
= 1
2
Riii u
2
i − ri ui −
∑
j �=i, j∈ N
Rii j ui u
ci
j , (5)
where J̃ i : R+ × RN−1+ × [0, 1]N−1 → R.
The FOC of (5) gives Riii ui −
∑
j �=i, j∈ N Rii j u
ci
j − ri =
0, ∀ i ∈ N , which is equivalent to
⎡
⎢
⎢
⎢
⎣
R111 −m12 R112 · · · −m1N R11N−m21 R221 R222 · · · −m2N
R22N
...
...
. . .
...
−mN1 RNN1 −mN2 RNN2 · · · RNN N
⎤
⎥
⎥
⎥
⎦
⎡
⎢
⎢
⎢
⎣
u1
u2
...
uN
⎤
⎥
⎥
⎥
⎦
=
⎡
⎢
⎢
⎢
⎣
r1
r2
...
rN
⎤
⎥
⎥
⎥
⎦
⇔Rsu = r. (6)
The bounded rational best-response of player i , i ∈ N , then
becomes
ui = B Ri (uci−i ) =
1
Riii
⎛
⎝
∑
j �=i, j∈ N
Rii j u
ci
j + ri
⎞
⎠ , (7)
where ucij = mij u j .
We denote the security management game of players with
limited attention by G̃ . Comparing with the solution concept
NE of game G, the one of game G̃ is generalized to bounded
rational Nash equilibrium (BRNE). The formal definition of
BRNE is as follows.
Definition 2 (Bounded Rational Nash Equilibrium of
Game G̃ ): With given cognition vectors mi , ∀ i ∈ N ,
the strategy profile u∗ = [u∗ i ]i∈ N constitutes a BRNE of
game
G̃ if J̃ i (ui , u∗−i , mi ) ≥ J̃ i (u∗ i , u∗ −i , mi ), ∀ i ∈ N , ∀ ui
∈ Ui .
Note that the cognitive network each user built has an
impact on the BRNE of game G̃ . Hence, how the users
determine the cognition vector mi , i ∈ N , becomes a critical
issue. In the ensuing section, we introduce the cognitive
network formation of players in the IoT.
C. Cognitive Network Formation
Due to the massive connections in IoT, each user builds
a sparse cognitive network containing the agents to observe.
To this end, the real cost of user i by taking the bounded
rationality into account becomes
J i (B Ri (uci−i ), u−i )
= 1
2Riii
⎛
⎝
∑
j �=i, j∈ N
Rii j u
ci
j + ri
⎞
⎠
2
−
∑
k �=i,k∈ N
⎡
⎣ 1
Riii
Riik uk
⎛
⎝
∑
j �=i, j∈ N
Rii j u
ci
j + ri
⎞
⎠
⎤
⎦
− ri
Riii
⎛
⎝
∑
j �=i, j∈ N
Rii j u
ci
j + ri
⎞
⎠
= 1
2
∑
j �=i, j∈ N
∑
k �=i,k∈ N
1
Riii
Rii j R
i
ik u
ci
j u
ci
k −
1
2Riii
(ri )
2
−
∑
k �=i,k∈ N
⎛
⎝
∑
j �=i, j∈ N
ucij R
i
i j
⎞
⎠
1
Riii
Riik uk
−
∑
k �=i,k∈ N
1
Riii
ri R
i
ik uk .
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC
from IEEE Xplore. Restrictions apply.
2962 IEEE TRANSACTIONS ON INFORMATION FORENSICS
AND SECURITY, VOL. 14, NO. 11, NOVEMBER 2019
Incorporating the cognition vector mi into the real cost of
player i further yields
J i (B Ri (uci−i ), u−i )
= 1
2
∑
j �=i, j∈ N
∑
k �=i,k∈ N
mij
1
Riii
Rii j R
i
ikm
i
ku j uk −
1
2Riii
(ri )
2
−
∑
k �=i,k∈ N
∑
j �=i, j∈ N
mij
1
Riii
Rii j R
i
iku j uk
−
∑
k �=i,k∈ N
1
Riii
ri R
i
ik uk . (8)
Recall that each user aims to minimize the security risk
based on the risks he perceives. Thus, by considering the real
cost induced by the bounded rationality constraint, the strategic
cognitive network formation problem of player i can be
formulated as
mi∗ = arg min
mij , j �=i, j∈ N
J i (B Ri (uci−i ), u−i ) + αi‖mi‖1
= arg min
mij , j �=i, j∈ N
1
2
∑
j �=i, j∈ N
∑
k �=i,k∈ N
1
Riii
Rii j R
i
ik u j ukm
i
j m
i
k
−
∑
j �=i, j∈ N
∑
k �=i,k∈ N
1
Riii
Rii j R
i
ikuku j m
i
j + αi‖mi‖1
= arg min
mij , j �=i, j∈ N
1
2
mi
T
�i mi − eTN−1�i mi + αi‖mi‖1,
where �i := [�ij k] j �=i,k �=i, j∈ N ,k∈ N , �ij k = 1Riii R
i
i j R
i
iku j uk ,
eN−1 is an N − 1-dimensional column vector with all one
entries, and αi is a weighting factor capturing the unit cost
of cognition of player i and it can be tuned to match with
experimental data. The term ‖mi‖1 is a convex relaxed version
of ‖mi‖0 which approximately maintains the sparse property
of player i ’s cognitive network [26], [27]. The integrated term
αi‖mi‖1 can be interpreted as the cognitive cost of user i .
Therefore, for player i , we need to solve the following
constrained optimization problem:
min
mij , j �=i, j∈ N
1
2
mi
T
�i mi − eTN−1�i mi + αi‖mi‖1
s.t. 0 ≤ mij ≤ 1, j �= i, j ∈ N , (Risk perception), (9)
where the constraints mij ∈ [0, 1], ∀ j �= i , indicate the risk
perception behavior of user i .
The number of cognitive links that player i can form is
generally a positive integer, i.e., ‖mi‖1 = βi ∈ N+. Note that
βi here and αi in (9) have the same interpretation which both
quantify the cognition ability of player i . Then, by choosing αi
strategically, the problem in (9) is equivalent to the following
problem:
min
mij , j �=i, j∈ N
1
2
mi
T
�i mi − eTN−1�i mi
s.t. 0 ≤ mij ≤ 1, j �= i, j ∈ N , (Risk perception),
‖mi‖1 = βi , (Limited attention), (10)
where βi ∈ N+ ≤ N − 1 is the total number of links that
player i can form in his cognitive network, quantifying his
Fig. 2. IoT user and cognitive network-of-networks. Users make
strategic
security management decisions in the IoT network as well as
determine their
cognitive networks. The security management game in layer G2
and the
cognitive network formation game in layer G1 are
interdependent which create
a games-of-games framework.
limited attention. Simulation studies in Section V reflect that
considering ‖mi‖1 = βi yields sparser cognitive networks.
Note that we still solve (9) by selecting a proper αi which
yields equivalent (9) and (10).
D. Gestalt Nash Equilibrium
The formulated security management under bounded ratio-
nality problem boasts a games-of-games structure. The users
make decisions strategically in the IoT network as well as
form their cognitive networks selfishly. The security man-
agement game and cognitive network formation game are
interdependent. Therefore, the cognitive and IoT user layers
shown in Fig. 2 constitute a network-of-networks framework.
In this paper, we aim to design an integrated algorithm to
design the cognitive networks and determine the security risk
management decisions of users in a holistic manner.
To this end, we present the solution concept, Gestalt Nash
equilibrium, of the bounded rational security risk management
game as follows.
Definition 3 (Gestalt Nash Equilibrium): The Gestalt Nash
equilibrium (GNE) of the security risk management game
under bounded rationality is a profile (mi∗ , u∗ i ), ∀ i ∈ N , that
satisfies
J̃ i (u∗ i , u∗ −i , mi∗)≤ J̃ i (ui , u∗ −i , mi ), ∀ ui ∈ Ui , ∀ mi
∈ [0, 1]N−1.
At the GNE, all the players in the network do not change their
action ui and cognition vector mi , ∀ i ∈ N , simultaneously.
Remark: The strategic security management profile
u∗ = [u∗ i ]i∈ N at GNE is also a BRNE.
In the following, we aim to analyze the GNE of the game
and compute it by designing algorithms.
III. PROBLEM ANALYSIS
We first analyze the convergence of the bounded rational
best-response dynamics of players in Section II-B. Then,
we quantify the risk of bounded perception due to limited
attention of players. We further reformulate the cognitive
network formation problem presented in Section II-C.
A. Bounded Rational Best Response Dynamics
Based on Section II-B, the bounded rational best-response
dynamics of player i under cognitive network mi , i ∈ N , can
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at …
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1,
JANUARY 2020 1
A Survey on Digital Forensics in Internet of Things
Jianwei Hou , Yuewei Li, Jingyang Yu, and Wenchang Shi
Abstract—Internet of Things (IoT) is increasingly permeat-
ing peoples’ lives, gradually revolutionizing our way of life.
Due
to the tight connection between people and IoT, now civil and
criminal investigations or internal probes must take IoT into
account. From the forensic perspective, the IoT environment
con-
tains a rich set of artifacts that could benefit investigations,
while
the forensic investigation in IoT paradigm may have to alter to
accommodate characteristics of IoT. Therefore, in this article,
we
analyze the impact of IoT on digital forensics and systematize
the research efforts made by previous researchers from 2010 to
2018. We sketch the landscape of IoT forensics and examine the
state of IoT forensics under a 3-D framework. The 3-D frame-
work consists of a temporal dimension, a spatial dimension, and
a technical dimension. The temporal dimension walks through
the standard digital forensic process while the spatial dimension
explores where to identify sources of evidence in IoT environ-
ment. These two dimensions attempt to provide principles and
guidelines for standardizing digital investigations in the context
of IoT. The technical dimension guides a way to the exploration
of
tools and techniques to ensure the enforcement of digital
forensics
in the ever-evolving IoT environment. Put together, we present
a holistic overview of digital forensics in IoT. We also
highlight
open issues and outline promising suggestions to inspire future
study.
Index Terms—Cybercrime, digital forensics, Internet of
Things (IoT).
I. INTRODUCTION
W ITH the Internet of Things (IoT) permeating our dailylives,
people are becoming more reliant on various
kinds of smart IoT services, leaving traces on various IoT
devices. These rich repositories of digital traces in IoT envi-
ronment can provide insight into people’s daily activities in
their home and elsewhere, which are of great value to digital
forensics [1]. On the other hand, the number of both civil and
criminal cases involving IoT devices or services has grown.
IoT devices may not only be targets for attacks, but also tools
for committing crimes. Security vulnerabilities in IoT systems
can be leveraged to remotely control the systems, for exam-
ple, to control the accelerator and brake system of the smart
Manuscript received May 9, 2019; revised July 9, 2019;
accepted August
26, 2019. Date of publication September 11, 2019; date of
current version
January 10, 2020. This work was supported in part by the
National Natural
Science Foundation of China under Grant 61472429, in part by
the Natural
Science Foundation of Beijing Municipality under Grant
4122041, and in
part by the National High Technology Research and
Development Program of
China under Grant 2007AA01Z414. (Corresponding author:
Wenchang Shi.)
J. Hou, Y. Li, and W. Shi are with the School of Information,
Renmin
University of China, Beijing 100872, China (e-mail:
[email protected];
[email protected]; [email protected]).
J. Yu is with the School of Information, Renmin University of
China,
Beijing 100872, China, and also with the School of Computer
and
Information Engineering, Henan University, Kaifeng 475004,
China (e-mail:
[email protected]).
Digital Object Identifier 10.1109/JIOT.2019.2940713
vehicle to cause an incident. Therefore, there is an urgent need
for IoT forensics research to assist in determining the who,
what, where, when, and how for cases.
The rapid adoption of IoT expands the range of digi-
tal evidence from the PC or laptops to a wide range of
IoT devices (e.g., wearable devices and automobiles) as well
as various cloud-based IoT services, which presents multi-
faceted challenges for investigators. Although current forensic
methodologies and tools still prove useful at some stages of
forensics in IoT domain, there is still a pressing need to update
current tools, procedures, and legislation to deal with unique
characteristics of IoT [2].
The main goal of this survey is to have an overview of
the state of IoT forensics and provide guidelines for future
research and practices on it. We try to provide a comprehensive
and structured landscape of IoT forensics under a 3-D frame-
work. The framework encompasses a temporal dimension, a
spatial dimension, and a technical dimension.
From the temporal dimension, IoT forensics follows the
standard digital forensic process including collection, exam-
ination, analysis, and reporting to transform media into evi-
dence and calls for appropriate forensic models to support the
reasonable and appropriate use of forensic tools for practi-
cal investigations involving IoT. From the spatial dimension,
we explore IoT forensics with respect to the forensic envi-
ronment where potential evidence may exist. Based on the
typical architecture of IoT, the major sources of evidence in
IoT forensics can be divided into three domains, i.e., device,
network, and cloud. From the technical dimension, we inves-
tigate IoT forensics by exploring the enabling methods, tools,
or techniques that can provide the ability to collect and exam-
ine volatile or nonvolatile data and to perform quick reviews
or in-depth analysis of data from various sources of evidence
in IoT environment.
Together with the three dimensions, we make a system-
atic analysis of existing efforts on digital forensics in IoT
paradigm to present a holistic overview of this domain. We
also point out open issues that IoT forensics faces and put for-
ward promising suggestions to assist with future research. The
main contributions of this article are highlighted as follows.
1) We discuss and summarize the impact of IoT on digi-
tal forensics according to fundamental characteristics of
IoT.
2) We provide an overview of existing research efforts from
2010 to 2018 on IoT forensics and briefly introduce the
development of IoT forensics.
3) We sketch the landscape of IoT forensics and review the
state of it under a 3-D framework.
4) We highlight the open issues in the field of IoT forensics
and propose corresponding suggestions.
2327-4662 c© 2019 IEEE. Personal use is permitted, but
republication/redistribution requires IEEE permission.
See
http://www.ieee.org/publications_standards/publications/rights/i
ndex.html for more information.
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC
from IEEE Xplore. Restrictions apply.
https://orcid.org/0000-0001-5503-8143
2 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1,
JANUARY 2020
The remainder of this article is organized as follows. In
Section II, we introduce the background of digital forensics
and discuss the impact of IoT on digital forensics. We also
introduce smart home as a typical IoT scene that helps to
illustrate digital forensics in IoT environment later in the fol-
lowing sections. In Section III, we select and investigate the
recent literature on IoT forensics and clarify the development
of IoT forensics research. We sketch the landscape of IoT
forensics under a 3-D framework in Section IV and illustrate
each dimension in detail in Sections V–VII, respectively. In
Section VIII, from the three dimensions, we highlight the open
issues and present promising suggestions for future research
and practices in the field of IoT forensics. Finally, we conclude
this article in Section IX.
II. BACKGROUND
A. Digital Forensics
Digital forensics aims to gain a better understanding of an
event of interest by finding and analyzing the facts related
to that event [3]. The digital forensic investigators reveal the
truth of an event by discovering and exposing the remnants
(footprints or artifacts) of an event left on the digital system.
The NIST Recommendation [4] has divided the digi-
tal forensic investigation process into four consecutive (or
iterative if necessary) phases, i.e., collection, examination,
analysis, and reporting. Although different sources of evidence
may call for different methodologies and generate different
types of evidence, digital investigations in IoT environment
still need to be carried out under this process to support the
admissibility of evidence in legal processing.
B. Forensic Soundness
Forensic soundness is the basic principle for forensic inves-
tigations. On the one hand, it refers to the fact that the digital
forensic process must follow a certain standard so that it can
be admissible in a court of law. On the other hand, the applica-
tion or development of forensic tools and techniques should be
undertaken in accordance with the relevant rules of forensics
to protect the evidence from damage. A process is consid-
ered to be forensically sound if it meets the following four
criteria [5].
1) Meaning: The forensic process cannot change the orig-
inal meaning of evidence or should try to have the
minimum change.
2) Errors: The forensic process should avoid undetectable
errors and any error in the process should be properly
documented.
3) Transparency and Trustworthiness: The reliability and
accuracy of the forensic process are capable of being
tested and/or verified by, for example, an external exam-
ination of the forensic procedures by a court of law.
4) Experience: The individuals undertaking the forensic
investigation should have sufficient experience or knowl-
edge and should not undertake an examination that is
beyond his/her current level of knowledge and skill.
Fig. 1. Impact of IoT on digital forensics.
C. Impact of IoT on Digital Forensics
IoT enables more and more devices “online,” providing
various kinds of smart services (e.g., smart city, medical
care, and smart home) that are bound up with peoples’ lives.
Considering the fundamental characteristics of IoT, we discuss
the impact of IoT on digital forensics, summarized in Fig. 1.
1) Ubiquitous Sensing: With temperature sensors, motion
detectors, or pressure sensors, IoT devices have the ubiquitous
sensing ability so that they contain potential evidence closely
related to the behavior of their owners and other devices
in their environments [6]. More diverse sources of evidence
and fine-grained sensing in IoT contribute to reconstructing
the context of cases, which also produces a large volume of
forensic data needing to be dealt with.
2) Dynamic Changes: The state of IoT devices changes
dynamically. That is, a device may join or leave a network
autonomously or with the movement of users at any
time. Due to such temporal and spatial change properties,
network topologies change dynamically and network bound-
aries become blurry, which would make it more difficult
to identify the boundaries of cases [7]. The dynamic fea-
ture of IoT calls for real-time logging to record temporal
information, such as modified time, accessed time, and cre-
ated time, which can help to correlate and sequence the digital
evidence gathered from different devices.
3) Automated Execution: There are real-time and auto-
mated interactions between IoT devices to facilitate the col-
laboration between different IoT applications [8]. Devices
may operate automatically according to the information from
surroundings or other entities, reducing human intervention.
Within automated systems, there are questions of control
(who/what did it?) and responsibility (who/what is at fault?)
while the increase of interactions makes it prohibitively com-
plex to trace back incidents through a chain of different
devices.
4) Resource-Limited Characteristic of Devices: Due to the
limited resources of some IoT devices, data on the devices
may have a short survival period before being overwritten by
the latest data and is usually sent to cloud or other data cen-
ter. Therefore, it is more difficult to locate where potential
evidence may exist. On the other hand, these resource-limited
devices may be in the absence of adequate security guarantee,
so that malicious users may easily modify or destroy the logs
and relevant data on the devices [9].
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC
from IEEE Xplore. Restrictions apply.
HOU et al.: SURVEY ON DIGITAL FORENSICS IN IoT 3
Fig. 2. IoT forensics paradigm of smart home.
5) Highly Heterogeneous: Based on different hardware,
software, and networks, IoT devices are heterogeneous with
multiple protocols, diverse data formats, and proprietary
interfaces. Types of data in IoT forensics may be diverse
in various vendor-specific formats. Heterogeneous devices
may call for different tools or methods for data collection,
examination, and analysis, which requires more efforts for
investigators. The contemporary forensic tools may not be able
to deal with every source of evidence, which calls for new
tools. New tools should be properly tested and assessed prior
to their use [5] because unreliable tools may lead to uncer-
tainty and loss, and affect the soundness of evidence and even
the final conclusion.
6) Special Security Characteristic: IoT bridges the gap
between the cyber world and the physical world, so that secu-
rity threats in the cyber world can bring safety threats to the
real-world and vice versa [10]. IoT enables the communica-
tion abilities to various kinds of devices (e.g., smart appliances,
connected vehicles, and personal health devices) and connects
them to the network, which may lead to broad attack faces. A
single IoT device can be used to compromise other connected
devices due to the connection between devices, which will
transfer or expand the impact and increase the complexity of
forensics. Moreover, due to the integration of the cyber world
and the physical world, IoT devices can be remotely controlled
to operate the physical world. Therefore, unsafe and insecure
operations on IoT devices may result in a real loss of services
and even the loss of life. There is a growing need for foren-
sics to reconstruct security/safety incidents or troubleshoot the
operational problems in IoT systems. And the security threat
that adversaries can remotely control the device to remove or
modify traces (e.g., logs and videos) or even destroy the device
may make the evidence fragile and compromise the integrity
of evidence.
D. Typical IoT Scene
Smart home is a typical application scenario in IoT includ-
ing three layers of a typical IoT architecture: 1) a sensing
layer; 2) a networking and data communication layer; and
3) an application layer.
A smart home system is usually composed of a hub,
multiple IoT devices, and a back-end server (e.g., a cloud), as
shown in Fig. 2. Thermostats, lightings, cameras, and voice
assistants are endpoint IoT devices in the sensing layer to
measure, collect, and process the state information associ-
ated with these things. These devices use wired or wireless
communication protocols to communicate in the network and
data communication layer. They can communicate through the
Internet via the hub or directly through a local network. The
hub can send the data from devices to the back-end cloud
for storage, processing, and application. Users can control the
devices or obtain status information of devices by sending
commands to the cloud through Apps on mobile phones or
Webs. Then the hub receives commands from the server and
sends them to the devices, so that devices will execute relevant
operations according to the commands. Devices may also col-
laborate with each other automatically according to predefined
conditions.
We will take this typical IoT scene as an example to illus-
trate in detail the digital forensics in the IoT environment from
different perspectives later.
III. LITERATURE REVIEW ON IOT FORENSICS
A. Literature Selection Process
In order to have a clear picture of digital forensics in the
IoT environment, this section provides an extensive literature
review of the research on IoT forensics. This article selection
strategy consists of three main stages.
1) Stage 1: Define the keywords to search relevant papers
from electronic databases (DBLP, IEEE Xplorer, and
Science Direct). Considering the alternatives and other
synonyms of essential components of the keywords, the
subsequent exploration string was defined:
(“Forensic” OR “Investigation” OR “Evidence”) AND
(“Things” OR “Internet of Things” OR “IoT” OR
“Smart”).
2) Stage 2: Select papers based on the title, publication
year, and language of them (only includes the papers
written in English). To ensure that only high-quality pub-
lications were included in the study, we focus on jour-
nal publications and conferences papers published by
Elsevier, IEEE, Springer, ACM, and Wiley. Moreover,
opinion-driven reports (editorials, commentaries, and
letters) and books were excluded.
3) Stage 3: Review the abstracts and full texts of the
selected papers to verify the relevance of these papers.
The cited information, abstracts, and keywords of the
papers were recorded for further analysis.
Finally, 58 papers published between 2010 and 2018 were
extracted through the three phases, as shown in Table I.
B. Overview of Existing Research on IoT Forensics
From the distribution of the papers by the year of publi-
cation from 2010 to 2018, there is a sharp increase number
of papers in 2018 and all the other years witness a grad-
ual increase. Research on IoT forensics has entered a new
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC
from IEEE Xplore. Restrictions apply.
4 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1,
JANUARY 2020
TABLE I
DISTRIBUTION OF EXISTING RESEARCH ON IOT
FORENSICS
period of significant growth since 2016 with the wide appli-
cation of IoT devices in production and life. The 58 papers
are classified under five categories including survey papers,
models/frameworks, forensic methods, forensic systems, and
forensic techniques/tools.
From 2010 to 2018, there was ongoing research on forensic
methods to provide guidelines for investigations on differ-
ent sources of evidence in IoT and explore feasible forensic
methods and techniques. The greater part of the work stud-
ies enabling forensic techniques and tools for the coming
new demands and challenges of digital forensics in IoT envi-
ronment, concerning evidence collection, examination, and
analysis.
Early work on IoT forensics was predominantly theoretical
in nature, and aimed to deal with issues about frameworks
and models. In 2013, Oriwoh et al. [2] first explored the
conceptual digital forensic models for IoT forensics to guide
forensic investigations involving the IoT, which provided the
basis for further research on forensic models and frameworks.
At the same time, they also explored the automated forensic
system that aims to make the IoT environment forensically
ready before potential cases occur [14]. The two research
efforts laid the foundation of research on IoT forensics. Since
then, there have been a great number of papers exploring
IoT forensic frameworks/models to guide procedures for rou-
tine forensic tasks and developing forensic systems to ensure
forensic readiness abilities for IoT.
Some survey papers [9], [46]–[48], [56], [57], [64] have
made a preliminary exploration of challenges in IoT forensics.
Chernyshev et al. [46] mainly focused on conceptual digi-
tal forensic models that can be applied to IoT environment.
Bréda et al. [48] analyzed the minimal functional forensic
requirements of IoT devices to provide reliable information.
The requirements are defined in the user data protection class
by the access control policy, the access control functions, the
data authentication, and integrity requirements of the stored
data to maintain a minimum level of data integrity in the IoT
environment. Losavio et al. [64] analyzed in detail the legal
concerns on data collection and analysis in IoT forensics.
There are also some surveys investigating IoT forensics in
different IoT applications. The works in [15], [29], [30], [42]
focus on forensic challenges associated with smart TVs,
health and fitness related devices, vehicles, and smart cities,
respectively.
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC
from IEEE Xplore. Restrictions apply.
HOU et al.: SURVEY ON DIGITAL FORENSICS IN IoT 5
In this article, we aim to outline the landscape of digital
forensics in the IoT paradigm to provide guidance for forensic
practitioners and researchers. We conduct a systematic review
of the research status of IoT forensics under a 3-D framework
and indicate future research directions.
IV. LANDSCAPE OF IOT FORENSICS
IoT forensics is a branch of digital forensics that carries out
digital forensics in the IoT environment. Forensic researchers
and practitioners have tried to make digital forensics applicable
to the context of IoT. Therefore, IoT forensics still follows the
principles of digital forensics. It consists of two basic aspects.
One is the forensic investigation itself and the other is the
ability that enables the forensic investigation.
Within a forensic investigation process, data is extracted
from various media, then is transformed into information, and
finally becomes evidence that can be legally acceptable in a
court of law [4]. Therefore, from the perspective of foren-
sic investigations, there are two core questions, including how
to obtain evidence and where to find evidence. The tempo-
ral dimension explores how to generate legally accepted and
reliable evidence in line with a standard forensic process in
IoT environment, including collection, examination, analysis,
and reporting. The spatial dimension focuses on completely
identifying potential sources of evidence, that is, to answer
where to find evidence. Case-related information in IoT can
be collected from different data sources that can be grouped
into three types, i.e., device, network, and cloud, based on the
typical IoT architecture.
On the other hand, technical abilities to enable forensic
investigations also play important roles in the landscape of IoT
forensics. The technical dimension aims to explore appropriate
techniques/tools for data collection, examination, and analysis.
As the forensic environment changes, IoT poses challenges to
existing forensic techniques/tools that need to update to deal
with the forensics task in IoT environment. Based on our sur-
vey, contemporary research on technical preparations for IoT
forensics can be broadly divided into three categories includ-
ing forensic readiness techniques, evidence extraction tools or
techniques for different data sources, and some other forensic
techniques to resolve challenges in IoT forensics.
Moreover, IoT forensics is under the legal principle. All
activities and actions within investigations start with autho-
rization and must comply with laws and regulations in the
jurisdictions.
We then survey the literature on forensics in IoT environ-
ment under a unified framework consisting of three orthogonal
coordinates, as shown in Fig. 3. We try to illustrate in detail
various aspects of IoT forensics, which may help forensic
researchers and practitioners with a systematic understanding
of this domain.
V. IOT FORENSICS FROM THE TEMPORAL DIMENSION
From the temporal dimension, a forensic investigation in IoT
environment should be conducted within the standard process,
so that the collected evidence can be admissible on the court.
Fig. 3. Landscape of IoT forensics with three dimensions.
A. Forensic Process in Smart Home Scene
When performing a forensic investigation in a smart home
scene described in Section II, investigators need to identify
objects of forensic interest (OOFIs) on the spot first, includ-
ing smart camera, voice assistants and some other appliances.
These smart appliances on the spot connect to network devices
(i.e., smart hub) to communicate with the external environ-
ment. So network traffic, cloud, and companion Apps on cell
phones or PCs also need to be included in the investigation.
First responders should consider the possible need to col-
lect volatile data, which can be collected only from a live
system that has not been rebooted or shut down since the
event occurred.
Then, investigators need to examine the data obtained from
OOFIs using specialized forensic toolkits to screen out the data
related to the case. Therefore, investigators need to parse the
data of different formats, which not only includes the data with
relatively uniform formats from the phones and PCs but also
the data with proprietary formats from various IoT devices.
Next, investigators correlate the data from different sources
to identify people, places, items, events, and their relations
to construct the facts of the case. For example, thermostat
readings and lighting records may prove the presence of users
when someone claimed he was out of the home and videos
from cameras may show the individuals’ behaviors at home.
The three phases above can be iterative because new sources
of evidence could be revealed during the analysis of data.
Finally, investigators need to review the actions performed
in the above three phases to ensure that all evidence reaches
a definitive explanation of what happened. They also need to
report in detail the results of the analysis, which may include
describing the actions already performed, explaining how tools
and procedures were selected, and determining what other
actions need to be performed.
B. Research on Forensic Models for IoT Forensics
As a branch of digital forensics, there is a consensus that IoT
forensics follows the four-phase forensic process. However,
there is no accepted digital forensic model that can help to con-
duct digital investigations in an IoT-based environment. Some
research aims to explore general and standard forensic mod-
els to facilitate consistent, effective, and accurate actions in
forensic investigations involving IoT.
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC
from IEEE Xplore. Restrictions apply.
6 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1,
JANUARY 2020
Oriwoh et al. [2] proposed a 1-2-3 zone approach and a nest-
best-thing (NBT) approach for evidence acquisition within the
IoT domain. The 1-2-3 zone approach divided the investigation
area into three zones: 1) the internal network; 2) the middle;
and 3) the external network. The evidence extraction process in
each zone can be conducted in parallel. The NBT triage model
assists with the identification of additional sources of evidence
when the primary source is unavailable. The two models are
of guiding significance in the identification stage in IoT-based
investigations.
Perumal et al. [22] have proposed a top-down model that
follows the standard operating procedures (SoPs). During the
investigation, this model starts with authorization and plan-
ning. It introduces machine to machine (M2M) communication
and integrates 1-2-3 zone model and triage model with the
general forensic process to deal with IoT-based investiga-
tions. Although this paper gives a complete model covering
each stage of the digital forensic process, it mainly focuses
on identification without dealing with analysis and other
processes.
Rahman et al. [26] have highlighted the importance of
forensic readiness and proposed a forensic-by-design frame-
work for cyber-physical cloud systems (CPCSs) based on
ISO/IEC 27043:2015 [66]. The framework has defined the
design principles of CPCS to facilitate forensic investigations.
The principles comprise six factors, including risk manage-
ment principles and practices, forensic readiness principles
and practices, incident-handling principles and practices,
laws and regulations, CPCS hardware and software require-
ments, and industry-specific requirements.
DFIF-IoT [27] is a complete forensic framework to guide
digital investigations in IoT-based infrastructures. The frame-
work is composed of proactive process, IoT forensics, reac-
tive process, and concurrent process. Proactive process aims
to make IoT environment forensically ready. IoT forensics
consists of cloud forensics, network forensics, and device
level forensics. Reactive process is consistent with the tra-
ditional forensic investigation process and will be performed
in response to an incident of forensic concerns. Concurrent
process is conducted throughout the whole process involv-
ing obtaining authorization, documentation, preservation of
the chain of custody, physical investigation, and interaction
with physical investigations. Under the consideration of a
complex set of relationships among different IoT entities,
IDFIF-IoT [65] extended DFIF-IoT framework. Discussion of
interactions in IoT ecosystems can assist with the planning
process for gathering, storing, and handling digital evidence
in advance before investigation. The two frameworks cover the
complete forensic process, and are insightful in standardiza-
tion of IoT-based forensic process. However, the recognition
of the frameworks still needs to be discussed further by all
stakeholders.
FSAIoT [41] pointed out that states of IoT devices or the
changes of states could be of forensic value. It proposed a
model for the state acquisition of plenty of IoT devices to
deal with forensics on IoT devices. This paper implemented
the prototype of the framework, which can acquire states of
devices from devices, clouds, and controllers, to prove its
availability.
Zia et al. [1] proposed an application-specific digital foren-
sic model for IoT forensics. The model provides guidelines
for forensic investigations …

More Related Content

Similar to 2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx

IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET Journal
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyEricsson
 
sensors requirement and understanding and deployment
sensors requirement and understanding and deploymentsensors requirement and understanding and deployment
sensors requirement and understanding and deploymentS .Ali Raza
 
Privacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkPrivacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkIJECEIAES
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
Security Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docxSecurity Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docxedgar6wallace88877
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...cyberprosocial
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningVenkat Projects
 

Similar to 2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx (20)

IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVM
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 
sensors requirement and understanding and deployment
sensors requirement and understanding and deploymentsensors requirement and understanding and deployment
sensors requirement and understanding and deployment
 
Privacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkPrivacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor network
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
Security Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docxSecurity Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docx
 
Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
sample assignment
sample assignmentsample assignment
sample assignment
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Io t whitepaper_5_15_17
Io t whitepaper_5_15_17Io t whitepaper_5_15_17
Io t whitepaper_5_15_17
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 

More from jesusamckone

3 templates are due based on the focus review. Attached are the temp.docx
3 templates are due based on the focus review. Attached are the temp.docx3 templates are due based on the focus review. Attached are the temp.docx
3 templates are due based on the focus review. Attached are the temp.docxjesusamckone
 
3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
3-4 pages Explain Internal and External recruiting. Discuss the pro.docx3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
3-4 pages Explain Internal and External recruiting. Discuss the pro.docxjesusamckone
 
3-4 page essayInequality of income is greater in the United Sta.docx
3-4 page essayInequality of income is greater in the United Sta.docx3-4 page essayInequality of income is greater in the United Sta.docx
3-4 page essayInequality of income is greater in the United Sta.docxjesusamckone
 
3 Vision Visioning is relatively easy. Casting a shared and clea.docx
3 Vision Visioning is relatively easy. Casting a shared and clea.docx3 Vision Visioning is relatively easy. Casting a shared and clea.docx
3 Vision Visioning is relatively easy. Casting a shared and clea.docxjesusamckone
 
3 Power points on nutrition while home schooling1 for elementary.docx
3 Power points on nutrition while home schooling1 for elementary.docx3 Power points on nutrition while home schooling1 for elementary.docx
3 Power points on nutrition while home schooling1 for elementary.docxjesusamckone
 
3 paragraph minimum, in text references, and scholarly references. .docx
3 paragraph minimum, in text references, and scholarly references. .docx3 paragraph minimum, in text references, and scholarly references. .docx
3 paragraph minimum, in text references, and scholarly references. .docxjesusamckone
 
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docxjesusamckone
 
3 page essay In-text scholar references in APA formatI.docx
3 page essay In-text scholar references in APA formatI.docx3 page essay In-text scholar references in APA formatI.docx
3 page essay In-text scholar references in APA formatI.docxjesusamckone
 
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
3 Law peer reviewed references needed.Answer the Discussion Board bo.docxjesusamckone
 
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docxjesusamckone
 
2To ADD names From ADD name Date ADD date Subject ADD ti.docx
2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx
2To ADD names From ADD name Date ADD date Subject ADD ti.docxjesusamckone
 
3 page essay regarding civil liberties, civil rights, and the presid.docx
3 page essay regarding civil liberties, civil rights, and the presid.docx3 page essay regarding civil liberties, civil rights, and the presid.docx
3 page essay regarding civil liberties, civil rights, and the presid.docxjesusamckone
 
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
2TITLE OF PAPERDavid B. JonesColumbia Southe.docxjesusamckone
 
2Running head THE JONES ACTThe Jones Act 2.docx
2Running head THE JONES ACTThe Jones Act 2.docx2Running head THE JONES ACTThe Jones Act 2.docx
2Running head THE JONES ACTThe Jones Act 2.docxjesusamckone
 
2BUS 503 JOURNAL .docx
2BUS 503 JOURNAL                                 .docx2BUS 503 JOURNAL                                 .docx
2BUS 503 JOURNAL .docxjesusamckone
 
2Fifth Edition COMMUNITY PSYCHOLOGY.docx
2Fifth Edition   COMMUNITY PSYCHOLOGY.docx2Fifth Edition   COMMUNITY PSYCHOLOGY.docx
2Fifth Edition COMMUNITY PSYCHOLOGY.docxjesusamckone
 
293Peter Singer has written about assisted reproduction, a.docx
293Peter Singer has written about assisted reproduction, a.docx293Peter Singer has written about assisted reproduction, a.docx
293Peter Singer has written about assisted reproduction, a.docxjesusamckone
 
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docxjesusamckone
 
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docxjesusamckone
 
2An Evaluation of UPSAn Evaluation of UPSs Approa.docx
2An Evaluation of UPSAn Evaluation of UPSs Approa.docx2An Evaluation of UPSAn Evaluation of UPSs Approa.docx
2An Evaluation of UPSAn Evaluation of UPSs Approa.docxjesusamckone
 

More from jesusamckone (20)

3 templates are due based on the focus review. Attached are the temp.docx
3 templates are due based on the focus review. Attached are the temp.docx3 templates are due based on the focus review. Attached are the temp.docx
3 templates are due based on the focus review. Attached are the temp.docx
 
3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
3-4 pages Explain Internal and External recruiting. Discuss the pro.docx3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
 
3-4 page essayInequality of income is greater in the United Sta.docx
3-4 page essayInequality of income is greater in the United Sta.docx3-4 page essayInequality of income is greater in the United Sta.docx
3-4 page essayInequality of income is greater in the United Sta.docx
 
3 Vision Visioning is relatively easy. Casting a shared and clea.docx
3 Vision Visioning is relatively easy. Casting a shared and clea.docx3 Vision Visioning is relatively easy. Casting a shared and clea.docx
3 Vision Visioning is relatively easy. Casting a shared and clea.docx
 
3 Power points on nutrition while home schooling1 for elementary.docx
3 Power points on nutrition while home schooling1 for elementary.docx3 Power points on nutrition while home schooling1 for elementary.docx
3 Power points on nutrition while home schooling1 for elementary.docx
 
3 paragraph minimum, in text references, and scholarly references. .docx
3 paragraph minimum, in text references, and scholarly references. .docx3 paragraph minimum, in text references, and scholarly references. .docx
3 paragraph minimum, in text references, and scholarly references. .docx
 
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
 
3 page essay In-text scholar references in APA formatI.docx
3 page essay In-text scholar references in APA formatI.docx3 page essay In-text scholar references in APA formatI.docx
3 page essay In-text scholar references in APA formatI.docx
 
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
 
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
 
2To ADD names From ADD name Date ADD date Subject ADD ti.docx
2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx
2To ADD names From ADD name Date ADD date Subject ADD ti.docx
 
3 page essay regarding civil liberties, civil rights, and the presid.docx
3 page essay regarding civil liberties, civil rights, and the presid.docx3 page essay regarding civil liberties, civil rights, and the presid.docx
3 page essay regarding civil liberties, civil rights, and the presid.docx
 
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
 
2Running head THE JONES ACTThe Jones Act 2.docx
2Running head THE JONES ACTThe Jones Act 2.docx2Running head THE JONES ACTThe Jones Act 2.docx
2Running head THE JONES ACTThe Jones Act 2.docx
 
2BUS 503 JOURNAL .docx
2BUS 503 JOURNAL                                 .docx2BUS 503 JOURNAL                                 .docx
2BUS 503 JOURNAL .docx
 
2Fifth Edition COMMUNITY PSYCHOLOGY.docx
2Fifth Edition   COMMUNITY PSYCHOLOGY.docx2Fifth Edition   COMMUNITY PSYCHOLOGY.docx
2Fifth Edition COMMUNITY PSYCHOLOGY.docx
 
293Peter Singer has written about assisted reproduction, a.docx
293Peter Singer has written about assisted reproduction, a.docx293Peter Singer has written about assisted reproduction, a.docx
293Peter Singer has written about assisted reproduction, a.docx
 
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
 
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
 
2An Evaluation of UPSAn Evaluation of UPSs Approa.docx
2An Evaluation of UPSAn Evaluation of UPSs Approa.docx2An Evaluation of UPSAn Evaluation of UPSs Approa.docx
2An Evaluation of UPSAn Evaluation of UPSs Approa.docx
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx

  • 1. 2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 11, NOVEMBER 2019 Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things Juntao Chen , Student Member, IEEE, and Quanyan Zhu, Member, IEEE Abstract— With the increasing connectivity enabled by the Internet of Things (IoT), security becomes a critical concern, and users should invest to secure their IoT applications. Due to the massive devices in the IoT network, users cannot be aware of the security policies taken by all its connected neighbors. Instead, a user makes security decisions based on the cyber risks that he perceives by observing a selected number of nodes. To this end, we propose a model which incorporates the limited attention or bounded rationality nature of players in the IoT. Specifically, each individual builds a sparse cognitive network of nodes to respond to. Based on this simplified cognitive network representation, each user then determines his security management policy by minimizing his own real-world security cost. The bounded rational decision-makings of players and their cognitive network formations are interdependent and thus should be addressed in a holistic manner. We establish a games-in- games framework and propose a Gestalt Nash equilibrium (GNE) solution concept to characterize the decisions of agents and
  • 2. quantify their risk of bounded perception due to the limited attention. In addition, we design a proximal-based iterative algorithm to compute the GNE. With case studies of smart communities, the designed algorithm can successfully identify the critical users whose decisions need to be taken into account by the other users during the security management. Index Terms— Risk management, bounded rationality, cogni- tive networks, Internet of Things, smart community. I. INTRODUCTION RECENT years have witnessed a significant growthof urban population. As the growth continues, cities need to become more efficient to serve the surging pop- ulation. To achieve this objective, cities need to become smarter with the integration of information and communication techniques (ICTs) and urban infrastructures. Driven by the advances in sensing, computing, storage and cloud technolo- gies, the Internet of Things (IoT) plays a central role in supporting the development of smart city. Though IoT enables a highly connected world, the security of IoT becomes a critical concern. There are 5.5 million new things connected Manuscript received May 21, 2018; revised March 4, 2019; accepted April 9, 2019. Date of publication April 15, 2019; date of current ver- sion July 2, 2019. This work was supported in part by the National Sci- ence Foundation under Award SES-1541164 and Award ECCS- 1847056, in part by the Army Research Office (ARO) under Grant W911NF1910041, and in part by a grant through the Critical Infrastructure Resilience
  • 3. Institute (CIRI). The associate editor coordinating the review of this manuscript and approving it for publication was Prof. Karen Renaud. (Corresponding author: Juntao Chen.) The authors are with the Department of Electrical and Computer Engi- neering, Tandon School of Engineering, New York University, Brooklyn, NY 11201 USA (e-mail: [email protected]; [email protected]). Digital Object Identifier 10.1109/TIFS.2019.2911112 Fig. 1. IoT-enabled interconnected smart community. The connectivity, on one hand, enhances the situational awareness of smart homes. However, it increases the cyber risks of the community. Hence, the cyber security of each household not only dependents on its own risk management strategy but also the ones of connected neighbors. every day in 2016, as we head toward more than 20 billion by 2020 [1]. These IoT devices come from different manufac- turers, and they have heterogeneous functionalities and secu- rity configurations and policies. No uniform security standards are used for IoT devices as they are developed using different system platforms for various functionalities. Moreover, due to the connections between IoT devices, the security of one device is also dependent on the security of other devices to which it connects. Therefore, the heterogeneity and the interconnectivity of massive heterogeneous IoT have created significant challenges for security management. Fig. 1 depicts a highly connected smart community enabled by IoT devices.
  • 4. Each household needs to take into account the cyber risks coming from their connected neighbors when securing their devices. In cyber networks, security management and practices of users are often viewed as the weakest link [2]. The lack of security awareness and expertise at the user’s end creates human-induced vulnerabilities that can be easily exploited by an adversary, exacerbating the insecurity of IoT. To this end, it is critical to enhance the security by strengthening security management in a decentralized way. Hence, in the IoT, each device owner or system manager needs to allocate resources (e.g. human resources, computing resources, invest- ments or cognition) to secure his applications. For example, the smart building operator can spend resources on upgrading the hardware, hiring staff members for network monitoring and forensics, and developing tailored security solutions to 1556-6013 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/i ndex.html for more information. Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC from IEEE Xplore. Restrictions apply. https://orcid.org/0000-0001-7726-4926 CHEN AND ZHU: INTERDEPENDENT STRATEGIC SECURITY RISK MANAGEMENT WITH BOUNDED RATIONALITY 2959 the smart building. A smart home user, on the other hand, can
  • 5. safely configure its network and regularly updates its software and password of the IoT devices as illustrated in Fig. 1. The devices in the IoT networks and their interconnections can be modeled as nodes and links, respectively. The security policy of one device can have an impact on the security risk of nodes that are connected to it. Since various users own different devices, the security management in IoT is decentralized in nature. Therefore, the process of decentralized security decision-making can be modeled as a game problem in which each user strategically allocates his resources to secure the devices [3]. In this game, the users’ risks are reduced when their connected neighbors are of high-level security. Due to the complex and massive connections, users cannot be aware of the security policies taken by all its connected neighbors. Instead, a user can only make security decisions based on the cyber risk he perceives by observing a selected number of nodes. This fact indicates that the game model needs to take into account the bounded rationality of players [4]. Therefore, in the game framework, we use a cognition vector representing the observation structure of each IoT user. Specifically, a sparser cognition vector represents a user with weaker cognition ability, and he observes a smaller number of other users’ behaviors when deciding his strategy. Thus, the limited attention nature of users creates a bounded perception of cyber risks. In the established bounded rational game model, the users need to make security management decisions as well as design their cognition networks in a holistic manner. In order to achieve this goal, we define a new solution concept called Gestalt Nash equilibrium (GNE) to capture the cognitive network formation and the security management under the bounded rationality simultaneously. The analysis of the GNE provides a quantitative method to understand the risk of mas- sive IoTs and gives tractable security management policies.
  • 6. We further design a proximal-based iterative algorithm to compute the GNE of the game. The GNE resulting from the algorithm reveals several typical phenomena that match well with the real-world observations. For example, when the network contains two groups of users, then under the limited attention, all users will allocate their cognition resources to the same group which demonstrates the law of partisanship. Further, in a heterogeneous massive IoT, the equilibrium successfully identifies the set of agents that are invariably paid attention to by other users, demonstrating the phenomenon of attraction of the mighty. Since the framework predicts the high-level systemic risk of the IoT network, it also can be used to inform the design of security standards and incentive mechanisms, e.g., through contracts and cyber insurance. The developed security management model provides an essential framework to assess IoT security risks when applied to various applications. For example, in smart home commu- nities, the households are connected together to share hetero- geneous information, e.g., electricity prices and temperature readings through smart meters, and real-time information of items in local stores and shops by wireless sensors. The con- nections of IoT devices thus create security interdependencies between households. Another broader application lies in the different components in smart cities. Due to the interconnec- tivity between large-scale infrastructures including the trans- portation, power grids, and communications, the manager of each sector needs to take into account the cyber risks coming from other components when adopting security solutions. The contributions of this paper are summarized as follows: 1) We propose a holistic framework to investigate the security management of users with bounded rationality in the IoT networks.
  • 7. 2) We model the cognition of users with a sparse vector and quantify users’ risk of bounded perception resulting from the underperceived cyber threats in the network. 3) We design a proximal-based algorithm to compute the GNE which contains security management strategy and cognitive network of agents. The algorithm discovers several phenomena including emergence of partisanship, filling the inattention, and attraction of the mighty. 4) We apply the proposed model to a smart community, and demonstrate that the designed algorithm can identify the most critical households in the network. A. Related Work Security management has been investigated in various research fields including computer networks [5], communica- tions [6], cloud computing [7] and infrastructures [8]. With the advances in ICTs, a growing number of works have focused on the emerging critical issue of IoT security [9]–[11]. Due to the interconnectivity between different agents, the security of one agent is also dependent on its connected ones which gives rise to the notion of “interdependent security” [12]. The authors in [13]–[15] have further investigated the security interdependencies in multilayer cyber-physical systems. Games over networks have caught a lot of attention recently especially from the economics perspective [16]–[19]. The couplings between players in the network can be either in a strategic exclusive or strategic complement manner. Based on the features of security management in IoT, our problem falls into the latter class. For the engineering applications, the authors in [8], [20] have studied the resource allocation game over interdependent critical infrastructures where both
  • 8. players aim to increase the connectivity of the network. Huang et al. [21], [22] have adopted a stochastic Markov game model to design resilient operating strategies for multi- layer networks. Zhu et al. [23] have proposed a game-theoretic framework for collaborative intrusion detection systems through resource management to mitigate network cyber threats. Our work differs from [23] in that we take into account the cognitive factors of human behaviors during decision making. Humans with limited knowledge or cognitive resources are bounded rational, since they cannot pay attention to all the information [24], [25]. Gabaix has proposed a “sparse max” operator to model the limited attention of players in which each agent builds a simplified model of the network based on an l1 norm [4]. Our work leverages on the established “sparse max” operator and formulates a constrained game program to capture the bounded cognition ability of players in Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC from IEEE Xplore. Restrictions apply. 2960 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 11, NOVEMBER 2019 TABLE I NOMENCLATURE the IoT. In addition, we further consider the risk management of each user based on their underperceived cyber risks over the network.
  • 9. B. Organization of the Paper The rest of the paper is organized as follows. Section II formulates a security management game over IoT networks with bounded rational players. Section III analyzes the prob- lem. Section IV designs a proximal-based iterative algorithm to compute the GNE. Case studies are given in Section V, and Section VI concludes the paper. C. Summary of Notations For convenience, we summarize the notations used in the paper in Table I. Note that notations associated with ∗ refer to the value at equilibrium. Furthermore, notations with index k stands for its value at step k during the iterative updates. II. PROBLEM FORMULATION In this section, we formulate a problem involving strategic security decision making and cognitive network formation of players in the IoT networks. A. Security Management Game Over Networks In an IoT user network including a set N of nodes,1 where N := {1, 2, . . . , N}, each node can be seen as a player 1The terms of node, agent and player refer to the user in the IoT, and they are used interchangeably. that makes strategic decisions on the security management to secure their IoT devices. For instance, in Fig. 1, each smart home is a player securing their smart things to mitigate the cyber threats. We define U := {u1, . . . , uN } by the decision profile of all the players. Specifically, ui is a one-dimensional
  • 10. decision variable representing player i ’s security management effort. For convenience, we denote u−i := U {ui }. The objective of player i , i ∈ N , is to minimize his security risk strategically by taking the costly action ui . We define by Fi1 : R+ → R+ the cost of security management effort of player i which is an increasing function of ui . The corresponding benefit of security management is captured by a function Fi2 : R+ → R+. Intuitively, a larger ui yields a higher return, and hence Fi2 is monotonically increasing. Due to the interconnections in the IoT, the risk of player i is also dependent on his connected users. Then, we use a function Fi3 : R+ × RN−1+ → R+ to represent the influence of player i ’s connected users on his security. The coupling between players in the IoT is in a strategic complement fashion with respect to the security decisions. More specifically, a larger security investment u j of player j , a connected node of player i , decreases the cyber risks of player i as well. Therefore, the cost function of player i can be expressed as the following form: J i (ui , u−i ) = Fi1(ui ) − Fi2(ui ) − Fi3(ui , u−i ), (1) where J i : R+ × RN−1+ → R. To facilitate the analysis and design of security risk management strategies, we spec- ify some appropriate forms of functions in (1). In the fol- lowing, we focus on player i taking the quadratic form: Fi1(ui ) = 12 Riii u2i , Fi2(ui ) = ri ui , and Fi3(ui , u−i ) =∑ j �=i, j∈ N Rii j ui u j . Thus, (1) can be detailed as J i (ui , u−i ) = 1 2 Riii u 2 i − ri ui −
  • 11. ∑ j �=i, j∈ N Rii j ui u j , (2) where Riii > 0, ri > 0, ∀ i , and Rii j ≥ 0, ∀ j �= i, i ∈ N . Note that parameters Rii j , i, j ∈ N , represent the risk dependence network of player i in the IoT, and the value of Rii j indicates the strength of risk influence of player j on player i which is given as a prior. The first term 12 R i ii u 2 i in (2) is the cost of security management with an increasing marginal price. The second term ri ui denotes the corresponding payoff of cyber risk reduction. Then, the first two terms capture the fact that increasing a certain level of cyber security becomes more difficult in a secure network than a less secure one. The last term ∑N j=1, j �=i Rii j ui u j is the aggregated security risk effect from connected users of player i . Specifically, the structure of Fi3 in ui and u j indicates that the risk measure J i of player i decreases linearly with respect to user j ’s action. Hence, in the established model, larger investment from a user helps reduce cyber risk influence in a linear way. We have following assumption on the security influence parameters.
  • 12. Assumption 1: Riii > ∑ j �=i, j∈ N Rii j , ∀ i ∈ N . Assumption 1 has a natural interpretation which indicates that the security of a user is mainly determined by his own strategy rather than other users’ decisions in the IoT network. Moreover, based on the heterogeneous influence networks Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC from IEEE Xplore. Restrictions apply. CHEN AND ZHU: INTERDEPENDENT STRATEGIC SECURITY RISK MANAGEMENT WITH BOUNDED RATIONALITY 2961 characterized by Assumption 1, each node designs its own security investment strategy which enables the decentralized decision-making. The strategies of nodes are interdependent due to the coupling between their cost functions shown in (2). Through the first order optimality condition (FOC), we obtain Riii ui − ∑ j �=i, j∈ N Rii j u j − ri = 0, ∀ i ∈ N . (3) Putting (3) in a matrix form yields ⎡
  • 13. ⎢ ⎢ ⎢ ⎣ R111 −R112 · · · −R11N−R221 R222 · · · −R22N ... ... . . . ... −RNN1 −RNN2 · · · RNN N ⎤ ⎥ ⎥ ⎥ ⎦ ⎡ ⎢ ⎢ ⎢ ⎣ u1 u2 ... uN ⎤
  • 14. ⎥ ⎥ ⎥ ⎦ = ⎡ ⎢ ⎢ ⎢ ⎣ r1 r2 ... rN ⎤ ⎥ ⎥ ⎥ ⎦ ⇔Ru = r, (4) where r := [ri ]i∈ N , u := [ui ]i∈ N . For convenience, we denote this security management game by G. One solution concept of game G is Nash equilib-
  • 15. rium (NE) which is defined as follows. Definition 1 (Nash Equilibrium of Game G [3]): The strt- egy profile u∗ = [u∗ i ]i∈ N constitutes a Nash equilibrium of game G if J i (ui , u∗ −i ) ≥ J i (u∗ i , u∗ −i ), ∀ i ∈ N , ∀ ui ∈ Ui . The NE of game G yields strategic security management policies of players under the condition that they can perceive all the cyber risks in the IoT network. B. Bounded Rational Security Management Game In reality, the users in IoT are connected with numerous other agents. For example, a single household can be con- nected with a number of other houses in terms of various types of IoT products in the smart communities. Therefore, when making security management strategies, each user may not be capable to observe all its connected neighbors. Instead, a user can only respond to a selected number of other players’ decisions. Then, this bounded rational response mechanism creates a cognitive network formation process for the players in the network. Specifically, player i ’s irrationality is captured by a vector mi := [mij ] j �=i, j∈ N , mij ∈ [0, 1], which stands for the attention network that player i builds. When mij = 0, user i pays no attention to user j ’s behavior; when mij = 1, user i observes the true value of security management u j of user j . The value that mij admits between 0 and 1 can be interpreted as the trustfulness of user i on the perceived u j . Another interpretation of mij can be the probability that user i observes the behavior of user j at each time instance on the security investment over a long period. Hence, the decision of player j perceived by player i becomes ucij = mij u j . Then, player i minimizes the modified cost function with bounded rationality defined as:
  • 16. J̃ i (ui , u ci−i , m i ) = 1 2 Riii u 2 i − ri ui − ∑ j �=i, j∈ N mij R i i j ui u j = 1 2 Riii u 2 i − ri ui − ∑ j �=i, j∈ N Rii j ui u ci j , (5) where J̃ i : R+ × RN−1+ × [0, 1]N−1 → R. The FOC of (5) gives Riii ui −
  • 17. ∑ j �=i, j∈ N Rii j u ci j − ri = 0, ∀ i ∈ N , which is equivalent to ⎡ ⎢ ⎢ ⎢ ⎣ R111 −m12 R112 · · · −m1N R11N−m21 R221 R222 · · · −m2N R22N ... ... . . . ... −mN1 RNN1 −mN2 RNN2 · · · RNN N ⎤ ⎥ ⎥ ⎥ ⎦ ⎡ ⎢ ⎢
  • 19. ⎦ ⇔Rsu = r. (6) The bounded rational best-response of player i , i ∈ N , then becomes ui = B Ri (uci−i ) = 1 Riii ⎛ ⎝ ∑ j �=i, j∈ N Rii j u ci j + ri ⎞ ⎠ , (7) where ucij = mij u j . We denote the security management game of players with limited attention by G̃ . Comparing with the solution concept NE of game G, the one of game G̃ is generalized to bounded rational Nash equilibrium (BRNE). The formal definition of BRNE is as follows. Definition 2 (Bounded Rational Nash Equilibrium of
  • 20. Game G̃ ): With given cognition vectors mi , ∀ i ∈ N , the strategy profile u∗ = [u∗ i ]i∈ N constitutes a BRNE of game G̃ if J̃ i (ui , u∗−i , mi ) ≥ J̃ i (u∗ i , u∗ −i , mi ), ∀ i ∈ N , ∀ ui ∈ Ui . Note that the cognitive network each user built has an impact on the BRNE of game G̃ . Hence, how the users determine the cognition vector mi , i ∈ N , becomes a critical issue. In the ensuing section, we introduce the cognitive network formation of players in the IoT. C. Cognitive Network Formation Due to the massive connections in IoT, each user builds a sparse cognitive network containing the agents to observe. To this end, the real cost of user i by taking the bounded rationality into account becomes J i (B Ri (uci−i ), u−i ) = 1 2Riii ⎛ ⎝ ∑ j �=i, j∈ N Rii j u ci j + ri ⎞
  • 21. ⎠ 2 − ∑ k �=i,k∈ N ⎡ ⎣ 1 Riii Riik uk ⎛ ⎝ ∑ j �=i, j∈ N Rii j u ci j + ri ⎞ ⎠ ⎤ ⎦
  • 22. − ri Riii ⎛ ⎝ ∑ j �=i, j∈ N Rii j u ci j + ri ⎞ ⎠ = 1 2 ∑ j �=i, j∈ N ∑ k �=i,k∈ N 1 Riii Rii j R i ik u
  • 23. ci j u ci k − 1 2Riii (ri ) 2 − ∑ k �=i,k∈ N ⎛ ⎝ ∑ j �=i, j∈ N ucij R i i j ⎞ ⎠ 1 Riii
  • 24. Riik uk − ∑ k �=i,k∈ N 1 Riii ri R i ik uk . Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:24:56 UTC from IEEE Xplore. Restrictions apply. 2962 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 11, NOVEMBER 2019 Incorporating the cognition vector mi into the real cost of player i further yields J i (B Ri (uci−i ), u−i ) = 1 2 ∑ j �=i, j∈ N
  • 25. ∑ k �=i,k∈ N mij 1 Riii Rii j R i ikm i ku j uk − 1 2Riii (ri ) 2 − ∑ k �=i,k∈ N ∑ j �=i, j∈ N mij 1 Riii
  • 26. Rii j R i iku j uk − ∑ k �=i,k∈ N 1 Riii ri R i ik uk . (8) Recall that each user aims to minimize the security risk based on the risks he perceives. Thus, by considering the real cost induced by the bounded rationality constraint, the strategic cognitive network formation problem of player i can be formulated as mi∗ = arg min mij , j �=i, j∈ N J i (B Ri (uci−i ), u−i ) + αi‖mi‖1 = arg min mij , j �=i, j∈ N 1 2
  • 27. ∑ j �=i, j∈ N ∑ k �=i,k∈ N 1 Riii Rii j R i ik u j ukm i j m i k − ∑ j �=i, j∈ N ∑ k �=i,k∈ N 1 Riii Rii j R
  • 28. i ikuku j m i j + αi‖mi‖1 = arg min mij , j �=i, j∈ N 1 2 mi T �i mi − eTN−1�i mi + αi‖mi‖1, where �i := [�ij k] j �=i,k �=i, j∈ N ,k∈ N , �ij k = 1Riii R i i j R i iku j uk , eN−1 is an N − 1-dimensional column vector with all one entries, and αi is a weighting factor capturing the unit cost of cognition of player i and it can be tuned to match with experimental data. The term ‖mi‖1 is a convex relaxed version of ‖mi‖0 which approximately maintains the sparse property of player i ’s cognitive network [26], [27]. The integrated term αi‖mi‖1 can be interpreted as the cognitive cost of user i . Therefore, for player i , we need to solve the following constrained optimization problem: min
  • 29. mij , j �=i, j∈ N 1 2 mi T �i mi − eTN−1�i mi + αi‖mi‖1 s.t. 0 ≤ mij ≤ 1, j �= i, j ∈ N , (Risk perception), (9) where the constraints mij ∈ [0, 1], ∀ j �= i , indicate the risk perception behavior of user i . The number of cognitive links that player i can form is generally a positive integer, i.e., ‖mi‖1 = βi ∈ N+. Note that βi here and αi in (9) have the same interpretation which both quantify the cognition ability of player i . Then, by choosing αi strategically, the problem in (9) is equivalent to the following problem: min mij , j �=i, j∈ N 1 2 mi T �i mi − eTN−1�i mi s.t. 0 ≤ mij ≤ 1, j �= i, j ∈ N , (Risk perception), ‖mi‖1 = βi , (Limited attention), (10) where βi ∈ N+ ≤ N − 1 is the total number of links that
  • 30. player i can form in his cognitive network, quantifying his Fig. 2. IoT user and cognitive network-of-networks. Users make strategic security management decisions in the IoT network as well as determine their cognitive networks. The security management game in layer G2 and the cognitive network formation game in layer G1 are interdependent which create a games-of-games framework. limited attention. Simulation studies in Section V reflect that considering ‖mi‖1 = βi yields sparser cognitive networks. Note that we still solve (9) by selecting a proper αi which yields equivalent (9) and (10). D. Gestalt Nash Equilibrium The formulated security management under bounded ratio- nality problem boasts a games-of-games structure. The users make decisions strategically in the IoT network as well as form their cognitive networks selfishly. The security man- agement game and cognitive network formation game are interdependent. Therefore, the cognitive and IoT user layers shown in Fig. 2 constitute a network-of-networks framework. In this paper, we aim to design an integrated algorithm to design the cognitive networks and determine the security risk management decisions of users in a holistic manner. To this end, we present the solution concept, Gestalt Nash equilibrium, of the bounded rational security risk management game as follows. Definition 3 (Gestalt Nash Equilibrium): The Gestalt Nash equilibrium (GNE) of the security risk management game
  • 31. under bounded rationality is a profile (mi∗ , u∗ i ), ∀ i ∈ N , that satisfies J̃ i (u∗ i , u∗ −i , mi∗)≤ J̃ i (ui , u∗ −i , mi ), ∀ ui ∈ Ui , ∀ mi ∈ [0, 1]N−1. At the GNE, all the players in the network do not change their action ui and cognition vector mi , ∀ i ∈ N , simultaneously. Remark: The strategic security management profile u∗ = [u∗ i ]i∈ N at GNE is also a BRNE. In the following, we aim to analyze the GNE of the game and compute it by designing algorithms. III. PROBLEM ANALYSIS We first analyze the convergence of the bounded rational best-response dynamics of players in Section II-B. Then, we quantify the risk of bounded perception due to limited attention of players. We further reformulate the cognitive network formation problem presented in Section II-C. A. Bounded Rational Best Response Dynamics Based on Section II-B, the bounded rational best-response dynamics of player i under cognitive network mi , i ∈ N , can Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at … IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1 A Survey on Digital Forensics in Internet of Things
  • 32. Jianwei Hou , Yuewei Li, Jingyang Yu, and Wenchang Shi Abstract—Internet of Things (IoT) is increasingly permeat- ing peoples’ lives, gradually revolutionizing our way of life. Due to the tight connection between people and IoT, now civil and criminal investigations or internal probes must take IoT into account. From the forensic perspective, the IoT environment con- tains a rich set of artifacts that could benefit investigations, while the forensic investigation in IoT paradigm may have to alter to accommodate characteristics of IoT. Therefore, in this article, we analyze the impact of IoT on digital forensics and systematize the research efforts made by previous researchers from 2010 to 2018. We sketch the landscape of IoT forensics and examine the state of IoT forensics under a 3-D framework. The 3-D frame- work consists of a temporal dimension, a spatial dimension, and a technical dimension. The temporal dimension walks through the standard digital forensic process while the spatial dimension explores where to identify sources of evidence in IoT environ- ment. These two dimensions attempt to provide principles and guidelines for standardizing digital investigations in the context of IoT. The technical dimension guides a way to the exploration of tools and techniques to ensure the enforcement of digital forensics in the ever-evolving IoT environment. Put together, we present a holistic overview of digital forensics in IoT. We also highlight open issues and outline promising suggestions to inspire future study. Index Terms—Cybercrime, digital forensics, Internet of Things (IoT).
  • 33. I. INTRODUCTION W ITH the Internet of Things (IoT) permeating our dailylives, people are becoming more reliant on various kinds of smart IoT services, leaving traces on various IoT devices. These rich repositories of digital traces in IoT envi- ronment can provide insight into people’s daily activities in their home and elsewhere, which are of great value to digital forensics [1]. On the other hand, the number of both civil and criminal cases involving IoT devices or services has grown. IoT devices may not only be targets for attacks, but also tools for committing crimes. Security vulnerabilities in IoT systems can be leveraged to remotely control the systems, for exam- ple, to control the accelerator and brake system of the smart Manuscript received May 9, 2019; revised July 9, 2019; accepted August 26, 2019. Date of publication September 11, 2019; date of current version January 10, 2020. This work was supported in part by the National Natural Science Foundation of China under Grant 61472429, in part by the Natural Science Foundation of Beijing Municipality under Grant 4122041, and in part by the National High Technology Research and Development Program of China under Grant 2007AA01Z414. (Corresponding author: Wenchang Shi.) J. Hou, Y. Li, and W. Shi are with the School of Information, Renmin University of China, Beijing 100872, China (e-mail: [email protected]; [email protected]; [email protected]).
  • 34. J. Yu is with the School of Information, Renmin University of China, Beijing 100872, China, and also with the School of Computer and Information Engineering, Henan University, Kaifeng 475004, China (e-mail: [email protected]). Digital Object Identifier 10.1109/JIOT.2019.2940713 vehicle to cause an incident. Therefore, there is an urgent need for IoT forensics research to assist in determining the who, what, where, when, and how for cases. The rapid adoption of IoT expands the range of digi- tal evidence from the PC or laptops to a wide range of IoT devices (e.g., wearable devices and automobiles) as well as various cloud-based IoT services, which presents multi- faceted challenges for investigators. Although current forensic methodologies and tools still prove useful at some stages of forensics in IoT domain, there is still a pressing need to update current tools, procedures, and legislation to deal with unique characteristics of IoT [2]. The main goal of this survey is to have an overview of the state of IoT forensics and provide guidelines for future research and practices on it. We try to provide a comprehensive and structured landscape of IoT forensics under a 3-D frame- work. The framework encompasses a temporal dimension, a spatial dimension, and a technical dimension. From the temporal dimension, IoT forensics follows the standard digital forensic process including collection, exam- ination, analysis, and reporting to transform media into evi- dence and calls for appropriate forensic models to support the
  • 35. reasonable and appropriate use of forensic tools for practi- cal investigations involving IoT. From the spatial dimension, we explore IoT forensics with respect to the forensic envi- ronment where potential evidence may exist. Based on the typical architecture of IoT, the major sources of evidence in IoT forensics can be divided into three domains, i.e., device, network, and cloud. From the technical dimension, we inves- tigate IoT forensics by exploring the enabling methods, tools, or techniques that can provide the ability to collect and exam- ine volatile or nonvolatile data and to perform quick reviews or in-depth analysis of data from various sources of evidence in IoT environment. Together with the three dimensions, we make a system- atic analysis of existing efforts on digital forensics in IoT paradigm to present a holistic overview of this domain. We also point out open issues that IoT forensics faces and put for- ward promising suggestions to assist with future research. The main contributions of this article are highlighted as follows. 1) We discuss and summarize the impact of IoT on digi- tal forensics according to fundamental characteristics of IoT. 2) We provide an overview of existing research efforts from 2010 to 2018 on IoT forensics and briefly introduce the development of IoT forensics. 3) We sketch the landscape of IoT forensics and review the state of it under a 3-D framework. 4) We highlight the open issues in the field of IoT forensics and propose corresponding suggestions. 2327-4662 c© 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
  • 36. See http://www.ieee.org/publications_standards/publications/rights/i ndex.html for more information. Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC from IEEE Xplore. Restrictions apply. https://orcid.org/0000-0001-5503-8143 2 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 The remainder of this article is organized as follows. In Section II, we introduce the background of digital forensics and discuss the impact of IoT on digital forensics. We also introduce smart home as a typical IoT scene that helps to illustrate digital forensics in IoT environment later in the fol- lowing sections. In Section III, we select and investigate the recent literature on IoT forensics and clarify the development of IoT forensics research. We sketch the landscape of IoT forensics under a 3-D framework in Section IV and illustrate each dimension in detail in Sections V–VII, respectively. In Section VIII, from the three dimensions, we highlight the open issues and present promising suggestions for future research and practices in the field of IoT forensics. Finally, we conclude this article in Section IX. II. BACKGROUND A. Digital Forensics Digital forensics aims to gain a better understanding of an event of interest by finding and analyzing the facts related to that event [3]. The digital forensic investigators reveal the
  • 37. truth of an event by discovering and exposing the remnants (footprints or artifacts) of an event left on the digital system. The NIST Recommendation [4] has divided the digi- tal forensic investigation process into four consecutive (or iterative if necessary) phases, i.e., collection, examination, analysis, and reporting. Although different sources of evidence may call for different methodologies and generate different types of evidence, digital investigations in IoT environment still need to be carried out under this process to support the admissibility of evidence in legal processing. B. Forensic Soundness Forensic soundness is the basic principle for forensic inves- tigations. On the one hand, it refers to the fact that the digital forensic process must follow a certain standard so that it can be admissible in a court of law. On the other hand, the applica- tion or development of forensic tools and techniques should be undertaken in accordance with the relevant rules of forensics to protect the evidence from damage. A process is consid- ered to be forensically sound if it meets the following four criteria [5]. 1) Meaning: The forensic process cannot change the orig- inal meaning of evidence or should try to have the minimum change. 2) Errors: The forensic process should avoid undetectable errors and any error in the process should be properly documented. 3) Transparency and Trustworthiness: The reliability and accuracy of the forensic process are capable of being tested and/or verified by, for example, an external exam- ination of the forensic procedures by a court of law.
  • 38. 4) Experience: The individuals undertaking the forensic investigation should have sufficient experience or knowl- edge and should not undertake an examination that is beyond his/her current level of knowledge and skill. Fig. 1. Impact of IoT on digital forensics. C. Impact of IoT on Digital Forensics IoT enables more and more devices “online,” providing various kinds of smart services (e.g., smart city, medical care, and smart home) that are bound up with peoples’ lives. Considering the fundamental characteristics of IoT, we discuss the impact of IoT on digital forensics, summarized in Fig. 1. 1) Ubiquitous Sensing: With temperature sensors, motion detectors, or pressure sensors, IoT devices have the ubiquitous sensing ability so that they contain potential evidence closely related to the behavior of their owners and other devices in their environments [6]. More diverse sources of evidence and fine-grained sensing in IoT contribute to reconstructing the context of cases, which also produces a large volume of forensic data needing to be dealt with. 2) Dynamic Changes: The state of IoT devices changes dynamically. That is, a device may join or leave a network autonomously or with the movement of users at any time. Due to such temporal and spatial change properties, network topologies change dynamically and network bound- aries become blurry, which would make it more difficult to identify the boundaries of cases [7]. The dynamic fea- ture of IoT calls for real-time logging to record temporal information, such as modified time, accessed time, and cre- ated time, which can help to correlate and sequence the digital evidence gathered from different devices.
  • 39. 3) Automated Execution: There are real-time and auto- mated interactions between IoT devices to facilitate the col- laboration between different IoT applications [8]. Devices may operate automatically according to the information from surroundings or other entities, reducing human intervention. Within automated systems, there are questions of control (who/what did it?) and responsibility (who/what is at fault?) while the increase of interactions makes it prohibitively com- plex to trace back incidents through a chain of different devices. 4) Resource-Limited Characteristic of Devices: Due to the limited resources of some IoT devices, data on the devices may have a short survival period before being overwritten by the latest data and is usually sent to cloud or other data cen- ter. Therefore, it is more difficult to locate where potential evidence may exist. On the other hand, these resource-limited devices may be in the absence of adequate security guarantee, so that malicious users may easily modify or destroy the logs and relevant data on the devices [9]. Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC from IEEE Xplore. Restrictions apply. HOU et al.: SURVEY ON DIGITAL FORENSICS IN IoT 3 Fig. 2. IoT forensics paradigm of smart home. 5) Highly Heterogeneous: Based on different hardware, software, and networks, IoT devices are heterogeneous with multiple protocols, diverse data formats, and proprietary interfaces. Types of data in IoT forensics may be diverse
  • 40. in various vendor-specific formats. Heterogeneous devices may call for different tools or methods for data collection, examination, and analysis, which requires more efforts for investigators. The contemporary forensic tools may not be able to deal with every source of evidence, which calls for new tools. New tools should be properly tested and assessed prior to their use [5] because unreliable tools may lead to uncer- tainty and loss, and affect the soundness of evidence and even the final conclusion. 6) Special Security Characteristic: IoT bridges the gap between the cyber world and the physical world, so that secu- rity threats in the cyber world can bring safety threats to the real-world and vice versa [10]. IoT enables the communica- tion abilities to various kinds of devices (e.g., smart appliances, connected vehicles, and personal health devices) and connects them to the network, which may lead to broad attack faces. A single IoT device can be used to compromise other connected devices due to the connection between devices, which will transfer or expand the impact and increase the complexity of forensics. Moreover, due to the integration of the cyber world and the physical world, IoT devices can be remotely controlled to operate the physical world. Therefore, unsafe and insecure operations on IoT devices may result in a real loss of services and even the loss of life. There is a growing need for foren- sics to reconstruct security/safety incidents or troubleshoot the operational problems in IoT systems. And the security threat that adversaries can remotely control the device to remove or modify traces (e.g., logs and videos) or even destroy the device may make the evidence fragile and compromise the integrity of evidence. D. Typical IoT Scene Smart home is a typical application scenario in IoT includ- ing three layers of a typical IoT architecture: 1) a sensing
  • 41. layer; 2) a networking and data communication layer; and 3) an application layer. A smart home system is usually composed of a hub, multiple IoT devices, and a back-end server (e.g., a cloud), as shown in Fig. 2. Thermostats, lightings, cameras, and voice assistants are endpoint IoT devices in the sensing layer to measure, collect, and process the state information associ- ated with these things. These devices use wired or wireless communication protocols to communicate in the network and data communication layer. They can communicate through the Internet via the hub or directly through a local network. The hub can send the data from devices to the back-end cloud for storage, processing, and application. Users can control the devices or obtain status information of devices by sending commands to the cloud through Apps on mobile phones or Webs. Then the hub receives commands from the server and sends them to the devices, so that devices will execute relevant operations according to the commands. Devices may also col- laborate with each other automatically according to predefined conditions. We will take this typical IoT scene as an example to illus- trate in detail the digital forensics in the IoT environment from different perspectives later. III. LITERATURE REVIEW ON IOT FORENSICS A. Literature Selection Process In order to have a clear picture of digital forensics in the IoT environment, this section provides an extensive literature review of the research on IoT forensics. This article selection strategy consists of three main stages. 1) Stage 1: Define the keywords to search relevant papers
  • 42. from electronic databases (DBLP, IEEE Xplorer, and Science Direct). Considering the alternatives and other synonyms of essential components of the keywords, the subsequent exploration string was defined: (“Forensic” OR “Investigation” OR “Evidence”) AND (“Things” OR “Internet of Things” OR “IoT” OR “Smart”). 2) Stage 2: Select papers based on the title, publication year, and language of them (only includes the papers written in English). To ensure that only high-quality pub- lications were included in the study, we focus on jour- nal publications and conferences papers published by Elsevier, IEEE, Springer, ACM, and Wiley. Moreover, opinion-driven reports (editorials, commentaries, and letters) and books were excluded. 3) Stage 3: Review the abstracts and full texts of the selected papers to verify the relevance of these papers. The cited information, abstracts, and keywords of the papers were recorded for further analysis. Finally, 58 papers published between 2010 and 2018 were extracted through the three phases, as shown in Table I. B. Overview of Existing Research on IoT Forensics From the distribution of the papers by the year of publi- cation from 2010 to 2018, there is a sharp increase number of papers in 2018 and all the other years witness a grad- ual increase. Research on IoT forensics has entered a new Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC from IEEE Xplore. Restrictions apply.
  • 43. 4 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 TABLE I DISTRIBUTION OF EXISTING RESEARCH ON IOT FORENSICS period of significant growth since 2016 with the wide appli- cation of IoT devices in production and life. The 58 papers are classified under five categories including survey papers, models/frameworks, forensic methods, forensic systems, and forensic techniques/tools. From 2010 to 2018, there was ongoing research on forensic methods to provide guidelines for investigations on differ- ent sources of evidence in IoT and explore feasible forensic methods and techniques. The greater part of the work stud- ies enabling forensic techniques and tools for the coming new demands and challenges of digital forensics in IoT envi- ronment, concerning evidence collection, examination, and analysis. Early work on IoT forensics was predominantly theoretical in nature, and aimed to deal with issues about frameworks and models. In 2013, Oriwoh et al. [2] first explored the conceptual digital forensic models for IoT forensics to guide forensic investigations involving the IoT, which provided the basis for further research on forensic models and frameworks. At the same time, they also explored the automated forensic system that aims to make the IoT environment forensically ready before potential cases occur [14]. The two research efforts laid the foundation of research on IoT forensics. Since then, there have been a great number of papers exploring
  • 44. IoT forensic frameworks/models to guide procedures for rou- tine forensic tasks and developing forensic systems to ensure forensic readiness abilities for IoT. Some survey papers [9], [46]–[48], [56], [57], [64] have made a preliminary exploration of challenges in IoT forensics. Chernyshev et al. [46] mainly focused on conceptual digi- tal forensic models that can be applied to IoT environment. Bréda et al. [48] analyzed the minimal functional forensic requirements of IoT devices to provide reliable information. The requirements are defined in the user data protection class by the access control policy, the access control functions, the data authentication, and integrity requirements of the stored data to maintain a minimum level of data integrity in the IoT environment. Losavio et al. [64] analyzed in detail the legal concerns on data collection and analysis in IoT forensics. There are also some surveys investigating IoT forensics in different IoT applications. The works in [15], [29], [30], [42] focus on forensic challenges associated with smart TVs, health and fitness related devices, vehicles, and smart cities, respectively. Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC from IEEE Xplore. Restrictions apply. HOU et al.: SURVEY ON DIGITAL FORENSICS IN IoT 5 In this article, we aim to outline the landscape of digital forensics in the IoT paradigm to provide guidance for forensic practitioners and researchers. We conduct a systematic review of the research status of IoT forensics under a 3-D framework and indicate future research directions.
  • 45. IV. LANDSCAPE OF IOT FORENSICS IoT forensics is a branch of digital forensics that carries out digital forensics in the IoT environment. Forensic researchers and practitioners have tried to make digital forensics applicable to the context of IoT. Therefore, IoT forensics still follows the principles of digital forensics. It consists of two basic aspects. One is the forensic investigation itself and the other is the ability that enables the forensic investigation. Within a forensic investigation process, data is extracted from various media, then is transformed into information, and finally becomes evidence that can be legally acceptable in a court of law [4]. Therefore, from the perspective of foren- sic investigations, there are two core questions, including how to obtain evidence and where to find evidence. The tempo- ral dimension explores how to generate legally accepted and reliable evidence in line with a standard forensic process in IoT environment, including collection, examination, analysis, and reporting. The spatial dimension focuses on completely identifying potential sources of evidence, that is, to answer where to find evidence. Case-related information in IoT can be collected from different data sources that can be grouped into three types, i.e., device, network, and cloud, based on the typical IoT architecture. On the other hand, technical abilities to enable forensic investigations also play important roles in the landscape of IoT forensics. The technical dimension aims to explore appropriate techniques/tools for data collection, examination, and analysis. As the forensic environment changes, IoT poses challenges to existing forensic techniques/tools that need to update to deal with the forensics task in IoT environment. Based on our sur- vey, contemporary research on technical preparations for IoT forensics can be broadly divided into three categories includ-
  • 46. ing forensic readiness techniques, evidence extraction tools or techniques for different data sources, and some other forensic techniques to resolve challenges in IoT forensics. Moreover, IoT forensics is under the legal principle. All activities and actions within investigations start with autho- rization and must comply with laws and regulations in the jurisdictions. We then survey the literature on forensics in IoT environ- ment under a unified framework consisting of three orthogonal coordinates, as shown in Fig. 3. We try to illustrate in detail various aspects of IoT forensics, which may help forensic researchers and practitioners with a systematic understanding of this domain. V. IOT FORENSICS FROM THE TEMPORAL DIMENSION From the temporal dimension, a forensic investigation in IoT environment should be conducted within the standard process, so that the collected evidence can be admissible on the court. Fig. 3. Landscape of IoT forensics with three dimensions. A. Forensic Process in Smart Home Scene When performing a forensic investigation in a smart home scene described in Section II, investigators need to identify objects of forensic interest (OOFIs) on the spot first, includ- ing smart camera, voice assistants and some other appliances. These smart appliances on the spot connect to network devices (i.e., smart hub) to communicate with the external environ- ment. So network traffic, cloud, and companion Apps on cell phones or PCs also need to be included in the investigation. First responders should consider the possible need to col- lect volatile data, which can be collected only from a live
  • 47. system that has not been rebooted or shut down since the event occurred. Then, investigators need to examine the data obtained from OOFIs using specialized forensic toolkits to screen out the data related to the case. Therefore, investigators need to parse the data of different formats, which not only includes the data with relatively uniform formats from the phones and PCs but also the data with proprietary formats from various IoT devices. Next, investigators correlate the data from different sources to identify people, places, items, events, and their relations to construct the facts of the case. For example, thermostat readings and lighting records may prove the presence of users when someone claimed he was out of the home and videos from cameras may show the individuals’ behaviors at home. The three phases above can be iterative because new sources of evidence could be revealed during the analysis of data. Finally, investigators need to review the actions performed in the above three phases to ensure that all evidence reaches a definitive explanation of what happened. They also need to report in detail the results of the analysis, which may include describing the actions already performed, explaining how tools and procedures were selected, and determining what other actions need to be performed. B. Research on Forensic Models for IoT Forensics As a branch of digital forensics, there is a consensus that IoT forensics follows the four-phase forensic process. However, there is no accepted digital forensic model that can help to con- duct digital investigations in an IoT-based environment. Some research aims to explore general and standard forensic mod- els to facilitate consistent, effective, and accurate actions in
  • 48. forensic investigations involving IoT. Authorized licensed use limited to: University of the Cumberlands. Downloaded on March 07,2020 at 22:06:57 UTC from IEEE Xplore. Restrictions apply. 6 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 Oriwoh et al. [2] proposed a 1-2-3 zone approach and a nest- best-thing (NBT) approach for evidence acquisition within the IoT domain. The 1-2-3 zone approach divided the investigation area into three zones: 1) the internal network; 2) the middle; and 3) the external network. The evidence extraction process in each zone can be conducted in parallel. The NBT triage model assists with the identification of additional sources of evidence when the primary source is unavailable. The two models are of guiding significance in the identification stage in IoT-based investigations. Perumal et al. [22] have proposed a top-down model that follows the standard operating procedures (SoPs). During the investigation, this model starts with authorization and plan- ning. It introduces machine to machine (M2M) communication and integrates 1-2-3 zone model and triage model with the general forensic process to deal with IoT-based investiga- tions. Although this paper gives a complete model covering each stage of the digital forensic process, it mainly focuses on identification without dealing with analysis and other processes. Rahman et al. [26] have highlighted the importance of forensic readiness and proposed a forensic-by-design frame- work for cyber-physical cloud systems (CPCSs) based on
  • 49. ISO/IEC 27043:2015 [66]. The framework has defined the design principles of CPCS to facilitate forensic investigations. The principles comprise six factors, including risk manage- ment principles and practices, forensic readiness principles and practices, incident-handling principles and practices, laws and regulations, CPCS hardware and software require- ments, and industry-specific requirements. DFIF-IoT [27] is a complete forensic framework to guide digital investigations in IoT-based infrastructures. The frame- work is composed of proactive process, IoT forensics, reac- tive process, and concurrent process. Proactive process aims to make IoT environment forensically ready. IoT forensics consists of cloud forensics, network forensics, and device level forensics. Reactive process is consistent with the tra- ditional forensic investigation process and will be performed in response to an incident of forensic concerns. Concurrent process is conducted throughout the whole process involv- ing obtaining authorization, documentation, preservation of the chain of custody, physical investigation, and interaction with physical investigations. Under the consideration of a complex set of relationships among different IoT entities, IDFIF-IoT [65] extended DFIF-IoT framework. Discussion of interactions in IoT ecosystems can assist with the planning process for gathering, storing, and handling digital evidence in advance before investigation. The two frameworks cover the complete forensic process, and are insightful in standardiza- tion of IoT-based forensic process. However, the recognition of the frameworks still needs to be discussed further by all stakeholders. FSAIoT [41] pointed out that states of IoT devices or the changes of states could be of forensic value. It proposed a model for the state acquisition of plenty of IoT devices to deal with forensics on IoT devices. This paper implemented the prototype of the framework, which can acquire states of
  • 50. devices from devices, clouds, and controllers, to prove its availability. Zia et al. [1] proposed an application-specific digital foren- sic model for IoT forensics. The model provides guidelines for forensic investigations …