SlideShare a Scribd company logo
Maulana Abul Kalam Azad University of Technology, W.B.
IoT Forensics
Submitted By
Aakashjit Bhattacharya
Roll Number:- 30011218021
Registration Number:- 183000410054 of 2018-2019
Guided By
Professor Debashish De & Dr. Koushik Majumder
Computer Science & Engineering Department
M.A.K.A.U.T., W.B.
IoT Forensics Issues
• Internet Of Things
• Characteristics of IoT
• Digital Forensics
• IoT Forensics
• Categories of Evidences With Respect To a Crime Scene
• Cyber Security challenges in IoT
• Open Issues and Scope of work
• Conclusion
• Reference
Content
Internet of Things
• Building block for Smart homes and Smart Cities.
• 3 layers:- Sensing layer, Communication layer, Transmission layer.
• Lot of things work parallel, to complete the entire architecture of an IoT System, which
includes low-power embedded system, big-data, Machine Learning and networking.
• Provides M2M connectivity across all the connected devices.
Characteristics of IoT
• Scalable
• Low power consumption
• Efficient
• Low computational power
Digital Forensics
Digital forensics (sometimes known as digital forensic science) is a
branch of forensic science encompassing the recovery and
investigation of material found in digital devices, often in relation
to computer crime.
A digital forensic investigation commonly consists of 3 stages:
acquisition or imaging of exhibits, analysis, and reporting.
Evidences used in digital forensics are : hard drive of the criminals’ computer, laptop, external hard drives,
USB devices, mobile devices, etc. [2].
Three Possible Roles of A Computer Digital Forensics [4]
1. Computer can be the aim of the crime.
2. It can be responsible/ source of the crime.
3. It can act as an evidence/ proof of information that contains criminal acts.
IoT Forensics
Deals with IoT-related cybercrimes that includes investigation of connected devices, sensors and
the data stored on all possible platforms.
As security breach can take place in any of the three layers of this IoT Architecture, so IoT
forensics need to inspect all the three layers well in order to detect the crime.
Categories of Evidences With Respect To A Crime Scene
1. Smart devices and sensors : It includes sensors, smart devices, automation tools those
are powered by IoT Architecture, in other words, the
gadgets those are present in the Crime Scene.
2. Hardware and Software : Communication link between smart devices and the external
world which includes IPS, Firewalls, Computers.
3. External resources : Areas outside networks under investigation, that includes
Cloud, Social Media, ISPs, Network Providers.
Reference:- https://hub.packtpub.com/iot-forensics-security-connected-world/
Timeline of Evolution of IoT Forensics from Computer Forensic [3]
Reference :- Ana Nieto, Ruben Rios, Javier Lopez, IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations, MDPI, February 2018
Security Challenges in IoT[1]
Secure constrained devices Limited amounts of storage, memory, and processing capability and they
often need to be able to operate on lower power, so many encryption
algorithms can’t be used and so can’t transmit data securely in real-time.
Authorize and authenticate
devices
Many IoT device fails to establish their identity before accessing gateways,
upstream services and apps as they fail in device authentication.
Applying Device Updates 1. There is a need to keep track of which updates are available and apply
those updates consistently across distributed environments with
heterogeneous devices that communicate through a range of different
networking protocols.
2. Only Some devices support over-the-air updates, or updates without
downtime, but the other devices might need to be physically accessed
or temporarily pulled from production to apply updates.
Secure Communication Many IoT device do not encrypt message before transmitting.
https://developer.ibm.com/articles/iot-top-10-iot-security-challenges/Reference [1]
Security Challenges in IoT (contd.)
Ensure Data Privacy and
Integrity
The application of data privacy includes anonimizing sensitive data before
it is stored or using data separation to separate personally identifiable
information from IoT data payloads. Unrequired data must be securely
disposed of, and if data is stored, compliance should be maintained with
legal and regulatory frameworks is also an important challenge.
Secure web, mobile, and
cloud applications
As a part of multi-layered approach of IoT security, WEB MOBILE and
CLOUD APPS and SERVICES that are used to manage, access and process
IoT devices and data must be secured
Detect vulnerabilities and
incidents
When there is large scale implementation of IoT systems, then the
complexity of the system from the perspective of the variety of devices
connected, apps and services, and communication protocols involved, can
make it difficult to identify when an incident has occurred.
Predict and preempt security
issues
IoT security challenge in long term is to apply security intelligence for
detecting and mitigating issues, predicting and proactively protecting
against potential security threats.
Threat modelling[7] is one approach to predict security issues.
1. Identification, collection and preservation of Evidence
2. Co-relation and analysis of evidence.
3. Attack or deficit attribution.
& Scope of work
[1] https://developer.ibm.com/articles/iot-top-10-iot-security-challenges/
[2] Áine MacDermott, Thar Baker, Qi Shi, IoT Forensics: Challenges For The IoA Era, IEEE Xplore 2nd April 2018.
[3] Ana Nieto, Ruben Rios, Javier Lopez, IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations, MDPI, DOI:
https://doi.org/10.3390/s18020492. Received: 28 December 2017 / Revised: 25 January 2018 / Accepted: 4 February 2018 /
Published: 7 February 2018
[4] Gianni Fenu and Fabrizio Solinas , COMPUTER FORENSICS INVESTIGATION AN APPROACH TO EVIDENCE IN CYBERSPACE,
Conference: The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013)
[5] https://hub.packtpub.com/iot-forensics-security-connected-world/
[6] https://www.owasp.org/index.php/Application_Threat_Modeling
References
Aakashjit Bhattacharya
Roll:- 30011218021
Reg. No:- 183000410054 of 2018-2019

More Related Content

What's hot

Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
Bryan Len
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
Anastasios Economides
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
CAS
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
SKS
 
Iot
IotIot
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
 
IoT Security
IoT SecurityIoT Security
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
Ramana Reddy
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
eteshagarwal1
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
Ulf Mattsson
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
noornabi16
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
Vishnupriya T H
 
Internet of things (IOT) | Future Trends
Internet of things (IOT) | Future TrendsInternet of things (IOT) | Future Trends
Internet of things (IOT) | Future Trends
Devanand Hariperumal
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
RAJESHKUMARG12
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Roberto Ellis
 
IoT
IoTIoT

What's hot (20)

Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Iot
IotIot
Iot
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Internet of things (IOT) | Future Trends
Internet of things (IOT) | Future TrendsInternet of things (IOT) | Future Trends
Internet of things (IOT) | Future Trends
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
IoT
IoTIoT
IoT
 

Similar to Internet of Things Forensics

Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
76 s201918
76 s20191876 s201918
76 s201918
IJRAT
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
Shyam Goyal
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
Skillmine Technology Consulting
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
Asiri Hewage
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
cyberprosocial
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
journalBEEI
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
IJNSA Journal
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
IJECEIAES
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
nadoje
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IJCI JOURNAL
 
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
RSIS International
 
Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...
RSIS International
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
vivatechijri
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Scientific Review SR
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
ezzAyman1
 
sample assignment
sample assignmentsample assignment
sample assignment
#essaywriting
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
IJNSA Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
IJNSA Journal
 

Similar to Internet of Things Forensics (20)

Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
76 s201918
76 s20191876 s201918
76 s201918
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
 
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
 
Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
sample assignment
sample assignmentsample assignment
sample assignment
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 

More from Aakashjit Bhattacharya

Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's Applications
Aakashjit Bhattacharya
 
Project management
Project managementProject management
Project management
Aakashjit Bhattacharya
 
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P ApplicationsA Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
Aakashjit Bhattacharya
 
FPGA using IoT
FPGA using IoT FPGA using IoT
FPGA using IoT
Aakashjit Bhattacharya
 
Software Testing
Software TestingSoftware Testing
Software Testing
Aakashjit Bhattacharya
 
Touch Less touch screen
Touch Less touch screenTouch Less touch screen
Touch Less touch screen
Aakashjit Bhattacharya
 

More from Aakashjit Bhattacharya (6)

Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's Applications
 
Project management
Project managementProject management
Project management
 
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P ApplicationsA Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
 
FPGA using IoT
FPGA using IoT FPGA using IoT
FPGA using IoT
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Touch Less touch screen
Touch Less touch screenTouch Less touch screen
Touch Less touch screen
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 

Internet of Things Forensics

  • 1. Maulana Abul Kalam Azad University of Technology, W.B. IoT Forensics Submitted By Aakashjit Bhattacharya Roll Number:- 30011218021 Registration Number:- 183000410054 of 2018-2019 Guided By Professor Debashish De & Dr. Koushik Majumder Computer Science & Engineering Department M.A.K.A.U.T., W.B.
  • 3. • Internet Of Things • Characteristics of IoT • Digital Forensics • IoT Forensics • Categories of Evidences With Respect To a Crime Scene • Cyber Security challenges in IoT • Open Issues and Scope of work • Conclusion • Reference Content
  • 4.
  • 5. Internet of Things • Building block for Smart homes and Smart Cities. • 3 layers:- Sensing layer, Communication layer, Transmission layer. • Lot of things work parallel, to complete the entire architecture of an IoT System, which includes low-power embedded system, big-data, Machine Learning and networking. • Provides M2M connectivity across all the connected devices.
  • 6. Characteristics of IoT • Scalable • Low power consumption • Efficient • Low computational power
  • 7. Digital Forensics Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. A digital forensic investigation commonly consists of 3 stages: acquisition or imaging of exhibits, analysis, and reporting. Evidences used in digital forensics are : hard drive of the criminals’ computer, laptop, external hard drives, USB devices, mobile devices, etc. [2].
  • 8. Three Possible Roles of A Computer Digital Forensics [4] 1. Computer can be the aim of the crime. 2. It can be responsible/ source of the crime. 3. It can act as an evidence/ proof of information that contains criminal acts.
  • 9. IoT Forensics Deals with IoT-related cybercrimes that includes investigation of connected devices, sensors and the data stored on all possible platforms. As security breach can take place in any of the three layers of this IoT Architecture, so IoT forensics need to inspect all the three layers well in order to detect the crime.
  • 10. Categories of Evidences With Respect To A Crime Scene 1. Smart devices and sensors : It includes sensors, smart devices, automation tools those are powered by IoT Architecture, in other words, the gadgets those are present in the Crime Scene. 2. Hardware and Software : Communication link between smart devices and the external world which includes IPS, Firewalls, Computers. 3. External resources : Areas outside networks under investigation, that includes Cloud, Social Media, ISPs, Network Providers. Reference:- https://hub.packtpub.com/iot-forensics-security-connected-world/
  • 11. Timeline of Evolution of IoT Forensics from Computer Forensic [3] Reference :- Ana Nieto, Ruben Rios, Javier Lopez, IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations, MDPI, February 2018
  • 12. Security Challenges in IoT[1] Secure constrained devices Limited amounts of storage, memory, and processing capability and they often need to be able to operate on lower power, so many encryption algorithms can’t be used and so can’t transmit data securely in real-time. Authorize and authenticate devices Many IoT device fails to establish their identity before accessing gateways, upstream services and apps as they fail in device authentication. Applying Device Updates 1. There is a need to keep track of which updates are available and apply those updates consistently across distributed environments with heterogeneous devices that communicate through a range of different networking protocols. 2. Only Some devices support over-the-air updates, or updates without downtime, but the other devices might need to be physically accessed or temporarily pulled from production to apply updates. Secure Communication Many IoT device do not encrypt message before transmitting. https://developer.ibm.com/articles/iot-top-10-iot-security-challenges/Reference [1]
  • 13. Security Challenges in IoT (contd.) Ensure Data Privacy and Integrity The application of data privacy includes anonimizing sensitive data before it is stored or using data separation to separate personally identifiable information from IoT data payloads. Unrequired data must be securely disposed of, and if data is stored, compliance should be maintained with legal and regulatory frameworks is also an important challenge. Secure web, mobile, and cloud applications As a part of multi-layered approach of IoT security, WEB MOBILE and CLOUD APPS and SERVICES that are used to manage, access and process IoT devices and data must be secured Detect vulnerabilities and incidents When there is large scale implementation of IoT systems, then the complexity of the system from the perspective of the variety of devices connected, apps and services, and communication protocols involved, can make it difficult to identify when an incident has occurred. Predict and preempt security issues IoT security challenge in long term is to apply security intelligence for detecting and mitigating issues, predicting and proactively protecting against potential security threats. Threat modelling[7] is one approach to predict security issues.
  • 14. 1. Identification, collection and preservation of Evidence 2. Co-relation and analysis of evidence. 3. Attack or deficit attribution. & Scope of work
  • 15. [1] https://developer.ibm.com/articles/iot-top-10-iot-security-challenges/ [2] Áine MacDermott, Thar Baker, Qi Shi, IoT Forensics: Challenges For The IoA Era, IEEE Xplore 2nd April 2018. [3] Ana Nieto, Ruben Rios, Javier Lopez, IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations, MDPI, DOI: https://doi.org/10.3390/s18020492. Received: 28 December 2017 / Revised: 25 January 2018 / Accepted: 4 February 2018 / Published: 7 February 2018 [4] Gianni Fenu and Fabrizio Solinas , COMPUTER FORENSICS INVESTIGATION AN APPROACH TO EVIDENCE IN CYBERSPACE, Conference: The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) [5] https://hub.packtpub.com/iot-forensics-security-connected-world/ [6] https://www.owasp.org/index.php/Application_Threat_Modeling References
  • 16. Aakashjit Bhattacharya Roll:- 30011218021 Reg. No:- 183000410054 of 2018-2019