SlideShare a Scribd company logo
IOT FORENSICS
by
Abeis.N
What is “IOT”?
Internet of Things (IoT) refers to a network of connected physical
devices, smart home appliances, wearable electronic devices and
embedded electronic items etc. with different types of sensors for
seamless connectivity and transfer of data amongst them.
IoT technology includes
M2M: Machine to machine communications
RFID: Radio Frequency Identification
CAC: Context-aware computing
WUC: Wearable and Ubiquitous computing
Forensics
The use of science and technology to investigate and establish facts
in criminal or civil courts of law.
Computer/Digital Forensics
We define computer forensics as the discipline that combines
elements of law and computer science to collect and analyze data from
computer systems, networks, wireless communications, and storage
devices in away that is admissible as evidence in a court of law
IoT Forensics:
The IOT Forensics is obtaining digital evidence from the IoT devices
for a legal purpose
“Execute digital forensics procedures in the IoT paradigm”
Collection of Digital Evidence
from IoT devices
Since IoT devices come in a variety of models, operating systems, file
systems and proprietary hardware and software there is no single
standard approach that can be followed in identifying and collecting
data from a given IoT device. The following are some methods for
collecting the data.
Acquiring a Flash Memory Image
Acquiring a memory dump using Linux dd
command or netcat
Extract Firmware data by using JTAG and UART
techniques
Contd…..
Telnet
SSH
Bluetooth
Wi-Fi protocols
were also used to gain access and interact with the devices.
Acquiring a Flash Memory Image:
• In this method, if an IoT device can be connected to a computer, the
internal storage of the device can be forensically imaged using
forensic imaging utilities such as
FTK Imager
X-ways forensics
ENCASE
• The collected forensic image can be analyzed using the majority of
the digital forensic applications. Whenever possible, the flash
memory storage device such as NAND/NOR Flash chips, SD/CF/MMC
cards has to be imaged in a bit-stream/full physical mode.
Acquiring a memory dump using
Linux dd command:
• For IoT devices with operating systems such as Linux or embedded
Linux, internal utilities such as Linux dd or netcat can be used to
acquire a forensic image of a selected drive or the device memory.
• This requires booting into the device and a terminal access.
• The resultant forensic image can be analyzed to identify and extract
information relevant to the case/ incident.
• dd if=/dev/mtd of=forensic-image.dd bs=65536 conv=noerror, sync
Firmware data extraction by JTAG:
JTAG stands for Joint Test Action Group which was later standardized as IEEE
1149.1 Standard Test Access Port.
The port was initially designed for testing PCB (Printed Circuit Boards).
JTAG Forensics involves acquiring firmware data using standard Test Access
Ports (TAPs).
The data is transferred in a raw format.
Firmware data extraction by UART
UART is Universal Asynchronous Receiver/Transmitter
It is a computer hardware device which is a part of Integrated
circuitry and used for serial communications over a computer or
peripheral device serial port
Accessing the firmware via UART pins and extracting the data
requires specialized interfaces and it is also an invasive technique
which can reset the devices to factory settings resulting in loss of
data.
Challenges
In comparison with the standard digital forensic collection and analysis
techniques, IoT forensics presents multiple challenges owing to the variety and
complexity of the IoT devices. Below are some of the challenges:
 Diversity of devices and IoT ware
 Proprietary Hardware and Software
 Data spread across multiple devices and platforms
 Data gets changed, modified, and lost/overwritten quickly
 Jurisdiction and SLA constraints when data is stored in a cloud or a different
geography

More Related Content

What's hot

Digital forensics
Digital forensicsDigital forensics
Digital forensics
Roberto Ellis
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
SKS
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
gr9293
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
Bhupeshkumar Nanhe
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Oldsun
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
computer forensics
computer forensicscomputer forensics
computer forensics
Vaibhav Tapse
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
Savvius, Inc
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
Jake K.
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
IoT security
IoT securityIoT security
IoT security
YashKesharwani2
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
SCREAM138
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
Manu Mathew Cherian
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
Vasco Veloso
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
Cleverence Kombe
 

What's hot (20)

Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
IoT security
IoT securityIoT security
IoT security
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 

Similar to Iot forensics

Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
 
IOT Exploitation
IOT Exploitation	IOT Exploitation
Internet of Things-ppt.pptx
Internet of Things-ppt.pptxInternet of Things-ppt.pptx
Internet of Things-ppt.pptx
SaonDey3
 
Internet of things
Internet of thingsInternet of things
Internet of things
Selvaraj Kesavan
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
IRJET Journal
 
IoT (Internet of Things)
IoT (Internet of Things)IoT (Internet of Things)
IoT (Internet of Things)
TusharSoam
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Stanford School of Engineering
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
ezzAyman1
 
IoT Presentation.pptx
IoT Presentation.pptxIoT Presentation.pptx
IoT Presentation.pptx
TejashreeNawale2
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
IRJET Journal
 
SFScon19 - Francesco La Spina -7 Steps to Industry 40
SFScon19 - Francesco La Spina -7 Steps to Industry 40SFScon19 - Francesco La Spina -7 Steps to Industry 40
SFScon19 - Francesco La Spina -7 Steps to Industry 40
South Tyrol Free Software Conference
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
 
iotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdfiotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdf
rinabiswas456788oooo
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdf
Anujashejwal
 
Iot architecture
Iot architectureIot architecture
Iot architecture
Anam Iqbal
 
Module 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iotModule 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iot
spreya772
 
2.-HARDWARE.pptx
2.-HARDWARE.pptx2.-HARDWARE.pptx
2.-HARDWARE.pptx
AndrewBeka
 
Practical Data Acquisition using Personal Computers and Standalone Systems
Practical Data Acquisition using Personal Computers and Standalone SystemsPractical Data Acquisition using Personal Computers and Standalone Systems
Practical Data Acquisition using Personal Computers and Standalone Systems
Living Online
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
xinoe
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
Inxee
 

Similar to Iot forensics (20)

Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
IOT Exploitation
IOT Exploitation	IOT Exploitation
IOT Exploitation
 
Internet of Things-ppt.pptx
Internet of Things-ppt.pptxInternet of Things-ppt.pptx
Internet of Things-ppt.pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
 
IoT (Internet of Things)
IoT (Internet of Things)IoT (Internet of Things)
IoT (Internet of Things)
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
IoT Presentation.pptx
IoT Presentation.pptxIoT Presentation.pptx
IoT Presentation.pptx
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
 
SFScon19 - Francesco La Spina -7 Steps to Industry 40
SFScon19 - Francesco La Spina -7 Steps to Industry 40SFScon19 - Francesco La Spina -7 Steps to Industry 40
SFScon19 - Francesco La Spina -7 Steps to Industry 40
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
iotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdfiotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdf
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdf
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
Module 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iotModule 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iot
 
2.-HARDWARE.pptx
2.-HARDWARE.pptx2.-HARDWARE.pptx
2.-HARDWARE.pptx
 
Practical Data Acquisition using Personal Computers and Standalone Systems
Practical Data Acquisition using Personal Computers and Standalone SystemsPractical Data Acquisition using Personal Computers and Standalone Systems
Practical Data Acquisition using Personal Computers and Standalone Systems
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
 

Recently uploaded

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 

Recently uploaded (20)

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 

Iot forensics

  • 2. What is “IOT”? Internet of Things (IoT) refers to a network of connected physical devices, smart home appliances, wearable electronic devices and embedded electronic items etc. with different types of sensors for seamless connectivity and transfer of data amongst them.
  • 3. IoT technology includes M2M: Machine to machine communications RFID: Radio Frequency Identification CAC: Context-aware computing WUC: Wearable and Ubiquitous computing
  • 4. Forensics The use of science and technology to investigate and establish facts in criminal or civil courts of law. Computer/Digital Forensics We define computer forensics as the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in away that is admissible as evidence in a court of law
  • 5. IoT Forensics: The IOT Forensics is obtaining digital evidence from the IoT devices for a legal purpose “Execute digital forensics procedures in the IoT paradigm”
  • 6. Collection of Digital Evidence from IoT devices Since IoT devices come in a variety of models, operating systems, file systems and proprietary hardware and software there is no single standard approach that can be followed in identifying and collecting data from a given IoT device. The following are some methods for collecting the data. Acquiring a Flash Memory Image Acquiring a memory dump using Linux dd command or netcat Extract Firmware data by using JTAG and UART techniques
  • 7. Contd….. Telnet SSH Bluetooth Wi-Fi protocols were also used to gain access and interact with the devices.
  • 8. Acquiring a Flash Memory Image: • In this method, if an IoT device can be connected to a computer, the internal storage of the device can be forensically imaged using forensic imaging utilities such as FTK Imager X-ways forensics ENCASE • The collected forensic image can be analyzed using the majority of the digital forensic applications. Whenever possible, the flash memory storage device such as NAND/NOR Flash chips, SD/CF/MMC cards has to be imaged in a bit-stream/full physical mode.
  • 9. Acquiring a memory dump using Linux dd command: • For IoT devices with operating systems such as Linux or embedded Linux, internal utilities such as Linux dd or netcat can be used to acquire a forensic image of a selected drive or the device memory. • This requires booting into the device and a terminal access. • The resultant forensic image can be analyzed to identify and extract information relevant to the case/ incident. • dd if=/dev/mtd of=forensic-image.dd bs=65536 conv=noerror, sync
  • 10. Firmware data extraction by JTAG: JTAG stands for Joint Test Action Group which was later standardized as IEEE 1149.1 Standard Test Access Port. The port was initially designed for testing PCB (Printed Circuit Boards). JTAG Forensics involves acquiring firmware data using standard Test Access Ports (TAPs). The data is transferred in a raw format.
  • 11. Firmware data extraction by UART UART is Universal Asynchronous Receiver/Transmitter It is a computer hardware device which is a part of Integrated circuitry and used for serial communications over a computer or peripheral device serial port Accessing the firmware via UART pins and extracting the data requires specialized interfaces and it is also an invasive technique which can reset the devices to factory settings resulting in loss of data.
  • 12. Challenges In comparison with the standard digital forensic collection and analysis techniques, IoT forensics presents multiple challenges owing to the variety and complexity of the IoT devices. Below are some of the challenges:  Diversity of devices and IoT ware  Proprietary Hardware and Software  Data spread across multiple devices and platforms  Data gets changed, modified, and lost/overwritten quickly  Jurisdiction and SLA constraints when data is stored in a cloud or a different geography