Affiliation:
1. University of Kashmir, India
Abstract
The pervasive nature of IoT, envisioned with the characteristics of diversity, heterogeneity, and complexity, is diluting the boundaries between the physical and digital worlds. IoT being widely distributed qualifies it as the breeding ground for cyber-attacks. Although remarkable work is being done to ensure security in IoT infrastructure, security vulnerabilities persist. The IoT infrastructure can either be used as a direct target in a cyber-attack or exploited as a tool to carry a cyber-attack. In either case, the security measures in IoT infrastructure is compromised. The enormous IoT data is sensitive that can act as a gold mine to both the criminals for illicit exploitation or investigators to act as digital witness. IoT forensics help the investigators to acquire intelligence from this smart infrastructure to reconstruct the historical events occurred. However, due to sophisticated IoT architecture, the digital investigators face myriad challenges in IoT-related investigations using existing investigation methodologies and, hence, demand a separate dedicated forensic framework.
Reference44 articles.
1. Internet of Things security: A survey
2. Beverly, R., Garfinkel, S., & Cardwell, G. (2010). Forensic carving of network packets and associated data structures. Digital Investigation, 8, S78-S89.
3. IoT Forensic
4. DESO: Addressing volume and variety in large-scale criminal cases
5. Carrier, B. & Spafford, E. H. (2003). Getting Physical with the Investigative Process. International Journal of Digital Evidence, 2(2).