Affiliation:
1. Université de Lausanne, Switzerland
Abstract
IoT devices produce information that can be used in criminal investigations and cybersecurity incidents to make inferences about identities, locations, chronologies, and relationships between relevant entities. Before this information is relied upon to make critical decisions, its veracity must be assessed critically, and the link between virtual and physical worlds must be evaluated carefully. This chapter presents the forensic science principles needed to exploit the full potential of IoT traces, including uniqueness, exchange, provenance, integrity, reliability, repeatability, evaluating links between virtual and physical entities, and formally assessing alternative hypotheses. This chapter also discusses core forensic processes and activities, demonstrating their application to forensic analysis of IoT devices using practical examples. A typology of IoT traces is proposed and their usefulness during an investigation is discussed. Finally, an investigative scenario is presented to illustrate the opportunities and challenges of exploiting IoT devices and traces for investigative and forensic purposes.
Reference47 articles.
1. Statistics and the Evaluation of Evidence for Forensic Scientists
2. Birrer, S. (2010). Analyse systématique et permanente de la délinquance sérielle: place des statistiques criminelles: apport des approches situationnelles pour un système de classification: perspectives en matière de coopération. Academic Press.
3. Bitzer, S., Albertini, N., Lock, E., Ribaux, O., & Delémont, O. (2015). Utility of the clue — From assessing the investigative contribution of forensic science to supporting the decision to use traces (Vol. 55). Academic Press.
4. Carrier, B. (2003). Defining digital forensic examination and analysis tools using abstraction layers. International Journal of Digital Evidence, 1(4), 1-12.
5. Casey, E. (2002) "Error, Uncertainty, and Loss in Digital Evidence" International Journal of Digital Evidence, Volume 1, Issue 2
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献