Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

IoT Forensics: Challenges For The IoA Era

Mac Dermott, AM, Baker, T and Shi, Q (2018) IoT Forensics: Challenges For The IoA Era. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) . (2018 9th IFIP International Conference on New Technologies Mobility and Security (NTMS), 26 February 2018 - 28 February 2018, Paris, France.).

PID1206230.pdf - Published Version

Download (245kB) | Preview


Challenges for IoT-based forensic investigations include the increasing amount of objects of forensic interest, relevance of identified and collected devices, blurry network boundaries, and edgeless networks. As we look ahead to a world of expanding ubiquitous computing, the challenge of forensic processes such as data acquisition (logical and physical) and extraction and analysis of data grows in this space. Containing an IoT breach is increasingly challenging – evidence is no longer restricted to a PC or mobile device, but can be found in vehicles, RFID cards, and smart devices. Through the combination of cloud-native forensics with client-side forensics (forensics for companion devices), we can study and develop the connection to support practical digital investigations and tackle emerging challenges in digital forensics. With the IoT bringing investigative complexity, this enhances challenges for the Internet of Anything (IoA) era. IoA brings anything and everything “online” in a connectedness that generates an explosion of connected devices, from fridges, cars and drones, to smart swarms, smart grids and intelligent buildings. Research to identify methods for performing IoT-based digital forensic analysis is essential. The long-term goal is the development of digital forensic standards that can be used as part of overall IoT and IoA security and aid IoT-based investigations.

Item Type: Conference or Workshop Item (Paper)
Additional Information: © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works
Uncontrolled Keywords: computer forensics; mobile forensics; the Internet of Things; IoT; the Internet of Anything; IoA; forensic analysis; digital investigations
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science & Mathematics
Publisher: IEEE
Date Deposited: 17 Jan 2018 10:07
Last Modified: 31 May 2024 13:33
DOI or ID number: 10.1109/NTMS.2018.8328748
URI: https://researchonline.ljmu.ac.uk/id/eprint/7865
View Item View Item