A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents
The number of Internet of Things (IoT) forensic investigations has increased considerably over recent years due to the weak nature of the security measures of its devices. In order to ensure the effectiveness and completeness of their examinations, investigators rely on forensic models, frameworks a...
Saved in:
Published in | Computer journal Vol. 67; no. 4; pp. 1324 - 1345 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Oxford University Press
21.04.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The number of Internet of Things (IoT) forensic investigations has increased considerably over recent years due to the weak nature of the security measures of its devices. In order to ensure the effectiveness and completeness of their examinations, investigators rely on forensic models, frameworks and methodologies. However, given the novelty of the environment, the existing ones are not refined enough, and the conventional counterparts do not satisfy the requirements of the IoT. Consequently, further improvements are needed in order for a more suitable IoT methodology to be designed. After reviewing the proposals from the research community for the development of procedures for performing IoT investigations, this article presents a practical concept methodology for conducting IoT forensic investigations that details step by step the whole examination process from its opening to its closing. In order to test its effectiveness and feasibility, it is submitted to a theoretical, a practical and a hybrid evaluation. Firstly, by comparing its level of detail, practicality and content with the related work. Secondly, by assessing its performance in two practical scenarios that depict real-life forensic investigations and the challenges that they present. And, finally, by studying how the existing models from the research community would have behaved in these cases. After performing these three different evaluations, it can be concluded that the results achieved by the proposed methodology were satisfactory, confirmed the feasibility of the proposal and showed clear benefits compared with the related work in terms of practicality and level of detail. |
---|---|
AbstractList | The number of Internet of Things (IoT) forensic investigations has increased considerably over recent years due to the weak nature of the security measures of its devices. In order to ensure the effectiveness and completeness of their examinations, investigators rely on forensic models, frameworks and methodologies. However, given the novelty of the environment, the existing ones are not refined enough, and the conventional counterparts do not satisfy the requirements of the IoT. Consequently, further improvements are needed in order for a more suitable IoT methodology to be designed. After reviewing the proposals from the research community for the development of procedures for performing IoT investigations, this article presents a practical concept methodology for conducting IoT forensic investigations that details step by step the whole examination process from its opening to its closing. In order to test its effectiveness and feasibility, it is submitted to a theoretical, a practical and a hybrid evaluation. Firstly, by comparing its level of detail, practicality and content with the related work. Secondly, by assessing its performance in two practical scenarios that depict real-life forensic investigations and the challenges that they present. And, finally, by studying how the existing models from the research community would have behaved in these cases. After performing these three different evaluations, it can be concluded that the results achieved by the proposed methodology were satisfactory, confirmed the feasibility of the proposal and showed clear benefits compared with the related work in terms of practicality and level of detail. |
Author | Martínez Martínez, José Luis Carrillo-Mondéjar, Javier Castelo Gómez, Juan Manuel Roldán-Gómez, José |
Author_xml | – sequence: 1 givenname: Juan Manuel surname: Castelo Gómez fullname: Castelo Gómez, Juan Manuel email: juanmanuel.castelo@uclm.es – sequence: 2 givenname: Javier surname: Carrillo-Mondéjar fullname: Carrillo-Mondéjar, Javier – sequence: 3 givenname: José surname: Roldán-Gómez fullname: Roldán-Gómez, José – sequence: 4 givenname: José Luis surname: Martínez Martínez fullname: Martínez Martínez, José Luis |
BookMark | eNqFkEFPwkAQhTcGEwG9et6rh8J0u23pkTSiGAwXPDfT3SksKbukuxr77xXhZGI8TfKS773MN2ID6ywxdh_DJIYimSp32Nt2Wn-ihkxcsWEsM4gEZPmADQFiiGQm4IaNvN8DgIAiG7KXOS-dVXQMfOE6st4o_kph57Rr3bY_hXyzI760H-SD2WIwzvJ1w5duw8u-ps5YZTTZ4G_ZdYOtp7vLHbO3xeOmfI5W66dlOV9FSuRJiLK8gFrMpK4RERCU1KRrSbWUQoqZIgLEuslSVE0qGsJcYyIE6lmKqciLZMwm517VOe87aqpjZw7Y9VUM1clEdTZRXUx8A_IXoEz4eSR0aNq_sYcz5t6P_018AadBeBA |
CitedBy_id | crossref_primary_10_1007_s10207_023_00776_x crossref_primary_10_1093_comjnl_bxae097 crossref_primary_10_1016_j_fsidi_2025_301912 |
Cites_doi | 10.1016/j.diin.2019.04.013 10.1145/3234698.3234730 10.1109/JIOT.2019.2940713 10.1016/j.fsidi.2022.301482 10.1016/j.diin.2019.03.007 10.1109/MCC.2016.5 10.1016/j.diin.2011.06.002 10.1016/j.diin.2019.01.003 10.1016/j.fsidi.2021.301114 10.1109/ASPDAC.2016.7428064 10.1016/j.cose.2017.04.004 10.1109/ICTC.2015.7354752 10.1145/3098954.3104053 10.1016/j.future.2018.05.081 10.1016/j.fsidi.2022.301499 10.1016/j.fsidi.2022.301343 10.1016/j.diin.2017.06.010 10.1145/3098954.3104052 10.1016/j.diin.2017.06.013 10.1016/j.diin.2016.01.016 10.1016/j.iot.2020.100220 10.1016/j.diin.2016.02.002 |
ContentType | Journal Article |
Copyright | The British Computer Society 2023. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com 2023 |
Copyright_xml | – notice: The British Computer Society 2023. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com 2023 |
DBID | AAYXX CITATION |
DOI | 10.1093/comjnl/bxad062 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1460-2067 |
EndPage | 1345 |
ExternalDocumentID | 10_1093_comjnl_bxad062 10.1093/comjnl/bxad062 |
GroupedDBID | -E4 -~X .2P .DC .I3 0R~ 123 18M 1OL 1TH 29F 3R3 4.4 41~ 48X 5VS 5WA 6J9 6TJ 70D 85S 9M8 AAIJN AAJKP AAJQQ AAMVS AAOGV AAPQZ AAPXW AARHZ AAUAY AAUQX AAVAP AAYOK ABAZT ABDFA ABDTM ABEFU ABEJV ABEUO ABGNP ABIXL ABNKS ABPTD ABQLI ABSMQ ABVGC ABVLG ABXVV ABZBJ ACBEA ACFRR ACGFS ACGOD ACIWK ACNCT ACUFI ACUTJ ACUXJ ACVCV ACYTK ADEYI ADEZT ADGZP ADHKW ADHZD ADIPN ADMLS ADOCK ADQBN ADRDM ADRTK ADVEK ADYJX ADYVW ADZXQ AECKG AEGPL AEGXH AEJOX AEKKA AEKSI AEMDU AENEX AENZO AEPUE AETBJ AEWNT AFFZL AFIYH AFOFC AGINJ AGKEF AGMDO AGORE AGSYK AHGBF AHXPO AI. AIDUJ AIJHB AJBYB AJEEA AJEUX AJNCP ALMA_UNASSIGNED_HOLDINGS ALTZX ALUQC ALXQX ANAKG APIBT APJGH APWMN ASAOO ATDFG ATGXG AXUDD AZVOD BAYMD BCRHZ BEFXN BEYMZ BFFAM BGNUA BHONS BKEBE BPEOZ BQUQU BTQHN CAG CDBKE COF CS3 CXTWN CZ4 DAKXR DFGAJ DILTD DU5 D~K EBS EE~ EJD F9B FA8 FLIZI FLUFQ FOEOM GAUVT GJXCC H13 H5~ HAR HW0 HZ~ H~9 IOX J21 JAVBF JXSIZ KBUDW KOP KSI KSN M-Z MBTAY ML0 MVM N9A NGC NMDNZ NOMLY NU- O0~ O9- OCL ODMLO OJQWA OJZSN OWPYF O~Y P2P PAFKI PEELM PQQKQ Q1. Q5Y R44 RD5 RNI ROL ROX ROZ RUSNO RW1 RXO RZO SC5 TAE TJP TN5 VH1 VOH WH7 WHG X7H XJT XOL XSW YAYTL YKOAZ YXANX ZKX ZY4 ~91 AAYXX CITATION |
ID | FETCH-LOGICAL-c273t-6790b284dbaaa0a0c4dedb4eb442428cee0aabf65acf52fea7da322ad85a52793 |
ISSN | 0010-4620 |
IngestDate | Thu Apr 24 23:12:16 EDT 2025 Tue Jul 01 02:55:10 EDT 2025 Mon Jun 30 08:34:42 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Keywords | digital forensics IoT forensics Cybersecurity internet of things forensic methodology |
Language | English |
License | This article is published and distributed under the terms of the Oxford University Press, Standard Journals Publication Model (https://academic.oup.com/pages/standard-publication-reuse-rights) https://academic.oup.com/pages/standard-publication-reuse-rights |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c273t-6790b284dbaaa0a0c4dedb4eb442428cee0aabf65acf52fea7da322ad85a52793 |
PageCount | 22 |
ParticipantIDs | crossref_primary_10_1093_comjnl_bxad062 crossref_citationtrail_10_1093_comjnl_bxad062 oup_primary_10_1093_comjnl_bxad062 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-04-21 |
PublicationDateYYYYMMDD | 2024-04-21 |
PublicationDate_xml | – month: 04 year: 2024 text: 2024-04-21 day: 21 |
PublicationDecade | 2020 |
PublicationTitle | Computer journal |
PublicationYear | 2024 |
Publisher | Oxford University Press |
Publisher_xml | – name: Oxford University Press |
References | International Organization for Standardization (2024042316182587100_ref2) 2012 Kebande (2024042316182587100_ref15) 2016 Samsung Electronics America (2024042316182587100_ref84) 2020 Sathwara (2024042316182587100_ref27) 2018 United States Air Force Office of Special Investigations. Foremost.org (2024042316182587100_ref68) 2020 Kim (2024042316182587100_ref35) 2023; 44 Harvey (2024042316182587100_ref73) 2020 504ENSICS Labs (2024042316182587100_ref57) 2020 Libelium Comunicaciones Distribuidas (2024042316182587100_ref89) 2020 Hossain (2024042316182587100_ref38) 2018 Kaspersky (2024042316182587100_ref7) 2022 Samsung Electronics America (2024042316182587100_ref87) 2020 Kebande (2024042316182587100_ref28) 2018 Joachim Metz. Github.com (2024042316182587100_ref72) 2020 Clark (2024042316182587100_ref41) 2017; 22 VöMel (2024042316182587100_ref53) 2011; 8 Yusoff (2024042316182587100_ref45) 2011; 3 Castelo Gómez (2024042316182587100_ref46) 2021; 36 Chung (2024042316182587100_ref40) 2017; 22 Yassein (2024042316182587100_ref74) 2018 Karagiozidis (2024042316182587100_ref32) 2022 Zawoad (2024042316182587100_ref37) 2015 Hou (2024042316182587100_ref10) 2020; 7 Forensics (2024042316182587100_ref66) 2020 Brian Carrier. Sleuthkit.org (2024042316182587100_ref64) 2020 NCSCL Quality Manager (2024042316182587100_ref78) 2017 Atlam (2024042316182587100_ref11) 2020; 11 Wireshark Foundation. Wireshark.org (2024042316182587100_ref60) 2020 Costa (2024042316182587100_ref69) 2020 Jo (2024042316182587100_ref42) 2019; 29 International Organization for Standardization (2024042316182587100_ref3) 2015 Collective work of all DFRWS attendees (2024042316182587100_ref24) 2001 Nieto (2024042316182587100_ref17) 2017 Badenhop (2024042316182587100_ref49) 2016; 17 Oriwoh (2024042316182587100_ref39) 2013 Zeek (2024042316182587100_ref70) 2020 Surange (2024042316182587100_ref33) 2022; 14 Brezinski (2024042316182587100_ref1) 2002 Samsung Electronics America (2024042316182587100_ref81) 2020 Gupta (2024042316182587100_ref52) 2016 Zimmerman (2024042316182587100_ref71) 2020 International Organization for Standardization (2024042316182587100_ref4) 2016 Vailshery (2024042316182587100_ref5) Le-Khac (2024042316182587100_ref48) 2020; 109 Du (2024042316182587100_ref79) 2017; 1708 Zia (2024042316182587100_ref18) 2017 Gregorio (2024042316182587100_ref43) 2019; 29 Alyami (2024042316182587100_ref13) 2022 Meffert (2024042316182587100_ref36) 2017 Hadgkiss (2024042316182587100_ref44) 2019; 28 Wurm (2024042316182587100_ref50) 2016 Feng (2024042316182587100_ref20) 2017 Al-Sadi (2024042316182587100_ref29) 2018 AccessData Corp. Forensic Toolkit (FTK) (2024042316182587100_ref55) 2020 Bharadwaj (2024042316182587100_ref25) 2018 Guy Voncken. Guymager.net (2024042316182587100_ref56) 2020 Samsung Electronics America (2024042316182587100_ref82) 2020 Sonicwall (2024042316182587100_ref6) 2022 Libelium Comunicaciones Distribuidas (2024042316182587100_ref91) 2020 Ab Rahman (2024042316182587100_ref16) 2016; 3 Goudbeek (2024042316182587100_ref22) 2018 Samsung Electronics America (2024042316182587100_ref85) 2020 Al-Masri (2024042316182587100_ref23) 2018 Pomeranz (2024042316182587100_ref58) 2020 volatilityfoundation (2024042316182587100_ref65) 2020 Lillis (2024042316182587100_ref9) 2016 Sadineni (2024042316182587100_ref31) 2019 tcpdump (2024042316182587100_ref59) 2020 Harbawi (2024042316182587100_ref19) 2017 Libelium Comunicaciones Distribuidas (2024042316182587100_ref93) 2020 Foundation, R. P (2024042316182587100_ref26) 2020 Han (2024042316182587100_ref47) 2015 Elstner (2024042316182587100_ref51) 2016; 16 Kasukurti (2024042316182587100_ref30) 2018 CGSecurity. CGSecurity.org (2024042316182587100_ref67) 2020 Grand View Research (2024042316182587100_ref94) Jacob (2024042316182587100_ref34) 2022; 42-43 Fouladi (2024042316182587100_ref76) 2013 Samsung Electronics America (2024042316182587100_ref83) 2020 Fan (2024042316182587100_ref77) 2017 Computer Hope. Computerhope.com (2024042316182587100_ref54) 2020 Libelium Comunicaciones Distribuidas (2024042316182587100_ref90) 2020 Badenhop (2024042316182587100_ref75) 2017; 68 Netresec (2024042316182587100_ref61) 2020 The Tcpdump Group (2024042316182587100_ref62) 2020 Sandvik (2024042316182587100_ref12) 2022; 40 Perumal (2024042316182587100_ref14) 2015 Oriwoh (2024042316182587100_ref8) 2013 Al-Khateeb (2024042316182587100_ref63) 2015 Amazon Web Services, I (2024042316182587100_ref92) 2020 Howarth (2024042316182587100_ref95) 2022 Samsung Electronics America (2024042316182587100_ref86) 2020 Hossain (2024042316182587100_ref21) 2017 iFixit (2024042316182587100_ref88) 2018 Samsung Electronics America (2024042316182587100_ref80) 2018 |
References_xml | – start-page: 1 volume-title: 5th International Symposium on Digital Forensic and Security (ISDFS), Tirgu Mures, Romania, 26–28 April year: 2017 ident: 2024042316182587100_ref19 article-title: An improved digital evidence acquisition model for the internet of things forensic: A theoretical framework – year: 2020 ident: 2024042316182587100_ref54 article-title: Linux and Unix dd command – volume-title: ISO - ISO/IEC 27042:2015 - Information technology – Security techniques – Guidelines for the analysis and interpretation of digital evidence year: 2015 ident: 2024042316182587100_ref3 – start-page: 3 volume-title: 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, 28–29 January year: 2019 ident: 2024042316182587100_ref31 article-title: A holistic forensic model for the internet of things – volume: 29 start-page: S80 year: 2019 ident: 2024042316182587100_ref42 article-title: Digital forensic practices and methodologies for ai speaker ecosystems publication-title: Digital Investigation doi: 10.1016/j.diin.2019.04.013 – year: 2020 ident: 2024042316182587100_ref56 article-title: Guymager free forensic imager – year: 2020 ident: 2024042316182587100_ref67 article-title: PhotoRec ES - CGSecurity – start-page: 1 volume-title: 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Iasi, Romania, 28–30 June year: 2018 ident: 2024042316182587100_ref27 article-title: Iot forensic a digital investigation framework for iot systems – volume-title: (2017) Procedure for Evidence Management year: 2017 ident: 2024042316182587100_ref78 – year: 2022 ident: 2024042316182587100_ref7 article-title: Kaspersky security bulletin 2022 publication-title: Stat – year: 2018 ident: 2024042316182587100_ref80 article-title: Samsung SmartThings Wifi ET-WV525 user manual – start-page: 626 volume-title: IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW, Australia, 01–04 August year: 2017 ident: 2024042316182587100_ref17 article-title: A methodology for privacy-aware iot-forensics – start-page: 25 volume-title: IEEE International Congress on Internet of Things (ICIOT), Honolulu, HI, USA, 25–30 Jun year: 2017 ident: 2024042316182587100_ref21 article-title: Trust-iov: A trustworthy forensic investigation framework for the internet of vehicles (iov) – year: 2002 ident: 2024042316182587100_ref1 article-title: RFC 3227: guidelines for evidence collection and archiving – start-page: 196 volume-title: IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, USA, 21–23 September year: 2018 ident: 2024042316182587100_ref23 article-title: A fog-based digital forensics investigation framework for iot systems – year: 2020 ident: 2024042316182587100_ref55 article-title: Using command line imager – year: 2020 ident: 2024042316182587100_ref59 article-title: Tcpdump/Libpcap public repository – year: 2020 ident: 2024042316182587100_ref86 article-title: SmartThings Wifi smart plug SmartThings - GP-WOU019BBAWU — Samsung US – year: 2020 ident: 2024042316182587100_ref26 article-title: Raspberry pi OS for raspberry pi – volume-title: Statista. IoT connected devices worldwide 2019–2030 - Statista ident: 2024042316182587100_ref5 – start-page: 356 volume-title: IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 22–24 August year: 2016 ident: 2024042316182587100_ref15 article-title: A generic digital forensic investigation framework for internet of things (iot) – year: 2020 ident: 2024042316182587100_ref65 article-title: The volatility foundation - open source memory Forensics – start-page: 1 volume-title: SoutheastCon 2018, St. Petersburg, FL, USA, 19–22 Apri year: 2018 ident: 2024042316182587100_ref29 article-title: Internet of things digital forensic investigation using open source gears – volume-title: 4th International Conference on Engineering & MIS (ICEMIS 2018) year: 2018 ident: 2024042316182587100_ref74 article-title: Evaluation of Security Regarding Z-Wave Wireless Protocol doi: 10.1145/3234698.3234730 – volume: 7 start-page: 1 year: 2020 ident: 2024042316182587100_ref10 article-title: A survey on digital forensics in internet of things publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2019.2940713 – year: 2020 ident: 2024042316182587100_ref60 article-title: Wireshark - network protocol Analyzer – year: 2020 ident: 2024042316182587100_ref87 article-title: SmartThings smart bulb - GP-LBU019BBAWU — Samsung US – year: 2020 ident: 2024042316182587100_ref82 article-title: Samsung SmartThings motion sensor — owner information support — Samsung US – year: 2018 ident: 2024042316182587100_ref88 article-title: Samsung connect home teardown – year: 2020 ident: 2024042316182587100_ref90 article-title: Meshlium Xtreme technical guide – year: 2017 ident: 2024042316182587100_ref77 article-title: MIT computer science and artificial intelligence laboratory publication-title: Security Analysis of Zigbee – volume-title: The Digital Forensic Research Conference (DFRWS), Utica, NY, 7–8 August year: 2001 ident: 2024042316182587100_ref24 article-title: A Road Map for Digital Forensic Research – year: 2020 ident: 2024042316182587100_ref61 article-title: NetworkMiner - the NSM and network Forensics analysis tool – year: 2020 ident: 2024042316182587100_ref91 article-title: Waspmote Plug & Sense! Technical guide – volume-title: ISO - ISO/IEC 27037:2012 - Information technology – Security techniques – Guidelines for identification, collection, acquisition and preservation of digital evidence year: 2012 ident: 2024042316182587100_ref2 – start-page: 19 volume-title: Fifth International Conference on Digital Information Processing and Communications (ICDIPC), Sierre, Switzerland, 07–09 October year: 2015 ident: 2024042316182587100_ref14 article-title: Internet of things (iot) digital forensic investigation model: Top-down forensic approach methodology – year: 2020 ident: 2024042316182587100_ref70 article-title: The Zeek network security monitor – volume: 1708 start-page: 01730 year: 2017 ident: 2024042316182587100_ref79 article-title: Evaluation of digital forensic process models with respect to digital forensics as a service publication-title: arXiv – year: 2020 ident: 2024042316182587100_ref85 article-title: Samsung SmartThings cam — owner information support — Samsung US – volume-title: Blackhat USA, Las Vegas, NV, USA, 27 July - 1 August year: 2013 ident: 2024042316182587100_ref76 article-title: Security Evaluation of the Z-Wave Wireless Protocol – start-page: 608 volume-title: 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, 20–23 October year: 2013 ident: 2024042316182587100_ref8 article-title: Internet of things forensics: Challenges and approaches – year: 2020 ident: 2024042316182587100_ref92 article-title: AWS IoT - Amazon web services – volume: 42-43 start-page: 301482 year: 2022 ident: 2024042316182587100_ref34 article-title: A forensic investigation framework for internet of things monitoring publication-title: Forensic Sci. Int. Digit. Investig. doi: 10.1016/j.fsidi.2022.301482 – volume: 29 start-page: 55 year: 2019 ident: 2024042316182587100_ref43 article-title: Forensic analysis of nucleus rtos on mtk smartwatches publication-title: Digital Investigation doi: 10.1016/j.diin.2019.03.007 – volume: 3 start-page: 50 year: 2016 ident: 2024042316182587100_ref16 article-title: Forensic-by-design framework for cyber-physical cloud systems publication-title: IEEE Cloud Comput. doi: 10.1109/MCC.2016.5 – year: 2020 ident: 2024042316182587100_ref68 article-title: Foremost - recovery tool – year: 2020 ident: 2024042316182587100_ref81 article-title: Samsung SmartThings multipurpose sensor — owner information support — Samsung US – year: 2020 ident: 2024042316182587100_ref93 article-title: Waspmote Plug & Sense! Sensor guide – start-page: 544 volume-title: IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, Vietri sul Mare, Italy, 18–21 December year: 2013 ident: 2024042316182587100_ref39 article-title: The forensics edge management system: A concept and design – volume: 8 start-page: 3 year: 2011 ident: 2024042316182587100_ref53 article-title: A survey of main memory acquisition and analysis techniques for the windows operating system publication-title: Digit. Investig. doi: 10.1016/j.diin.2011.06.002 – volume: 14 start-page: 3011 year: 2022 ident: 2024042316182587100_ref33 article-title: Integrated intelligent IOT forensic framework for data acquisition through open-source tools publication-title: Int. J. Inf. Technol. – start-page: 11 volume-title: 14th Australian Digital Forensics Conference, Perth, Australia, 5–6 December year: 2016 ident: 2024042316182587100_ref52 article-title: Memory forensic data recovery utilising ram cooling methods – start-page: 279 volume-title: IEEE International Conference on Services Computing, New York, NY, USA, 27 June - 2 July year: 2015 ident: 2024042316182587100_ref37 article-title: Faiot: Towards building a forensics aware eco system for the internet of things – volume: 28 start-page: 112 year: 2019 ident: 2024042316182587100_ref44 article-title: Sifting through the ashes: Amazon fire tv stick acquisition and analysis publication-title: Digital Investigation doi: 10.1016/j.diin.2019.01.003 – year: 2020 ident: 2024042316182587100_ref73 article-title: ExifTool by Phil Harvey. Read, write and edit meta information – start-page: 1446 volume-title: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 01–03 August year: 2018 ident: 2024042316182587100_ref22 article-title: A forensic investigation framework for smart home environment – volume-title: ISO - ISO/IEC 27050–1:2016 - Information technology – Security techniques – Electronic discovery – Part 1: Overview and concepts year: 2016 ident: 2024042316182587100_ref4 – volume: 36 start-page: 301114 year: 2021 ident: 2024042316182587100_ref46 article-title: Developing an iot forensic methodology. A concept proposal. Forensic science international publication-title: Digital Investigation doi: 10.1016/j.fsidi.2021.301114 – start-page: 50 volume-title: A Practical Guide To Coping With Cyberstalking, April year: 2015 ident: 2024042316182587100_ref63 article-title: (2015) How you can preserve digital evidence and why it is important – year: 2020 ident: 2024042316182587100_ref69 article-title: Xplico - open source network forensic analysis tool (NFAT) – volume-title: The 11th ADFSL Conference on Digital Forensics, Security and Law (CDFSL 2016), Daytona Beach, Florida, USA, 24–26 May year: 2016 ident: 2024042316182587100_ref9 article-title: Current challenges and future research areas for digital forensic investigation – volume-title: Mid-Year Update: 2022 SonicWall Cyber Threat Report year: 2022 ident: 2024042316182587100_ref6 – start-page: 519 volume-title: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Macao, China, 25–28 January year: 2016 ident: 2024042316182587100_ref50 article-title: Security analysis on consumer and industrial iot devices doi: 10.1109/ASPDAC.2016.7428064 – volume: 68 start-page: 112 year: 2017 ident: 2024042316182587100_ref75 article-title: The Z-wave routing protocol and its security implications publication-title: Comput. Secur. doi: 10.1016/j.cose.2017.04.004 – year: 2020 ident: 2024042316182587100_ref89 article-title: Libelium smart agriculture IoT vertical kit guide – year: 2020 ident: 2024042316182587100_ref84 article-title: Samsung SmartThings presence sensor — owner information support — Samsung US – start-page: 311 volume-title: International Conference on Advanced Computing, Networking and Informatics (ICACNI), Singapore, 1–3 June year: 2018 ident: 2024042316182587100_ref25 article-title: Acquisition and analysis of forensic artifacts from raspberry pi an internet of things prototype platform – start-page: 1116 volume-title: 2015 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea (South), 28–30 October year: 2015 ident: 2024042316182587100_ref47 article-title: Security considerations for secure and trustworthy smart home system in the iot environment doi: 10.1109/ICTC.2015.7354752 – volume-title: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), Reggio Calabria, Italy, 29 August - 1 September year: 2017 ident: 2024042316182587100_ref36 article-title: Forensic state acquisition from internet of things (fsaiot): A general framework and practical approach for iot forensics through iot device state acquisition doi: 10.1145/3098954.3104053 – volume: 109 start-page: 500 year: 2020 ident: 2024042316182587100_ref48 article-title: Smart vehicle forensics: challenges and case study publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2018.05.081 – year: 2020 ident: 2024042316182587100_ref57 article-title: 504ensicsLabs/LiME – volume: 44 start-page: 301499 year: 2023 ident: 2024042316182587100_ref35 article-title: An improved IoT forensic model to identify interconnectivity between things publication-title: Forensic Sci. Int. Digit. Investig. doi: 10.1016/j.fsidi.2022.301499 – start-page: 385 volume-title: IEEE 19th Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, 08–11 January year: 2022 ident: 2024042316182587100_ref13 article-title: Wifi-based iot devices profiling attack based on eavesdropping of encrypted wifi traffic – start-page: 33 volume-title: IEEE International Congress on Internet of Things (ICIOT), San Francisco, CA, USA, 02–07 July year: 2018 ident: 2024042316182587100_ref38 article-title: Fif-iot: A forensic investigation framework for iot using a public digital ledger – volume: 40 start-page: 301343 year: 2022 ident: 2024042316182587100_ref12 article-title: Quantifying data volatility for iot forensics with examples from contiki os publication-title: Forensic Sci. Int. Digit. Investig. doi: 10.1016/j.fsidi.2022.301343 – volume: 22 start-page: S15 year: 2017 ident: 2024042316182587100_ref40 article-title: Digital forensic approaches for amazon alexa ecosystem publication-title: Digital Investigation doi: 10.1016/j.diin.2017.06.010 – volume: 3 start-page: 17 year: 2011 ident: 2024042316182587100_ref45 article-title: Common phases of computer forensics investigation models publication-title: Int. J. Comput. Sci. Inf. Technol. – year: 2020 ident: 2024042316182587100_ref58 article-title: Halpomeranz/lmg – ident: 2024042316182587100_ref94 article-title: Consumer iot market size, sshare & trends analysis report forecasts, 2023 - 2030 – volume-title: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, 29 August - 1 September year: 2017 ident: 2024042316182587100_ref18 article-title: Application-specific digital forensics investigative model in internet of things (iot) doi: 10.1145/3098954.3104052 – year: 2020 ident: 2024042316182587100_ref72 article-title: Log2timeline Supertimeline tool – volume-title: IoT Statistics (2023–2030) year: 2022 ident: 2024042316182587100_ref95 article-title: Exploding Topics – volume: 22 start-page: S3 year: 2017 ident: 2024042316182587100_ref41 article-title: Drop (drone open source parser) your drone: forensic analysis of the dji phantom iii publication-title: Digital Investigation doi: 10.1016/j.diin.2017.06.013 – year: 2020 ident: 2024042316182587100_ref83 article-title: Samsung SmartThings moisture sensor — owner information support — Samsung US – year: 2020 ident: 2024042316182587100_ref71 article-title: Kroll Artifact parser and extractor - KAPE – start-page: 1 volume-title: IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), Stuttgart, Germany, 06–09 September year: 2022 ident: 2024042316182587100_ref32 article-title: An OT Forensic Model Based on Established IT Forensics Using IIRA – volume: 16 start-page: 29 year: 2016 ident: 2024042316182587100_ref51 article-title: Forensic analysis of newer tomtom devices publication-title: Digital Investigation doi: 10.1016/j.diin.2016.01.016 – start-page: 290 volume-title: 6th SSCC: International Symposium on Security in Computing and Communication, Bangalore, India, 19–22 September year: 2018 ident: 2024042316182587100_ref30 article-title: Wearable device forensic: Probable case studies and proposed methodology – volume: 11 start-page: 100220 year: 2020 ident: 2024042316182587100_ref11 article-title: Internet of things Forensics: a review publication-title: Internet of Things doi: 10.1016/j.iot.2020.100220 – year: 2020 ident: 2024042316182587100_ref64 article-title: Autopsy - the sleuth kit – start-page: 93 volume-title: IEEE International Conference on Smart Internet of Things (SmartIoT), Xi’an, China, 17–19 August year: 2018 ident: 2024042316182587100_ref28 article-title: Towards an integrated digital forensic investigation framework for an iot-based ecosystem – year: 2020 ident: 2024042316182587100_ref66 article-title: Rekall Forensics – start-page: 274 volume-title: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 21–23 June year: 2017 ident: 2024042316182587100_ref20 article-title: A new digital forensics model of smart city automated vehicles – volume: 17 start-page: 14 year: 2016 ident: 2024042316182587100_ref49 article-title: Extraction and analysis of non-volatile memory of the zw0301 module, a z-wave transceiver publication-title: Digital Investigation doi: 10.1016/j.diin.2016.02.002 – year: 2020 ident: 2024042316182587100_ref62 article-title: The-tcpdump-group/libpcap. Https://github.Com/the-tcpdump-group/libpcap |
SSID | ssj0002096 |
Score | 2.3771899 |
Snippet | The number of Internet of Things (IoT) forensic investigations has increased considerably over recent years due to the weak nature of the security measures of... |
SourceID | crossref oup |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 1324 |
Title | A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents |
Volume | 67 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3db9MwELfK9sIL41OML1kIiYfIzE2cpHnsNmBUK3ugk_ZW2bEjFYUEdYnE9vftD9v5I6kzhhj0IUpc59T6fro73_nuEHqn0liFIQ-JmvCCME4jklGZEyXSPBGZzKXxQ86_JkenbHYWn41GV96ppbYRH_LLW_NK_oerMAZ81Vmy_8DZnigMwD3wF67AYbjeicc6pdxkHQa6w2YFCx7MTUdoW1gJBs2JCq-WBvD6pAi-1Ivg4EIo42iXXTWnvmCBa_QQ-L_BhCkAEWUdfNbB9f3oh_U9z1od7uFVq7yJ6_WqLGsy1z2LbSTenuOeca2GN0Ge0n49rsgNovW5fW_jMF83ZuSwUpfB4GkwPzhuVwNPRmgOwNj06E46g05gSWjjNMoKZJZQokvM-xLbPa18d4QRv7C1Zp4qH0e2VOVvasKW0ALGf69KuBG_uKROKQwqct_QlP35RRu5j5aWwtK9fw9th7BZAWm7PT2cH3_rLYKQmj5x_f_ri4dGe5bCnqMwMI50wqVn6yweogduk4KnFnGP0EhVj9FOhwvs9METNJtiB0DcARB7ANSDGACIBwDEJwUGAOIhAJ-i008fFwdHxDXnIDlYvA1J0owKsG2k4JxTTnMmlRRMCcbA6puA7UU5F0US87yIw0LxVHJQHlxOYh6HoBWeoa2qrtRzhNVYastzogpRsDRLheQMBEUEn3GcZGoXkW5VlrmrXK8bqJTL2_mwi97383_ami1_nPkWFvkvk17cmdxLdH-D61doq1m36jXYrI144yBxDdm0mkE |
linkProvider | EBSCOhost |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Concept+Forensic+Methodology+For+The+Investigation+Of+IoT+Cyberincidents&rft.jtitle=Computer+journal&rft.au=Castelo+G%C3%B3mez%2C+Juan+Manuel&rft.au=Carrillo-Mond%C3%A9jar%2C+Javier&rft.au=Rold%C3%A1n-G%C3%B3mez%2C+Jos%C3%A9&rft.au=Mart%C3%ADnez+Mart%C3%ADnez%2C+Jos%C3%A9+Luis&rft.date=2024-04-21&rft.issn=0010-4620&rft.eissn=1460-2067&rft.volume=67&rft.issue=4&rft.spage=1324&rft.epage=1345&rft_id=info:doi/10.1093%2Fcomjnl%2Fbxad062&rft.externalDBID=n%2Fa&rft.externalDocID=10_1093_comjnl_bxad062 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0010-4620&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0010-4620&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0010-4620&client=summon |