Search

Browse Subject Areas

For Authors

Submit a Proposal

Digital Forensics and Internet of Things

Impact and Challenges

Edited by Anita Gehlot, Rajesh Singh, Jaskaran Singh and Neeta Raj Sharma
Copyright: 2022   |   Status: Published
ISBN: 9781119768784  |  Hardcover  |  
265 pages | 104 illustrations
Price: $195 USD
Add To Cart

One Line Description
It pays to be ahead of the criminal, and this book helps organizations and people to create a path to achieve this goal.

Audience
Researchers and scientists in forensic sciences, computer sciences, electronics engineering, embedded systems, information technology.

Description
The book discusses applications and challenges professionals encounter in the burgeoning field of IoT forensics. IoT forensics attempts to align its workflow to that of any forensics practice—investigators identify, interpret, preserve, analyze and present any relevant data. As with any investigation, a timeline is constructed, and, with the aid of smart devices providing data, investigators might be able to capture much more specific data points than in a traditional crime. However, collecting this data can often be a challenge, as it frequently doesn’t live on the device itself, but rather in the provider’s cloud platform. If you can get the data off the device, you’ll have to employ one of a variety of methods given the diverse nature of IoT devices hardware, software, and firmware. So, while robust and insightful data is available, acquiring it is no small undertaking.
Digital Forensics and Internet of Things encompasses:
• State-of-the-art research and standards concerning IoT forensics and traditional
digital forensics
• Compares and contrasts IoT forensic techniques with those of traditional digital
forensics standards
• Identifies the driving factors of the slow maturation of IoT forensic standards and
possible solutions
• Applies recommended standards gathered from IoT forensic literature in hands-on
experiments to test their effectiveness across multiple IoT devices
• Provides educated recommendations on developing and establishing IoT forensic standards,
research, and areas that merit further study.

Back to Top
Author / Editor Details
Anita Gehlot, PhD is an associate professor at Lovely Professional University with more than 12 years of experience in academics. She has published more than 70 research papers in refereed journals/conferences and 28 books in the area of Embedded Systems and Internet of Things.

Rajesh Singh, PhD is a professor at Lovely Professional University with more than 16 years of experience in academics. He has published more than 100 research papers in refereed journals/conferences.

Jaskaran Singh, PhD in Forensic Sciences from Amity University Noida, serves as the Head of Department of Forensic Sciences at Lovely Professional University, Punjab, India. He has more than 14 research publications, 13 patents, 3 copyrights, and one edited book to his credit.

Neeta Raj Sharma, PhD in Biochemistry from Jiwaji University Gwalior. She is visiting professor at Birmingham City University, UK, and working in association with University of British Columbia, McGill University, Laval University, and University of Victoria in Canada. She has published more than 55 publications, 20 patents, 4 copyrights, and 2 edited books.

Back to Top

Table of Contents
Preface
1. Face Recognition–Based Surveillance System: A New Paradigm for Criminal Profiling

Payal Singh, Sneha Gupta, Vipul Gupta, Piyush Kuchhal and Arpit Jain
1.1 Introduction
1.2 Image Processing
1.3 Deep Learning
1.3.1 Neural Network
1.3.2 Application of Neural Network in Face Recognition
1.4 Methodology
1.4.1 Face Recognition
1.4.2 Open CV
1.4.3 Block Diagram
1.4.4 Essentials Needed
1.4.5 Website
1.4.6 Hardware
1.4.7 Procedure
1.5 Conclusion
References
2. Smart Healthcare Monitoring System: An IoT-Based Approach
Paranjeet Kaur
2.1 Introduction
2.2 Healthcare at Clinics
2.3 Remote Healthcare
2.4 Technological Framework
2.5 Standard UIs, Shows, and User Requirements
2.5.1 Advantages
2.5.2 Application
2.6 Cloud-Based Health Monitoring Using IoT
2.7 Information Acquisition
2.8 The Processing of Cloud
2.9 IoT-Based Health Monitoring Using Raspberry Pi
2.10 IoT-Based Health Monitoring Using RFID
2.10.1 Sensor Layer
2.10.2 Network Layer
2.10.3 Service Layer
2.11 Arduino and IoT-Based Health Monitoring System
2.12 IoT-Based Health Monitoring System Using ECG Signal
2.12.1 System Model
2.12.2 Framework
2.13 IoT-Based Health Monitoring System Using Android App
2.13.1 Transferring the Information to the Cloud
2.13.2 Application Controls
2.14 Conclusion and Future Perspectives
References
3. Design of Gesture-Based Hand Gloves Using Arduino UNO: A Grace to Abled Mankind
Harpreet Singh Bedi, Dekkapati Vinit Raju, Nandyala Meghanath Reddy C. Partha Sai Kumar and Mandla Ravi Varma
3.1 Introduction
3.1.1 Block Diagram
3.1.2 The Proposed New Design
3.1.3 Circuit Diagram
3.2 Result and Discussion
3.2.1 Data Analysis
3.3 Conclusion
3.4 Future Scope
References
4. Playing With Genes: A Pragmatic Approach in Genetic Engineering
Prerna Singh and Dolly Sharma
4.1 Introduction
4.2 Literature Review
4.3 Methodology
4.3.1 Plasmid Method
4.3.2 The Vector Method
4.3.3 The Biolistic Method
4.4 Food and Agriculture
4.5 Impact on Farmers
4.6 Diseases: Gene Editing and Curing
4.7 Conclusion
4.8 Future Scope
References
5. Digital Investigative Model in IoT: Forensic View
Suryapratap Ray and Tejasvi Bhatia
5.1 Introduction
5.1.1 Artificial Neural Network
5.2 Application of AI for Different Purposes in Forensic Science
5.2.1 Artificial Intelligence for Drug Toxicity and Safety
5.2.2 Crime Scene Reconstruction
5.2.3 Sequence or Pattern Recognition
5.2.4 Repositories Building
5.2.5 Establishment of Connection Among the Investigating Team
5.2.6 Artificial Intelligence and Expert System in Mass Spectrometry
5.2.7 AI in GPS Navigation
5.3 Future of AI
5.4 Challenges While Implementing AI
5.4.1 Unexplainability of AI
5.4.2 AI Anti-Forensics
5.4.3 Connection Interruption Between the Cyber Forensics and AI Communities 5.4.4 Data Analysis and Security
5.4.5 Creativity
5.5 Conclusion
References
6. Internet of Things Mobility Forensics
Shipra Rohatgi, Aman Sharma and Bhavya Sharma
6.1 Introduction
6.2 Smart Device and IoT
6.3 Relation of Internet of Things with Mobility Forensics
6.3.1 Cyber Attack on IoT Data
6.3.2 Data Recovery from IoT Devices
6.3.3 Scenario-Based Analysis of IoT Data as Evidence
6.4 Mobility Forensics IoT Investigation Model
6.5 Internet of Things Mobility Forensics: A Source of Information
6.6 Drawbacks in IoT Devices Data Extraction
6.7 Future Perspective of Internet of Things Mobility Forensics
6.8 Conclusion
References
7. A Generic Digital Scientific Examination System for Internet of Things
Shipra Rohatgi and Sakshi Shrivastava
7.1 Introduction
7.2 Internet of Things
7.3 IoT Architecture
7.4 Characteristics of IoT
7.5 IoT Security Challenges and Factors of Threat
7.5.1 Effects of IoT Security Breach
7.6 Role of Digital Forensics in Cybercrime Investigation for IoT
7.6.1 IoT in Digital Forensic
7.6.2 Digital Forensics Investigation Framework for IoT Devices
7.6.3 Road Map for Issues in IoT Forensics
7.7 IoT Security Steps
7.7.1 How to Access IoT Security
7.8 Conclusion
References
8. IoT Sensors: Security in Network Forensics
D. Karthika
8.1 Introduction
8.2 Cybersecurity Versus IoT Security and Cyber-Physical Systems
8.3 The IoT of the Future and the Need to Secure
8.3.1 The Future—Cognitive Systems and the IoT
8.4 Security Engineering for IoT Development
8.5 Building Security Into Design and Development
8.6 Security in Agile Developments
8.7 Focusing on the IoT Device in Operation
8.8 Cryptographic Fundamentals for IoT Security Engineering
8.8.1 Types and Uses of Cryptographic Primitives in the IoT
8.8.1.1 Encryption and Decryption
8.8.1.2 Symmetric Encryption
8.8.1.3 Asymmetric Encryption
8.8.1.4 Hashes
8.8.1.5 Digital Signatures
8.8.1.6 Symmetric (MACS)
8.8.1.7 Random Number Generation
8.8.1.8 Cipher Suites Security for the IoT
8.9 Cloud
8.9.1 Asset/Record Organization
8.9.2 Service Provisioning, Billing, and Entitlement Management
8.9.3 Real-Rime Monitoring
8.9.4 Sensor Coordination
8.9.5 Customer Intelligence and Marketing
8.9.6 Information Sharing
8.9.7 Message Transport/Broadcast
8.10 Conclusion
References
9. Xilinx FPGA and Xilinx IP Cores: A Boon to Curb Digital Crime
B. Khaleelu Rehman, G. Vallathan, Vetriveeran Rajamani and Salauddin Mohammad
9.1 Introduction
9.2 Literature Review
9.3 Proposed Work
9.4 Xilinx IP Core Square Root
9.5 RTL View of the 8-Bit Multiplier
9.5.1 Eight-Bit Multiplier Simulation Results Using IP Core
9.6 RTL View of 8-Bit Down Counter
9.6.1 Eight-Bit Down Counter Simulation Results
9.7 Up/Down Counter Simulation Results
9.8 Square Root Simulation Results
9.9 Hardware Device Utilization Reports of Binary Down Counter
9.10 Comparison of Proposed and Existing Work for Binary Up/Down Counter
9.10.1 Power Analysis of Binary Up/Down Counter
9.11 Conclusion
References
10. Human-Robot Interaction: An Artificial Cognition-Based Study for Criminal Investigations
Deepansha Adlakha and Dolly Sharma
10.1 Introduction
10.1.1 Historical Background
10.2 Methodology
10.2.1 Deliberative Architecture and Knowledge Model
10.2.1.1 Natural Mind
10.2.1.2 Prerequisites for Developing the Mind of the Social Robots
10.2.1.3 Robot Control Paradigms
10.3 Architecture Models for Robots
10.4 Cognitive Architecture
10.4.1 Taxonomy of Cognitive Architectures
10.4.1.1 Symbolic Architectures
10.4.1.2 The Emergent or the Connectionist Architecture
10.4.1.3 The Hybrid Architecture
10.4.2 Cognitive Skills
10.4.2.1 Emotions
10.4.2.2 Dialogue for Socially Interactive Communication
10.4.2.3 Memory in Social Robots
10.4.2.4 Learning
10.4.2.5 Perception
10.5 Challenges in the Existing Social Robots and the Future Scopes
10.5.1 Sensors Technology
10.5.2 Understanding and Learning from the Operator
10.5.3 Architectural Design
10.5.4 Testing Phase
10.5.5 Credible, Legitimate, and Social Aspects
10.5.6 Automation in Digital Forensics
10.6 Conclusion
10.7 Robots in Future Pandemics
References
11. VANET: An IoT Forensic-Based Model for Maintaining Chain of Custody Manoj Sindhwani, Charanjeet Singh and Rajeshwar Singh
11.1 Introduction
11.2 Cluster Performance Parameters
11.3 Routing Protocols in VANET
11.3.1 Performance Metrics
11.3.2 Proposed Cluster Head Selection Algorithm
11.4 Internet of Vehicles
11.5 IoT Forensic in Vehicular Ad Hoc Networks
11.6 Conclusion
References
12. Cognitive Radio Networks: A Merit for Teleforensics
Yogita Thareja, Kamal Kumar Sharma and Parulpreet Singh
12.1 Introduction
12.1.1 Integration of WSN with Psychological Radio
12.1.2 Characteristics of Cognitive Radio
12.2 Contribution of Work
12.2.1 Push-to-Talk
12.2.2 Digital Forensic–Radio Communication Equipment
12.2.3 Energy Harvesting Network
12.2.4 Challenges with the Use of Clusters in Cognitive Radio Networks
12.3 Conclusion and Future Scope
Acknowledgement
References
13. Fingerprint Image Identification System: An Asset for Security of Bank Lockers
Mahendra, Apoorva, Shyam, Pavan and Harpreet Bedi
13.1 Introduction
13.1.1 Design Analysis
13.2 Result and Discussion
13.3 Conclusion
13.4 Future Scope
References
14. IoT Forensics: Interconnection and Sensing Frameworks
Nidhi Sagarwal
14.1 Introduction
14.2 The Need for IoT Forensics
14.3 Various Types of Evidences Encountered
14.4 Protocols and Frameworks in IoT Forensics
14.5 IoT Forensics Process Model
14.6 Suggestive Solutions
14.7 Conclusion
References
15. IoT Forensics: A Pernicious Repercussions
Gift Chimkonda Chichele
15.1 Introduction: Challenges in IoT Forensics
15.2 Scope of the Compromise and Crime Scene Reconstruction
15.3 Device and Data Proliferation
15.4 Multiple Data Location and Jurisdiction Challenges
15.5 Device Type
15.6 Lack of Training and Weak Knowledge Management
15.7 Data Encryption
15.8 Heterogeneous Software and/or Hardware Specifications
15.9 Privacy and Ethical Considerations by Accessing Personal Data
15.10 Lack of a Common Forensic Model in IoT Devices
15.11 Securing the Chain of Custody
15.12 Lifespan Limitation
15.13 The Cloud Forensic Problem
15.14 The Minimum or Maximum Period in Which Data is Stored in the Cloud
15.15 Evidence Analysis and Correlation
15.16 Conclusion
References
About the Editors
Index


Back to Top



Description
Author/Editor Details
Table of Contents
Bookmark this page