It pays to be ahead of the criminal, and this book helps organizations and people to create a path to achieve this goal.
Table of ContentsPreface
1. Face Recognition–Based Surveillance System: A New Paradigm for Criminal Profiling Payal Singh, Sneha Gupta, Vipul Gupta, Piyush Kuchhal and Arpit Jain
1.1 Introduction
1.2 Image Processing
1.3 Deep Learning
1.3.1 Neural Network
1.3.2 Application of Neural Network in Face Recognition
1.4 Methodology
1.4.1 Face Recognition
1.4.2 Open CV
1.4.3 Block Diagram
1.4.4 Essentials Needed
1.4.5 Website
1.4.6 Hardware
1.4.7 Procedure
1.5 Conclusion
References
2. Smart Healthcare Monitoring System: An IoT-Based ApproachParanjeet Kaur
2.1 Introduction
2.2 Healthcare at Clinics
2.3 Remote Healthcare
2.4 Technological Framework
2.5 Standard UIs, Shows, and User Requirements
2.5.1 Advantages
2.5.2 Application
2.6 Cloud-Based Health Monitoring Using IoT
2.7 Information Acquisition
2.8 The Processing of Cloud
2.9 IoT-Based Health Monitoring Using Raspberry Pi
2.10 IoT-Based Health Monitoring Using RFID
2.10.1 Sensor Layer
2.10.2 Network Layer
2.10.3 Service Layer
2.11 Arduino and IoT-Based Health Monitoring System
2.12 IoT-Based Health Monitoring System Using ECG Signal
2.12.1 System Model
2.12.2 Framework
2.13 IoT-Based Health Monitoring System Using Android App
2.13.1 Transferring the Information to the Cloud
2.13.2 Application Controls
2.14 Conclusion and Future Perspectives
References
3. Design of Gesture-Based Hand Gloves Using Arduino UNO: A Grace to Abled MankindHarpreet Singh Bedi, Dekkapati Vinit Raju, Nandyala Meghanath Reddy C. Partha Sai Kumar and Mandla Ravi Varma
3.1 Introduction
3.1.1 Block Diagram
3.1.2 The Proposed New Design
3.1.3 Circuit Diagram
3.2 Result and Discussion
3.2.1 Data Analysis
3.3 Conclusion
3.4 Future Scope
References
4. Playing With Genes: A Pragmatic Approach in Genetic Engineering Prerna Singh and Dolly Sharma
4.1 Introduction
4.2 Literature Review
4.3 Methodology
4.3.1 Plasmid Method
4.3.2 The Vector Method
4.3.3 The Biolistic Method
4.4 Food and Agriculture
4.5 Impact on Farmers
4.6 Diseases: Gene Editing and Curing
4.7 Conclusion
4.8 Future Scope
References
5. Digital Investigative Model in IoT: Forensic ViewSuryapratap Ray and Tejasvi Bhatia
5.1 Introduction
5.1.1 Artificial Neural Network
5.2 Application of AI for Different Purposes in Forensic Science
5.2.1 Artificial Intelligence for Drug Toxicity and Safety
5.2.2 Crime Scene Reconstruction
5.2.3 Sequence or Pattern Recognition
5.2.4 Repositories Building
5.2.5 Establishment of Connection Among the Investigating Team
5.2.6 Artificial Intelligence and Expert System in Mass Spectrometry
5.2.7 AI in GPS Navigation
5.3 Future of AI
5.4 Challenges While Implementing AI
5.4.1 Unexplainability of AI
5.4.2 AI Anti-Forensics
5.4.3 Connection Interruption Between the Cyber Forensics and AI Communities 5.4.4 Data Analysis and Security
5.4.5 Creativity
5.5 Conclusion
References
6. Internet of Things Mobility Forensics Shipra Rohatgi, Aman Sharma and Bhavya Sharma
6.1 Introduction
6.2 Smart Device and IoT
6.3 Relation of Internet of Things with Mobility Forensics
6.3.1 Cyber Attack on IoT Data
6.3.2 Data Recovery from IoT Devices
6.3.3 Scenario-Based Analysis of IoT Data as Evidence
6.4 Mobility Forensics IoT Investigation Model
6.5 Internet of Things Mobility Forensics: A Source of Information
6.6 Drawbacks in IoT Devices Data Extraction
6.7 Future Perspective of Internet of Things Mobility Forensics
6.8 Conclusion
References
7. A Generic Digital Scientific Examination System for Internet of ThingsShipra Rohatgi and Sakshi Shrivastava
7.1 Introduction
7.2 Internet of Things
7.3 IoT Architecture
7.4 Characteristics of IoT
7.5 IoT Security Challenges and Factors of Threat
7.5.1 Effects of IoT Security Breach
7.6 Role of Digital Forensics in Cybercrime Investigation for IoT
7.6.1 IoT in Digital Forensic
7.6.2 Digital Forensics Investigation Framework for IoT Devices
7.6.3 Road Map for Issues in IoT Forensics
7.7 IoT Security Steps
7.7.1 How to Access IoT Security
7.8 Conclusion
References
8. IoT Sensors: Security in Network ForensicsD. Karthika
8.1 Introduction
8.2 Cybersecurity Versus IoT Security and Cyber-Physical Systems
8.3 The IoT of the Future and the Need to Secure
8.3.1 The Future—Cognitive Systems and the IoT
8.4 Security Engineering for IoT Development
8.5 Building Security Into Design and Development
8.6 Security in Agile Developments
8.7 Focusing on the IoT Device in Operation
8.8 Cryptographic Fundamentals for IoT Security Engineering
8.8.1 Types and Uses of Cryptographic Primitives in the IoT
8.8.1.1 Encryption and Decryption
8.8.1.2 Symmetric Encryption
8.8.1.3 Asymmetric Encryption
8.8.1.4 Hashes
8.8.1.5 Digital Signatures
8.8.1.6 Symmetric (MACS)
8.8.1.7 Random Number Generation
8.8.1.8 Cipher Suites Security for the IoT
8.9 Cloud
8.9.1 Asset/Record Organization
8.9.2 Service Provisioning, Billing, and Entitlement Management
8.9.3 Real-Rime Monitoring
8.9.4 Sensor Coordination
8.9.5 Customer Intelligence and Marketing
8.9.6 Information Sharing
8.9.7 Message Transport/Broadcast
8.10 Conclusion
References
9. Xilinx FPGA and Xilinx IP Cores: A Boon to Curb Digital Crime B. Khaleelu Rehman, G. Vallathan, Vetriveeran Rajamani and Salauddin Mohammad
9.1 Introduction
9.2 Literature Review
9.3 Proposed Work
9.4 Xilinx IP Core Square Root
9.5 RTL View of the 8-Bit Multiplier
9.5.1 Eight-Bit Multiplier Simulation Results Using IP Core
9.6 RTL View of 8-Bit Down Counter
9.6.1 Eight-Bit Down Counter Simulation Results
9.7 Up/Down Counter Simulation Results
9.8 Square Root Simulation Results
9.9 Hardware Device Utilization Reports of Binary Down Counter
9.10 Comparison of Proposed and Existing Work for Binary Up/Down Counter
9.10.1 Power Analysis of Binary Up/Down Counter
9.11 Conclusion
References
10. Human-Robot Interaction: An Artificial Cognition-Based Study for Criminal Investigations Deepansha Adlakha and Dolly Sharma
10.1 Introduction
10.1.1 Historical Background
10.2 Methodology
10.2.1 Deliberative Architecture and Knowledge Model
10.2.1.1 Natural Mind
10.2.1.2 Prerequisites for Developing the Mind of the Social Robots
10.2.1.3 Robot Control Paradigms
10.3 Architecture Models for Robots
10.4 Cognitive Architecture
10.4.1 Taxonomy of Cognitive Architectures
10.4.1.1 Symbolic Architectures
10.4.1.2 The Emergent or the Connectionist Architecture
10.4.1.3 The Hybrid Architecture
10.4.2 Cognitive Skills
10.4.2.1 Emotions
10.4.2.2 Dialogue for Socially Interactive Communication
10.4.2.3 Memory in Social Robots
10.4.2.4 Learning
10.4.2.5 Perception
10.5 Challenges in the Existing Social Robots and the Future Scopes
10.5.1 Sensors Technology
10.5.2 Understanding and Learning from the Operator
10.5.3 Architectural Design
10.5.4 Testing Phase
10.5.5 Credible, Legitimate, and Social Aspects
10.5.6 Automation in Digital Forensics
10.6 Conclusion
10.7 Robots in Future Pandemics
References
11. VANET: An IoT Forensic-Based Model for Maintaining Chain of Custody Manoj Sindhwani, Charanjeet Singh and Rajeshwar Singh
11.1 Introduction
11.2 Cluster Performance Parameters
11.3 Routing Protocols in VANET
11.3.1 Performance Metrics
11.3.2 Proposed Cluster Head Selection Algorithm
11.4 Internet of Vehicles
11.5 IoT Forensic in Vehicular Ad Hoc Networks
11.6 Conclusion
References
12. Cognitive Radio Networks: A Merit for Teleforensics Yogita Thareja, Kamal Kumar Sharma and Parulpreet Singh
12.1 Introduction
12.1.1 Integration of WSN with Psychological Radio
12.1.2 Characteristics of Cognitive Radio
12.2 Contribution of Work
12.2.1 Push-to-Talk
12.2.2 Digital Forensic–Radio Communication Equipment
12.2.3 Energy Harvesting Network
12.2.4 Challenges with the Use of Clusters in Cognitive Radio Networks
12.3 Conclusion and Future Scope
Acknowledgement
References
13. Fingerprint Image Identification System: An Asset for Security of Bank Lockers Mahendra, Apoorva, Shyam, Pavan and Harpreet Bedi
13.1 Introduction
13.1.1 Design Analysis
13.2 Result and Discussion
13.3 Conclusion
13.4 Future Scope
References
14. IoT Forensics: Interconnection and Sensing FrameworksNidhi Sagarwal
14.1 Introduction
14.2 The Need for IoT Forensics
14.3 Various Types of Evidences Encountered
14.4 Protocols and Frameworks in IoT Forensics
14.5 IoT Forensics Process Model
14.6 Suggestive Solutions
14.7 Conclusion
References
15. IoT Forensics: A Pernicious RepercussionsGift Chimkonda Chichele
15.1 Introduction: Challenges in IoT Forensics
15.2 Scope of the Compromise and Crime Scene Reconstruction
15.3 Device and Data Proliferation
15.4 Multiple Data Location and Jurisdiction Challenges
15.5 Device Type
15.6 Lack of Training and Weak Knowledge Management
15.7 Data Encryption
15.8 Heterogeneous Software and/or Hardware Specifications
15.9 Privacy and Ethical Considerations by Accessing Personal Data
15.10 Lack of a Common Forensic Model in IoT Devices
15.11 Securing the Chain of Custody
15.12 Lifespan Limitation
15.13 The Cloud Forensic Problem
15.14 The Minimum or Maximum Period in Which Data is Stored in the Cloud
15.15 Evidence Analysis and Correlation
15.16 Conclusion
References
About the Editors
Index Back to Top