Digital Forensics in the Context of the Internet of Things

Digital Forensics in the Context of the Internet of Things

Mariya Shafat Kirmani, Mohammad Tariq Banday
Copyright: © 2019 |Pages: 29
ISBN13: 9781522557425|ISBN10: 1522557423|EISBN13: 9781522557432
DOI: 10.4018/978-1-5225-5742-5.ch011
Cite Chapter Cite Chapter

MLA

Kirmani, Mariya Shafat, and Mohammad Tariq Banday. "Digital Forensics in the Context of the Internet of Things." Cryptographic Security Solutions for the Internet of Things, edited by Mohammad Tariq Banday, IGI Global, 2019, pp. 296-324. https://doi.org/10.4018/978-1-5225-5742-5.ch011

APA

Kirmani, M. S. & Banday, M. T. (2019). Digital Forensics in the Context of the Internet of Things. In M. Banday (Ed.), Cryptographic Security Solutions for the Internet of Things (pp. 296-324). IGI Global. https://doi.org/10.4018/978-1-5225-5742-5.ch011

Chicago

Kirmani, Mariya Shafat, and Mohammad Tariq Banday. "Digital Forensics in the Context of the Internet of Things." In Cryptographic Security Solutions for the Internet of Things, edited by Mohammad Tariq Banday, 296-324. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-5742-5.ch011

Export Reference

Mendeley
Favorite

Abstract

The pervasive nature of IoT, envisioned with the characteristics of diversity, heterogeneity, and complexity, is diluting the boundaries between the physical and digital worlds. IoT being widely distributed qualifies it as the breeding ground for cyber-attacks. Although remarkable work is being done to ensure security in IoT infrastructure, security vulnerabilities persist. The IoT infrastructure can either be used as a direct target in a cyber-attack or exploited as a tool to carry a cyber-attack. In either case, the security measures in IoT infrastructure is compromised. The enormous IoT data is sensitive that can act as a gold mine to both the criminals for illicit exploitation or investigators to act as digital witness. IoT forensics help the investigators to acquire intelligence from this smart infrastructure to reconstruct the historical events occurred. However, due to sophisticated IoT architecture, the digital investigators face myriad challenges in IoT-related investigations using existing investigation methodologies and, hence, demand a separate dedicated forensic framework.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.