IoT Forensics: Current Perspectives and Future Directions
<p>Conceptual model categories for IoT forensics.</p> "> Figure 2
<p>An illustration of the various categories into which current IoT forensics techniques have been classified [<a href="#B6-sensors-24-05210" class="html-bibr">6</a>,<a href="#B9-sensors-24-05210" class="html-bibr">9</a>,<a href="#B11-sensors-24-05210" class="html-bibr">11</a>,<a href="#B12-sensors-24-05210" class="html-bibr">12</a>,<a href="#B31-sensors-24-05210" class="html-bibr">31</a>,<a href="#B36-sensors-24-05210" class="html-bibr">36</a>,<a href="#B37-sensors-24-05210" class="html-bibr">37</a>,<a href="#B38-sensors-24-05210" class="html-bibr">38</a>,<a href="#B39-sensors-24-05210" class="html-bibr">39</a>,<a href="#B40-sensors-24-05210" class="html-bibr">40</a>,<a href="#B41-sensors-24-05210" class="html-bibr">41</a>,<a href="#B42-sensors-24-05210" class="html-bibr">42</a>,<a href="#B43-sensors-24-05210" class="html-bibr">43</a>,<a href="#B44-sensors-24-05210" class="html-bibr">44</a>,<a href="#B45-sensors-24-05210" class="html-bibr">45</a>,<a href="#B46-sensors-24-05210" class="html-bibr">46</a>,<a href="#B47-sensors-24-05210" class="html-bibr">47</a>,<a href="#B48-sensors-24-05210" class="html-bibr">48</a>,<a href="#B49-sensors-24-05210" class="html-bibr">49</a>].</p> ">
Abstract
:1. Introduction
2. The Internet of Things (IoT) Forensics
3. IoT Forensic Layers
- -
- Device Layer Forensics: IoT devices are versatile, and there are no universal forensic methods. Evidence may be acquired from the local memory of IoT devices, such as audio, images, videos, and log files. This data, which includes user behaviour, sensor data, heart rate data, configuration data, telemetry data, and device states, comes from devices such as CCTV cameras, medical implants, smart home appliances, networked vehicles, and UAVs.
- -
- Network Layer Forensics: The network layer of IoT comprises various networks connecting devices to each other and the internet, such as PANs, BANs, WANs, HANs, and LANs. Leveraging the logging and auditing capabilities of these networks can collect legally admissible evidence to trace users within the IoT ecosystem [10].
- -
- Cloud Layer Forensics: Due to the storage and computational constraints of IoT devices, cloud computing offers advantages such as on-demand accessibility and processing capacity. Data generated by IoT devices are transmitted to the cloud for storage and processing, making the cloud crucial in IoT forensics. Client-centric artefacts and other relevant data, such as authentication, access, system, database, and application logs, can be extracted from the cloud to reconstruct cases [31].
4. IoT Forensic Review
4.1. Artificial Intelligence in IoT Forensics
4.2. IoT Applications
4.3. IoT Network Architecture
4.4. Cutting-Edge IoT Forensics
4.5. Blockchain-Based IoT Forensics
4.6. Other IoT Forensics
- A.
- IoT forensics using Electromagnetic side-channel
- B.
- IoT forensic using 3D framework
- C.
- IoT forensics using operating system logs
5. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Atzori, L.; Iera, A.; Morabito, G. The internet of things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
- Villamil, S.; Hernández, C.; Tarazona, G. An overview of internet of things. Telkomnika (Telecommun. Comput. Electron. Control.) 2020, 18, 2320–2327. [Google Scholar] [CrossRef]
- Gupta, J.; Nayyar, A.; Gupta, P. Security and privacy issues in internet of things (IoT). Int. J. Res. Comput. Sci. 2015, 2, 18–22. [Google Scholar]
- Conti, M.; Dehghantanha, A.; Franke, K.; Watson, S. Internet of Things security and forensics: Challenges and opportunities. Future Gener. Comput. Syst. 2018, 78, 544–546. [Google Scholar] [CrossRef]
- Kouahla, Z.; Benrazek, A.E.; Ferrag, M.A.; Farou, B.; Seridi, H.; Kurulay, M.; Anjum, A.; Asheralieva, A. A survey on big IoT data indexing: Potential solutions, recent advancements, and open issues. Future Internet 2021, 14, 19. [Google Scholar] [CrossRef]
- Stoyanova, M.; Nikoloudakis, Y.; Panagiotakis, S.; Pallis, E.; Markakis, E.K. A survey on the internet of things (IoT) forensics: Challenges, approaches, and open issues. IEEE Commun. Surv. Tutor. 2020, 22, 1191–1221. [Google Scholar] [CrossRef]
- Nadir, I.; Mahmood, H.; Asadullah, G. A taxonomy of IoT firmware security and principal firmware analysis techniques. Int. J. Crit. Infrastruct. Prot. 2022, 38, 100552. [Google Scholar] [CrossRef]
- Oriwoh, E.; Jazani, D.; Epiphaniou, G.; Sant, P. Internet of things forensics: Challenges and approaches. In Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, 20–23 October 2013; pp. 608–615. [Google Scholar]
- Hou, J.; Li, Y.; Yu, J.; Shi, W. A survey on digital forensics in Internet of Things. IEEE Internet Things J. 2019, 7, 1–15. [Google Scholar] [CrossRef]
- Alenezi, A.; Atlam, H.; Alsagri, R.; Alassafi, M.; Wills, G. IoT forensics: A state-of-the-art review, challenges and future directions. In Proceedings of the 4th International Conference on Complexity, Future Information Systems and Risk (COMPLEXIS 2019), Crete, Greece, 2–4 May 2019; pp. 106–115. [Google Scholar]
- Atlam, H.F.; Hemdan, E.E.-D.; Alenezi, A.; Alassafi, M.O.; Wills, G.B. Internet of Things Forensics: A Review. Internet Things 2020, 11, 100220. [Google Scholar] [CrossRef]
- Studiawan, H.; Sohel, F.; Payne, C. A survey on forensic investigation of operating system logs. Digit. Investig. 2019, 29, 1–20. [Google Scholar] [CrossRef]
- Chernyshev, M.; Zeadally, S.; Baig, Z.; Woodward, A. Internet of things forensics: The need, process models, and open issues. IT Prof. 2018, 20, 40–49. [Google Scholar] [CrossRef]
- Kyei, K.; Zavarsky, P.; Lindskog, D.; Ruhl, R. A review and comparative study of digital forensic investigation models. In Proceedings of the Digital Forensics and Cyber Crime: 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, 25–26 October 2012; Springer: Heidelberg, Germany, 2013; pp. 314–327. [Google Scholar]
- Valjarević, A.; Venter, H.; Petrović, R. ISO/IEC 27043: 2015—Role and application. In Proceedings of the 2016 24th Telecommunications Forum (TELFOR), Belgrade, Serbia, 22–23 November 2016; pp. 1–4. [Google Scholar]
- Pour, M.S.; Bou-Harb, E.; Varma, K.; Neshenko, N.; Pados, D.A.; Choo, K.-K.R. Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns. Digit. Investig. 2019, 28, S40–S49. [Google Scholar] [CrossRef]
- Gupta, B.b.; Quamara, M. An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurr. Comput. Pract. Exp. 2020, 32, e4946. [Google Scholar] [CrossRef]
- Skowron, M.; Janicki, A.; Mazurczyk, W. Traffic Fingerprinting Attacks on Internet of Things Using Machine Learning. IEEE Access 2020, 8, 20386–20400. [Google Scholar] [CrossRef]
- Fruhlinger, J. The Mirai Botnet Explained: How IoT Devices Almost Brought Down the Internet, CSO Online. 2018. Available online: https://www.csoonline.com/article/3258748/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html (accessed on 27 September 2021).
- DeNardis, L. The Internet in Everything: Freedom and Security in a World with No off Switch; Yale University Press: New Haven, CT, USA, 2020; Available online: http://ebookcentral.proquest.com/lib/dmu/detail.action?docID=5993944 (accessed on 29 March 2024).
- Alabdulsalam, S.; Schaefer, K.; Kechadi, T. Internet of Things Forensics: Challenges and Case Study. In Proceedings of the 14th IFIP WG 11.9 International Conference, New Delhi, India, 3–5 January 2018; p. 13. [Google Scholar]
- Gandhi, C.; Shukla, N.; Kaur, G.; Yadav, K. Blockchain Technology: Concept, Applications, Challenges, and Security Threats. In Blockchain Applications in IoT Ecosystem; Choudhury, T., Khanna, A., Toe, T.T., Khurana, M., Nhu, N.G., Eds.; Springer International Publishing (EAI/Springer Innovations in Communication and Computing): Cham, Switzerland, 2021; pp. 77–104. [Google Scholar] [CrossRef]
- Dwivedi, S.; Roy, P.; Karda, C.; Agrawal, S.; Amin, R. Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey. Secur. Commun. Netw. 2021, 2021, e7142048. [Google Scholar] [CrossRef]
- Anilakkad Raman, J.; Varadharajan, V. HoneyNetCloud Investigation Model, A Preventive Process Model for IoT Forensics. Ing. Syst. Inf. 2021, 26, 319–327. [Google Scholar] [CrossRef]
- Luo, T.; Xu, Z.; Jin, X.; Jia, Y.; Ouyang, X. IoTCandyJar: Towards an Intelligent-Interaction Honeypot for IoT Devices. Black Hat 2017, 1, 1–11. [Google Scholar]
- Yadav, P.; Feraudo, A.; Arief, B.; Shahandashti, S.F.; Vassilakis, V.G. Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms. In Proceedings of the 2nd International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things, New York, NY, USA, 16–19 November 2020; Association for Computing Machinery (AIChallengeIoT 20): New York, NY, USA, 2020; pp. 62–68. [Google Scholar] [CrossRef]
- Yousefnezhad, N.; Malhi, A.; Främling, K. Automated IoT Device Identification Based on Full Packet Information Using Real-Time Network Traffic. Sensors 2021, 21, 2660. [Google Scholar] [CrossRef]
- Mohammad, R.M. A Neural Network based Digital Forensics Classification. In Proceedings of the 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, Jordan, 28 October–1 November 2018; pp. 1–7. [Google Scholar] [CrossRef]
- Preda, M. Digital Forensics of Internet of Things Smart Heating System Investigation. J. Mil. Technol. 2020, 3, 23–28. [Google Scholar] [CrossRef]
- Harbawi, M.; Varol, A. An improved digital evidence acquisition model for the Internet of Things forensic I: A theoretical framework. In Proceedings of the 2017 5th International Symposium on Digital Forensic and Security (ISDFS), Tirgu Mures, Romania, 26–28 April 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Alenezi, A.; Atlam, H.F.; Wills, G.B. Experts reviews of a cloud forensic readiness framework for organizations. J. Cloud Comput. 2019, 8, 11. [Google Scholar] [CrossRef]
- Zawoad, S.; Hasan, R. FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things. In Proceedings of the 2015 IEEE International Conference on Services Computing, New York, NY, USA, 27 June–2 July 2015; pp. 279–284. [Google Scholar] [CrossRef]
- Sivaraman, V.; Gharakheili, H.; Fernandes, C.; Clark, N.; Karliychuk, T. Smart IoT Devices in the Home: Security and Privacy Implications. IEEE Technol. Soc. Mag. 2018, 37, 71–79. [Google Scholar] [CrossRef]
- Long, C.; Cao, Y.; Jiang, T.; Zhang, Q. Edge Computing Framework for Cooperative Video Processing in Multimedia IoT Systems. IEEE Trans. Multimed. 2018, 20, 1126–1139. [Google Scholar] [CrossRef]
- Anufrienko, A. evaluating the complexity of implementing data processing on IoT-devices. Vestn. Kompiut. Inf. Tekhnol. 2021, 10, 40–45. [Google Scholar] [CrossRef]
- Almolhis, N.; Alashjaee, A.M.; Haney, M. Requirements for IoT Forensic Models: A Review. In Advances in Security, Networks, and Internet of Things. Transactions on Computational Science and Computational Intelligence; Daimi, K., Arabnia, H.R., Deligiannidis, L., Hwang, M.S., Tinetti, F.G., Eds.; Springer: Cham, Switzerland, 2021. [Google Scholar] [CrossRef]
- Moussa, A.N.; Ithnin, N.B.; Miaikil, O.A. Conceptual forensic readiness framework for infrastructure as a service consumers. In Proceedings of the 2014 IEEE Conference on Systems, Process and Control (ICSPC 2014), Kuala Lumpur, Malaysia, 12–14 December 2014. [Google Scholar]
- Kohn, M.D.; Eloff, M.M.; Eloff, J.H. Integrated digital forensic process model. Comput. Secur. 2013, 38, 103–115. [Google Scholar] [CrossRef]
- Du, X.; Le-Khac, N.-A.; Scanlon, M. Evaluation of digital forensic process models with respect to digital forensics as a service. arXiv 2017, arXiv:1708.01730. [Google Scholar] [CrossRef]
- Hegarty, R.; Lamb, D.J.; Attwood, A. Digital evidence challenges in the internet of things. In Proceedings of the 10th International Network Conference (INC), Plymouth, UK, 8–10 July 2014; pp. 163–172. [Google Scholar]
- Zia, T.; Liu, P.; Han, W. Application-specific digital forensics investigative model in internet of things (IoT). In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, 29 August–1 September 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 1–7. [Google Scholar]
- Surange, G.; Khatri, P. IoT Forensics: A Review on Current Trends, Approaches and Foreseen Challenges. In Proceedings of the 2021 8th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 17–19 March 2021; pp. 909–913. [Google Scholar]
- Le, D.-P.; Meng, H.; Su, L.; Yeo, S.L.; Thing, V. BIFF: A blockchain-based IoT forensics framework with identity privacy. In Proceedings of the TENCON 2018–2018 IEEE Region 10 Conference, Jeju, Republic of Korea, 28–31 October 2018. [Google Scholar]
- James, J. DFRWS Forensic Challenge 2017–2018. 2018. Available online: https://jijames.github.io/DFRWS2018Challenge/ (accessed on 10 August 2024).
- Lutta, P.; Sedky, M.; Hassan, M.; Jayawickrama, U.; Bakhtiari Bastaki, B. The complexity of internet of things forensics: A state-of-the-art review. Forensic Sci. Int. 2021, 38, 301210. [Google Scholar] [CrossRef]
- Ross, A.; Banerjee, S.; Chowdhury, A. Security in Smart Cities: A Brief Review of Digital Forensic Schemes for Biometric Data. Pattern Recognit. Lett. 2020, 138, 346–354. [Google Scholar] [CrossRef]
- Akinbi, A.; MacDermott, Á.; Ismael, A.M. A systematic literature review of blockchain-based Internet of Things (IoT) forensic investigation process models. Forensic Sci. Int. 2022, 42, 301470. [Google Scholar] [CrossRef]
- HaddadPajouh, H.; Parizi, R. A Survey on Internet of Things Security: Requirements, Challenges, and Solutions. Internet Things 2019, 14, 100129. [Google Scholar] [CrossRef]
- Sayakkara, A.; Le-Khac, N.-A.; Scanlon, M. A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics. Digit. Investig. 2019, 29, 43–54. [Google Scholar] [CrossRef]
Study | Contributions | Weaknesses |
---|---|---|
[7] | Highlights the significance of IoT firmware security and offers an updated assessment of vulnerabilities and solutions in this domain. | Insufficient auditing of hardware and network connectivity protocols. This study does not focus on issues relevant to IoT forensics. |
[9] | The study offers a holistic overview of IoT digital forensics, identifying open issues and proposing suggestions for future research. | A thorough critical analysis has not adequately been carried out to pinpoint the strengths and weaknesses of the reviewed studies. Furthermore, the identified weaknesses have not been extensively discussed to determine their potential as topics for future research. |
[10] | The analysis explores digital forensics and current issues in the IoT forensics. It highlights the researcher’s efforts to effectively address these issues. | The state-of-the-art section is concise and lacks a comprehensive description or categorisation of existing works. Additionally, the weaknesses of the reviewed studies have not undergone critical analysis. |
[11] | This review provides a comprehensive examination of IoT forensics, emphasising the significance of artificial intelligence (AI). Additionally, it outlines future research directions in the field. | A general discussion has been held regarding the requirements for successful IoT forensics and the challenges and suggested solutions within the field. However, the specific weaknesses of each study covered in this paper’s review process have not undergone in-depth critical analysis. |
[12] | An analysis of forensic investigation techniques and tools applied to operating system aiding event log analysis. It also includes an assessment of available datasets and recommendations for future research. | The proposed approaches and tools for forensics are not primarily designed for IoT environments. As a result, there is a potential need to adjust them to suit the specific requirements of IoT forensics, particularly in the context of event log analysis. |
Ref. | Research Findings | Directions for Future Research |
---|---|---|
[10] | A comprehensive overview of IoT forensics and challenges in current literature. The general goal of this study is to assess both the IoT and digital forensic sectors, pinpoint associated issues, and propose directions for future research endeavours. | This work identifies potential areas relevant to IoT forensics, such as IoT forensic procedures, multi-jurisdictions, big IoT data analysis, anti-forensic data pooling, and IoT forensic readiness, as future research directions. |
[11] | An overview of IoT forensics underscores the necessity of AI integration for successful IoT forensics. An emphasis on critical factors for conducting thorough forensic investigations. | Future research can fucus on creating a forensic investigation framework for identifying evidence from current smart home equipment. Additionally, it can explore potential challenges and solutions associated with the integration of AI into IoT forensics. |
[41] | An exploration of the necessity for application-specific forensics alongside traditional methods. An examination of the top three IoT applications and the presentation of a model that integrates both conventional and application-specific forensic processes. | Future research can be conducted to study the diverse nature of devices within IoT systems and the absence of unified standards. |
[42] | A review of recent advancements to identify gaps and difficulties of the field’s research. Findings indicating that current digital forensic approaches are inappropriate for forensic analysis in IoT systems due to socio-technical difficulties. | Exploring challenges accompanying IoT Integration into society. Thus, issues related to IoT privacy issues, multiple jurisdictions, forensic analysis with big data techniques, and dealing with anti-forensic techniques can be important directions for future research. |
[45] | This article covers three key areas: data recovery and acquisition, file systems, and data analysis. It discusses the techniques used to capture digital evidence from the storage media, file systems, and memory of mobile devices. | Further research is required to develop intelligent and efficient tools that are scientifically validated to guide digital investigations in complex IoT environments. |
Ref. | Research Findings | Directions for Future Research |
---|---|---|
[6] | This study summarises previous and present theoretical frameworks that have been proposed to maintain the integrity of digital evidence using decentralised blockchain-based technologies. The study also discusses various interesting cross-cutting data reduction and forensic intelligence methodologies, as well as the current forensics-as-a-service (FaaS) model. | Future research can be conducted to study recent challenges arising in forthcoming forensic investigations that rely extensively on video evidence. Advance methodologies to address privacy concerns and integrate cross-disciplinary computational techniques, including AI predictive analytics, run-time verification, and adaptive data collection. |
[47] | IoT investigation frameworks and models integrating blockchain technology, aimed at ensuring the chain of custody for forensic evidence while upholding privacy, integrity, and preservation. Through an SLR encompassing primary papers up to late 2021, this research contributes to the existing body of knowledge. | Further research is required to ensure the establishment of a reliable blockchain-based IoT forensic investigation procedure, capable of thoroughly addressing potential challenges and obstacles. Future research could also incorporate an empirical assessment of the security measures implemented in blockchain-based IoT forensic investigation models, as well as other recent models. |
[48] | This survey presents an architectural classification of IoT security threats and issues, providing insights to comprehend and implement best practices for addressing security risks. Additionally, it evaluates security issues and proposes solutions within IoT contexts, presenting a taxonomy for security challenges based on the three-layer architecture. | This survey primarily reviews research conducted before 2019. However, given the growth of technology and the escalating threats, it is imperative to continue conducting this type of research to ensure that it remains current and up to date. |
Ref. | Research Findings | Directions for Future Research |
---|---|---|
[9] | A summary of IoT forensic research conducted from 2010 to 2018 and a brief history of the field’s development. A 3D framework-based sketch of the IoT forensic ecosystem. Outlining unresolved issues in the IoT forensic sector and offering relevant recommendations. | Future research can focus on identifying fundamental rules and directions through the execution of common forensic procedures in IoT forensics. |
[12] | The articles in this research included a wide range of subjects, such as event log security and recovery, event reconstruction and correlation, event anomalies, and visualisation. The authors provided a list of approaches that are already in use, a critical overview, and an analysis of each method’s benefits and drawbacks. Given that OS logs are frequently found when evidence is retrieved from a forensic disc image, this study explored techniques for conducting forensic analysis of OS logs. The article also discussed OS log-focused public datasets and forensic tools. | Future research may enhance the security of event logs by combining encryption, centralisation, and hardware-supported designs. It is also stated that event log forensics may be a direction for future studies. |
[49] | A thorough examination of EM side-channel attacks as a method to support digital forensic investigations on IoT devices. | EM side-channel methods are rarely utilised for digital forensics; therefore, more research to identify their tools and standards would be beneficial. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ahmed, A.A.; Farhan, K.; Jabbar, W.A.; Al-Othmani, A.; Abdulrahman, A.G. IoT Forensics: Current Perspectives and Future Directions. Sensors 2024, 24, 5210. https://doi.org/10.3390/s24165210
Ahmed AA, Farhan K, Jabbar WA, Al-Othmani A, Abdulrahman AG. IoT Forensics: Current Perspectives and Future Directions. Sensors. 2024; 24(16):5210. https://doi.org/10.3390/s24165210
Chicago/Turabian StyleAhmed, Abdulghani Ali, Khalid Farhan, Waheb A. Jabbar, Abdulaleem Al-Othmani, and Abdullahi Gara Abdulrahman. 2024. "IoT Forensics: Current Perspectives and Future Directions" Sensors 24, no. 16: 5210. https://doi.org/10.3390/s24165210
APA StyleAhmed, A. A., Farhan, K., Jabbar, W. A., Al-Othmani, A., & Abdulrahman, A. G. (2024). IoT Forensics: Current Perspectives and Future Directions. Sensors, 24(16), 5210. https://doi.org/10.3390/s24165210