IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things

Nurul Huda Nik Zulkipli, Ahmed Alenezi, Gary B. Wills


The smart devices have been used in the most major domain like the healthcare, transportation, smart home, smart city and more. However, this technology has been exposed to many vulnerabilities, which may lead to cybercrime through the devices. With the IoT constraints and low-security mechanisms applied, the device could be easily been attacked, treated and exploited by cyber criminals where the smart devices could provide wrong data where it can lead to wrong interpretation and actuation to the legitimate users. To comply with the IoT characteristics, two approaches towards of having the investigation for IoT forensic is proposed by emphasizing the pre-investigation phase and implementing the real-time investigation to ensure the data and potential evidence is collected and preserved throughout the investigation.


  1. Abdmeziem, R. & Tandjaoui, D., 2014. Internet of Things: Concept, Building blocks, Applications and Challenges. Available at:
  2. Alharbi, S., Weber-Jahnke, J. & Traore, I., 2011. The proactive and reactive digital forensics investigation process: A systematic literature review. International Journal of Security and its Applications, 5(4), pp.59- 72.
  3. Atamli, A.W. & Martin, A., 2014. Threat-Based Security Analysis for the Internet of Things. 2014 International Workshop on Secure Internet of Things, pp.35-43. Available at: arnumber=7058906.
  4. Attwood, A. et al., 2011. SCCIR: Smart cities critical infrastructure response framework. In Proceedings - 4th International Conference on Developments in eSystems Engineering, DeSE 2011. pp. 460-464.
  5. Avižienis, A. et al., 2004. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1), pp.11-33.
  6. Baig, Z.A., 2014. Securing the internet of things infrastructure - standards and techniques. Proceedings of the 12th Australian Information Security Management Conference. Available at: &context=ism.
  7. Borgohain, T., Kumar, U. & Sanyal, S., 2015. Survey of Security and Privacy Issues of Internet of Things. arXiv preprint arXiv:1501.02211, p.7. Available at:
  8. Carrier, B. & Spafford, E., 2004. An event-based digital forensic investigation framework. Digital forensic research workshop, pp.1-12. Available at:
  9. Carrier, B. & Spafford, E.H., 2003. COMMONWEALTH OF AUSTRALIA Getting Physical with the Digital Investigation Process. International Journal of Digital Evidence Fall, 2(2), pp.1-20.
  10. Charlie Osborne, 2016. Insulin pump vulnerabilities could lead to overdose | ZDNet. Available at: [Accessed December 14, 2016].
  11. Cosic, J., Cosic, Z. & Baca, M., 2011. An ontological approach to study and manage digital chain of custody of digital evidence. Journal of Information and Organizational Sciences, 35(1), pp.1-13.
  12. De, S. et al., 2012. An internet of things platform for realworld and digital objects. Scalable Computing, 13(1), pp.45-57.
  13. Freiling, F.C. & Schwittay, B., 2007. A Common Process Model for Incident Response and Computer Forensics. Imf, 7(2007), pp.19-40. Available at: common-model.pdf.
  14. Garfinkel, S.L., 2010. Digital forensics research: The next 10 years. Digital Investigation, 7(SUPPL.).
  15. Giova, G., 2011. Improving Chain of Custody in Forensic Investigation of Electronic Digital Systems. International Journal of Computer Science and Network Security, 11(1), pp.1-9. Available at:
  16. Grobler, C.P., Louwrens, C.P. & Von Solms, S.H., 2010. A multi-component view of digital forensics. In ARES 2010 - 5th International Conference on Availability, Reliability, and Security. pp. 647-652.
  17. Hachem, S., Teixeira, T. & Issarny, V., 2011. Ontologies for the internet of things. Proceedings of the 8th Middleware Doctoral Symposium on - MDS 7811, (June 2009), pp.1-6. Available at: p://
  18. Huuck, R., 2015. IoT: The Internet of Threats and Static Program Analysis Defense. EmbeddedWorld 2015: Exibition & Conferences, p.493. Available at: 17.pdf.
  19. Islam, S.M.R. et al., 2015. The Internet of Things for Health Care?: A Comprehensive Survey. Access, IEEE, 3, pp.678-708. Available at: ber=7113786.
  20. Isovic, D. & Norström, C., 2002. Components in real-time systems. Proc. of the 8th International Conference on Real-Time Computing Systems and Applications, Tokyo, Japan, pp.1-12.
  21. Julian Rathke and Vladimiro Sassone, 2010. Cyber Security in the internet of things. Cryptology and Information Security Series, 4, pp.109-124.
  22. Kent, K. et al., 2006. Guide to integrating forensic techniques into incident response. NIST Special Publication, (August), pp.800-886.
  23. Martini, B. & Choo, K.K.R., 2012. An integrated conceptual digital forensic framework for cloud computing. Digital Investigation, 9(2), pp.71-80.
  24. Miorandi, D. et al., 2012. Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), pp.1497-1516.
  25. Oriwoh, E. et al., 2013. Internet of Things Forensics: Challenges and Approaches. Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.608-615. Available at: 4159.
  26. Oriwoh, E. & Sant, P., 2013. The forensics edge management system: A concept and design. In Proceedings - IEEE 10th International Conference on Ubiquitous Intelligence and Computing, UIC 2013 and IEEE 10th International Conference on Autonomic and Trusted Computing, ATC 2013. pp. 544-550.
  27. Palmer, G., 2001. A Road Map for Digital Forensic Research. Proceedings of the 2001 Digital Forensics Research Workshop (DFRWS 2004), pp.1-42. Available at:
  28. Pollitt, M., 1995. Computer forensics: An approach to evidence in cyberspace. In Proceedings of the National Information Systems Security Conference. pp. 487-491.
  29. Raghavan, S., 2013. Digital forensic research: current state of the art. CSI Transactions on ICT, 1(1), pp.91-114. Available at: 012-0008-7.
  30. Reith, M., Carr, C. & Gunsch, G., 2002. An Examination of Digital Forensic Models. International Journal of Digital Evidence, 1(3), pp.1-12. Available at: ions/articles/A04A40DC-A6F6-F2C1- 98F94F16AF57232D.pdf.
  31. Roman, R., Najera, P. & Lopez, J., 2011. Securing the Internet of Things (IoT). IEEE Computer, 44(9), pp.51- 58. Available at:
  32. Selamat, S.R., Yusof, R. & Sahib, S., 2008. Mapping Process of Digital Forensic Investigation Framework. Journal of Computer Science, 8(10), pp.163-169. Available at:
  33. Sperner, K., Meyer, S. & Magerkurth, C., 2011. Introducing entity-based concepts to business process modeling. Lecture Notes in Business Information Processing, 95 LNBIP, pp.166-171.
  34. Sun, H.M., Hsu, S.P. & Chen, C.M., 2007. Mobile Jamming attack and its countermeasure in wireless sensor networks. In Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07. pp. 457-462.
  35. Sun, X. & Wang, C., 2011. The research of security technology in the Internet of Things. Advances in Intelligent and Soft Computing, 105, pp.113-119.
  36. Sun, Y. et al., 2014. Toward Parametric Timed Interfaces for Real-Time Components. Electronic Proceedings in Theoretical Computer Science, 145, pp.49-64. Available at:
  37. Taylor, M. et al., 2010. Digital evidence in cloud computing systems. Computer Law & Security Review, 26(3), pp.304-308. Available at: 736491000049X%5Cn 9X%5Cn edu/science?_ob=MiamiImageURL&_cid=271884&_ user=442178.
  38. Vanansius Baryamureeba & Tushabe, F., 2004. Digital Forensic Research Workshop. In Digital Forensic Research Workshop DFRWS 2004.
  39. Vasseur, J.-P. & Dunkels, A., 2010. Interconnecting Smart Objects with IP, Available at: 0123751652000223.
  40. Walsh Ray, 2016. IoT Botnet Launching Massive DDoS Attacks on Websites - Available at: [Accessed December 14, 2016].
  41. Walton, G.H., Longstaff, T.A. & Linger, R.C., 2009. Computational Evaluation of Software Security Attributes. In System Sciences, 2009. HICSS 7809. 42nd Hawaii International Conference on. pp. 1-10.
  42. Xu, X., 2013. Study on security problems and key technologies of the internet of things. In Proceedings - 2013 International Conference on Computational and Information Sciences, ICCIS 2013. pp. 407-410.
  43. Zareen, M.S., Waqar, A. & Aslam, B., 2013. Digital forensics: Latest challenges and response. In Conference Proceedings - 2013 2nd National Conference on Information Assurance, NCIA 2013. pp. 21-29.
  44. Zawoad, S. & Hasan, R., 2015. FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things. In Proceedings - 2015 IEEE International Conference on Services Computing, SCC 2015. pp. 279-284.

Paper Citation

in Harvard Style

Nik Zulkipli N., Alenezi A. and B. Wills G. (2017). IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things . In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS, ISBN 978-989-758-245-5, pages 315-324. DOI: 10.5220/0006308703150324

in Bibtex Style

author={Nurul Huda Nik Zulkipli and Ahmed Alenezi and Gary B. Wills},
title={IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things},
booktitle={Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,},

in EndNote Style

JO - Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,
TI - IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things
SN - 978-989-758-245-5
AU - Nik Zulkipli N.
AU - Alenezi A.
AU - B. Wills G.
PY - 2017
SP - 315
EP - 324
DO - 10.5220/0006308703150324