Digital Forensics and Internet of Things
Реклама. ООО «ЛитРес», ИНН: 7719571260.
Оглавление
Группа авторов. Digital Forensics and Internet of Things
Table of Contents
List of Tables
List of Illustrations
Guide
Pages
Digital Forensics and Internet of Things. Impact and Challenges
Preface
1. Face Recognition–Based Surveillance System: A New Paradigm for Criminal Profiling
Abstract
1.1 Introduction
1.2 Image Processing
1.3 Deep Learning
1.3.1 Neural Network
1.3.2 Application of Neural Network in Face Recognition
1.4 Methodology. 1.4.1 Face Recognition
1.4.2 Open CV
1.4.3 Block Diagram
1.4.4 Essentials Needed
1.4.5 Website
1.4.6 Hardware
1.4.7 Procedure
1.5 Conclusion
References
2. Smart Healthcare Monitoring System: An IoT-Based Approach
Abstract
2.1 Introduction
2.2 Healthcare at Clinics
2.3 Remote Healthcare
2.4 Technological Framework
2.5 Standard UIs, Shows, and User Requirements
2.5.1 Advantages
2.5.2 Application
2.6 Cloud-Based Health Monitoring Using IoT
2.7 Information Acquisition
2.8 The Processing of Cloud
2.9 IoT-Based Health Monitoring Using Raspberry Pi
2.10 IoT-Based Health Monitoring Using RFID
2.10.1 Sensor Layer
2.10.2 Network Layer
2.10.3 Service Layer
2.11 Arduino and IoT-Based Health Monitoring System
2.12 IoT-Based Health Monitoring System Using ECG Signal
2.12.1 System Model
2.12.2 Framework
2.13 IoT-Based Health Monitoring System Using Android App
2.13.1 Transferring the Information to the Cloud
2.13.2 Application Controls
2.14 Conclusion and Future Perspectives
References
3. Design of Gesture-Based Hand Gloves Using Arduino UNO: A Grace to Abled Mankind
Abstract
3.1 Introduction
3.1.1 Block Diagram
3.1.2 The Proposed New Design
3.1.3 Circuit Diagram
3.2 Result and Discussion
3.2.1 Data Analysis
3.3 Conclusion
3.4 Future Scope
References
4. Playing With Genes: A Pragmatic Approach in Genetic Engineering
Abstract
4.1 Introduction
4.2 Literature Review
4.3 Methodology
4.3.1 Plasmid Method
4.3.2 The Vector Method
4.3.3 The Biolistic Method
4.4 Food and Agriculture
4.5 Impact on Farmers
4.6 Diseases: Gene Editing and Curing
4.7 Conclusion
4.8 Future Scope
References
5. Digital Investigative Model in IoT: Forensic View
Abstract
5.1 Introduction
5.1.1 Artificial Neural Network
5.2 Application of AI for Different Purposes in Forensic Science. 5.2.1 Artificial Intelligence for Drug Toxicity and Safety
5.2.2 Crime Scene Reconstruction
5.2.3 Sequence or Pattern Recognition
5.2.4 Repositories Building
5.2.5 Establishment of Connection Among the Investigating Team
5.2.6 Artificial Intelligence and Expert System in Mass Spectrometry
5.2.7 AI in GPS Navigation
5.3 Future of AI
5.4 Challenges While Implementing AI. 5.4.1 Unexplainability of AI
5.4.2 AI Anti-Forensics
5.4.3 Connection Interruption Between the Cyber Forensics and AI Communities
5.4.4 Data Analysis and Security
5.4.5 Creativity
5.5 Conclusion
References
6. Internet of Things Mobility Forensics
Abstract
6.1 Introduction
6.2 Smart Device and IoT
6.3 Relation of Internet of Things with Mobility Forensics
6.3.1 Cyber Attack on IoT Data
6.3.2 Data Recovery from IoT Devices
6.3.3 Scenario-Based Analysis of IoT Data as Evidence
6.4 Mobility Forensics IoT Investigation Model
6.5 Internet of Things Mobility Forensics: A Source of Information
6.6 Drawbacks in IoT Devices Data Extraction
6.7 Future Perspective of Internet of Things Mobility Forensics
6.8 Conclusion
References
7. A Generic Digital Scientific Examination System for Internet of Things
Abstract
7.1 Introduction
7.2 Internet of Things
7.3 IoT Architecture
7.4 Characteristics of IoT
7.5 IoT Security Challenges and Factors of Threat
7.5.1 Effects of IoT Security Breach
7.6 Role of Digital Forensics in Cybercrime Investigation for IoT
7.6.1 IoT in Digital Forensic
7.6.2 Digital Forensics Investigation Framework for IoT Devices
7.6.3 Road Map for Issues in IoT Forensics
7.7 IoT Security Steps
7.7.1 How to Access IoT Security
7.8 Conclusion
References
8. IoT Sensors: Security in Network Forensics
Abstract
8.1 Introduction
8.2 Cybersecurity Versus IoT Security and Cyber-Physical Systems
8.3 The IoT of the Future and the Need to Secure
8.3.1 The Future—Cognitive Systems and the IoT
8.4 Security Engineering for IoT Development
8.5 Building Security Into Design and Development
8.6 Security in Agile Developments
8.7 Focusing on the IoT Device in Operation
8.8 Cryptographic Fundamentals for IoT Security Engineering
8.8.1 Types and Uses of Cryptographic Primitives in the IoT
8.8.1.1 Encryption and Decryption
8.8.1.2 Symmetric Encryption
8.8.1.3 Asymmetric Encryption
8.8.1.4 Hashes
8.8.1.5 Digital Signatures
8.8.1.6 Symmetric (MACS)
8.8.1.7 Random Number Generation
8.8.1.8 Cipher Suites
8.9 Cloud Security for the IoT
8.9.1 Asset/Record Organization
8.9.2 Service Provisioning, Billing, and Entitlement Management
8.9.3 Real-Rime Monitoring
8.9.4 Sensor Coordination
8.9.5 Customer Intelligence and Marketing
8.9.6 Information Sharing
8.9.7 Message Transport/Broadcast
8.10 Conclusion
References
9. Xilinx FPGA and Xilinx IP Cores: A Boon to Curb Digital Crime
Abstract
9.1 Introduction
9.2 Literature Review
9.3 Proposed Work
9.4 Xilinx IP Core Square Root
9.5 RTL View of the 8-Bit Multiplier
9.5.1 Eight-Bit Multiplier Simulation Results Using IP Core
9.6 RTL View of 8-Bit Down Counter
9.6.1 Eight-Bit Down Counter Simulation Results
9.7 Up/Down Counter Simulation Results
9.8 Square Root Simulation Results
9.9 Hardware Device Utilization Reports of Binary Down Counter
9.10 Comparison of Proposed and Existing Work for Binary Up/Down Counter
9.10.1 Power Analysis of Binary Up/Down Counter
9.11 Conclusion
References
10. Human-Robot Interaction: An Artificial Cognition-Based Study for Criminal Investigations
Abstract
10.1 Introduction
10.1.1 Historical Background
10.2 Methodology. 10.2.1 Deliberative Architecture and Knowledge Model
10.2.1.1 Natural Mind
10.2.1.2 Prerequisites for Developing the Mind of the Social Robots
10.2.1.3 Robot Control Paradigms
10.2.1.3.1 The Hierarchical Paradigm
10.2.1.3.2 The Reactive Paradigm
10.2.1.3.3 The Hybrid Deliberate/Reactive Paradigm
10.3 Architecture Models for Robots
10.4 Cognitive Architecture
10.4.1 Taxonomy of Cognitive Architectures
10.4.1.1 Symbolic Architectures
10.4.1.2 The Emergent or the Connectionist Architecture
10.4.1.3 The Hybrid Architecture
10.4.2 Cognitive Skills. 10.4.2.1 Emotions
10.4.2.1.1 Artificial Emotions in Social Robots
10.4.2.1.2 Speech Emotion Recognition
10.4.2.1.3 Facial Expression
10.4.2.2 Dialogue for Socially Interactive Communication
10.4.2.2.1 Low-Level or Pre-Linguistic Dialogue
10.4.2.2.2 Non-Verbal Dialogue
10.4.2.2.2.1 KINESICS
10.4.2.2.2.2 PROXEMICS
10.4.2.2.2.3 HAPTIC
10.4.2.2.2.4 MULTIMODAL NON-VERBAL INTERACTION
10.4.2.2.3 Natural Language Processing
10.4.2.3 Memory in Social Robots
10.4.2.3.1 Sensory Memory in Robots
10.4.2.3.2 Working Memory in Robots
10.4.2.3.3 Long Term Memory in Robots
10.4.2.3.4 Global Memory in Robots
10.4.2.4 Learning
10.4.2.4.1 Perceptual Learning
10.4.2.4.2 Declarative Learning
10.4.2.4.3 Procedural Learning
10.4.2.5 Perception
10.4.2.5.1 Visual-Based Perception Means
10.4.2.5.2 Audio-Based Perception Means
10.5 Challenges in the Existing Social Robots and the Future Scopes. 10.5.1 Sensors Technology
10.5.2 Understanding and Learning from the Operator
10.5.3 Architectural Design
10.5.4 Testing Phase
10.5.5 Credible, Legitimate, and Social Aspects
10.5.6 Automation in Digital Forensics
10.6 Conclusion
10.7 Robots in Future Pandemics
References
11. VANET: An IoT Forensic-Based Model for Maintaining Chain of Custody
Abstract
11.1 Introduction
11.2 Cluster Performance Parameters
11.3 Routing Protocols in VANET
11.3.1 Performance Metrics
11.3.2 Proposed Cluster Head Selection Algorithm
11.4 Internet of Vehicles
11.5 IoT Forensic in Vehicular Ad Hoc Networks
11.6 Conclusion
References
12. Cognitive Radio Networks: A Merit for Teleforensics
Abstract
12.1 Introduction
12.1.1 Integration of WSN with Psychological Radio
12.1.2 Characteristics of Cognitive Radio
12.2 Contribution of Work
12.2.1 Push-to-Talk
12.2.2 Digital Forensic–Radio Communication Equipment
12.2.3 Energy Harvesting Network
12.2.4 Challenges with the Use of Clusters in Cognitive Radio Networks
12.3 Conclusion and Future Scope
Acknowledgement
References
13. Fingerprint Image Identification System: An Asset for Security of Bank Lockers
Abstract
13.1 Introduction
13.1.1 Design Analysis
13.2 Result and Discussion
13.3 Conclusion
13.4 Future Scope
References
14. IoT Forensics: Interconnection and Sensing Frameworks
Abstract
14.1 Introduction
14.2 The Need for IoT Forensics
14.3 Various Types of Evidences Encountered
14.4 Protocols and Frameworks in IoT Forensics
14.5 IoT Forensics Process Model
14.6 Suggestive Solutions
14.7 Conclusion
References
15. IoT Forensics: A Pernicious Repercussions
Abstract
15.1 Introduction: Challenges in IoT Forensics
15.2 Scope of the Compromise and Crime Scene Reconstruction
15.3 Device and Data Proliferation
15.4 Multiple Data Location and Jurisdiction Challenges
15.5 Device Type
15.6 Lack of Training and Weak Knowledge Management
15.7 Data Encryption
15.8 Heterogeneous Software and/or Hardware Specifications
15.9 Privacy and Ethical Considerations by Accessing Personal Data
15.10 Lack of a Common Forensic Model in IoT Devices
15.11 Securing the Chain of Custody
15.12 Lifespan Limitation
15.13 The Cloud Forensic Problem
15.14 The Minimum or Maximum Period in Which Data is Stored in the Cloud
15.15 Evidence Analysis and Correlation
15.16 Conclusion
References
About the Editors
Index
WILEY END USER LICENSE AGREEMENT
Отрывок из книги
Scrivener Publishing
.....
Figure 1.9 Image of registration.
Figure 1.10 LCD displaying door lock system.
.....