Digital Forensics and Internet of Things

Digital Forensics and Internet of Things
Автор книги: id книги: 2292837     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 27086 руб.     (292,8$) Читать книгу Купить и скачать книгу Электронная книга Жанр: Программы Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119769033 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

DIGITAL FORENSICS AND INTERNET OF THINGS It pays to be ahead of the criminal, and this book helps organizations and people to create a path to achieve this goal. The book discusses applications and challenges professionals encounter in the burgeoning field of IoT forensics. IoT forensics attempts to align its workflow to that of any forensics practice—investigators identify, interpret, preserve, analyze and present any relevant data. As with any investigation, a timeline is constructed, and, with the aid of smart devices providing data, investigators might be able to capture much more specific data points than in a traditional crime. However, collecting this data can often be a challenge, as it frequently doesn’t live on the device itself, but rather in the provider’s cloud platform. If you can get the data off the device, you’ll have to employ one of a variety of methods given the diverse nature of IoT devices hardware, software, and firmware. So, while robust and insightful data is available, acquiring it is no small undertaking. Digital Forensics and Internet of Things encompasses: State-of-the-art research and standards concerning IoT forensics and traditional digital forensics Compares and contrasts IoT forensic techniques with those of traditional digital forensics standards Identifies the driving factors of the slow maturation of IoT forensic standards and possible solutions Applies recommended standards gathered from IoT forensic literature in hands-on experiments to test their effectiveness across multiple IoT devices Provides educated recommendations on developing and establishing IoT forensic standards, research, and areas that merit further study. Audience Researchers and scientists in forensic sciences, computer sciences, electronics engineering, embedded systems, information technology.

Оглавление

Группа авторов. Digital Forensics and Internet of Things

Table of Contents

List of Tables

List of Illustrations

Guide

Pages

Digital Forensics and Internet of Things. Impact and Challenges

Preface

1. Face Recognition–Based Surveillance System: A New Paradigm for Criminal Profiling

Abstract

1.1 Introduction

1.2 Image Processing

1.3 Deep Learning

1.3.1 Neural Network

1.3.2 Application of Neural Network in Face Recognition

1.4 Methodology. 1.4.1 Face Recognition

1.4.2 Open CV

1.4.3 Block Diagram

1.4.4 Essentials Needed

1.4.5 Website

1.4.6 Hardware

1.4.7 Procedure

1.5 Conclusion

References

2. Smart Healthcare Monitoring System: An IoT-Based Approach

Abstract

2.1 Introduction

2.2 Healthcare at Clinics

2.3 Remote Healthcare

2.4 Technological Framework

2.5 Standard UIs, Shows, and User Requirements

2.5.1 Advantages

2.5.2 Application

2.6 Cloud-Based Health Monitoring Using IoT

2.7 Information Acquisition

2.8 The Processing of Cloud

2.9 IoT-Based Health Monitoring Using Raspberry Pi

2.10 IoT-Based Health Monitoring Using RFID

2.10.1 Sensor Layer

2.10.2 Network Layer

2.10.3 Service Layer

2.11 Arduino and IoT-Based Health Monitoring System

2.12 IoT-Based Health Monitoring System Using ECG Signal

2.12.1 System Model

2.12.2 Framework

2.13 IoT-Based Health Monitoring System Using Android App

2.13.1 Transferring the Information to the Cloud

2.13.2 Application Controls

2.14 Conclusion and Future Perspectives

References

3. Design of Gesture-Based Hand Gloves Using Arduino UNO: A Grace to Abled Mankind

Abstract

3.1 Introduction

3.1.1 Block Diagram

3.1.2 The Proposed New Design

3.1.3 Circuit Diagram

3.2 Result and Discussion

3.2.1 Data Analysis

3.3 Conclusion

3.4 Future Scope

References

4. Playing With Genes: A Pragmatic Approach in Genetic Engineering

Abstract

4.1 Introduction

4.2 Literature Review

4.3 Methodology

4.3.1 Plasmid Method

4.3.2 The Vector Method

4.3.3 The Biolistic Method

4.4 Food and Agriculture

4.5 Impact on Farmers

4.6 Diseases: Gene Editing and Curing

4.7 Conclusion

4.8 Future Scope

References

5. Digital Investigative Model in IoT: Forensic View

Abstract

5.1 Introduction

5.1.1 Artificial Neural Network

5.2 Application of AI for Different Purposes in Forensic Science. 5.2.1 Artificial Intelligence for Drug Toxicity and Safety

5.2.2 Crime Scene Reconstruction

5.2.3 Sequence or Pattern Recognition

5.2.4 Repositories Building

5.2.5 Establishment of Connection Among the Investigating Team

5.2.6 Artificial Intelligence and Expert System in Mass Spectrometry

5.2.7 AI in GPS Navigation

5.3 Future of AI

5.4 Challenges While Implementing AI. 5.4.1 Unexplainability of AI

5.4.2 AI Anti-Forensics

5.4.3 Connection Interruption Between the Cyber Forensics and AI Communities

5.4.4 Data Analysis and Security

5.4.5 Creativity

5.5 Conclusion

References

6. Internet of Things Mobility Forensics

Abstract

6.1 Introduction

6.2 Smart Device and IoT

6.3 Relation of Internet of Things with Mobility Forensics

6.3.1 Cyber Attack on IoT Data

6.3.2 Data Recovery from IoT Devices

6.3.3 Scenario-Based Analysis of IoT Data as Evidence

6.4 Mobility Forensics IoT Investigation Model

6.5 Internet of Things Mobility Forensics: A Source of Information

6.6 Drawbacks in IoT Devices Data Extraction

6.7 Future Perspective of Internet of Things Mobility Forensics

6.8 Conclusion

References

7. A Generic Digital Scientific Examination System for Internet of Things

Abstract

7.1 Introduction

7.2 Internet of Things

7.3 IoT Architecture

7.4 Characteristics of IoT

7.5 IoT Security Challenges and Factors of Threat

7.5.1 Effects of IoT Security Breach

7.6 Role of Digital Forensics in Cybercrime Investigation for IoT

7.6.1 IoT in Digital Forensic

7.6.2 Digital Forensics Investigation Framework for IoT Devices

7.6.3 Road Map for Issues in IoT Forensics

7.7 IoT Security Steps

7.7.1 How to Access IoT Security

7.8 Conclusion

References

8. IoT Sensors: Security in Network Forensics

Abstract

8.1 Introduction

8.2 Cybersecurity Versus IoT Security and Cyber-Physical Systems

8.3 The IoT of the Future and the Need to Secure

8.3.1 The Future—Cognitive Systems and the IoT

8.4 Security Engineering for IoT Development

8.5 Building Security Into Design and Development

8.6 Security in Agile Developments

8.7 Focusing on the IoT Device in Operation

8.8 Cryptographic Fundamentals for IoT Security Engineering

8.8.1 Types and Uses of Cryptographic Primitives in the IoT

8.8.1.1 Encryption and Decryption

8.8.1.2 Symmetric Encryption

8.8.1.3 Asymmetric Encryption

8.8.1.4 Hashes

8.8.1.5 Digital Signatures

8.8.1.6 Symmetric (MACS)

8.8.1.7 Random Number Generation

8.8.1.8 Cipher Suites

8.9 Cloud Security for the IoT

8.9.1 Asset/Record Organization

8.9.2 Service Provisioning, Billing, and Entitlement Management

8.9.3 Real-Rime Monitoring

8.9.4 Sensor Coordination

8.9.5 Customer Intelligence and Marketing

8.9.6 Information Sharing

8.9.7 Message Transport/Broadcast

8.10 Conclusion

References

9. Xilinx FPGA and Xilinx IP Cores: A Boon to Curb Digital Crime

Abstract

9.1 Introduction

9.2 Literature Review

9.3 Proposed Work

9.4 Xilinx IP Core Square Root

9.5 RTL View of the 8-Bit Multiplier

9.5.1 Eight-Bit Multiplier Simulation Results Using IP Core

9.6 RTL View of 8-Bit Down Counter

9.6.1 Eight-Bit Down Counter Simulation Results

9.7 Up/Down Counter Simulation Results

9.8 Square Root Simulation Results

9.9 Hardware Device Utilization Reports of Binary Down Counter

9.10 Comparison of Proposed and Existing Work for Binary Up/Down Counter

9.10.1 Power Analysis of Binary Up/Down Counter

9.11 Conclusion

References

10. Human-Robot Interaction: An Artificial Cognition-Based Study for Criminal Investigations

Abstract

10.1 Introduction

10.1.1 Historical Background

10.2 Methodology. 10.2.1 Deliberative Architecture and Knowledge Model

10.2.1.1 Natural Mind

10.2.1.2 Prerequisites for Developing the Mind of the Social Robots

10.2.1.3 Robot Control Paradigms

10.2.1.3.1 The Hierarchical Paradigm

10.2.1.3.2 The Reactive Paradigm

10.2.1.3.3 The Hybrid Deliberate/Reactive Paradigm

10.3 Architecture Models for Robots

10.4 Cognitive Architecture

10.4.1 Taxonomy of Cognitive Architectures

10.4.1.1 Symbolic Architectures

10.4.1.2 The Emergent or the Connectionist Architecture

10.4.1.3 The Hybrid Architecture

10.4.2 Cognitive Skills. 10.4.2.1 Emotions

10.4.2.1.1 Artificial Emotions in Social Robots

10.4.2.1.2 Speech Emotion Recognition

10.4.2.1.3 Facial Expression

10.4.2.2 Dialogue for Socially Interactive Communication

10.4.2.2.1 Low-Level or Pre-Linguistic Dialogue

10.4.2.2.2 Non-Verbal Dialogue

10.4.2.2.2.1 KINESICS

10.4.2.2.2.2 PROXEMICS

10.4.2.2.2.3 HAPTIC

10.4.2.2.2.4 MULTIMODAL NON-VERBAL INTERACTION

10.4.2.2.3 Natural Language Processing

10.4.2.3 Memory in Social Robots

10.4.2.3.1 Sensory Memory in Robots

10.4.2.3.2 Working Memory in Robots

10.4.2.3.3 Long Term Memory in Robots

10.4.2.3.4 Global Memory in Robots

10.4.2.4 Learning

10.4.2.4.1 Perceptual Learning

10.4.2.4.2 Declarative Learning

10.4.2.4.3 Procedural Learning

10.4.2.5 Perception

10.4.2.5.1 Visual-Based Perception Means

10.4.2.5.2 Audio-Based Perception Means

10.5 Challenges in the Existing Social Robots and the Future Scopes. 10.5.1 Sensors Technology

10.5.2 Understanding and Learning from the Operator

10.5.3 Architectural Design

10.5.4 Testing Phase

10.5.5 Credible, Legitimate, and Social Aspects

10.5.6 Automation in Digital Forensics

10.6 Conclusion

10.7 Robots in Future Pandemics

References

11. VANET: An IoT Forensic-Based Model for Maintaining Chain of Custody

Abstract

11.1 Introduction

11.2 Cluster Performance Parameters

11.3 Routing Protocols in VANET

11.3.1 Performance Metrics

11.3.2 Proposed Cluster Head Selection Algorithm

11.4 Internet of Vehicles

11.5 IoT Forensic in Vehicular Ad Hoc Networks

11.6 Conclusion

References

12. Cognitive Radio Networks: A Merit for Teleforensics

Abstract

12.1 Introduction

12.1.1 Integration of WSN with Psychological Radio

12.1.2 Characteristics of Cognitive Radio

12.2 Contribution of Work

12.2.1 Push-to-Talk

12.2.2 Digital Forensic–Radio Communication Equipment

12.2.3 Energy Harvesting Network

12.2.4 Challenges with the Use of Clusters in Cognitive Radio Networks

12.3 Conclusion and Future Scope

Acknowledgement

References

13. Fingerprint Image Identification System: An Asset for Security of Bank Lockers

Abstract

13.1 Introduction

13.1.1 Design Analysis

13.2 Result and Discussion

13.3 Conclusion

13.4 Future Scope

References

14. IoT Forensics: Interconnection and Sensing Frameworks

Abstract

14.1 Introduction

14.2 The Need for IoT Forensics

14.3 Various Types of Evidences Encountered

14.4 Protocols and Frameworks in IoT Forensics

14.5 IoT Forensics Process Model

14.6 Suggestive Solutions

14.7 Conclusion

References

15. IoT Forensics: A Pernicious Repercussions

Abstract

15.1 Introduction: Challenges in IoT Forensics

15.2 Scope of the Compromise and Crime Scene Reconstruction

15.3 Device and Data Proliferation

15.4 Multiple Data Location and Jurisdiction Challenges

15.5 Device Type

15.6 Lack of Training and Weak Knowledge Management

15.7 Data Encryption

15.8 Heterogeneous Software and/or Hardware Specifications

15.9 Privacy and Ethical Considerations by Accessing Personal Data

15.10 Lack of a Common Forensic Model in IoT Devices

15.11 Securing the Chain of Custody

15.12 Lifespan Limitation

15.13 The Cloud Forensic Problem

15.14 The Minimum or Maximum Period in Which Data is Stored in the Cloud

15.15 Evidence Analysis and Correlation

15.16 Conclusion

References

About the Editors

Index

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Scrivener Publishing

.....

Figure 1.9 Image of registration.

Figure 1.10 LCD displaying door lock system.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Digital Forensics and Internet of Things
Подняться наверх