Читать книгу Digital Forensics and Internet of Things - Группа авторов - Страница 2
Table of Contents
Оглавление1 Cover
4 Preface
5 1 Face Recognition–Based Surveillance System: A New Paradigm for Criminal Profiling 1.1 Introduction 1.2 Image Processing 1.3 Deep Learning 1.4 Methodology 1.5 Conclusion References
6 2 Smart Healthcare Monitoring System: An IoT-Based Approach 2.1 Introduction 2.2 Healthcare at Clinics 2.3 Remote Healthcare 2.4 Technological Framework 2.5 Standard UIs, Shows, and User Requirements 2.6 Cloud-Based Health Monitoring Using IoT 2.7 Information Acquisition 2.8 The Processing of Cloud 2.9 IoT-Based Health Monitoring Using Raspberry Pi 2.10 IoT-Based Health Monitoring Using RFID 2.11 Arduino and IoT-Based Health Monitoring System 2.12 IoT-Based Health Monitoring System Using ECG Signal 2.13 IoT-Based Health Monitoring System Using Android App 2.14 Conclusion and Future Perspectives References
7 3 Design of Gesture-Based Hand Gloves Using Arduino UNO: A Grace to Abled Mankind 3.1 Introduction 3.2 Result and Discussion 3.3 Conclusion 3.4 Future Scope References
8 4 Playing With Genes: A Pragmatic Approach in Genetic Engineering 4.1 Introduction 4.2 Literature Review 4.3 Methodology 4.4 Food and Agriculture 4.5 Impact on Farmers 4.6 Diseases: Gene Editing and Curing 4.7 Conclusion 4.8 Future Scope References
9 5 Digital Investigative Model in IoT: Forensic View 5.1 Introduction 5.2 Application of AI for Different Purposes in Forensic Science 5.3 Future of AI 5.4 Challenges While Implementing AI 5.5 Conclusion References
10 6 Internet of Things Mobility Forensics 6.1 Introduction 6.2 Smart Device and IoT 6.3 Relation of Internet of Things with Mobility Forensics 6.4 Mobility Forensics IoT Investigation Model 6.5 Internet of Things Mobility Forensics: A Source of Information 6.6 Drawbacks in IoT Devices Data Extraction 6.7 Future Perspective of Internet of Things Mobility Forensics 6.8 Conclusion References
11 7 A Generic Digital Scientific Examination System for Internet of Things 7.1 Introduction 7.2 Internet of Things 7.3 IoT Architecture 7.4 Characteristics of IoT 7.5 IoT Security Challenges and Factors of Threat 7.6 Role of Digital Forensics in Cybercrime Investigation for IoT 7.7 IoT Security Steps 7.8 Conclusion References
12 8 IoT Sensors: Security in Network Forensics 8.1 Introduction 8.2 Cybersecurity Versus IoT Security and Cyber-Physical Systems 8.3 The IoT of the Future and the Need to Secure 8.4 Security Engineering for IoT Development 8.5 Building Security Into Design and Development 8.6 Security in Agile Developments 8.7 Focusing on the IoT Device in Operation 8.8 Cryptographic Fundamentals for IoT Security Engineering 8.9 Cloud Security for the IoT 8.10 Conclusion References
13 9 Xilinx FPGA and Xilinx IP Cores: A Boon to Curb Digital Crime 9.1 Introduction 9.2 Literature Review 9.3 Proposed Work 9.4 Xilinx IP Core Square Root 9.5 RTL View of the 8-Bit Multiplier 9.6 RTL View of 8-Bit Down Counter 9.7 Up/Down Counter Simulation Results 9.8 Square Root Simulation Results 9.9 Hardware Device Utilization Reports of Binary Down Counter 9.10 Comparison of Proposed and Existing Work for Binary Up/Down Counter 9.11 Conclusion References
14 10 Human-Robot Interaction: An Artificial Cognition-Based Study for Criminal Investigations 10.1 Introduction 10.2 Methodology 10.3 Architecture Models for Robots 10.4 Cognitive Architecture 10.5 Challenges in the Existing Social Robots and the Future Scopes 10.6 Conclusion 10.7 Robots in Future Pandemics References
15 11 VANET: An IoT Forensic-Based Model for Maintaining Chain of Custody 11.1 Introduction 11.2 Cluster Performance Parameters 11.3 Routing Protocols in VANET 11.4 Internet of Vehicles 11.5 IoT Forensic in Vehicular Ad Hoc Networks 11.6 Conclusion References
16 12 Cognitive Radio Networks: A Merit for Teleforensics 12.1 Introduction 12.2 Contribution of Work 12.3 Conclusion and Future Scope Acknowledgement References
17 13 Fingerprint Image Identification System: An Asset for Security of Bank Lockers 13.1 Introduction 13.2 Result and Discussion 13.3 Conclusion 13.4 Future Scope References
18 14 IoT Forensics: Interconnection and Sensing Frameworks 14.1 Introduction 14.2 The Need for IoT Forensics 14.3 Various Types of Evidences Encountered 14.4 Protocols and Frameworks in IoT Forensics 14.5 IoT Forensics Process Model 14.6 Suggestive Solutions 14.7 Conclusion References
19 15 IoT Forensics: A Pernicious Repercussions 15.1 Introduction: Challenges in IoT Forensics 15.2 Scope of the Compromise and Crime Scene Reconstruction 15.3 Device and Data Proliferation 15.4 Multiple Data Location and Jurisdiction Challenges 15.5 Device Type 15.6 Lack of Training and Weak Knowledge Management 15.7 Data Encryption 15.8 Heterogeneous Software and/or Hardware Specifications 15.9 Privacy and Ethical Considerations by Accessing Personal Data 15.10 Lack of a Common Forensic Model in IoT Devices 15.11 Securing the Chain of Custody 15.12 Lifespan Limitation 15.13 The Cloud Forensic Problem 15.14 The Minimum or Maximum Period in Which Data is Stored in the Cloud 15.15 Evidence Analysis and Correlation 15.16 Conclusion References
21 Index