Skip to main content

Analysis of Mobile Environment for Ensuring Cyber-Security in IoT-Based Digital Forensics

  • Conference paper
  • First Online:
Soft Computing and Signal Processing

Abstract

The Internet of things (IoT) is the collection of smart objects, which it collects the natural phenomena from environment, senses the data and transmits them using machine to machine (M2M) communication. In most of the existing system, providing efficient security in IoT mobile environment is a major concern. The attackers can easily exploit the vulnerability, eavesdrop and masquerade the sensitive information in the network. Because of this, there is a need to provide efficient security analysis in IoT environment. In this work, the enhanced security mechanism is proposed which uses efficient digital forensics tools to identify the threats and we demonstrated how to reconstruct the past events with forensics tools in order to provide digital evidence for legal proceedings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. V.R. Kebande, N.M. Karie, H.S. Venter, Cloud-centric framework for isolating big data as forensic evidence from IoT infrastructures, IEEE (2017)

    Google Scholar 

  2. S. Lee, B. Kang, K. Choa, D. Kanga, K. Jang, L. Park, S. Park, Design and Implementation for data protection of energy IoT utilizing OTP in the wireless mesh network, in 4th International Conference on Power and Energy System Engineering CPESE 2017, vol. 141, pp. 540–544 (Berlin, Germany, 25–29 Sep 2017), Energy Procedia

    Article  Google Scholar 

  3. S. Bhattacharyaa, D. Wainwrighta, J. Whalley, Internet of Things (IoT) enabled assistive care services: Designing for value and trust, in International Workshop on Universal Design for IoT Smart Health (UDISH 2017), Procedia Comput. Sci. 113, 659–664 (2017)

    Article  Google Scholar 

  4. S. Sahmim, H. Gharsellaoui, Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a review, in International Conference on Knowledge Based and Intelligent Information and Engineering Systems, KES2017, 6–8 September 2017, Marseille, France, Procedia Comput. Sci. 112, 1516–1522 (2017)

    Article  Google Scholar 

  5. R. Rajendren, S.V.N. Santhoh Kumar, Y. Palanichimy, K. Arputharaj, Dectection of DoS attacks in cloud networks using intelligent rule base classification system. Cluster Comput. pp. 1–12

    Google Scholar 

  6. Y.N. Malek, A. Kharbouch, H. El Khoukhi, M. Bakhouya, V. De Florio, D. El Ouadghiri, S. Latre, C. Blondia, On the use of IoT and big data technologies for real-time monitoring and data processing, in The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Health Care (ICTH 2017), Procedia Comput. Sci. 113, 429–434 (2017)

    Article  Google Scholar 

  7. S. Darwisha, I. Nouretdinova, S.D. Wolthusen, Towards composable threat assessment for medical IoT (MIoT), in The fourth International Workshop on Privacy and Security in HealthCare (2017), Procedia Comput. Sci. 113, 627–632 (2017)

    Article  Google Scholar 

  8. P. Ravi Kumar, P. Herbert Raj, P. Jelciana, Exploring data security issues and solutions in cloud computing, in 6th International Conference on Smart Computing and Communications, ICSCC 2017, 7–8 December 2017, Kurukshetra, India, Procedia Comput. Sci. 125, 691–697 (2018)

    Article  Google Scholar 

  9. S. Luthra, D. Garg, S.K. Mangla, Y.P.S. Berwal, Analyzing Challenging to IOT adoption and diffusion: An Indian Context, in 6th International Conference on Smart Computing and Communications, ICSCC 2017, 7–8 December 2017, Kurukshetra, India, Procedia Comput. Sci. 125, 733–739 (2018)

    Google Scholar 

  10. S. Tedeschia, J. Mehnena, N. Tapogloua, R. Roy, Secure IoT devices for the maintenance of machine tools, in The Fifth International Through-life Engineering Services Conference, Procedia CIRP 59, 150–155 (2017)

    Article  Google Scholar 

  11. T. Pereira, L. Berreto, A. Amaral, Network and information security challenges within Industry 4.0, in Paradigm Manufacturing Engineering Society International Conference 2017, MESIC 2017, 28–30 June 2017, Vigo (Pontevedra), Spain, Procedia Manufacturing 13, 1253–1260 (2017)

    Article  Google Scholar 

  12. A.R. Sfar, E. Natalizio, Y. Challal, Z. Chtourou, A.R. Sfar, E. Natalizio, Y. Challal, Z. Chtourou, A roadmap for security challenges in the Internet of Things

    Google Scholar 

  13. Q.P. He, J. Wang, D. Shan. N. Vahdat, Statistical process monitoring for IoT-Enabled cybermanufacturing: opportunities and challenges. Science direct, IFAC, pp. 14946–14951 (2017)

    Article  Google Scholar 

  14. K. Mekki, E. Bajic, F. Chaxel, F. Meyer, A comparative study of LPWAN technologies for large-scale IoT deployment

    Google Scholar 

  15. T. Zia, P. Liu, W. Han, Application-specific digital forensics investigative model in internet of things (IoT)

    Google Scholar 

  16. J. Wang, Z. Hong, Y. Zhang, Y. Jin, Enabling security-enhanced attestation with intel SGX for remote terminal and IOT. IEEE Trans. Comput.-Aided Des Integr. Circ. Syst. 37(1), 88–96 (2018)

    Article  Google Scholar 

  17. S.V.N. Santhosh Kumar, Y. Palanichimy, Energy efficient and secured distributed data dissemination using hop byauthienticationin WSN. Wireless Networks 24(4), 1346–1360

    Google Scholar 

  18. G.M. Jones, S.G. Winster, Forensics analysis on smart phones using mobile forensics tools. Int. J. Comput. Intell. Res. ISSN 0973–1873 13(8), 1859–1869 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Maria Jones .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maria Jones, G., Godfrey Winster, S., Santhosh Kumar, S.V.N. (2019). Analysis of Mobile Environment for Ensuring Cyber-Security in IoT-Based Digital Forensics. In: Wang, J., Reddy, G., Prasad, V., Reddy, V. (eds) Soft Computing and Signal Processing . Advances in Intelligent Systems and Computing, vol 900. Springer, Singapore. https://doi.org/10.1007/978-981-13-3600-3_14

Download citation

Publish with us

Policies and ethics