Abstract
The Internet of things (IoT) is the collection of smart objects, which it collects the natural phenomena from environment, senses the data and transmits them using machine to machine (M2M) communication. In most of the existing system, providing efficient security in IoT mobile environment is a major concern. The attackers can easily exploit the vulnerability, eavesdrop and masquerade the sensitive information in the network. Because of this, there is a need to provide efficient security analysis in IoT environment. In this work, the enhanced security mechanism is proposed which uses efficient digital forensics tools to identify the threats and we demonstrated how to reconstruct the past events with forensics tools in order to provide digital evidence for legal proceedings.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
V.R. Kebande, N.M. Karie, H.S. Venter, Cloud-centric framework for isolating big data as forensic evidence from IoT infrastructures, IEEE (2017)
S. Lee, B. Kang, K. Choa, D. Kanga, K. Jang, L. Park, S. Park, Design and Implementation for data protection of energy IoT utilizing OTP in the wireless mesh network, in 4th International Conference on Power and Energy System Engineering CPESE 2017, vol. 141, pp. 540–544 (Berlin, Germany, 25–29 Sep 2017), Energy Procedia
S. Bhattacharyaa, D. Wainwrighta, J. Whalley, Internet of Things (IoT) enabled assistive care services: Designing for value and trust, in International Workshop on Universal Design for IoT Smart Health (UDISH 2017), Procedia Comput. Sci. 113, 659–664 (2017)
S. Sahmim, H. Gharsellaoui, Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a review, in International Conference on Knowledge Based and Intelligent Information and Engineering Systems, KES2017, 6–8 September 2017, Marseille, France, Procedia Comput. Sci. 112, 1516–1522 (2017)
R. Rajendren, S.V.N. Santhoh Kumar, Y. Palanichimy, K. Arputharaj, Dectection of DoS attacks in cloud networks using intelligent rule base classification system. Cluster Comput. pp. 1–12
Y.N. Malek, A. Kharbouch, H. El Khoukhi, M. Bakhouya, V. De Florio, D. El Ouadghiri, S. Latre, C. Blondia, On the use of IoT and big data technologies for real-time monitoring and data processing, in The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Health Care (ICTH 2017), Procedia Comput. Sci. 113, 429–434 (2017)
S. Darwisha, I. Nouretdinova, S.D. Wolthusen, Towards composable threat assessment for medical IoT (MIoT), in The fourth International Workshop on Privacy and Security in HealthCare (2017), Procedia Comput. Sci. 113, 627–632 (2017)
P. Ravi Kumar, P. Herbert Raj, P. Jelciana, Exploring data security issues and solutions in cloud computing, in 6th International Conference on Smart Computing and Communications, ICSCC 2017, 7–8 December 2017, Kurukshetra, India, Procedia Comput. Sci. 125, 691–697 (2018)
S. Luthra, D. Garg, S.K. Mangla, Y.P.S. Berwal, Analyzing Challenging to IOT adoption and diffusion: An Indian Context, in 6th International Conference on Smart Computing and Communications, ICSCC 2017, 7–8 December 2017, Kurukshetra, India, Procedia Comput. Sci. 125, 733–739 (2018)
S. Tedeschia, J. Mehnena, N. Tapogloua, R. Roy, Secure IoT devices for the maintenance of machine tools, in The Fifth International Through-life Engineering Services Conference, Procedia CIRP 59, 150–155 (2017)
T. Pereira, L. Berreto, A. Amaral, Network and information security challenges within Industry 4.0, in Paradigm Manufacturing Engineering Society International Conference 2017, MESIC 2017, 28–30 June 2017, Vigo (Pontevedra), Spain, Procedia Manufacturing 13, 1253–1260 (2017)
A.R. Sfar, E. Natalizio, Y. Challal, Z. Chtourou, A.R. Sfar, E. Natalizio, Y. Challal, Z. Chtourou, A roadmap for security challenges in the Internet of Things
Q.P. He, J. Wang, D. Shan. N. Vahdat, Statistical process monitoring for IoT-Enabled cybermanufacturing: opportunities and challenges. Science direct, IFAC, pp. 14946–14951 (2017)
K. Mekki, E. Bajic, F. Chaxel, F. Meyer, A comparative study of LPWAN technologies for large-scale IoT deployment
T. Zia, P. Liu, W. Han, Application-specific digital forensics investigative model in internet of things (IoT)
J. Wang, Z. Hong, Y. Zhang, Y. Jin, Enabling security-enhanced attestation with intel SGX for remote terminal and IOT. IEEE Trans. Comput.-Aided Des Integr. Circ. Syst. 37(1), 88–96 (2018)
S.V.N. Santhosh Kumar, Y. Palanichimy, Energy efficient and secured distributed data dissemination using hop byauthienticationin WSN. Wireless Networks 24(4), 1346–1360
G.M. Jones, S.G. Winster, Forensics analysis on smart phones using mobile forensics tools. Int. J. Comput. Intell. Res. ISSN 0973–1873 13(8), 1859–1869 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Maria Jones, G., Godfrey Winster, S., Santhosh Kumar, S.V.N. (2019). Analysis of Mobile Environment for Ensuring Cyber-Security in IoT-Based Digital Forensics. In: Wang, J., Reddy, G., Prasad, V., Reddy, V. (eds) Soft Computing and Signal Processing . Advances in Intelligent Systems and Computing, vol 900. Springer, Singapore. https://doi.org/10.1007/978-981-13-3600-3_14
Download citation
DOI: https://doi.org/10.1007/978-981-13-3600-3_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3599-0
Online ISBN: 978-981-13-3600-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)