Advertisement

Forensic Analysis on IoT Devices

  • A. R. JayakrishnanEmail author
  • V. Vasanthi
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 38)

Abstract

When the number of connected devices increases, the chances of getting hacked also increases. IoT is the interconnection of smart devices to usher automation in most of the areas. It has been identified that the study of attack patterns on IoT networks are limited, hence it becomes difficult to recognize a methodology yet. This paper demonstrates the experiments carried out to analyse the IoT attacks on Wi-Fi camera and SCA attack to get AES key. The aim of this paper is to show intrusion to the network as a hacker through the unprotected Things (IoT) connected to the network for performing illegal activities. These experiments would be an eye-opener to the investigators and also leads to study the attack patterns in the IoT devices and then to derive the methodology for forensics analysis.

Keywords

IoT attack Network forensics SCA Digital security Cyber forensics Wi-Fi camera intrusion 

References

  1. 1.
    Davidoff, S., Ham, J.: Network Forensics – Tracking Hackers Through Cyberspace. Prentice Hall (2012). ISBN-13 978-0-13-256471-7Google Scholar
  2. 2.
    Carpi, R.B.: Cheapsgate attacking IoT in less dollars. In: International Conference on Cyber Security, Data Privacy and Hacking, Cocon XI, October 2018Google Scholar
  3. 3.
    Khadshe, S.: New tools and trends in cyber forensics. In: The Proceedings of the International Conference by CSI Cyber FIF-C (2019) – Cyber Frauds, Investigations & Forensics Conference, January 2019Google Scholar
  4. 4.
    Djemaiel, Y.: Tracing, detecting and tolerating attacks in communication networks. In: Proceedings of Sup’Com Research Thesis CNAS, January 2018Google Scholar
  5. 5.
    Pfleeger, C.P., Pfleeger, S.L.: Security in Computing, 4th edn. (2013). ISBN 978-81-317-2725-6Google Scholar
  6. 6.
    Fadia, A.: Network Security, a Hackers’ Perspective, 2nd edn. (2009). ISBN 1403-93088-0Google Scholar
  7. 7.
    Stallings, W.: Cryptography and Network Security – Principles and Practice, 6th edn. (2014). ISBN 978-93-325-1877-3Google Scholar
  8. 8.
    IEEE 5G Summit Trivandrum: IoT & Cyber security (2017)Google Scholar
  9. 9.
    Anchit, B., Wazid, M., Pilli, E.S.: Forensics of random-UDP flooding attacks. J. Netw. 10, 287–293 (2015)Google Scholar
  10. 10.
    Cato Networks: Global industry report, top networking and security challenges in the enterprise, November 2016Google Scholar
  11. 11.
    Liu, C., Singhal, A., Wijesekera, D.: A logic based network forensics model for evidence analysis. In: IFIP International Conference on Digital Forensics (2015)Google Scholar
  12. 12.
    Pollitt, M.: A history of digital forensics. In: Chow, K.-P., Shenoi, S. (eds.) Advances in Digital Forensics VI, vol. 337, pp. 3–15. Springer, Berlin (2010)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.RCASBharathiar UniversityCoimbatoreIndia
  2. 2.Department of ITSKASCCoimbatoreIndia

Personalised recommendations