The readily for the customer now. Form google

The internet of things (IoT) is an internet-workingof several identifiable computer network physical device, Radio Frequency Identification(RFID) or could computing applications to the existing internet networkinfrastructure.

In recently, the internet of thingsdevice and services market is growing very fast, it have large economic and societalimpact of future world. In every corner of the people’s life: the home, office,cars even the street of the city we can find many IoT device and service . Ithelp us to control over door lock, lights and appliances; the process of thebusiness life; connect with people and develop our daily live. The followingdiagram showing full content of IoT service area.   As we can see there are many of theinternet of things devices and service areas, but in the current market the followingareas are more popular and it is on the top three of the market. Smart home: the IoT device relateto the smart home application is the most popular devices in the market atmoment and it is most readily for the customer now. Form google to Amazon there are hundredsof products available in the market now.

 Internet of things           smart home device example:Goolge home – Smart speaker: googlehome is power by the google assistant. The owner can ask it questions likeweather, traffic, sports, finance or tell it do things like translation,calculation or search information for you. With google you also can manage yourtask and control TV and lights at home.

 Amazon Echo -smart home: AmazonEcho is a voice control device, user can talk to the device to play music,sports and weather or even order an Uber. Amazon Echo also have smart alarmclock to help user keep the phone out of the bedroom but still maintain usefulthings like email, web browser.1.      Wearables:wearable technology is one of the greatest applications of internet of things.IoT wearable device can help user keep track their health and exercise progressin previously impossible ways. The most popular wearable device is Apple watchand Fitbit oneApple watch- display the photo ofIPhone device or Mac without it’s own camera. Send and receive message. Track thehealth of user, also there are many Apps in Apple watchFitbit one: this device can keeptrack your steps, floors climbed and sleep quality.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

The device can be connectto computer or phone with wireless.2.      Smartcities: internet of things device can help city reduce the traffic problem,crime and pollution. The city of Barcelona is one of the most smart city in theworld, the city implement many device to help them control the city parking.

 Cybercrime investigation inInternet of things With the development of theinternet of things, the technology of criminal with IoT is developing as well. Inthe IoT network  environment lots of thedevices operate like wireless sensors, radio frequency identification(RFID),watch, alarm; all these device are  interconnectiontogether with servers or cloud application and It contain big amount of data. Whenall the devices are connect together it means it possible interconnect thevarious and attack as well.  On the dataperception and collection process of IoT, typical attack include data leakage ,data control and authentication.

Computational attack may general wrong dataprocessing result when data processing and routing hack may happen when datatransmission also same denial- of – service attack, integrity attack couldoccur on the data storage. Digital Forensics in Internet ofthings system In the past few years IoT forensicspeople normal divide all these attack as different zone which called 1-2-3 zonedigital forensics to help forensics investor examine the digital evidence . Thefollowing diagram showing the 1-2-3 zone digital forensics network:Zone1is the internal network of IoT include the IoT device like google home,  AmazonEcho, these device containvaluable data about a crime committed in the IoT infrastructureZone 2 include all theintermediate components that communicate between internal network to externalnetwork.all these middle device should be detected by intrusion detection andprevention system and firewall. The forescis investigator can find evidentialdata of crime faceZone 3 include all the exernalhardware and software component of clould service. This component normallyhardly to attack, but the forensics investigator still can find some evidenceto help their investigation.

  The digital forensics of theinternet of things is all these 3 zones, the investigation should be focus inthings, Network and cloud. So what the examiner can obtain from these three. Device forensics: SmartHome Device (Google home, Amazon Echo)The forensics investor may obtaininformation form this device:           Timeschedule of the people of the house owner           WI-Ficonnections and WI-FI password           Theinterconnected smart phone data which include medias, Emails and bankinformationWearables device  (Apple watch, fitbit one)The forensics investor may obtaininformation form this device:           Textmessage and phone call           Calendars,schedulers and personal organizers           Useractivity tracking data and GPS using information           Usershealth data like heart rateSmart city Theforensics investor may obtain information from city management application          Wireless access point of the city           Cameradetail information of the city           Controlthe traffic sign            Parkingdata Network forencsic Dependon the network connection type, the following information the forensicsinvertor may obtain from this area.           Wirelessaccess point and log information           FirewallDetail           RFID           Webproxy cache           IDSinformation           Networkactivity and monitorExternal forensics (cloud forensics) Externalforensics is the most complexity parts of the internet of things forensics.

Eventhe technology may challenges the investor but the following artifacts stillcan be found in the cloud computer.             TimeLinelog           DHCPlog                    Runningtime information           Portusing to connect to server