The internet of things (IoT) is an internet-workingof several identifiable computer network physical device, Radio Frequency Identification(RFID) or could computing applications to the existing internet networkinfrastructure.
In recently, the internet of thingsdevice and services market is growing very fast, it have large economic and societalimpact of future world. In every corner of the people’s life: the home, office,cars even the street of the city we can find many IoT device and service . Ithelp us to control over door lock, lights and appliances; the process of thebusiness life; connect with people and develop our daily live. The followingdiagram showing full content of IoT service area. As we can see there are many of theinternet of things devices and service areas, but in the current market the followingareas are more popular and it is on the top three of the market. Smart home: the IoT device relateto the smart home application is the most popular devices in the market atmoment and it is most readily for the customer now. Form google to Amazon there are hundredsof products available in the market now.
Internet of things smart home device example:Goolge home – Smart speaker: googlehome is power by the google assistant. The owner can ask it questions likeweather, traffic, sports, finance or tell it do things like translation,calculation or search information for you. With google you also can manage yourtask and control TV and lights at home.
Amazon Echo -smart home: AmazonEcho is a voice control device, user can talk to the device to play music,sports and weather or even order an Uber. Amazon Echo also have smart alarmclock to help user keep the phone out of the bedroom but still maintain usefulthings like email, web browser.1. Wearables:wearable technology is one of the greatest applications of internet of things.IoT wearable device can help user keep track their health and exercise progressin previously impossible ways. The most popular wearable device is Apple watchand Fitbit oneApple watch- display the photo ofIPhone device or Mac without it’s own camera. Send and receive message. Track thehealth of user, also there are many Apps in Apple watchFitbit one: this device can keeptrack your steps, floors climbed and sleep quality.
The device can be connectto computer or phone with wireless.2. Smartcities: internet of things device can help city reduce the traffic problem,crime and pollution. The city of Barcelona is one of the most smart city in theworld, the city implement many device to help them control the city parking.
Cybercrime investigation inInternet of things With the development of theinternet of things, the technology of criminal with IoT is developing as well. Inthe IoT network environment lots of thedevices operate like wireless sensors, radio frequency identification(RFID),watch, alarm; all these device are interconnectiontogether with servers or cloud application and It contain big amount of data. Whenall the devices are connect together it means it possible interconnect thevarious and attack as well. On the dataperception and collection process of IoT, typical attack include data leakage ,data control and authentication.
Computational attack may general wrong dataprocessing result when data processing and routing hack may happen when datatransmission also same denial- of – service attack, integrity attack couldoccur on the data storage. Digital Forensics in Internet ofthings system In the past few years IoT forensicspeople normal divide all these attack as different zone which called 1-2-3 zonedigital forensics to help forensics investor examine the digital evidence . Thefollowing diagram showing the 1-2-3 zone digital forensics network:Zone1is the internal network of IoT include the IoT device like google home, AmazonEcho, these device containvaluable data about a crime committed in the IoT infrastructureZone 2 include all theintermediate components that communicate between internal network to externalnetwork.all these middle device should be detected by intrusion detection andprevention system and firewall. The forescis investigator can find evidentialdata of crime faceZone 3 include all the exernalhardware and software component of clould service. This component normallyhardly to attack, but the forensics investigator still can find some evidenceto help their investigation.
The digital forensics of theinternet of things is all these 3 zones, the investigation should be focus inthings, Network and cloud. So what the examiner can obtain from these three. Device forensics: SmartHome Device (Google home, Amazon Echo)The forensics investor may obtaininformation form this device: Timeschedule of the people of the house owner WI-Ficonnections and WI-FI password Theinterconnected smart phone data which include medias, Emails and bankinformationWearables device (Apple watch, fitbit one)The forensics investor may obtaininformation form this device: Textmessage and phone call Calendars,schedulers and personal organizers Useractivity tracking data and GPS using information Usershealth data like heart rateSmart city Theforensics investor may obtain information from city management application Wireless access point of the city Cameradetail information of the city Controlthe traffic sign Parkingdata Network forencsic Dependon the network connection type, the following information the forensicsinvertor may obtain from this area. Wirelessaccess point and log information FirewallDetail RFID Webproxy cache IDSinformation Networkactivity and monitorExternal forensics (cloud forensics) Externalforensics is the most complexity parts of the internet of things forensics.
Eventhe technology may challenges the investor but the following artifacts stillcan be found in the cloud computer. TimeLinelog DHCPlog Runningtime information Portusing to connect to server