[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3317549.3326317acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
poster

A digital forensics framework for smart settings: poster

Published: 15 May 2019 Publication History

Abstract

Users utilize IoT devices and sensors in a co-operative manner to enable the concept of a smart environment. This integration generate data with high forensic value. Nonetheless, current smart app programming platforms do not provide any digital forensics capability to identify, trace, store, and analyze the data produced in these settings. To overcome these limitations, in this poster, we present our ongoing work to introduce a novel digital forensic framework for a smart environment.

References

[1]
H. Aksu, L. Babun, M. Conti, G. Tolomei, and A. S. Uluagac. 2018. Advertising in the IoT Era: Vision and Challenges. IEEE Communications Magazine (2018), 1--7.
[2]
Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A. Selcuk Uluagac. 2018. Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD. https://www.usenix.org/conference/usenixsecurity18/presentation/celik
[3]
Sudhir Chitnis, Neha Deshpande, and Arvind Shaligram. 2016. An investigative study for smart home security: Issues, challenges and countermeasures. Wireless Sensor Network (2016), 61.
[4]
Malware found in surveillance cameras sold through Amazon. 2017. https://www.techworm.net/2016/04/malware-found-surveillance-cameras-sold-amazon.html. {Online; accessed 10-January-2018}.
[5]
Sukhvir Notra, Muhammad Siddiqi, Hassan Habibi Gharakheili, Vijay Sivaraman, and Roksana Boreli. 2014. An experimental study of security and privacy risks with emerging household appliances. In Communications and Network Security (CNS), 2014 IEEE Conference on. IEEE, 79--84.
[6]
SaINT Project, L. Babun, Z. Berkay Celik and A. Kumar Sikder. {n. d.}. http://saint-project.appspot.com/. {Online; accessed August-2018}.
[7]
Amit Kumar Sikder, Hidayet Aksu, and A. Selcuk Uluagac. 2017. 6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices. In USENIX Security.
[8]
SmartThings Logging, Matt J Frank. {n. d.}. https://github.com/krlaframboise/SmartThings/blob/\master/smartapps/krlaframboise/simple-event-logger.src/simple-event-logger.groovy. {Online; accessed May-2018}.
[9]
Biljana L Risteska Stojkoska and Kire V Trivodaliev. 2017. A review of Internet of Things for smart home: Challenges and solutions. Journal of Cleaner Production 140 (2017), 1454--1464.

Cited By

View all
  • (2024)IMPLEMENTING TOKEN-BASED AUTHENTICATION AND MODIFIED HASHING FOR IOT SECURITYShodhKosh: Journal of Visual and Performing Arts10.29121/shodhkosh.v5.i1.2024.18805:1Online publication date: 31-Jan-2024
  • (2023)SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT PlatformIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.316231220:2(1656-1674)Online publication date: 1-Mar-2023
  • (2022)Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) FrameworkElectronics10.3390/electronics1107112611:7(1126)Online publication date: 2-Apr-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks
May 2019
359 pages
ISBN:9781450367264
DOI:10.1145/3317549
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 May 2019

Check for updates

Author Tags

  1. app instrumentation
  2. forensic analysis
  3. internet of things
  4. machine learning
  5. smart settings

Qualifiers

  • Poster

Funding Sources

  • U.S. National Science Foundation
  • Florida Center for Cybersecurity's Capacity Building Program

Conference

WiSec '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)IMPLEMENTING TOKEN-BASED AUTHENTICATION AND MODIFIED HASHING FOR IOT SECURITYShodhKosh: Journal of Visual and Performing Arts10.29121/shodhkosh.v5.i1.2024.18805:1Online publication date: 31-Jan-2024
  • (2023)SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT PlatformIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.316231220:2(1656-1674)Online publication date: 1-Mar-2023
  • (2022)Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) FrameworkElectronics10.3390/electronics1107112611:7(1126)Online publication date: 2-Apr-2022
  • (2022)Secure Deployment of IOT DevicesBlockchain and Other Emerging Technologies for Digital Business Strategies10.1007/978-3-030-98225-6_10(271-316)Online publication date: 4-May-2022
  • (2022)A Systematic Literature Review on Forensics in Cloud, IoT, AI & BlockchainIllumination of Artificial Intelligence in Cybersecurity and Forensics10.1007/978-3-030-93453-8_9(197-229)Online publication date: 8-Feb-2022
  • (2022)IoT Privacy, Security and Forensics Challenges: An Unmanned Aerial Vehicle (UAV) Case StudyHandbook of Big Data Analytics and Forensics10.1007/978-3-030-74753-4_2(7-39)Online publication date: 1-Jan-2022
  • (2021)Cross-Layer LearningTechnologies to Advance Automation in Forensic Science and Criminal Investigation10.4018/978-1-7998-8386-9.ch005(62-90)Online publication date: 5-Nov-2021
  • (2021)Protocol-Based and Hybrid Access Control for the IoT: Approaches and Research OpportunitiesSensors10.3390/s2120683221:20(6832)Online publication date: 14-Oct-2021
  • (2021)A survey of machine learning applications in digital forensicsTrends in Computer Science and Information Technology10.17352/tcsit.000034(020-024)Online publication date: 8-Apr-2021
  • (2021)Raspberry Pi Forensic Investigation and Evidence Preservation using Blockchain2021 International Conference on Forensics, Analytics, Big Data, Security (FABS)10.1109/FABS52071.2021.9702622(1-5)Online publication date: 21-Dec-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media