Adding Digital Forensic Readiness as a Security Component to the IoT Domain
How to cite (IJASEIT) :
Unknown (2015). Identifying the Technological Building Blocks in an Enterprise IoT Architecture. Available at: https://www.smartindustry.com/blog/smart-industry-connect/identifying-the-technological-building-blocks-in-an-enterprise-iot-architecture/ [Accessed June 03, 2016].
IoT-A, (2013). Internet-of-Things Architecture (IoT-A). Available at: http://www.iot a.eu/public [Accessed June 03, 2016].
IDC(2017) “Internet of Things spending 2017-2020: IoT industry drivers and investments”[online], Accessed February 2017. Available at-https://www.i-scoop.eu/internet-of-things-guide/iot-spending-2020/
N.M. Karie, and H.S. Venter, “Taxonomy of Challenges for Digital Forensics.” Journal of Forensic Sciences. Doi: 10.1111/1556-4029, 2015.
A.M. Desai, D. Fitzgerald, B. Hoanca, “Offering a digital forensics course in Anchorage”, Alaska. Inform Syst Edu J; Vol 7(35); http://isedj.org/7/35/, 2009
ISO/IEC 27043: 2015: Information technology -- Security techniques -- Incident investigation principles and processes
N.M. Karie, and H.S. Venter, “Toward a General Ontology for Digital Forensic Disciplines.” Journal of Forensic Sciences, Vol. 59, No. 5 Doi: 10.1111/1556-4029, 2014.
G. Mohay, “Technical challenges and directions for digital forensics. Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering; 2005 Nov. 7-9; Taipei, Taiwan. Piscataway, NJ: IEEE Computer Society Publishers,;155-61, 2005.
M. Cobb, “Digital forensic investigation procedure: form a computer forensics policy”. http://www.computerweekly.com/tip/Digital-forensicinvestigation-procedure-Form-a-computer-forensics-policy [Accessed February 18, 2013].
E. Berthelsen, “Identifying the Major Technological Domains in an IoT Architecture.” Avilable online at: https://www.thingworx.com/blog/identifying-the-major-technological-domains-in-an-iot-architecture/ [Accessed June, 30th 2015]
E. Mohamed, B.M. Sean, A. Atif and L. Andrew, “Towards A Systemic Framework for Digital Forensic Readiness.” Journal of Computer Information Systems 54(3):97-105. DOI: 10.1080/08874417.2014.11645708, 2014.
T. Grobler and B. Louwrens, “Digital Forensic Readiness as a Component of Information Security Best Practice”, in IFIP International Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments, eds, in Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R., (Boston: Springer), pp. 13-24, 2007.
A. Pooe, and L. Labuschagne, “A conceptual model for digital forensic readiness. Information Security for South Africa, Johannesburg, Gauteng. pp. 1-8, 2012”.
F.A.R. Abdul, A. Rabiah, and Z.M. Madihah, “Developing Forensic Readiness Secure Network Architecture for Wireless Body Area Network (WBAN).” International Journal of Security and Its Applications. Vol.8, No.5 pp.403-420. http://dx.doi.org/10.14257/ijsia.2014.8.5.35, 2014).
V. R. Kebande, and I. Ray, “A Generic Digital Forensic Investigation Framework for Internet of Things (IoT).” In Future Internet of Things and Cloud (FiCloud), 2016 IEEE 4th International Conference on (pp. 356-362). IEEE, 2016.
V. R. Kebande and H. S. Venter, “Novel digital forensic readiness technique in the cloud environment”, Australian Journal of Forensic Sciences, DOI: 10.1080/00450618.2016.1267797, 2017.
V. R. Kebande and H. S.Venter, “Towards a Model for Characterizing Potential Digital Evidence in the Cloud Environment during Digital Forensic Readiness Process.” In ICCSM2015-3rd International Conference on Cloud Security and Management: ICCSM2015 (p. 151). Academic Conferences and publishing limited, 2015.
O. Martikainen, J. Lipií¤inen and K. Molin, “Tutorial on intelligent networks” Lappeenranta University of Technology, 1994.
V. R Kebande, N.M. Karie, Michael, A, Semaka, M & Venter, H.S(2017, Ma). How an IoT-enabled “Smart Refrigerator” can play a Clandestine Role in Perpetuating Cyber-crime. In IST-Africa, 2017 IEEE International Conference on. IEEE-To appear.
V. R. Kebande and H. S Venter, “Adding event reconstruction to a Cloud Forensic Readiness model.” In Information Security for South Africa (ISSA), 2015 (pp. 1-9). IEEE, 2015.
G. B. Satrya, H. T. Reda, K. J. Woo, P. T. Daely, U. K. Latif, S. Y. Shin and S.Chae, “IoT and Public Weather Data Based Monitoring & Control Software Development for Variable Color Temperature LED Street Lights.” International Journal on Advanced Science, Engineering and Information Technology, 7(2), 2017.
H. Z. Abidin, N. M. Din, N.A.M Radzi and Z. I Rizman, " A Review on Sensor Node Placement Techniques in Wireless Sensor Networks," International Journal on Advanced Science, Engineering and Information Technology, vol. 7, pp. 190-197, 2017.
Editya,A.S, Sumpeno, S. and Pratomo, I.,(2017).Performance of IEEE 802.14.5 and ZigBee protocol on realtime monitoring augmented reality based wireless sensor network system. International Journal of Advances in Intelligent Informatics.Vol.3, No 2,pp. 90-97
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).