Functional Requirements for Adding Digital Forensic Readiness as a Security Component in IoT Environments

Victor Rigworo Kebande (1), Nickson Karie Menza (2), H S Venter (3)
(1) Department of Computer Science, University of Pretoria, Private Bag X20, Hatfield 0028, Pretoria, South Africa
(2) Department of Computer Science, University of Swaziland, Private Bag 4, Kwaluseni. Swaziland
(3) Department of Computer Science, University of Pretoria, Private Bag X20, Hatfield 0028, Pretoria, South Africa
Fulltext View | Download
How to cite (IJASEIT) :
Kebande, Victor Rigworo, et al. “Functional Requirements for Adding Digital Forensic Readiness As a Security Component in IoT Environments”. International Journal on Advanced Science, Engineering and Information Technology, vol. 8, no. 2, Mar. 2018, pp. 342-9, doi:10.18517/ijaseit.8.2.2121.
For every contact made on a digital device, a trace is left behind; this means that every digital device contains some form of electronic evidence that may be associated to the behaviour of the users in a given environment. This evidence can be used to prove or disprove facts if a cyber-incident is detected. However, the world has seen a shift on how devices communicate and connect as a result of increased devices and connectivity, which has led to the creation of “smart environments” where the Internet of Things (IoT) plays a key role. Still, we can harness this proliferation of digital devices and smart environments to Digital Forensic (DF) technology which might help to solve the puzzle of how proactive strategies can help to minimise the time and cost needed to conduct a digital investigation. This article introduces the Functional Requirements (FRs) and processes needed when Digital Forensic Readiness (DFR) process is employed as a security component in the IoT-based environment. The paper serves as a continuation of the initially proposed architecture for adding DFR as a security component to IoT environment. The aspects and claims presented in this paper can be used as basic building blocks for implementing DFR technologies that guarantee security in the IoT-based environment. It is worth noting again that the processes that have been defined in this paper comply with the ISO/IEC 27043: 2015 International Standard.

M. Triawan, H. Hindersah, D.Yolanda, and F. Hadiatna, “Internet of Things using Publish and Subscribe Method Cloud-based Application to NFT-based Hydroponic System”, In the 2016 IEEE, Proceedings of the 6th International Conference on System Engineering and Technology(ICSET) Oct, 3-4, 2016 Bandung - Indonesia, 2016.

M. Al-Fuqaha, M. Guizani, M. Mohammadi, Aledhari and M. Ayyash, "Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications," in IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347-2376, Fourthquarter, 2015.

Tripwire,” Survey: Less Than One-Third of Organizations Prepared for IoT Security Risks”, Available at: http://www.tripwire.com/company/news/press-release/survey-less-than-one-third-of-organizations-prepared-for-iot-security-risks/ [Accessed on 23 -Feb- 2016].

J. Barrett, “Internet of Things (IoT)”, 2016 Available at: http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT [Accessed on 24th Feb. 2017]

J. Morgan, “A Simple Explanation of 'The Internet of Thing”, 2014. Available at: https://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-understand/#1734f7081d09 [Accessed on 24th Feb. 2017]

S. Jason, “How ‘Digital Forensic Readiness’ Reduces Business Risk” Available at: http://www.darkreading.com/attacks-breaches/how-digital-forensic-readiness-reduces-business-risk/a/d-id/1323508, 2015 [Accessed March 18, 2017]

M. Cobb ,”Digital forensic investigation procedure: form a computer forensics policy”, http://www.computerweekly.com/tip/Digital-forensicinvestigation-procedure-Form-a-computer-forensics-policy, 2013 [Accessed February 18, 2013].

F. R. Van Staden and H. S. Venter,"Adding digital forensic readiness to electronic communication using a security monitoring tool," 2011 Information Security for South Africa, Johannesburg, 2011, pp. 1-5. doi: 10.1109/ISSA.2011.6027537.

S. Jason , “Implementing Digital Forensic Readiness: From Reactive to Proactive Process:, 1st Edition. EBook ISBN: 9780128045015. Copyright: © Syngress 2016.

K. Reddy, and H. S. Venter, “The architecture of a digital forensic readiness management system”, Computers & security, 32, 73-89, 2013.

Victor R Kebande,Nickson M Karie and H S Venter,"Adding Digital Forensic Readiness as a Security Component to the IoT Domain," International Journal on Advanced Science, Engineering and Information Technology, vol. 8, no. 1, pp. 1-11, 2018. [Online]. Available: http://dx.doi.org/10.18517/ijaseit.8.1.2115.

ISO/IEC 27043: 2015, Information technology -- Security techniques -- Incident investigation principles and processes, [online],Accessed at https://www.iso.org/standard/44407.html

R. Rowlingson, “A ten step process for forensic readiness”, International Journal of Digital Evidence, 2(3), 1-28, 2004.

A. Yasinsac and Y. Manzano, “Policies to enhance computer and network forensics. In Proceedings of the 2001 IEEE workshop on information assurance and security (pp. 289-295), 2001.

J. Tan, “Forensic readiness. Cambridge, MA:@ Stake, 1-23, 2001.

V. R. Kebande and H.S. Venter, “ Towards a Model for Characterizing Potential Digital Evidence in the Cloud Environment during Digital Forensic Readiness Process”, In ICCSM2015-3rd International Conference on Cloud Security and Management: ICCSM2015 (p. 151)., 2015 Academic Conferences and publishing limited.

Y. C. Liao and H. Langweg,” Resource-Based Event Reconstruction of Digital Crime Scenes”, In Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint (pp. 129-136). IEEE, 2014.

V. R Kebande, and H.S Venter, “Adding event reconstruction to a Cloud Forensic Readiness model”, In Information Security for South Africa (ISSA), 2015 (pp. 1-9). IEEE, 2015.

B. D Carrier and E. H Spafford, “Defining event reconstruction of digital crime scenes”, Journal of Forensic Science, 49(6), JFS2004127-8, 2004.

V. R Kebande and I. Ray, “ A Generic Digital Forensic Investigation Framework for Internet of Things (IoT). In Future Internet of Things and Cloud (FiCloud), 2016 IEEE 4th International Conference on (pp. 356-362). IEEE, 2016.

Du, M., & Li, F. Spell: Streaming Parsing of System Event Logs.

A. S. Editya, S. Sumpeno, I, Pratomo, " Performance of IEEE 802.14.5 and ZigBee protocol on realtime monitoring augmented reality based wireless sensor network system," International Journal of Advances in Intelligent Informatics, vol. 3, No 2 pp. 90-97, 2017.

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).