The develop our daily life. The following diagram

The internet of things (IoT) is an internet-working of several identifiable computer network physical devices, Radio Frequency Identification (RFID) or could computing applications to the existing internet network infrastructure.

In recently, the internet of things device and services market is growing very fast, it has large economic and societal impact on the future world. In every corner of the people’s life: the home, office, cars even the street of the city we can find many IoT device and service. It helps us to control over door lock, lights, and appliances; the process of the business life; connect with people and develop our daily life.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

The following diagram showing the full content of IoT service area. As we can see there are many of the internets of things devices and service areas, but in the current market the following areas are more popular and it is on the top three of the market.Smart home: the IoT device relate to the smart home application is the most popular devices on the market at moment and it is almost ready for the customer now. Form Google to Amazon there are hundreds of products available in the market now.Internet of things smart home device example:Google home – Smart speaker: google home is power by the google assistant. The owner can ask it questions like weather, traffic, sports, finance or tell it to do things like translation, calculation or search information for you. With Google, you also can manage your task and control TV and lights at home.Amazon Echo -smart home: Amazon Echo is a voice control device, the user can talk to the device to play music, sports and weather or even order an Uber.

Amazon Echo also has smart alarm clock to help the user keep the phone out of the bedroom but still maintain useful things like email, web browser.1. Wearables: wearable technology is one of the greatest applications of the internet of things. IoT wearable device can help the user keep track their health and exercise progress in previously impossible ways. The most popular wearable device is Apple watch and Fitbit oneApple watches- display the photo of iPhone device or Mac without its own camera. Send and receive the message. Track the health user, also there are many Apps in Apple watchFitbit one: this device can keep track your steps, floors climbed and sleep quality.

The device can be connected to computer or phone with wireless.2. Smart cities: internet of things device can help the city reduce the traffic problem, crime, and pollution. The city of Barcelona is one of the smartest cities in the world, the city implements many devices to help them control the city parking.Cybercrime investigation on Internet of thingsWith the development of the internet of things, the technology of criminal with IoT is developing as well. In the IoT network environment lots of the devices operate like wireless sensors, radio frequency identification(RFID), watch, alarm; all these devices are interconnection together with servers or cloud application and It contains big amount of data. When all the devices are connected together it means it possible interconnect the various and attack as well.  On the data perception and collection process of IoT, a typical attack includes data leakage, data control, and authentication.

The computational attack may general wrong data processing result when data processing and routing hack may happen when data transmission also the same denial- of – service attack, integrity attack could occur on the data storage.Digital Forensics in Internet of things systemIn the past few years IoT forensics people normal divide all these attacks as a different zone which called 1-2-3 zone digital forensics to help forensics investor examine the digital evidence. The following diagram showing the 1-2-3 zone digital forensics network: Zone1 is the internal network of IoT include the IoT device like google home,  AmazonEcho, these devices contain valuable data about a crime committed in the IoT infrastructureZone 2 includes all the intermediate components that communicate with the internal network to external network.all these middle devices should be detected by intrusion detection and prevention system and firewall. The forensic investigator can find evidential data on crime faceZone 3 includes all the external hardware and software component of cloud service. This component normally hardly to attack, but the forensics investigator still can find some evidence to help their investigation.

The digital forensics of the internet of things is all these 3 zones, the investigation should be the focus in things, Network, and cloud. So what the examiner can obtain from these three.Device forensics: Smart Home Device (Google home, Amazon Echo)The forensics investor may obtain information form this device: Time schedule of the people of the house owner WI-Fi connections and WI-FI password The interconnected smartphone data which include medias, Emails and bank informationWearables device (Apple watch, Fitbit one)The forensics investor may obtain information form this device: Text message and phone call Calendars, schedules and personal organizers User activity tracking data and GPS using information Users health data like heart rateSmart city The forensics investor may obtain information from city management application Wireless access point of the city Camera detail information of the city Control the traffic sign  Parking dataNetwork forensics Depend on the network connection type, the following information the forensics invertor may obtain from this area. Wireless access point and log information Firewall Detail RFID Web proxy cache IDS information Network activity and monitorExternal forensics (cloud forensics) External forensics is the most complex parts of the internet of things forensics. Even the technology may challenge the investor but the following artifacts still can be found in the cloud computer. TimeLine log DHCP log Running time information Port using to connect to server

x

Hi!
I'm Mary!

Would you like to get a custom essay? How about receiving a customized one?

Check it out