ebook img

Digital Forensics and Internet of Things – Impact and Challenges PDF

279 Pages·2022·13.319 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Digital Forensics and Internet of Things – Impact and Challenges

Digital Forensics and Internet of Things Scrivener Publishing 100 Cummings Center, Suite 541J Beverly, MA 01915-6106 Publishers at Scrivener Martin Scrivener ([email protected]) Phillip Carmical ([email protected]) Scrivener Publishing 100 Cummings Center, Suite 541J Beverly, MA 01915-6106 Publishers at Scrivener Martin Scrivener ([email protected]) Digital Forensics Phillip Carmical ([email protected]) and Internet of Things Impact and Challenges Edited by Anita Gehlot Uttaranchal Institute of Technology, Uttaranchal University, India Rajesh Singh Uttaranchal Institute of Technology, Uttaranchal University, India Jaskaran Singh Forensic Sciences, Sharda University, India and Neeta Raj Sharma Biotechnology & BioSciences, Lovely Professional University, India This edition first published 2022 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA © 2022 Scrivener Publishing LLC For more information about Scrivener publications please visit www.scrivenerpublishing.com. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or other- wise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions. Wiley Global Headquarters 111 River Street, Hoboken, NJ 07030, USA For details of our global editorial offices, customer services, and more information about Wiley prod- ucts visit us at www.wiley.com. Limit of Liability/Disclaimer of Warranty While the publisher and authors have used their best efforts in preparing this work, they make no rep- resentations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchant- ability or fitness for a particular purpose. No warranty may be created or extended by sales representa- tives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further informa- tion does not mean that the publisher and authors endorse the information or services the organiza- tion, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Library of Congress Cataloging-in-Publication Data ISBN 978-1-119-76878-4 Cover image: Pixabay.Com Cover design by Russell Richardson Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines Printed in the USA 10 9 8 7 6 5 4 3 2 1 Contents Preface xiii 1 Face Recognition–Based Surveillance System: A New Paradigm for Criminal Profiling 1 Payal Singh, Sneha Gupta, Vipul Gupta, Piyush Kuchhal and Arpit Jain 1.1 Introduction 1 1.2 Image Processing 6 1.3 Deep Learning 7 1.3.1 Neural Network 9 1.3.2 Application of Neural Network in Face Recognition 10 1.4 Methodology 10 1.4.1 Face Recognition 10 1.4.2 Open CV 11 1.4.3 Block Diagram 11 1.4.4 Essentials Needed 12 1.4.5 Website 12 1.4.6 Hardware 12 1.4.7 Procedure 12 1.5 Conclusion 16 References 17 2 Smart Healthcare Monitoring System: An IoT-Based Approach 19 Paranjeet Kaur 2.1 Introduction 19 2.2 Healthcare at Clinics 21 2.3 Remote Healthcare 21 2.4 Technological Framework 21 2.5 Standard UIs, Shows, and User Requirements 23 2.5.1 Advantages 23 2.5.2 Application 23 2.6 Cloud-Based Health Monitoring Using IoT 24 v vi Contents 2.7 Information Acquisition 24 2.8 The Processing of Cloud 25 2.9 IoT-Based Health Monitoring Using Raspberry Pi 25 2.10 IoT-Based Health Monitoring Using RFID 26 2.10.1 Sensor Layer 27 2.10.2 Network Layer 28 2.10.3 Service Layer 28 2.11 Arduino and IoT-Based Health Monitoring System 28 2.12 IoT-Based Health Monitoring System Using ECG Signal 29 2.12.1 System Model 30 2.12.2 Framework 30 2.13 IoT-Based Health Monitoring System Using Android App 31 2.13.1 Transferring the Information to the Cloud 33 2.13.2 Application Controls 33 2.14 Conclusion and Future Perspectives 33 References 34 3 Design of Gesture-Based Hand Gloves Using Arduino UNO: A Grace to Abled Mankind 37 Harpreet Singh Bedi, Dekkapati Vinit Raju, Nandyala Meghanath Reddy C. Partha Sai Kumar and Mandla Ravi Varma 3.1 Introduction 38 3.1.1 Block Diagram 38 3.1.2 The Proposed New Design 39 3.1.3 Circuit Diagram 40 3.2 Result and Discussion 40 3.2.1 Data Analysis 41 3.3 Conclusion 41 3.4 Future Scope 42 References 42 4 Playing With Genes: A Pragmatic Approach in Genetic Engineering 45 Prerna Singh and Dolly Sharma 4.1 Introduction 46 4.2 Literature Review 47 4.3 Methodology 48 4.3.1 Plasmid Method 48 4.3.2 The Vector Method 49 4.3.3 The Biolistic Method 49 Contents vii 4.4 Food and Agriculture 50 4.5 Impact on Farmers 53 4.6 Diseases: Gene Editing and Curing 54 4.7 Conclusion 56 4.8 Future Scope 56 References 57 5 Digital Investigative Model in IoT: Forensic View 59 Suryapratap Ray and Tejasvi Bhatia 5.1 Introduction 59 5.1.1 Artificial Neural Network 60 5.2 Application of AI for Different Purposes in Forensic Science 61 5.2.1 Artificial Intelligence for Drug Toxicity and Safety 61 5.2.2 Crime Scene Reconstruction 62 5.2.3 Sequence or Pattern Recognition 62 5.2.4 Repositories Building 63 5.2.5 Establishment of Connection Among the Investigating Team 63 5.2.6 Artificial Intelligence and Expert System in Mass Spectrometry 63 5.2.7 AI in GPS Navigation 65 5.3 Future of AI 66 5.4 Challenges While Implementing AI 67 5.4.1 Unexplainability of AI 67 5.4.2 AI Anti-Forensics 67 5.4.3 Connection Interruption Between the Cyber Forensics and AI Communities 67 5.4.4 Data Analysis and Security 68 5.4.5 Creativity 68 5.5 Conclusion 68 References 69 6 Internet of Things Mobility Forensics 73 Shipra Rohatgi, Aman Sharma and Bhavya Sharma 6.1 Introduction 74 6.2 Smart Device and IoT 75 6.3 Relation of Internet of Things with Mobility Forensics 76 6.3.1 Cyber Attack on IoT Data 77 6.3.2 Data Recovery from IoT Devices 78 6.3.3 Scenario-Based Analysis of IoT Data as Evidence 79 6.4 Mobility Forensics IoT Investigation Model 80 viii Contents 6.5 Internet of Things Mobility Forensics: A Source of Information 82 6.6 Drawbacks in IoT Devices Data Extraction 82 6.7 Future Perspective of Internet of Things Mobility Forensics 84 6.8 Conclusion 84 References 85 7 A Generic Digital Scientific Examination System for Internet of Things 87 Shipra Rohatgi and Sakshi Shrivastava 7.1 Introduction 88 7.2 Internet of Things 89 7.3 IoT Architecture 91 7.4 Characteristics of IoT 92 7.5 IoT Security Challenges and Factors of Threat 94 7.5.1 Effects of IoT Security Breach 95 7.6 Role of Digital Forensics in Cybercrime Investigation for IoT 96 7.6.1 IoT in Digital Forensic 96 7.6.2 Digital Forensics Investigation Framework for IoT Devices 98 7.6.3 Road Map for Issues in IoT Forensics 99 7.7 IoT Security Steps 102 7.7.1 How to Access IoT Security 103 7.8 Conclusion 107 References 108 8 IoT Sensors: Security in Network Forensics 111 D. Karthika 8.1 Introduction 111 8.2 Cybersecurity Versus IoT Security and Cyber-Physical Systems 112 8.3 The IoT of the Future and the Need to Secure 114 8.3.1 The Future—Cognitive Systems and the IoT 114 8.4 Security Engineering for IoT Development 115 8.5 Building Security Into Design and Development 115 8.6 Security in Agile Developments 116 8.7 Focusing on the IoT Device in Operation 117 8.8 Cryptographic Fundamentals for IoT Security Engineering 118 8.8.1 Types and Uses of Cryptographic Primitives in the IoT 118 8.8.1.1 Encryption and Decryption 119 Contents ix 8.8.1.2 Symmetric Encryption 120 8.8.1.3 Asymmetric Encryption 121 8.8.1.4 Hashes 122 8.8.1.5 Digital Signatures 123 8.8.1.6 Symmetric (MACS) 123 8.8.1.7 Random Number Generation 124 8.8.1.8 Cipher Suites 125 8.9 Cloud Security for the IoT 125 8.9.1 Asset/Record Organization 126 8.9.2 Service Provisioning, Billing, and Entitlement Management 126 8.9.3 Real-Rime Monitoring 126 8.9.4 Sensor Coordination 127 8.9.5 Customer Intelligence and Marketing 127 8.9.6 Information Sharing 127 8.9.7 Message Transport/Broadcast 128 8.10 Conclusion 128 References 129 9 Xilinx FPGA and Xilinx IP Cores: A Boon to Curb Digital Crime 131 B. Khaleelu Rehman, G. Vallathan, Vetriveeran Rajamani and Salauddin Mohammad 9.1 Introduction 132 9.2 Literature Review 132 9.3 Proposed Work 132 9.4 Xilinx IP Core Square Root 136 9.5 RTL View of the 8-Bit Multiplier 140 9.5.1 Eight-Bit Multiplier Simulation Results Using IP Core 144 9.6 RTL View of 8-Bit Down Counter 145 9.6.1 Eight-Bit Down Counter Simulation Results 145 9.7 Up/Down Counter Simulation Results 149 9.8 Square Root Simulation Results 150 9.9 Hardware Device Utilization Reports of Binary Down Counter 154 9.10 Comparison of Proposed and Existing Work for Binary Up/Down Counter 156 9.10.1 Power Analysis of Binary Up/Down Counter 159 9.11 Conclusion 160 References 160

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.