Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

IoT Forensic Science: Principles, Processes, and Activities

IoT Forensic Science: Principles, Processes, and Activities
View Sample PDF
Author(s): Eoghan Casey (Université de Lausanne, Switzerland), Hannes Spichiger (Université de Lausanne, Switzerland), Elénore Ryser (Université de Lausanne, Switzerland), Francesco Servida (Université de Lausanne, Switzerland) and David-Olivier Jaquet-Chiffelle (Université de Lausanne, Switzerland)
Copyright: 2020
Pages: 37
Source title: Applied Approach to Privacy and Security for the Internet of Things
Source Author(s)/Editor(s): Parag Chatterjee (National Technological University, Argentina & University of the Republic, Uruguay), Emmanuel Benoist (Bern University of Applied Sciences, Switzerland) and Asoke Nath (St. Xavier's College, Kolkata, India)
DOI: 10.4018/978-1-7998-2444-2.ch001


View IoT Forensic Science: Principles, Processes, and Activities on the publisher's website for pricing and purchasing information.


IoT devices produce information that can be used in criminal investigations and cybersecurity incidents to make inferences about identities, locations, chronologies, and relationships between relevant entities. Before this information is relied upon to make critical decisions, its veracity must be assessed critically, and the link between virtual and physical worlds must be evaluated carefully. This chapter presents the forensic science principles needed to exploit the full potential of IoT traces, including uniqueness, exchange, provenance, integrity, reliability, repeatability, evaluating links between virtual and physical entities, and formally assessing alternative hypotheses. This chapter also discusses core forensic processes and activities, demonstrating their application to forensic analysis of IoT devices using practical examples. A typology of IoT traces is proposed and their usefulness during an investigation is discussed. Finally, an investigative scenario is presented to illustrate the opportunities and challenges of exploiting IoT devices and traces for investigative and forensic purposes.

Related Content

Regner Sabillon. © 2022. 18 pages.
Jeffrey S. Zanzig, Guillermo A. Francia III. © 2022. 20 pages.
Gregory B. White, Natalie Sjelin. © 2022. 17 pages.
Baris Cimen, Meltem Mutluturk, Esra Kocak, Bilgin Metin. © 2022. 21 pages.
Regner Sabillon. © 2022. 63 pages.
Gregory B. White, Natalie Sjelin. © 2022. 16 pages.
Aristides Dasso, Ana Funes. © 2022. 17 pages.
Body Bottom