Detection Protocol of Possible Crime Scenes Using Internet of Things (IoT)

Detection Protocol of Possible Crime Scenes Using Internet of Things (IoT)

Bashar Alohali
DOI: 10.4018/978-1-5225-1941-6.ch008
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Forensics is a science that deals with using scientific principles in order to aid an investigation of a civil or criminal crime. It is a system of procedures that allow an investigator to use as much resources as possible in order to come up with a conclusion for an investigation. Since forensics is a very general term that encompasses an investigation process using scientific knowledge, one can separate a system of investigation based on how it is conducted. This chapter introduces of internet of things (IoT) forensics, IoT application in forensics field. Art-of-states for IoT forensics are provided. The issues for IoT forensics are identified. Also, we have introduced the proposed data classification in Iot forensics protocol. At the end of this chapter, we point out a brief summary and conclusion.
Chapter Preview
Top

Background

Overview of IoT and Forensics

In a very short time, modern day living has become “digitized” thanks to the introduction of Internet and the fabrication of connected electronic devices. Smartphones and computers compose a big chunk of consumer electronic devices. Home appliances (St. John, 2012), vehicles and other communication devices have already been integrated into the World Wide Web (WWW). In this scenario, it is inevitable in the future that everything a person does will largely depend on Internet. Communication, learning, retrieval of information and automation of tasks will be the core function of Internet. Every component in the network will influence everything that it can reach.

With the ever-increasing number of devices that can connect to the Internet, it is no doubt that in the future, IoT will be handy in solving crimes. IoT would make it easier for forensic experts to gather as much information as they can use multiple resources to track activity. It could therefore be possible to solve a crime with higher accuracy, faster results and with a wider scope of investigation. There is a need to have a standardized way of securing data and accessing it for forensics examination. Electronic data are not tangible which makes them vulnerable to modification and deletion. In such a case, one should be trained enough to handle data in the safest possible way to avoid losing it in the process of investigation.

Complete Chapter List

Search this Book:
Reset