Digital Forensics and Investigation Framework for Industrial IoT (IIoT)

Authors

  • Buthaina Al-Zadjali
  • Setyawan Widyarto

Keywords:

Industrial Internet of Things (IIoT), Digital Forensics, Cybersecurity, Framework, Forensic Investigation

Abstract

The increasing integration of traditional industrial systems with communication technologies in the Industrial Internet of Things (IIoT) has revolutionized industry efficiency. However, this interconnectedness exposes IIoT systems to cyber-based vulnerabilities. There is a lack of a systematic study method for IIoT forensics within existing research. This research investigates current methodologies and challenges in IIoT forensics and aims to propose innovative solutions for effective data collection, analysis, and interpretation within IIoT environments. The primary objective of this research is to propose a framework that can improve the forensic investigation process within the IoT environment. This research employs mixed methods, including a comprehensive literature review of current methods, barriers, and future directions for IoT forensic investigations. It also includes surveying IIoT systems in some organizations and devices to gain insights into their structure, data storage, communication protocols, and possible forensic obstacles. A case study will examine real-life scenarios involving IIoT systems in some organizations in Oman to understand the unique forensic obstacles auditors face. The study is intended to highlight the forensic approach to analysing IIoT systems. It will evaluate IoT forensics tools in terms of time complexity, reliability, ease of usability, and other parameters. The research seeks to contribute to a regulatory framework for Industrial IoT Security, particularly in Oman, and raise awareness about the use of IoT systems. The anticipated outcome is a framework that improves the forensic investigation process within the IoT environment

References

Abbas, N., Nasser, Y., Shehab, M., & Sharafeddine, S. (2021). Attack-specific feature selection for anomaly detection in software-defined networks. In 2021 3rd IEEE Middle East and North Africa Communications Conference (MENACOMM) (pp. 142–146). IEEE. https://doi.org/10.1109/MENACOMM50775.2021.9678396

Awad, A. I., & Kebande, V. R. (2024). Industrial Internet of Things Ecosystems Security and Digital Forensics. ACM Computing Surveys, 56(5). https://doi.org/10.1145/3635030

Fitzpatrick, P., & Thorpe, C. (2024). Distributed Digital Ledger Technology for Digital Forensics for IIoT. https://tinyurl.com/4d2tsnmt

Gudlur, V. V. R., Shanmugan, V. A., Perumal, S., & Mohammed, R. M. S. R. (2020). Industrial Internet of Things (IIoT) of forensic and vulnerabilities. International Journal of Recent Technology and Engineering, 8(5), 1234–1240.

Gudlur, V. V. R., Shanmugan, V. A., Perumal, S., & Mohammed, R. M. S. R. (2020). Industrial Internet of Things (IIoT) of forensic and vulnerabilities. International Journal of Recent Technology and Engineering, 8(5), 2277–3878.

Juma, M., Alattar, F., & Touqan, B. (2023). Securing Big Data Integrity for IIoT. Internet of Things, 4(1), 27–55. https://doi.org/10.3390/iot4010002

Justice, J., Alade, O. M., Amusan, E. A., Ojo, O. J., Alade, T. R., & Fenwa, O. D. (2024). Forensic Evidence Collection in IoT Environments. Asian Journal of Research in Computer Science, 17(9), 70–91. https://doi.org/10.9734/ajrcos/2024/v17i9500

Kebande, V. R. (2022). Industrial internet of things (IIoT) forensics: The forgotten concept in the race towards industry 4.0. Forensic Science International: Reports, 5. https://doi.org/10.1016/j.fsir.2022.100257

Kebande, V. R., & Ikuesan, R. (2024). Standardizing Industrial Internet of Things (IIoT) Forensic Processes. https://doi.org/10.22541/au.171669128.84117392/v1

Molinaro, P., & Wagner, R. (2023). Guidelines for IIoT Forensics Readiness.

Nelufule, N., Masango, M., & Singano, T. (2024). Digital Forensics in Industry 4.0 and 5.0.

Rathee, G., Ahmad, F., Jaglan, N., & Konstantinou, C. (2022). A Secure and Trusted Mechanism for Industrial IoT Network using Blockchain. http://arxiv.org/abs/2206.03419Structure

Rathee, G., Iqbal, R., Kerrache, C. A., & Song, H. (2024). TrustNextGen: Security Aspects of Trustworthy Next-Generation Industrial Internet of Things. IEEE Internet of Things Journal, 11(15), 25568–25576. https://doi.org/10.1109/JIOT.2024.3361801

Sasikumar, P., Arulmurugan, R., & Manogaran, G. (2024). A comprehensive survey on security and privacy challenges in Industrial Internet of Things. Journal of Ambient Intelligence and Humanized Computing, 15(1), 123–145.

Sharma, S., Kumar, A., Rathore, N. S., & Sharma, S. (2024). Intrusion Detection in IIoT. https://doi.org/10.1007/s12046-024-02567-zS

Shin, D. H., Han, S. J., Kim, Y. B., & Euom, I. C. (2024). Digital Forensics of Heterogeneous IoT. Applied Sciences, 14(3). https://doi.org/10.3390/app14031128

Shtayat, M. M., Hasan, M. K., Sulaiman, R., Islam, S., & Khan, A. U. R. (2023). An Explainable Ensemble Deep Learning Approach for Intrusion Detection in IIoT. IEEE Access, 11, 115047–115061. https://doi.org/10.1109/ACCESS.2023.3323573

Tyagi, S. (2023). Cybersecurity challenges in Industrial IoT: A survey. International Journal of Computer Applications, 182(1), 25–30.

Downloads

Published

2025-06-25