Digital Forensics and Investigation Framework for Industrial IoT (IIoT)
Keywords:
Industrial Internet of Things (IIoT), Digital Forensics, Cybersecurity, Framework, Forensic InvestigationAbstract
The increasing integration of traditional industrial systems with communication technologies in the Industrial Internet of Things (IIoT) has revolutionized industry efficiency. However, this interconnectedness exposes IIoT systems to cyber-based vulnerabilities. There is a lack of a systematic study method for IIoT forensics within existing research. This research investigates current methodologies and challenges in IIoT forensics and aims to propose innovative solutions for effective data collection, analysis, and interpretation within IIoT environments. The primary objective of this research is to propose a framework that can improve the forensic investigation process within the IoT environment. This research employs mixed methods, including a comprehensive literature review of current methods, barriers, and future directions for IoT forensic investigations. It also includes surveying IIoT systems in some organizations and devices to gain insights into their structure, data storage, communication protocols, and possible forensic obstacles. A case study will examine real-life scenarios involving IIoT systems in some organizations in Oman to understand the unique forensic obstacles auditors face. The study is intended to highlight the forensic approach to analysing IIoT systems. It will evaluate IoT forensics tools in terms of time complexity, reliability, ease of usability, and other parameters. The research seeks to contribute to a regulatory framework for Industrial IoT Security, particularly in Oman, and raise awareness about the use of IoT systems. The anticipated outcome is a framework that improves the forensic investigation process within the IoT environment
References
Abbas, N., Nasser, Y., Shehab, M., & Sharafeddine, S. (2021). Attack-specific feature selection for anomaly detection in software-defined networks. In 2021 3rd IEEE Middle East and North Africa Communications Conference (MENACOMM) (pp. 142–146). IEEE. https://doi.org/10.1109/MENACOMM50775.2021.9678396
Awad, A. I., & Kebande, V. R. (2024). Industrial Internet of Things Ecosystems Security and Digital Forensics. ACM Computing Surveys, 56(5). https://doi.org/10.1145/3635030
Fitzpatrick, P., & Thorpe, C. (2024). Distributed Digital Ledger Technology for Digital Forensics for IIoT. https://tinyurl.com/4d2tsnmt
Gudlur, V. V. R., Shanmugan, V. A., Perumal, S., & Mohammed, R. M. S. R. (2020). Industrial Internet of Things (IIoT) of forensic and vulnerabilities. International Journal of Recent Technology and Engineering, 8(5), 1234–1240.
Gudlur, V. V. R., Shanmugan, V. A., Perumal, S., & Mohammed, R. M. S. R. (2020). Industrial Internet of Things (IIoT) of forensic and vulnerabilities. International Journal of Recent Technology and Engineering, 8(5), 2277–3878.
Juma, M., Alattar, F., & Touqan, B. (2023). Securing Big Data Integrity for IIoT. Internet of Things, 4(1), 27–55. https://doi.org/10.3390/iot4010002
Justice, J., Alade, O. M., Amusan, E. A., Ojo, O. J., Alade, T. R., & Fenwa, O. D. (2024). Forensic Evidence Collection in IoT Environments. Asian Journal of Research in Computer Science, 17(9), 70–91. https://doi.org/10.9734/ajrcos/2024/v17i9500
Kebande, V. R. (2022). Industrial internet of things (IIoT) forensics: The forgotten concept in the race towards industry 4.0. Forensic Science International: Reports, 5. https://doi.org/10.1016/j.fsir.2022.100257
Kebande, V. R., & Ikuesan, R. (2024). Standardizing Industrial Internet of Things (IIoT) Forensic Processes. https://doi.org/10.22541/au.171669128.84117392/v1
Molinaro, P., & Wagner, R. (2023). Guidelines for IIoT Forensics Readiness.
Nelufule, N., Masango, M., & Singano, T. (2024). Digital Forensics in Industry 4.0 and 5.0.
Rathee, G., Ahmad, F., Jaglan, N., & Konstantinou, C. (2022). A Secure and Trusted Mechanism for Industrial IoT Network using Blockchain. http://arxiv.org/abs/2206.03419Structure
Rathee, G., Iqbal, R., Kerrache, C. A., & Song, H. (2024). TrustNextGen: Security Aspects of Trustworthy Next-Generation Industrial Internet of Things. IEEE Internet of Things Journal, 11(15), 25568–25576. https://doi.org/10.1109/JIOT.2024.3361801
Sasikumar, P., Arulmurugan, R., & Manogaran, G. (2024). A comprehensive survey on security and privacy challenges in Industrial Internet of Things. Journal of Ambient Intelligence and Humanized Computing, 15(1), 123–145.
Sharma, S., Kumar, A., Rathore, N. S., & Sharma, S. (2024). Intrusion Detection in IIoT. https://doi.org/10.1007/s12046-024-02567-zS
Shin, D. H., Han, S. J., Kim, Y. B., & Euom, I. C. (2024). Digital Forensics of Heterogeneous IoT. Applied Sciences, 14(3). https://doi.org/10.3390/app14031128
Shtayat, M. M., Hasan, M. K., Sulaiman, R., Islam, S., & Khan, A. U. R. (2023). An Explainable Ensemble Deep Learning Approach for Intrusion Detection in IIoT. IEEE Access, 11, 115047–115061. https://doi.org/10.1109/ACCESS.2023.3323573
Tyagi, S. (2023). Cybersecurity challenges in Industrial IoT: A survey. International Journal of Computer Applications, 182(1), 25–30.
Downloads
Published
Issue
Section
License
All materials contained within this journal are protected by Intellectual Property Corporation of Malaysia, Copyright Act 1987 and may not be reproduced, distributed, transmitted, displayed, published, or
broadcast without the prior, express written permission of Centre for Graduate Studies, Universiti Selangor, Malaysia. You may not alter or remove any copyright or other notice from copies of this content.