Internet of Things Forensics in Smart Homes: Design, Implementation and Analysis of Smart Home Laboratory

Internet of Things Forensics in Smart Homes: Design, Implementation and Analysis of Smart Home Laboratory

Paper ID #29634 Internet of Things Forensics in Smart Homes: Design, Implementation and Analysis of Smart Home Laboratory Shinelle Hutchinson, Purdue University at West Lafayette I am a Ph.D. student at Purdue University studying Digital and Cyber Forensics. I obtained my Masters of Science in Digital Forensics from Sam Houston State University and my Bachelor’s of Science in Computer Science from the University of the West Indies. I have research interests in Internet of Things (IoT) Forensics, Mobile Forensics, and IoT and Mobile Security and Privacy. Yung Han Yoon, Purdue University Ms. Neesha Shantaram Dr. Umit Karabiyik, Purdue University Dr. Umit Karabiyik is an Assistant Professor in the Department of Computer and Information Technology at Purdue University. Prior to his appointment at Purdue, Dr. Karabiyik was an Assistant Professor in the Department of Computer Science at Sam Houston State University from 2015 to 2018. Dr. K received his M.S. and Ph.D. degrees from Florida State University in 2010 and 2015 respectively. His research interests broadly lie in Digital and Cyber Forensics, User and Data Privacy, Artificial Intelligence, Computer and Network Security. He is a recipient of federal grants from National Institute of Justice. He is an Associate Editor-in-Chief for Journal of Digital Forensics, Security and Law, and technical program committee (TPC) member of high quality international conferences in Digital Forensics and Security. c American Society for Engineering Education, 2020 Internet of Things Forensics in Smart Homes: Design, Implementation and Analysis of Smart Home Laboratory Shinelle Hutchinson, Yung Han Yoon, Neesha Shantaram, and Umit Karabiyik fhutchi50,yoon127,nshantar,[email protected] Department of Computer and Information Technology Purdue University Abstract The Internet of Things (IoT) has skyrocketed to the forefront of everyone’s lives, whether they know it or not. IoT devices have been incorporated into all facets of life, from the medical industry to transportation and it has even made its way into our homes. These devices have access to vast amounts of data, especially personal data. However, due to the compact nature of these devices, insufficient effort has been made to incorporate security into their design. With that in mind, IoT devices are treasure-troves of potential evidentiary data for forensic investigators, especially when these devices are used to aid in criminal activities. Concerning IoT devices, there is a need to investigate these devices to find answers to questions such as, what data can be recovered from these devices along with their respective smartphone applications? What methods would be best suited for collecting and analyzing this data? What data do these devices share with each other? Are there any privacy concerns when using these devices? Are there any security vulnerabilities when using these devices? Finding answers to these questions will considerably reduce the amount of time investigators spend collecting evidence during a case. New IoT devices are always becoming available and the research into each cannot keep up. As such, there is a gap in the literature regarding both the privacy and security of these devices and the most efficient methods to investigate them. Therefore, in this study, we aim to address this need by first building our own IoT forensics laboratory at Purdue University. Several students (undergraduate and graduate) work under the supervision of their faculty advisor to populate this lab with relevant IoT devices to simulate that of a smart home. This setup would allow us to simulate possible real-world smart home events (i.e. IoT device compromise, IoT device as a witness) which we can then investigate to both find answers to aforementioned questions and develop efficient methods to investigate these IoT devices. In this paper we will discuss several ways in which IoT devices in a smart home can be compromised and also investigate these devices after the compromise to determine what data can be recovered, how to recover the data and where this data resides. 1 Introduction Internet connected devices are constantly being introduced to the public as convenient and secure ways to improve human lives, especially in a home setting. A smart home is a collection of Internet connected devices that are used for automation, security and even entertainment, within a house. In this paper, we will use the term Internet of Things (IoT) to refer to these devices. The global smart home market is forecasted to exceed 53 billion US dollars by 2022 [1] while smart home devices, like sensors, plugs, switches, smart speakers and smart home security cameras were among the most popular smart devices sold worldwide in 2017 and 2018 [2]. Although IoT devices continue to be adopted in the home at an alarming rate, there continues to be reports of cyber attacks and privacy issues with them [3, 4]. In a recent study conducted by Avast, two out of every five smart homes worldwide have at least one IoT device that is susceptible to cyber attacks [5]. Such prevalence necessitates conducting more research into developing better methods of increasing IoT device security and privacy for smart home owners. Security and privacy are two requirements smart home owners are becoming more concerned with experiencing from their IoT devices as 75% of persons do not trust how their IoT devices handle and share their data [6]. In this paper, we describe our smart home (IoT) lab setup, provide an overview of conducting a forensic investigation of smart home devices and discuss how the lab can be used to investigate possible threat scenarios that effect common smart homes today. The IoT lab will be used by the UMIT2 (Ubiquitous and Mobile Investigative Techniques and Technologies) Research group as well as the Digital Forensics and Cyber Security departments at Purdue University to allow students and faculty access to some of the popular and newly released IoT devices for use in classes and novel research endeavors. Data generated from the IoT lab will facilitate our quest to find answers to the following research questions: 1. What data can be recovered from smart home devices along with their respective smartphone applications (apps)? 2. Are there any privacy concerns when using these smart home devices? 3. Are there any security vulnerabilities when using these smart home devices? 4. What methods would be best suited for collecting and analyzing smart home device data? 5. What data do these smart home devices share with each other? The rest of this paper is organized as follows: Section 2 provides background information on IoT forensics and Smart Home devices. In Section 3 we identify the components of our smart home lab while in Section 4 we present the digital forensic investigative process and how this process was used in our lab. In Section 5 we discuss possible threat scenarios that effect smart homes. In Section 6 and Section 7, we discuss the student involvement in this research as well as how our smart home lab will be used to further the educational activities at Purdue University with current industry reach-out efforts. Finally, we conclude our work in Section 8. 2 Related Work In this section, the related work and background information regarding challenges and frameworks in IoT forensics and Smart Home devices are discussed. We pay particular attention to the challenges faced as they relate to IoT devices, IoT Forensics, and Smart Home security. As discussed in Section 1, IoT devices are employed in various disciplines, therefore it is important to ensure their security. On the other hand, IoT devices pose security and forensic challenges due to some novel factors in IoT forensics. These novel factors include (1) the presence of large amounts of data in diverse formats which lack real time log analysis, (2) the restricted visibility of data with a low survival evidence period, (3) the restricted access to cloud data due to service level agreements, (4) the complex computing architectures, and (5) proprietary hardware and software [7]. The need for securing IoT devices and detecting cyber attacks geared toward IoT devices is increasing daily. Conti et al. [8] pointed out some major challenges for IoT environment security as: (1) the need for efficient authentication with distribution and management of keys, especially in the absence of Certificate Authority, (2) authorization to each type of IoT node with limited access, (3) identifying the nodes and collecting private data while notifying the users of data management, and (4) the need of a secure architecture that caters to Software Defined Networks and Cloud Infrastructure. While these were some of the security challenges, the authors also shed light on some of the forensic issues, such as (1) the lack of various methods for creating forensic images of IoT devices, (2) the lack of logging time records thus making evidence correlation strenuous, and (3) the absence of proper documentation of the activity makes it difficult for identification purposes. In order to increase the familiarity with data residue from different IoT devices and show how they can be useful for investigative purposes, a recent study [9] was conducted by Servida and Casey. During their analysis, the authors found that the user commands allow the system activity logs and the event details to be recorded by the IoT devices and smartphones. The authors also discussed the challenges they faced while analyzing the IoT devices. One of the issues was the analysis of numerous, unstructured network traffic packets alongside a few limitations in configuration setting. Due to the disordered nature of network packets, there are some latency issues on the physical devices. As the home environment has increasingly become a part of the internet due to the different devices that are connected, a study in [10] informs readers that smart home environments will be a source of evidence in the near future.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    20 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us