@IoT Forensics Addressing Challenges and Establishi 2025
@IoT Forensics Addressing Challenges and Establishi 2025
Abstract:
IoT forensics is a form of digital forensics that focuses specifically on the investigation of
security incident detection and the accumulation and analysis of evidence to eliminate future
attacks upon IoT networks. It is differentiated from other kinds of digital forensics due to several
unique characteristics present in IoT equipment, such as low processing capacities and
connectivity features. The science is rapidly transforming, and reviewing the entire activity to
keep it abreast of new threats and best practices should be done very often. This paper reviews
the present state of IoT forensics and outlines the challenges investigators face. Also, a
framework is devised to mitigate these issues and help in a smooth process of data analysis. For
this, relevant reviews are analyzed to find key issues and significant obstacles in the field. Many
problems emerge in the collection and preparation of evidence, largely because of counter-
analysis techniques and challenges in data gathering from devices and the cloud. The analysis
also highlights procedural issues concerning preparedness, reporting, and ethical considerations.
We have identified the challenges of the existing research, which will help guide future studies
and, thus our contribution to the IoT forensics field.
Keywords: IoT, digital forensics, cloud forensic, proactive and reactive forensics, digital
evidence.
of IoT devices in our lives, including their
1. Introduction misuse in criminal activities [3]. IoT forensics
The Internet of Things, or more commonly involves the collection, analysis, and
referred to as IoT, is a group of devices preservation of digital evidence from these
equipped with electronics and software along devices for legal cases or incident
with sensors that can share data and investigations. Critical areas of focus in this
communicate with each other. It helps field are: Extracting evidence from IoT
automate processes and enables cooperation devices, Analyzing network communications,
among different industries, such as healthcare, Designing special tools and methodologies for
agriculture, transportation, and manufacturing the unique challenges posed by various IoT
[1], [2]. Nevertheless, several issues need to be devices, Enhancement of reliability of forensic
fixed, such as security problems, lack of evidence, and Setting standards for IoT
standard rules, and risks of hacking. These forensics practices [4].
problems need to be solved in order to fully Most application domains give a clear view
unleash the benefits of IoT and to protect of the IoT, including cloud computing,
privacy and data. There is also an increasing agriculture, smart homes, manufacturing,
demand for IoT forensics with the growing use supply chains, and smart cities, all connected
SJCMS | P-ISSN: 2520-0755| E-ISSN: 2522-3003 | Vol. 8 No. 1 Jan – Jun 2025
43
Solangi, S. A., IoT Forensics: Addressing Challenges and Establishing a Framework for Exploring Digital Forensics
(pp. 43-55)
through the Internet. IoT technology has
enabled remarkable advancements, allowing
for the interconnection of uniquely identifiable
physical devices [5]. This includes sensors,
Radio Frequency Identification (RFID) tags,
and sensor networks that monitor greenhouse
systems. These sensor networks are the
backbone of managing agricultural processes
and water distribution in smart cities [6-9]. The
integration of IoT into life has brought many Fig 1: Worldwide IoT devices connections [13]
benefits through its applications, but this also IoT connectivity intertwines and integrates
generates a large amount of data on a daily nearly every system, device, standard, and
basis, thus creating new paradigms and protocol of ICT networks, presenting a high
security issues concerning evidence-based degree of heterogeneity, thereby increasing
information. Recent developments in challenges in the area of security and privacy.
Information and Communication Technology Hence, any loophole in security can be
(ICT) have sparked a dramatic increase in determined and exploited by attackers. An
connectivity and use of IoT devices. expert cyber-criminal can strategize an attack
According to IDC, connected IoT devices using public or open networks or private
would reach more than 41.6 billion by 2025," networks and sources, like smart homes,
and "IoT utilization worldwide was estimated smartphone, or smart cars. Therefore, all those
at USD 772.5 billion in 2018 with a growth of malicious actions related to data theft of
14.6% in IoT consumption during 2017." personal or organizational information can be
According to IDC and Gartner, the CAGR in seen as a huge threat to people and the business
IoT device consumption will jump to 1.1 integrity [11], [14].
trillion by the end of 2021, and over and above
everything, the interest in these devices is IoT forensics represents one of the most
going to spread out across a myriad of sectors, powerful tools in the spectrum of key
indicating tremendous opportunities for applications: criminal investigations, incident
growth till the year 2028 [10], [11]. response, and litigation. It is a beacon in the
criminal investigation approach: the extraction
As envisioned by Gartner, installation in of critical digital evidence from the IoT device
2019 was projected at 26.66 billion while in illuminates the possible route to justice. It
2020 was expected to rise at 30.73 billion with unravels, in the context of incident responses,
an exponential rate of 35.82 billion in 2021. the origin and scope of security breaches
Total IoT installed devices are predicted to involving connected devices, thus keeping
reach a considerable number close to 75.44 organizations in control [14]. The legal
billion with the curve demonstrated in Fig. 1 processes rely on the integrity of IoT forensics
[12], [13]. However, the large amount of data to gather and safeguard data that can stand
generated by IoT requires the need for IoT strong in court as evidence, preserving truth
forensics and investigations, along with and accountability. This multi-phased journey
privacy concerns about data usage. Security of IoT forensics consists of critical steps,
and privacy are undoubtedly paramount, starting with the careful seizure and protection
especially as IoT-driven productivity increases of IoT devices to uphold their integrity. It
across businesses, governments, and top progresses through both volatile and non-
management levels. Since IoT systems handle volatile extraction of data and then into
important and sensitive information, any profound analysis of communication on the
vulnerability could lead to significant risks and network and data, which delivers significant
cyber-crimes. and relevant information and connections. It
culminates with analytical results speaking to
the facts. Researchers, each with their own
Sukkur IBA Journal of Computing and Mathematical Science - SJCMS | Vol. 8 No. 1 Jan – Jun 2025
44
Solangi, S. A., IoT Forensics: Addressing Challenges and Establishing a Framework for Exploring Digital Forensics
(pp. 43-55)
courage in facing the multi-faceted challenges 2. Background
they come across with IoT, manage operating
A digital forensics framework, also known
systems, storage systems, data formats, and
as a digital forensic process model, is a series
bridge them up by creating solutions. It follows
of steps with the related inputs, outputs and
on to reliability and consistency in forensic
requirements with which assistance is given
evidence gathering and the establishment of
toward a successful forensics
strong standards for IoT forensics [15-17].
investigation[18], [19]. A digital forensics
Network communication analysis delves into
framework powers forensic investigators as
the intricacies of network traffic and
well as any other related personnel to carry
interaction records, which are used to
meaningful investigations and administer
determine the behavior of devices and their
justice by unearthing criminals and bringing
interconnections, thereby improving our
the perpetrators to task. This allows a
understanding of this dynamic realm.
structured framework for each investigative
IoT devices generate data with such phase, providing for timely actions that are
complexity and high volumes that digital relevant and effective for the case being
forensic investigations become much more investigated. Implementing these
complicated. Most information is stored in considerations will allow reconstructing the
IoT-based clouds, making data acquisition and time line of all events and pertinent data with
retrieval very difficult due to SLAs and data ease. The most critical stage in this regard is
volatility. Effective digital forensics, therefore, the careful maintenance of evidence chain of
require systematic research in IoT areas as the custody because it serves as the guarantee to
infrastructure is changing rapidly [17]. No win these battles and secure the truth triumph
matter whether it is virtualized or traditional in court.
computing, proper procedures must be
Different investigation models, tailored to
followed along with legal analysis of evidence.
specific phases and levels of detail, are
Some of the major challenges include a lack of
essential for effectively addressing various
forensic tools, heterogeneous data, ambiguous
types of investigations. In this regard, Kohn et
locations of data, and information volatility.
al. provides an integrated suitability
The collection of data from the distributed IoT
framework maps a set of requirements derived
network poses technical and legal obstacles
from an ongoing investigation to the most
due to limited storage and integrity issues
appropriate forensic procedure [20]. Finally,
among devices. Additionally, they need
the authors make use of a graph-based
reliable forensic tools and secure custody
approach, illustrating the interrelation between
chains. Identifying these primary research
well-known forensic frameworks: number of
design challenges is crucial for advancing
phases and their respective content. Notable
digital and IoT forensic investigations.
frameworks are the Analytical Crime Scene
This research article comprises five Procedure Model, abbreviated as ACSPM
sections. Section I provides a succinct [21], the Systematic Digital Forensic
introduction to the IoT and digital forensics Investigation Model, abbreviated as SRDFIM
and the nature of the research. A literature [22], and the Advanced Data Acquisition
review of existing research related to digital Model, abbreviated as ADAM [23]. In general,
forensics with suggested designs is provided in law enforcement agencies follow their variant
Section II. In Section III, an overview of some of the guidelines provided by the Association
of the digital IoT forensics is provided. In of Chief Police Officers, ACPO [24]. In
Section IV, key challenges within the existing addition, additional forensic guidelines and
forensic research design are provided with the models recommended by NIST and
identification of the research gap.The proposed INTERPOL can be found in [25-32].
framework for the digital forensics is discussed
Table 1 summarizes the most widely
in Section V. Finally, the conclusion and future
known digital forensic frameworks. In general,
directions are provided in Section VI.
the procedures listed in Table 1 share a
Sukkur IBA Journal of Computing and Mathematical Science - SJCMS | Vol. 8 No. 1 Jan – Jun 2025
45
Solangi, S. A., IoT Forensics: Addressing Challenges and Establishing a Framework for Exploring Digital Forensics
(pp. 43-55)
common hierarchical structure [33], [34] that Whereas for forensic guidelines and
can be grouped into the steps described in frameworks, in parallel, standards are
Table 1. Notice how some of the models detail extremely important to obtain conformance in
finer granularity for a subset of the steps where addition to inter-compliance geographical and
the context of the investigation requires it-for jurisdiction borders. There already are many
example, particular appliances and constraints numbers of standards plus established
on seizure or acquisition. In the case of chain practices with organizations worldwide being
of custody and trail of events preservation, a applied using appropriate methods. On how to
forensically sound procedure must ensure practically go about such a forensic treatment
features like integrity traceability, on a certain investigation, such details vary due
authentication, verifiability and security [35], to the particular device. As shown in Table 12,
[36]. the phases of electronic evidence analysis are
typically categorized as stated. However, the
Several authors also identified some exact phases' name may be different because
problems in digital investigation processes different forensic models may be used
during earlier times, that is [37-45] mainly
according to each organization's needs.
related to the preservation of chain of custody,
the growth of the data to be processed, and The huge amount of information exchange
privacy and ethical issues when collecting such demands much more attention related to cyber-
data. Furthermore, our research methodology security. The IoT forensic and digital forensic
discovered a number of literature reviews investigation has a lot of research suggestions
which addressed the challenges and limitations in different application domains by numerous
of forensic frameworks. For example, in [44], research scholars throughout the world, still
the authors used a graph analysis methodology require an effective framework for
for leveraging a summary of digital forensic consideration concerning the digital forensics.
frameworks and tools along with their
interrelationships. Moreover, they presented 3. Digital Forensics Challenges
some challenges and limitations of privacy-
preserving digital investigation models and There are certain factors which
proposed some measures to palliate them. In significantly affect the IoT forensics process.
[45] the authors present a chronological review First, the explosion of big data which have
of the most well-known forensic frameworks created large data, and lack of real-time log
and their characteristics. The work in [46] analysis. Second, the varied and numerous
assesses the current frameworks among devices, most of them having heterogeneous
European law enforcement agencies, functionalities, and resources limitations.
identifies, and defines elements of robustness Third, the complexity comes in both forms
and resilience in the context of sustainable namely a huge number of devices or data, and
digital investigation capacity so that heterogeneous operating systems as shown in
organisations can adapt and overcome Fig. 2. Fourth, the data diffusion from multiple
deviations and novel trends. In [43], the platforms and systems such as data-ware
authors identified the need to define specific houses, databases etc. Fifth, different vendors
models according to the forensic context, such and different standards are adopted and applied
as in the case of Mobile Forensics [43]. In by proprietary hardware and software
addition, the authors provided a specific companies. Sixth, the legal process of the data
forensic framework to enhance the Mobile collection and usage from the indigenous and
Forensics investigation. Additional reviews of or cross-borders perspectives. Seventh, the
the most widely applied forensic frameworks varied data formats and storage of capacity of
and their characteristics are available in [47], the data in either phone memory or at the data
[48]. Table 14 summarizes the key identified centers impose challenges in the digital
challenges of each literature review in forensic forensic processes.
frameworks.
Sukkur IBA Journal of Computing and Mathematical Science - SJCMS | Vol. 8 No. 1 Jan – Jun 2025
46
Solangi, S. A., IoT Forensics: Addressing Challenges and Establishing a Framework for Exploring Digital Forensics
(pp. 43-55)
Apart from this, the IoT enables various nature IoT, in turn, is complex to ensure those
devices to connect over networks, creating are authenticable to users always. Users can
significant security problems. Public networks create trust by using dependable services and
must be constantly monitored to protect users' key sharing for the transmission of data. Key
IoT systems from cyber attacks. Weakness in management and encryption facilitate trust in
security provides a chance for attackers to the incoming and outgoing information.
harm the user and invade his privacy. These
cyber attackers can use DoS, sniffing, data 4. Investigations related to Digital
modification, malware attacks, MiTM attacks,
and Trojan horses among others. Many Forensics and existing frameworks
organizations have reported significant
damage and losses due to these types of
In Digital Forensics (DF), the investigation
attacks. Smart tablets, smartphones, and
process for the information related to security
personal computers will need secure and
can be revealed through how, when, where,
reliable settings with strong encryption
and what incident has taken the place. In other
protocols. IoT security challenges include
words,. Digital Forensic is the process of
privacy and authentication, device variety, and
identification, collection, examination, and
policy issues. The current security protocols
analysis of digital evidence found in the digital
still require more research. As the exchange
devices under criminal investigation. The
between devices needs to be confidential. The
collected evidence present in the court of law
requirement increases if devices monitor data
for legal proceedings. Therefore, emerging IoT
without human oversight. But preserving
devices proliferation made it a bit difficult for
confidentiality requires protection against any
examiners to carry out satisfying results. Most
unauthorized changes in the data—as
of the organization, on the other hand, are
confidentiality demands integrity in addition.
reluctant to ponder about cyber-security issues.
Even though cyber-security demands focused
consideration.
However, the traditional method for the
digital evidence investigation is not applicable
to the IoT forensic due to the huge amounts of
IoT data, Integration of IoT and the Cloud,
legal, and technical issues.. The traditional
method for the investigation can be both the
evidence collection from the primary sources
namely PCs (Personal Computers), main
servers, laptops, mobile phones, and gateways,
or IoT devices such as home appliances,
medical devices, sensors, and many other
smart IoT devices. Consequently, the digital
forensics and related investigation is still
Fig. 2: Digital Forensics Security Stages [source: impromptu and requires a comprehensive
the Internet]
framework for the investigators in a volatile
Privacy in IoT-based systems demands digital forensic environment.
excellent security. Consideration from
In the investigation process of DF, the
viewpoints of user's and data point of view -
technical areas are supposed to require deep
privacy is absolutely necessary. While IoT
and comprehensive research. Also, the
devices observe the environment with their
ownership and jurisdictional issues are the
sensors collect the data sensed, process that
same from the legal perspective. Because
data and submit it to end users for an analysis.
forensics tools are incapable to delve into the
So, users do rely on them. However because of
investigation process due to different IoT
Sukkur IBA Journal of Computing and Mathematical Science - SJCMS | Vol. 8 No. 1 Jan – Jun 2025
47
Solangi, S. A., IoT Forensics: Addressing Challenges and Establishing a Framework for Exploring Digital Forensics
(pp. 43-55)
devices and their proprietary designs and process of the data, whereas the data storage is
ambiguous data storage places and network likely to be replicated [37-40].
approaches [35]. On the other hand, some
traditional approaches in the DF are relatively 2. Understanding:
involved to carry out the desired results based At this level, the help of tools and
on the standardization processes. Traditional technology is needed for the support of
processes mainly focus upon the information evidence, and authorization is required for
sources namely, Random Access Memory monitoring and accessing the overall system. It
(RAM), HDDs (Hard Drives), logs, histories, resolves the complex tasks in CC platforms
and any connected storage source. through the recovery of deleted data from
Interestingly, the traditional method of Backups, Repositories, Snapshots, Mobiles as
investigation comprises a range of malicious shown in Fig 3. Examining the partial
network activity detection. In this detection evidence is a real risk because partial or
method, the data traffic passing through the incomplete evidence may be inadmissible in
network is closely analyzed and stored. When court [41-43].
it comes to mobile cellphone crimes, the DF
investigation method leverage significant 3. Reporting:
challenges for the preservation of the evidence Reporting comprises the approaches
and the encryption techniques for a volatile to formulate a dynamic technological question
environment. The data collection and analysis that strongly supports the evidence and reflects
from both the legal perspective and technical the potential impact on witnesses. It requires
perspective is with all supporting facts the reconstruction of the crime scene as shown
presented before the court for further actions. in Fig 3. It needs state-of-the-art digital
Therefore, the legal and technical issues with forensic related valid tools and process and
data representation for necessary proceedings guidelines, and evidence. Due to the
in the courts require the traditional and state of complexity of the IoT environment sometimes
the art digital forensics investigation expertise it is difficult to make understanding the jury
to disclose the real facts about the crime [36]. about the crime scene as depicted in Fig 3.
In the last one and a half decades,
various research contributions have suggested
different solutions and frameworks in the
fields of DF. The suggested research studies
not only contributed to the information and
communication technologies but also in
improved frameworks and models.
A digital forensics framework consists of
the stages of digital forensics that are given
below:
1. Identification:
In this stage, incident location and
unknown crime location are focused.
Assurance of service manageability, service Fig 3: Main challenges of the digital forensics.
availability, and flexibility is affected by CSPs.
SLA guidelines mostly focused upon security 4. Close
needs than forensic needs as illustrated in Fig It ensures the digital and physical
3. SLA specifications and log framework on properties of the returning of the evidence. So,
both physical machines and data centers are this stage advocated the return of evidence and
permissible for the creation, storage, and secure the deletion of the data. Legal training
Sukkur IBA Journal of Computing and Mathematical Science - SJCMS | Vol. 8 No. 1 Jan – Jun 2025
48
Solangi, S. A., IoT Forensics: Addressing Challenges and Establishing a Framework for Exploring Digital Forensics
(pp. 43-55)
and legal advice are required as shown in Fig Numerous digital forensics research has
4. been proposed with different methods for
investigations that rely purely on the types of
5. Examination cases and investigation areas. For two decades
The examination comprises insightful and the research has been carried out by suggesting
valid systemic research for the evidence. frameworks or designs for compromising
Creates challenges in the timelining of events results. Therefore, the categories are divided
and logs help an investigator to connect the into seven stages. Each stage is further
dots as illustrated in Fig 4. categorized into a specific sub-stage or as a
cloud forensic design challenge. In Table 1,
6. Collection digital forensics design comparisons for a
At this level of digital forensics, the crime specific category are given. So, many research
scene evidence collection with all supporting scholars proposed the research designs by their
data to the suspected crime scene is collected specific contribution identification of SLA
or recorded. Sometimes, a snapshot of virtual design, log frameworks, decentralized data,
machine or forensic image is a process of and CSP based dependency [42], [46-59], [67].
making a clone of a virtual image including the Various research designs have been suggested
running system’s memory. It adds to the for each digital forensics area in the stage of
complexity of forensics data collection and understanding the cyber-crime namely
easy to seize the hardware as shown in Fig 3. recovery of the deleted data from cellphones,
laptops, and others [47] [51-54], [56-64].
7. Preservation: Partial returning of the partial evidence and
Preservation is based on the data information related to the cyber-crime [42],
volatility, data integrity, data isolation, and [47-50], [52], [66]. Cryptographic data
valid state of the data whether it is in the form recovery in mobile devices namely computers,
of digital evidence or physical evidence. So, laptops, and cellphones in suggested by [27]
state-of-the-art forensic techniques and cloud [53] [59], [44], [63] as shown in Table 1. Some
provider’s expertise use their crucial research scholars specifically focused upon the
environment. Therefore, having persistent reporting, close or returning of the evidence,
storage and keeping the storage synchronized examination and collection the crime- scene
is suggested by researchers to counter the data related information and collection all main
volatility issues as shown in Fig 3. supporting points which strengthen the
evidence are suggested in [41-52], [56-74] that
After following all these stages and advocated about the crime-related data
completing the requirements the data is further gathering and maintaining information. To
analyzed for presentation. The data validate the evidence, it is essential to maintain
presentation incorporates all necessary steps to and lining the data with the evidence digital
identify, validate, and support all legal and signatures. Storage data recovery, and fully or
technical aspects which strongly support the partially deleted data recovery and its
suspected crime. The suspected crime scene verification regarding the multi-tenancy and
reconstruction, no doubt, requires potential resource sharing also demands a significant
expertise. This relates to the physical and consideration as shown in Table 1. In the data
digital evidence that supports and validates the and evidence preservation stage, various
case. Due to the prevalence of DF as a complex challenges of the design have been cited with
infrastructure, forensics investigators confront the corresponding solution in [26] [42] [47]
new challenges that require comprehensive [48] [52] [53] [50] [43] [59] [46] [56], is the
and potential knowledge. Thus, the forensics data integrity and chain of custody. In data
investigator must be equipped with state-of- integrity and privacy, and SLAs are those
the-art knowledge and possess the expertise to issues, having almost the same number of
tackle the challenges. solutions with all the others added up as shown
in Table 1.
Sukkur IBA Journal of Computing and Mathematical Science - SJCMS | Vol. 8 No. 1 Jan – Jun 2025
49
Solangi, S. A., IoT Forensics: Addressing Challenges and Establishing a Framework for Exploring Digital Forensics
(pp. 43-55)
TABLE I: Overview of digital forensics stages mentioned stages and sub-categories possess a
and corresponding challenges quite enriched future for future research as
represented in Table 1.
Forensics
Stages framework References
challenges
5. PROPOSED FRAMEWORK FOR
THE DIGITAL FORENSICS
Not accessible
[30-67]
Identification
location-wise or
Unknown In this section, the proposed digital
Decentralized [43] [42] [46-48] forensics framework includes phase-wise flow
Data [50-69] for an effective process as shown Fig. 4.
[41] [47] [51] [52] Particularly, this framework covers all
CSP based
[53] [54] [55] [56]
Dependency
[57] [58]
essential areas from preparation of the
[47] [52] [51] [41] investigative to the finalization of the evidence
Recovery of collection. But, the devised phases help to
Understanding
Crime scene
[42-54] four phases for this framework, and each phase
reconstruction
[41] [27] [38] [47] is formalized encompassing important steps.
Complexity of
cloud
[48] [59] [53] [63] Phase 1 deals with the preliminary preparation
[70] of the process for the evidence gathering by
Return of going through the planning for process by
Close
Sukkur IBA Journal of Computing and Mathematical Science - SJCMS | Vol. 8 No. 1 Jan – Jun 2025
55