Статья

Security challenges and cyber forensic ecosystem in IoT driven BYOD environment

M. Ali, S. Kaur, A. Khamparia, D. Gupta, S. Kumar, A. Khanna, F. Al-Turjman,
2021

The usage of Internet of Things (IoT)/ Bring Your Own Devices (BYOD) has grown up exponentially, as expected 50 Billion IoT devices will get connected by the end of 2020 in the world in smart city environment. Advancement of Human Driven Edge Computing (HEC) with 5th Generation Internet services also makes this more feasible. Use of IoT and increased demand of BYOD becomes one of the fundamental needs to increase the organization employee productivity and business agility. But it increased the significant risk of the cyber-attack which is leading a major reason for business disruption and becomes a leading question about how to get a cyber secured citizenship in the smart city environment as well as in the organization where BYOD is used in large numbers. In order to conduct forensic investigation post incident detection of malicious activities from IoT/BYOD end point is most challenging task. A strategic practical approach in this research is presented to detect malicious activities so that organization can adopt to protect the critical infrastructure and smart city critical infrastructure. In order to achieve the goal of detecting of malicious activities in BYOD environment, simulation performed in 3 phases. The 1st phase of the simulation performed while BYOD endpoint was outside the organization over the internet without VPN. The 2nd phase of the simulation was performed where BYOD endpoint was securely onboarded using a corporate wireless network with a secured onboarding process. The 3rd phase of the test done where IoT/BYOD was outside the organization with a VPN. A unique robust scalable model puts forward with significant result from this research and concluded for creating a cyber forensic ecosystem in IoT/BYOD environment to enable cyber secured citizenship in era of HEC with 5G and IoT. © 2020 Institute of Electrical and Electronics Engineers Inc.. All rights reserved.

Цитирование

Похожие публикации

Источник

Версии

  • 1. Version of Record от 2021-04-27

Метаданные

Об авторах
  • M. Ali
    Department of Computer Application, Lovely Professional University, Phagwara, 144001, India
  • S. Kaur
    School of Computer Science and Engineering, Lovely Professional University, Phagwara, 144001, India
  • A. Khamparia
    Maharaja Agrasen Institute of Technology, New Delhi, 110086, India
  • D. Gupta
    Department of Computer Science, South Ural State University, Chelyabinsk, 454080, Russian Federation
  • S. Kumar
    Artificial Intelligence Department, Research Center for AI and IoT, Near East University, Nicosia, 99138, Turkey
  • A. Khanna
  • F. Al-Turjman
Название журнала
  • IEEE Access
Том
  • 8
Страницы
  • 172770-172782
Ключевые слова
  • 5G mobile communication systems; Computer forensics; Critical infrastructures; Ecosystems; Network security; Public works; Smart city; Virtual private networks; Bring your own devices; Business disruption; Employee productivity; Forensic investigation; Incident detection; Internet of Things (IOT); Malicious activities; Security challenges; Internet of things
Издатель
  • Institute of Electrical and Electronics Engineers Inc.
Тип документа
  • journal article
Тип лицензии Creative Commons
  • CC
Правовой статус документа
  • Свободная лицензия
Источник
  • scopus