Digital investigation of wireless sensor networks - IRIS mote

Document Type

Conference Proceeding

Source of Publication

2018 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2018

Publication Date

1-17-2019

Abstract

© 2018 IEEE. For forensically analyzing incidents, it is important to gather as much data about the incident as possible. In the case of WSNs, this means that data has to be extracted from the sensor nodes, when a compromise or other security incident occurs. Among the data to be extracted are the program running on the node, so it can be analyzed for tampering, as well as the log and configuration flash memory usually stored on a separate chip on the sensor node. In this paper we will present how to perform an extraction of RAM, program memory, and flash memory with their necessary tools, and steps. Finally, information about the compromise can be gathered from the node’s RAM, program, and flash memory especially if for example a vulnerability in the software running on the node was exploited, the (commonly small) RAM, program, and flash memory can be examined for anomalies.

ISBN

9781728101354

Publisher

Institute of Electrical and Electronics Engineers Inc.

First Page

183

Last Page

188

Disciplines

Computer Sciences

Keywords

Data mining, Flash memory, Information systems, Information use, Random access storage, Digital investigation, Program memory, Security incident, Sensor nodes

Scopus ID

85062424040

Indexed in Scopus

yes

Open Access

no

Share

COinS