| Literature DB >> 35265114 |
Fahad Mazaed Alotaibi1, Arafat Al-Dhaqm2,3, Yasser D Al-Otaibi4.
Abstract
The Drone Forensics (DRFs) field is a branch of digital forensics, which involves the identification, capture, preservation, reconstruction, analysis, and documentation of drone incidents. Several models have been proposed in the literature for the DRF field, which generally discusses DRF from a reactive forensic perspective; however, the proactive forensic perspective is missing. Therefore, this paper proposes a novel forensic readiness framework called Drone Forensics Readiness Framework (DRFRF) using the design science method. It consists of two stages: (i) proactive forensic stage and (ii) reactive forensic stage. It considers centralized logging of all events of all the applicants within the drone device in preparation for an examination. It will speed up gathering data when an investigation is needed, permitting the forensic investigators to handle the examination and analysis directly. Additionally, digital forensics analysts can increase the possible use of digital evidence while decreasing the charge of performing forensic readiness. Thus, both the time and cost required to perform forensic readiness could be saved. The completeness, logicalness, and usefulness of DRFRF were compared to those of other models already existing in the DRF domain. The results showed the novelty and efficiency of DRFRF and its applicability to the situations before and after drone incidents.Entities:
Mesh:
Year: 2022 PMID: 35265114 PMCID: PMC8901304 DOI: 10.1155/2022/8002963
Source DB: PubMed Journal: Comput Intell Neurosci
Figure 1Metamodeling approach [38].
Results of search engines.
| Database search engines | Number of drone forensic-related articles |
|---|---|
| Web of Science | 10 |
| Scopus | 20 |
| IEEE Explore | 5 |
| Springer Links | 6 |
| Google Scholar | 80 |
| ACM | 1 |
| Science Direct | 10 |
|
|
|
The bold values mean the total articles which were collected from search engines.
Development and validation models.
| Id | Models references | Year | Authors | Focuses |
|---|---|---|---|---|
| 1 | [ | 2015 | Mhatre et al. | A forensic examination of the flight path reconstruction method for DJI Phantom 2 Vision Plus. |
| 2 | [ | 2016 | Horsman | Investigation and analysis of both the DJI Phantom II and DJI Phantom III model UAVs. |
| 3 | [ | 2016 | Mohan | Testbed model of evidence acquisition from UAVs |
| 4 | [ | 2016 | Kovar et al. | Preliminary digital forensic analysis of Parrot Bebop UAV (capable of 1080p HD footage and 14 megapixels still images, a 2.4 GHz or 5 GHz Wi-Fi band, s, flight distances can extend beyond 2000 m and to a maximum altitude of 150 m). |
| 5 | [ | 2016 | Maarse et al. | Development of visualization tool for drone analysis. |
| 6 | [ | 2016 | Procházka | Drones vulnerabilities |
| 7 | [ | 2017 | Prastya et al. | Drone forensic framework: Sensor and data identification and verification. Specifically, this research analyzes the architecture of drones and then proposes a generic model that is aimed at improving digital investigation. |
| 8 | [ | 2017 | Jain et al. | DROP (DRone Open-source Parser) your drone: Forensic analysis of the DJI Phantom III. |
| 9 | [ | 2017 | Clark et al. | Mainly Forensic Analysis of Unmanned Aerial Vehicle to Obtain GPS Log Data as Digital Evidence. This has been achieved through Digital forensic evidence extraction through the simulation of a UAV scenario that explicitly uses drones. |
| 10 | [ | 2017 | Bucknell and Bassindal | An investigation into the effect of surveillance drones on textile evidence at crime scenes. |
| 11 | [ | 2017 | Llewellyn | Drone Forensic Investigation: DJI Spark Drone as A Case Study. |
| 12 | [ | 2017 | Barton and Azhar | Autonomous Arial Vehicles in Smart Cities: Potential Cyber-Physical Threats. |
| 13 | [ | 2017 | Renduchintala et al. | An agent-administrator-based security mechanism for distributed sensors and drones for smart grid monitoring. |
| 14 | [ | 2018 | Bouafif et al. | Drone Forensic Analysis Using Open-Source Tools in The Journal of Digital Forensics, Security and Law. |
| 15 | [ | 2018 | Roder et al. | Drone Forensics: Challenges and New Insights. |
| 16 | [ | 2018 | Maune | Unmanned aerial vehicle forensic investigation process: DJI Phantom 3 drone as a case study. |
| 17 | [ | 2018 | Benzarti et al. | Unlocking the Access to the Effects Induced by IEMI on a Civilian UAV. |
| 18 | [ | 2018 | Gülataş and Baktır | Unmanned Aerial Vehicle Digital Forensic Investigation Framework. |
| 19 | [ | 2018 | Dawam et al. | Privacy preservation and drone authentication using ID-Based Signcryption. |
| 20 | [ | 2018 | Esteves et al. | A comprehensive micro unmanned aerial vehicle (UAV/Drone) forensic framework. |
| 21 | [ | 2018 | Shi et al. | Antidrone system. |
| 22 | [ | 2018 | Guvenc et al. | Techniques of detecting and tracking UAV. |
| 23 | [ | 2018 | Ding et al. | Amateur Drone Surveillance Systems. |
| 24 | [ | 2019 | Renduchintala et al. | Drone Forensics: Digital Flight Log Examination |
| 25 | [ | 2019 | Fitwi et al. | The effect of tape type, taping method, and tape storage temperature on the retrieval rate of fibres from various surfaces: An example of data generation and analysis to facilitate trace evidence recovery validation and optimization. |
| 26 | [ | 2019 | Jones et al. | Drone Disrupted Denial of Service Attack (3DOS): Towards an Incident Response and Forensic Analysis of Remotely Piloted Aerial Systems (RPASs). |
| 27 | [ | 2019 | Salamh and Rogers | Electromagnetic Watermarking: exploiting IEMI effects for forensic tracking of UAVs. |
| 28 | [ | 2019 | Esteves | An Approach to Unmanned Aircraft Systems Forensics Framework. |
| 29 | [ | 2019 | Esteves et al. | Detecting Drones Status via Encrypted Traffic Analysis. |
| 30 | [ | 2019 | Le Roy et al. | Assessing and Exploiting Security Vulnerabilities of Unmanned Aerial Vehicles. |
| 31 | [ | 2019 | Sciancalepore et al. | Risk assessment of SDR-based attacks with UAVs. |
| 32 | [ | 2020 | Lakew Yihunie et al. | Forensic analysis of the Parrot AR Drone 2.0 GPS Edition and its peripheral components. |
Common concepts and processes.
| No. | Propose common processes and concepts | Candidate concepts and processes | Frequency |
|---|---|---|---|
| 1 | Monitoring and capturing | Monitoring and capturing | 3 |
| Seizure | 1 | ||
| 2 | Data Acquisition | Gathering evidence | 1 |
| Data acquisition | 3 | ||
| 3 | Intruder Activity | Intruder's transactions | 1 |
| Intruder activity | 2 | ||
| Malicious transaction | 1 | ||
| 4 | Data Collected | Data collected | 8 |
| Acquired data | 1 | ||
| 5 | Reconstruction | Reconstructing log events | 1 |
| Reconstruction | 5 | ||
| Reconstruction event | 1 | ||
| Reconstructing | 1 | ||
| 6 | Hashing | Hashing | 4 |
| 7 | Examination | Examination | 5 |
| 8 | Backup | Backup | 5 |
| 9 | Preservation | Preservation | 4 |
| 10 | Investigation Team | Investigation Team | 9 |
| Forensic examiner | 1 | ||
| Examiner | 1 | ||
| 11 | Integrity | Evidence integrity | 1 |
| Integrity | 2 | ||
| 12 | Source | Resources | 1 |
| Source | 5 | ||
| 13 | Evidence | Evidence | 6 |
| 14 | Drone Incident | Event | 4 |
| Drone Incident | 5 | ||
| 15 | Hashed Value | Hashed Value | 3 |
| 16 | Rehashing | Rehashing | 3 |
| 17 | Log File | Log file | 8 |
| database log file | 1 | ||
| 18 | Incident Responding | Incident response | 1 |
| Incident responding | 1 | ||
| 19 | Drone | Drone | 7 |
| UAV | 5 | ||
| 20 | Court | Court | 5 |
| Court of law | 2 | ||
| 21 | Live Response | Live response | 3 |
| 22 | Forensic Technique | Forensic Techniques | 2 |
| Investigation extraction methods | 1 | ||
| 23 | Timeline | Timeline | 5 |
| 24 | Interview | Interview | 2 |
| 25 | Volatile Artefact | Volatile artefact | 2 |
| 26 | Nonvolatile Artefact | Nonvolatile Artefact | 2 |
| 27 | Decision | Decision | 2 |
| 28 | Report | Forensic report | 1 |
| Report | 2 | ||
| Final forensic report | 1 | ||
| 29 | Artefact | Artefacts | 3 |
| 30 | Live Acquisition | live acquisition | 2 |
| 31 | Dead Acquisition | Dead acquisition | 2 |
| 32 | Hybrid Acquisition | Hybrid acquisition | 2 |
|
|
| ||
Bold shows total of common process and concepts.
Figure 2Drone forensic readiness framework (DRFRF).
Comparison between the exiting DRF models and DRFRF.
| Proposed DRFRF | Existing DRF models | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | |
| Stage1 proactive forensics | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ | ✘ |
| Stage 2: reactive forensics | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
|
|
|
|
|
|
|
|