23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5.0 INTRODUCTION<br />

Chapter 5 -<br />

Research Discussion<br />

In Chapter 4, the f<strong>in</strong>d<strong>in</strong>gs from the research experiment were reported. The<br />

changes made on the proposed data requirements (see Section 3.3), referred to as<br />

variations encountered, dur<strong>in</strong>g the experiment were described <strong>in</strong> Section 4.1.<br />

After perform<strong>in</strong>g a number of pilot tests on every phase of the research (for<br />

<strong>in</strong>stance; see Appendix 16 for pilot experiment on SQL poison<strong>in</strong>g attack), the<br />

f<strong>in</strong>al experiment was conducted <strong>in</strong> order to answer the selected research questions<br />

accord<strong>in</strong>g to the research methodology developed <strong>in</strong> Chapter 3.<br />

The significant f<strong>in</strong>d<strong>in</strong>gs from the research experiment conducted <strong>in</strong>clude<br />

the malicious SQL poison<strong>in</strong>g code, a malicious tag’s ID, timestamp when the<br />

attack occurred, and the values of the current stock items <strong>in</strong> the backend SQL<br />

Server. Moreover, the hash values of all the collected evidence before and after<br />

the analysis (see Appendix 22) were exactly the same. Thus the preservation and<br />

<strong>in</strong>tegrity of the evidence were ma<strong>in</strong>ta<strong>in</strong>ed dur<strong>in</strong>g the experiment. The purpose of a<br />

research methodology and then conduct<strong>in</strong>g the forensic <strong>in</strong>vestigation was to<br />

<strong>in</strong>vestigate the theft of stock item (SI) <strong>in</strong> a <strong>RFID</strong> based retail shop. The f<strong>in</strong>d<strong>in</strong>gs<br />

after the forensic exam<strong>in</strong>ation were able to prove the theft of SI <strong>in</strong> a simulated<br />

<strong>RFID</strong> based stock management system.<br />

Therefore, Chapter 5 will discuss the f<strong>in</strong>d<strong>in</strong>gs of the research (Section 4.1)<br />

<strong>in</strong> order to evaluate the importance of the results. The f<strong>in</strong>d<strong>in</strong>g results evaluation<br />

will be discussed <strong>in</strong> association with the discipl<strong>in</strong>e area. In addition, the developed<br />

research questions stated <strong>in</strong> Section 3.2.6 will be answered and discussed <strong>in</strong><br />

relation to the asserted hypotheses (Section 3.2.7) <strong>in</strong> Section 5.1. The discussion<br />

summaries will be described accord<strong>in</strong>g to the evidential arguments made, for and<br />

aga<strong>in</strong>st. Subsequently, the discussion of the f<strong>in</strong>d<strong>in</strong>gs of the research experiment<br />

will be presented <strong>in</strong> Section 5.2 <strong>in</strong> order to comprehensively evaluate the reported<br />

outcomes. Then the recommendations (Section 5.3) will be drawn accord<strong>in</strong>g to<br />

128

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!