23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The storage drive (USB flash drive) for<br />

the digital evidence data was prepared<br />

<strong>in</strong> a forensically sound manner for the<br />

purpose of the <strong>in</strong>vestigation (see<br />

Appendix 11).<br />

An authorized adm<strong>in</strong>istrator account to<br />

the compromised was acquired from the<br />

system adm<strong>in</strong>istrator.<br />

The potential evidence was identified,<br />

collected (accord<strong>in</strong>g to the volatility)<br />

and saved <strong>in</strong>to the trusted USB flash<br />

drive by us<strong>in</strong>g pre-developed <strong>RFID</strong>_IR<br />

and forensic USB toolkits from the<br />

compromised <strong>RFID</strong> BS (Section 4.2).<br />

Hardware write blocker (Tableau<br />

Forensic USB Bridge) was deployed<br />

dur<strong>in</strong>g the data acquisition, process<strong>in</strong>g<br />

and analysis phases (Section 3.3.4,<br />

Section 3.3.5, and Section 3.3.6<br />

respectively) <strong>in</strong> order to ma<strong>in</strong>ta<strong>in</strong> the<br />

<strong>in</strong>tegrity of the evidence.<br />

As stated <strong>in</strong> Table 5.4, the collected<br />

data (Section 4.2) were analysed<br />

(Section 4.3) and preservation of the<br />

digital evidence was accomplished<br />

(Table 5.3).<br />

Hash values comparison of the<br />

The arguments aga<strong>in</strong>st are similar to<br />

that of Table 5.1 and 5.5 above. The<br />

evidence from CCVT and <strong>in</strong>terview<strong>in</strong>g<br />

human participants can lead to identify<br />

and prosecute the malicious attacker or<br />

SI thief. On the other hand, the<br />

malicious tag can be re-written for<br />

another SI on the same day if there is<br />

no proper policy of re-writ<strong>in</strong>g the tag <strong>in</strong><br />

the retail shop.<br />

141

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!