23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

collected digital evidence files (before<br />

and after analysis) was performed<br />

(Appendix 22).<br />

The significant f<strong>in</strong>d<strong>in</strong>gs after analysis<br />

of each entity of <strong>RFID</strong> BS were<br />

presented (arguments for <strong>in</strong> Table 5.1)<br />

<strong>in</strong> order to prove the theft of SI <strong>in</strong> <strong>RFID</strong><br />

based stock management system.<br />

Hence, the forensic exam<strong>in</strong>ation of a<br />

compromised <strong>RFID</strong> stock management<br />

system <strong>in</strong> a retail sector (the research<br />

experiment <strong>in</strong> the laboratory) was<br />

accomplished.<br />

SUMMARY:<br />

In order to perform the complete and accurate forensic exam<strong>in</strong>ation of a<br />

compromised <strong>RFID</strong> stock management system <strong>in</strong> a retail sector; the forensic<br />

<strong>in</strong>vestigator had prepared the tools required for acquisition, got an authorized<br />

adm<strong>in</strong>istrator log<strong>in</strong> of the compromised system, secured the crime scene,<br />

identified and acquired the potential evidence. Then, the <strong>in</strong>vestigator did analyse<br />

the acquired evidence by us<strong>in</strong>g the forensic analysis tools <strong>in</strong> a forensically sound<br />

manner. After perform<strong>in</strong>g the forensic exam<strong>in</strong>ation, as stated <strong>in</strong> the summary of<br />

Table 5.5; the attack event (theft of SI) was able to prove with the f<strong>in</strong>d<strong>in</strong>g results.<br />

The limitations such as <strong>in</strong>terview<strong>in</strong>g human participants, secur<strong>in</strong>g and<br />

transport<strong>in</strong>g the acquired evidence safely, cha<strong>in</strong> of custody, CCTV analysis were<br />

not performed <strong>in</strong> the research experiment. However, the arguments made for and<br />

aga<strong>in</strong>st prove the hypotheses (1, 2, 3, 4, 5, 6, 8 and 9) are to be accepted and<br />

hypothesis 7 is to be <strong>in</strong>determ<strong>in</strong>ate.<br />

142

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!