23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.0 INTRODUCTION<br />

Chapter 3 -<br />

Research Methodology<br />

Chapter 2 reviewed the literature relat<strong>in</strong>g to a <strong>RFID</strong> system, the <strong>in</strong>formation system<br />

of <strong>RFID</strong> architecture, the bus<strong>in</strong>ess system (BS), security challenges, and the proposed<br />

<strong>RFID</strong> BS security risks. This chapter will derive a research methodology and identify<br />

the ma<strong>in</strong> research question, sub questions and hypotheses. The specification for data<br />

collection, process<strong>in</strong>g and analysis will also be given.<br />

It is proposed that the <strong>RFID</strong> security risks identified <strong>in</strong> Chapter 2 will be<br />

exploited to crack a trial bus<strong>in</strong>ess system <strong>in</strong> laboratory conditions. The system is to be<br />

stressed by runn<strong>in</strong>g transaction scenarios. Hence, the whole system (chip, network, &<br />

database) can be searched for sources of digital evidence (stored data). F<strong>in</strong>ally, the<br />

process steps are to be analyzed and written up as a guide for best practice for the<br />

digital forensic <strong>in</strong>vestigators.<br />

The research methodology is to be based on descriptive methods for us<strong>in</strong>g<br />

case scenarios. In Section 3.1 previous similar studies are reviewed to ground the<br />

method <strong>in</strong> others published papers. Hence, the methodology chapter is firstly<br />

organized <strong>in</strong>to the review of similar published works (Section 3.1); the research<br />

design, research question and hypotheses (Section 3.2); and the data requirements<br />

such as how data is to be collected, processed, analyzed and presented (Section 3.3).<br />

Then, the limitations and expected outcomes of the research (Section 3.4) will be<br />

followed by the conclusion (Section 3.5).<br />

3.1 REVIEW OF SIMILAR PUBLISHED WORKS<br />

In order to develop the methodology, the reviews of similar works have been<br />

identified and analysed. The analysis of these studies had lead to the methodology for<br />

this research project. The previous similar published works have guided the ways <strong>in</strong><br />

36

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!