Forthcoming articles

International Journal of Electronic Security and Digital Forensics

International Journal of Electronic Security and Digital Forensics (IJESDF)

These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Register for our alerting service, which notifies you by email when new issues are published online.

Open AccessArticles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Electronic Security and Digital Forensics (16 papers in press)

Regular Issues

  • A New Colour Image Encryption Approach using a Combination of Two 1D Chaotic Map   Order a copy of this article
    by Djamel Herbadji, Nadir Derouiche, Aissa Belmeguenai, Nedal Tahat, Selma Boumerdassi 
    Abstract: In this paper, we propose an improved chaotic map by coupling two existing ones. Numerical tests prove that it owns closely complex behaviour and wider chaotic range than their seed maps. A new colour image encryption approach using the enhanced chaotic map has been suggested. The proposed scheme is based on the conventional confusion-diffusion structure that contains a new permutation process has designed to randomly scramble neighbouring pixels. The performance and the quality measurement of the proposed scheme are analyzed by comparing it with some existing research
    Keywords: Image encryption; security; chaotic map.
    DOI: 10.1504/IJESDF.2020.10027863
     
  • The Crimes in the Field of High Technology: Concept, Problems and Methods of Counteraction in Kazakhstan   Order a copy of this article
    by Kanat Lakbayev, Gulnara Rysmagambetova, Alizhan Umetov, Askar Sysoyev 
    Abstract: The article investigates the concept, problems and methods of counteraction to crimes in the field of high technology. The main attention of the authors is aimed at determining the essence of these crimes and the dynamics of their spread in the global and regional aspects. At the same time, the article gives the example of the experience of foreign countries where the relevant methods of counteraction to high-tech crimes have already been developed. Special attention is paid to the study of criminal acts committed using the Internet world network where new types and methods of committing crimes regularly appear and develop. The gaps in the regulatory support of law enforcement agencies involved in the detection and investigation of crimes in the field of high technology were revealed. On the basis of the materials certain criminal cases identified the main problems contributing to their commission were revealed.
    Keywords: crimes in high technology field; computer crime; phishing sites; RAT-programs – (Remote Administration Tools – hidden remote access); anonymizer programs; "hidden" Internet (Darknet).

  • Risk Assessment of Smart Grids under Cyber-physical Attacks using Bayesian Networks   Order a copy of this article
    by Anas AlMajali, Yatin Wadhawan, Mahmood Saadeh, Laith Shalalfeh, Clifford Neuman 
    Abstract: Different technologies are used to manage the integration of smart devices with the conventional power grid. This new integration allows more control and monitoring capabilities for stakeholders and customers. However, it also makes the smart grid susceptible to new classes of cyber-physical threats that have to be analyzed, evaluated and mitigated. In this paper, we specifically evaluate the risk of manipulating circuit breakers that connect a power generator to the smart grid. Our main contribution is performing risk assessment of the grid by combining the vulnerabilities of its cyber domain and the transient stability analysis of its physical domain. First, we estimate the probability of compromising the Energy Control Center (ECC) using a Bayesian Network. The ECC can be exploited to manipulate circuit breakers. Second, we analyze the impact of manipulating circuit breakers in the IEEE 39-bus test system. Third, the probability of compromise and its impact are combined to quantify risk. Finally, we analyze the effect of integrating Photovoltaic (PV) systems on the stability of the smart grid under the same attack scenarios. The results indicate that integrating smart grids with PV systems can improve resilience even if a cyber-attack succeeds.
    Keywords: smart grid; photovoltaic system; cyber-physical attack; risk; resilience.

  • Forward secure certificateless proxy multi-signature scheme   Order a copy of this article
    by Ronghai Gao 
    Abstract: In order to deal with key exposure problem, we introduce forward secure technique into certificateless proxy multisignature scheme, and give the formal definition and security model of forward secure certificateless proxy multisignature.Furthermore, we present a construction of forward secure certificateless proxy multi-signature scheme.Based on the difficulty of computational Diffie-Hellman problem, the proposed scheme is existentially unforgeable against adaptively chosen-message attacks and chosen- warrant attacks in the random oracle model. The proposed scheme does not use bilinear pairs in the key update and generation proxy signature phases, and updated proxy key is easy, thus it is more suitable for mobile environments. Our scheme has effectively dealt with the key exposure problem and certificate management problem.
    Keywords: certificateless cryptography; proxy signature; proxy multi-signature; forward secure; computational Diffie-Hellman problem.

  • Possible Attempts to Identify E-mail Header of the Sender for Academic Qualification Fraud   Order a copy of this article
    by Nathaporn Utakrit, Pongpisit Wuttidittachotti 
    Abstract: Education is the core of the countrys development. A good education can increase a persons chances of having a good job, consistent pay raises, and a stable life; without a degree, it will be more challenging to have these things. A diploma mill arises when a person without a degree wants to get a better job and earn a more substantial salary. Buying and selling degrees over e-mail is one way to avoid detection. This research aims to contribute to forensic counteractive measures that can identify and track the people who use e-mail for data sharing. This examination focused on senders e-mail that could be used as a part of juridical significance in criminal justice. This research had adopted e-mail forensic process to acquire, extract, analyse, and interpret data. The authors conducted the empirical analysis from the experimental e-mails headers using forensic tools and manual approach based on the Request for Comments (RFCs) as the primary guidelines. The scope excluded the analyses of e-mail contents and attachments. The study found that the commercial tool extracted headers less often than the free alternatives. All sending channels could identify the senders identification. E-mail sent from desktops provided the computer name and ISP of the sender. However, typical and anonymous e-mails can only trace back to the original mail servers. Although tools could provide investigators with ease and convenience, data acquisition and validation need to be done manually. Digital forensic experts must utilise their strong forensic analytical and investigative skills to formulate and present results and conclusions in a format that can be easily understood. This research is not the ad hoc mechanism, but it can be implemented in other criminal investigations or related endeavours.
    Keywords: E-mail message header; e-mail forensics; anonymous e-mail; typical e-mails; diploma mills; Request for Comments.

  • Forensic Analysis and Data Recovery from Water-Submerged Hard Drives   Order a copy of this article
    by Alicia Francois, Alastair Nisbet 
    Abstract: In many digital forensic investigations, a common location to recover files as evidence of wrongdoing is a computer hard drive. Hard drives have increased greatly in storage capacity since their introduction in computers in the 1950s making them a rich source of evidence for the forensic investigator. This awareness may also lead to the destruction of hard drives or entire computers by throwing them into water in an attempt to prevent recovery of data. This research looks at the solid state hard drives alongside platter hard drives in particular and the time water will take to enter the hard drive once it is submerged. Experiments show that once water has entered the drive, various components will be affected by the water and the drive will become inoperable. A guide for forensic investigators is constructed indicating the likely time required to recover the drive before water ingress occurs, and the various parts of the drive that may be damaged and whether repairs or replacement of those parts is possible.
    Keywords: Forensics; Security; Hard Drive; Water Damage.

  • Reversing and auditing of android malicious applications using sandboxing environment   Order a copy of this article
    by Joseph Raymond, Jeberson Retna Raj R 
    Abstract: The android market has gained lot of popularity in the past recent years The operating system stack is open source, many security analysts and hacker’s has the platform to perform research on digital forensics and further enhance their exploiting in finding weakness and modifying the software attack Our goal is this paper is to perform reversing android malicious applications henceforth audit the vulnerabilities We reverse using the tools like apktool, dex2jar and jd-gui Static and dynamic analysis is done with the help of sandboxing environment achieving the goal of reverse engineering We monitor the activities, services, broadcast receiver’s, shared preferences, intents and content providers Many vulnerable apps uses content provider leakage to store and query data within the phone helpful in auditing purpose Mobile Forensics is about acquisition of information about App installed in platform In the paper, we perform attack surface.
    Keywords: Static Analysis; Dynamic Analysis; App Reversing; Attack Surface; Mobile Forensics.
    DOI: 10.1504/IJESDF.2020.10028501
     
  • Mobile Phone Forensics   Order a copy of this article
    by Manish Kumar 
    Abstract: Collection and analysis of digital evidence from mobile phones plays vital role to solve many civil and criminal cases. Digital forensics expert need specialized tools and techniques to extract the evidence from mobile phones for analysis. Extracting the evidence from mobile phones in forensically sound manner is never been an easy task, as the entire process must ensure the integrity of evidence and its admissibility in the court of law. There are various tools and techniques available for mobile forensics, which are classified based on its complexity and its physical characteristics. Forensics examiner need to assess the complexity of the case and select the tools accordingly. This paper discusses in-detail about the systematic approach, which can be used for mobile forensics. Each approach has its own advantages, disadvantages, cost and complexities which is highlighted in the paper along with the list of standard tools and their key features.
    Keywords: Mobile Forensics; Digital Forensics; Electronic Evidence; Non-Destructive Method; Semi-Destructive Method; Destructive Method; JTAG; Chip-Off.
    DOI: 10.1504/IJESDF.2021.10029656
     
  • Hardware-Based Cyber Threats: Attack Vectors and Defence Techniques   Order a copy of this article
    by Reza Montasari, Richard Hill, Simon Parkinson, Amin Hosseinian-Far, Alireza Daneshkhah 
    Abstract: There are certain vulnerabilities associated with computing hardware that attackers can exploit to launch destructive attacks which often go undetected by the existing hardware and software countermeasures. Side Chanel Attacks (SCAs) and Rowhammer Attacks (RHAs), the consequences of hardware vulnerabilities, pose significant security and privacy threats to self-contained computing components and their end-users respectively. Such attacks compromise the security of computational environments, even those with advanced protection mechanisms such as virtualisation, sandboxes or robust encryptions. In light of these security threats against modern computing hardware, we perform an analysis overview of the modi operandi of SCAs and RHAs in hardware implementation and techniques that can be used to extract sensitive data such as secret keys. We then propose various countermeasures to safeguard against these attacks.
    Keywords: side channels; microarchitectural attacks; cyber threats; hardware attacks; embedded systems; digital investigations; countermeasures.
    DOI: 10.1504/IJESDF.2020.10029857
     
  • Internet of Things Devices: Digital Forensic Process and Data Reduction   Order a copy of this article
    by Reza Montasari, Richard Hill, Farshad Montasari, Hamid Jahankhani, Amin Hosseinian-Far 
    Abstract: The rapid increase in the pervasiveness of digital devices, combined with their heterogeneous nature, has culminated in increasing volumes of diverse data, that can become subject to criminal or civil investigations. This growth in big digital forensic data (DFD) has forced digital forensic practitioners (DFPs) to consider seizing a wider range of devices and acquiring larger volumes of data that can be pertinent to the case being investigated. This, in turn, has created an immense backlog of cases for law enforcement agencies worldwide. The method of data reduction by targeted imaging, combined with a robust process model, however, can assist with speeding up the processes of data acquisition and data analysis in IoT device forensic investigations. To this end, we propose an IoT Forensic Investigation Process Model, IoT-FIPM, that can facilitate not only the reduction of the evidentiary IoT data but also a timely acquisition and analysis of this data.
    Keywords: IoT Forensics; digital forensics; data acquisition; big data; process model; digital investigations; computer forensics; formal process.
    DOI: 10.1504/IJESDF.2020.10030308
     
  • Design and implementation of a ring oscillator-based physically unclonable function on field programmable gate array to enhance electronic security   Order a copy of this article
    by Massoud Masoumi, Ali Dehghan 
    Abstract: Physically unclonable functions (PUFs) are functions that generate a set of random responses when stimulated by a set of pre-defined challenges. They are mostly used for hardware verification and/or device authentication mechanisms, access control, protection of sensitive intellectual property (IP) on devices and protection against insecure hardware connections and communications. In FPGA devices, PUFs are instantiated by exploiting the propagation delay differences of signals caused by manufacturing process variations. In this work, we describe a real implementation of ring oscillator-based PUF on Xilinx FPGAs and illustrate how such architecture is mapped into the FPGA fabric. Using this architecture, we obtained a unique 45-bit code which can be used to identify a chip between many similar devices of the same family in order to provide a reliable access control and authentication mechanism.
    Keywords: electronic security; physically unclonable functions; PUFs; FPGA implementation; ring oscillator.
    DOI: 10.1504/IJESDF.2020.10029567
     
  • UML-based process model for mobile cloud forensic application framework - a preliminary study   Order a copy of this article
    by Puneet Sharma, Deepak Arora, T. Sakthivel 
    Abstract: The mobile cloud forensics has received a great deal of attention within the digital forensics community. Collecting potential evidence from the mobile cloud by applying forensically sound methods faces severe setback due to technological advancements. The latest forensic investigation tools and methods are inevitable to cope up with the increasing criminal activities on the mobile cloud platform. Thus, a forensically sound process is essential to develop critical methods for mobile cloud forensic investigators. This preliminary study presents a mobile cloud forensic process framework with the help of UML diagrams that primarily consists of identification, collection and preservation, examination and analysis, and evidence correlation and presentation phases. The proposed mobile cloud forensic process introduces the evidence correlation phase between the mobile and cloud. The proposed methods improve the evidence traceability in the cloud by determining the evidence related to the malicious activity of the suspected device in an efficient manner.
    Keywords: mobile cloud forensics; forensic investigations; forensic methods; forensic process framework; use cases; UML sequence diagrams.
    DOI: 10.1504/IJESDF.2020.10029568
     
  • Design and development of two levels electronic security and safety system for buildings   Order a copy of this article
    by Kalpana Chauhan, Rajeev Kumar Chauhan 
    Abstract: Today, security is not just a requirement but a necessity. It could be of any place like residences, business installations, educational institutions, etc. The paper present is on electronic security and safety system is doing bit in ridding the society of menace of burglars. In this paper initially a four digit authentic system on the door which would enable the authentic user to enter the installation. Next defence would be a trap of infrared motion detectors which on detection of any unauthorised entrance would activate an alarm which is in the hand of the owner. Thus, in the above said manner, we would be able to secure every nook and corner of the installation. The present paper is an application of electronics and communication in electrical systems. The microcontroller-based digital security system presented here is an access control system that allows only authorised persons to access a restricted area.
    Keywords: electronics security; authentic; infrared; safety; authorised; communication system; burglars; microcontroller; access control; installation; safety.
    DOI: 10.1504/IJESDF.2020.10029569
     
  • Security efficient command control communication and integration with digital television   Order a copy of this article
    by Konstantinos Kardaras, George I. Lambrou, Dimitrios Koutsouris 
    Abstract: In the present work we propose an intelligence C3I concept by integrating public safety radio communication networks and digital television (DTV). Transparent operation achieved through internet protocol (IP) interfaces. Terrestrial DTV will be used as an alternative intelligence communications path that will be activated during major crisis and emergencies where system unavailability occurs. Decision support systems will take over to coordinate, command and control agencies in the public sector. The advantageous property of the proposed architecture is the autonomous, robust and reliable operation of the infrastructures regardless their operations in a stand-alone capacity or as integral part of a greater and transparent security/ intelligence network. The proposed network architecture can be used as a means to countermeasure against crisis (terrorist attacks, physical disasters, etc.).
    Keywords: digital television; DTV; command control; C3I; information systems.
    DOI: 10.1504/IJESDF.2020.10029570
     
  • Problems of legal regulations of relations in the sphere of the electronic document flow   Order a copy of this article
    by Ainur K. Kussainova, Aiman B. Omarova, Djamilya A. Ospanova, Duman O. Kussainov, Rysgul Abilsheyeva 
    Abstract: Regulation of the electronic document flow stand as allied form of the legal structure. The document flow contains elements of the general law of regulation and reaffirms the necessity of following specific instructions. Its electronic form gives an opportunity for the information interchange between subjects of an economical and legal activity. This defines the possibility of formation of separate branch of legal regulation in the document flow. The possibility of the structuring and correlation of an informational and other branch of the law for the aim of complex usage of an electronic document flow is viewed as separate aspect. The innovation of the research is explained by the reason that the mechanism of the governmental legislation is fully investigated and approved Practical significance is explained, from which the definition of the branch of legislative regulation allows to raise the structure and the regulation of the legislative system.
    Keywords: electronic document; electronic document flow; electronic form; informational technologies; electronic signature.
    DOI: 10.1504/IJESDF.2020.10029572
     
  • An ontological approach to threats pattern collection and classification: a preliminary study to security management   Order a copy of this article
    by Oluwasefunmi T. Arogundade, Temitope Elizabeth Abioye, Misra Sanjay 
    Abstract: This study presents an agent based approach to resolve issues related to the collection and classification of software application anomalies and misuses with the aim of facilitating the reappraisal of security controls of information system (IS). The proposed system is assumed to be integrated with the existing IS in order to enhance information system security maintenance by continuously collecting identified threat behaviour from the application intrusion detection system (IDS). The system comprises of several functional agents like the input collector agent, classifier agent, and tracking agent. The collector agent collects the identified threats by the IDS, the categoriser agent categorises according to STRIDE model using pattern matching algorithm on the content of security knowledge base. The security knowledge repository is developed based on existing security ontology. The classifier classifies based on the threats IP address while the tracking agent collates all the threats profile. The collect-categorise-classify-track (C3T) model is hereby presented. The potential usability of this work is demonstrated by a case study and its useful integration with further studies is also discussed.
    Keywords: threats; STRIDE; ontology; intrusion detection system; IDS; agents; risk; security.
    DOI: 10.1504/IJESDF.2020.10029585