Authors:
            
                    Nurul Huda Nik Zulkipli
                    
                        
                    
                    ; 
                
                    Ahmed Alenezi
                    
                        
                    
                     and
                
                    Gary B. Wills
                    
                        
                    
                    
                
        
        
            Affiliation:
            
                    
                        
                    
                    University of Southampton, United Kingdom
                
        
        
        
        
        
             Keyword(s):
            The Internet of Things, Digital Forensic, IoT Forensic, Real- Time Investigation.
        
        
            
                Related
                    Ontology
                    Subjects/Areas/Topics:
                
                        Data Communication Networking
                    ; 
                        Enterprise Information Systems
                    ; 
                        Internet of Things
                    ; 
                        Sensor Networks
                    ; 
                        Software Agents and Internet Computing
                    ; 
                        Software and Architectures
                    ; 
                        Telecommunications
                    
            
        
        
            
                Abstract: 
                	The smart devices have been used in the most major domain like the healthcare, transportation, smart home, smart city and more. However, this technology has been exposed to many vulnerabilities, which may lead to cybercrime through the devices. With the IoT constraints and low-security mechanisms applied, the device could be easily been attacked, treated and exploited by cyber criminals where the smart devices could provide wrong data where it can lead to wrong interpretation and actuation to the legitimate users. To comply with the IoT characteristics, two approaches towards of having the investigation for IoT forensic is proposed by emphasizing the pre-investigation phase and implementing the real-time investigation to ensure the data and potential evidence is collected and preserved throughout the investigation.