IEEE Internet Policy Newsletter - March 2018

ISSUE 9 | MARCH 2018

Digital Forensics and Enforcement of the Law

By Alison Lytle, Noah Stephens, James Conner, Sajad Bashiri, and Steve Jones, PhD
Ball State University; Center for Information and Communication Sciences

Digital forensics is a critical aspect of modern law enforcement investigations, and deals with how data is gathered, studied, analyzed, and stored. This includes the recovery and investigation of data found in electronic devices. Due to the nature of flash memory, and a lack of sufficient protocols in place to outline effective data-retrieval techniques for solid state discs (SSDs) and universal serial bus (USB) flash drives, data forensic examiners face many challenges that sometimes impede their ability to operate successfully. In addition to the numerous technical complications that investigators face, there are also many legal matters to consider. These legal issues are not secondary considerations whereas having valid search authority is a primary requirement. It is important not overlook or minimize the importance of the legal difficulties surrounding digital forensics investigations.


Managing Next Generation Internet: Issues and Prospects

By Fayaz Akhtar, Mubashir Husain Rehmani, and Alan Davy
Telecommunications Software and Systems Group (TSSG), Waterford Institute of Technology, Waterford, Ireland

Next Generation Internet (NGI) is set to revolutionize our day-to-day lives, especially the way we communicate and interact with the environment. The modern internet has already evolved from a simple two-node experimental interconnection to an enormous commercial network composed of rapidly increasing nodes as well as various end-user applications. While the initial Internet Protocol (IP)-based connectivity among trusted hosts fulfilled the required expectations of a host-to-host communication model, the plethora of emerging network services and the progressing demands for content have exposed the internet’s inherent limitations. These constraints include onsite manual configuration, lack of topological view, complicated management, and static performance models that are typically based on host-centric communication rather than content distribution. In fact current networks based on static topologies already pose severe drawbacks in terms of their expansion. As a way to deal with some of the inefficiencies derived from these drawbacks, the industry and academia alike have advocated for the adoption of novel NGI architectures and paradigms, such as software-defined networking (SDN), network virtualization (NV), and information-centric networking (ICN).


Enabling Technologies for Post Market Surveillance of Medical Devices

Is blockchain, SDN or a legacy network best for post-market surveillance of medical devices?

By Junaid Chaudhry, Ali Kashif Bashir, Syed Hassan Ahmed, Jon Haas, Guanglou Zheng

Medical devices perform health monitoring, diagnosis and life-saving functions for patients and are within the user domain of Health Information Systems (HIS). These devices include Implantable Medical Devices (IMDs), Medical Devices (MDs), and Medical Support Devices (MSDs) for continuous health monitoring and treatment purposes. Some medical devices can be worn on the body, known as wearable medical devices, while others could be outside the body of patients, (i.e., smart beds, Magnetic Resonance Imaging (MRI) machines and wireless medical telemetry systems.) The HIS are increasingly adopting cloud-based computing systems, and this trend makes medical devices more exposed to the internet and the challenges associated with their governance. In this article, we offer a discussion about three candidate post market governance technologies for the broad range of medical devices.


Blockchain: A Technical Overview

By Javaid Iqbal Zahid, Dr. Alex Ferworn, Dr. Fatima Hussain
Ryerson University, Department of Computer Science

It can be argued that blockchain technology is the real reason for success of cryptocurrencies. From a technical perspective—independent of Bitcoin or other currencies—blockchain can be applied to many scenarios where transaction verification is a must. In fact, many researchers have already started exploring different avenues where modified versions of blockchain technology can be applied to non-financial transactions. Blockchain is a protocol that uses existing cryptographic techniques to ensure the security and privacy of information, its integrity, and provides a mechanism for the authentication of participating entities. This article reviews various cryptographic algorithms that can be implemented in conjunction with blockchain technology. Processing of a message using blockchain is shown in the diagram below.


 



Article Contributions Welcomed

If you wish to have an internet policy related article considered for publication, please contact the Managing Editor of Technology Policy and Ethics IEEE Future Directions Newsletter.

View Editorial Guidelines


Past Issues

December 2018

September 2018

June 2018

March 2018

November 2017

September 2017

July 2017

May 2017

March 2017

January 2017

November 2016

September 2016


IEEE Internet Policy Newsletter Editorial Board

Dr. Ali Kashif Bashir, Interim Editor-in- Chief
Dr. Syed Hassan Ahmed
Dr. Mudassar Ahmad
Dr. Onur Alparslan
Dr. Muhammad Bilal
Dr. Syed Ahmad Chan Bukhari
Dr. Ankur Chattopadhyay
Dr. Junaid Chaudhry
Dr. Waleed Ejaz
Dr. Mohamed Elhoseny
Dr. Prasun Ghosal
Dr. Tahir Hameed
Dr. Y. Sinan Hanay
Dr. Shagufta Henna
Dr. Fatima Hussain
Dr. Rasheed Hussain
Dr. Saman Iftikhar
Sajida Imran
Dr. Stephan Jones
Dr. Mohammad Saud Khan
Olga Kiconco
Dr. Jay Ramesh Merja
Dr. Mubashir Husain Rehmani
Dr. Hafiz Maher Ali Zeeshan


About: This newsletter features technical, policy, social, governmental, but not political commentary related to the internet. Its contents reflect the viewpoints of the authors and do not necessarily reflect the positions and views of IEEE. It is published by the IEEE Internet Initiative to enhance knowledge and promote discussion of the issues addressed.