Unearthing the hidden path of MANET’s nodes with signal strength measurements: Forensics challenges, survey and a novel approach for data collection, preservation and examination
dc.Affiliation | October University for modern sciences and Arts MSA | |
dc.contributor.author | Omar Ragheb | |
dc.contributor.author | Mena Safwat | |
dc.contributor.author | Marianne A. Azer | |
dc.date.accessioned | 2025-05-27T08:19:50Z | |
dc.date.available | 2025-05-27T08:19:50Z | |
dc.date.issued | 2025-05-16 | |
dc.description | SJR 2024 0.671 Q1 H-Index 68 | |
dc.description.abstract | Mobile Ad hoc Networks (MANETs) are self-configuring networks of mobile devices that communicate with each other without the need for infrastructure. This makes them highly flexible and adaptable to changing environments, making them ideal for applications such as transportation and tactical domains. However, the mobility feature of the network poses new challenges for digital forensics investigators due to their specific characteristics. One challenge is how the investigator can prove the Chain of Custody (COC) in court in this highly volatile network to ensure the integrity of the evidence. This paper studies the forensic challenges in several wireless technologies, including the Internet of Things (IoT), Vehicular Ad-hoc Networks (VANETs), and, especially in Mobile Ad-hoc Networks (MANETs), critically reviews several approaches to cover the challenges, and also proposes a novel digital forensics framework that is built on Fog Computing (FC). Using regular communication signal strength measurements, the proposed framework enables investigators to learn details about nodes’ locations over time and mobility characteristics without requiring changes to communication protocols or overwhelming nodes with additional tasks. This can help to ensure the availability and integrity of the digital evidence and its admissibility in court. Additionally, the paper suggests a novel automated detection technique for Hello Flood attacks in ad-hoc networks. The viability of the approach has been demonstrated on a network simulator. | |
dc.description.uri | https://www.scimagojr.com/journalsearch.php?q=21101032719&tip=sid&clean=0 | |
dc.identifier.citation | Ragheb, O., Safwat, M., & Azer, M. A. (2025). Unearthing the hidden path of MANET’s nodes with signal strength measurements: Forensics challenges, survey and a novel approach for data collection, preservation and examination. Forensic Science International Digital Investigation, 53, 301916. https://doi.org/10.1016/j.fsidi.2025.301916 | |
dc.identifier.doi | https://doi.org/10.1016/j.fsidi.2025.301916 | |
dc.identifier.other | https://doi.org/10.1016/j.fsidi.2025.301916 | |
dc.identifier.uri | https://repository.msa.edu.eg/handle/123456789/6425 | |
dc.language.iso | en_US | |
dc.publisher | Elsevier Ltd | |
dc.relation.ispartofseries | Forensic Science International: Digital Investigation ; Volume 53 , June 2025 , Article number 301916 | |
dc.subject | Ad-hoc network | |
dc.subject | AODV | |
dc.subject | Chain of custody | |
dc.subject | DFRWS | |
dc.subject | Digital forensics challenges | |
dc.subject | Fog computing | |
dc.subject | MANETs | |
dc.title | Unearthing the hidden path of MANET’s nodes with signal strength measurements: Forensics challenges, survey and a novel approach for data collection, preservation and examination | |
dc.type | Article |