Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture
-
Published:2023-06-28
Issue:13
Volume:15
Page:10264
-
ISSN:2071-1050
-
Container-title:Sustainability
-
language:en
-
Short-container-title:Sustainability
Author:
Abduljabbar Zaid Ameen123, Nyangaresi Vincent Omollo4, Jasim Hend Muslim1, Ma Junchao5ORCID, Hussain Mohammed Abdulridha12, Hussien Zaid Alaa6ORCID, Aldarwish Abdulla J. Y.1ORCID
Affiliation:
1. Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq 2. Technical Computer Engineering Department, AL-Kunooze University College, Basrah 61001, Iraq 3. Shenzhen Institute, Huazhong University of Science and Technology, Shenzhen 518000, China 4. Department of Computer Science and Software Engineering, Jaramogi Oginga Odinga University of Science & Technology, Bondo 40601, Kenya 5. College of Big Data and Internet, Shenzhen Technology University, Shenzhen 518118, China 6. Information Technology Department, Management Technical College, Southern Technical University, Basrah 61005, Iraq
Abstract
Precision agriculture encompasses automation and application of a wide range of information technology devices to improve farm output. In this environment, smart devices collect and exchange a massive number of messages with other devices and servers over public channels. Consequently, smart farming is exposed to diverse attacks, which can have serious consequences since the sensed data are normally processed to help determine the agricultural field status and facilitate decision-making. Although a myriad of security schemes has been presented in the literature to curb these challenges, they either have poor performance or are susceptible to attacks. In this paper, an elliptic curve cryptography-based scheme is presented, which is shown to be formally secure under the Burrows–Abadi–Needham (BAN) logic. In addition, it is semantically demonstrated to offer user privacy, anonymity, unlinkability, untraceability, robust authentication, session key agreement, and key secrecy and does not require the deployment of verifier tables. In addition, it can withstand side-channeling, physical capture, eavesdropping, password guessing, spoofing, forgery, replay, session hijacking, impersonation, de-synchronization, man-in-the-middle, privileged insider, denial of service, stolen smart device, and known session-specific temporary information attacks. In terms of performance, the proposed protocol results in 14.67% and 18% reductions in computation and communication costs, respectively, and a 35.29% improvement in supported security features.
Funder
Natural Science Foundation of Top Talent of SZTU
Subject
Management, Monitoring, Policy and Law,Renewable Energy, Sustainability and the Environment,Geography, Planning and Development,Building and Construction
Reference54 articles.
1. Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks;Vangala;IEEE Trans. Inf. Forensics Secur.,2022 2. Shafi, U., Mumtaz, R., García-Nieto, J., Hassan, S.A., Zaidi, S.A.R., and Iqbal, N. (2019). Precision Agriculture Techniques and Practices: From Considerations to Applications. Sensors, 19. 3. Shi, X., An, X., Zhao, Q., Liu, H., Xia, L., Sun, X., and Guo, Y. (2019). State-of-the-Art Internet of Things in Protected Agriculture. Sensors, 19. 4. Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges;Vangala;Cluster Comput.,2022 5. Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment;Bera;Comput. Stand. Interfaces,2022
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|