Cyber Secure Framework for Smart Agriculture: Robust and Tamper-Resistant Authentication Scheme for IoT Devices

被引:23
|
作者
Alyahya, Saleh [1 ]
Khan, Waseem Ullah [2 ]
Ahmed, Salman [2 ]
Marwat, Safdar Nawaz Khan [2 ]
Habib, Shabana [3 ]
机构
[1] Onaizah Coll, Coll Engn & Informat Technol, Dept Elect Engn, Unaizah 56447, Saudi Arabia
[2] Univ Engn & Technol, Dept Comp Syst Engn, Peshawar 25120, Pakistan
[3] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah 51452, Saudi Arabia
关键词
Internet of Things; authentication; security; agriculture; INTERNET;
D O I
10.3390/electronics11060963
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) as refers to a network of devices that have the ability to connect, collect and exchange data with other devices over the Internet. IoT is a revolutionary technology that have tremendous applications in numerous fields of engineering and sciences such as logistics, healthcare, traffic, oil and gas industries and agriculture. In agriculture field, the farmer still used conventional agriculture methods resulting in low crop and fruit yields. The integration of IoT in conventional agriculture methods has led to significant developments in agriculture field. Different sensors and IoT devices are providing services to automate agriculture precision and to monitor crop conditions. These IoT devices are deployed in agriculture environment to increase yields production by making smart farming decisions and to collect data regarding crops temperature, humidity and irrigation systems. However, the integration of IoT and smart communication technologies in agriculture environment introduces cyber security attacks and vulnerabilities. Such cyber attacks have the capability to adversely affect the countries' economies that are heavily reliant on agriculture. On the other hand, these IoT devices are resource constrained having limited memory and power capabilities and cannot be secured using conventional cyber security protocols. Therefore, designing robust and efficient secure framework for smart agriculture are required. In this paper, a Cyber Secured Framework for Smart Agriculture (CSFSA) is proposed. The proposed CSFSA presents a robust and tamper resistant authentication scheme for IoT devices using Constrained Application Protocol (CoAP) to ensure the data integrity and authenticity. The proposed CSFSA is demonstrated in Contiki NG simulation tool and greatly reduces packet size, communication overhead and power consumption. The performance of proposed CSFSA is computationally efficient and is resilient against various cyber security attacks i.e., replay attacks, Denial of Service (DoS) attacks, resource exhaustion.
引用
收藏
页数:19
相关论文
共 48 条
  • [1] A Tamper-Resistant Authentication Scheme on Digital Image
    Liu, Guangqi
    Zheng, Xiaoshi
    Zhao, Yanling
    Li, Na
    [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 867 - 872
  • [2] A Tamper-Resistant Broadcasting Scheme for Secure Communication in Internet of Autonomous Vehicles
    Sun, Jianfei
    Tao, Junyi
    Zhang, Hao
    Zhao, Yanan
    Nie, Liming
    Cheng, Xiaochun
    Zhang, Tianwei
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (03) : 2837 - 2846
  • [3] Tamper-Resistant Code Using Optimal ROP Gadgets for IoT Devices
    Hota, Chittaranjan
    Shrivastava, Rajesh Kumar
    Shipra, Shivangi
    [J]. 2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 570 - 575
  • [4] A tamper-resistant timed secure data transmission protocol based on smart contract
    Yuan, Ke
    Cao, Haowen
    Zhang, Suya
    Zhai, Chenxu
    Du, Xiaoyu
    Jia, Chunfu
    [J]. SCIENTIFIC REPORTS, 2023, 13 (01)
  • [5] A tamper-resistant timed secure data transmission protocol based on smart contract
    Ke Yuan
    Haowen Cao
    Suya Zhang
    Chenxu Zhai
    Xiaoyu Du
    Chunfu Jia
    [J]. Scientific Reports, 13
  • [6] TSAF: Tamper-Resistant and Scalable Mutual Authentication Framework for Plug-in EV Charging
    Kim, Young-Jin
    Kolesnikov, Vladimir
    Thottan, Marina
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2013, : 444 - 449
  • [7] A secure authentication scheme for IoT application in smart home
    Kumar, Pankaj
    Chouhan, Lokesh
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 420 - 438
  • [8] A secure authentication scheme for IoT application in smart home
    Pankaj Kumar
    Lokesh Chouhan
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 420 - 438
  • [9] Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards
    Wang, Ding
    Ma, Chun-guang
    Wu, Peng
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 114 - 121
  • [10] Light Weight Authentication Scheme for Smart Home IoT Devices
    Kumar, Vipin
    Malik, Navneet
    Singla, Jimmy
    Jhanjhi, N. Z.
    Amsaad, Fathi
    Razaque, Abdul
    [J]. CRYPTOGRAPHY, 2022, 6 (03)