2023
DOI: 10.3390/su151310264
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture

Abstract: Precision agriculture encompasses automation and application of a wide range of information technology devices to improve farm output. In this environment, smart devices collect and exchange a massive number of messages with other devices and servers over public channels. Consequently, smart farming is exposed to diverse attacks, which can have serious consequences since the sensed data are normally processed to help determine the agricultural field status and facilitate decision-making. Although a myriad of s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 52 publications
0
3
0
Order By: Relevance
“…Although the scheme in [22] is anonymity-preserving, it cannot withstand ephemeral secret and session key leakage attacks [23]. In addition, its bilinear pairing operations result in extensive computation overheads [24], similar to the protocols in [23,25].…”
Section: Related Workmentioning
confidence: 99%
“…Although the scheme in [22] is anonymity-preserving, it cannot withstand ephemeral secret and session key leakage attacks [23]. In addition, its bilinear pairing operations result in extensive computation overheads [24], similar to the protocols in [23,25].…”
Section: Related Workmentioning
confidence: 99%
“…Proposed Solution(s) [40] Resistance from small and medium farms due to data sharing concerns and access control policies of the parties' data Data-sharing agreements among various actors, role-based access control based on AI [1] Farmers' concern of what happens with their data and their willingness to share their data Development of clear trust mechanisms and enabling farmers to withdraw from the system [45] Data exchange between smart devices and other services over public channels prone to security attacks Ongoing development of (elliptic curve) cryptography-based schemes [46] Data privacy and security - [47] Limited access to risk management tools for farmers in developing economies, centralized agricultural IT systems lack trust factors in sharing risk data…”
Section: Ref Challenge(s) Addressedmentioning
confidence: 99%
“…The development of advanced intrusion detection systems (IDS) specifically designed for cloud computing, which can recognize and react to unusual activity or possible security risks, has been the main focus of research. These systems help prevent security breaches from getting worse by identifying and resolving them before they have a chance to affect cloud infrastructures [135]- [138].…”
Section: Intrusion Detection Systems (Ids)mentioning
confidence: 99%