“…After considering the implementation of WSN in agriculture [ 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 ] as a distributed system, we researched attacks on the WSN [ 23 , 24 , 25 , 34 , 35 , 36 , 37 ]. Attacks on WSN exploit vulnerabilities in all layers of network communication architecture, while disrupting security requirements, such as authentication, authorization, data integrity, data trustworthiness, availability, non-repudiation, trust, and privacy [ 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ].…”