2021
DOI: 10.3390/app11104341
|View full text |Cite
|
Sign up to set email alerts
|

Security Architecture for Swarms of Autonomous Vehicles in Smart Farming

Abstract: Nowadays, autonomous vehicles are incorporated into farms to facilitate manual labour. Being connected vehicles, as IoT systems, they are susceptible to cyber security attacks that try to cause damage to hardware, software or even living beings. Therefore, it is important to provide sufficient security mechanisms to protect both the communications and the data, mitigating any possible risk or harm to farmers, livestock or crops. Technology providers are aware of the importance of ensuring security, and more an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…If 2 29 -1, 2 23 -1 and 2 19 -1 are prime (De nition-3) then the length of each LFSR is 2 29 -1, 2 23 -1 and 2 19 -1 respectively.…”
Section: Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…If 2 29 -1, 2 23 -1 and 2 19 -1 are prime (De nition-3) then the length of each LFSR is 2 29 -1, 2 23 -1 and 2 19 -1 respectively.…”
Section: Results and Analysismentioning
confidence: 99%
“…i.e., Period= (2 29 -1) x (2 23 -1) x (2 19 -1) 2 71 To increase the level of complexity for attackers on the key stream generator, multiple feedback polynomials have been included in the design. Thus, the period increases by 2 12 and avoids the issue of being insecure.…”
Section: Period Of Key Stream Generatormentioning
confidence: 99%
“…Additionally, the use of redundant navigation systems can assist in enhancing the resilience of drones against GPS spoofing attacks. By integrating multiple sources of navigation data, inertial navigation systems, and visual sensors, drones can cross-validate the information and detect discrepancies [107].…”
Section: Attacks Based On Security and Privacy Requirementsmentioning
confidence: 99%
“…As the global population continues to grow, people need increasing quantities of grains and vegetables [1]. Therefore, promoting the efficient and sustainable development of agricultural production methods and improving technology to increase the crop yield per unit area has attracted increasing attention, including in smart agriculture and facility agriculture [2]. These approaches can create a more suitable environment for plant growth, making it possible to grow crops and vegetables out of season and accelerate their growth [3,4].…”
Section: Introduction 1literature Reviewmentioning
confidence: 99%