Skip to main content

Advertisement

Log in

Image Driven Multi Feature Plant Management with FDE Based Smart Agriculture with Improved Security in Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Technology development in satellite, sensor network and image processing has been applied for various issues. Such developments are well adapted towards smart agriculture in recent times. It has been adapted to monitor the plants for their growth and yield being achieved. There exist different approaches towards monitoring the plants in agriculture sector, but the issue is with the performance metrics which are not arrived up to expected level. To improve the performance in plant monitoring with security concerns, an efficient multi feature multi feature plant management framework is proposed in this paper. The proposed model utilizes different images of statellite over the agriculture region and local images obtained with regional data sets. The images obtained are extracted for the features of texture, color to classify the images against different diseases and deficiencies. Also, with the color features and temperature, fluid, rainfall features, the method computes yield aggregation weight, Growth Aggregation Weight towards regulation of fluid. Using such weight measures estimated, the approach would perform sanitization as well as fertilizer manaagement. Also, the transmission of control messages are adapted to control the fertilizer injectors, water regulators and so on. The model enables controlling each device on the field with the support of sensor nodes. The entire data placed in the channel are encrypted using Feature level Data Encryption which uses different encryption keys and standards for different attributes. This restricts the sensor nodes in decrypting only allowed features to perform controlling the devices under the node and to perform required actions. The proposed method improves the security in smart agriculture and improves the performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Ennouri, K., & Kallel, A. (2019). An advanced technique for crop condition assessment. Hindawi Mathematical Problems in Engineering(MPE), 9404565, 1–8. https://doi.org/10.1155/2019/9404565

    Article  Google Scholar 

  2. Awad, M. M. (2019). An innovative intelligent System based on remote sensing and mathematical models for improving crop yield estimation. Information Processing in Agriculture(IPA), 6(3), 316–325.

    Article  MathSciNet  Google Scholar 

  3. Fu, L., Liu, Z., Majeed, Y., & Cui, Y. (2018). Kiwifruit yield estimation using image processing by an Android mobile phone. IFAC (International Federation of Automatic Control) Hosting by Elsevier Ltd, 51(17), 185–190.

    Google Scholar 

  4. Lakshmi, K. , & Gayathri, S. (2017). Implementation of IoT with Image processing in plant growth monitoring system. Journal of Scientific and Innovative Research, 6(2), 80–83.

    Article  Google Scholar 

  5. Di Gennaro, S. F., Toscano, P., Cinat, P., Berton, A., & Matese, A. A. (2019). A low-cost and unsupervised image recognition methodology for yield estimation in a Vineyard. Frontiers in Plant Science, 10, 1–13.

    Article  Google Scholar 

  6. Hameed, S., & Amin, I. (2018). Detection of weed and wheat using image processing (pp. 1–5). https://doi.org/10.1109/ICETAS.2018.8629137

  7. Senthilkumar, M., & Sridhathan, C. (2018). Plant infection detection using image processing. International Journal of Modern Engineering Research (IJMER), 2249–6645.

  8. Janwale, A. (2015). Digital image processing applications in agriculture: A survey. International Journal of Advanced Research in Computer Science and Software Engineering, 622.

  9. Guiling, S., Jia, X., & Geng, T. (2018). Plant diseases recognition based on image processing technology. Hindawi Journal of Electrical and Computer Engineering, 6070129, 1–7. https://doi.org/10.1155/2018/6070129

    Article  Google Scholar 

  10. Li, W., Chen, P., Wang, B., & Xie, C. (2019). Automatic localization and count of agricultural crop pests based on an improved deep learning pipeline. Scientific Reports, 9(7024), 1–11. https://doi.org/10.1038/s41598-019-43171-0

    Article  Google Scholar 

  11. Sreenivas, V., Narasimham, C., Subrahmanyam, K., & Yellamma, P. (2013). Performance evaluation of encryption techniques and uploading of encrypted data in cloud, 4th ICCCNT, July 2–4.

  12. More, P., Chandugade, S., Rafiq, S. M. S., & Pise, P. P. (2018). Hybrid encryption techniques for secure sharing of a sensitive data for banking systems over cloud. In International Conference On Advances in Communication and Computing Technology (ICACCT) (pp. 93–96).

  13. Chen, W.-H., Fan, C-I., & Tseng, Y.-F. (2018). Efficient key-aggregate proxy re-encryption for secure data sharing in clouds, IEEE, 1–4, 978-1-5386-5790-4418.

  14. Mudepalli, S., Rao, V. S., Kumar, R. K. (2017). An efficient data retrieval approach using blowfish encryption on cloud ciphertext retrieval in cloud computing. In International conference on intelligent computing and control systems (ICICCS) (pp. 267–271) 978-1-5386-2745-7417.

  15. Chze, P. L. R., & Leong, K. S. (2014). A secure multi-hop routing for IoT communication. IEEE World Forum on Internet of Things (WF-IoT), 428–432.

  16. Hatzivasilis, G., Papaefstathiou, I., & Manifavas, H. (2017). SCOTRES: Secure routing for IoT and CPS, pp. 2129–2141. https://doi.org/10.1109/JIOT.2017.2752801

  17. Hajjar, A., Roussos, G., & Paterson, M. (2017). Secure routing in IoT networks with SISLOF, pp. 1–6. https://doi.org/10.1109/GIOTS.2017.8016278

  18. Mao, S. (2016). Crowd cloud routing protocol based on opportunistic computing for wireless sensor networks. EURASIP Embedded Systems. https://doi.org/10.1186/s13639-016-0063-5

    Article  Google Scholar 

  19. Thakur, U. K., & Dethe, C. (2019). QoS aware cloud based routing protocol for security improvement of hybrid wireless network. Machine Learning Research, 4(1), 21–26.

    Article  Google Scholar 

  20. Kuppusamy, K., & Mahalakshmi, J. (2013). A survey on routing algorithms for cloud computing.

  21. Nazir, M. C. (2012). Computing: Overview & current research challenges. IOSR Journal of Computer Engineering (IOSR-JCE), 8(1), 14–22, ISSN: 2278-0661,ISBN:2278-8727.

  22. Deepa, M. (2017). Routing optimization in cloud networks. IJARCS, 8(2).

  23. Sadique, K. M., Rahmani, R., & Johannesson, P. (2018). Towards security on internet of things: Applications and challenges in technology. Procedia Computer Science, 199–206.

  24. Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). A lightweight trust design for IoT routing. In IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (pp. 552–557).

  25. Suchithra, M., Baskar, M., Ramkumar, J. P., Kalyanasundaram, B. & Amutha, B. (2020). Invariant packet feature with network conditions for efficient low rate attack detection in multimedia networks for improved QoS. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02056-1

    Article  Google Scholar 

  26. Baskar, M., Ramkumar, J., Karthikeyan, C., et al. (2021). Low rate DDoS mitigation using real-time multi threshold traffic monitoring system. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02744-y

    Article  Google Scholar 

  27. Baskar, M., et al. (2020). Effective framework to monitor patient health care through intelligent system. IJAST, 29(4).

  28. Bala, K., ChandraSekar, A., Baskar, M., & Paramesh, J. (2019). An efficient multi level intrusion detection system for mobile ad-hoc network using clustering technique. International Journal of Engineering and Advanced Technology (IJEAT), 8(6), 1977–1985. ISSN: 2249–8958.

  29. Baskar, M., Renuka Devi, R., Ramkumar, J., et al. (2021). Region centric minutiae propagation measure orient forgery detection with finger print analysis in health care systems. Neural Processing Letters. https://doi.org/10.1007/s11063-020-10407-4

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Balamurugan.

Ethics declarations

Conflict of interest

We authors not having any conflict of interest among ourselves to submit and publish our articles in Wireless Personal Communications journal.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Santhosh, J., Balamurugan, P., Arulkumaran, G. et al. Image Driven Multi Feature Plant Management with FDE Based Smart Agriculture with Improved Security in Wireless Sensor Networks. Wireless Pers Commun 127, 1647–1663 (2022). https://doi.org/10.1007/s11277-021-08710-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08710-x

Keywords

Navigation