ABSTRACT
This paper envisions cyber-farm systems along the lines of cyber-physical systems. It is imperative for corporates and nations to maintain health of the crops to ensure food security. In order to avoid any adversarial attack on agriculture sensors in farms, we propose a collaborative sensing based authentication protocol. It assures that the spoofing and tampering can be detected with high probability. The data collected from the experimental deployment of sensor nodes supports the solution proposed by the paper.
- Bloomberg. 2018. Skyscraper Farms Are About to Go Global. Retrieved June 15, 2021 from https://www.bloomberg.com/news/articles/2018-10-30/skyscraper-farms-are-about-to-go-globalGoogle Scholar
- Dodis et al. 2004. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In International conference on the theory and applications of cryptographic techniques. Springer, 523--540.Google ScholarCross Ref
- Jay Prakash, Chenxi Liu, Tony Q. S. Quek, and Jemin Lee. 2019. RF Based Entropy Sources for Jamming Resilience: Poster (WiSec '19). Association for Computing Machinery, New York, NY, USA, 300--301.Google Scholar
- Natthapol Watthanawisuth, Adisorn Tuantranont, and Teerakiat Kerdcharoen. 2009. Microclimate real-time monitoring based on ZigBee sensor network. In SENSORS, 2009 IEEE. 1814--1818. Google ScholarCross Ref
Index Terms
- AgriAuth: sensor collaboration and corroboration for data confidence in smart farms
Recommendations
LearJam: An Energy-Efficient Learning-Based Jamming Attack against Low-Duty-Cycle Networks
MASS '14: Proceedings of the 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor SystemsLow-duty-cycle network plays an crucial role in improving energy efficiency of wireless communication, where nodes stay asleep most of time. Despite energy saving, the security of low-duty-cycle networks is of great concern. The attacking strategy ...
Security and Design Challenges in Cyber-Physical Systems
ITNG '15: Proceedings of the 2015 12th International Conference on Information Technology - New GenerationsCyber-Physical Systems require the development of security models at cloud interacting with physical systems. The current research discusses the security requirements in the future engineering systems includes the state of security in cloud cyber-...
An energy efficient Genetic Algorithm based approach for sensor-to-sink binding in multi-sink wireless sensor networks
Wireless sensor networks (WSNs) are ad-hoc networks in which sensors, that are designed to relay data back to sink nodes and/or Base Stations, are deployed in an area and may be configured in real time. Sensors, however, have limited energy supplies and ...
Comments