1
|
AgriSecure: A Fog Computing-Based Security Framework for Agriculture 4.0 via Blockchain. Processes (Basel) 2023. [DOI: 10.3390/pr11030757] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/08/2023] Open
Abstract
Every aspect of the 21st century has undergone a revolution because of the Internet of Things (IoT) and smart computing technologies. These technologies are applied in many different ways, from monitoring the state of crops and the moisture level of the soil in real-time to using drones to help with chores such as spraying pesticides. The extensive integration of both recent IT and conventional agriculture has brought in the phase of agriculture 4.0, often known as smart agriculture. Agriculture intelligence and automation are addressed by smart agriculture. However, with the advancement of agriculture brought about by recent digital technology, information security challenges cannot be overlooked. The article begins by providing an overview of the development of agriculture 4.0 with pros and cons. This study focused on layered architectural design, identified security issues, and presented security demands and upcoming prospects. In addition to that, we propose a security architectural framework for agriculture 4.0 that combines blockchain technology, fog computing, and software-defined networking. The suggested framework combines Ethereum blockchain and software-defined networking technologies on an open-source IoT platform. It is then tested with three different cases under a DDoS attack. The results of the performance analysis show that overall, the proposed security framework has performed well.
Collapse
|
2
|
Detecting Sinkhole Attacks in IoT-Based Wireless Sensor Networks Using Distance From Base Station. INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN 2022. [DOI: 10.4018/ijismd.297628] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
Abstract
Wireless sensor networks (WSNs) are infrastructure-less in nature, which contains numbers of autonomous sensor nodes. These sensor nodes are dedicated to monitoring the physical conditions of the environment and are organizing the collected data at a central location. Application area of WSN, like - heath care, military surveillance, are sensitive with respective to information sensed, that’s why security of WSN needs to be very effective. Providing security to WSN plays a major role as it consists of limited resources. The security system should lie within the boundary of the resource potential as well as should be competent enough to handle attacks. Intrusion detection system (IDS) is one such type of defense system, which can fulfill the measure of limitation of resources. In this paper, a detection technique is proposed against sinkhole attack using the Euclidean distance of each node from base station. The main advantage of the proposed technique is that it doesn't require any extra hardware setup as well as doesn't require extra communication cost.
Collapse
|
3
|
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security. COMPLEX INTELL SYST 2022. [DOI: 10.1007/s40747-022-00667-z] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
Abstract
AbstractThe recent years have garnered huge attention towards the Internet of Things (IoT) because it enables its consumers to improve their lifestyles and professionally keep up with the technological advancements in the cyber-physical world. The IoT edge devices are heterogeneous in terms of the technology they are built on and the storage file formats used. These devices require highly secure modes of mutual authentication to authenticate each other before actually sending the data. Mutual authentication is a very important aspect of peer-to-peer communication. Secure session keys enable these resource-constrained devices to authenticate each other. After successful authentication, a device can be authorized and can be granted access to shared resources. The need for validating a device requesting data transfer to avoid data privacy breaches that may compromise confidentiality and integrity. Blockchain and artificial intelligence (AI) both are extensively being used as an integrated part of IoT networks for security enhancements. Blockchain provides a decentralized mechanism to store validated session keys that can be allotted to the network devices. Blockchain is also used to load balance the stressing edge devices during low battery levels. AI on the other hand provides better learning and adaptiveness towards IoT attacks. The integration of newer technologies in IoT key management yields enhanced security features. In this article, we systematically survey recent trending technologies from an IoT security point of view and discuss traditional key security mechanisms. This article delivers a comprehensive quality study for researchers on authentication and session keys, integrating IoT with blockchain and AI-based authentication in cybersecurity.
Collapse
|
4
|
|