Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture

被引:8
|
作者
Abduljabbar, Zaid Ameen [1 ,2 ,3 ]
Nyangaresi, Vincent Omollo [4 ]
Jasim, Hend Muslim [1 ]
Ma, Junchao [5 ]
Hussain, Mohammed Abdulridha [1 ,2 ]
Hussien, Zaid Alaa [6 ]
Aldarwish, Abdulla J. Y. [1 ]
机构
[1] Univ Basrah, Coll Educ Pure Sci, Dept Comp Sci, Basrah 61004, Iraq
[2] AL Kunooze Univ Coll, Tech Comp Engn Dept, Basrah 61001, Iraq
[3] Huazhong Univ Sci & Technol, Shenzhen Inst, Shenzhen 518000, Peoples R China
[4] Jaram Oginga Odinga Univ Sci & Technol, Dept Comp Sci & Software Engn, Bondo 40601, Kenya
[5] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen 518118, Peoples R China
[6] Southern Tech Univ, Management Tech Coll, Informat Technol Dept, Basrah 61005, Iraq
关键词
Agriculture; 4; 0; precision agriculture; privacy; smart farming; security; KEY AGREEMENT SCHEME; USER AUTHENTICATION SCHEME; PROTOCOL; INTERNET; IOT;
D O I
10.3390/su151310264
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Precision agriculture encompasses automation and application of a wide range of information technology devices to improve farm output. In this environment, smart devices collect and exchange a massive number of messages with other devices and servers over public channels. Consequently, smart farming is exposed to diverse attacks, which can have serious consequences since the sensed data are normally processed to help determine the agricultural field status and facilitate decision-making. Although a myriad of security schemes has been presented in the literature to curb these challenges, they either have poor performance or are susceptible to attacks. In this paper, an elliptic curve cryptography-based scheme is presented, which is shown to be formally secure under the Burrows-Abadi-Needham (BAN) logic. In addition, it is semantically demonstrated to offer user privacy, anonymity, unlinkability, untraceability, robust authentication, session key agreement, and key secrecy and does not require the deployment of verifier tables. In addition, it can withstand side-channeling, physical capture, eavesdropping, password guessing, spoofing, forgery, replay, session hijacking, impersonation, de-synchronization, man-in-the-middle, privileged insider, denial of service, stolen smart device, and known session-specific temporary information attacks. In terms of performance, the proposed protocol results in 14.67% and 18% reductions in computation and communication costs, respectively, and a 35.29% improvement in supported security features.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Optimal Elliptic Curve Cryptography-Based Effective Approach for Secure Data Storage in Clouds
    Malik, Anju
    Aggarwal, Mayank
    Sharma, Bharti
    Singh, Akansha
    Singh, Krishna Kant
    INTERNATIONAL JOURNAL OF KNOWLEDGE AND SYSTEMS SCIENCE, 2020, 11 (04) : 65 - 81
  • [2] A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card
    Madhusudhan, R.
    Hegde, Manjunath
    Memon, Imran
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (11)
  • [3] A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    SECURITY AND PRIVACY, 2020, 3 (01):
  • [4] Secure Data Transmission Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Harbi, Yasmine
    Aliouat, Zibouda
    Harous, Saad
    Bentaleb, Abdelhak
    MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, 2019, 64 : 34 - 46
  • [5] Elliptic Curve Cryptography-Based Identity Authentication Scheme Suitable for Metaverse Environment
    Zhai, Haonan
    Deng, Miaolei
    Wu, Huanmei
    SYMMETRY-BASEL, 2024, 16 (07):
  • [6] An Efficient Elliptic Curve Cryptography-Based Secure Communication with Privacy Preserving for Autonomous Vehicle
    Xiao, Jiongen
    Liu, Yi
    Zou, Yi
    Li, Dacheng
    Leng, Tao
    JOURNAL OF ADVANCED TRANSPORTATION, 2024, 2024
  • [7] A secure authenticated image encryption scheme based on elliptic curve cryptography
    Jnana Ramakrishna C.
    Bharath Kalyan Reddy D.
    Amritha P.P.
    Lakshmy K.V.
    Sachnev V.
    International Journal of Computers and Applications, 2024, 46 (03) : 184 - 193
  • [8] An Elliptic Curve Cryptography-Based Multi-Server Authentication Scheme Using Cancelable Biometrics
    Barman, Subhas
    Chaudhuri, Abhisek
    Chatterjee, Atanu
    Raza, Md Ramiz
    INTELLIGENT COMPUTING AND COMMUNICATION, ICICC 2019, 2020, 1034 : 153 - 163
  • [9] Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids
    Zhang, Liping
    Tang, Shanyu
    Luo, He
    PLOS ONE, 2016, 11 (03):
  • [10] Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking
    Chien, Hung-Yu
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2925 - 2936