Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture

被引:8
|
作者
Abduljabbar, Zaid Ameen [1 ,2 ,3 ]
Nyangaresi, Vincent Omollo [4 ]
Jasim, Hend Muslim [1 ]
Ma, Junchao [5 ]
Hussain, Mohammed Abdulridha [1 ,2 ]
Hussien, Zaid Alaa [6 ]
Aldarwish, Abdulla J. Y. [1 ]
机构
[1] Univ Basrah, Coll Educ Pure Sci, Dept Comp Sci, Basrah 61004, Iraq
[2] AL Kunooze Univ Coll, Tech Comp Engn Dept, Basrah 61001, Iraq
[3] Huazhong Univ Sci & Technol, Shenzhen Inst, Shenzhen 518000, Peoples R China
[4] Jaram Oginga Odinga Univ Sci & Technol, Dept Comp Sci & Software Engn, Bondo 40601, Kenya
[5] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen 518118, Peoples R China
[6] Southern Tech Univ, Management Tech Coll, Informat Technol Dept, Basrah 61005, Iraq
关键词
Agriculture; 4; 0; precision agriculture; privacy; smart farming; security; KEY AGREEMENT SCHEME; USER AUTHENTICATION SCHEME; PROTOCOL; INTERNET; IOT;
D O I
10.3390/su151310264
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Precision agriculture encompasses automation and application of a wide range of information technology devices to improve farm output. In this environment, smart devices collect and exchange a massive number of messages with other devices and servers over public channels. Consequently, smart farming is exposed to diverse attacks, which can have serious consequences since the sensed data are normally processed to help determine the agricultural field status and facilitate decision-making. Although a myriad of security schemes has been presented in the literature to curb these challenges, they either have poor performance or are susceptible to attacks. In this paper, an elliptic curve cryptography-based scheme is presented, which is shown to be formally secure under the Burrows-Abadi-Needham (BAN) logic. In addition, it is semantically demonstrated to offer user privacy, anonymity, unlinkability, untraceability, robust authentication, session key agreement, and key secrecy and does not require the deployment of verifier tables. In addition, it can withstand side-channeling, physical capture, eavesdropping, password guessing, spoofing, forgery, replay, session hijacking, impersonation, de-synchronization, man-in-the-middle, privileged insider, denial of service, stolen smart device, and known session-specific temporary information attacks. In terms of performance, the proposed protocol results in 14.67% and 18% reductions in computation and communication costs, respectively, and a 35.29% improvement in supported security features.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Efficient and secure e-voting scheme using elliptic curve cryptography
    Chatterjee, Uddalak
    Ray, Sangram
    Adhikari, Sharmistha
    Khan, Muhammad Khurram
    Dasgupta, Mou
    SECURITY AND PRIVACY, 2023, 6 (03)
  • [32] Robust and Secure Image Steganography Based on Elliptic Curve Cryptography
    Ahmed, Diaa E. M.
    Khalifa, Othman O.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2014, : 288 - 291
  • [33] Toward A Real-Time Elliptic Curve Cryptography-Based Facial Security System
    Tuy Tan Nguyen
    Lee, Hanho
    2022 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, APCCAS, 2022, : 364 - 367
  • [34] An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Naqvi, Husnain
    Khan, Muhammad Khurram
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
  • [35] An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography
    Shehzad Ashraf Chaudhry
    Khalid Mahmood
    Husnain Naqvi
    Muhammad Khurram Khan
    Journal of Medical Systems, 2015, 39
  • [36] A new secure e-mail scheme based on Elliptic Curve Cryptography Combined Public Key
    Zhang, Yi
    Cui, Tianxi
    Tang, Hong
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 336 - +
  • [37] Cryptography-based secure data storage and sharing using HEVC and public clouds
    Usman, Muhammad
    Jan, Mian Ahmad
    He, Xiangjian
    INFORMATION SCIENCES, 2017, 387 : 90 - 102
  • [38] An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography
    Sun, Xue
    Xia, Mingping
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 88 - 91
  • [39] A Fair Electronic Cash Scheme Based on Elliptic Curve Cryptography
    Xu, Shouzhi
    Liu, Qiaoli
    Yu, Hen
    Zhou, Huan
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 758 - 763
  • [40] A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles
    Nyangaresi, Vincent Omollo
    Jasim, Hend Muslim
    Mutlaq, Keyan Abdul-Aziz
    Abduljabbar, Zaid Ameen
    Ma, Junchao
    Abduljaleel, Iman Qays
    Honi, Dhafer G.
    ELECTRONICS, 2023, 12 (17)