Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture

被引:8
|
作者
Abduljabbar, Zaid Ameen [1 ,2 ,3 ]
Nyangaresi, Vincent Omollo [4 ]
Jasim, Hend Muslim [1 ]
Ma, Junchao [5 ]
Hussain, Mohammed Abdulridha [1 ,2 ]
Hussien, Zaid Alaa [6 ]
Aldarwish, Abdulla J. Y. [1 ]
机构
[1] Univ Basrah, Coll Educ Pure Sci, Dept Comp Sci, Basrah 61004, Iraq
[2] AL Kunooze Univ Coll, Tech Comp Engn Dept, Basrah 61001, Iraq
[3] Huazhong Univ Sci & Technol, Shenzhen Inst, Shenzhen 518000, Peoples R China
[4] Jaram Oginga Odinga Univ Sci & Technol, Dept Comp Sci & Software Engn, Bondo 40601, Kenya
[5] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen 518118, Peoples R China
[6] Southern Tech Univ, Management Tech Coll, Informat Technol Dept, Basrah 61005, Iraq
关键词
Agriculture; 4; 0; precision agriculture; privacy; smart farming; security; KEY AGREEMENT SCHEME; USER AUTHENTICATION SCHEME; PROTOCOL; INTERNET; IOT;
D O I
10.3390/su151310264
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Precision agriculture encompasses automation and application of a wide range of information technology devices to improve farm output. In this environment, smart devices collect and exchange a massive number of messages with other devices and servers over public channels. Consequently, smart farming is exposed to diverse attacks, which can have serious consequences since the sensed data are normally processed to help determine the agricultural field status and facilitate decision-making. Although a myriad of security schemes has been presented in the literature to curb these challenges, they either have poor performance or are susceptible to attacks. In this paper, an elliptic curve cryptography-based scheme is presented, which is shown to be formally secure under the Burrows-Abadi-Needham (BAN) logic. In addition, it is semantically demonstrated to offer user privacy, anonymity, unlinkability, untraceability, robust authentication, session key agreement, and key secrecy and does not require the deployment of verifier tables. In addition, it can withstand side-channeling, physical capture, eavesdropping, password guessing, spoofing, forgery, replay, session hijacking, impersonation, de-synchronization, man-in-the-middle, privileged insider, denial of service, stolen smart device, and known session-specific temporary information attacks. In terms of performance, the proposed protocol results in 14.67% and 18% reductions in computation and communication costs, respectively, and a 35.29% improvement in supported security features.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] A Proactive Secret Sharing Scheme Based on Elliptic Curve Cryptography
    Sun, Hua
    Zheng, Xuefeng
    Yu, Yike
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 666 - 669
  • [42] Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography
    Athavale, Aditi
    Singh, Kuldip
    Sood, Sandeep
    2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, : 332 - 335
  • [43] A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    He, Debiao
    Chen, Jianhua
    Chen, Yitao
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1423 - 1429
  • [44] SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography
    Almajed, Hisham N.
    Almogren, Ahmad S.
    IEEE ACCESS, 2019, 7 : 175865 - 175878
  • [45] Secure Multiparty Computation and Privacy Preserving scheme using Homomorphic Elliptic Curve Cryptography
    Chouhan, Ankit
    Kumari, Anupam
    Saiyad, Makhduma
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 776 - 780
  • [46] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zhang, Zezhong
    Qi, Qingqing
    Kumar, Neeraj
    Chilamkurti, Naveen
    Jeong, Hwa-Young
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (10) : 3477 - 3488
  • [47] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zezhong Zhang
    Qingqing Qi
    Neeraj Kumar
    Naveen Chilamkurti
    Hwa-Young Jeong
    Multimedia Tools and Applications, 2015, 74 : 3477 - 3488
  • [48] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
  • [49] Horse herd optimised elliptic curve cryptography for secure data aggregation in WSN
    Manoharan, Maravarman
    Subramani, Babu
    Ramu, Pitchai
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2024, 46 (04) : 231 - 247
  • [50] A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography
    Dheerendra Mishra
    Ashok Kumar Das
    Sourav Mukhopadhyay
    Mohammad Wazid
    Wireless Personal Communications, 2016, 91 : 1361 - 1391