STRIDE-based Cyber Security Threat Modeling for IoT-enabled Precision Agriculture Systems

被引:13
作者
Al Asif, Md Rashid [1 ]
Hasan, Khondokar Fida [2 ]
Islam, Md Zahidul [3 ]
Khondoker, Rahamatullah [4 ]
机构
[1] Univ Barishal, Dept Comp Sci & Engn, Barishal, Bangladesh
[2] RMIT Univ, Ctr Cyber Secur Res & Amp Innovat, 124 La Trobe St, Melbourne, Vic 3000, Australia
[3] Islamic Univ, Dept Informat & Commun Technolog, Kushtia, Bangladesh
[4] THM Univ Appl Sci, Dept Business Comp, Friedberg, Germany
来源
2021 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR INDUSTRY 4.0 (STI) | 2021年
关键词
Cyber security; Internet of Things (IoT); Precision; Agriculture; STRIDE; Threat Modeling; AUTHENTICATION; COMMUNICATION; INTERNET;
D O I
10.1109/STI53101.2021.9732597
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The concept of traditional farming is changing rapidly with the introduction of smart technologies like the Internet of Things (IoT). Under the concept of smart agriculture, precision agriculture is gaining popularity to enable Decision Support System (DSS)-based farming management that utilizes widespread IoT sensors and wireless connectivity to enable automated detection and optimization of resources. Undoubtedly the success of the system would be impacted on crop productivity, where failure would impact severely. Like many other cyberphysical systems, one of the growing challenges to avoid system adversity is to ensure the system's security, privacy, and trust. But what are the vulnerabilities, threats, and security issues we should consider while deploying precision agriculture? This paper has conducted a holistic threat modeling on component levels of precision agriculture's standard infrastructure using popular threat intelligence tools STRIDE to identify common security issues. Our modeling identifies a noticing of fifty-eight potential security threats to consider. This presentation systematically presented them and advised general mitigation suggestions to support cyber security in precision agriculture.
引用
收藏
页数:6
相关论文
共 30 条
[1]  
Pinno OJA, 2017, IEEE GLOB COMM CONF
[2]   An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things [J].
Ahmed, Adel Ali ;
Ahmed, Waleed Ali .
SENSORS, 2019, 19 (17)
[3]  
Al Asif M. R., 2020, P INT JOINT C COMPUT, P409
[4]  
Al Asif M. R., 2020, PROC 2 INT C SUSTAIN, P1
[5]  
Alizai Zahoor Ahmed, 2018, 2018 International Conference on Applied and Engineering Mathematics (ICAEM), P115, DOI 10.1109/ICAEM.2018.8536261
[6]  
Barker E. B., 2020, NIST SPECIAL PUBLICA, DOI [10.6028/NIST.SP.800-175Br1, DOI 10.6028/NIST.SP.800-175BR1]
[7]  
Bhattacharjya A., 2020, Digital twin technologies and smart cities, P151
[8]  
Cagnazzo M, 2018, IEEE WIREL COMMUNN, P314, DOI 10.1109/WCNCW.2018.8369033
[9]  
Dang Q., 2012, Recommendation for Applications Using Approved Hash Algorithms
[10]  
Dworkin Morris., 2004, NIST SPECIAL PUBLICA