EconPapers    
Economics at your fingertips  
 

Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture

Zaid Ameen Abduljabbar (), Vincent Omollo Nyangaresi, Hend Muslim Jasim, Junchao Ma (), Mohammed Abdulridha Hussain, Zaid Alaa Hussien and Abdulla J. Y. Aldarwish
Additional contact information
Zaid Ameen Abduljabbar: Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq
Vincent Omollo Nyangaresi: Department of Computer Science and Software Engineering, Jaramogi Oginga Odinga University of Science & Technology, Bondo 40601, Kenya
Hend Muslim Jasim: Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq
Junchao Ma: College of Big Data and Internet, Shenzhen Technology University, Shenzhen 518118, China
Mohammed Abdulridha Hussain: Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq
Zaid Alaa Hussien: Information Technology Department, Management Technical College, Southern Technical University, Basrah 61005, Iraq
Abdulla J. Y. Aldarwish: Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq

Sustainability, 2023, vol. 15, issue 13, 1-20

Abstract: Precision agriculture encompasses automation and application of a wide range of information technology devices to improve farm output. In this environment, smart devices collect and exchange a massive number of messages with other devices and servers over public channels. Consequently, smart farming is exposed to diverse attacks, which can have serious consequences since the sensed data are normally processed to help determine the agricultural field status and facilitate decision-making. Although a myriad of security schemes has been presented in the literature to curb these challenges, they either have poor performance or are susceptible to attacks. In this paper, an elliptic curve cryptography-based scheme is presented, which is shown to be formally secure under the Burrows–Abadi–Needham (BAN) logic. In addition, it is semantically demonstrated to offer user privacy, anonymity, unlinkability, untraceability, robust authentication, session key agreement, and key secrecy and does not require the deployment of verifier tables. In addition, it can withstand side-channeling, physical capture, eavesdropping, password guessing, spoofing, forgery, replay, session hijacking, impersonation, de-synchronization, man-in-the-middle, privileged insider, denial of service, stolen smart device, and known session-specific temporary information attacks. In terms of performance, the proposed protocol results in 14.67% and 18% reductions in computation and communication costs, respectively, and a 35.29% improvement in supported security features.

Keywords: Agriculture 4.0; precision agriculture; privacy; smart farming; security (search for similar items in EconPapers)
JEL-codes: O13 Q Q0 Q2 Q3 Q5 Q56 (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
https://www.mdpi.com/2071-1050/15/13/10264/pdf (application/pdf)
https://www.mdpi.com/2071-1050/15/13/10264/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jsusta:v:15:y:2023:i:13:p:10264-:d:1181867

Access Statistics for this article

Sustainability is currently edited by Ms. Alexandra Wu

More articles in Sustainability from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jsusta:v:15:y:2023:i:13:p:10264-:d:1181867