Abstract

Internet of Things (IoT) provides a diverse platform to automate things where smart agriculture is one of the most promising concepts in the field of Internet of Agriculture Things (IoAT). Due to the requirements of more processing power for computations and predictions, the concept of Cloud-based smart agriculture is proposed for autonomic systems. This is where digital innovation and technology helps to improve the quality of life in the area of urbanization expansion. For the integration of cloud in smart agriculture, the system is shown to have security and privacy challenges, and most significantly, the identification of malicious and compromised nodes along with a secure transmission of information between sensors, cloud, and base station (BS). The identification of malicious and compromised node among soil sensors communicating with the BS is a notable challenge in the BS to cloud communications. The trust management mechanism is proposed as one of the solutions providing a lightweight approach to identify these nodes. In this article, we have proposed a novel trust management mechanism to identify malicious and compromised nodes by utilizing trust parameters. The trust mechanism is an event-driven process that computes trust based on the pre-defined time interval and utilizes the previous trust degree to develop an absolute trust degree. The system also maintains the trust degree of a BS and cloud service providers using distinct approaches. We have also performed extensive simulations to evaluate the performance of the proposed mechanism against several potential attacks. In addition, this research helps to create friendlier environments and efficient agricultural productions for the migration of people to the cities.

Highlights

  • The performance of the base station (BS) and cloud service providers is evaluated based on several QoS parameters

  • Smart automated agriculture is a significant concept presented in the domain of Internet of Agriculture Things (IoAT) wherein several sensors are placed in soil to monitor it and transmit the findings towards the BS and it further takes help from the cloud to make effective decisions to take perfect actions

  • One of the significant concepts of trust management is proposed by researchers that can play a notable role to maintain an adequate secure environment in IOAT, but it is neglected in the field of smart agriculture

Read more

Summary

Introduction

Internet Things (IoT) [1] provides a diverse opportunity to automate distinct domains, which include wireless sensor networks [2,3], home appliances [4,5], smart cities [6,7,8], healthcare [9,10,11,12,13], security and surveillance [14,15,16], energy consumption [17,18,19], agriculture automation [20], and many more [21,22,23,24,25]. The sensors in agriculture can be of different types such as soil moisture [38], yield monitoring [39], water and environmental sensing [40], and soil micro-nutrient sensing among others [41,42,43] These sensors can transmit the findings time-to-time towards the BS known as in-field communications performed by utilizing a WiFi Module (ESP8266) [44]. In IoT, sensors are considered as edge nodes, which do not have enough capability to maintain resilience towards several potential attacks in distinct scenarios, such as smart homes [53], smart universities, and smart agriculture [54] In all these environments, it is significant to keep resilience toward attacks generated by hackers with the help of malicious and compromised nodes. A privacy-aware trust management mechanism is proposed for smart agriculture, which provides security by identifying malicious and compromised nodes to maintain a secure environment. The structure of the rest of the article is as follows: Section 2 elaborates on the existing work; Section 3 explains the proposed AgriTrust mechanism along with its working, trust composition, trust aggregation, and trust development; Section 4 presents the simulation results; and Section 5 concludes the paper

Literature Review
Proposed AgriTrust Approach
Base Station to Sensor Trust Evaluation
14: Tncurrent re
Base Station to Cloud Trust Evaluation
Cloud to Base Station Trust Evaluation
Indirect Trust Evaluation
Simulation and Results
Quality-of-Service Evaluation
Honest and Dishonest Precision Evaluation
Whitewashing Attack
On-off Attack
Energy Consumption
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call