Author
Listed:
- Zaid Ameen Abduljabbar
(Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq
Technical Computer Engineering Department, AL-Kunooze University College, Basrah 61001, Iraq
Shenzhen Institute, Huazhong University of Science and Technology, Shenzhen 518000, China)
- Vincent Omollo Nyangaresi
(Department of Computer Science and Software Engineering, Jaramogi Oginga Odinga University of Science & Technology, Bondo 40601, Kenya)
- Hend Muslim Jasim
(Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq)
- Junchao Ma
(College of Big Data and Internet, Shenzhen Technology University, Shenzhen 518118, China)
- Mohammed Abdulridha Hussain
(Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq
Technical Computer Engineering Department, AL-Kunooze University College, Basrah 61001, Iraq)
- Zaid Alaa Hussien
(Information Technology Department, Management Technical College, Southern Technical University, Basrah 61005, Iraq)
- Abdulla J. Y. Aldarwish
(Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq)
Abstract
Precision agriculture encompasses automation and application of a wide range of information technology devices to improve farm output. In this environment, smart devices collect and exchange a massive number of messages with other devices and servers over public channels. Consequently, smart farming is exposed to diverse attacks, which can have serious consequences since the sensed data are normally processed to help determine the agricultural field status and facilitate decision-making. Although a myriad of security schemes has been presented in the literature to curb these challenges, they either have poor performance or are susceptible to attacks. In this paper, an elliptic curve cryptography-based scheme is presented, which is shown to be formally secure under the Burrows–Abadi–Needham (BAN) logic. In addition, it is semantically demonstrated to offer user privacy, anonymity, unlinkability, untraceability, robust authentication, session key agreement, and key secrecy and does not require the deployment of verifier tables. In addition, it can withstand side-channeling, physical capture, eavesdropping, password guessing, spoofing, forgery, replay, session hijacking, impersonation, de-synchronization, man-in-the-middle, privileged insider, denial of service, stolen smart device, and known session-specific temporary information attacks. In terms of performance, the proposed protocol results in 14.67% and 18% reductions in computation and communication costs, respectively, and a 35.29% improvement in supported security features.
Suggested Citation
Zaid Ameen Abduljabbar & Vincent Omollo Nyangaresi & Hend Muslim Jasim & Junchao Ma & Mohammed Abdulridha Hussain & Zaid Alaa Hussien & Abdulla J. Y. Aldarwish, 2023.
"Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture,"
Sustainability, MDPI, vol. 15(13), pages 1-20, June.
Handle:
RePEc:gam:jsusta:v:15:y:2023:i:13:p:10264-:d:1181867
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:15:y:2023:i:13:p:10264-:d:1181867. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.