Figure - available from: Wireless Communications and Mobile Computing
This content is subject to copyright. Terms and conditions apply.
Computational cost comparison in milliseconds.

Computational cost comparison in milliseconds.

Source publication
Article
Full-text available
The Internet of Things (IoT) has revolutionized practically every industry, including agriculture, due to its fast expansion and integration into other industries. The application of IoT in agriculture motivates farmers to use their resources wisely and allows for better field monitoring and decision-making, resulting in increased agricultural prod...

Similar publications

Article
Full-text available
Internet of Things (IoT) is an unavoidable technology evolution in the present era. All most all the domains have accepted IoT in their applications. Recently, IoT is adopted in agriculture as smart farming to collect environmental and crop data. IoT devices are used to collect data from sensors and it can be analyzed for further improvement of far...

Citations

... The security and efficiency of the authentication and access control protocols for UAV networks are based on computationally challenging problems such as Rivest-Shamir-Adleman (RSA) cryptography, bilinear pairing (BP), and elliptic curve cryptography (ECC) [14]. RSA cryptography, for instance, relies on solving significant factorization problems with keys, parameters, certificates, and identities that can be as long as 1024 bits [15]. ...
Article
Full-text available
UAV networks have gained widespread recognition across multiple industries due to their remarkable adaptability, prompting a fundamental transformation in operational procedures. However, utilizing the open wireless communication channel has consistently brought about significant privacy concerns as a prominent aspect within these networks. Moreover, UAVs are typically equipped with limited computing capabilities that hinder their ability to execute complex cryptographic algorithms. In light of these considerations, this paper proposes a security protocol for UAV networks that uses an authentication and access control mechanism to eliminate the possibility of any security breaches. The proposed scheme is based on hyperelliptic curve cryptography (HECC), which employs a smaller key size of 80 bits instead of the 160 bits required by elliptic curve cryptography (ECC). Remarkably, HECC offers equivalent security to other methods such as RSA, ECC, bilinear pairing, etc., and is, therefore, suitable for UAV networks. The proposed protocol is evaluated for security using the well-known Real-Or-Random (ROR) Oracle model. The AVISPA tool is employed to illustrate the security of the proposed protocol against adversarial scenarios in the on-the-fly model-checker (OFMC) and constraint-logic-based attack searcher (Cl-AtSe) models. Furthermore, the informal security analysis guarantees that the proposed protocol withstands possible attacks based on the Canetti-Krawczyk (CK) and Dolev–yao (DY) adversarial models. The comparative analysis of the proposed protocol's performance with other existing methods demonstrates the proposed protocol's viability in terms of computation and communication costs.
... But despite that, according to (25) it still lack eavesdropping attack resistance. In their efforts to enhance security in IoT-based Agriculture, Hassan et al. (26) employed identity-based cryptography to craft an authentication mechanism. They further integrated HECC to optimize performance. ...
Article
Full-text available
Over the past few years, the agricultural industry has experienced a significant shift driven by technological progress, increasing environmental awareness, and changing demographics within the farming community. Smart agriculture innovatively utilizes digital technology, real-time data analysis, and precise resource management to promote environmentally responsible farming, employing integrated sensor networks and precision farming techniques for monitoring plant health in both soil and soilless agriculture. Despite the promising benefits, there are significant challenges in ensuring security and privacy of data and the resilience of smart agriculture systems, which are equally applicable to both soil and soilless agriculture. Previous research efforts have explored mechanisms, but these solutions often encounter issues related to authentication, confidentiality, data privacy, and vulnerability to known attacks. Furthermore, current schemes exhibit performance deficiencies due to an excessive reliance on Rivest-Shamir-Adleman (RSA), bilinear pairing, and elliptic curve cryptography (ECC). To overcome all these issues, we introduce a novel method that utilizes homomorphic signcryption based on hyper-elliptic curve cryptography (HECC), addressing the security concerns in both soil and soilless agriculture. This cryptographic technique enhances security while reducing computational and communication demands in comparison to existing mechanisms. Performance analysis indicates that this method is more efficient and offers data privacy, data integrity, confidentiality, authentication, and resistance against known attacks. To validate its safety and robustness, simulation using the Scyther security validation tool were conducted, confirming its appropriateness for smart agriculture environments based on soil and soilless agriculture.
... Therefore, the importance of the identity-based authentication model can not be neglected in WSN applications. To overcome the authentication security challenges in WSN applications, Hassan et al. [112], proposed an identity-based authentication scheme for WSN and IoT applications by taking into account the agriculture sector. Despite the authentication of legitimate devices, the author used hyperelliptic curve cryptography (HECC) algorithm with a hash function to ensure data in-This article has been accepted for publication in IEEE Sensors Journal. ...
Article
In the recent past, patient wearable devices and implantable biosensors revealed exponential growth in digital healthcare, because they have the capability to allow access to the information anywhere and every time to improve the life standard of multifarious disease effected patients followed by healthy people. Following these advantages, digital healthcare demands a secure wireless communication infrastructure for interconnected self-empowered biosensor devices to maintain the trust of patients, doctors, pharmacologists, nursing staff, and other associated stakeholders, etc. Several authentications, privacy, and data preservation schemes had been used in the literature to ensure the security of this emerging technology, but with time, these counteraction prototypes become vulnerable to new security threats, as the hackers work tirelessly to compromise them and steal the legitimate information of user’s or disrupt the operation of an employed self-empowered wireless sensor network (SWSN). To discuss the security problems of SWSN applications, in this review article, we have presented a detailed survey of the present literature from 2019 to 2022, to familiarize the readers with different security threats and their counteraction schemes. Following this, we will highlight the pros and cons of these countermeasure techniques in the context of SWSN security requirements to underscore their limitations. Thereafter, we will follow-up the underlined limitations to discuss the open security challenges of SWSN that need the concerned authorities’ attention. Based on this, we will pave a road map for the future research work that could be useful for every individual associated with this technology. For the novelty and uniqueness of this work, we will make comparative analysis with present survey papers published on this topic to answer the question of reviewers, readers, editors, and students that why this paper is in time and needed in the presence of rival papers.
Article
Full-text available
The Social Industrial Internet of Things (SIIoT) is a new paradigm that integrates social networking features into the Industrial IoT (IIoT) environment to enforce efficient and effective service discovery and collaboration between smart IoT objects in a friendly and scalable way. Therefore, in such environment, the establishment of secure and trust communication scheme is a crucial need between peer IoT devices having similar social profiles. In addition, the limited resource-constrained IoT devices are unable to deal with huge computational overheads. To address these issues, we propose a novel solution offering secure fog-based Social Industrial IoT (Fog-SIIoT) scheme. Fog-SIIoT guarantees mutual authentication, anonymity and secure communication through a trust key agreement between social smart things. The proposed scheme is suitable for the social resource-constrained IIoT as it only uses hash function, bitwise XOR operation and symmetric cryptography. Compared to correlative schemes, our solution presents many advantages in terms of security aspects, efficiency, social awareness and reduced computation overheads. Besides, the security analysis indicates that our scheme can withstand many known attacks and we proved it with the help of the formal security analysis using the BAN logic and the formal security verification using AVISPA tool.