ArticlePDF Available

IoT Powered Agricultural Cyber-Physical System: Security Issue Assessment

Authors:

Abstract and Figures

Smart farming or development in agriculture Cyber-Physical Systems has led to the development of various IOT based innovative platforms to aid automated systems for precision agriculture. There are smart devices (IoT devices, smart vehicles, UAVs, ROVs, and drones) and sensors (magnetic, electrochemical, and mechanical sensors)constantly connected at the edge and procure data that is uploaded to cloud-based interfaces for further processing. The sensors can be maneuvered using an insecure, intelligent farming system to create choreographed cybersecurity attacks on a particular farm. End-to-end system is achieved by putting together smart devices, communication media, uploading data to the cloud, intermediate nodes, and processing this data at a central unit like the cloud or intermediate processing at other nodes. Cyber-physical systems are a combination of many technologies, resulting in a large number of security threats. This chapter is to delineate the attack vectors and categories of threats that can be performed on these innovative IOT based agricultural products; if not appropriately secured, can lead to more strategized and sophisticated security attacks that can hinder production for a region under effect and thus bringing down the economy and food stocks of Nations who implemented smart agriculture.
Content may be subject to copyright.
Full Terms & Conditions of access and use can be found at
https://www.tandfonline.com/action/journalInformation?journalCode=tijr20
IETE Journal of Research
ISSN: (Print) (Online) Journal homepage: https://www.tandfonline.com/loi/tijr20
IoT Powered Agricultural Cyber-Physical System:
Security Issue Assessment
Elham Kariri
To cite this article: Elham Kariri (2022): IoT Powered Agricultural Cyber-Physical System: Security
Issue Assessment, IETE Journal of Research, DOI: 10.1080/03772063.2022.2032848
To link to this article: https://doi.org/10.1080/03772063.2022.2032848
Published online: 21 Feb 2022.
Submit your article to this journal
View related articles
View Crossmark data
IETE JOURNAL OF RESEARCH
https://doi.org/10.1080/03772063.2022.2032848
IoT Powered Agricultural Cyber-Physical System: Security Issue Assessment
Elham Kariri
Department of Information Systems, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Alkharj, Saudi
Arabia
ABSTRACT
Smart farming or development in agriculture Cyber-Physical Systems has led to the development
of various IOT based innovative platforms to aid automated systems for precision agriculture. There
are smart devices (IoT devices, smart vehicles, UAVs, ROVs, and drones) and sensors (magnetic, elec-
trochemical, and mechanical sensors)constantly connected at the edge and procure data that is
uploaded to cloud-based interfaces for further processing. The sensors can be maneuvered using
an insecure, intelligent farming system to create choreographed cybersecurity attacks on a particu-
lar farm. End-to-end system is achieved by putting together smart devices, communication media,
uploading data to the cloud, intermediate nodes, and processing this data at a central unit like the
cloud or intermediate processing at other nodes. Cyber-physical systems are a combination of many
technologies, resulting in a large number of security threats. This chapter is to delineate the attack
vectors and categories of threats that can be performed on these innovative IOT based agricul-
tural products; if not appropriately secured, can lead to more strategized and sophisticated security
attacks that can hinder production for a region under effect and thus bringing down the economy
and food stocks of Nations who implemented smart agriculture.
KEYWORDS
IoT security; IoT security
threats; Smart agriculture;
Smart farming; Threat
intelligence
1. INTRODUCTION
Agriculture practices have seen exponential growth as
smart technologies have been implemented in the past
decades. The evidence of technology being involved in
various steps and tiers of food production has shown
reliability on these innovative systems for adding addi-
tional ease in production. Various modules and tiers are
conjugated together to implement the functionality. This
chapter highlights the attack vectors and threat mecha-
nisms that can be devised to spike or introduce subtle
or negligible changes to disrupt the systems and ulti-
mately aect the infrastructure at par. The ideology is to
segregate and review various threat vectors that can be
exploited on IOT based smart agriculture systems, such
as exploitations of any vulnerabilities or aws to com-
promise the system integration. In a basic IoT system,
multiple parties gather, process, and store information;
thesefunctionalitiesareeitherhandledbyasinglehandler
or can be moduled and bought from third-party ven-
dors [1]. A resultant can be easily explored for loopholes
to disrupt the services or cause damage to the system and
its dependencies Figure 1.
The majority of the IoT systems in farming are generally
related to monitoring values such as soil humidity, soil
Ph, temperature, luminosity. The sequence of events is
generally monitored at the ground level and data pass-
ing through various nodes for nal analysis to perpetuate
results. These results are then used to make decisions that
allow the handlers/users to take necessary actions such as
whether to irrigate, fertilize the elds or not, and whether
to regulate temperature or not [2]. This data is also stored
for further check of future possibilities in crop yield, giv-
inganoverviewofwhatconditionsonaground-level
suited better to gain more yield in an area compared to
lab-controlled environments. Undoubtedly, these devices
have provided much-needed benets and real-time mon-
itoring ease for current agricultural practices, shaping for
more gains in the future Figure 2.
Figure 3enlists the various layers present in any IoT-
based system used in agricultural systems. The physical
layerismainlymadeupofdevicessuchassensorsrecord-
ing values at their end. Generally, these are raw values
and often need processing for further usage. The physical
layer ensures these sensors are connected on the ground
and working in a calibrated manner for optimal system
performance [4]. The values such as soil humidity, tem-
peratures, ph values, etc., general observations from sen-
sorsarerecordedatspecictimeintervals.Thephysical
layer is further connected to the network layer, as the raw
data cannot be processed by sensor nodes and has to be
© 2022 IETE
2 E. KARIRI: IOT POWERED AGRICULTURAL CYBER-PHYSICAL SYSTEM: SECURITY ISSUE ASSESSMENT
Figure 1: Architechure model of CPS
propagated to the next tier, which is the middle layer; this
is often done via technologies of wireless band depend-
ing upon the location and feasibility to run the network
layer without much data loss. Often rural farms might
nothavepropernetworkconnectivityandrelyonslower
networks [1,3]. The middle layer is mainly introduced
to ease the processing burden so that any pre-processing
can be done beforehand. The Application layer is majorly
for nal presentation to user or administrator, decision
making, result analysis [1,5]. This chapter will explore the
attack vectors/vulnerabilities or threat landscape of smart
agriculture systems. Section 1, as the introduction, relates
Figure 3: Estimated IoT adoption in Agricultural sector in terms
of percentage globally
to the architecture used on IoT smart systems;the idea
istoelaborateonhowthetier-wisearchitecturecanbe
explored on various levels of threats. Section 2enunciates
past work done towards ensuring security, mainly during
the use of IoT; researchers have worked on wireless sensor
networks as they are the backbone of IoT-built systems
and provide for the communication channel between lay-
ers. Section 3presents a detailed threat landscape that
highlights the variety of vulnerabilities and attacks with
case studies. Finally, section 4refers to mitigation and
practices involved.
2. LITERATURE REVIEW
ThechangingreliabilityofIoTsmartagriculturesys-
temshasbroughtinthemajorityofchallengesonthe
forefront as the economy for the country would often
depend on the agricultural produce and yield. Since a
major part relies on technology, it becomes a more lucra-
tive opportunity to attack these interfaces. Therefore,
Figure 2: Layers in IoT based smart agriculture system [3]
E. KARIRI: IOT POWERED AGRICULTURAL CYBER-PHYSICAL SYSTEM: SECURITY ISSUE ASSESSMENT 3
the IoT technology which has been deployed for aid-
ing might be jeopardized. These systems are often made
to sustain the ground scenarios and be cost-ecient;
this leaves concern for the security of such devices [6].
Mainly, the usage of wireless sensor networks(WSNs) and
securing their communication has been worked upon in
recent years; apart from WSN; data protection has been
another worked upon feature. Since the WSNs limit their
processing power, it is important to secure the chan-
nels to ensure proper management, [7]havepresented
a schema against impersonation and insider attack by
applying two-factor authentication methods. However,
it lacked any high-level encryption schemes which can
easily be cracked using cryptanalysis. Another authenti-
cation scheme was presented by [8]tocombattheauthen-
tication and encryption problem by using remote authen-
tication processes. Eventhough these schemes were used,
but the threat of impersonation could still lead to spoof-
ing and man-in-the-middle attacks. Ref. [9]hasproposed
a session key management to secure the authenticated
channel and secure it against password attacks. Ref. [10]
proposed a novel remote authentication scheme using
BAN logic and session key management, automated vali-
dation of internet security protocols and applications is
used to provide this functionality. In [11], the authors
have worked upon secure user authentication alongside
WSN for secure monitoring of agricultural systems. The
system rstly veries the registered user with a smart-
card mechanism; this smartcard is authenticated via a
card reader to ensure the legit person is accessing the sys-
tem alongside giving a password set by the user. Ref. [12]
have researched possible usage of blockchain to aid the
possibility to draw smart contracts and store data for pro-
cessing and post-processing to smart ledgers to ensure
enhanced security. As more and more data is being pro-
cessed at edge and cloud nodes, it has become easier
tousethisfortheledgerandapplicationlayerbetween
twoparties.Ref.[13]haveproposedasystemtouse
blockchain as the main data collection point from var-
ious sensor nodes, smart contracts are drawn between
management nodes to capture data from sensors and
analyze it. Another ecient approach of creating clus-
ters has been explored by [14,15]throughLowenergy
adaptive clustering hierarchy(LEACH), in the second
phaseofexecution,thedataisseparatedintomulti-
ple blocks uploaded as ledgers on the blockchain, hence
securing the data them. Subsequent nodes will prop-
agate data using Voronoi architecture; the methodol-
ogy has also reduced the update of cluster data only
when a new node is added and not advertising time
andagain.Ref.[16] have implemented a secure remote
telemetry-based subsystem that can easily upload data via
a secured channel through SSH/TLS, the storage system
Figure 4: Elements of Cyber-Physical System
has been secured through a rewall, and IKE authentica-
tion through VPN has been used to propagate data from
node to node. Furthermore, isolation has been estab-
lished in the system using containerization-based SAAS
andPAASoeringsoncloudinterfaceFigure4.
3. THREAT LANDSCAPE
Considering the threats that pertain to IoT systems, the
threats can be categorized through four layers as specied
in Figure 5above, the vulnerabilities in IoT-based sys-
tems are more as they are mainly remotely located and
comprise various components [1719]. Therefore, it is
important to protect against such threats; Figure 5shows
a brief scenario of what attacks can be more prominent at
which layers.
3.1 Physical Layer/ Perception Layer Attacks
The physical layer is generally exposed to attacks that can
be done directly on the sensors, whereas there could be
eminent manipulations on parts of sensors and actuators;
this can easily change the crop’s analysis and lead to dire
consequences [2123]. The sensors are mainly designed
to fabricate a single task and are not used to processing
any overhead tasks; it is challenging to keep sensors in
safe places.
4 E. KARIRI: IOT POWERED AGRICULTURAL CYBER-PHYSICAL SYSTEM: SECURITY ISSUE ASSESSMENT
Figure 5: Threat Landscape for IOT-based smart agriculture devices [2,16,20]
3.1.1 Node Tampering/Jamming
Equipment such as actuators, sensors are generally
embedded in nature, having a single task to perform.
Therefore, these nodes cannot have more security fore-
front.Attackslikenodetampering,jammingaremore
prevalent. In such an attack, the data generated at the
hardware is modied, which can set o an absolute dif-
ference in the data, further sent to higher layers for pro-
cessing. Refs. [2426] has discussed the usage of strong
malicious nodes within the network to launch a tam-
per attack against existing nodes in the network. Such an
attack can be detected by observing a signicant drop in
packets at the sink node [2729].
3.1.2 Interferences/Insider Attacks
The perception layer in IoT is more susceptible to
insider attacks wherein eavesdropping; interferences can
be introduced by injecting an external agent in disguise.
Ref. [30] have published the severity of insider attacks,
wherein it was observed that these attacks could often
lead to drastic consequences if left unchecked in critical
IoT systems.
3.1.3 Node Injection/Code-Based Manipulation
Injection-based attacks are often performed to spike
or manipulate the values at lower layers that can
go undetected and cause larger magnied dierences,
Ref. [31]denesthisasakindofsalamiattackthatcan
easily magnify in the long run. For instance, spiking the
values of fertilizers by a very insignicant amount, but in
the long run, the value will show a larger increase and can
compromisetheyieldqualityorleadtocropdestruction.
3.1.4 Physical Damage
Physical damage to equipment can be natural as a result of
calamity or otherwise. It can lead to null values at receiv-
ing end or missed values, which can cause an imbalance
in the real-time processing of data. Ref. [32]described
how a drone can be controlled to take over and remotely
cause failure to other nodes in its vicinity through an
insecure UDP channel.
3.2 Network Layer Attacks
This layer is more prevalent in common wireless sen-
sorattacksastheunderlyinghardwareislowprocessing.
It makes it easier to perform eavesdropping, sning,
spoongpotentially;causingdamagetodatabeingsent
or disruption of services to underlying nodes leading to
missing data [33].
3.2.1 Traffic Analysis/Wireless Sensor Node Sniffing
MostIoT devices work on low power and have low pro-
cessing capabilities, generally limited to single function-
ality; this remains a challenge to secure the intermediate
layer. [demo] has introduced a 6LoWPAN based intru-
sion detection system that can detect and alert over IoT
E. KARIRI: IOT POWERED AGRICULTURAL CYBER-PHYSICAL SYSTEM: SECURITY ISSUE ASSESSMENT 5
node-based 6LoWPAN; the tests show higher accuracy in
detectingcommonsning-basedattacks.Ref.[34]shows
a simulation of sniers onto node deployments that use
graphtheorytondconvenientnodestosniinclose
locations.
3.2.2 Spoofing/Cloning
Spoongisanactivecategoryofthreatthatcancause
disruptions in the system, inject codes through inter-
faces to manipulate upper layers. Spoong in wireless
sensor network nodes can sometimes be achieved by cre-
ating a clone of legit nodes and entering the network as
an imposter. Ref. [35] shows how machine learning can
enhance learning-based detection, authentication, access
control system that can easily formulate alerts. They have
used SVM, Q-learning, K-NN, Naive Bayes to detect
and classify between various degrees of threats. Spoong
can cause potential data leaks,leading to data compro-
mise for users attached to the system. Ref. [36]have
explored spoong against actuators, leading to integrity
violation and DoS attacks after generating control-based
spoof attacks in the network. The method of protecting
actuators has been proposed using TEE[Trusted execu-
tion environment] that monitors all commands coming
from actuators via simplex communications and gen-
erates alerts or ignores according to conditions for the
trigger [37].
3.2.3 Unauthorized Access
To provide for crops through smart IOT based agri-
culture deployments, it is highly important to properly
monitor conditions in real-time. It needs constant checks
either by an automated system or user at their end; any
unauthorized access to this system might lead to a dras-
tic outcome. Chances of replay attacks [38], stolen cre-
dentials. might lead to any unauthorized person gaining
virtue on the system. Ref. [24]havesuggestedusingan
unspent transaction outputs model for carrying out a sin-
gle set of instructions, whereas an account-based online
transaction model can be used for parallel execution in
transactions.
3.2.4 Man-In-The-Middle
MITM is commonly performed through insecure wire-
less channels where the communication path is not
secure enough and can lead to packet capture, and any
unauthorized user can gain access to all the information
transferring over the insecure communication channel.
Once the attacker gains access, they can easily escalate
their privileges and gain access within the system to make
any irregular changes without the actual users noticing.
Ref. [39] has conducted security assessments on multi-
ple farm-based types of equipment with smart sensors;
they concluded that physical devices do come with added
security fabrication, but through the upper layers, these
implementations are in the hands of users, which creates
a niche for a mistake. Department of Homeland security,
US has also referred to threats of MITM attack due to
negligenceonthepartofuserswhileactivatingsecurity
obligations on their interfaces.
3.2.5 Denial of Service
According to [5], in precision agricultural systems, the
denial of service is more frequent towards users using
smart services; the threats can be due to poorly man-
aged systems, disruption to PNT(positioning, navigation,
and timing) systems that use GPS to collect information
for processing. Other disruptions can be accounted for
at supply chains or communication channels in decision
support systems.
3.3 Middle Layer/Edge Layer
This layer generally consists of edge level processing, a
practice of pre-processing data before uploading to cloud
services; it is important to take careful security mea-
suresatthislayer[11]. The methodology of securing the
parameter consists of safekeeping data with encryption
policies, transmitting data through safe means, maintain-
ing data integrity at each node. Ref. [40]haveproposed
creatinga trust execution environment for edge devices
by creating a trust zone at the real-time operating system’s
thread level. Ref. [41] have used virtualization techniques
at edge level to lightweight implementation, decreas-
ingoverheadduringtransmissionofinformation,using
Docker containerization, and building single-purpose
appliances for ease of use.
3.3.1 Encryption
Encryption of contents is extremely important when the
data is transmitted or stored; the practice helps to secure
the parameter to a vast extent. Ref. [11]haveshown
hybrid usage of hardware-based AES algorithm before
transmission of data alongside the second layer of protec-
tion by adding public key protected with RSA algorithm.
It is emphasized that an edge layer is maintained near the
IoT devices to decrease the computation and communi-
cation load. In [6], an edge-aided searchable public-key
encryption is created that uses bilinear mapping initially
and in the second phase at the edge side uses a strat-
egy of oine-online schema, the pre-computed data in
oine phase is sent to online phase for second encryp-
tion. Ref. [42] have another approach of initiating hierar-
chical identity-based encryption to contain privacy and
further use blockchain to create a tamper-proof ledger to
propagatedataacrossanetwork.
6 E. KARIRI: IOT POWERED AGRICULTURAL CYBER-PHYSICAL SYSTEM: SECURITY ISSUE ASSESSMENT
3.3.2 Data Based Attacks
This category of threat is related to storage, data process-
ing, and new age smart precision agricultural machin-
eryusesmoderntechniquessuchasmachinelearning
and articial intelligence to enhance the eciency of
the systems and decrease the dependency on users for
manual integration. The process of automation requires
better data that can be used for prediction, which can
yield better results; the decision support systems often
require long-term data to determine decisions accord-
ingly. Ref. [43]havecreatedasmartsecuritysystemfor
agriculture-based IoT systems which uses an ethereum
server to store data instead of traditional servers; EVMs
are used to contain data coming from sensors and col-
lected in a single place; any queries from the user are also
answered through the same server. The key is to hash the
data coming from sensors initially to avoid any mid-way
manipulations.
3.3.3 Policy-Based Threats
In IoT-based implementations, there are various agents
combined to capitulate better results. These elements
need micro-managing through policies or alerts,
required to be congured at the user’s end. The major-
ity of the issues in security arise from weak passwords,
default passwords, non-encrypted methods of sharing
information, improper authentication, and authorization
policies.Ref.[44] have shown using real-time policy
management how nodes can be managed with dier-
ent alert-based strategies to control nodes in a network;
the implementation isbased on smart city and regula-
tion control using thresholds for speed, area coverage,
surveillance.
3.4 Application Layer
This layer is responsible for creating an interactive inter-
face between user and system. Thus, it is relatively crucial
to mark a stricter front onthe application side. Depend-
ing upon the operating systems and underlying hardware,
multiple vulnerabilities and exploits can be harnessed.
3.4.1 Social Engineering
Anaiveuserisoftenthemostinsecurepointinthe
complete network; as [5] states how commercial farming
practices require more sophisticated equipment for better
agricultural practices, it is equally critical to ensure safety
from the user’s end. Phishing is another social engineer-
ing attack strategy that is generally used to lure the users
into clicking on synonymous links to gain access;In a
more targeted form, spear phishing is usually associated
with almost legit emails.
3.4.2 Code-Based Exploits
According to [45], a mere malicious code could easily
inject false data and project a dierent scenario. To deal
with this practice, they have used post-quantum cryptog-
raphy with parity check. In practice, an authentication
on the server is run to verify the user; afterwards device
anonymity and location privacy is practiced to ensure the
attacker cannot reach the legit nodes.
3.4.3 Cloud-Based Threats
As the data coming from sensors is used for real-time
analysis, it is much ecient if the cloud systems are
used for this purpose as they are ubiquitous, reduce
latency, and increase ease of access and availability.
The SAAS and PAAS platforms are devised to use ser-
vices and applications for real-time analytics, manage-
ment, decision-making. Mobile-based applications tend
to use permissions and target data from the user’s end;
ne-grained control must be established at the user’s
end to maintain secure data exchange [11]. Identity
privacy, location information, node compromise, and
layer cloning/ forwarding can be easily attributed; third-
party applications used from multiple cloud vendors
can extract extra information without the user’s knowl-
edge. Ref. [46] have explored gateway leaks in smart
home technologies and showed that secret data leaks
cannot be prevented due to a lack of interoperability
standards.
4. MITIGATION PRACTICES
The growing need to provide for a large population and
ensure less food waste has led to increasing reliabil-
ity on smart farming practices that involve machinery
and sophisticated equipment [7,16,47]. It has increased
upstanding towards IoT-based devices; the practices are
automated to reduce manual intervention and burden.
However, this has brought about vulnerabilities that can
be explored and exploited to aect the associated users.
Agriculture forms a large part of the economy; any dis-
ruptions or unprecedented crop failure can impact the
economic growth of the country. If security breaches
towards such devices are ignored or left unchecked, it
could have repercussions on the economic prosperity and
lead to crop failure. According to OWASP’s index of top
ten vulnerabilities,the primary factors for insecure IoT
systems are weak passwords, insecure and unreliable net-
work usages, lack of security patch updates, outdated
components, and insucient privacy protection [48].
These collective factors have contributed to losses in IoT-
basedsystems.Table1enlists some of the suggested mit-
igations methods layerwise that have been implemented,
E. KARIRI: IOT POWERED AGRICULTURAL CYBER-PHYSICAL SYSTEM: SECURITY ISSUE ASSESSMENT 7
Tab le 1: Mitigation measures against security vulnerabilities
Sno Layer Method Protection against
1 Physical layer/ Perception layer Hardware hardening against eavesdropping by
cryptography using AES- counter and AES
Cipher block chaining
Ensures data encryption at the node, preserves
privacy, data integrity, traffic analysis
[16]
2 Physical layer/ Perception layer Security monitor for IoT controller, sensors, and
actuators
False authentication, weak passwords, security
patch updates, firmware extraction,
code-based manipulation
[49]
3 Physical layer/ Perception layer Implement built-in security, maintenance,
updating of firmware
Reverse engineering, insecure backdoor
attacks
[5,8]
4 Physical layer/ Perception layer Data hiding in interferences, covert commu-
nication; easy to implement in low power
devices
Eavesdropping, man-in-the-middle attack,
stealth attacks
[50]
5 Network Layer Radiofrequency fingerprinting based authen-
tication and secure channel communication
through wireless key generation
False authentication, unauthorized access,
node cloning, code-based manipulation
[32]
6 Network Layer Intrusion detection systems- Machine learning-
based, deep learning-based, signature-based;
method of constant vigilance over the network
in real-time
Denial of services attacks, immunity against
virus signatures, 6LoWPAN-based network
attacks, wormhole attacks, a Routing
protocol for lossy network attacks,
Distributed denial of service, traffic analysis
[51]
7 Network Layer IoT security protocols- Low power, less overhead,
lightweight
Network-based attacks [23,25,26]
8 Middle layer/ Edge layer Creation of sensor layer to monitor edge data using
MQTT protocol
Data tampering, data analysis, eavesdropping,
protocol-level attacks, denial of service
[43]
9 Middle layer/ Edge layer Software-defined networking at edge layer to
prevent malicious traffic
Denial of service, traffic analysis, distributed
denial of service
[52]
10 Middle layer/ Edge layer Blockchain-based mobile computing Denial of service, traffic analysis, distributed
denial of service
[53]
11 Middle layer/ Edge layer Traffic shaping policies for IoT devices according to
usage
code-injections, manipulations [54]
12 Middle layer/ Edge layer Advanced encryption strategies, lightweight
implementations; Attribute-based encryption
Data confidentiality, integrity, [55]
13 Application Layer Service level agreements, interoperability
standards for any data collection
secret data collection for maintenance by
third-party applications
[5]
14 Application Layer Fine-grained control policies and protocols, proper
user management
unauthorized access, social engineering, data
theft, password leaks
[31]
Figure 6: Cyber-Phisical System Internal Constrants [9]
tested, observed, and deployed on other IoT-based smart
systemsandcanbeperpetuatedforagriculture-based
systems Figure 6.
5. RESULTS AND OBSERVATION
TheauthorhasattemptedtousethemostpopularIoT
protocol system in order to nd out the best-suited
system for agricultural utility application to a large
Figure 7: Signal rangs vs data rate
extent.Based on calculated examinations and compari-
son,webelievethatthatthebestcommunicationprotocol
is the one that can be widely deployed, accepted, and has
clearly dened use-cases.
In Figure 7,avirtualcomparisonhasbeendevelopedto
understand Signal ranges in comparison with data rate
to actually determine the exact protocol as per the area of
application Figure 8.
8 E. KARIRI: IOT POWERED AGRICULTURAL CYBER-PHYSICAL SYSTEM: SECURITY ISSUE ASSESSMENT
Figure 8: Comparision table of the IoT protol under different parameter
E. KARIRI: IOT POWERED AGRICULTURAL CYBER-PHYSICAL SYSTEM: SECURITY ISSUE ASSESSMENT 9
6. CONCLUSION
This chapter explored the variety of threats that can be
exploitedtocausedisruptionsintheservicesrelatedto
those systems, the majority of remotely controlled nodes
areeitheruncheckedforsecurity,ortheusersarenot
using the built-in security features. The modern termi-
nology of precision agriculture encloses multiple embed-
ded systems providing for a single type of task and man-
aged by controllers and services; this revolutionizing dig-
ital model needs to adapt to tighter security measures
as negligence can have consequences and destruction of
crops. Although the extent of the potential threat model
has not been explored in this regard, it needs to empha-
size security measures.
DISCLOSURE STATEMENT
No potential conict of interest was reported by the
author(s).
FUNDING
The author extend their appreciation to the Deputyship for
Research & Innovation, Ministry of Education in Saudi Ara-
bia for funding this research work through the project number
(IF-PSAU-2021/01/18095).
REFERENCES
1. G. Sushanth, and S. Sujatha, “Iot based smart agricul-
ture system,” in 2018 Int. Conf. Wirel. Commun. Signal
Process. Networking, WiSPNET 2018, 2018.
2. G.Suciu,C.I.Istrate,andM.C.Ditu,“Securesmartagri-
culture monitoring technique through isolation,” Glob. IoT
Summit, GIoTS 2019 - Proc,2019 (in press).
3. S. Verma, R. Gala, S. Madhavan, S. Burkule, S. Chauhan,
and C. Prakash, “An Internet of Things (IoT) Architecture
for smart agriculture,” in Proc. - 2018 4th Int. Conf. Com-
put. Commun. Control Autom. ICCUBEA 2018, 2018.
4. M. Shyamala Devi, R. Suguna, A. S. Joshi, and R. A. Bagate,
“Design of IoT blockchain based smart agriculture for
enlightening safety and security,” Commun. Comput. Inf.
Sci, Vol. 985, pp. 7–19, 2019.
5. A. Boghossian, et al., “Threats to precision agriculture,”
Public-Private Anal. Exch. Progr., 1–25, 2018 [Online].
Ava ilabl e: https://www.dhs.gov/sites/default/les/publicati
ons/2018_Hmac:keyed-hashingformessageauthentica-
tion.
[Accessed: 18-Aug-2021].
6. T. Limbasiya, M. Soni, and S. K. Mishra, “Advanced for-
mal authentication protocol using smart cards for network
applicants,” Computers & Electrical Engineering, Vol. 66,
pp. 50–63, 2018, ISSN 0045-7906.
7. R. Kumar, and G. Dhiman, “A comparative study of fuzzy
optimization through fuzzy number,” International Journal
of Modern Research, Vol. 1, no. 1, pp. 1–14, 2021.
8. M. Kandias, A. Mylonas, N. Virvilis, M. Theoharidou,
andD.Gritzalis,“Aninsiderthreatpredictionmodel,
Lect. Notes Comput. Sci. (Including Subser. Lect. Notes Artif.
Intell. Lect. Notes Bioinformatics, Vol. 6264, no. LNCS, pp.
26–37, 2010.
9. Z. M. Yusop, and J. Abawajy, “Analysis of insiders attack
mitigation strategies,” Procedia - Soc. Behav. Sci., Vol. 129,
pp. 581–591, 2014.
10. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Inter-
netofthings(IoT):Avision,architecturalelements,and
future directions,” Fut ur. Gene r. C ompu t. Sy s t,Vol.29,no.
7, pp. 1645–1660, 2013.
11. Y.Chandu,K.S.RakeshKumar,N.V.Prabhukhanolkar,
A. N. Anish, and S. Rawal, “Design and implementation of
hybrid encryption for security of IOT data,” in Proc. 2017
Int. Conf. Smart Technol. Smart Nation, SmartTechCon
2017, 2018, pp. 1228–1231.
12. S. Gomathi, M. Soni, G. Dhiman, R. Govindaraj, and
P. Kumar, “A survey on applications and security issues
of blockchain technology in business sectors,” Mate-
rials Today: Proceedings,2021 (in press). ISSN 2214-
7853.
13. K.Haseeb,N.Islam,A.Almogren,andI.UdDin,“Intru-
sion prevention framework for secure routing in WSN-
based mobile internet of things,” IEEE Access,Vol.7,pp.
185496–185505, 2019.
14.R.Nair,M.Soni,B.Bajpai,G.Dhiman,andK.M.
Sagayam, “Predicting the death rate around the world
Due to COVID-19 using regression analysis,” International
Journal of Swarm Intelligence Research (IJSIR), Vol. 13, no.
2, pp. 1–13, 2022.
15. F. A. Zeidabadi, S. A. Doumari, M. Dehghani, Z. Montazeri,
P. Trojovsky, and G. Dhiman, “Mla: A New mutated leader
algorithm for solving optimization problems,” Computers,
Materials & Continua, Vol. 70, no. 3, pp. 5631–5649, 2022.
doi:10.32604/cmc.2022.021072.
16. I. Chatterjee, Articial intelligence and patentability:
Review and discussions,” International Journal of Modern
Research, Vol. 1, pp. 15–21, 2021.
17. F. A. Zeidabadi, S. A. Doumari, M. Dehghani, Z. Montazeri,
P. Tr o j o v s k y , a n d G . D h i m a n , A m b o : A l l m e m b e r s - b a s e d
optimizer for solving optimization problems,” Computers,
Materials & Continua, Vol. 70, no. 2, pp. 2905–2921, 2022.
doi:10.32604/cmc.2022.019867.
18. A. Balakrishnan, R. Kadiyala, G. Dhiman, G. Ashok, S.
Kautish, K. Yadav, and J. Maruthi Nagendra Prasad, “A per-
sonalized eccentric Cyber-Physical system architecture for
smart healthcare,” Security and Communication Networks,
Vol. 2021 (2021). doi:10.1155/2021/1747077
10 E. KARIRI: IOT POWERED AGRICULTURAL CYBER-PHYSICAL SYSTEM: SECURITY ISSUE ASSESSMENT
19. S.Juneja,A.Juneja,G.Dhiman,S.Jain,A.Dhankhar,andS.
Kautish, “Computer vision-enabled character recognition
of hand gestures for patients with hearing and speaking
disability,” Mobile Information Systems, Vol. 2021 (2021).
doi:10.1155/2021/4912486
20. T. Pecorella, L. Brilli, and L. Mucchi, “The role of Physical
layersecurityinIoT:Anovelperspective,Inf. 2016,Vol.
7, no. 3, pp. 49, 2016.
21. A. Balakrishnan, et al., “Multimedia concepts on object
detection and recognition with F1 Car simulation using
convolutional layers,” Wireless Communications and
Mobile Computing, Vol. 2021 (2021). doi:10.1155/2021/55
43720.
22. S. R. Das, A. K. Sahoo, G. Dhiman, K. K. Singh, and
A. Singh, “Photo voltaic integrated multilevel inverter
based hybrid lter using spotted hyena optimizer,” Com-
puters & Electrical Engineering, Vol. 96, pp. 107510, 2021.
doi:10.1016/j.compeleceng.2021.107510
23. G. Dhiman, G. Kaur, M. A. Haq, and M. Shabaz,
“Requirements for the optimal design for the metasys-
tematic sustainability of digital double-form systems,”
Mathematical Problems in Engineering, Vol. 2021 (2021).
doi:10.1155/2021/2423750
24. L. Liu, Z. Ma, and W. Meng, Detection of multiple-Mix-
attack malicious nodes using perceptron-based trust in
IoT networks,” Futur. Gener. C o mput . Sys t , Vol. 101, pp.
865–879, 2019.doi:10.1016/j.future.2019.07.021.
25. S. Juneja, G. Dhiman, S. Kautish, W. Viriyasitavat, and
K. Yadav, “A perspective roadmap for IoMT-based early
detection and care of the neural disorder, dementia,”
Journal of Healthcare Engineering, Vol. 2021 (2021).
doi:10.1155/2021/6712424
26. Y.Hu,A.Sharma,G.Dhiman,andM.Shabaz,“Theidenti-
cation nanoparticle sensor using back propagation neu-
ral network optimized by genetic algorithm,” Journal of
Sensors,2021 (in press).
27. M. Uppal, D. Gupta, S. Juneja, G. Dhiman, and S.
Kautish, “Cloud-Based fault prediction using IoT in
oce automation for improvisation of health of employ-
ees,” Journal of Healthcare Engineering, Vol. 2021 (2021).
doi:10.1155/2021/8106467
28. L. Kansal, G. S. Gaba, A. Sharma, G. Dhiman, M. Baz, and
M. Masud, “Performance analysis of WOFDM-WiMAX
integrating diverse wavelets for 5G applications,” Wireless
Communications and Mobile Computing, Vol. 2021 (2021).
doi:10.1155/2021/5835806
29. W.Viriyasitavat,L.DaXu,G.Dhiman,A.Sapsomboon,
V. Pungpapong, and Z. Bi, “Service workow: state-of-
the-Art and future trends,” IEEE Transactions on Services
Computing,2021 (in press).
30. Y.M.Tukur,andY.S.Ali,“DemonstratingtheEectof
insider attacks on Perception layer of Internet of Things
(IoT) systems,” in 2019 15th Int. Conf. Electron. Comput.
Comput. ICECCO 2019, 2019.
31. B. Bostami, M. Ahmed, and S. Choudhury, “False data
Injection Attacks in Internet of Things,” EAI/Springer
Innov. Commun. Comput, 47–58, 2019.doi:10.1007/978-3-
319-93557-7_4.
32. I. Astaburuaga, A. Lombardi, B. La Torre, C. Hughes, and
S. Sengupta, “Vulnerability analysis of AR.drone 2.0, an
embedded linux system,” in 2019 IEEE 9th Annu. Com-
put. Commun. Work. Conf. CCWC 2019, 2019, pp. 666–
672.
33. Q. M. Ashraf, and M. H. Habaebi, “Autonomic schemes for
threat mitigation in internet of things,” J. Netw. Comput.
Appl, Vol. 49, pp. 112–127, 2015.doi:10.1016/j.jnca.2014.
11.011.
34. J. Zhang, S. Rajendran, Z. Sun, R. Woods, and L. Hanzo,
“Physical layer security for the internet of things: authenti-
cation and Key generation,” IEEE Wirel. Commun,Vol.26,
no. 5, pp. 92–98, 2019.doi:10.1109/MWC.2019.1800455.
35. P.K.Vaishnav,S.Sharma,andP.Sharma,“Analyticalreview
analysis for screening COVID-19,” International Journal of
Modern Research, Vol. 1, pp. 22–29, 2021.
36. M. Hasan, and S. Mohan, “Protecting actuators in safety-
critical IoT systems from control Spoong attacks,” in IoT
S P 2019 - Proc. 2nd Int. ACM Work. Secur. Priv. Internet-
of-Things, 2019, pp. 8–14.
37. S. Pinto, T. Gomes, J. Pereira, J. Cabral, and A. Tavares,
“IIoTEED: An enhanced, trusted execution environment
for industrial IoT edge devices,” IEEE Internet Comput,
Vol. 21, no. 1, pp. 40–47, 2017.doi:10.1109/MIC.2017.
17.
38. G. Dhiman, and V. Kumar, “Spotted hyena optimizer: a
novel bio-inspired based metaheuristic technique for engi-
neering applications,” Advances in Engineering Software,
Vol. 114, pp. 48–70, 2017.doi:10.1016/j.advengsoft.2017.
05.014
39. E. Kristen, R. Kloibhofer, V. H. Díaz, and P. Castillejo,
“Security assessment of agriculture IoT (AIoT) appli-
cations,” Appl. Sci, Vol. 11, no. 13, pp. 5841, 2021.
doi:10.3390/app11135841.
40. W. Wang, P. Xu, D. Liu, L. T. Yang, and Z. Yan,
“Lightweighted secure searching over public-Key cipher-
texts for edge-cloud-assisted industrial IoT devices,” IEEE
Trans. Ind. Infor matics, Vol. 16, no. 6, pp. 4221–4230, 2020.
doi:10.1109/TII.2019.2950295.
41. R.T.Tiburski,C.R.Moratelli,S.F.Johann,M.V.Neves,E.
De Matos, L. A. Amaral, andF. Hessel, “Lightweight secu-
E. KARIRI: IOT POWERED AGRICULTURAL CYBER-PHYSICAL SYSTEM: SECURITY ISSUE ASSESSMENT 11
rity architecture based on embedded virtualization and
trust mechanisms for IoT edge devices,” IEEE Commun.
Mag, Vol. 57, no. 2, pp. 67–73, 2019.doi:10.1109/MCOM.
2018.1701047.
42. M. Soni, G. Dhiman, B. S. Rajput, et al., “Energy-Eective
and secure data transfer scheme for mobile nodes in
smart city applications,” Wireless Pers Commun (2021).
doi:10.1007/s11277-021-08767-8.
43. G. Saldamli, K. Karunakaran, V. K. Vijaykumar, W. Pan,
S. Puttarevaiah, and L. Ertaul, “Securing Car data and
analytics using blockchain,” in 2020 7th International Con-
ference on Software Dened Systems, SDS 2020, Insti-
tute of Electrical and Electronics Engineers Inc., 2020,pp.
153–159.
44. F. De Rango, M. Tropea, and P. Fazio, “Mitigating DoS
attacks in IoT EDGE layer to preserve QoS topics and
nodes’ energy,” in IEEE INFOCOM 2020 - IEEE Conf.
Comput. Commun. Work. INFOCOM WKSHPS 2020,
2020, pp. 842–847.
45. D. Pavithran, J. N. Al-Karaki, and K. Shaalan, “Edge-Based
blockchain architecture for event-driven IoT using hier-
archical identity based encryption,” Inf. Process. Manag,
Vol. 58, no. 3, pp. 102528, 2021.doi:10.1016/j.ipm.2021.
102528.
46. J.Zhou,Z.Cao,X.Dong,andA.V.Vasilakos,“Securityand
privacy for cloud-based IoT: challenges,” IEEE Commun.
Mag, Vol. 55, no. 1, pp. 26–33, 2017.doi:10.1109/MCOM.
2017.1600363CM.
47. P. K. Vaishnav, S. Sharma, and P. Sharma, Analytical
review analysis for screening COVID-19 disease,” Interna-
tional Journal of Modern Research, Vol. 1, no. 1, pp. 22–29,
2021.
48. G. Dhiman, and V. Kumar, “Emperor penguin opti-
mizer: A bio-inspired algorithm for engineering prob-
lems,” Knowledge-Based Systems, Vol. 159, pp. 20–50, 2018.
doi:10.1016/j.knosys.2018.06.001
49. S.-K. C.-H. J. Choi, System hardening and security
monitoring for IoT devices to mitigate IoT security
vulnerabilities and threats,” KSII Trans. Internet Inf. Syst,
Vol. 12, no. 2, pp. 906–918, 2018.
50. Z. Liu, J. Liu, Y. Zeng, and J. Ma, “Covert wireless com-
munications in IoT systems: hiding information in inter-
ference,” IEEE Wirel. Commun, Vol. 25, no. 6, pp. 46–52,
2018.doi:10.1109/MWC.2017.1800070.
51. A. Thakkar, and R. Lohiya, “A review on machine learn-
ing and deep learning perspectives of IDS for IoT: recent
updates, security issues, and challenges,” Arch. Com-
put. Methods Eng, Vol. 28, no. 4, pp. 3211–3243, 2021.
doi:10.1007/s11831-020-09496-0.
52. M.Tellez,S.El-Tawab,andM.H.Heydari,“IoTsecu-
rity attacks using Reverse Engineering methods on WSN
Applications,” in 2016 IEEE 3rd World Forum Internet
Things, WF-IoT 2016, 2017, pp. 182–187.
5
3. F.V.Meca,J.H.Ziegeldorf,P.M.Sanchez,O.G.Morchon,
S. S. Kumar, and S. L. Keoh, “Hip security Architecture
for the IP-based Internet of things,” in Proc. - 27th Int.
Conf. Adv. Inf. Netw. Appl. Work. WAINA 2013, 2013,pp.
1331–1336.
54. H.Krawczyk,M.Bellare,andR.Canetti,“HMAC:keyed-
hashing for message authentication,” 1997 (in press).
55.K.Giotis,G.Androulidakis,andV.Maglaris,“Ascal-
able anomaly detection and mitigation architecture for
legacy networks via an OpenFlow middlebox,” Secur. Com-
mun. Networks, Vol. 9, no. 13, pp. 1958–1970, 2016.
doi:10.1002/sec.1368.
AUTHORS
Elham Kariri is assistant professor and
researcher with 10 +years of experi-
ence teaching courses on undergraduate
and postgraduate levels in Prince Sattam
bin Abdulaziz University. Supervised 5
BA research graduation projects and 4
Mawhibaprojects.Publishedover3arti-
cles in peer-reviewed journals.
Corresponding author. Email: e.kariri@psau.edu.sa;
elham.kareri@gmail.com
... Kariri et al. [79] conducted a comprehensive investigation of the threat landscape in IoT agriculture systems. It provides a valuable resource for developers, offering insights into developing and implementing effective and secure approaches in IoT-based agriculture. ...
... • The potential privacy and security implications associated with data sharing is not adequately addressed. [79] • Cross layer threat landscape is categorized. ...
... The centralized cloud layer's network demand and computational load are reduced. The layer for edge computing is made up of several edge nodes [26]. Every node serves as a gateway and offers many services, including data gathering, Observation, detection of security threats, prediction, and direct decision support. ...
Article
Full-text available
The Internet of Things (IoT) is no longer a newbie; it has a long history of serving as the primary commercial growth driver. Every business nowadays has begun to rely on IoT technology for market operational excellence. Smart Farming has also adopted IoT technology and farmers utilize these technologies to monitor crop production, evaluate soil moisture content, and deploy drones to assist with operations like pesticide spraying. As more devices link to the Internet, the problems of safeguarding smart farming settings' cybersecurity threats and vulnerabilities grow. Digitalization in agriculture is regarded as the fourth agricultural revolution, as evidenced by a wide range of available digital technologies and data applications. This paper describes a systematic literature review (SLR) on IoT security and privacy and domains in the agricultural industry. This SLR was summarized by studying the research papers published in reputable journals between January 2017 and July 2023. A total of 37 articles were carefully selected from 6 databases using a systematic method, quality assessment, and classification. The primary objective of this study is to consolidate all relevant studies on IoT-based Smart Farming (SF) applications domains, privacy/security, communication/Network protocols, and sensors/devices. It also highlighted the fundamental difficulties and how smart Farming works in different countries. Moreover, this review paper analyzes the security difficulties that IoT devices face in agriculture. Finally, open issues and challenges were discussed to give research with interesting future approaches in IoT agriculture.
... Devices that are connected to the Internet of Things (IoT) produce the data, which is then transmitted to a command-andcontrol facility [1]. However, because the devices have limited capacities for storage, processing, and security measures, the CPS has considerable obstacles in its effort to deliver a service that is both secure and efficient [2]. ...
Article
Full-text available
Connected cyber and physical elements exchange information through feedback in a cyber-physical system (CPS). Since CPS oversees the infrastructure, it is an integral part of modern living and is viewed as crucial to the development of cutting-edge smart devices. As the number of CPSs rises, so does the need for intrusion detection systems (IDS). The use of metaheuristic methods and Artificial Intelligence for feature selection and classification can offer solutions to some of the problems caused by the curse of dimensionality. In this research, we present a blockchain-based approach to data security in which blocks are generated using the RSA hashing method. Using Differential Evolution (DE), we first select the blockchain-secured data, and then we partition that data into train and testing datasets to use for training and testing our model. It is also permitted for the validated model to use a deep belief network (DBN) to predict attacks. The purpose of the simulation is to evaluate the safety and precision of the classifications. It turns out that the proposed strategy not only improves classification accuracy but also makes the data more resistant to attacks.
Chapter
The need for agricultural and food goods has dramatically expanded due to the rapid population growth. Agriculture's reliance on older technologies has rendered them outmoded and unable to meet demand. Agricultural goods' quantity and quality can be improved by integrating data-driven and sensor technology into the agriculture and food production sectors. Nevertheless, it might increase cyber dangers and make the farming environment worse. As a result of cyberattacks, consumers may consume unsafely, and the economy may suffer. Attackers may operate remotely and deed on-field sensors and entirely self-directed vehicles. The motivation of this chapter is to study various cyber-attacks in the smart farming ecosystem and propose a real-time cybersecurity model for a multi-cloud-based hi-tech farming system.
Chapter
The concept of the Internet of Things (IoT) pertains to employing conventional Internet protocols to facilitate interactions between humans and objects, as well as between objects themselves. Functioning with machines and entities, IoT enables computation, communication, and collaboration among interconnected elements. This integration has extended to various facets of agriculture such as cultivation, surveillance, processing, marketing, and consumer engagement. While recognized security needs for IoT systems have prompted standardization efforts and proposed security mechanisms, persisting challenges and gaps remain due to both unresolved use cases and inadequate security provisions in many deployed IoT devices and systems. This study offers a cybersecurity-oriented overview of IoT-based agriculture, exploring potential applications of IoT devices, classifying agriculture's IoT architecture into four layers, scrutinizing security threats, and proposing effective countermeasures based on IoT architectural layers. An innovative IoT-driven smart agriculture model, fortified by security measures, is also proposed to mitigate cyber threats and enhance agricultural productivity.
Article
Smart farm management has complex challenges; therefore, there is a need to improve the overall adaptability, profitability, and environmental soundness of the farming systems. Agricultural production can be enhanced with the help of IoT-based cognitive tools. The rapid increase in IoT-based smart systems has raised critical concerns about efficiently utilizing the wireless spectrum. To drastically bring the improvement in the utilization of the wireless spectrum, cognitive radio (CR) has emerged as an effective solution. The inherent openness and broadcast nature of the wireless medium have given rise to many security issues in cooperative networks. Information-theoretic security or physical layer security (PLS) is evolved as an efficacious wireless prototype for reliable transmissions to avert the eavesdropper from expropriating transmittal data on the wireless connections. Security is the key factor in these networks as they are exposed and active in behavior, thus, are susceptible to fraudulent activities. We investigated the performance of the CR system in terms of secrecy and also examined the system in terms of diversity receipt and selection of relay. The secrecy outcome of channel state information at the sender was also studied. The detrimental effects of fading in cooperative networks were also extensively discussed. Cooperative diversity was examined by deploying MRC and SC strategies at receptors. It has been deduced that CSI knowledge at the sender also has an eloquent concussion on the secrecy of the cognitive system.
Article
Full-text available
With increasing population, the demand for agricultural productivity is rising to meet the goal of “Zero Hunger”. Consequently, farmers have optimized the agricultural activities in a sustainable way with the modern technologies. This integration has boosted the agriculture production due to high potentiality in assisting the farmers. The impulse towards the technological advancement has revived the traditional agriculture methods and resulted in eco-friendly, sustainable, and efficient farming. This has revolutionized the era of smart farming which primarily alliance with modern technologies like, big data, machine learning, deep learning, swarm intelligence, internet-of-things, block chain, robotics and autonomous system, cloud-fog-edge computing, cyber physical systems, and generative adversarial networks (GAN). To cater the same, a detailed survey on ten hot-spots of smart farming is presented in this paper. The survey covers the technology-wise state-of-the-art methods along with their application domains. Moreover, the publicly available data sets with existing research challenges are investigated. Lastly, the paper concludes with suggestions to the identified problems and possible future research directions.
Article
Full-text available
There are many optimization problems in different branches of science that should be solved using an appropriate methodology. Population-based optimization algorithms are one of the most efficient approaches to solve this type of problems. In this paper, a new optimization algorithm called All Members-Based Optimizer (AMBO) is introduced to solve various optimization problems. The main idea in designing the proposed AMBO algorithm is to use more information from the population members of the algorithm instead of just a few specific members (such as best member and worst member) to update the population matrix. Therefore, in AMBO, any member of the population can play a role in updating the population matrix. The theory of AMBO is described and then mathematically modeled for implementation on optimization problems. The performance of the proposed algorithm is evaluated on a set of twenty-three standard objective functions, which belong to three different categories: unimodal, high-dimensional multimodal, and fixed-dimensional multimodal functions. In order to analyze and compare the optimization results for the mentioned objective functions obtained by AMBO, eight other well-known algorithms have been also implemented. The optimization results demonstrate the ability of AMBO to solve various optimization problems. Also, comparison and analysis of the results show that AMBO is superior and more competitive than the other mentioned algorithms in providing suitable solution.
Article
Full-text available
The development and technological advancement of wireless sensor networks in different fields has been a revolution for mankind. To meet the high-end requirements, the support of the cloud that provides the resources for the application is very much essential. This paper presents an architecture called cloud sense to connect cyber and physical spaces for wireless body area networks with varying high-end workflow at different perspectives. The scalability issue in collecting patient data and processing the data is established using ganglia that is a scalable, distributed monitoring system to support high-performance computing in clusters for the set of input events such as electrocardiogram (ECG), blood pressure (BP), saturation of peripheral oxygen (SPO2), temperature, and skin conductance of the kind of human body parameters. Various parameter metrics have been analyzed based on the equivalent creation of instances. The connectivity mechanism behind the proposed cyber-physical system is unique of its kind; it is exhibited through wireless Internet on a small scale of three remote locations; the system works well with specific network parameter metrics; and the results proved that availability and scalability issues were addressed with numerical analysis.
Article
Full-text available
Hand gesture recognition is one of the most sought technologies in the field of machine learning and computer vision. There has been an unprecedented demand for applications through which one can detect the hand signs for deaf people and people who use sign language to communicate, thereby detecting hand signs and correspondingly predicting the next word or recommending the word that may be most appropriate, followed by producing the word that the deaf people and people who use sign language to communicate want to say. This article presents an approach to develop such a system by that we can determine the most appropriate character from the sign that is being shown by the user or the person to the system. To enable pattern recognition, various machine learning techniques have been explored and we have used the CNN networks as a reliable solution in our context. The creation of such a system involves several convolution layers through which features have been captured layer by layer. The gathered features from the image are further used for training the model. The trained model efficiently predicts the most appropriate character in response to the sign exposed to the model. Thereafter, the predicted character is used to predict further words from it according to the recommendation system used in this case. The proposed system attains a prediction accuracy of 91.07%.
Article
Full-text available
This paper presents a framework for detecting objects in images based on global features and contours. The first step is a shape matching algorithm that uses the background subtraction process. Object detection is accomplished by an examination of the oversegmentation of the image, where the space of the potential boundary of the object is examined to identify boundaries that have a direct resemblance to the prototype of the object type to be detected. Our analysis method removes edges using bilinear interpolation and reestablishes color sensors as lines and retracts background lines from the previous frame. Object contours are generated with clustered lines. The objects detected will then be recognized using the extraction technique. Here, we analyze the color and shape characteristics with which each object is capable of managing occlusion and interference. As an extension of object detection and recognition, F1 car simulation is experimented with simulation using various layers, such as layer drops, convolutionary layers, and boundary elimination, avoiding obstacles in different pathways.
Article
Full-text available
The United Nations defined tenable progress as a development that responds to the demands of the current without adjusting the capacity of further generations to fulfil their own requirements; this is a fundamental idea in this article. This study recognizes three aspects, financial, social, and environmental sustainability, although its emphasis is on the latter. An electronic copy is sometimes characterized a physical thing, a real counterpart, and the data, which indicates the presence of a connector and block for effective and efficient data transmission. This article offers a systematic literature review on the sustainability of designed technology-based systems. This article also introduces the major requirements which can be helpful in designing optimal design for sustainability of a digital double-form system. Many articles on DT have also been chosen since they referenced the studied SLRs and were deemed to be significant for the objectives of this study. Selected and analysed for papers revealed so many flaws and challenges: the boons of are not clear; DTs throughout the result the wheel of life of the DTs is not adequately surveyed; DTs can contribute to cost reduction or to support decision-making is unclear; Internet practice should be improved and better integrated Moreover, it has not been feasible from our study to locate a publication which solely discusses DTs in relation with situational sustainability.
Article
Full-text available
The Internet of Medical Things (IoMT) has emerged as one of the most important key applications of IoT. IoMT makes the diagnosis and care more convenient and reliable with proven results. The paper presents the technology, open issues, and challenges of IoMT-based systems. It explores the various types of sensors and smart equipment based on IoMT and used for diagnosis and patient care. A comprehensive survey of early detection and postdetection care of the neural disorder dementia is conducted. The paper also presents a postdiagnosis dementia care model named “Demencare.” This model incorporates eight sensors capable of tracking the daily routine of dementia patient. The patients can be monitored locally by an edge computing device kept at their premises. The medical experts may also monitor the patients’ status for any deviation from normal behavior. IoMT enables better postdiagnosis care for neural disorders, like dementia and Alzheimer’s. The patient’s behavior and vital parameters are always available despite the remote location of the patients. The data of the patients may be classified, and new insights may be obtained to tackle patients in a better manner.
Article
Full-text available
This study draws attention towards the application of identification nanoparticle (NPs) sensor based on back propagation (BP) neural network optimized by genetic algorithm (GA) in the early diagnosis of cancer cells. In this study, the traditional and optimized BP neural networks are compared in terms of error between the actual value and the predictive value, and they are further applied to the NP sensor for early diagnosis of cancer cells. The results show that the root mean square (RMS) and mean absolute error (MAE) of the optimized BP neural network are comparatively much smaller than the traditional ones. The particle size of silicon-coated fluorescent NPs is about 105 nm, and the relative fluorescence intensity of silicon-coated fluorescent NPs decreases slightly, maintaining the accuracy value above 80%. In the fluorescence imaging, it is found that there is obvious green fluorescence on the surface of the cancer cells, and the cancer cells still emit bright green fluorescence under the dark-field conditions. In this study, a phenolic resin polymer CMK-2 with a large surface area is successfully combined with Au. NPs with good dielectric property and bioaffinity are selectively bonded to the modified electrode through a sulfur-gold bond to prepare NP sensor. The sensor shows good stability, selectivity, and anti-interference property, providing a new method for the detection of early cancer cells.
Article
Full-text available
The novel paradigm of Internet of Things (IoT) is gaining recognition in the numerous scenarios promoting the pervasive presence of smart things around us through its application in various areas of society, which includes transportation, healthcare, industries, and agriculture. One more such application is in the smart office to monitor the health of devices via machine learning (ML) that makes the equipment more efficient by allowing real-time monitoring of their health. It guarantees indoor comfort as per the user’s satisfaction as it emphasizes on fault prediction in real-life devices. Early identification of various types of faults in IoT devices is the key requirement in smart offices. IoT devices are becoming ubiquitous and provide an assistant to supervise an office that is regulated by ML and data received from sensors is stored in cloud. A recommender system facilitates the selection of an appropriate solution for faults in IoT-enabled devices to mitigate faults. The architecture proposed in this paper is used to monitor each and every office appliance connected via IoT technology using ML technique, and recommender system is used to recommend solutions for fault patterns without much human intervention. The ultrasonic motion sensor is used to fetch the information of employee availability in cubicles and data is sent to the cloud through the WiFi module. ATmega8 is used to control electrical appliances in the office environment. The significance of this work is to forecast the faults in IoT appliances which will have an impact on life and reliability of IoT appliances. The main objective is to design a prototype of a smart office using IoT that can control and automate workplace devices and forecast whether the device needs repairing or replacing, thus reducing the overall burden on the employee and helping out in increasing physical as well as mental health of the person.
Article
Nowadays, COVID-19 is considered to be the biggest disaster that the world is facing. It has created a lot of destruction in the whole world. Due to this COVID-19, analysis has been done to predict the death rate and infected rate from the total population. To perform the analysis on COVID-19, regression analysis has been implemented by applying the differential equation and ordinary differential equation (ODE) on the parameters. The parameters taken for analysis are the number of susceptible individuals, the number of Infected Individuals, and the number of Recovered Individuals. This work will predict the total cases, death cases, and infected cases in the near future based on different reproductive rate values. This work has shown the comparison based on 4 different productive rates i.e. 2.45, 2.55, 2.65, and 2.75. The analysis is done on two different datasets; the first dataset is related to China, and the second dataset is associated with the world's data. The work has predicted that by 2020-08-12: 59,450,123 new cases and 432,499,003 total cases and 10,928,383 deaths.