An Efficient Multiuser Authentication and Data Transformation Technique for Smart Agriculture Using Cryptography

Authors

  • Bilas Haldar, Prabin Kumar Jha, Partha Kumar Mukherjee

Keywords:

Decryption, Encryption, Key Generation, SECC, Security Defense Strategy, Unauthorized Access Control Attack

Abstract

The dynamic advancements in smart agriculture, coupled with the integration of advanced technologies are revolutionizing the agricultural sector. This transformation is enhancing efficiency, precision, and sustainability, leading to unprecedented improvements in crop management and yield optimization. However, the proliferation of digital interfaces and interconnected systems in this domain necessitates a heightened focus on ensuring the confidentiality, integrity, and authenticity of agricultural data. This research contributes to the advancement of secure agricultural technologies, fostering a dependable foundation for the evolution of smart agricultural practices. The work proposed a robust framework for ensuring the security of smart agriculture systems through advanced multiuser authentication and key generation techniques using Secure Elliptic Curve Cryptography (SECC). The framework’s robustness is underscored by its ability to withstand evolving cyber threats and provide a resilient foundation for safeguarding sensitive agricultural data. Additionally, it represents innovative data encryption and decryption techniques using the suggested SECC methodology. Furthermore, this work conducts a comparative analysis between the Elliptic Curve Cryptography (ECC) based approach and the proposed SECC methodology in terms of enhanced performance and security. The results of this research work, highlight the substantial potential of data in agriculture to enhance the effectiveness and efficiency of smart farming services. It introduces an advanced secure defense strategy providing the protection of data and operational integrity against potential cyber threats through suggested SECC techniques. Moreover, the work represents a novel prevention strategy designed to safeguard against unauthorized access control attacks in the realm of smart agriculture.

Downloads

Download data is not yet available.

References

A. Yazdinejad, B. Zolfaghari, A. Azmoodeh, A. Dehghantanha, H. Karimipour, E. Fraser, A. G. Green, C. Russell, and E. Duncan, “A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures,” Applied Sciences, vol. 11, no. 16, p. 7518, 2021.

M. A. Ferrag, L. Shu, H. Djallel, and K.-K. R. Choo, “Deep learning- based intrusion detection for distributed denial of service attack in agriculture 4.0,” Electronics, vol. 10, no. 11, p. 1257, 2021.

S. Alyahya, W. U. Khan, S. Ahmed, S. N. K. Marwat, and S. Habib, “Cyber secure framework for smart agriculture: Robust and tamper- resistant authentication scheme for iot devices,” Electronics, vol. 11, no. 6, p. 963, 2022.

M. Jagadeeshwar, D. Shanthi, M. P. “Automated Data Security Model Using Cryptography Techniques in Cloud Environment”. International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 3, pp. 1910-7, 2024.

O. Friha, M. A. Ferrag, L. Shu, L. Maglaras, and X. Wang, “Internet of things for the future of smart agriculture: A comprehensive survey of emerging technologies,” IEEE/CAA Journal of Automatica Sinica, vol. 8, no. 4, pp. 718–752, 2021.

K. Kethineni and P. Gera, “Iot-based privacy-preserving anomaly detection model for smart agriculture,” Systems, vol. 11, no. 6, p. 304, 2023.

A. Singha, N. Mumenin, N. I. Akhter, M. S. H. Moon, and M. U. Ahmed, “A lightweight cryptographic scheme to secure wsns in agriculture,” in Proceedings of Trends in Electronics and Health Informatics: TEHI 2021, pp. 615–624, Springer, 2022.

A. Haldorai, S. Murugan, and M. Balakrishnan, “Significance of ai in smart agriculture: Methods, technologies, trends, and challenges,” Artificial Intelligence for Sustainable Development, pp. 3–25, 2024.

N. Alex, C. Sobin, and J. Ali, “A comprehensive study on smart agriculture applications in india,” Wireless Personal Communications, vol. 129, no. 4, pp. 2345–2385, 2023.

A. Vangala, A. K. Das, V. Chamola, V. Korotaev, and J. J. Rodrigues, “Security in iot-enabled smart agriculture: Architecture, security solutions, and challenges,” Cluster Computing, vol. 26, no. 2, pp. 879–902, 2023.

A. Kumari, M. Yahya Abbasi, V. Kumar, and A. A. Khan, “A secure user authentication protocol using elliptic curve cryptography,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 22, no. 4, pp. 521–530, 2019.

M. Nikooghadam and H. Amintoosi, “A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol,” Security and Privacy, vol. 3, no. 1, p. e92, 2020.

Z. A. Abduljabbar, V. O. Nyangaresi, H. M. Jasim, J. Ma, M. A. Hus- sain, Z. A. Hussien, and A. J. Aldarwish, “Elliptic curve cryptography- based scheme for secure signaling and data exchanges in precision agriculture,” Sustainability, vol. 15, no. 13, p. 10264, 2023.

O. Jouini and K. Sethom, “A blockchain based authentication mechanism for iot in agriculture 4.0,” in International Conference on Advanced Information Networking and Applications, pp. 67–76, Springer, 2023.

P. Samaranayake and P. Ranasinghe, “Improving agriculture financing opportunities for farmers using blockchain technology: A proof-of- concept development and case scenario illustration,” in Emerging Tech- nologies in Business: Innovation Strategies for Competitive Advantage, pp. 193–218, Springer, 2024.

O. O. Olakanmi, M. S. Benyeogor, K. P. Nnoli, and K. O. Odeyemi, “Uav-enabled wsn and communication framework for data security, acquisition and monitoring on large farms: A panacea for real-time precision agriculture,” in Advanced Technology for Smart Environment and Energy, pp. 17–33, Springer, 2023.

N. Mahalingam and P. Sharma, “An intelligent blockchain technology for securing an iot-based agriculture monitoring system,” Multimedia Tools and Applications, vol. 83, no. 4, pp. 10297–10320, 2024.

C. Senthil kumar and R. Vijay Anand, “Security in iot-enabled smart agriculture systems,” in Communication Technologies and Security Challenges in IoT: Present and Future, pp. 279–300, Springer, 2024.

S. Itoo, A. A. Khan, M. Ahmad, and M. J. Idrisi, “A secure and privacy-preserving lightweight authentication and key exchange algorithm for smart agriculture monitoring system,” IEEE , 2023.

T.-T. Truong, M.-T. Tran, A.-D. Duong, P.-N. Nguyen-Pham, H.-A. Nguyen, and T.-N. Nguyen, “Provable user authentication scheme on ecc in multi-server environment,” The Journal of Supercomputing, vol. 79, no. 1, pp. 725–761, 2023.

A. F.-X. Ametepe, S. A. R. Ahouandjinou, and E. C. Ezin, “Secure encryption by combining asymmetric and symmetric cryptographic method for data collection wsn in smart agriculture,” in 2019 IEEE International Smart Cities Conference (ISC2), pp. 93–99, IEEE, 2019.

M. Shuai, L. Xiong, C. Wang, and N. Yu,“A secure authentication scheme with forward secrecy for industrial IoT using rabin cryptosystem” Computer Communications,vol.160 pp.215–227, 2020.

Y. Tian, J. Yuan, and H. Song, “Efficient privacy-preserving authentication framework for edge-assisted internet of drones,” Journal of Information Security and Applications, vol. 48, p. 102354, 2019.

A. Kamble, V. Gaikwad, and J. Tembhurne, “A provably lightweight mutually authentication and key establishment protocol using extended chaotic map for telecare medicine information system,” International Journal of Information Technology, pp. 1–17, 2023.

C.-J. Chae and H.-J. Cho, “Enhanced secure device authentication algorithm in p2p-based smart farm system,” Peer-to-peer networking and applications, vol. 11, pp. 1230–1239, 2018.

V. O. Nyangaresi, Z. A. Abduljabbar, K. A.-A. Mutlaq, J. Ma, D. G. Honi, A. J. Aldarwish, and I. Q. Abduljaleel, “Energy efficient dynamic symmetric key based protocol for secure traffic exchanges in smart homes,” Applied Sciences, vol. 12, no. 24, p. 12688, 2022.

F. Wu, L. Xu, S. Kumari, and X. Li, “A new and secure authentication scheme for wireless sensor networks with formal proof,” Peer-to-Peer Networking and Applications, vol. 10, pp. 16–30, 2017.

J. Srinivas, S. Mukhopadhyay, and D. Mishra, “Secure and efficient user authentication scheme for multi-gateway wireless sensor networks,” Ad Hoc Networks, vol. 54, pp. 147–169, 2017.

H.-T. Wu and C.-W. Tsai, “An intelligent agriculture network security system based on private blockchains,” Journal of Communications and Networks, vol. 21, no. 5, pp. 503–508, 2019.

I. Q. Abduljaleel, Z. A. Abduljabbar, M. A. Al Sibahee, M. J. J. Ghrabat, J. Ma, and V. O. Nyangaresi, “A lightweight hybrid scheme for hiding text messages in colour images using lsb, lah transform and chaotic techniques,” Journal of Sensor and Actuator Networks, vol. 11, no. 4, p. 66, 2022.

Otisitswe Kebotogetse. “A Secured Elliptic Curve Cryptography Authentication Scheme for Advanced Metering Infrastructure Communication”. International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 3, 2024, pp. 4182-8,. 2024.

D. Natanael, D. Suryani, et al., “Text encryption in android chat applications using elliptical curve cryptography (ecc),” Procedia Computer Science, vol. 135, pp. 283–291, 2018.

Downloads

Published

12.06.2024

How to Cite

Bilas Haldar. (2024). An Efficient Multiuser Authentication and Data Transformation Technique for Smart Agriculture Using Cryptography. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 3087–3100. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6802

Issue

Section

Research Article