Wireless Sensor Network in Agriculture: Model of Cyber Security

Nowadays, wireless sensor networks (WSN) are widely used in agriculture monitoring to improve the quality and productivity of farming. In this application, sensors gather different types of data (i.e., humidity, carbon dioxide level, and temperature) in real-time scenarios. Thus, data gathering, transmission, and rapid response to new circumstances require a secured data mechanism to avoid malicious adversaries. Therefore, this paper focuses on data security from the data origin source to the end-user, and proposes a general data security model that is independent of the network topology and structure, and can be widely used in the agriculture monitoring application. The developed model considers practical aspects, the architecture of the sensor node, as well as the necessity to save energy while ensuring data security, and optimize the model through the application of organizational and technical measures. The model evaluation is conducted through simulation in terms of energy consumption. The result shows that the proposed model ensures good data security at the cost of a slight increase in energy consumption at receiver and sender nodes, and energy consumption per bit, up to 2%, 7%, and 1.3%, respectively, due to overhead added for authentication in the network.

[1]  Mohit Saxena,et al.  SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .

[2]  Mauro Conti,et al.  A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring , 2017, Future Gener. Comput. Syst..

[3]  Hsin-Wen Wei,et al.  A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.

[4]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[5]  Goran Stojanovic,et al.  COST-EFFECTIVE SENSORS AND SENSOR NODES FOR MONITORING ENVIRONMENTAL PARAMETERS , 2018 .

[6]  Kien Nguyen,et al.  A Path-Length Efficient, Low-Overhead, Load-Balanced Routing Protocol for Maximum Network Lifetime in Wireless Sensor Networks with Holes † , 2020, Sensors.

[7]  S. F. Di Gennaro,et al.  A wireless sensor network for precision viticulture: The NAV system , 2009 .

[8]  Jean-Jacques Chaillout,et al.  Energy Consumption Model for Sensor Nodes Based on LoRa and LoRaWAN , 2018, Sensors.

[9]  Annu Joshi Denial of service in wireless sensor network attacks and defenses , 2018 .

[10]  Ruhul Amin,et al.  A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks , 2016, Ad Hoc Networks.

[11]  Leandro Alves Neves,et al.  Influence of Mobility Models in Precision Spray Aided by Wireless Sensor Networks , 2015 .

[12]  N. Raghuwanshi,et al.  A combined bottom-up and top-down approach for assessment of climate change adaptation options , 2014 .

[13]  D. J. Greenwood,et al.  Opportunities for improving irrigation efficiency with quantitative models, soil water sensors and wireless technology , 2009, The Journal of Agricultural Science.

[14]  Leila Azouz Saidane,et al.  Enhancing the security of the IoT LoraWAN architecture , 2016, 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN).

[15]  Goran Stojanovic,et al.  Flexible sensors platform for determination of cadmium concentration in soil samples , 2019, Comput. Electron. Agric..

[16]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[17]  Peter I. Corke,et al.  Environmental Wireless Sensor Networks , 2010, Proceedings of the IEEE.

[18]  F. Cua Business Case Analytics , 2014 .

[19]  Jiannong Cao,et al.  A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[20]  Dongkyun Kim,et al.  On the design of beacon based wireless sensor network for agricultural emergency monitoring systems , 2014, Comput. Stand. Interfaces.

[21]  JaeHyu Kim,et al.  A Dual Key-Based Activation Scheme for Secure LoRaWAN , 2017, Wirel. Commun. Mob. Comput..

[22]  Álvaro Araujo,et al.  Security in cognitive wireless sensor networks. Challenges and open problems , 2012, EURASIP Journal on Wireless Communications and Networking.

[23]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[24]  Xinxing Li,et al.  Nutritional Quality and Safety Traceability System for China’s Leafy Vegetable Supply Chain Based on Fault Tree Analysis and QR Code , 2020, IEEE Access.

[25]  Subir Biswas,et al.  AH-MAC: Adaptive Hierarchical MAC Protocol for Low-Rate Wireless Sensor Network Applications , 2017, J. Sensors.

[26]  Goran Panic,et al.  An Embedded Sensor Node Microcontroller with Crypto-Processors , 2016, Sensors.

[27]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[28]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[29]  Maria-Cristina Marinescu,et al.  Original papers: A novel methodology for the monitoring of the agricultural production process based on wireless sensor networks , 2011 .

[30]  Carles Gomez,et al.  Modeling the Energy Performance of LoRaWAN , 2017, Sensors.

[31]  H. S. Ng,et al.  Security issues of wireless sensor networks in healthcare applications , 2006 .

[32]  Srinivasa Rao,et al.  An Overview of Wireless Sensor Networks Applications and Security , 2012 .

[33]  Wei-Kuan Shih,et al.  A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .

[34]  Sushma,et al.  Security Threats in Wireless Sensor Networks , 2011 .

[35]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[36]  Hari Om,et al.  Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines , 2016, Comput. Networks.

[37]  Xavier Fernando,et al.  Cognitive Wireless Sensor Networks: Emerging topics and recent challenges , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).

[38]  Masayuki Hirafuji,et al.  A web-based sensor network system with distributed data processing approach via web application , 2011, Comput. Stand. Interfaces.

[39]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[40]  G. Radosavljevic,et al.  Micro force sensor fabricated in the LTCC technology , 2010, 2010 27th International Conference on Microelectronics Proceedings.

[41]  Michael J. Delwiche,et al.  Wireless sensor network with irrigation valve control , 2013 .

[42]  Sudip Misra,et al.  Localized policy-based target tracking using wireless sensor networks , 2012, TOSN.

[43]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[44]  Rodrigo da Rosa Righi,et al.  AgriPrediction: A proactive internet of things model to anticipate problems and improve production in agricultural crops , 2019, Comput. Electron. Agric..

[45]  Tian-Fu Lee,et al.  An Enhanced Lightweight Dynamic Pseudonym Identity Based Authentication and Key Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring , 2019, Sensors.

[46]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[47]  Abhijit Belapurkar,et al.  Distributed Systems Security: Issues, Processes and Solutions , 2009 .

[48]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[49]  Wenyuan Xu,et al.  Channel Surfing: Defending Wireless Sensor Networks from Interference , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.