Privacy Preserved Cyber-Physical Searching for Information-Centric Intelligent Agriculture

Technological evolution has brought great changes to traditional industries. Nowadays farmers obtain great benefits such as intelligent production and convenient management from intelligent agriculture. Nevertheless, there still exists many flaws in current solutions. Deficiencies in energy management, data transmission and privacy preservation are supposed to be solved. In this paper, the privacy preserved cyber-physical searching framework is proposed to tackle these problems. This four-layer framework can provide a convenient way for farmers to manage production by simply searching for information they interested in. The data source layer contains many sensors for data collection. The data aggregation layer consists of data aggregation nodes deployed in the farms. The data transfer layer employs drones for retrieving data from data aggregation nodes. The cloud control layer is responsible for searching requests processing and privacy preservation. To realize better data collection and searching. The information centric network is introduced into this framework. Moreover, some methods are employed for privacy preservation. The simulation results show the feasibility of this framework.

[1]  Song Guo,et al.  Utility Based Data Computing Scheme to Provide Sensing Service in Internet of Things , 2019, IEEE Transactions on Emerging Topics in Computing.

[2]  Zhou Su,et al.  Defending Malicious Check-In Using Big Data Analysis of Indoor Positioning System: An Access Point Selection Approach , 2020, IEEE Transactions on Network Science and Engineering.

[3]  Cong Wang,et al.  Self-sustainable Sensor Networks with Multi-source Energy Harvesting and Wireless Charging , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[4]  Song Guo,et al.  Incentive Scheme for Cyber Physical Social Systems Based on User Behaviors , 2020, IEEE Transactions on Emerging Topics in Computing.

[5]  Vitaly Shmatikov,et al.  Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[6]  Ning Zhang,et al.  LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue , 2020, IEEE Transactions on Dependable and Secure Computing.

[7]  Abderrahim Benslimane,et al.  Learning in the Air: Secure Federated Learning for UAV-Assisted Crowdsensing , 2021, IEEE Transactions on Network Science and Engineering.

[8]  S. Baghaee,et al.  Implementation of Energy-Neutral Operation on Vibration Energy Harvesting WSN , 2019, IEEE Sensors Journal.

[9]  José D. P. Rolim,et al.  Fast and energy efficient sensor data collection by multiple mobile sinks , 2007, MobiWac '07.

[10]  Y. Ying,et al.  A multifunctional TENG yarn integrated into agrotextile for building intelligent agriculture , 2020 .

[11]  Athanasios V. Vasilakos,et al.  Information-centric networking for the internet of things: challenges and opportunities , 2016, IEEE Network.

[12]  Zhou Su,et al.  BSIS: Blockchain-Based Secure Incentive Scheme for Energy Delivery in Vehicular Energy Network , 2019, IEEE Transactions on Industrial Informatics.

[13]  Arun Kumar Sangaiah,et al.  EdgeLaaS: Edge Learning as a Service for Knowledge-Centric Connected Healthcare , 2019, IEEE Network.

[14]  Su Zhou,et al.  Caching algorithm with a novel cost model to deliver content and its interest over content centric networks , 2015, China Communications.

[15]  Shyamnath Gollakota,et al.  Living IoT: A Flying Wireless Platform on Live Insects , 2018, MobiCom.

[16]  Philip S. Yu,et al.  Differentially Private Data Publishing and Analysis: A Survey , 2017, IEEE Transactions on Knowledge and Data Engineering.

[17]  Keqin Li,et al.  Graphene-Grid Deployment in Energy Harvesting Cooperative Wireless Sensor Networks for Green IoT , 2019, IEEE Transactions on Industrial Informatics.

[18]  Rongxing Lu,et al.  Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks , 2020, IEEE Transactions on Information Forensics and Security.

[19]  Qichao Xu,et al.  Security-Aware Resource Allocation for Mobile Social Big Data: A Matching-Coalitional Game Solution , 2017, IEEE Transactions on Big Data.

[20]  Karthik Dantu,et al.  UB-ANC planner: Energy efficient coverage path planning with multiple drones , 2017, 2017 IEEE International Conference on Robotics and Automation (ICRA).

[21]  Miaowen Wen,et al.  MBID: Micro-Blockchain-Based Geographical Dynamic Intrusion Detection for V2X , 2019, IEEE Communications Magazine.

[22]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[23]  Ying Wang,et al.  Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud , 2017, IEEE Transactions on Big Data.

[24]  Jiann-Liang Chen,et al.  Toward intelligent agriculture service platform with lora-based wireless sensor network , 2018, 2018 IEEE International Conference on Applied System Invention (ICASI).

[25]  Jun Wu,et al.  Making Knowledge Tradable in Edge-AI Enabled IoT: A Consortium Blockchain-Based Efficient and Incentive Approach , 2019, IEEE Transactions on Industrial Informatics.

[26]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[27]  Cong Wang,et al.  NETWRAP: An NDN Based Real-TimeWireless Recharging Framework for Wireless Sensor Networks , 2014, IEEE Transactions on Mobile Computing.

[28]  Jianzhong Li,et al.  Energy-Collision Aware Data Aggregation Scheduling for Energy Harvesting Sensor Networks , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[29]  Guihai Chen,et al.  Charging Task Scheduling for Directional Wireless Charger Networks , 2018, IEEE Transactions on Mobile Computing.

[30]  Deepak Puthal,et al.  PAAL: A Framework Based on Authentication, Aggregation, and Local Differential Privacy for Internet of Multimedia Things , 2020, IEEE Internet of Things Journal.

[31]  Fenglong Ma,et al.  Minimizing Charging Delay for Directional Charging in Wireless Rechargeable Sensor Networks , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[32]  Wu Yang,et al.  Application-Aware Consensus Management for Software-Defined Intelligent Blockchain in IoT , 2020, IEEE Network.

[33]  Moni Naor,et al.  On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy , 2010, J. Priv. Confidentiality.

[34]  Zeenat Rehena,et al.  IoT Based Intelligent Agriculture Field Monitoring System , 2018, 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).

[35]  Aaron Roth,et al.  The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..

[36]  Martin J. Reed,et al.  Information resilience: source recovery in an information-centric network , 2014, IEEE Network.

[37]  Amir H. Gandomi,et al.  Residual Energy-Based Cluster-Head Selection in WSNs for IoT Application , 2019, IEEE Internet of Things Journal.

[38]  Alvaro Llaria,et al.  Geolocation and monitoring platform for extensive farming in mountain pastures , 2015, 2015 IEEE International Conference on Industrial Technology (ICIT).

[39]  Zhou Su,et al.  Contract theory based caching and pricing strategy for content centric networks , 2017, 2017 ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K).