Next Article in Journal
A Knowledge-Based Cooperative Differential Evolution Algorithm for Energy-Efficient Distributed Hybrid Flow-Shop Rescheduling Problem
Next Article in Special Issue
A Multi-Criteria Decision-Making Process for the Selection of an Efficient and Reliable IoT Application
Previous Article in Journal
Bionic Design of Liquid Fertilizer Deep Application Spray Needle, Based on Badger Claw-Toe, for Improving the Operating Performance of Liquid Fertilizer Deep Application in Northeast China
Previous Article in Special Issue
Classification of Tumor in Brain MR Images Using Deep Convolutional Neural Network and Global Average Pooling
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

AgriSecure: A Fog Computing-Based Security Framework for Agriculture 4.0 via Blockchain

1
School of Computing Science and Engineering, VIT Bhopal University, Bhopal-Indore Highway Kothrikalan, Sehore 466114, Madhya Pradesh, India
2
Department of Information Technology, College of Computer and Information Sciences, Majmaah University, Majmaah 11952, Saudi Arabia
3
Department of Computer Science and Engineering, GIET University, Gunupur 765022, Odisha, India
4
School of Electronics Engineering, Kalinga Institute of Industrial Technology, Bhubaneswar 751024, Odisha, India
5
Department of Computer Science and Engineering, School of Engineering, Indrashil University, Rajpur, Mehsana 382740, Gujarat, India
6
Department of Computer Engineering, College of Computers and Information Technology, Taif University, Taif 21944, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Processes 2023, 11(3), 757; https://doi.org/10.3390/pr11030757
Submission received: 23 January 2023 / Revised: 23 February 2023 / Accepted: 24 February 2023 / Published: 3 March 2023

Abstract

:
Every aspect of the 21st century has undergone a revolution because of the Internet of Things (IoT) and smart computing technologies. These technologies are applied in many different ways, from monitoring the state of crops and the moisture level of the soil in real-time to using drones to help with chores such as spraying pesticides. The extensive integration of both recent IT and conventional agriculture has brought in the phase of agriculture 4.0, often known as smart agriculture. Agriculture intelligence and automation are addressed by smart agriculture. However, with the advancement of agriculture brought about by recent digital technology, information security challenges cannot be overlooked. The article begins by providing an overview of the development of agriculture 4.0 with pros and cons. This study focused on layered architectural design, identified security issues, and presented security demands and upcoming prospects. In addition to that, we propose a security architectural framework for agriculture 4.0 that combines blockchain technology, fog computing, and software-defined networking. The suggested framework combines Ethereum blockchain and software-defined networking technologies on an open-source IoT platform. It is then tested with three different cases under a DDoS attack. The results of the performance analysis show that overall, the proposed security framework has performed well.

1. Introduction

Farming is the main source of food and contributes significantly to the economy. According to the FAO (Food and Agriculture Organization of the United Nations), by 2050, the demand for producing food must be increased by 70% to satisfy the world’s demand. In recent studies, 550 million people of the world’s population are in nutrition deficiencies; every day, around 820 million people are still not obtaining food. The study says that the world’s population will increase to more than two billion, and most of the population will live in cities. It has also been observed that the population in India and Nigeria will increase to around 482 million between 2019 and 2050 [1].
The biggest challenging situation arises with this population growth to achieve the Sustainable Development Goals (SDGs) of zero hunger [2]. These projections for the near future have an impact on overall food demand. Because of the scarcity of water today, it is difficult to meet only 40% of the water supply by 2030, and the unavailability of farming land will lead to a reduction in the food supply. As a result, the agriculture sector needs sufficient resources than are presently available, as well as more self-sustaining systems to boost cultivation percentages while reducing environmental resource use [3]. Though it might be appropriate to reach rising demand, it is unclear how to do so in an equitable and resilient manner. Again, there is a vital need to accelerate and scale up the agricultural production transformation [4]. Agriculture 4.0 can provide a way to increase agricultural efficiency with the available crop area. It also optimizes irrigation to use limited water and energy and allocate resources to protect crops effectively. Those would be possible through the integration of environmental monitoring, forecasting, and smart devices [5]. Smart farming’s new technologies can enhance agricultural mechanisms, allowing cultivation to increase while using natural resources efficiently. Agricultural sector innovations are referred to as the ‘‘digital agricultural revolution”, which turns most factors of agriculture, ensuing in more effective, efficient, self-sustaining, integrated, truthful, and self-reliant agriculture. Cellular devices, sensors, data analysis, fog computing, information security, and intelligent systems influence how technologies are integrated into the agricultural sector [6].
Nowadays, agriculture is changing quickly as it enters a new age known as Agriculture 4.0. Agriculture 4.0 seeks to employ new technology and approaches to address the issues facing modern agriculture (such as climatic alteration, illnesses, extreme application of resources, etc.) and to lower risks while enhancing production efficiency and safety [7]. To do this, it makes extensive use of cutting-edge ICTs.
In addition to this evolution, there is a rising trend in food needs. Given the continual evolution and the rising need for food, it is anticipated that the market for agriculture 4.0 will expand greatly in the years to come.
Wireless Sensor Networks (WSNs) and Internet of Things (IoT) technologies are widely utilized in Agriculture 4.0 and provide farmers with a number of advantages, including observing numerous environmental factors connected to crops, spotting crop illnesses, predicting yield, and lowering labor costs [8]. However, the Sensor and network connectivity and communications in farming might act as a base factor for many types of attacks since these devices frequently have obsolete or unpatched firmware or software [9].
Security is a top priority in agriculture, and any interruption or distortion may present difficult problems and have disastrous outcomes. Monitoring and categorization of network traffic, which have attracted a lot of attention since the earliest beginnings of the Internet, can be crucial to preventing network assaults [10]. Scientific research on network traffic categorization for IoT system security has been extensive. It is an essential part of intrusion detection systems (IDS) and aids in the identification and detection of harmful network activity.
This revolution in agricultural technology is built on having access to all the data produced by every sensor used on a farm, centralized via the internet, and analyzed for the best possible decision-making [11]. Any sensor employed generates a significant amount of data that can be extensively examined and provides useful information to enhance crop quality or lessen environmental impact. Cloud computing, physical hardware, and the IoT are the three key components that enable the automation and data sharing needed by this new smart agriculture [12]. With the help of technical improvements (drones, sensors, software, etc.), we can complete agricultural jobs faster and more effectively than humans.
Agriculture 4.0 must make sure that an appropriate security mechanism is implemented to avert an attack to build scalable and secure systems. The integrity of data is important for the effective functioning of information technological advances such as data analysis and intelligent devices [13]. Because agriculture 4.0 incorporates elements from conventional Internet, cellular, and wireless technologies, which may include all of the security risks that advancements present situation. It also addresses current security risks such as data and device integrity, consistency, and accessibility. Devices in agriculture 4.0 are implemented in outdoor spaces where they are subjected to external factors such as animals, human beings, or farming equipment. Unknowingly, these factors remove or damage sensors. Since the 6th century B.C., there has been a threat known as Agro terrorism [5]. This type of terrorism could have a variety of goals, including causing financial harm, fear, and social unrest [6,7]. Terrorists could incite community disturbance and lack of credibility in administration by exploiting agricultural and food corporate crises, which can lead to undivided attention in the world. Cyber-agro-terrorism in agriculture 4.0 is an electronic system in agricultural settings to harm crops and animals while causing economic loss. Cyber-agro-terrorists can operate attacks on fields and through the internet, using cyber resources [8].

2. Overview of Agriculture 4.0

Agriculture has gone through many revolutionary movements, all of which have increased the agriculture industry’s performance and effectiveness.
Plant cultivation “in 10,000 BC” resulted in the birth of the world’s first societies and civilizations. Machines were used in the farming sector to execute work, which increased production from 1900 to 1930. Farmers were able to use newly discovered crops and agrochemicals during the Green Revolution (from around the 1960s). Biotechnology facilitated the production of plants with previously selected attributes, with increased yield and pest resistance, desertification, and herbicide, from 1990 to 2000. Now, in the 21st century, digitalization has the potential to help humanity survive and flourish for a long time [4].
The world’s largest industry, agriculture, contributes significantly to both social stability and economic growth [13]. A growing number of studies on smart agriculture are driven by the task of resolving the conflict between the population increase and the constrained food output. The advancement of science and technology fuels the revolution in agriculture, which is based on both the rise in output and the limitations of the time [14]. Figure 1 is used to explain the features of agriculture development to readers (from Agriculture 1.0 to Agriculture 4.0).
Figure 1 is used to explain the features of agriculture development to readers (from Agriculture 1.0 to Agriculture 4.0).
Agriculture 1.0: During the conventional agricultural age (1784–1870), which was dominated by animal and human resources, the fundamental problem with agriculture was its lack of operational efficiency.
Agriculture 2.0: During the automated agricultural period of the 20th century, resource waste was the major problem.
Agriculture 3.0: During the period of rapid advancement of automated agriculture (1992–2017), the key problem was the lack of intelligence.
Agriculture 4.0: the age of smart agriculture (which began in 2017 and is defined by unmanned operations) is primarily characterized by the application of contemporary information technology to both support and intelligently improve agriculture.
The term “smart agriculture” [15] refers to a new approach to agriculture that personalized service through the integration of contemporary information technologies such as the internet, big data, IoT, and many more [16]. In a nutshell, the new mode is an intelligent agricultural solution that fuses current information technology with agriculture. Although recent information technology opens up new possibilities for the progress of agricultural output, it also places heavy demands on security and privacy in the context of smart agriculture and poses significant obstacles therein [17].
More than a movement, agriculture 4.0 represents the next development in the sector’s transition to a more intelligent, effective, and environmentally responsible one. The supply chain’s daily operations produce a tremendous amount of data [18]. Most of the time, this information went unused, but thanks to big data and new technology, it can now be used to boost any crop’s performance and productivity.

2.1. Advantages of Agriculture 4.0

The effects of smart agriculture are covered in the following sections.
Production volume: The use of smart technology in agriculture can significantly boost the number of products produced on the farm. This will contribute to feeding a growing population.
Production quality: The wellness and nutrition of people from all socioeconomic strata in the nation can be significantly impacted by the quality of food produced. A country’s population will live longer and in better health with better food, which will improve its citizens’ economic contribution.
Effectiveness of farming practices and resource use: The application of smart technologies to conventional agricultural operations can increase their effectiveness. In turn, this encourages more efficient use of agricultural resources.
Ideal cost of cultivation: It is achieved when there is a balance between quantity, quality, and efficiency in the procedures used. This results in a higher price for the agricultural output that is produced.
Reducing wastage: The farming industry, one of the main economic sectors, is in great part to blame for the massive quantities of food and other secondary resources that are wasted. Smart technology could be employed to track and cut down on this waste.
Ecologically sustainable: The reduced agricultural waste and improved agricultural process efficiency directly reduce the environmental and ecological footprint.
Effective use of Time: Timely delivery of the necessary insecticides, fertilizers, and other chemicals can provide timely and high-quality agricultural output with fewer losses thanks to smart agriculture.
The farming industry may be at threat by the following while deploying agricultural 4.0 technology:
  • Theft of business and customer data.
  • Taking resources under the control of sensors and gadgets.
  • Destroying the objects that devices control.
  • Damage to reputation if a data breach is disclosed.
Agriculture 4.0 may be at risk from infrastructure damage, sensor failures may affect poultry and cattle breeding, and control system hacks may affect greenhouse farming. All of these could cause problems or malfunction in agricultural operations by harming the IoT architecture’s hardware and software. In addition, data-collecting technologies face challenges from malicious assaults, unauthorized access, privacy breaches, and other issues.
The landscape has shifted, with AI and ML research concentrating on agro-based contexts, water management, livestock, and farmlands. Monitoring, control, and decision-making alternatives in the irrigation field repeatedly tried to save water and enhance productivity [8,9,10,11,12,13]. Some research concentrated on plant leaf disease [14], horticulture [15], vineyards [16], hydroponic [17], alert facilities [18], integration of IoT technological innovations [19], tracking resources [20], and cloud control [21].

2.2. IoT in Agriculture 4.0

Table 1 lists several well-known uses of IoT integration and utilization in agriculture.
Intelligent soil cultivation system: This system would plow, weed, prepare the seedbed, and sow the field soil in order to prepare it for harvest.
Efficient irrigation mechanisms: This technology would automate the controlled artificial supply of water needed for plant growth.
Smart fertilizer systems: These automate the application of fertilizer to a field while allowing for precise control over the kind, amount, and timing of fertilizer.
Intelligent pest detection and treatment systems: These systems keep an eye out for pest infestations, analyze agricultural damage, and incorporate methods to manage the infestation.
Intelligent livestock agriculture: This involves employing cutting-edge technologies to breed animals and uses precision agriculture to enhance the quantity and quality of the produce.
Smart harvesting system: This system harvests a field effectively by using IoT-based methods.
Smart farm management system: This kind of technology would aim to offer analytics on data to increase field productivity and yield.
Intelligent groundwater quality management system: The final product is greatly influenced by the quantity and quality of the groundwater. As a result, this system uses IoT approaches to maintain appropriate groundwater levels.
Though there are many smart agriculture alternatives, they are still underdeveloped and offer a low degree of intellect. Many initiatives are limited in their automated systems, with the internet of things sending data to the base station [53]. There is also no implementation with the Internet in several cases, except that in a few cases, data is stored in the cloud by the local systems.
The multi-layer architecture of IoT used in agriculture 4.0 consists of four layers, which are the physical layer, network layer, edge layer, and application layer. Table 2 below gives a detailed description of Resources used in the multi-layered architecture of IoT in Agriculture 4.0 [54].
The RFID, cameras, actuators, GPS, and all these devices are all implemented in the physical layer, which collects data from the farming field and digitizes them using an Analog to Digital converter (ADC). As the equipment at the physical layer does not compute and store the data, this needs to connect with the edge layer through the network layer. The edge layer includes various resources such as decision-making, gateway, data filters, data security, and interfaces [55].
The advancement of devices and technological developments will allow for the incorporation of more computer capabilities into systems. This type of integration aims to meet the various needs of agricultural mechanization, farming techniques, and sustainable agriculture [56,57]. A further issue is data security. This is very important to focus on data privacy, the trustworthiness of data, and the correctness of data from generation to decision-making.

2.3. Research Motivation

Three factors serve as inspiration for this article:
  • Smart agriculture is a new paradigm that integrates information technology with conventional farming as a result of the low productivity of traditional agriculture and the extensive usage of information technology. It has the potential to become the next big thing in agricultural development. Consequently, it is crucial to outline the current manufacturing model and particular studies [58].
  • Despite substantial research on smart agriculture, less has been conducted in comparison to industrial security solutions to analyze security problems.
  • It is crucial to examine the features of security concerns in relation to situations involving smart agriculture [59]. This article attempts to give a review of the security challenges raised by smart agriculture in light of the aforementioned variables, which inevitably results in a significant number of open research questions.

2.4. Research Contributions

The research contributions of the paper are as follows:
  • We go over the advantages of using IoT in the farming sector and outline some of the potential uses.
  • We provide a layered approach for smart agriculture that can be applied to any precision agriculture application.
  • We suggest an agricultural sensor data management system that can gather, analyze, visualize, and manage sensing data in real-time.
  • We present a blockchain-based authenticity monitoring technique to prevent erroneous control and information delivery.
  • To improve network management, we proposed a simulated switch that supports SDN technologies.
  • We present experimental results with different case studies from an open-source IoT platform integrating Ethereum blockchain and SDN technologies, demonstrating the efficacy of the suggested security architecture.

2.5. Paper Outline

In addition to the introduction, this paper mentions the overview of Agriculture 4.0 in Section 2. Section 3 provides important security risks from a multi-layer perspective. Section 4 describes the current state of security research in Agriculture 4.0. Section 5 presents the current scenario of security challenges in Agriculture 4.0. Section 6 describes the proposed agricultural security framework. The experimental setup configuration and architecture along with the experimental results presented in Section 7. The use of 5G technology in the scenario of smart agriculture is described in Section 8. Finally, Section 8 concludes with future challenges in Agriculture 4.0.

2.6. Analytical Distribution of Referred Articles

The referenced articles are compared in Figure 2 based on the place of publication. The distribution of cited articles by publication type is shown in Figure 2. Out of the total number of referred papers, 88 are original research articles from reputable journals, while 25 are from conferences.
The frequency of papers discussing the agriculture 4.0 system is depicted in Figure 3. Due to our interest in current technologies, we have assessed 20 papers that were published in 2018, out of which five articles are based on agricultural security issues. In contrast to the 19 research papers on the agriculture sector and security aspects from the year 2020 that we have cited, we have cited 18 publications from the year 2019. With the papers becoming publicly available from various reputable journals for reference, we studied 46 modern technology-based quality papers in smart agriculture along with articles on security challenges in 2021 and 2022. In order to be updated regarding the current tools and technologies in this era, we also referred few articles to be published in 2023.

3. Agriculture 4.0 Security Threats in Multi-Layered Paradigm

There are several security issues in agriculture 4.0, starting from Storing data, processing data, and transmitting it through Internet connectivity. Figure 4 shows security risks in the intelligent agricultural system in a multi-layered paradigm. Security issues can be either unintentional or sometimes known. Animals, farm laborers, and machine tools can all easily gain access to agricultural environments and cause problems [55]. Most of the security threats are very common, but there some are unique to others who function in harsh-field environments, such as Intelligent Agriculture.

3.1. Security Risks at the Physical Layer

This is primarily concerned with physical equipment such as sensors and actuators. Physical devices can fail due to unintentional or intentional human behavior, viruses, spyware, or cyber-attacks. Smart farming applications use a wide range of sensors and technologies, and this diversity opens up several security risks, including the following:
Random device incidents: This is the unintended alteration of physical equipment that causes it to deviate from its normal performance. The physical equipment may be damaged by farm machinery, causing short- or long-term physical damage, as a result, generates false data and affects data accessibility.
Mobile node hijacking: It is the theft of farm equipment such as tractors, drones, and sowing robots. Drones can indeed be pesticides, fertilizers sprinkling could be performed by Drone, and robots could do weeding detecting disease. The intruder may access and use the farm equipment remotely without having access permission.
Fake node: An intruder introduces imitation or harmful nodes into the automated agriculture field to disturb the smooth functioning of the system [55]. This attack could be triggered by capturing a node and making a replica of it. This type of attack typically aims to either alter or modify data-shuttered devices and applications.
Abnormal Measurement: It senses unusual observations due to data falsification, energy exhaustion, radio radiation, detection of various connections, extreme storms, malfunctions, or wrong inputs. Incorrect data can jeopardize making decisions that result in the analysis of data will be inaccurate, which minimizes system correctness.
Sleeplessness attack: The sleeplessness attack sends a series of seemingly legitimate requests in order to keep the devices awake for prolonged life. As a result, the device’s battery runs out, and the device stops working [56,57]. When the devices are turned off, the observed information is not properly sent, jeopardizing decision-making and system efficiency.

3.2. Security Risks at Network Layer

The objective of this layer is to send the generated data by the sensors from the physical layer to the most trustable computational unit, which is the cloud. The most common attacks, which affect the resources used in the network layer, are focused on [58,59]. The security risks in network layers are:
Distributed Denial of Service (DDoS): It attempts to affect access to service providers by overburdening the communication link or manipulating protocol flaws, which cause resources, such as CPU and memory collapse [60].
Due to resource exhaustion brought on by a DDoS attack, the victim server is forced to block connections from new reliable clients. The victim server’s buffer capacity or bandwidth may have reached its limit of resources. The overall probability of resource scarcity at the target end is provided by Equation (1) [15].
P A t t a c k = 1 1 P B a n d w i d t h 1 P m e m o r y
where,
P A t t a c k : Probability of total attack,
P B a n d w i d t h : Probability of Consumption of bandwidth
P m e m o r y : Probability of Consumption of memory
Attacks on Data Transit: These types of attacks aim to retrieve information shared between network devices in order to obtain confidential information [61]. An adversary could intercept traffic via malicious routers or man-in-the-middle attacks [62]. Interception of traffic reveals confidential data such as private keys, access credentials, or digital signatures.
Attacks on Routers: They plan to change network routes in order to gain traffic control. Inimical nodes in IoT networks might attempt to reroute communicating paths during the process of transmission. As a result of attacks, the receiver might receive information lately, partially, or incorrectly, or not at all [63,64].
Malware Injection Attacks: The malware injection attack [34], in which malware is injected by an attacker into a connected computing device. This is a very common attack on smart farming. Malware is a very significant threat in distributed projects because it automatically spreads through the system, making it an appealing target for intruders. Malware damage comes in multiple varieties of sizes. Malware can steal data about farm material usage, buying information for fruits, vegetables, and farm animals, data about farm equipment, and so on. It could hire automated devices to form a botnet that would be used to commit harmful attacks under the influence of an intruder.
Botnet: At each architectural layer of the precision farming system, there are numerous IoT devices. These machines are vulnerable to attack and could be taken over by a centralized malicious system. This results in a ‘Botnet of Things’ (BoT) [35]. A mutant farm workforce IoT equipment that is already infected [36] is easily used to infect other networks via various communication links, and thus automated farming could become an internet of destructibility for cyber illegitimates. The security features are not added in many of the Precision agriculture devices, but still, they are used frequently for establishing adequate data security defensive system frameworks.

3.3. Security Risks at Edge Layer

The edge contains important aspects that monitor, and control modules communicate with all layers and access resources. The physical layer’s large volumes of data can be processed locally rather than centralized in the cloud. The following are major edge security issues.
Actuator control Forge: It introduces false measures of data into the system in order to manipulate it. Typically, the data is received by the gateway in plain text. Corrupted data will lead to poor decision-making. An opponent, for example, could inject incorrect soil moisture measurements into a smart irrigation system to manipulate it.
Booting Attacks: Devices are vulnerable to attacks due to a lack of security processes during boot [37]. Memory cards and flash drive sticks, for example, may detect dangerous codes which run at startup [38]. Suspicious booting practices could launch numerous attacks on the edge with insufficient protection.
Signature wrapping: The attacker modulates the cipher text by inserting a bogus element that allows you to perform a random Web Application requisition while identifying as an authenticated user [39].
Measure infusion Forgery: It is the injection of wrong specifications into a system in order to modify it. An attacker sends known data patterns through actuators to the cloud storage, which is then injected into the system through computational units. Corrupted data could lead to poor decision-making.
Unauthorized access: The process of validating is a critical security component. The authentication process is a technology that ensures security and privacy, honesty, and accessibility [40]. Several agricultural practices, however, use gateways with insufficient or no access controls.
Gateway-cloud fabrication: The cloud and the gateway are linked by ISPs or wireless connections. A network attacker could fabricate cloud requests by interrogating a gateway. The attacker could use these requests to change parameters in precision agriculture, control queries for sensitive services, or interpret system equipment. The cloud can implement security services as it has computational power. In order to ensure maximum system reliability, these strategies must be incorporated into the system.

3.4. Security Risks at Application Layer

This layer provides end-user assistance and data to process and make system decisions. This layer’s security concerns are application-specific, focusing on preventing data theft and ensuring privacy. Some of the attacks that might affect cloud services and applications are listed below in terms of security.
Malicious scripts: Malicious scripts can deceive clients, infuse malicious data, access confidential material, and compromise security features. This type of attack is frequently carried out by cybercriminals for specific, economic, or political reasons. They can damage or destabilize operational processes by using malicious scripts, presenting unnecessary ad campaigns, and stealing money [41].
Phishing: It is an attack that attempts to obtain highly classified personal information, such as an Identity and password, fraudulently. Phishing typically targets end-users through fraud and sites [42]. The attacker also affects decision-making and internal operations in many cases. The most effective protection would be for users to remain vigilant while surfing the web [43].
Denial of Service (DoS): This threat disrupts service by overburdening traffic on the network or flooding the provider with repeated attempts [44]. Because of flaws in security setup, an attacker can launch this attack from the Web or a sub-system.

4. Security Threats in Modern Agriculture

Farmers typically carry out the developed smart system initiatives in physical fields or green fields. In Agriculture 4.0, most efforts are focused on water processes, disease monitoring, seed production, and record keeping. It can be either automatically controlled or manually controlled. In both cases, the system monitors the environment with sensors and changes it with actuators. Some initiatives only digitize farms, whereas others incorporate industry 4.0 or IoT technologies. As an immature industry, open-field agriculture is the focus of this work, with security issues restricted to access control and web-encrypted communications.
It is too difficult to execute different security measures in rural areas since there is a shortage of modern technical infrastructure and advanced technology. Many difficulties can arise if security measures are attempted in rural agriculture. Table 3 lists a few of the security challenges that are prevalent in rural locations.
Recently most of the agriculture 4.0 projects have implemented IoT, but the security features in that have become disabled by default. It has been introduced that a server controls and manages these devices remotely via a web application. Opportunistic opponents did not know details about security resources. They gain unauthorized access to the system, insert fabricated measures, fabricate actuator controls, or report earlier attacks to divert the system from its normal functioning [45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64]. The author proposed a smart watering system that remotely controls and observes the flow of water in the farm but is not focused on security risks to detect malicious attacks and unallowed access that manipulate the monitored data. To monitor the growing environment, ref. [65] introduce a Hydroponic Farming Ecosystem (HFE). It is automatically controlled, and the client can monitor the farming via a web interface. These automated systems require high-security concerns to detect or avoid random sensor incidents, weak sensors, wrong data injection, and other attacks, which could corrupt data and affect system reliability.
Similarly, in [66], the author focused on creating a system for monitoring fields based on humidity, soil moisture, light levels, and temperature. Irrigation can be controlled manually or automatically via web or mobile systems. An intelligent solution for detecting diseases in leaves focused in [67]. By using sensor data and camera images, the system identifies leaf diseases. A mobile or web application is used by the end-user to interact with the system. This paper does not go into detail about the implementation of security.
Similarly, ref. [68] proposed an intelligent agricultural system for information interchange among farm equipment. The article discusses the system’s construction but makes no mention of manual intervention or remote control, nor does it concern any security challenges. As this is a data exchange system, the DoS attack can affect the network layer. Ref. [69] provides NETPIE, a solution that gives agricultural product information. The growing environment can be controlled and monitored with a set of physical devices. The generated data is analyzed saved in a QR code, and which is then available to the customer. NETPIE does not discuss security resources. Ref. [51] Introduced monitoring of crop fields and watering using IoT, which measures data and controls data to avoid unauthorized access to these data but could not protect the other devices, which leads to weak security, which might result in a major loss. Ref. [52] Proposed a system known as SEnviro, which observes the crop field and detects diseases remotely. This system does not focus on the prediction of disease, but unauthorized access is controlled here.
According to the relevant literature, from a security standpoint, farming equipment is used without security features. Furthermore, the gateway contains no security information. Transmission privacy or device authentication is not presented in any of the above-discussed systems. Access control and management and encryption of data need to add security technologies to Information dissemination. Smart agriculture is currently a convenient target for cyber criminals’ agents. Attacks can be motivated by a variety of factors, including an advertisement, intellectual, or even terrorist reasons. Terrorist groups, for example, can cause ecological loss to a country, economic chancers may take part in market manipulation, and workers can attack a range of factors [53].

4.1. Data and Device Security Issues and Threats in Agriculture 4.0

As was previously mentioned, harsh environmental factors that can seriously harm electromechanical equipment, such as extreme heat, moisture, moisture, shocks, and other anomalies, have a direct impact on the agricultural sector [70]. The majority of these sensors are prone to failure, making it feasible for them to produce inaccurate data and instructions that could cause a manufacturing disaster [71]. Additionally, sensors and network equipment are predominance reachable. This poses a serious risk to farmlands since anybody with bad intentions can access them and corrupt or harm them to cause them to malfunction [72].
Another potential security concern is the online transfer of the information gathered by IoT sensors and other agricultural machines. Major security concern in the agriculture industry is security, privacy, and control [73], as farmers may incur a significant financial and personal loss in the event of a data breach. Ref. [74] Divides the threats to confidentiality into four distinct categories:
  • Intentional data theft through smart platforms and applications that do not adhere to security and privacy standards;
  • Internal information thefts from a stakeholder in the supply chain intended to harm an agri-business or a farmer;
  • Unethical data sales intended to reduce profits for farmers or to harm them; and other threats.
  • Unsupervised foreign access to private and sensitive information using drones, sensors, and cameras with the intention of utilizing them to harm farmers or jeopardize public safety [64,75].
Every application of modern technology, IoT in agriculture, carries the aforementioned dangers, weaknesses, and threats. A more thorough and complex explanation of the risks and their sources in aspects of cyberattacks in the agro sector is provided in the following paragraph, which is primarily focused on illegal behavior and exploited vulnerabilities in ICT systems.

4.2. Cybercrime and Cybersecurity in Agriculture

A cyber-attack on an agribusiness or food industry is increasingly likely today thanks to automation and the widespread use of internet-connected equipment, which give potential (cyber) criminals greater chances in fields that were previously too remote or difficult to physically access [61]. Consequently, a potential cyber-attack or security problem in an agricultural organization could have serious human or financial repercussions. This implies that pertinent security concerns brought about by the widespread and ongoing usage of IoT, as well as the emergence of agro-terrorism, require adequate attention, better equipment, and solutions [62].
The bulk of system operations in the agriculture sector are network-based, and frequently these systems are not protected from cyber threats, which can have substantial financial and security ramifications [76,77,78,79,80,81,82,83,84,85,86]. Five important elements, as identified in [87], strengthen these risks in the agricultural sector:
  • Increasing the farm consolidation highly depends on technology;
  • The joint ventures of the food supply chains, allow manufacturers to conduct processes and trade products directly;
  • Food-related technologies in intelligent markets depend on more components, which increases their vulnerability to errors and malfunctions.
  • Effective monitoring of food-related systems, social networks, and industries in a safe, dynamic, and almost real-time manner is lacking, making it difficult to identify serious digital and security vulnerabilities that could be the root of significant data breaches and system defects.
Due to the heightened risk of cybercrime, the agriculture sector may be impacted by such threats in a number of ways. Categorize these methods as in [84]. Threats of tampering include delivery disruption, confidential information interception, formula modification, and delivery disruption. These risks are undoubtedly closely related to the adoption and application of technological advancements in the agriculture and food sectors.
Cooper et al. and Bogaardt et al. identify the following as the primary technical advancement areas that are commonly used in the agri-sector and contain vulnerable places for harmful cyber-attacks [86,87,88]:
  • Radio Frequency Identification (RFID); wireless communications (such as Wi-Fi);
  • Sensors for the infrastructure, soil, and crops;
  • Drones and other unmanned aerial vehicles (UAVs);
  • PA-specific automation solutions (such Real Time Kinematic Technology);
  • Portable electronics (such as laptops, smartphones, and GPS trackers);
  • Smart agriculture and vertical agriculture;
  • The use of AI in conjunction with biotech and nanotech (AI).
Table 4 provides a summary of the study performed on different attacks in agricultural 4.0 due to cyber security concerns.

4.3. IoT Vulnerabilities, Risks, and Threats in Agriculture

IoT is made up of four main systems that make it possible to communicate between nodes. Sensing technology, IoT gateways, cloud servers, data storage, and mobile applications for remote control make up an IoT system. The architectures of IoT systems in agriculture come with current and new threats and vulnerabilities. These flaws can be linked to IoT device hardware and software problems, communication protocols, and also data processing and storage solutions (found, for example, in cloud infrastructures, data centers, and smartphones) [2,11].
According to [99,100,101], the following is a concise but accurate classification of the primary causes of low security in the IoT:
  • Firmware that is not patched and/or default passwords that have been used for a long time allow for device compromise in an IoT network.
  • Because of the limited computing power of smart devices and vendors’ efforts to keep their prices low in a cutthroat market, it is difficult to incorporate complicated cryptographic algorithms.
  • Flaws in the routing protocols used by smart devices (such as Bluetooth and ZigBee);
  • The Wi-Fi Protected Access (WPA) protocol’s outdated, low-security version, which is frequently still in use;
  • Conducting passive vulnerability detection using search engines;
  • The risk of assembling millions of smart devices into a potent botnet (such as Mirai), given how simple it is to find vulnerabilities via internet scanning;
  • A general disregard for the security of smart gadgets
Finally, a variety of criteria can be used to categorize IoT vulnerabilities, hazards, and threats. These risks apply to all IoT applications, including those in the agricultural sector. First, internal vs. external risks and passive vs. active risks are the two basic classification groups of security concerns in IoT systems in the agriculture sector [79].
IoT hazards are categorized in another intriguing way using a layer-based system. According to [22], each of the levels below integrates many technologies that could lead to a variety of security threats, vulnerabilities, and/or breaches. The application layer, middleware layer, internet layer, access gateway layer, and edge technology layer are the five main layers that make up the IoT architecture.

5. Existing Research on Security in Agriculture 4.0

In [54], the author states that The United States Department of Homeland Security issued a report emphasizing the significance of agriculture 4.0 and the associated internet security threat and possible attacks.
The report emphasizes the information security model of confidential information, credibility, and accessibility in farming. The researchers of [55] suggested a new access control solution that combines session keys and public keys to speed up the encrypted communications tasks. It yields quick and lightweight appropriate control measures that are ideal for precision agriculture communication. Ref. [56] Proposed a framework for understanding vulnerabilities in emerging technologies and their application in an intelligent farming environment. The goal of the approach is to determine the level to which intelligent farming emerging innovations are prone to cyber. It assesses the threat prediction model using the common vulnerability scoring system (CVSS).
Nowadays, The Blockchain is not only used in cryptocurrency but also utilized in other fields and different applications such as in the medical sector, agriculture sector, etc. [57,58,59]. This article concentrated on the application of blockchain technology to food safety. For tracking and monitoring the food items and stages of production, such as cultivation/breeding, raw resources, processing, transporting, warehousing, and selling, the author developed a system [60]. In addition, the system employs a variety of sensor-based equipment to adopt sustainable recording and confirmation with sensor-based verification. Ref. [61] Proposed a blockchain-based easy and simple security framework for smart Greenfield farming. Each IoT node can nominate the cluster member’s leader, which helps to avoid a hot spot problem if an intruder focuses on the leader node. Furthermore, the authors discussed the security risks of their suggested scheme, which adhered to the traditional confidentiality, integrity, and availability principles. Ref. [62] proposed a cost-effective IoT-based security monitoring system. The physical layer is the primary concern of this system of precision agriculture, where data are collected from sensors. These data are sent to a controller, which analyses it to take action, such as activating the actuators for water sprinklers on farms. Table 5 describes some of the recent research which has already been performed on security issues related to smart farming.
Gupta, M et al. explained [102] the necessity of clouds applied in vehicles in this time- and location-sensitive context and present an extended access control oriented (E-ACO) architecture that is pertinent to IoV. Here, they describe using scenarios to highlight access control needs in our vision of cloud-assisted connected automobiles and vehicular IoT, as well as approaches to various access control models that may be applied at different tiers of the E-ACO architecture and in the authorization framework.
Gupta, M et al. [103], in their work, describe an edge infrastructure-based solution to V2V and V2I communication that is safe and trustworthy in place of direct peer-to-peer connection. To approve, check, and verify the authenticity, integrity, and anonymity of communications sent in the system, they add trusted cloudlets in this section. Along with a proof of concept implementation of the suggested approach on the AWS IoT platform, they also describe a formal attribute-based model for V2V and V2I communication, known as AB-ITS. This cloudlet-supported architecture supports crucial use cases such as an accident or ice-threat warning and other safety applications. It supplements direct V2V or V2I communication.
Sontowski, S. et al. [104] presented a DoS attack that can impair a smart farm’s operation by interfering with the functioning of installed on-field sensors. They specifically covered a Wi-Fi de-authentication attack that makes use of flaws in IEEE 802.11, where the management packets are not encrypted. A development board for the ESP8266 maker focus When a Raspberry Pi is attached, WiFi Deauther Monster is used to disconnect it from the network and stop sensor data from being transferred to a distant cloud.
The notion of Activity-Centric Access Control (ACAC) for smart and connected ecosystems was first proposed by Gupta, M. et al. in [105] and discussed in this article as a first step. Here, they examined the idea of activity with regard to cooperative and dispersed yet interconnected systems, identifying the many parties involved as well as the crucial elements to consider when making an activity control choice. They provide an initial framework for developing activity control expressions that may be used by various smart objects in the system.
The biggest obstacle to the growth of cloud computing is security worries. Information security continues to have an impact on the market even though it raises inconveniences related to information security. The threat of security breaches in the cloud infrastructure must be understood by clients. Cloud-computing capacity, networking, and computing powers are brought to the edge by fog computing. One of the most critical challenges with fog computing platforms is safety and security. Lightweight devices have benefited greatly from edge computing’s ability to complete difficult tasks quickly, but the technology’s hasty development has led to a general disregard for safety risks in edge computing stages and the applications they allow.
In our proposed framework we have focused on the threats in fog computing-based IoT environment via blockchain for the application in agriculture 4.0.
Table 5. Related Research performed on Security issues in Agriculture 4.0.
Table 5. Related Research performed on Security issues in Agriculture 4.0.
ReferencesYearsScenarioTechnology & Security
[73,75,92](2022–2023)Smart equipment, Smart irrigationAutomation, IoT
Theft detection by motion detector
[84,97](2019, 2021)Efficient and secure cluster routing for IoT-based smart agriculture applicationsWSNs, data encryption
A strong communication channel and symmetrical data security for security between farming devices
[35,95](2021, 2023)Supply Chain Tracking, Aerial Crop Management, Livestock Safeness, and Maturity Tracking, and IrrigationSmart agriculture IoT
Cyber security in smart agriculture
[76,87,93](2019–2021)Security and privacy in green-IoT-based agricultureBlockchain, IoT
Privacy-oriented blockchain-based solutions
[106](2021)Ecosystem for smart agricultureIoT
Authenticating IoT sensor device and sending encrypted data
[79,100](2021, 2023)]Intelligent and secure smart irrigation systemIoT, blockchain
Decentralized storage of irrigation and plants database by implementing the concept of blockchain
[48,96](2018, 2020)Precision agriculture threat prediction model based on Common Vulnerability Scoring SystemParameters detection, IoT system
A prediction model framework for cyber-attacks in precision agriculture
[68,94](2021, 2020)Precision agriculture-based multilayered security and privacy architectureIoT, AI
A holistic study on security and privacy in a smart agriculture ecosystem
[59,91](2021, 2019)Swarm robotic systems for precision farmingBlockchain
Public key cryptography by blockchain
[63,98](2023, 2022)An overview of the security requirements, problems, thread model, stack challenges, and attack taxonomy for smart agricultureIoT
Livestock management, precision farming, greenhouse monitoring
[104](2020)DoS attack in a smart farm’s operation by interfering with the functioning of installed on-field sensors.IoT,
on-field sensors and autonomous vehicles
Proposed FrameworkProposedAgriculture 4.0-based multilayered security and privacy architecture.
DDos Attack against blockchain Network
IoT,
Fog Computing, Blockchain,
DDoS mitigation programme on the SDN controller.

6. Proposed Security Framework

The proposed security framework for agriculture 4.0 is described in this section. The block diagram of the proposed security framework is illustrated in Figure 5.

6.1. Sensor Layer in Agriculture 4.0

This layer’s major function is to acquire meaningful information from the external environment via sensors to take required action against it. This sensor layer has a variety of Sensor nodes of various forms and sizes. As a result, they all use the same basic components, such as input and output components, information handling units, communication segments, and many more units for the management of power sections. To analyze and store all detected data, it is sent to the relevant fog nodes. Furthermore, Sensor nodes receive instructions to undertake agricultural operations.

6.2. Fog Computing Layer

This layer is made up of multiple fog nodes, which are insubstantial equipment that carry out processing, communication, and storing tools to do operations that an end device cannot perform. Not every piece of data that is gathered becomes processed on the cloud. Rather, this layer hosts all authentic analysis and latency-sensitive applications.
Virtualization: Recognizing that configuring several devices, in the same manner, might be time-consuming, the nodes can be contained inside a Virtualized environment for a more pleasant setup for all subsequent fog nodes.
Agricultural Sensor data monitoring: This node is going to collect real-time sensing data, analyze it, visualize it, manage devices, and store some of it locally. The user can obtain information from the fog layer while smoothly synchronizing cloud-directed data.
Block-chain Client software: This consists of a piece of programs that is installed on the fog node. Its primary goal is to sync authentic sensitive Sensor data to the Blockchain. It is in charge of producing transactions, batching them, and sending them to the validator so that they can be aggregated into blocks and recorded to the Blockchain.
Simulated Switch: Additionally, this node is used as a transmitting device with the support of virtual switch software, which provides NFV and SDN technologies to enhance network services by establishing the routing features for computational extension and control. Some network virtual functions include security, quality of service (QoS), and automated control. The main objective is to create switching layers for virtual machine environments while continuing to support the OpenFlow protocol [107], which allows this node to interact directly with the SDN Controller; an outstanding demonstration of such implementation is Open vSwitch, an interactive multilayered software switch.

6.3. Distributed Network Using SDN

This network is made up of numerous geologically dispersed and SDN controllers linked to it that operates as a common Networking Operating System (NOS), combining nominally autonomous operations with centralized control [108]. The main component of an SDN network is the SDN controller. This can help with network monitoring by managing all transactions among network and application devices, allowing it to manage and adjust network flows more efficiently in response to new requirements [109]. It maintains a consistent glimpse of the network from afar, delivering data to fog nodes via one APIs and application via other APIs (MQTT, CoAP...) [109]. In addition, the SDN controller employs a Block-chain contractor to properly secure flow tables of SDN in the Block-chain, hence avoiding rule counterfeit.

6.4. Block-Chain Based Network

To keep all the nodes up to date, all Blockchain modules are interconnected and constantly exchange the most updated information in the Blockchain among themselves. Smart contracts will trigger and enforce relevant actions based on the data provided, allowing for verifiable transactions in the Blockchain when such circumstances are met without the requirement for third-party involvement [110,111]. The Ethereum Blockchain platform serves as the foundation for the blockchain network architecture because it provides a highly flexible and modular design that separates the runtime environment as per the application domain, permitting agreements to define the business rules for the application that are not necessary for the core system’s fundamental design.
The Blockchain complete node is made up of the following components:
  • Node for Validation: This is a key component that verifies batches of transactions before combining them into blocks. It also ensures that candidate blocks are added to the Blockchain version for each node.
  • Blockchain Software: it determines which transactions or operations are permitted on the block-chain and contains the following:
    • Database model: it defines relevant operations and the description of the transaction’s payload.
    • Transaction Processor: defines the business logic for different applications, validates batches of transactions, and modifies the blockchain system based on the application’s rules.
    • Client: it specifies the service client functionality, which the client develops and delivers to the validator. The client also shows blockchain information.
    • REST API: This protocol is used to communicate within the clients and the transactions processing system.
  • Digital Signature: To ensure transaction integrity, the data used in the transactions is hashed using SHA-256 and then encrypted using the sender’s secret key to produce a signature. The processor then validates the transaction by verifying this signature.

7. Case Studies and Experimental Results

To test the security framework, we allowed DDoS attacks against the Blockchain Network. A distributed denial-of-service (DDoS) attack targets websites and servers by disrupting network services. A DDoS attack attempts to exhaust an application’s resources.
We provide an experimental setup configuration shown in Table 6, as well as the simulation architecture is shown in Figure 6.
Host Machine (HM): Here we have installed an open-source based IoT framework called ThingsBoard, which make it possible to construct fog layers while seamlessly syncing with the cloud, on the host system and constructed a scenario of a smart farm with two silos, each with a different number of IoT devices. Every second, each gadget reports a pseudo-random value. We utilized a code to simulate a Blockchain client, which accepts the provided values and generates transactions. Mininet network emulation tool is then used to commit the transaction onto the Blockchain via the Open vSwitch module. We also connected the ONOS SDN controller and sFlow4 collector to the Mininet virtual network.
Virtual Machine (VM): We have installed the Ethereum Blockchain network and its Supply Chain AssetTrack application in the Virtual Machine. To keep records of their updated information, we formed a user for the host system (fog node) and various assets. Every reported value will be used by the blockchain client to update the specified asset in the Ethereum blockchain.
To put our framework architecture to the test, we conducted three case studies.
Case 1: We examined the platform’s usual workflow, which means we did not conduct any attacks on the Ethereum blockchain.
Case 2: Using the Hping programme on the host PC, we launched a DDoS assault on the Blockchain network. We implemented a DDoS mitigation programme on the SDN controller.
Case 3: We launched a DDoS attack against the Blockchain network, by turning off the DDoS mitigation programme in the SDN controller.
During the simulation, we noticed two crucial metrics in each case:
  • The number of network packets received by the Blockchain per minute.
  • The number of transactions published in the Blockchain network.
The results are shown in Figure 7 and Figure 8, respectively. Taking the case 1 findings as ideal, with 120 published transactions in 10 min at an average of 100 Kbps; the third scenario revealed a really dismal performance with about 45 published transactions, representing a loss of more than 60% compared to the 1st case, and an unreliable Blockchain network. To understand the outcomes of the second scenario, we must first recognize what took place in the network during the test. The Open vSwitch sends all network traffic data to the sFlow forecast system, a real-time reporting system that gives real-time notice of network assaults, involving attackers and target information, to the SDN controller security framework via commands. The SDN controller interacts with the switch to discard DDoS traffic while allowing valid traffic to continue through. The attack is stopped fast enough to prevent it from rapidly growing and resulting in 95 blocks published, which is approximately 40% more than the 3rd case.

8. Smart Agriculture 5.0

With 100 times faster upload and download speeds than “fourth generation of mobile technology (4G)” and “fourth-generation long-term evolution (4GLTE)” technologies and latencies as low as 1 ms, the “5th generation mobile network (5G)” is a new technology for wireless that can connect a million gadgets per square kilometer. In order to exchange data effectively, the millions of smart gadgets that make up the precision agricultural networks must be connected to one another over a given piece of land.
Therefore, the Agriculture 4.0 scenario is particularly well adapted to 5G technology [112,113,114]. A framework for the digitization of agriculture networks and function modules for an intelligent irrigation system was provided by Meng and Cheng [115]. Tao and Donglin [116] also investigated how 5G technology may be used for agricultural planting, livestock farming, and traditional farming growth [117,118,119,120,121].

9. Conclusions

Modernization of agricultural methods is required to increase productivity levels while conserving nature. Precision agriculture could improve farming works by controlling actuators more efficiently, enhancing the use of resources, increasing revenues, and minimizing expenses. In order to accomplish this objective, IoT technologies have to incorporate more computing performance, such as edge computing, big data handling, automated resources, and safety features. As limited devices sense a huge amount of data and forward it to the gateway or the cloud, security requires special attention. The data must be secured throughout the agricultural system, from diagnosis to risks and inventory.
Even though numerous security issues may affect farming production, they still include a few security measures. This could be because these technologies were in their initial phases of development. For most of the points, only computing resources are incorporated, and that has limited computation power. As a result, security mechanisms are very rare in the current list of requirement specifications. Reaching a higher level of agricultural development, on the other hand, necessitates technologies with security features that provide enough quality and validity to incorporate these technologies on a high level. As precision agriculture introduces new complexities, it also opens up new future directions in security and other areas.
In this study, we suggested a security framework for the agricultural internet of things that integrates blockchain technology, fog computing, and software-defined networking. The suggested architecture avoids the requirement for simulation-based work with both private and public blockchain for communication between SDN controllers and IoT devices. Here, for IoT connectivity, each SDN controller is linked to a blockchain. SDN controllers are interconnected by a network’s topology. One of the key objectives of the proposed architecture is to enhance communication security for IoT devices. For IoT devices with limited resources, distributed trust-based verification makes blockchain even more useful. With a focus on fixing security and data reliability issues in a distributed controller context. Additionally, we want to increase the accuracy of our system using machine learning methods.
It might be significant to add an intrusion detection system utilizing various deep learning algorithms in future work to prevent the insertion of fake Sensor data in the intelligent agricultural field.

Author Contributions

Conceptualization, S.P., S.D. and S.R.; methodology, S.P., M.A. (Majed Alowaidi), S.D. and P.P.M.; software, S.P., S.R., M.A. (Majed Alowaidi), P.P.M. and H.A.; validation, M.A. (Mohamed Alshehri), S.R. and H.A.; formal analysis, S.P., S.D., M.A. (Mohamed Alshehri) and P.P.M.; writing—original draft preparation, S.P., S.D. and P.P.M.; writing—review and editing, M.A. (Mohamed Alshehri), S.R. and H.A. All authors have read and agreed to the published version of the manuscript.

Funding

The author would like to thank Deanship of Scientific Research at Majmaah University for supporting this work under Project Number No. R-2023-67.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Research data are not shared.

Conflicts of Interest

The authors declare that they have no conflict of interest.

References

  1. Vangala, A.; Sutrala, A.K.; Das, A.K.; Jo, M. Smart Contract-Based Blockchain-Envisioned Authentication Scheme for Smart Farming. IEEE Internet Things J. 2021, 8, 10792–10806. [Google Scholar] [CrossRef]
  2. Abbasi, R.; Martinez, P.; Ahmad, R. The digitization of agricultural industry–a systematic literature review on agriculture 4.0. Smart Agric. Technol. 2022, 2, 100042. [Google Scholar] [CrossRef]
  3. Akinwumi, S.A.; Ezenwosu, A.C.; Omotosho, T.V.; Adewoyin, O.O.; Adagunodo, T.A.; Oyeyemi, K.D. Arduino Based Security System using Passive Infrared (PIR) Motion Sensor. In IOP Conference Series: Earth and Environmental Science; IOP Publishing: Bristol, UK, 2021; Volume 655, p. 012039. [Google Scholar]
  4. Albiero, D.; Paulo, R.L.D.; Félix Junior, J.C.; Santos, J.D.S.G.; Melo, R.P. Agriculture 4.0: A terminological introduction. Rev. Ciência Agronômica 2021, 51, e20207737. [Google Scholar] [CrossRef]
  5. Altalak, M.; Ammad uddin, M.; Alajmi, A.; Rizg, A. Smart Agriculture Applications Using Deep Learning Technologies: A Survey. Appl. Sci. 2022, 12, 5919. [Google Scholar] [CrossRef]
  6. Andrade, R.; Ontaneda, N.; Silva, A.; TelloOquendo, L.; Cadena, S.; Quiroz, D.; Fuertes, W.; Nacional, E. Application of Big Data Analytic in Cybersecurity. In Proceedings of the 2019 International Conference on Applied Cognitive Computing, Las Vegas, NV, USA, 29 July–1 August 2020. [Google Scholar] [CrossRef]
  7. Catalano, C.; Paiano, L.; Calabrese, F.; Cataldo, M.; Mancarella, L.; Tommasi, F. Anomaly detection in smart agriculture systems. Comput. Ind. 2022, 143, 103750. [Google Scholar] [CrossRef]
  8. Dash, S.; Panda, R.; Padhy, S. Blockchain-based intelligent medical IoT healthcare system. SPAST Abstr. 2021, 1, 2190. Available online: https://spast.org/techrep/article/view/2190 (accessed on 22 April 2022).
  9. Ferrag, M.A.; Shu, L.; Djallel, H.; Choo, K.K.R. Deep learning-based intrusion detection for distributed denial of service attack in Agriculture 4.0. Electronics 2021, 10, 1257. [Google Scholar] [CrossRef]
  10. Boghossian, A.; Linsky, S.; Brown, A.; Mutschler, P.; Ulicny, B.; Barrett, L. Threats to Precision Agriculture; Technical Report; US Department of Homeland Security: Washington, DC, USA, 2018; p. 20181003a. [Google Scholar] [CrossRef]
  11. Shu, L.; Hancke, G.P.; Abu-Mahfouz, A.M. Guest Editorial: Sustainable and Intelligent Precision Agriculture. IEEE Trans. Ind. Inform. 2021, 17, 4318–4321. [Google Scholar] [CrossRef]
  12. Javaid, M.; Haleem, A.; Singh, R.P.; Suman, R. Enhancing smart farming through the applications of Agriculture 4.0 technologies. Int. J. Intell. Netw. 2022, 3, 150–164. [Google Scholar] [CrossRef]
  13. Gzar, D.A.; Mahmood, A.M.; Al-Adilee, M.K.A. Recent trends of smart agricultural systems based on Internet of Things technology: A survey. Comput. Electr. Eng. 2022, 104, 108453. [Google Scholar] [CrossRef]
  14. Charatsari, C.; Lioutas, E.D.; Papadaki-Klavdianou, A.; Michailidis, A.; Partalidou, M. Farm advisors amid the transition to Agriculture 4.0: Professional identity, conceptions of the future and future-specific competencies. Sociol. Rural. 2022, 62, 335–362. [Google Scholar] [CrossRef]
  15. Singh, K.J.; De, T. Mathematical modelling of DDoS attack and detection using correlation. J. Cyber Secur. Technol. 2017, 1, 175–186. [Google Scholar] [CrossRef]
  16. Raj, M.; Gupta, S.; Chamola, V.; Elhence, A.; Garg, T.; Atiquzzaman, M.; Niyato, D. A survey on the role of Internet of Things for adopting and promoting Agriculture 4.0. J. Netw. Comput. Appl. 2021, 187, 103107. [Google Scholar] [CrossRef]
  17. Benavides, E.; Fuertes, W.; Sanchez, S.; Sanchez, M. Classification of phishing attack solutions by employing deep learning techniques: A systematic literature review. Dev. Adv. Def. Secur. 2020, 152, 51–64. [Google Scholar] [CrossRef]
  18. Singh, R.K.; Berkvens, R.; Weyn, M. AgriFusion: An Architecture for IoT and Emerging Technologies Based on a Precision Agriculture Survey. IEEE Access 2021, 9, 136253–136283. [Google Scholar] [CrossRef]
  19. Bernhardt, H.; Bozkurt, M.; Brunsch, R.; Colangelo, E.; Herrmann, A.; Horstmann, J.; Kraft, M.; Marquering, J.; Steckel, T.; Tapken, H.; et al. Challenges for Agriculture through Industry 4.0. Agronomy 2021, 11, 1935. [Google Scholar] [CrossRef]
  20. Bolfe, E.L.; Jorge, L.A.C.; Sanches, I.D.; Júnior, A.L.; Costa, C.C.D.; Victoria, D.C.; Inamasu, R.Y.; Grego, C.R.; Ferreira, V.R.; Ramirez, A.R. Precision and digital agriculture: Adoption of technologies and perception of Brazilian farmers. Agriculture 2021, 10, 653. [Google Scholar] [CrossRef]
  21. Chae, C.-J.; Cho, H.-J. Enhanced secure device authentication algorithm in P2P-based smart farm system. Peer-Peer Netw. Appl. 2018, 11, 1230–1239. [Google Scholar] [CrossRef]
  22. Khalid, H.; Ikram, U.D.; Ahmad, A.; Naveed, I. An energy efficient and secure IoT-based wsn framework: An application to smart agriculture. Sensors 2020, 20, 2081. [Google Scholar] [CrossRef]
  23. Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 2019, 7, 82721–82743. [Google Scholar] [CrossRef]
  24. Infosys Precision Crop Management Testbed. 2021. Available online: https://www.infosys.com/industries/agriculture/industry-offerings/precision-farming.html (accessed on 17 May 2022).
  25. West, J. A prediction model framework for cyber-attacks to precision agriculture technologies. J. Agric. Food Inf. 2018, 19, 307–330. [Google Scholar] [CrossRef]
  26. Jha, S.; Routray, S.; Ahmad, S. An expert system-based IoT system for minimisation of air pollution in developing countries. Int. J. Comput. Appl. Technol. 2022, 68, 277–285. [Google Scholar] [CrossRef]
  27. Rao, R.N.; Sridhar, B. IoT Based Smart Crop-Field Monitoring and Automation Irrigation System. In Proceedings of the 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, 19–20 January 2018; IEEE: Toulouse, France, 2018; pp. 478–483. [Google Scholar] [CrossRef]
  28. Li, T.; Li, D. Prospects for the application of 5g technology in agriculture and rural areas. In Proceedings of the 2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), Harbin, China, 25–27 December 2020; pp. 2176–2179. [Google Scholar] [CrossRef]
  29. Muragijimana, E.; Shankar, T.N.; Kumar, N.; Sah, B.; Padhy, S. Digital Crimes in Cloud Environment and the Analysis via Blockchain. In Proceedings of the 2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT), Bangalore, India, 7–9 October 2022; pp. 1–6. [Google Scholar] [CrossRef]
  30. Lioutas, E.D.; Charatsari, C. Innovating digitally: The new texture of practices in agriculture 4.0. Sociol. Rural. 2022, 62, 250–278. [Google Scholar] [CrossRef]
  31. Lorencowicz, E.; Uziak, J. Selected Problems on Data Used in Precision Agriculture. In International Symposium on Farm Machinery and Processes Management in Sustainable Agriculture; Springer: Cham, Switzerland, 2023; pp. 217–226. [Google Scholar]
  32. Ferrag, M.A.; Shu, L.; Yang, X.; Derhab, A.; Maglaras, L. Security and privacy for green IoT-based agriculture: Review, blockchain solutions, and challenges. IEEE Access 2020, 8, 32031–32053. [Google Scholar] [CrossRef]
  33. Gupta, M.; Abdelsalam, M.; Khorsandroo, S.; Mittal, S. Security and Privacy in Smart Farming: Challenges and Opportunities. IEEE Access 2020, 8, 34564–34584. [Google Scholar] [CrossRef]
  34. Shankar, T.N.; Padhy, S.; Ch, S.M.; Ravella, H.; Varun, M.; Kumar, N. Development of 6G web by Multilayer Perceptron in C-RAN for VANETs. In Proceedings of the IEEE Global Conference on Computing, Power and Communication Technologies, GlobConPT, New Delhi, India, 23–25 September 2022. [Google Scholar] [CrossRef]
  35. Ganeshkumar, C.; David, A. Digital Information Management in Agriculture—Empirical Analysis. In Proceedings of the Third International Conference on Information Management and Machine Intelligence, Rajasthan, India, 23–24 December 2021; Springer: Singapore, 2023; pp. 243–249. [Google Scholar]
  36. García, L.; Parra, L.; Jimenez, J.M.; Lloret, J.; Lorenz, P. IoT-based smart irrigation systems: An overview on the recent trends on sensors and IoT systems for irrigation in precision agriculture. Sensors 2020, 20, 1042. [Google Scholar] [CrossRef] [PubMed]
  37. Srivastava, J.; Routray, S.; Ahmad, S.; Waris, M.M. Internet of Medical Things (IoMT)-based smart healthcare system: Trends and progress. Comput. Intell. Neurosci. 2022. [Google Scholar] [CrossRef]
  38. Srivastava, J.; Routray, S. AI Enabled Internet of Medical Things Framework for Smart Healthcare. In Proceedings of the Innovations in Intelligent Computing and Communication: First International Conference, ICIICC 2022, Bhubaneswar, Odisha, India, 16–17 December 2022; Springer International Publishing: Cham, Switzerland, 2023; pp. 30–46. [Google Scholar]
  39. Rajasoundaran, S.; Prabu, A.V.; Routray, S.; Kumar, S.S.; Malla, P.P.; Maloji, S.; Mukherjee, A.; Ghosh, U. Machine learning based deep job exploration and secure transactions in virtual private cloud systems. Comput. Secur. 2021, 109, 102379. [Google Scholar] [CrossRef]
  40. Dash, S.; Padhy, S.; Azad, S.M.A.K.; Nayak, M. Intelligent IoT-Based Healthcare System Using Blockchain. Ambient Intelligence in Health Care. Smart Innovation, Systems and Technologies; Springer: Singapore, 2023; Volume 317. [Google Scholar] [CrossRef]
  41. Maffezzoli, F.; Ardolino, M.; Bacchetti, A.; Perona, M.; Renga, F. Agriculture 4.0: A systematic literature review on the paradigm, technologies and benefits. Futures 2022, 142, 102998. [Google Scholar] [CrossRef]
  42. Mahadik, S.; Pawar, P.M.; Muthalagu, R. Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT). J. Netw. Syst. Manag. 2022, 31, 2. [Google Scholar] [CrossRef]
  43. Mahalakshmi, M.; Priyanka, S.; Rajaram, S.P.; Rajapriya, R. Distant Monitoring and Controlling of Solar Driven Irrigation System through IoT. In Proceedings of the 2018 National Power Engineering Conference (NPEC), Madurai, India, 9–10 March 2018; IEEE: Toulouse, France, 2018; pp. 1–5. [Google Scholar] [CrossRef]
  44. Manesh, M.R.; Kenney, J.; Hu, W.C.; Devabhaktuni, V.K.; Kaabouch, N. Detection of GPS spoofing attacks on unmanned aerial systems. In Proceedings of the 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 11–14 January 2019; IEEE: Toulouse, France, 2019; pp. 1–6. [Google Scholar] [CrossRef]
  45. Manjunath, M.; Venkatesha, G.; Dinesh, S. Raspberry Pi Based Anti-Theft Security System using Home Automation for Multi-Level Authentication. Perspect. Commun. Embed.-Syst. Signal-Process.-PiCES 2021, 4, 249–253. [Google Scholar]
  46. Routray, S.; Ray, A.K.; Mishra, C.; Palai, G. Efficient hybrid image denoising scheme based on SVM classification. Optik 2018, 157, 503–511. [Google Scholar] [CrossRef]
  47. McCaig, M.; Rezania, D.; Dara, R. Framing the response to IoT in agriculture: A discourse analysis. Agric. Syst. 2023, 204, 103557. [Google Scholar] [CrossRef]
  48. Qureshi, T.; Saeed, M.; Ahsan, K.; Malik, A.A.; Muhammad, E.S.; Touheed, N. Smart Agriculture for Sustainable Food Security Using Internet of Things (IoT). Wirel. Commun. Mob. Comput. 2022, 2022, 9608394. [Google Scholar] [CrossRef]
  49. Rajasoundaran, S.; Prabu, A.; Routray, S.; Malla, P.P.; Kumar, G.S.; Mukherjee, A.; Qi, Y. Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks. Comput. Commun. 2022, 187, 71–82. [Google Scholar] [CrossRef]
  50. Roy, S.K.; De, D. Genetic Algorithm based Internet of Precision Agricultural Things (IopaT) for Agriculture 4.0. Internet Things 2022, 18, 100201. [Google Scholar] [CrossRef]
  51. Martinho, V.J.P.D.; Cunha, C.A.D.S.; Pato, M.L.; Costa, P.J.L.; Sánchez-Carreira, M.C.; Georgantzís, N.; Rodrigues, R.N.; Coronado, F. Machine Learning and Food Security: Insights for Agricultural Spatial Planning in the Context of Agriculture 4.0. Appl. Sci. 2022, 12, 11828. [Google Scholar] [CrossRef]
  52. Mourato, J.; Ferreira, L.P.; Sá, J.C.; Silva, F.J.; Dieguez, T.; Tjahjono, B. Improving internal logistics of a bus manufacturing using the lean techniques. Int. J. Prod. Perform. Manag. 2020, 70, 1930–1951. [Google Scholar] [CrossRef]
  53. Guarda, T.; Augusto, M.F.; Lopes, I. The Art of Phishing. In Proceedings of the International Conference on Information Technology & Systems, Cairo, Egypt, 24–26 March 2019; Springer: Cham, Switzerland, 2019; pp. 683–690. [Google Scholar] [CrossRef]
  54. Colezea, M.; Musat, G.; Pop, F.; Negru, C.; Dumitrascu, A.; Mocanu, M. CLUeFARM: Integrated web-service platform for smart farms. Comput. Electron. Agric. 2018, 154, 134–154. [Google Scholar] [CrossRef]
  55. Sarma, R.; Barbhuiya, F.A. Internet of Things: Attacks and Defences. In Proceedings of the 2019 7th International Conference on Smart Computing & Communications (ICSCC), Sarawak, Malaysia, 28–30 June 2019; IEEE: Toulouse, France, 2019; pp. 1–5. [Google Scholar] [CrossRef]
  56. De Souza, T.T.A.; de Oliveira, C.C.; Abe, J.M.; Aharari, A.; Nakamatsu, K. Paraconsistent Artificial Neural Network Applied to Agribusiness. Smart Innov. Syst. Technol. 2021, 183, 19–28. [Google Scholar] [CrossRef]
  57. Demestichas, K.; Peppes, N.; Alexakis, T. Survey on security threats in agricultural IoT and smart farming. Sensors 2020, 20, 6458. [Google Scholar] [CrossRef] [PubMed]
  58. Kumar, L.S.; Ahmad, S.; Routray, S.; Prabu, A.V.; Alharbi, A.; Alouffi, B.; Rajasoundaran, S. Modern Energy Optimization Approach for Efficient Data Communication in IoT-Based Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2022, 2022, 7901587. [Google Scholar] [CrossRef]
  59. Scuderi, A.; Foti, V.T.; Timpanaro, G. The supply chain value of pod and pgi food products through the application of blockchain. Qual. Access Success 2019, 20, 580–587. [Google Scholar]
  60. Dey, D.; Sizan, N.S.; Mia, M. GreenFarm: An IoT-Based Sustainable Agriculture with Automated Lighting System. In Proceedings of the International Conference on Innovative Computing and Communications, Delhi, India, 17–18 February 2023; Springer: Singapore, 2023; pp. 517–528. [Google Scholar]
  61. Di Modica, G.; Gulino, S.; Tomarchio, O. IoT fault management in cloud/fog environments. In Proceedings of the 9th International Conference on the Internet of Things, Bilbao, Spain, 18 September 2019; pp. 1–4. [Google Scholar] [CrossRef]
  62. Dibirov, A. Approaches to Modeling the Machine and Tractor Fleet of an Agricultural Organization in the Conditions of Digitalization. In Agriculture Digitalization and Organic Production; Springer: Singapore, 2023; pp. 339–350. [Google Scholar]
  63. Food and Agriculture Organization of the United Nations—FAO. Strengthened Global Partnerships Are Needed to End Hunger and Malnutrition. 2019. Available online: http://www.fao.org/news/story/en/item/1194310/icode/ (accessed on 20 August 2022).
  64. Food and Agriculture Organization. The State of Agricultural Commodity Markets 2020. In Agricultural Markets and Sustainable Development: Global Value Chains, Smallholder Farmers and Digital Innovations; Food and Agriculture Organization: Rome, Italy, 2020. [Google Scholar]
  65. Paul, K.; Chatterjee, S.S.; Pai, P.; Varshney, A.; Juikar, S.; Prasad, V.; Bhadra, B.; Dasgupta, S. Viable smart sensors and their application in data driven agriculture. Comput. Electron. Agric. 2022, 198, 107096. [Google Scholar] [CrossRef]
  66. Klerkx, L.; Begemann, S. Supporting food systems transformation: The what, why, who, where and how of mission-oriented agricultural innovation systems. Agric. Syst. 2021, 184, 102901. [Google Scholar] [CrossRef]
  67. Krishnan, K.S.; Jerusha, K.; Tanwar, P.; Singhal, S. Self-automated agriculture system using IoT. Int. J. Recent Technol. Eng. 2020, 8, 758–762. [Google Scholar] [CrossRef]
  68. Kumar, N.; Sharma, B.; Narang, S. Emerging Communication Technologies for Industrial Internet of Things: Industry 5.0 Perspective. In Proceedings of the Third International Conference on Computing, Communications, and Cyber-Security, Ghaziabad, India, 30–31 October 2023; Springer: Singapore, 2022; pp. 107–122. [Google Scholar]
  69. Maini, E.; De Rosa, M.; Vecchio, Y. The Role of Education in the Transition towards Sustainable Agriculture: A Family Farm Learning Perspective. Sustainability 2021, 13, 8099. [Google Scholar] [CrossRef]
  70. Majumdar, P.; Mitra, S.; Bhattacharya, D. IoT for Promoting Agriculture 4.0: A Review from the Perspective of Weather Monitoring, Yield Prediction, Security of WSN Protocols, and Hardware Cost Analysis. J. Biosyst. Eng. 2021, 46, 440–461. [Google Scholar] [CrossRef]
  71. Meng, H.; Cheng, Y. Research on key technologies of intelligent agriculture under 5G environment. J. Physics Conf. Ser. 2019, 1345, 042057. [Google Scholar] [CrossRef]
  72. Mentsiev, A.U.; Magomaev, T.R. Security threats of NB-IoT and countermeasures. IOP Conf. Ser. Mater. Sci. Eng. 2020, 862, 052033. [Google Scholar] [CrossRef]
  73. Mahbub, M. A smart farming concept based on smart embedded electronics, internet of things and wireless sensor network. Internet Things 2020, 9, 100161. [Google Scholar] [CrossRef]
  74. Mode, G.R.; Calyam, P.; Hoque, K.A. False data injection attacks in internet of things and deep learning enabled predictive analytics. arXiv 2019, arXiv:1910.01716. [Google Scholar]
  75. Padhy, S.; Dash, S.; Routray, S.; Ahmad, S.; Nazeer, J.; Alam, A. IoT-Based Hybrid Ensemble Machine Learning Model for Efficient Diabetes Mellitus Prediction. Comput. Intell. Neurosci. 2022, 2022, 2389636. [Google Scholar] [CrossRef] [PubMed]
  76. Pogorelskaia, I.; Várallyai, L. Agriculture 4.0 and the role of education. J. Agric. Inf. 2020, 11, 45–51. [Google Scholar] [CrossRef]
  77. Anand, S.; Sharma, A. AgroKy: An approach for enhancing security services in precision agriculture. Meas. Sens. 2022, 24, 100449. [Google Scholar] [CrossRef]
  78. Santos, L.; Rabadao, C.; Goncalves, R. Intrusion detection systems in Internet of Things: A literature review. In Proceedings of the 13th Iberian Conference on Information Systems and Technologies (CISTI), Caceres, Spain, 13–16 June 2018; IEEE: Toulouse, France, 2018; pp. 1–7. [Google Scholar] [CrossRef]
  79. Shankar, T.N.; Padhy, S.; Dash, S.; Teja, M.B.; Yashwant, S. Induction of Secure Data Repository in Blockchain over IPFS. In Proceedings of the 2022 6th International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 28–30 April 2022; IEEE: Toulouse, France, 2022; pp. 738–743. [Google Scholar] [CrossRef]
  80. Shurman, M.M.; Khrais, R.M.; Yateem, A.A. IoT Denial-of-Service Attack Detection and Prevention Using Hybrid IDS. In Proceedings of the 2019 International Arab Conference on Information Technology (ACIT), Al Ain, United Arab Emirates, 3–5 December 2019; IEEE: Toulouse, France, 2019; pp. 252–254. [Google Scholar] [CrossRef]
  81. Tamala, J.K.; Maramag, E.I.; Simeon, K.A.; Ignacio, J.J. A bibliometric analysis of sustainable oil and gas production research using VOSviewer. Clean. Eng. Technol. 2022, 7, 100437. [Google Scholar] [CrossRef]
  82. Tang, Y.; Dananjayan, S.; Hou, C.; Guo, Q.; Luo, S.; He, Y. A survey on the 5G network and its impact on agriculture: Challenges and opportunities. Comput. Electron. Agric. 2020, 180, 105895. [Google Scholar] [CrossRef]
  83. Tanwar, R.; Chhabra, Y.; Rattan, P.; Rani, S. Blockchain in IoT Networks for Precision Agriculture. In International Conference on Innovative Computing and Communications; Springer: Singapore, 2023; pp. 137–147. [Google Scholar]
  84. Mukherjee, S.; Baral, M.M.; Chittipaka, V.; Srivastava, S.C.; Pal, S.K. Discussing the impact of industry 4.0 in agriculture supply chain. In Recent Advances in Smart Manufacturing and Materials; Springer: Singapore, 2021; pp. 301–307. [Google Scholar]
  85. O’Grady, M.; Langton, D.; Salinari, F.; Daly, P.; O’Hare, G. Service Design for Climate-Smart Agriculture. Inf. Process. Agric. 2021, 8, 328–340. [Google Scholar] [CrossRef]
  86. Oliver, S.T.; González-Pérez, A.; Guijarro, J.H. An IoT proposal for monitoring vineyards called SEnviro for agriculture. In Proceedings of the 8th International Conference on the Internet of Things, Santa Barbara, CA, USA, 15–18 October 2018; pp. 1–4. [Google Scholar] [CrossRef]
  87. Padhy, S.; Dash, S.; Malla, P.P.; Routray, S.; Qi, Y. An Energy Efficient Node Localization Algorithm for Wireless Sensor Network. In Proceedings of the 2021 IEEE 2nd International Conference on Applied Electromagnetics, Signal Processing, & Communication (AESPC), Bhubaneswar, India, 26–28 November 2021; IEEE: Toulouse, France, 2021; pp. 1–5. [Google Scholar] [CrossRef]
  88. Singh, G.; Yogi, K.K. Internet of Things-Based Devices/Robots in Agriculture 4.0. In Sustainable Communication Networks and Application; Springer: Singapore, 2022; pp. 87–102. [Google Scholar]
  89. Smart Farming with IoT and Cloud in Malaysia. 2021. Available online: https://techwireasia.com/2021/08/smart-farming-with-iot-and-cloud-inmalaysia/ (accessed on 11 July 2022).
  90. Sobb, T.; Turnbull, B.; Moustafa, N. Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions. Electronics 2020, 9, 1864. [Google Scholar] [CrossRef]
  91. Soukup, V. Industry 4.0: From Smart Factories to Artificial Intelligence. In Industry 4.0 Challenges in Smart Cities; Springer: Cham, Switzerland, 2023; pp. 95–105. [Google Scholar]
  92. Sturiale, L.; Scuderi, A.; Timpanaro, G.; Matarazzo, B. Sustainable Use and Conservation of the Environmental Resources of the Etna Park (UNESCO Heritage): Evaluation Model Supporting Sustainable Local Development Strategies. Sustainability 2020, 12, 1453. [Google Scholar] [CrossRef]
  93. Malche, T.; Maheshwary, P.; Kumar, R. Environmental Monitoring System for Smart City Based on Secure Internet of Things (IoT) Architecture. Wirel. Pers. Commun. 2019, 107, 2143–2172. [Google Scholar] [CrossRef]
  94. Prabu, A.V.; Kumar, G.S.; Rajasoundaran, S.; Malla, P.P.; Routray, S.; Mukherjee, A. Internet of things-based deeply proficient monitoring and protection system for crop field. Expert Syst. 2022, 39, e12876. [Google Scholar] [CrossRef]
  95. Pranitha, G.; Rukmini, T.; Shankar, T.N.; Sah, B.; Kumar, N.; Padhy, S. Utilization of Blockchain in E-Voting System. In Proceedings of the 2022 2nd International Conference on Intelligent Technologies (CONIT), Kartakata, India, 24–26 June 2022; IEEE: Toulouse, France, 2022; pp. 1–5. [Google Scholar] [CrossRef]
  96. Prasad, S.; Samimalai, A.; Rani, S.R.; Kumar, B.P.P.; Hegde, N.; Banu, S. Information Security and Privacy in Smart Cities, Smart Agriculture, Industry 4.0, Smart Medicine, and Smart Healthcare. In IoT Based Control Networks and Intelligent Systems. Lecture Notes in Networks and SystemsJoby; Joby, P.P., Balas Valentina, E., Palanisamy, R., Eds.; Springer: Singapore, 2022; Volume 528. [Google Scholar] [CrossRef]
  97. Pundir, S.; Wazid, M.; Singh, D.P.; Das, A.K.; Rodrigues, J.J.P.C.; Park, Y. Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment. Sensors 2020, 20, 1300. [Google Scholar] [CrossRef] [PubMed]
  98. Liu, L.; Xu, B.; Zhang, X.; Wu, X. An intrusion detection method for internet of things based on suppressed fuzzy clustering. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 113. [Google Scholar] [CrossRef]
  99. Farooq, M.S.; Riaz, S.; Abid, A.; Abid, K.; Naeem, M.A. A Survey on the Role of IoT in Agriculture for the Implementation of Smart Farming. IEEE Access 2019, 7, 156237–156271. [Google Scholar] [CrossRef]
  100. Munir, M.S.; Bajwa, I.S.; Cheema, S.M. An intelligent and secure smart watering system using fuzzy logic and blockchain. Comput. Electr. Eng. 2019, 77, 109–119. [Google Scholar] [CrossRef]
  101. Dash, S.; Padhy, S.; Parija, B.; Rojashree, T.; Patro, K.A. A Simple and Fast Medical Image Encryption System Using Chaos-Based Shifting Techniques. Int. J. Inf. Secur. Priv. (IJISP) 2022, 16, 1–24. [Google Scholar] [CrossRef]
  102. Gupta, M.; Sandhu, R. Authorization framework for secure cloud assisted connected cars and vehicular internet of things. In Proceedings of the 23rd ACM on Symposium on Access Control Models and Technologies, Indianapolis, IN, USA, 13–15 June 2018; pp. 193–204. [Google Scholar]
  103. Gupta, M.; Benson, J.; Patwa, F.; Sandhu, R. Secure V2V and V2I communication in intelligent transportation using cloudlets. IEEE Trans. Serv. Comput. 2020, 15, 1912–1925. [Google Scholar] [CrossRef]
  104. Sontowski, S.; Gupta, M.; Chukkapalli, S.S.L.; Abdelsalam, M.; Mittal, S.; Joshi, A.; Sandhu, R. Cyber attacks on smart farming infrastructure. In Proceedings of the 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC), Atlanta, GA, USA, 1–3 December 2020; pp. 135–143. [Google Scholar]
  105. Gupta, M.; Sandhu, R. Towards activity-centric access control for smart collaborative ecosystems. In Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, Virtual, Spain, 16–18 June 2021; pp. 155–164. [Google Scholar]
  106. Yang, X.; Shu, L.; Chen, J.; Ferrag, M.A.; Wu, J.; Nurellari, E.; Huang, K. A Survey on Smart Agriculture: Development Modes, Technologies, and Security and Privacy Challenges. IEEE/CAA J. Autom. Sin. 2021, 8, 273–302. [Google Scholar] [CrossRef]
  107. Kreutz, D.; Ramos, F.; Verissimo, P.; Rothenberg, C.; Azodolmolky, S.; Uhlig, S. Software-defined networking: A comprehensive survey. Proc. IEEE 2014, 103, 14–76. [Google Scholar] [CrossRef]
  108. Nunes, B.A.A.; Mendonca, M.; Nguyen, X.-N.; Obraczka, K.; Turletti, T. A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Commun. Surv. Tutor. 2014, 16, 1617–1634. [Google Scholar] [CrossRef]
  109. Ferrag, M.A.; Maglaras, L.; Janicke, H. Blockchain and its role in the internet of things. In Strategic Innovative Marketing and Tourism; Springer: Berlin/Heidelberg, Germany, 2019; pp. 1029–1038. [Google Scholar]
  110. Vasques, A.T.; Gondim, J.J.C. Amplified reflection ddos attacks over iot mirrors: A saturation analysis. In Proceedings of the 2019 Workshop on Communication Networks and Power Systems (WCNPS), Brasília, Brazil, 3–4 October 2019; IEEE: Toulouse, France, 2019; pp. 1–6. [Google Scholar] [CrossRef]
  111. McKeown, N.; Anderson, T.; Balakrishnan, H.; Parulkar, G.; Peterson, L.; Rexford, J.; Shenker, S.; Turner, J. Openflow: Enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 2008, 38, 69–74. [Google Scholar] [CrossRef]
  112. Iqbal, W.; Abbas, H.; Daneshmand, M.; Rauf, B.; Bangash, Y.A. An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security. IEEE Internet Things J. 2020, 7, 10250–10276. [Google Scholar] [CrossRef]
  113. Wei, Y.; Jones, P. Emergent urban agricultural practices and attitudes in the residential area in China. Urban For. Urban Green. 2022, 69, 127491. [Google Scholar] [CrossRef]
  114. Sakthi, U.; DafniRose, J. Blockchain-Enabled Smart Agricultural Knowledge Discovery System using Edge Computing. Procedia Comput. Sci. 2022, 202, 73–82. [Google Scholar] [CrossRef]
  115. Williamson, H.F.; Leonelli, S. Towards Responsible Plant Data Linkage: Data Challenges for Agricultural Research and Development; Springer: Berlin/Heidelberg, Germany, 2023. [Google Scholar]
  116. Ragazou, K.; Garefalakis, A.; Zafeiriou, E.; Passas, I. Agriculture 5.0: A New Strategic Management Mode for a Cut Cost and an Energy Efficient Agriculture Sector. Energies 2022, 15, 3113. [Google Scholar] [CrossRef]
  117. Contreras-Medina, D.I.; Medina-Cuéllar, S.E.; Rodríguez-García, J.M. Roadmapping 5.0 Technologies in Agriculture: A Technological Proposal for Developing the Coffee Plant Centered on Indigenous Producers’ Requirements from Mexico, Via Knowledge Management. Plants 2022, 11, 1502. [Google Scholar] [CrossRef]
  118. Martini, B.; Helfer, G.; Barbosa, J.; Modolo, R.E.; da Silva, M.; de Figueiredo, R.; Mendes, A.; Silva, L.; Leithardt, V. IndoorPlant: A Model for Intelligent Services in Indoor Agriculture Based on Context Histories. Sensors 2021, 21, 1631. [Google Scholar] [CrossRef]
  119. Martins, J.A.; Ochôa, I.S.; Silva, L.A.; Mendes, A.S.; González, G.V.; De Paz Santana, J.; Leithardt, V.R.Q. PRIPRO: A Comparison of Classification Algorithms for Managing Receiving Notifications in Smart Environments. Appl. Sci. 2020, 10, 502. [Google Scholar] [CrossRef]
  120. Okolie, C.C.; Danso-Abbeam, G.; Groupson-Paul, O.; Ogundeji, A.A. Climate-Smart Agriculture Amidst Climate Change to Enhance Agricultural Production: A Bibliometric Analysis. Land 2023, 12, 50. [Google Scholar] [CrossRef]
  121. Selbonne, S.; Guindé, L.; Causeret, F.; Bajazet, T.; Desfontaines, L.; Duval, M.; Sierra, J.; Solvar, F.; Tournebize, R.; Blazy, J.M. Co-Design and Experimentation of a Prototype of Agroecological Micro-Farm Meeting the Objectives Set by Climate-Smart Agriculture. Agriculture 2023, 13, 159. [Google Scholar] [CrossRef]
Figure 1. The uprising of Agriculture 1.0 to agriculture 4.0.
Figure 1. The uprising of Agriculture 1.0 to agriculture 4.0.
Processes 11 00757 g001
Figure 2. Types of Article distribution.
Figure 2. Types of Article distribution.
Processes 11 00757 g002
Figure 3. The total number of Related Research articles studied on Agriculture 4.0 and security challenges in Agriculture 4.0 from 2018 to 2023.
Figure 3. The total number of Related Research articles studied on Agriculture 4.0 and security challenges in Agriculture 4.0 from 2018 to 2023.
Processes 11 00757 g003
Figure 4. Security Risks at the multi-layered paradigm of IoT in agriculture 4.0.
Figure 4. Security Risks at the multi-layered paradigm of IoT in agriculture 4.0.
Processes 11 00757 g004
Figure 5. Proposed Security Framework.
Figure 5. Proposed Security Framework.
Processes 11 00757 g005
Figure 6. Experimental Setup Architecture.
Figure 6. Experimental Setup Architecture.
Processes 11 00757 g006
Figure 7. Number of packets received by Blockchain per minute.
Figure 7. Number of packets received by Blockchain per minute.
Processes 11 00757 g007
Figure 8. Number of transactions published in Blockchain per minute.
Figure 8. Number of transactions published in Blockchain per minute.
Processes 11 00757 g008
Table 1. Use of IoT in agriculture and corresponding studies.
Table 1. Use of IoT in agriculture and corresponding studies.
AreaYearsStudies
Intelligent soil cultivation system(2018–2023)[22,23,24,25,26]
Efficient irrigation mechanisms(2019–2023)[27,28,29,30]
Smart fertilizer systems(2018–2023)[31,32,33]
Intelligent pest detection and treatment systems(2018–2021)[34,35,36]
Intelligent livestock agriculture(2021–2022)[37,38,39,40]
Smart harvesting system(2019–2020)[41,42,43,44]
Smart farm management system(2018–2021)[45,46,47]
Intelligent groundwater quality management system(2018–2022)[48,49,50,51,52]
Table 2. Resources used in the multi-layered architecture of IoT in Agriculture 4.0.
Table 2. Resources used in the multi-layered architecture of IoT in Agriculture 4.0.
Layers in Agriculture 4.0Recourses Used in LayersDescription of Layers
Physical layerSensors and CamerasCollecting data from the environment
ActuatorsChanging the state of the environment
RIFDStoring the data
GPSTracking the location of the machinery
Network LayerConnecting resources such as RoutersConnecting remote devices to transform data
Edge LayerSecurity, interfaces, gatewayUses Security protocols for ensuring data integrity, confidentiality, etc., gateways connecting devices with the cloud to store a small amount of data
Application LayerDatabase, End users, Web tools, etc.Storing data, exchanging information between the applications, and providing data accessing to the end users.
Table 3. Rural-Agriculture Security Issues.
Table 3. Rural-Agriculture Security Issues.
Rural-AgricultureSecurity Issues for Rural
Residentsecurity awareness is lessHard for Facing security risks
FacilityCost and energy consumption are lessHard for imposing Strong security mechanisms.
Production dataDifficult to measure Identifying unauthorized access is hard
Production cycleDepends on the growth of the cropFace heavy loss because of less security
TransportFarmland environment, bad trafficDelayed availability
Management systemWeak security due to weak infrastructurehard to control attackers
CommunicationBase stations are lessHard to identify base station attacks
Table 4. Summary of the study performed on attacks in agricultural 4.0.
Table 4. Summary of the study performed on attacks in agricultural 4.0.
AttacksAgriculture ConsequencesYearsStudies
Physical Attack
Replay Attack
Masquerade Attack
The collecting of data on the kind and potential applications of equipment for agricultural projects violates privacy.(2019–2022)[62,76,77,78,79,80,81]
Dictionary attack,
Session Hijacking, Spoofing
Attackers with forged identities who can pass as legitimate or authorized people can access the precision agriculture system.(2019–2023)[62,79,82,83,84]
Malicious Code Attack
Repudiation Attack
A situation in which services, authentication mechanisms, or data transmissions are refused through the system’s nodes may result from the repudiation of information, which enables an intruder to repudiate all the energy usage, information-generating, and manufacturing processes of an agricultural production ICT system.(2018–2021)[62,79,85,86]
Tracing Attack
Brute Force Attack
Known-Key Attack
Because of the confidentiality breach, unauthorized access to crucial data could result in the theft of significant data and pose serious risks to the privacy of the users of the involved agriculture system.(2020–2023)[29,62,79,87,88]
Forgery Attack
Man-In-The-Middle
Attack (MITM)
Trojan Horse Attack
Information about agriculture technology or smart farming techniques may no longer be accurate or dependable due to potential unlawful or improper changes in the reliability of data or resources.(2019–2023)[62,89,90,91,92,93,94,95,96]
Denial of Service
(DoS) attacks
(SYN Flood, Ping of
Death, Botnets)
Attackers have the ability to halt the functioning of the established smart farming network or even set up services that are inaccessible to farmers.(2019–2022)[62,79,92,97,98]
Table 6. Experimental Setup Configuration.
Table 6. Experimental Setup Configuration.
HMVM
CPUIntel Core i5-6300U @ 2.4 GHz 2 vCores
RAM8 GB2 GB
OSUbuntu 18.04 × 86 64Ubuntu 18.04 × 86 64
VirtualizationDocker
Docker-compose
Docker-compose
Docker
ApplicationsThingsBoard
Open vSwitch
ONOS
Mininet
Hping
sFlow
Ethereum
Supply Chain
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Padhy, S.; Alowaidi, M.; Dash, S.; Alshehri, M.; Malla, P.P.; Routray, S.; Alhumyani, H. AgriSecure: A Fog Computing-Based Security Framework for Agriculture 4.0 via Blockchain. Processes 2023, 11, 757. https://doi.org/10.3390/pr11030757

AMA Style

Padhy S, Alowaidi M, Dash S, Alshehri M, Malla PP, Routray S, Alhumyani H. AgriSecure: A Fog Computing-Based Security Framework for Agriculture 4.0 via Blockchain. Processes. 2023; 11(3):757. https://doi.org/10.3390/pr11030757

Chicago/Turabian Style

Padhy, Sasmita, Majed Alowaidi, Sachikanta Dash, Mohamed Alshehri, Prince Priya Malla, Sidheswar Routray, and Hesham Alhumyani. 2023. "AgriSecure: A Fog Computing-Based Security Framework for Agriculture 4.0 via Blockchain" Processes 11, no. 3: 757. https://doi.org/10.3390/pr11030757

APA Style

Padhy, S., Alowaidi, M., Dash, S., Alshehri, M., Malla, P. P., Routray, S., & Alhumyani, H. (2023). AgriSecure: A Fog Computing-Based Security Framework for Agriculture 4.0 via Blockchain. Processes, 11(3), 757. https://doi.org/10.3390/pr11030757

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop