2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC) 2020
DOI: 10.1109/cic50333.2020.00025
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Attacks on Smart Farming Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
50
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3
2

Relationship

3
7

Authors

Journals

citations
Cited by 91 publications
(50 citation statements)
references
References 34 publications
0
50
0
Order By: Relevance
“…These connected yet distributed systems are supporting services in domains including manufacturing, energy, transportation [12,13], medical, city, building, and agriculture [14,15], offering data driven and intelligent AI driven efficient environments. With emergence of fully automated manufacturing and CPS domains, trustworthiness and security when considering a action related to AI and operations in the system is critical.…”
Section: Access Control Requirements In Smart and Connected Ecosystemsmentioning
confidence: 99%
“…These connected yet distributed systems are supporting services in domains including manufacturing, energy, transportation [12,13], medical, city, building, and agriculture [14,15], offering data driven and intelligent AI driven efficient environments. With emergence of fully automated manufacturing and CPS domains, trustworthiness and security when considering a action related to AI and operations in the system is critical.…”
Section: Access Control Requirements In Smart and Connected Ecosystemsmentioning
confidence: 99%
“…The vulnerability of Wireless Local Area Networks (WLANs) to direct cyber-attacks is already a generally recognized problem across all industries [66]. Demonstration of the damage potential in a Denial of Service (DoS) attack has been shown in the research of Sontowski et al, by disrupting in-field sensors and obstructing device network connectivity in smart farm operations [67].…”
Section: Prospective Areas For Can Technology Inclusionmentioning
confidence: 99%
“…Table 5 lists well-known security threats discussed in the literature [15][16][17][18][19][20][21][22][23].…”
Section: Definition Of System Threatsmentioning
confidence: 99%