2022
DOI: 10.3390/s22093520
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture

Abstract: The invention of smart low-power devices and ubiquitous Internet connectivity have facilitated the shift of many labour-intensive jobs into the digital domain. The shortage of skilled workforce and the growing food demand have led the agriculture sector to adapt to the digital transformation. Smart sensors and systems are used to monitor crops, plants, the environment, water, soil moisture, and diseases. The transformation to digital agriculture would improve the quality and quantity of food for the ever-incre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(19 citation statements)
references
References 45 publications
0
18
0
1
Order By: Relevance
“…In advanced agriculture at the field level, this can take the form of actuators, sensors, and vehicles. These can be used for monitoring critical environmental parameters, executing farming functions, and delivering automated transport (Alahmadi et al, 2022;Saiz-Rubio & Rovira-Más, 2020). While these technologies provide great utility and convenience, not enough attention is given to these devices.…”
Section: Hardwarementioning
confidence: 99%
See 3 more Smart Citations
“…In advanced agriculture at the field level, this can take the form of actuators, sensors, and vehicles. These can be used for monitoring critical environmental parameters, executing farming functions, and delivering automated transport (Alahmadi et al, 2022;Saiz-Rubio & Rovira-Más, 2020). While these technologies provide great utility and convenience, not enough attention is given to these devices.…”
Section: Hardwarementioning
confidence: 99%
“…While these technologies provide great utility and convenience, not enough attention is given to these devices. Many of these hardware devices do not include an integrated security mechanism to examine their usage, status, or memory access which is essential in securely storing cryptographic keys (Alahmadi et al,2022). This in turn makes them vulnerable to certain threats.…”
Section: Hardwarementioning
confidence: 99%
See 2 more Smart Citations
“…[85], authors classified CA in IoTA based on the physical layer, network layer, middleware layer, and application layer. The CA on the physical layer is such a RF jamming, side-channel attack, which aims to gather unauthorized information regarding the implementation description of the IoTA system using monitoring parameters of hardware like an electric current or voltage [86]. Attacks on the network layer are DoS, MITM, and cloud computing attacks.…”
Section: Smart Greenhousementioning
confidence: 99%