2020
DOI: 10.1109/access.2020.3034096
|View full text |Cite
|
Sign up to set email alerts
|

SGF-MD: Behavior Rule Specification-Based Distributed Misbehavior Detection of Embedded IoT Devices in a Closed-Loop Smart Greenhouse Farming System

Abstract: Smart farming is rapidly revolutionizing the agricultural sector where embedded Internet of Things (IoT) devices are integrated into the field to maintain or improve the quality of products as well as increase food production. Despite the tremendous benefits, various cybersecurity threats of IoT can also be inherited by the sector. In this paper, we propose a lightweight specification-based distributed detection to identify the misbehavior of heterogeneous embedded IoT nodes efficiently and effectively in a cl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 20 publications
(24 citation statements)
references
References 20 publications
0
24
0
Order By: Relevance
“…The later problem has been solved by utilizing techniques to identify uncertainties or noise in the data and mitigate them. Algorithms based on Boltzmann machine learning [224], Kalman-filter [225], and Longest Common Subsequence (LCSS) [226] have been utilized for data processing. Enhancing the quality of data has also been achieved through interpolation models based on fuzzy and neural network technology [128], and anomaly detection algorithm based on matching old and new data [227].…”
Section: Managing Big Datamentioning
confidence: 99%
“…The later problem has been solved by utilizing techniques to identify uncertainties or noise in the data and mitigate them. Algorithms based on Boltzmann machine learning [224], Kalman-filter [225], and Longest Common Subsequence (LCSS) [226] have been utilized for data processing. Enhancing the quality of data has also been achieved through interpolation models based on fuzzy and neural network technology [128], and anomaly detection algorithm based on matching old and new data [227].…”
Section: Managing Big Datamentioning
confidence: 99%
“…Te recent work of Sontowski and Zhang [30] has presented a scheme to resist cyber-attack and denial of service. Using Raspberry Pi prototyping, the proposed system has developed a scheme for resisting deauthentication attacks owing to the adoption of the frequently used IEEE standard of 802.11 in PA. Another recent work by Astillo et al [31] implemented a mechanism to model the misbehavior of attackers in a farming environment. Te study has developed rules for resisting attack environments in IoT using the Kalman flter.…”
Section: Existing Approaches Of Securitymentioning
confidence: 99%
“…Based on the usage, they classified IoTA applications into two types, Indoor (i.e., crop beds, greenhouse, hydroponic) and outdoor (arable land, orchard). Some other works include IoT based smart greenhouse and precision farming applications [51]. In Europe, there is ongoing work on IoTA based research projects [52].…”
Section: Iota Applicationsmentioning
confidence: 99%