2021
DOI: 10.1007/978-3-030-63339-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Smart Agriculture Using IoD: Insights, Trends and Road Ahead

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…In [33,34], the authors discuss security concerns and challenges of IoD domains while emphasizing authentication issues. In [35], the authors discuss cybersecurity weaknesses and intrusions of the IoD, and they elucidate potential countermeasures. In [36], the authors investigate the role of blockchain in UAV networks in various fields, including the security of systems, attacks on the IoD, and preventive countermeasures, while in [37] the authors discuss the integration of blockchain as a solution to tackle IoD network security issues.…”
Section: Motivation and Contributionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [33,34], the authors discuss security concerns and challenges of IoD domains while emphasizing authentication issues. In [35], the authors discuss cybersecurity weaknesses and intrusions of the IoD, and they elucidate potential countermeasures. In [36], the authors investigate the role of blockchain in UAV networks in various fields, including the security of systems, attacks on the IoD, and preventive countermeasures, while in [37] the authors discuss the integration of blockchain as a solution to tackle IoD network security issues.…”
Section: Motivation and Contributionmentioning
confidence: 99%
“…These attacks can be ranked as follows: (a) device attacks, aiming to mimic confidential credentials to access the drones' components; (b) network attacks, where data streams are tampered with and altered; and (c) software attacks, where drones or Ground Stations are injected with malicious data [78]. Thus, the preservation of confidentiality, integrity, availability, authenticity, and privacy are key requirements of the IoD, to properly reflect its capabilities and functions in tackling threats and security breaches [35], i.e., (a) confidentiality of wireless communication channels prevents data leaks, (b) integrity ensures that the collected data remain unchanged, (c) availability of services to authorized users remains even in the case of infiltration, and (d) authentication verifies identities before access or exchange of data, while privacy prevents malicious approaches from disclosing personal data without permission. As a result, data leaks raise serious privacy concerns and threaten location-and identity-related information [13], leading to trust issues among the related stakeholders [22].…”
Section: Security In the Iodmentioning
confidence: 99%