scholarly journals AgriTrust—A Trust Management Approach for Smart Agriculture in Cloud-based Internet of Agriculture Things

Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6174 ◽  
Author(s):  
Kamran Ahmad Awan ◽  
Ikram Ud Din ◽  
Ahmad Almogren ◽  
Hisham Almajed

Internet of Things (IoT) provides a diverse platform to automate things where smart agriculture is one of the most promising concepts in the field of Internet of Agriculture Things (IoAT). Due to the requirements of more processing power for computations and predictions, the concept of Cloud-based smart agriculture is proposed for autonomic systems. This is where digital innovation and technology helps to improve the quality of life in the area of urbanization expansion. For the integration of cloud in smart agriculture, the system is shown to have security and privacy challenges, and most significantly, the identification of malicious and compromised nodes along with a secure transmission of information between sensors, cloud, and base station (BS). The identification of malicious and compromised node among soil sensors communicating with the BS is a notable challenge in the BS to cloud communications. The trust management mechanism is proposed as one of the solutions providing a lightweight approach to identify these nodes. In this article, we have proposed a novel trust management mechanism to identify malicious and compromised nodes by utilizing trust parameters. The trust mechanism is an event-driven process that computes trust based on the pre-defined time interval and utilizes the previous trust degree to develop an absolute trust degree. The system also maintains the trust degree of a BS and cloud service providers using distinct approaches. We have also performed extensive simulations to evaluate the performance of the proposed mechanism against several potential attacks. In addition, this research helps to create friendlier environments and efficient agricultural productions for the migration of people to the cities.

2021 ◽  
Author(s):  
Kamran Ahmad Awan ◽  
Ikram Ud Din ◽  
Ahmad Almogren ◽  
Hasan Ali Khattak ◽  
Joel J.P.C. Rodrigues

Abstract Internet of Things (IoT) is bringing revolution into today’s world where devices in our surroundings become smart and perform daily-life activities and operations with more precision. The architecture of IoT is heterogeneous as it provides autonomy to nodes that they can communicate among other nodes and can also exchange information at any period. Due to the heterogeneous environment, IoT faces numerous security and privacy challenges, and one of the most significant challenges is the identification of malicious and compromised nodes. In this article, we have proposed a Machine Learning-based trust management approach for edge nodes. The proposed approach is a lightweight process to evaluate trust because edge nodes cannot perform complex computations. To evaluate trust, the proposed mechanism utilizes the knowledge and experience component of trust where knowledge is further based on several parameters. To eliminate the triumphant execution of good and bad-mouthing attacks, the proposed approach utilizes edge clouds, i.e., local data centers, to collect recommendations to evaluate indirect and aggregated trust. The trustworthiness of nodes is ranked between a certain limit where only those that satisfy the threshold value can participate in the network. To validate the performance of a proposed approach we have performed an extensive simulation in comparison with the existing approaches and the result shows the effectiveness of the proposed approach against several potential attacks.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Liudmila Ivanovna Khoruzhy ◽  
Roman Petrovich Bulyga ◽  
Olga Yuryevna Voronkova ◽  
Lidia Vladimirovna Vasyutkina ◽  
Natalya Ryafikovna Saenko ◽  
...  

PurposeNowadays, cloud platforms are used in many fields, including e-commerce, web applications, data storage, healthcare, gaming, mobile social networks, etc. However, security and privacy are still two significant concerns in this area. The target of this paper is to present a system for trust management in industrial cloud computing using the multi-criteria decision making (MCDM) approach. MCDM techniques have been developed to accommodate a wide range of applications. As a result, hundreds of approaches have been generated with even minor variations on current approaches spawning new study fields.Design/methodology/approachCloud computing provides a fully scalable, accessible and flexible computing platform for various applications. Due to the multiple applications that cloud computing has found in numerous life features, users and providers have considered providing security in cloud communications. Due to its distributive nature, dynamic space and lack of transparency in performing cloud computing, it faces many challenges in providing security. For security improvement, trust management can play a very influential role. This paper proposes a generic analytical methodology that uses a series of assessment criteria to evaluate current trust management testing prototypes in industrial cloud computing and related fields. The authors utilize a MCDM approach in the present article. Due to the multi-dimensionality of the sustainability objective and the complexities of socio-economic and biophysical processes, MCDM approaches have become progressively common in decision-making for sustainable energy.FindingsThe results of comparing and evaluating the performance of this model show its ability to manage trust and the ability to adapt to changes in the behavior of service providers quickly. Using a simulation, all results are confirmed. The results of simulations and evaluation of the present paper indicate that the proposed model provides a more accurate evaluation of the credibility of cloud service providers than other models.Practical implicationsThe number of cloud services and customers is vast and extremely competitive in cloud environments, where novel cloud services and customers can join at any time, while others can withdraw whenever they want. Because of cloud services' highly dynamic and dispersed design, trust management mechanisms must be highly flexible to obtain feedback and update trust outcomes as quickly as possible. The model presented in this article tries to improve users' trust in the cloud industry.Originality/valueUsing a method (MCDM) to find the best trust management solution based on user experience in industrial cloud computing is the novelty of this paper.


2020 ◽  
Vol 10 (6) ◽  
pp. 2011 ◽  
Author(s):  
Muhammad Umar Javed ◽  
Mubariz Rehman ◽  
Nadeem Javaid ◽  
Abdulaziz Aldegheishem ◽  
Nabil Alrajeh ◽  
...  

In this paper, a blockchain-based secure data sharing mechanism is proposed for Vehicular Networks (VNs). Edge service providers are introduced along with ordinary nodes to efficiently manage service provisioning. The edge service providers are placed in the neighborhood of the ordinary nodes to ensure smooth communication between them. The huge amount of data generated by smart vehicles is stored in a distributed file storage system, known as Interplanetary File System (IPFS). It is used to tackle the issues related to data storage in centralized architectures, such as data tampering, lack of privacy, vulnerability to hackers, etc. Monetary incentives are given to edge vehicle nodes to motivate them for accurate and timely service provisioning to ordinary nodes. In response, ordinary nodes give reviews to the edge nodes against the services provided by them, which are further stored in a blockchain to ensure integrity, security and transparency. Smart contracts are used to automate the system processes without the inclusion of an intermediate party and to check the reviews given to the edge nodes. To optimize gas consumption and to enhance the system performance, a Proof of Authority (PoA) consensus mechanism is used to validate the transactions. Moreover, a caching system is introduced at the edge nodes to store frequently used services. Furthermore, both security and privacy are enhanced in the proposed system by incorporating a symmetric key cryptographic mechanism. A trust management mechanism is also proposed in this work to calculate the nodes’ reputation values based upon their trust values. These values determine the authenticity of the nodes involved in the network. Eventually, it is concluded from the simulation results that the proposed system is efficient for VNs.


2019 ◽  
Vol 8 (4) ◽  
pp. 2647-2655

Cloud computing is a technology that promises resilient and flexible computing resources to the growing business. Along with many benefits of Cloud computing, there are various complex problems such as security and privacy of data that exists on Cloud. Trust is one of the key obstacles in the adoption of Cloud by the growing market due to absence of any reliable and efficient trust evaluation mechanism. It is difficult task for Cloud consumers to choose trustworthy provider among various service providers who provide similar type of services. There is a need to have - proper techniques/methods to establish trust; proper trust based models to evaluate the trust; and awareness of various possible attacks to know the robustness of the models. Hence this paper discusses existing state of the art trust management techniques, models and attacks, to help research community interested in designing trust based schemes in Cloud environment.


2021 ◽  
Author(s):  
Anupam Pattanayak ◽  
Mou Dutta ◽  
Subhasish Dhal

Abstract Continuous health status monitoring of the persons equipped with Wireless Body Area Network (WBAN) is one of the key emerging technologies in the area of e-healthcare. In this technology, WBANs and Medical Service Providers (MSPs) are connected via a cloud infrastructure, where WBAN continuously uploads the present readings of physiological parameters via base station such as smart phone, smart watch, etc. Cloud analyzes the physiological parameters and whenever any medical emergency of the user is detected, it checks the infrastructural parameters including the location information of all MSPs connected to it and finds the most appropriate MSP to handle the medical emergency. This MSP selection task has to be performed efficiently so that the medical treatment of the user can start as early as possible. In the existing works, a trusted third party, namely, trusted authority (TA) actively participates in the MSP selection process, which may take undue advantages. The aim of the work in this paper is to remove the role of TA during MSP selection process. However, TA will participate in the system setup phase such that it cannot obtain any advantage in compromising the MSP selection task. The proposed scheme has been scrutinized through an adversary model and simulated using ProVerif tool to verify the security and privacy.


Agronomy ◽  
2021 ◽  
Vol 11 (8) ◽  
pp. 1564
Author(s):  
Kofi Akamani

Although the transition to industrial agriculture in the 20th century resulted in increased agricultural productivity and efficiency, the attainment of global food security continues to be elusive. Current and anticipated impacts of climate change on the agricultural sector are likely to exacerbate the incidence of food insecurity. In recent years, climate-smart agriculture has gained recognition as a mechanism that has the potential to contribute to the attainment of food security and also enhance climate change mitigation and adaptation. However, several conceptual and implementation shortfalls have limited the widespread adoption of this innovative agricultural system at the landscape scale. This manuscript argues for the use of ecosystem management as an overarching framework for the conceptualization and implementation of climate-smart agriculture. The manuscript focuses on clarifying the foundational assumptions and management goals, as well as the knowledge and institutional requirements of climate-smart agriculture using the principles of ecosystem management. Potential challenges that may be faced by the application of an ecosystem management approach to climate-smart agriculture are also discussed. Furthermore, the manuscript calls for a heightened focus on social equity in the transition toward an ecosystem-based approach to climate-smart agriculture. The US farm bill is used as an illustrative case study along with other examples drawn mostly from sub-Saharan Africa.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1787
Author(s):  
Ezedin Barka ◽  
Sofiane Dahmane ◽  
Chaker Abdelaziz Kerrache ◽  
Mohamad Khayat ◽  
Farag Sallabi

Healthcare professionals and scholars have emphasized the need for IoT-based remote health monitoring services to track the health of the elderly. Such systems produce a large amount of data, necessitating the security and privacy of that data. On the other hand, Software Defined Networking (SDN) integration could be seen as a good solution to guarantee both flexibility and efficiency of the network which is even more important in the case of healthcare monitoring. Furthermore, Blockchain has recently been proposed as a game-changing tool that can be integrated into the Internet of Things (IoT) to have the optimal level of security and privacy. However, incorporating Blockchain into IoT networks, which rely heavily on patients’ health sensors, is extremely difficult. In this paper, a secure Healthcare Monitoring System (HMS) is proposed with a focus on trust management issues. The architecture seeks to protect multiple healthcare monitoring system components and preserves patient privacy by developing a security interface where separate security modules can be integrated to run side by side to ensure reliable HMS. The security framework architecture we propose takes advantage of the blockchain technology as a secure and timely information back-end. STHM is a proposal that uses Software-Defined Networking (SDN) as the communication medium that allows users to access SDN’s different functional and security technologies and services. Simulation results show that the use of Blockchain for the SDN-based healthcare monitoring can ensure the desired flexibility and security for a very lightweight additional overhead.


2021 ◽  
Vol 21 (4) ◽  
pp. 1-22
Author(s):  
Ismaeel Al Ridhawi ◽  
Moayad Aloqaily ◽  
Yaser Jararweh

The rise of fast communication media both at the core and at the edge has resulted in unprecedented numbers of sophisticated and intelligent wireless IoT devices. Tactile Internet has enabled the interaction between humans and machines within their environment to achieve revolutionized solutions both on the move and in real-time. Many applications such as intelligent autonomous self-driving, smart agriculture and industrial solutions, and self-learning multimedia content filtering and sharing have become attainable through cooperative, distributed, and decentralized systems, namely, volunteer computing. This article introduces a blockchain-enabled resource sharing and service composition solution through volunteer computing. Device resource, computing, and intelligence capabilities are advertised in the environment to be made discoverable and available for sharing with the aid of blockchain technology. Incentives in the form of on-demand service availability are given to resource and service providers to ensure fair and balanced cooperative resource usage. Blockchains are formed whenever a service request is initiated with the aid of fog and mobile edge computing (MEC) devices to ensure secure communication and service delivery for the participants. Using both volunteer computing techniques and tactile internet architectures, we devise a fast and reliable service provisioning framework that relies on a reinforcement learning technique. Simulation results show that the proposed solution can achieve high reward distribution, increased number of blockchain formations, reduced delays, and balanced resource usage among participants, under the premise of high IoT device availability.


Sign in / Sign up

Export Citation Format

Share Document