University Report: Internet of Things Security in Modern Agriculture
VerifiedAdded on 2020/02/24
|16
|3851
|33
Report
AI Summary
This report delves into the critical intersection of Internet of Things (IoT) technology and modern agriculture, highlighting the transformative impact of IoT on farming practices. It acknowledges the increased efficiency and quality improvements facilitated by IoT while emphasizing the inherent security vulnerabilities, particularly the rise of cyberattacks and ransomware targeting farmers' data and devices. The report reviews common security issues in wireless technologies, current security solutions like authentication and data encryption, and their limitations. It proposes enhanced methods to overcome security challenges, including daily system patching, data backups, updated software, firewall configurations, and antivirus installations. The study aims to strengthen the security framework for farmers, enabling them to leverage IoT benefits safely and securely, offering valuable insights into protecting sensitive information and ensuring the continued advancement of smart agriculture.

Running head: INTERNET OF THINGS
Internet of Things
Name of the Student
Name of the University
Author’s note
Internet of Things
Name of the Student
Name of the University
Author’s note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1INTERNET OF THINGS
Executive Summary
Internet of Things (IoT) involves the procedure of connecting the software, hardware and
sensors. The implementation of IoT technology in farming and agriculture has significantly
changed the scenario of farming as a whole. The quality has improved a lot with the advent of
IoT. The quality has enhanced a great deal with the appearance of IoT. The different
innovations related with the agriculture have changed the sustenance quality. The
agriculturists dependably remain associated with the Internet and utilize the network system
for the advantages. Presently, there is a downside, since the intruders utilize the unreliable
system they fall into prey of the cyber attackers, they attack their devices and lock their
devices and requesting cash. The ransomware attack cost them excessively. They take the
agriculturists' information also. This investigation features those issues and furthermore gives
helpful answers for the particular issues confronted by the clients. This examination study
highlighted the issues and give answers for reinforcing the security structure for the
improvement of the agriculturists so they can lead their activities securely and safely.
Executive Summary
Internet of Things (IoT) involves the procedure of connecting the software, hardware and
sensors. The implementation of IoT technology in farming and agriculture has significantly
changed the scenario of farming as a whole. The quality has improved a lot with the advent of
IoT. The quality has enhanced a great deal with the appearance of IoT. The different
innovations related with the agriculture have changed the sustenance quality. The
agriculturists dependably remain associated with the Internet and utilize the network system
for the advantages. Presently, there is a downside, since the intruders utilize the unreliable
system they fall into prey of the cyber attackers, they attack their devices and lock their
devices and requesting cash. The ransomware attack cost them excessively. They take the
agriculturists' information also. This investigation features those issues and furthermore gives
helpful answers for the particular issues confronted by the clients. This examination study
highlighted the issues and give answers for reinforcing the security structure for the
improvement of the agriculturists so they can lead their activities securely and safely.

2INTERNET OF THINGS
Table of Contents
1. Introduction............................................................................................................................3
2. Review....................................................................................................................................3
i. The common security issues with wireless technologies....................................................3
ii. The current security solutions for the security threats on Internet of Thing......................4
iii. How effective are the current security solutions..............................................................6
iv. The problems and issues and limitations residing with the current security solutions for
Internet of Things...................................................................................................................7
v. The better ways of overcoming the security challenges that can assist farmers................8
2.3. The proposed better method that can benefit the farmers...................................................9
i. Features that will provide security and enhance agriculture...............................................9
ii. The Model Diagram to simulate the IoT model for agriculture and farmers...................10
iii. Limited features of IoT...................................................................................................12
4. Conclusion............................................................................................................................12
5. References............................................................................................................................13
Table of Contents
1. Introduction............................................................................................................................3
2. Review....................................................................................................................................3
i. The common security issues with wireless technologies....................................................3
ii. The current security solutions for the security threats on Internet of Thing......................4
iii. How effective are the current security solutions..............................................................6
iv. The problems and issues and limitations residing with the current security solutions for
Internet of Things...................................................................................................................7
v. The better ways of overcoming the security challenges that can assist farmers................8
2.3. The proposed better method that can benefit the farmers...................................................9
i. Features that will provide security and enhance agriculture...............................................9
ii. The Model Diagram to simulate the IoT model for agriculture and farmers...................10
iii. Limited features of IoT...................................................................................................12
4. Conclusion............................................................................................................................12
5. References............................................................................................................................13
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3INTERNET OF THINGS
1. Introduction
Internet of Things (IoT) involves the procedure of connecting the software, hardware
and sensors. The implementation of IoT technology in farming and agriculture has
significantly changed the scenario of farming as a whole. The quality has improved a lot
with the advent of IoT.
The various technologies associated with the IoT technology have changed the food
quality. The farmers always stay connected to the Internet and use the wireless network for
the benefits. Now, there is a drawback, since the farmers use the insecure network they fall
into prey of the cyber attackers, they attack their systems and lock their system and asking for
money. The ransomware attack cost them too much. They steal the farmers’ data as well.
This research study will review the issues and provide solutions to strengthen the
security framework for the betterment of the farmers so that they can conduct their activities
safely and securely over the network.
2. Review
i. The common security issues with wireless technologies
This research study will showcase the issues and provide solutions to strengthen the
security framework for the betterment of the farmers so that they can conduct their activities
safely and securely over the network.
Jing et al., (2014) suggested the common security solutions in the wireless
technology. The risks those are associated with the wireless technology are-
Intrusion: The mobile network is being more opened to the intruders, they easily gain
access to those mobile devices via an unprotected network and make it vulnerable.
1. Introduction
Internet of Things (IoT) involves the procedure of connecting the software, hardware
and sensors. The implementation of IoT technology in farming and agriculture has
significantly changed the scenario of farming as a whole. The quality has improved a lot
with the advent of IoT.
The various technologies associated with the IoT technology have changed the food
quality. The farmers always stay connected to the Internet and use the wireless network for
the benefits. Now, there is a drawback, since the farmers use the insecure network they fall
into prey of the cyber attackers, they attack their systems and lock their system and asking for
money. The ransomware attack cost them too much. They steal the farmers’ data as well.
This research study will review the issues and provide solutions to strengthen the
security framework for the betterment of the farmers so that they can conduct their activities
safely and securely over the network.
2. Review
i. The common security issues with wireless technologies
This research study will showcase the issues and provide solutions to strengthen the
security framework for the betterment of the farmers so that they can conduct their activities
safely and securely over the network.
Jing et al., (2014) suggested the common security solutions in the wireless
technology. The risks those are associated with the wireless technology are-
Intrusion: The mobile network is being more opened to the intruders, they easily gain
access to those mobile devices via an unprotected network and make it vulnerable.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4INTERNET OF THINGS
Exploitation: The network then is misused widely by means of DoS attacks and it
basically involves major criminal activities.
Granjal, Monteiro & Silva, (2015) depicted the active attack and the passive attack
involved elaborately and lack of security can lead to both physical and virtual intruder attack
such as hacking, data theft, the system integrity destruction. The active attack involves ID
spoofing is basically related to the unauthorised access or unauthorised privileges, the active
attack also involves the access of personal files in the computer system by means of
alternation or modification of the data, that active attack also correlates the dictionary attacks
to detect or identify a set of station service identifiers. According to Da et al., (2014) the
replay attack or DoS attack is associated with accessing and exploiting the wired equivalent
privacy encryption.
According to Gubbi et al., (2013) the passive attack involves the accumulation of the
information when the information is in transmitting in between the unauthorised devices. The
passive attack can occur by the following two methods-
Eavesdropping: this method involves the monitoring and administering of the
transmissions of the message components in between the devices
Traffic analysis: Loo, Mauri & Ortiz, (2016) mentioned the process which involves
monitoring and administrations of transmissions for particular patterns of communication.
All the techniques described above are a part of criminal activities that involves
hacking and exploiting the mobile system and wireless system and () depicted them
beautifully.
Exploitation: The network then is misused widely by means of DoS attacks and it
basically involves major criminal activities.
Granjal, Monteiro & Silva, (2015) depicted the active attack and the passive attack
involved elaborately and lack of security can lead to both physical and virtual intruder attack
such as hacking, data theft, the system integrity destruction. The active attack involves ID
spoofing is basically related to the unauthorised access or unauthorised privileges, the active
attack also involves the access of personal files in the computer system by means of
alternation or modification of the data, that active attack also correlates the dictionary attacks
to detect or identify a set of station service identifiers. According to Da et al., (2014) the
replay attack or DoS attack is associated with accessing and exploiting the wired equivalent
privacy encryption.
According to Gubbi et al., (2013) the passive attack involves the accumulation of the
information when the information is in transmitting in between the unauthorised devices. The
passive attack can occur by the following two methods-
Eavesdropping: this method involves the monitoring and administering of the
transmissions of the message components in between the devices
Traffic analysis: Loo, Mauri & Ortiz, (2016) mentioned the process which involves
monitoring and administrations of transmissions for particular patterns of communication.
All the techniques described above are a part of criminal activities that involves
hacking and exploiting the mobile system and wireless system and () depicted them
beautifully.

5INTERNET OF THINGS
ii. The current security solutions for the security threats on Internet of Thing
Borgohain, Kumar & Sanyal, (2015) presented the security solutions that are
associated with the IoT for diminishing the security threats are- authentication, securing
communication that means data protection while it is in transit, protection of data while in the
process, securing storage which involves protecting data while the data is at rest.
Authentication: Abomhara & Køien, (2014) depicted the common algorithm AES
and SHA-256 that aids in authentication; the authentication process involves the usage of the
asymmetric public key. In case of authentication public key concept is used to encipher and
decipher data for enhancing security. The sender sends a data encrypted with the secure key
and the receiver on the other end can only get access to the data by decrypting the same data
with the secure key. The sender and the receiver can only access the data and they have to
have the key, that means the intruders in between if try to access the data they will have to
know the key encryption ensures data safety. Whitmore, Agarwal & Da Xu, (2015)
highlighted that digital signature is another form of authentication. The concept of digital
certificate involves a private key encryption which can only be opened by the public key, the
private key is only known to the sender and the receiver.
Securing data communication by means of algorithms: According to Botta et al.,
(2016) the software implementations to secure the data my means for authentication can be
power consuming. When that software deployed in a system, it takes a lot of CPU cycles for
processing, hence the system becomes slow and sluggish at times, hence it delays other vital
works and makes the network slower. However, the problem can be solved by the
implementation of the symmetric encryption algorithms like AES and 3DES and the
asymmetric algorithms RSA and ECDSA. According to Al-Fuqahaet al., (2015)
implementations of all these algorithms make the system faster and hence make it power-
ii. The current security solutions for the security threats on Internet of Thing
Borgohain, Kumar & Sanyal, (2015) presented the security solutions that are
associated with the IoT for diminishing the security threats are- authentication, securing
communication that means data protection while it is in transit, protection of data while in the
process, securing storage which involves protecting data while the data is at rest.
Authentication: Abomhara & Køien, (2014) depicted the common algorithm AES
and SHA-256 that aids in authentication; the authentication process involves the usage of the
asymmetric public key. In case of authentication public key concept is used to encipher and
decipher data for enhancing security. The sender sends a data encrypted with the secure key
and the receiver on the other end can only get access to the data by decrypting the same data
with the secure key. The sender and the receiver can only access the data and they have to
have the key, that means the intruders in between if try to access the data they will have to
know the key encryption ensures data safety. Whitmore, Agarwal & Da Xu, (2015)
highlighted that digital signature is another form of authentication. The concept of digital
certificate involves a private key encryption which can only be opened by the public key, the
private key is only known to the sender and the receiver.
Securing data communication by means of algorithms: According to Botta et al.,
(2016) the software implementations to secure the data my means for authentication can be
power consuming. When that software deployed in a system, it takes a lot of CPU cycles for
processing, hence the system becomes slow and sluggish at times, hence it delays other vital
works and makes the network slower. However, the problem can be solved by the
implementation of the symmetric encryption algorithms like AES and 3DES and the
asymmetric algorithms RSA and ECDSA. According to Al-Fuqahaet al., (2015)
implementations of all these algorithms make the system faster and hence make it power-
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6INTERNET OF THINGS
efficient. The software implications, on the other hand, can be tedious and can slow the
system and hence should be replaced by these algorithms.
Secure transit: Matharu, Upadhyay & Chaudhary, (2014) stated that the sensitive
information while in transit must remain safe and secure all throughout the transmission
between the sender and the receiver, and those must not be leaked in any way. However, in
some instances in case of payment applications, another safety and security layer is required,
certain software tools come into play in this case, and the execution of the code can be made
secure by implementing those tools. The secured environment can be achieved by the security
chips and the inbuilt security chips in the IoT device host CPU.
Securing the data while storing in the device: When the data is stored in the database
of the IoT devices, it can be made secure with the secure key and the unique device identifier.
From the root keys, the session keys are generated and these keys are for authentication and
securing connection among the devices. According to Chen et al., (2014), the authorised
users who know the keys' details can only access and can further communicate with the
devices; these data are secured in terms of warranty and privacy.
iii. How effective are the current security solutions
IoT helps in the following scenarios-
i. Securing personal information: IoT helps to secure and protect the assets of the
users. IoT helps to build custom applications to protect users' data; it makes users' life
simpler.
ii. Stay ahead of the customers: The developers or the manufacturers by taking the
help of cloud technology and advanced IoT solutions can stay ahead of their competitors.
efficient. The software implications, on the other hand, can be tedious and can slow the
system and hence should be replaced by these algorithms.
Secure transit: Matharu, Upadhyay & Chaudhary, (2014) stated that the sensitive
information while in transit must remain safe and secure all throughout the transmission
between the sender and the receiver, and those must not be leaked in any way. However, in
some instances in case of payment applications, another safety and security layer is required,
certain software tools come into play in this case, and the execution of the code can be made
secure by implementing those tools. The secured environment can be achieved by the security
chips and the inbuilt security chips in the IoT device host CPU.
Securing the data while storing in the device: When the data is stored in the database
of the IoT devices, it can be made secure with the secure key and the unique device identifier.
From the root keys, the session keys are generated and these keys are for authentication and
securing connection among the devices. According to Chen et al., (2014), the authorised
users who know the keys' details can only access and can further communicate with the
devices; these data are secured in terms of warranty and privacy.
iii. How effective are the current security solutions
IoT helps in the following scenarios-
i. Securing personal information: IoT helps to secure and protect the assets of the
users. IoT helps to build custom applications to protect users' data; it makes users' life
simpler.
ii. Stay ahead of the customers: The developers or the manufacturers by taking the
help of cloud technology and advanced IoT solutions can stay ahead of their competitors.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7INTERNET OF THINGS
iii. Providing benefits to agriculture and farming: The farmers or any individuals
can use the IoT configured hardware and software solutions to get cost-effective and secured
service.
iv. IoT providing advanced data storage: According to Grieco et al., (2014), the
clients can get the advanced data storage facilities and standard, and also the advanced data
protection via IoT.
iv. The problems and issues and limitations residing with the current security
solutions for Internet of Things
The attackers or the intruders finding out the loopholes has spread their arms and the
cyber crimes are increasing day by day, ransomware is one of that kind, the ransomware virus
become popular because of the following flaws-
Lack of proper authorization technique: Lack of strong passwords can lead to
unauthorised access and lead to unethical data usage.
Encryption failure: Martínez-Pérez et al., (2015) showcased that the devices fail to
encrypt or decrypt data when the data is transferred, even though the device is connected to
the Internet.
The security credentials: The users use the same default username and password
preconfigured for the devices.
Privacy issues: The privacy issues incur as the organisations collect data from the
customers via an insecure network.
Open-source software: According to Trappe, Howard & Moore, (2015), IoT devices
must be configured with the open-source software and not the paid software, as these can
reduce the usage of IoT technology and the students and the educators can face challenges
iii. Providing benefits to agriculture and farming: The farmers or any individuals
can use the IoT configured hardware and software solutions to get cost-effective and secured
service.
iv. IoT providing advanced data storage: According to Grieco et al., (2014), the
clients can get the advanced data storage facilities and standard, and also the advanced data
protection via IoT.
iv. The problems and issues and limitations residing with the current security
solutions for Internet of Things
The attackers or the intruders finding out the loopholes has spread their arms and the
cyber crimes are increasing day by day, ransomware is one of that kind, the ransomware virus
become popular because of the following flaws-
Lack of proper authorization technique: Lack of strong passwords can lead to
unauthorised access and lead to unethical data usage.
Encryption failure: Martínez-Pérez et al., (2015) showcased that the devices fail to
encrypt or decrypt data when the data is transferred, even though the device is connected to
the Internet.
The security credentials: The users use the same default username and password
preconfigured for the devices.
Privacy issues: The privacy issues incur as the organisations collect data from the
customers via an insecure network.
Open-source software: According to Trappe, Howard & Moore, (2015), IoT devices
must be configured with the open-source software and not the paid software, as these can
reduce the usage of IoT technology and the students and the educators can face challenges

8INTERNET OF THINGS
adopting the new technology for them. Open-source software help to overcome the security
breaches easily.
IoT in testing mode: IoT technology is still in beta mode and needs to be
revolutionised, there are many security breaches and several pitfalls that need to be addressed
and solved as soon as possible.
v. The better ways of overcoming the security challenges that can assist farmers
The best possible solution for overcoming the security challenges in the IoT devices is
to protect the personal information and details and the specifications by implementing
required IoT devices that are IoT algorithms and associated IoT hardware. IoT hardware can
make the whole system cost-effective as well as the algorithms can help them to process
things over the Internet further. Moreover, it provides us with a secured solution. Lee & Lee,
(2015) depicted that the security can be achieved by following means –
Patching all the system requirements on a daily basis: The computer desktop, as
well as the mobile devices, must be configured and set up to install the daily updates. The
updated patches include all the solutions for the security breaches. So, the updated operating
system is less vulnerable to threats.
Backup system files and personal data: The backing up of system files and the
personal data help in this scenario. If any important files get affected then it will not hurt, so
the backup is easiest and cheapest method, it helps to mitigate the effect of ransomware
effect.
Updated software: According to Farooq et al., (2015), the software or apps installed
in the device must be updated all the time; the browsers must be updated, as the outdated
software is more vulnerable to security threats and risks.
adopting the new technology for them. Open-source software help to overcome the security
breaches easily.
IoT in testing mode: IoT technology is still in beta mode and needs to be
revolutionised, there are many security breaches and several pitfalls that need to be addressed
and solved as soon as possible.
v. The better ways of overcoming the security challenges that can assist farmers
The best possible solution for overcoming the security challenges in the IoT devices is
to protect the personal information and details and the specifications by implementing
required IoT devices that are IoT algorithms and associated IoT hardware. IoT hardware can
make the whole system cost-effective as well as the algorithms can help them to process
things over the Internet further. Moreover, it provides us with a secured solution. Lee & Lee,
(2015) depicted that the security can be achieved by following means –
Patching all the system requirements on a daily basis: The computer desktop, as
well as the mobile devices, must be configured and set up to install the daily updates. The
updated patches include all the solutions for the security breaches. So, the updated operating
system is less vulnerable to threats.
Backup system files and personal data: The backing up of system files and the
personal data help in this scenario. If any important files get affected then it will not hurt, so
the backup is easiest and cheapest method, it helps to mitigate the effect of ransomware
effect.
Updated software: According to Farooq et al., (2015), the software or apps installed
in the device must be updated all the time; the browsers must be updated, as the outdated
software is more vulnerable to security threats and risks.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9INTERNET OF THINGS
Blocking SMB inbound or outbound on the firewall: The ransomware virus
basically spread through Windows SMB services, so implementation and configuration of
firewall can mitigate the risk of ransomware.
Installation of antivirus software: Sicari et al., (2015) stated that the antivirus
software installation can help definitely help to fight against the ransomware, any basic
antivirus available in the market can secure the network from the potential attack of
ransomware virus.
2.3. The proposed better method that can benefit the farmers
i. Features that will provide security and enhance agriculture
The farmers must take the definite approaches discussed that will enhance the security
and also provide various farming facilities.
Installation of antivirus software
The farmers must install the antivirus software in their system and must keep it
updated; the software can definitely help them to stay away from the adverse effect of the
ransomware virus.
Backing up of important data and files
According to Anwar et al., (2014), the farmers should back up their business data and
files regularly. They can store the files on a USB stick or USB flash drive, they can be
ensured by simply testing whether the backup files are working or not.
Saving files in read-only mode
The farmers can make a simple move. The ransomware virus cannot attack the files
that are read-only. Therefore, they can make a trick and save their files in read-only mode, in
Blocking SMB inbound or outbound on the firewall: The ransomware virus
basically spread through Windows SMB services, so implementation and configuration of
firewall can mitigate the risk of ransomware.
Installation of antivirus software: Sicari et al., (2015) stated that the antivirus
software installation can help definitely help to fight against the ransomware, any basic
antivirus available in the market can secure the network from the potential attack of
ransomware virus.
2.3. The proposed better method that can benefit the farmers
i. Features that will provide security and enhance agriculture
The farmers must take the definite approaches discussed that will enhance the security
and also provide various farming facilities.
Installation of antivirus software
The farmers must install the antivirus software in their system and must keep it
updated; the software can definitely help them to stay away from the adverse effect of the
ransomware virus.
Backing up of important data and files
According to Anwar et al., (2014), the farmers should back up their business data and
files regularly. They can store the files on a USB stick or USB flash drive, they can be
ensured by simply testing whether the backup files are working or not.
Saving files in read-only mode
The farmers can make a simple move. The ransomware virus cannot attack the files
that are read-only. Therefore, they can make a trick and save their files in read-only mode, in
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10INTERNET OF THINGS
this way they can protect their files and they do not have to pay a large amount to the
intruders.
ii. The Model Diagram to simulate the IoT model for agriculture and farmers
Fig 1: General Overview of IoT working
(Source: Anwar et al., 2014, pp- 1224-1227)
According to Anwar et al., 2014, the above model demonstrates how IoT works. The
model gives a general overview of a secured connection established between IoT devices, IoT
server and the IoT-Ticket Dashboard. This ensures secure data transmission and protection
from ransomware.
this way they can protect their files and they do not have to pay a large amount to the
intruders.
ii. The Model Diagram to simulate the IoT model for agriculture and farmers
Fig 1: General Overview of IoT working
(Source: Anwar et al., 2014, pp- 1224-1227)
According to Anwar et al., 2014, the above model demonstrates how IoT works. The
model gives a general overview of a secured connection established between IoT devices, IoT
server and the IoT-Ticket Dashboard. This ensures secure data transmission and protection
from ransomware.

11INTERNET OF THINGS
Fig 2: IoT Infrastructure
(Source: Sicari et al., 2015, pp-146-164)
Sicari et al., 2015 showcased the above model that demonstrates the sensors
integrated with data storage and in between the IoT structure which provides the network
security. From this image, the underlying structure can be seen.
Fig 3: IoT Reference Architecture in accordance to agriculture
Fig 2: IoT Infrastructure
(Source: Sicari et al., 2015, pp-146-164)
Sicari et al., 2015 showcased the above model that demonstrates the sensors
integrated with data storage and in between the IoT structure which provides the network
security. From this image, the underlying structure can be seen.
Fig 3: IoT Reference Architecture in accordance to agriculture
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 16
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.