A Cost Effective Identity-Based Authentication Scheme for Internet of Things-Enabled Agriculture

The Internet of Things (IoT) has revolutionized practically every industry, including agriculture, due to its fast expansion and integration into other industries. The application of IoT in agriculture motivates farmers to use their resources wisely and allows for better field monitoring and decisio...

Full description

Saved in:
Bibliographic Details
Published inWireless communications and mobile computing Vol. 2022; pp. 1 - 12
Main Authors Hassan, Bilal, AlSanad, Abeer Abdulaziz, Ullah, Insaf, Amin, Noor Ul, Khan, Muhammad Asghar, Uddin, M. Irfan, Wu, Jimmy Ming-Tai
Format Journal Article
LanguageEnglish
Published Oxford Hindawi 25.04.2022
Hindawi Limited
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The Internet of Things (IoT) has revolutionized practically every industry, including agriculture, due to its fast expansion and integration into other industries. The application of IoT in agriculture motivates farmers to use their resources wisely and allows for better field monitoring and decision-making, resulting in increased agricultural productivity. Because IoT-enabled agriculture systems need the use of various types of sensors that collect data (such as soil moisture and humidity) and then transmit it over the network. IoT-based agriculture systems, on the other hand, are always vulnerable to security threats. Authentication is one of the assured options for addressing the security concern, since it only enables an authorized party to access the data. Existing authentication schemes typically use the Rivest-Shamir-Adleman (RSA) algorithm and elliptic curve cryptography (ECC), which has a greater computational and communication cost. Furthermore, the security of the majority of existing authentication schemes is not verified using any security tool. As a result, we propose an identity-based authentication scheme for IoT-enabled agriculture in this article. To ensure that our scheme is cost-effective, we employ hyperelliptic curve cryptography (HECC). Our scheme surpasses existing authentication schemes in terms of computational cost and communication overhead while providing better security, according to a thorough investigation of performance and security.
ISSN:1530-8669
1530-8677
DOI:10.1155/2022/4275243