A Cost Effective Identity-Based Authentication Scheme for Internet of Things-Enabled Agriculture
The Internet of Things (IoT) has revolutionized practically every industry, including agriculture, due to its fast expansion and integration into other industries. The application of IoT in agriculture motivates farmers to use their resources wisely and allows for better field monitoring and decisio...
Saved in:
Published in | Wireless communications and mobile computing Vol. 2022; pp. 1 - 12 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
Oxford
Hindawi
25.04.2022
Hindawi Limited |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The Internet of Things (IoT) has revolutionized practically every industry, including agriculture, due to its fast expansion and integration into other industries. The application of IoT in agriculture motivates farmers to use their resources wisely and allows for better field monitoring and decision-making, resulting in increased agricultural productivity. Because IoT-enabled agriculture systems need the use of various types of sensors that collect data (such as soil moisture and humidity) and then transmit it over the network. IoT-based agriculture systems, on the other hand, are always vulnerable to security threats. Authentication is one of the assured options for addressing the security concern, since it only enables an authorized party to access the data. Existing authentication schemes typically use the Rivest-Shamir-Adleman (RSA) algorithm and elliptic curve cryptography (ECC), which has a greater computational and communication cost. Furthermore, the security of the majority of existing authentication schemes is not verified using any security tool. As a result, we propose an identity-based authentication scheme for IoT-enabled agriculture in this article. To ensure that our scheme is cost-effective, we employ hyperelliptic curve cryptography (HECC). Our scheme surpasses existing authentication schemes in terms of computational cost and communication overhead while providing better security, according to a thorough investigation of performance and security. |
---|---|
ISSN: | 1530-8669 1530-8677 |
DOI: | 10.1155/2022/4275243 |