Abstract
The adaptation of IoT-based technology in agriculture is increasing rapidly in recent times. IoT devices are of great assistance to farmers in monitoring dairy farms, greenhouses, and other agricultural facilities. The most crucial component of an IoT device is ensuring data security and privacy. Data leakage can have significant negative consequences as it may result in financial loss for farmers. It is important to prioritize data security to protect the interests of farmers and ensure the success of their agricultural endeavors. Blockchain technology can be a solution to secure data transactions in the network layer. With the concept of private and public key pairs, data hashing, and decentralized systems; important and sensitive data will be secured. In this study, we discuss the structure of a three-layer architecture for green IoT technology and identify the privacy issues presented in each layer. Then we propose a solution by implementing a secure Ethereum-based blockchain system for data transactions at the network layer.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Akkaş, M.A., Sokullu, R.: An IoT-based greenhouse monitoring system with Micaz motes. Procedia Comput. Sci., pp. 603–608 (2017). https://doi.org/10.1016/J.PROCS.2017.08.300
Ferrag, M.A., Shu, L., Yang, X., Derhab, A., Maglaras, L.: Security and privacy for green IoT-based agriculture: review, blockchain solutions, and challenges. IEEE Access, pp. 32031–32053 (2020). https://doi.org/10.1109/ACCESS.2020.2973178
Ding, S., Cao, J., Li, C., Fan, K., Li, H.: A novel attribute-based access control scheme using blockchain for IoT. IEEE Access, pp. 38431–38441 (2019). https://doi.org/10.1109/ACCESS.2019.2905846
Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A.: Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput. Secur. 15 (2018). https://doi.org/10.1016/j.cose.2018.03.011
Bader, A., Ghazzai, H., Kadri, A., Alouini, M.S.: Front-end intelligence for large-scale application-oriented internet-of-things. IEEE Access, pp. 3257–3272 (2016). https://doi.org/10.1109/ACCESS.2016.2580623
Sarkar, S., Chatterjee, S., Misra, S.: Assessment of the suitability of fog computing in the context of internet of things. IEEE Trans. Cloud Comput., pp. 46–59 (2018). https://doi.org/10.1109/TCC.2015.2485206
Varghese, B., Wang, N., Barbhuiya, S., Kilpatrick, P., Nikolopoulos, D.S.: Challenges and opportunities in edge computing. In: IEEE International Conference on Smart Cloud (SmartCloud), pp. 20–26 (2016). https://doi.org/10.1109/SmartCloud.2016.18
Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things. IEEE Internet of Things J., pp. 637–646 (2016). https://doi.org/10.1109/JIOT.2016.2579198
Mukherjee, M., Matam, R., Shu, L., Maglaras, L., Ferrag, M.A., Choudhury, N., Kumar, V.: Security and privacy in fog computing: challenges. IEEE Access, pp. 19293–19304 (2017). https://doi.org/10.1109/JIOT.2016.2579198
Kumar, V., Jain, A., Barwal, P.N.: Wireless sensor networks: security issues, challenges and solutions. Int. J. Inf. Comput. Technol. 4, 859–868 (2014)
Pathan, A.S.K., Lee, H.-W., Hong, C.S.: Security in wireless sensor networks: ıssues and challenges. In: International Conference Advanced Communication Technology, vol. 2, IEEE, Phoenix Park (2006). https://doi.org/10.1109/ICACT.2006.206151
Puthal, D., Mohanty, S.P., Bhavake, S.A., Morgan, G., Ranjan, R.: Fog computing security challenges and future directions [energy and security]. IEEE Cons. Electron. Mag. 8, 92–96 (2019). https://doi.org/10.1109/MCE.2019.2893674
Sen, J.: Security and privacy issues in cloud computing. In: Architectures and Protocols for Secure Information Technology Infrastructures, pp. 1–45 (2013). https://doi.org/10.4018/978-1-4666-4514-1.CH001
Schwenk, J., Gruschka, N., lo Iacono, L., Jensen, M.: On Technical Security Issues in Cloud Computing Security Analysis of End-to-End Encrypted Email View project USecureD-Usable Security by Design View project On Technical Security Issues in Cloud Computing (2009). https://doi.org/10.1109/CLOUD.2009.60
Shen, M., Tang, X., Zhu, L., Du, X., Guizani, M.: Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things 6, 7702–7712 (2019). https://doi.org/10.1109/JIOT.2019.2901840
Patel, S., Sahoo, A., Mohanta, B.K., Panda, S.S., Jena, D.: DAuth: a decentralized web authentication system using ethereum based blockchain. In: Proceedings—International Conference on Vision Towards Emerging Trends in Communication and Networking, ViTECoN (2019). https://doi.org/10.1109/VITECON.2019.8899393
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Alam, M.J., Choudhury, A., Al Maksud, K.S., Reza, A.W., Arefin, M.S. (2023). Blockchain in Concurrent Green IoT-Based Agriculture: Discussion, Analysis, and Implementation. In: Vasant, P., et al. Intelligent Computing and Optimization. ICO 2023. Lecture Notes in Networks and Systems, vol 853. Springer, Cham. https://doi.org/10.1007/978-3-031-50327-6_35
Download citation
DOI: https://doi.org/10.1007/978-3-031-50327-6_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-50326-9
Online ISBN: 978-3-031-50327-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)