Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3511616.3513102acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacswConference Proceedingsconference-collections
research-article

Visualization and Attack Prevention for a Sensor-Based Agricultural Monitoring System

Published: 21 March 2022 Publication History

Abstract

This project proposes a sensor-based visual agricultural monitoring system. Distinguished from traditional agricultural monitoring systems, this system further analyzes basic agricultural data, prevents attacks such as Jamming, Flooding, and Exhaustion, and monitors common wireless network attacks such as Selective Forwarding, Black Hole Attacks, Sinkhole Attacks, Flooding Attacks and Misdirection Attacks. Experimental verification and evaluation of the attack prevention and monitoring are also conducted.

References

[1]
Ian F Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci. 2002. Wireless sensor networks: a survey. Computer networks 38, 4 (2002), 393–422.
[2]
JL Avinash, KN Sunil Kumar, GB Arjun Kumar, GR Poornima, Ravi Gatti, and S Santosh Kumar. 2020. A Wireless Sensor Network Based Precision Agriculture. In 2020 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT). IEEE, 413–417.
[3]
Radhika Baskar, K Raja, Christeena Joseph, and M Reji. 2017. Sinkhole Attack in Wireless Sensor Networks-Performance Analysis and Detection Methods. Indian Journal of Science and Technology 10, 12 (2017), 1–8.
[4]
Ismail Butun, Patrik Österberg, and Houbing Song. 2019. Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures. IEEE Communications Surveys & Tutorials 22, 1 (2019), 616–644.
[5]
Erdal Cayirci and Chunming Rong. 2008. Security in wireless ad hoc and sensor networks. John Wiley & Sons.
[6]
Lipi Chhaya, Paawan Sharma, Govind Bhagwatikar, and Adesh Kumar. 2017. Wireless sensor network based smart grid communications: Cyber attacks, intrusion detection system and topology control. Electronics 6, 1 (2017), 5.
[7]
Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minghui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, and Yang Xiang. 2021. Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (2021).
[8]
Nitesh Gondwal and Chander Diwaker. 2013. Detecting blackhole attack in WSN by check agent using multiple base stations. American International Journal of Research in Science, Technology, Engineering & Mathematics 3, 2 (2013), 149–152.
[9]
Parli B Hari and Shailendra Narayan Singh. 2016. Security issues in Wireless Sensor Networks: Current research and challenges. In 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA)(Spring). IEEE, 1–6.
[10]
Navin G Haswani and Pramod J Deore. 2018. Web-based realtime underground drainage or sewage monitoring system using Wireless Sensor Networks. In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA). IEEE, 1–5.
[11]
Avishek Jana and Arindam Roy. 2019. AN ANALYSIS OF VARIOUS FUNCTION IN WIRELESS SENSOR NETWORK APPLIED IN PRECISION AGRICULTURE.International Journal of Advanced Research in Computer Science 10, 4(2019).
[12]
Chris Karlof and David Wagner. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc networks 1, 2-3 (2003), 293–315.
[13]
Manpreet Kaur and Amarvir Singh. 2016. Detection and mitigation of sinkhole attack in wireless sensor network. In 2016 International conference on micro-electronics and telecommunication engineering (ICMETE). IEEE, 217–221.
[14]
Shapla Khanam, Ismail Bin Ahmedy, Mohd Yamani Idna Idris, Mohamed Hisham Jaward, and Aznul Qalid Bin Md Sabri. 2020. A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things. IEEE Access 8(2020), 219709–219743.
[15]
Petr Kubicek, Jiri Kozel, Radim Stampach, and Vojtech Lukas. 2013. Prototyping the visualization of geographic and sensor data for agriculture. Computers and electronics in agriculture 97 (2013), 83–91.
[16]
HN Lakshmi, Santosh Anand, and Somnath Sinha. 2019. Flooding attack in wireless sensor network-analysis and prevention. International Journal of Engineering and Advanced Technology 8, 5(2019), 1792–1796.
[17]
P Rajendra Prasad, JL Avinash, GB Arjun Kumar, GR Poornima, S Santosh Kumar, and KN Sunil Kumar. 2020. IoT based Smart Water Quality Monitoring and Flow Control System. In 2020 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT). IEEE, 358–362.
[18]
Radomir Prodanović, Dejan Rančić, Ivan Vulić, Nenad Zorić, Dušan Bogićević, Gordana Ostojić, Sohail Sarang, and Stevan Stankovski. 2020. Wireless sensor network in agriculture: Model of cyber security. Sensors 20, 23 (2020), 6747.
[19]
Prasad P Rajendra, N Nataraja, and GB Arjun Kumar. 2020. IoT based Agriculture Flood Water Harvesting and Crop Assessment. In 2020 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT). IEEE, 368–372.
[20]
Mika Saari, A Muzaffar bin Baharudin, Pekka Sillberg, Sami Hyrynsalmi, and Wanglin Yan. 2018. LoRa—A survey of recent research trends. In 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 0872–0877.
[21]
Ayesha Siddique, Bhakti Prabhu, Aishwarya Chaskar, and Rasika Pathak. 2019. A review on intelligent agriculture service platform with lora based wireless sensor network. Life 100(2019), 7000.
[22]
Ruoxi Sun, Wei Wang, Minhui Xue, Gareth Tyson, Seyit Camtepe, and Damith C Ranasinghe. 2021. An empirical assessment of global COVID-19 contact tracing applications. In 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE). IEEE, 1085–1097.
[23]
Ruoxi Sun, Wei Wang, Minhui Xue, Gareth Tyson, and Damith C Ranasinghe. 2020. VenueTrace: a privacy-by-design COVID-19 digital contact tracing solution. In Proceedings of the 18th Conference on Embedded Networked Sensor Systems. 790–791.
[24]
Ruoxi Sun and Minhui Xue. 2020. Quality assessment of online automated privacy policy generators: an empirical study. In Proceedings of the Evaluation and Assessment in Software Engineering. 270–275.
[25]
KN SunilKumar 2017. A review on security and privacy issues in wireless sensor networks. In 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 1979–1984.
[26]
Yong Wang, Garhan Attebury, and Byrav Ramamurthy. 2006. A survey of security issues in wireless sensor networks. (2006).

Index Terms

  1. Visualization and Attack Prevention for a Sensor-Based Agricultural Monitoring System
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ACSW '22: Proceedings of the 2022 Australasian Computer Science Week
        February 2022
        260 pages
        ISBN:9781450396066
        DOI:10.1145/3511616
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 21 March 2022

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        ACSW 2022
        ACSW 2022: Australasian Computer Science Week 2022
        February 14 - 18, 2022
        Brisbane, Australia

        Acceptance Rates

        Overall Acceptance Rate 61 of 141 submissions, 43%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 41
          Total Downloads
        • Downloads (Last 12 months)3
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 30 Aug 2024

        Other Metrics

        Citations

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media