Unearthing the Synergy: Exploring Blockchain's Untapped Potential in Precision Agriculture IoT Networks
Abstract
The Internet of Things (IoT) has been more well-known in recent years as a result of the many services it provides and the extensive ways in which it is used in the area of science and technology. Some examples include smart agriculture and smart home gadgets. We currently live in a world that is filled with technologically advanced devices, and we make virtually constant use of them. Because of the growing number of users and the rising volume of data that is being shared, a significant quantity of sensitive information is now at risk of being compromised. Therefore, it is necessary to make certain that the channels through which data is being transferred should reach securely to the endpoint without compromising the data's integrity, confidentiality, or authentication, and that the data that reaches its destination should not be altered or tampered with in any way. In recent years, a significant new method known as blockchain has been established. This method has the potential to contribute to improvements in areas such security and trust, speed, visibility, immutability, and traceability. Because of these facts, the purpose of this study is to investigate the capabilities of the blockchain as well as the effectiveness of using it to address the rising concerns about the performance and security of IoT devices related with precision agriculture.
References
Business Horizons, vol. 58, no. 4, pp. 431– 440, Jul. 2015, doi: 10.1016/j.bushor.2015.03.008.
2. U. Bodkhe and S. Tanwar, “Secure data dissemination techniques for IoT applications: Research challenges
and opportunities,” in Software - Practice and Experience, Dec. 2021, vol. 51, no. 12, pp. 2469–2491. doi: 10.1002/spe.2811.
3. V. Bhuvaneswari and R. Porkodi, “The internet of things (IOT) applications and communication enabling technology standards: An overview,” in Proceedings - 2014 International Conference on Intelligent Computing
Applications, ICICA 2014, Nov. 2014, pp. 324–329. doi: 10.1109/ICICA.2014.73.
4. “Estimated data on number of IoT devices connected worldwide.” https://www.statista.com/statistics/ 1183457/IoT-connected-devices- worldwide/ (accessed Jan. 17, 2022).
5. P. Anand, Y. Singh, A. Selwal, P. K. Singh, R. A. Felseghi, and M. S. Raboaca, “IoVT: Internet of vulnerable things?
threat architecture, attack surfaces, and vulnerabilities in internet of things and its applications towards smart
grids,” Energies (Basel), vol. 13, no. 18, Sep. 2020, doi: 10.3390/en13184813.
6. S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, “A vision of IoT: Applications, challenges, and opportunities with
China Perspective,” IEEE Internet of Things Journal, vol. 1, no. 4. Institute of Electrical and Electronics Engineers
Inc., pp. 349–359, Aug. 01, 2014. doi: 10.1109/ JIOT.2014.2337336.
7. “Real world examples of IoT.” https://www.edureka.co/ blog/iot-applications/ (accessed Jan. 17, 2022).
8. P. Malhotra, Y. Singh, P. Anand, D. K. Bangotra, P. K. Singh, and W. C. Hong, “Internet of things: Evolution,
concerns and security challenges,” Sensors, vol. 21, no. 5, pp. 1–35, Mar. 2021, doi: 10.3390/s21051809.
9. H. Wu, H. Han, X. Wang, and S. Sun, “Research on Artificial IntelligenceE nhancing Internet of Things Security:
A Survey,” IEEE Access, vol. 8. Institute of Electrical and Electronics Engineers Inc., pp. 153826–153848, 2020.
doi: 10.1109/ACCESS.2020.3018170.
10. P. Anand, Y. Singh, A. Selwal, M. Alazab, S. Tanwar, and N. Kumar, “IoT vulnerability assessment for sustainable
computing: Threats, current solutions, and open challenges,” IEEE Access, vol. 8, pp. 168825–168853, 2020, doi: 10.1109/ACCESS.2020.3022842.
11. Y. Shah and S. Sengupta, “A survey on Classification of Cyber-attacks on IoT and IIoT devices,” in 2020
11th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2020, Oct. 2020, pp. 0406–0413. doi: 10.1109/UEMCON51285.2020.9298138.
12. M. Kamran, H. U. Khan, W. Nisar, M. Farooq, and S. U. Rehman, “Blockchain and Internet of Things: A bibliometric study,” Computers and Electrical Engineering, vol. 81, Jan. 2020, doi: 10.1016/j.compeleceng. 2019.106525.
13. B. Bhushan, C. Sahoo, P. Sinha, and A. Khamparia, “Unification of Blockchain and Internet of Things (BIoT):
requirements, working model, challenges and future directions,” Wireless Networks, vol. 27, no. 1, pp. 55– 90,
Jan. 2021, doi: 10.1007/s11276-020-02445-6.
14. M. Elhoseny, G. Ramírez-González, O. M. Abu-Elnasr, S. A. Shawkat, N. Arunkumar, and A. Farouk, “Secure Medical Data Transmission Model for IoT-Based Healthcare Systems,” IEEE Access, vol. 6, pp. 20596–20608, Mar.
2018, doi: 10.1109/ACCESS.2018.2817615.
15. M. Khari, A. K. Garg, A. H. Gandomi, R. Gupta, R. Patan, and B. Balusamy, “Securing Data in Internet of
Things (IoT) Using Cryptography and Steganography Techniques,” IEEE Transactions on Systems, Man, and
Cybernetics: Systems, vol. 50, no. 1, pp. 73–80, Jan. 2020, doi: 10.1109/TSMC.2019.2903785.
16. ICC 2019-2019 IEEE International Conference on Communications (ICC). IEEE, 2019.
17. A. Ostad-Sharif, H. Arshad, M. Nikooghadam, and D. Abbasinezhad-Mood, “Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme,” Future Generation Computer Systems, vol. 100, pp. 882–892, Nov. 2019, doi: 10.1016/j.future.2019.04.019.
18. H. T. T. Truong, M. Almeida, G. Karame, and C. Soriente, “Towards securea nd decentralized sharing of IoT data,” in Proceedings - 2019 2nd IEEE International Conference on Blockchain, Blockchain 2019, Jul. 2019, pp. 176–183. doi: 10.1109/Blockchain.2019.00031.
19. A. Karati, C. I. Fan, and R. H. Hsu, “Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices,” IEEE Internet of Things Journal, vol. 6, no. 6, pp. 10431–10440, Dec. 2019, doi: 10.1109/ JIOT.2019.2939204.
20. A. Seyfollahi and A. Ghaffari, “Reliable data dissemination for the Internet of Things using Harris hawks optimization,” Peer-to-Peer Networking and Applications, vol. 13, no. 6, pp. 1886–1902, Nov
21. S. P. Gochhayat et al., “Reliable and secure data transfer in IoT networks,” Wireless Networks, vol. 26, no.
8, pp. 5689–5702, Nov. 2020, doi: 10.1007/s11276- 019-02036-0.
22. X. Li and J. Wu, “Node-oriented secure data transmission algorithm based on iot system in social networks,” IEEE Communications Letters, vol. 24, no. 12,p p. 2898–2902, Dec. 2020, doi: 10.1109/LCOMM.2020.3017889.
23. M. A. Khan et al., “A Machine Learning Approach for Blockchain-Based Smart Home Networks Security,” IEEE Network, vol. 35, no. 3, pp. 223–229, May 2021, doi: 10.1109/MNET.011.2000514.
24. M. S. Mahdi, N. F. Hassan, and G. H. Abdul-Majeed, “An improved chacha algorithm for securing data on IoT
devices,” SN Applied Sciences, vol. 3, no. 4, Apr. 2021, doi: 10.1007/s42452-021-04425-7.
25. B. M. Pampapathi, M. Nageswara Guptha, and M. S. Hema, “Data distribution and secure data transmission
using IANFIS and MECC in IoT,” Journal of Ambient Intelligence and Humanized Computing, 2021, doi: 10.1007/s12652- 020-02792-4.
26. G. Manogaran, M. Alazab, P. M. Shakeel, and C. H. Hsu, “Blockchain Assisted Secure Data Sharing Model
for Internet of Things Based Smart Industries,” IEEE Transactions on Reliability, 2021, doi: 10.1109/ TR.2020.3047833.
27. V. S. Naresh, S. Reddi, S. Kumari, V. V. L. Divakar Allavarpu, S. Kumar, and M. H. Yang, “Practical Identity
Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things,” IEEE Access, vol. 9, pp. 21267–21278, 2021, doi: 10.1109/ ACCESS.2021.3055148.
28. Q. Miao, H. Lin, X. Wang, and M. M. Hassan, “Federated deep reinforcement learning based secure data sharing for Internet of Things,” Computer Networks, vol. 197, Oct. 2021, doi: 10.1016/j.comnet.2021.108327.
29. ICC 2019-2019 IEEE International Conference on Communications (ICC). IEEE, 2019.
30. U. Bodkhe et al., “Blockchain for Industry 4.0: A comprehensive review,” IEEE Access, vol. 8, pp. 79764–79800,
2020, doi: 10.1109/ACCESS.2020.2988579.
31. R. Malik, Y. Singh, Z. A. Sheikh, P. Anand, P. K. Singh, and T. C. Workneh, “An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems,” Journal of Advanced Transportation, vol. 2022, pp. 1–17, Apr. 2022, doi: 10.1155/2022/7892130.
32. P. Anand, Y. Singh, A. Selwal, P. K. Singh, and K. Z. Ghafoor, “IVQFIoT: Intelligent vulnerability quantification
framework for scoring internet of things vulnerabilities,” World,” 2019, pp. 171–191. doi: 10.1007/978-3-030-
01560-2_8.
35. M. Torky and A. E. Hassanein, “Integrating blockchain and the internet of things in precision agriculture:
Analysis, opportunities, and challenges,” Computers and Electronics in Agriculture, vol. 178. Elsevier B.V., Nov. 01, 2020. doi: 10.1016/j.compag.2020.105476.
36. K. Georgiou, S. Xavier-De-Souza, and K. Eder, “The IoT Energy Challenge: A Software Perspective,” IEEE
Embedded Systems Letters, vol. 10, no. 3. Institute of Electrical and Electronics Engineers Inc., pp. 53–56,
Sep. 01, 2018. doi: 10.1109/LES.2017.2741419.