{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:06:19Z","timestamp":1774598779431,"version":"3.50.1"},"reference-count":136,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2975142","type":"journal-article","created":{"date-parts":[[2020,2,19]],"date-time":"2020-02-19T21:32:17Z","timestamp":1582147937000},"page":"34564-34584","source":"Crossref","is-referenced-by-count":461,"title":["Security and Privacy in Smart Farming: Challenges and Opportunities"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9189-2478","authenticated-orcid":false,"given":"Maanak","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Mahmoud","family":"Abdelsalam","sequence":"additional","affiliation":[]},{"given":"Sajad","family":"Khorsandroo","sequence":"additional","affiliation":[]},{"given":"Sudip","family":"Mittal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.proche.2009.07.111"},{"key":"ref38","first-page":"27","article-title":"Opportunities for applications using 5G networks: Requirements, challenges, and outlook","author":"ding","year":"2018","journal-title":"Proc 7th Int Conf Telecommun Remote Sens (ICTRS)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2014.65"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803194"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.021"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.jnca.2016.01.010","article-title":"State-of-the-art, challenges, and open issues in the integration of Internet of Things and cloud computing","volume":"67","author":"d\u00edaz","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IBCAST.2014.6778179"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2014.14"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2011.12004"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.12720\/lnit.1.2.77-82"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700390"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700916"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/978-3-319-21837-3_67","article-title":"Security and privacy issues of fog computing: A survey","author":"yi","year":"2015","journal-title":"Proc Int Conf Wireless Algorithms Syst Appl"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760478"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2612584"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/3139243.3139250"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081071"},{"key":"ref100","first-page":"119","article-title":"Vulnerability assessment in the smart farming infrastructure through cyberattacks","author":"linsner","year":"2019","journal-title":"Proc GIL Annu Conf Digitization Agricult Enterprises Small Struct Regions Contradiction Terms"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/080416"},{"key":"ref51","first-page":"333","article-title":"Attribute-role-based hybrid access control in the Internet of Things","author":"kaiwen","year":"2014","journal-title":"Proc APWeb"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400436"},{"key":"ref58","article-title":"Secure V2V and V2I communication in intelligent transportation using cloudlets","author":"gupta","year":"2020","journal-title":"arXiv 2001 04041"},{"key":"ref57","article-title":"Secure cloud assisted smart cars and big data: Access control models and implementation","author":"gupta","year":"2018"},{"key":"ref56","article-title":"Secure cloud assisted smart cars using dynamic groups and attribute based access control","author":"gupta","year":"2019","journal-title":"arXiv 1908 08112"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300048"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205994"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.02.006"},{"key":"ref52","first-page":"1","article-title":"Distributed capability-based access control for the Internet of Things","volume":"3","author":"hernandez-ramos","year":"2013","journal-title":"J Internet Services Inf Secur"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592573"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.3920\/978-90-8686-888-9","author":"stafford","year":"2019","journal-title":"PRECISION AGRICULTURE &#x2018;13"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1257\/000282802320189177"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845467"},{"key":"ref5","first-page":"515","article-title":"Farmbeats: An IoT platform for data-driven agriculture","author":"vasisht","year":"2017","journal-title":"Proc USENIX Symp Netw Syst Design Implem (NSDI)"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"40","DOI":"10.3390\/horticulturae3020040","article-title":"Remote sensing for irrigation of horticultural crops","volume":"3","author":"alvino","year":"2017","journal-title":"Horticultura"},{"key":"ref49","first-page":"319","article-title":"An extended role based access control model for the Internet of Things","author":"zhang","year":"2010","journal-title":"Proc Int Conf Inf Netw Autom (ICINA)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.agsy.2017.01.023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cropro.2003.10.001"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.007"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2732516.2732523"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2015.108"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2013.6583465"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/S0168-1699(96)01301-4"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/bs.agron.2015.05.002"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2013.6642463"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.3920\/9789086865673_023","article-title":"Automatic on-line monitoring of animals by precision livestock farming","volume":"287","author":"berckmans","year":"2006","journal-title":"Livestock Production Science"},{"key":"ref127","article-title":"Creating cybersecurity knowledge graphs from malware after action reports","author":"piplai","year":"2019"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752338"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/2007183.2007189"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2011.5990537"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/NCETACS.2011.5751382"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170867"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587375"},{"key":"ref71","first-page":"1","article-title":"Botnet of things: Menace to Internet of Things","author":"tyagi","year":"2018","journal-title":"Proc 3rd Int Conf Comput Commun Netw Secur"},{"key":"ref128","article-title":"Thinking, fast and slow: Combining vector spaces and knowledge graphs","author":"mittal","year":"2017","journal-title":"arXiv 1708 03310"},{"key":"ref70","first-page":"1093","article-title":"Understanding the Mirai botnet","author":"antonakakis","year":"2017","journal-title":"Proc 26th USENIX Security Symp (USENIX Security)"},{"key":"ref76","article-title":"Security in precision agriculture: Vulnerabilities and risks of agricultural systems","author":"window","year":"2019"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00050"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/IS.2018.8710531"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.foodcont.2013.11.007"},{"key":"ref75","author":"santhana","year":"2017","journal-title":"Blockchain Risk Management&#x2013;Risk Functions Need to Play an Active Role in Shaping Blockchain Strategy"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2019.00018"},{"key":"ref134","first-page":"149","article-title":"Alda: Cognitive assistant for legal document analytics","author":"joshi","year":"2016","journal-title":"Proc AAAI Fall Symp"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2017.8169877"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-018-0635-3"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/LCNSymposium47956.2019.9000660"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1080\/10496505.2017.1417859"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840639"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2016.14"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3362168","article-title":"Decentralized trust management","volume":"53","author":"fan","year":"2020","journal-title":"ACM Comput Surv"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400437"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2019.8892140"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOTA.2017.8073638"},{"key":"ref64","author":"jahn","year":"2019","journal-title":"Cyber Risk and Security Implications in Smart Agriculture and Food Systems"},{"key":"ref65","year":"2019","journal-title":"United States___environmental Protection Agency"},{"key":"ref66","year":"2019","journal-title":"United States Department of Agriculture"},{"key":"ref67","year":"2019","journal-title":"European Union Department of Agriculture and Rural Development"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.23"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"812","DOI":"10.1126\/science.1185383","article-title":"Food security: The challenge of feeding 9 billion people","volume":"327","author":"godfray","year":"2010","journal-title":"Science"},{"key":"ref1","author":"roser","year":"2020","journal-title":"Future Population Growth"},{"key":"ref109","first-page":"318","article-title":"The ${\\mathrm {GURA}}_{G}$ administrative model for user and group attribute assignment","author":"gupta","year":"2016","journal-title":"Proc NSS"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.4337\/9781784717766.00019"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/2981546"},{"key":"ref94","first-page":"71","article-title":"Blockchain technology: Beyond bitcoin","volume":"2","author":"crosby","year":"2016","journal-title":"Applying Innovation"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/CISTI.2014.6877073"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/2994581"},{"key":"ref106","article-title":"Next-generation big data federation access control: A reference model","author":"awaysheh","year":"2019","journal-title":"arXiv 1912 11588"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.3389\/fbioe.2019.00063"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3084173"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.22434\/IFAMR2017.0045"},{"key":"ref90","article-title":"Cybersecurity in the Agrifood sector","author":"bogaardt","year":"2016"},{"key":"ref104","first-page":"63","article-title":"Object-tagged RBAC model for the Hadoop ecosystem","author":"gupta","year":"2017","journal-title":"Proc DBSec"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2018.023121167"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.tibtech.2017.10.012"},{"key":"ref111","first-page":"109","article-title":"Big data on a farm&#x2014;Smart farming","author":"sch\u00f6nfeld","year":"2018","journal-title":"Big Data in Context"},{"key":"ref112","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.jnca.2016.01.008","article-title":"A survey on data leakage prevention systems","volume":"62","author":"alneyadi","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/3180457.3180463"},{"key":"ref98","article-title":"Cybersecurity in food and agriculture","volume":"2","author":"cooper","year":"2015","journal-title":"Protecting our future"},{"key":"ref99","article-title":"Cyber-security knowledge and training needs of beginning farmers in Illinois","author":"spaulding","year":"2018"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.3390\/environments4030050"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/SEEDA-CECNSM.2019.8908411"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"6148","DOI":"10.1073\/pnas.1707462114","article-title":"Opinion: Smart farming is key to developing sustainable agriculture","volume":"114","author":"walter","year":"2017","journal-title":"Proc Nat Acad Sci USA"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1089\/153871304323146397"},{"key":"ref12","article-title":"Threats to precision agriculture","author":"boghossian","year":"2018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2780232"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOTA.2017.8073643"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.58"},{"key":"ref118","first-page":"366","article-title":"A survey of malware detection techniques based on machine learning","volume":"10","author":"merabet","year":"2019","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.26"},{"key":"ref82","first-page":"170","article-title":"Role of Internet of Things (IoT) with blockchain technology for the development of smart farming","volume":"14","author":"awan","year":"2019","journal-title":"J Mech Continua Math Sci"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2457918"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.8370870"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.tifs.2019.07.034"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700879"},{"key":"ref84","first-page":"1162","article-title":"A framework for blockchain based secure smart green house farming","author":"patil","year":"2017","journal-title":"Advances in Computer Science and Ubiquitous Computing"},{"key":"ref119","first-page":"381","article-title":"Online malware detection in cloud auto-scaling systems using shallow convolutional neural networks","author":"abdelsalam","year":"2019","journal-title":"Proc IFIP Annu Conf Data Appl Secur Privacy"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2012.6425313"},{"key":"ref83","article-title":"Agriculture on the blockchain: Sustainable solutions for food, farmers, and financing","author":"kim","year":"2018","journal-title":"Supply Chain Review"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"ref113","first-page":"3","article-title":"Future challenges for smart cities: Cyber-security and digital forensics","volume":"22","author":"baig","year":"2017","journal-title":"Investigative Radiology"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2009.03.003"},{"key":"ref80","first-page":"1","article-title":"Blockchain and IoT based food traceability system","volume":"24","author":"lin","year":"2018","journal-title":"Int J Inf Technol"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485970"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00028"},{"key":"ref89","first-page":"90","article-title":"A framework of cybersecurity approaches in precision agriculture","author":"chi","year":"2017","journal-title":"Proc 5th Int Conf Manage Leadership Governance (ICMLG)"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.90"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref123","first-page":"96","article-title":"Online detection of utility cloud anomalies using metric distributions","author":"wang","year":"2010","journal-title":"Proc IEEE Netw Operat Manage Symp (NOMS)"},{"key":"ref85","first-page":"1","article-title":"Design and implementation of IOT based smart security and monitoring for connected smart farming","volume":"179","author":"shabadi","year":"2018","journal-title":"Int J Comput Appl"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.12720\/joace.2.2.115-118"},{"key":"ref87","article-title":"Edge AI in smart farming IoT: CNNs at the edge and fog computing with LoRa","author":"gia","year":"2019","journal-title":"Proc IEEE Africon"},{"key":"ref88","article-title":"Big data analysis for smart farming: Results of To2 project in theme food security","author":"kempenaar","year":"2016"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09003290.pdf?arnumber=9003290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T20:38:07Z","timestamp":1722458287000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9003290\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":136,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2975142","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}