{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:39:13Z","timestamp":1759970353885,"version":"build-2065373602"},"reference-count":54,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T00:00:00Z","timestamp":1737072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Intelligent precision agriculture incorporates a number of Internet of Things (IoT) devices and drones to supervise agricultural activities and surroundings. The collected data are then forwarded to processing centers to facilitate crucial decisions. This can potentially help optimize the usage of agricultural resources and thwart disasters, enhancing productivity and profitability. To facilitate monitoring and decision, the smart devices in precision agriculture must exchange massive amounts of data across the open wireless communication channels. This inadvertently introduces a number of vulnerabilities, exposing the collected data to numerous security and privacy threats. To address these issues, massive security solutions have been introduced to secure the communication process in precision agriculture. However, most of the current security solutions either fail to offer perfect protection or are inefficient. In this paper, a scheme deploying efficient cryptographic primitives such as hashing, exclusive OR and random number generators is presented. We utilize the Burrows\u2013Abadi\u2013Needham (BAN) logic to demonstrate the verifiable security of the negotiated session keys. In addition, we execute an extensive semantic analysis which reveals the robustness of our scheme against a myriad of threats. Moreover, comparative performance evaluations demonstrate its computation overheads and energy consumption efficiency.<\/jats:p>","DOI":"10.3390\/cryptography9010007","type":"journal-article","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T12:32:52Z","timestamp":1737376372000},"page":"7","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Scheme for Secure Signaling and Data Exchanges in Intelligent Precision Agriculture"],"prefix":"10.3390","volume":"9","author":[{"given":"Thekaa Ali","family":"Kadhim","sequence":"first","affiliation":[{"name":"Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq"}]},{"given":"Zaid Ameen","family":"Abduljabbar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq"},{"name":"Department of Business Management, Al-Imam University College, Balad 34011, Iraq"},{"name":"Shenzhen Institute, Huazhong University of Science and Technology, Shenzhen 518000, China"}]},{"given":"Hamid Ali Abed","family":"AL-Asadi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq"}]},{"given":"Vincent Omollo","family":"Nyangaresi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, Jaramogi Oginga Odinga University of Science and Technology, Bondo 40601, Kenya"},{"name":"Department of Applied Electronics, Saveetha School of Engineering, SIMATS, Chennai 602105, India"}]},{"given":"Zahraa Abdullah","family":"Ali","sequence":"additional","affiliation":[{"name":"Department of Cyber Security, Al-Kunooz University College, Basrah 61004, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8068-5710","authenticated-orcid":false,"given":"Iman Qays","family":"Abduljaleel","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq"}]}],"member":"1968","published-online":{"date-parts":[[2025,1,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"105476","DOI":"10.1016\/j.compag.2020.105476","article-title":"Integrating Blockchain and the Internet of Things in Precision Agriculture: Analysis, Opportunities, and Challenges","volume":"178","author":"Torky","year":"2020","journal-title":"Comput. Electron. Agric."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Fathy, C., and Ali, H.M. (2023). A Secure IoT-Based Irrigation System for Precision Agriculture Using the Expeditious Cipher. Sensors, 23.","DOI":"10.3390\/s23042091"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1109\/TIFS.2022.3231121","article-title":"Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks","volume":"18","author":"Vangala","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"52815","DOI":"10.1109\/ACCESS.2024.3386552","article-title":"PAMICRM: Improving Precision Agriculture through Multimodal Image Analysis for Crop Water Requirement Estimation Using Multidomain Remote Sensing Data Samples","volume":"12","author":"Munaganuri","year":"2024","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"100444","DOI":"10.1016\/j.atech.2024.100444","article-title":"Web-Based Spatial Decision Support System for Precision Agriculture: A Tool for Delineating Dynamic Management Unit Zones (MUZs)","volume":"8","author":"Lanucara","year":"2024","journal-title":"Smart Agric. Technol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"e4218","DOI":"10.1002\/ett.4218","article-title":"An Improved Privacy Preserving Remote User Authentication Scheme for Agricultural Wireless Sensor Network","volume":"32","author":"Rangwani","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Abduljabbar, Z.A., Nyangaresi, V.O., Jasim, H.M., Ma, J., Hussain, M.A., Hussien, Z.A., and Aldarwish, A.J.Y. (2023). Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture. Sustainability, 15.","DOI":"10.3390\/su151310264"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"100300","DOI":"10.1016\/j.nexus.2024.100300","article-title":"Leveraging Precision Agriculture Techniques Using UAVs and Emerging Disruptive Technologies","volume":"14","author":"Raj","year":"2024","journal-title":"Energy Nexus"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"e24224","DOI":"10.1016\/j.heliyon.2024.e24224","article-title":"Optimizing QoS and Security in Agriculture IoT Deployments: A Bioinspired Q-Learning Model with Customized Shards","volume":"10","author":"Sonavane","year":"2024","journal-title":"Heliyon"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"102406","DOI":"10.1109\/ACCESS.2022.3208146","article-title":"FuzzDocs: An Automated Security Evaluation Framework for IoT","volume":"10","author":"You","year":"2022","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"101362","DOI":"10.1109\/ACCESS.2022.3207472","article-title":"A Novel Architectural Framework on IoT Ecosystem, Security Aspects and Mechanisms: A Comprehensive Survey","volume":"10","author":"Bouzidi","year":"2022","journal-title":"IEEE Access"},{"key":"ref_12","first-page":"101946","article-title":"Hybrid Blockchain-Based Many-to-Many Cross-Domain Authentication Scheme for Smart Agriculture IoT Networks","volume":"36","author":"Luo","year":"2024","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Mutlaq, K.A.-A., Nyangaresi, V.O., Omar, M.A., Abduljabbar, Z.A., Abduljaleel, I.Q., Ma, J., and Al Sibahee, M.A. (2024). Low Complexity Smart Grid Security Protocol Based on Elliptic Curve Cryptography, Biometrics and Hamming Distance. PLoS ONE, 19.","DOI":"10.1371\/journal.pone.0296781"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Huang, H., Zhou, S., Lin, J., Zhang, K., and Guo, S. (2020, January 7\u201311). Bridge the Trustworthiness Gap amongst Multiple Domains: A Practical Blockchain-Based Approach. Proceedings of the ICC 2020\u20142020 IEEE International Conference on Communications (ICC), Dublin, Ireland.","DOI":"10.1109\/ICC40277.2020.9148828"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1109\/JCN.2019.000043","article-title":"An Intelligent Agriculture Network Security System Based on Private Blockchains","volume":"21","author":"Wu","year":"2019","journal-title":"J. Commun. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"10792","DOI":"10.1109\/JIOT.2021.3050676","article-title":"Smart Contract-Based Blockchain-Envisioned Authentication Scheme for Smart Farming","volume":"8","author":"Vangala","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"9296","DOI":"10.1109\/ACCESS.2021.3050112","article-title":"Smart Contract-Based Agricultural Food Supply Chain Traceability","volume":"9","author":"Wang","year":"2021","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"103567","DOI":"10.1016\/j.csi.2021.103567","article-title":"Private Blockchain-Envisioned Drones-Assisted Authenti-Cation Scheme in IoT-Enabled Agricultural Environment","volume":"80","author":"Bera","year":"2022","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2409","DOI":"10.1109\/TNSM.2022.3146929","article-title":"A Cross-Domain Authentication Scheme Based on Cooperative Blockchains Functioning with Revocation for Medical Consortiums","volume":"19","author":"Xue","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1109\/JSAC.2020.2980916","article-title":"Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT","volume":"38","author":"Shen","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"8078","DOI":"10.1109\/JIOT.2021.3107443","article-title":"A Blockchain-Based Multidomain Authentication Scheme for Conditional Privacy Preserving in Vehicular Ad-Hoc Network","volume":"9","author":"Yang","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"101877","DOI":"10.1016\/j.sysarc.2020.101877","article-title":"Blockchain-Based Batch Authentication Protocol for Internet of Vehicles","volume":"113","author":"Bagga","year":"2021","journal-title":"J. Syst. Arch."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Nyangaresi, V.O., Jasim, H.M., Mutlaq, K.A.A., Abduljabbar, Z.A., Ma, J., Abduljaleel, I.Q., and Honi, D.G. (2023). A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles. Electronics, 12.","DOI":"10.3390\/electronics12173688"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.future.2017.06.018","article-title":"A Secure User Authentication and Key-Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring","volume":"84","author":"Ali","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Chen, M., Lee, T.-F., and Pan, J.-I. (2019). An Enhanced Lightweight Dynamic PseudonymIdentity Based Authentication and Key AgreementScheme Using Wireless Sensor Networks for Agriculture Monitoring. Sensors, 19.","DOI":"10.3390\/s19051146"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Alyahya, S., Khan, W.U., Ahmed, S., Marwat, S.N.K., and Habib, S. (2022). Cyber Secure Framework for Smart Agriculture: Robust and Tamper-Resistant Authentication Scheme for IoT Devices. Electronics, 11.","DOI":"10.3390\/electronics11060963"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Bothe, A., Bauer, J., and Aschenbruck, N. (2019, January 25\u201327). RFID-Assisted Continuous User Authentication for IoT-Based Smart Farming. Proceedings of the 2019 IEEE International Conference on RFID Technology and Applications (RFID-TA), Pisa, Italy.","DOI":"10.1109\/RFID-TA.2019.8892140"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Hussien, Z.A., Abdulmalik, H.A., Hussain, M.A., Nyangaresi, V.O., Ma, J., Abduljabbar, Z.A., and Abduljaleel, I.Q. (2023). Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems. Appl. Sci., 13.","DOI":"10.3390\/app13020691"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"12947","DOI":"10.1109\/JIOT.2021.3063806","article-title":"Authentication and Key Management in Distributed IoT Using Blockchain Technology","volume":"8","author":"Panda","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"e6187","DOI":"10.1002\/cpe.6187","article-title":"Provably Secure Signature-based Anonymous User Authentication Protocol in an Internet of Things-enabled Intelligent Precision Agricultural Environment","volume":"35","author":"Vangala","year":"2021","journal-title":"Concurr. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"4275243","DOI":"10.1155\/2022\/4275243","article-title":"A Cost Effective Identi-Ty-Based Authentication Scheme for Internet of Things-Enabled Agriculture","volume":"2022","author":"Hassan","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"101948","DOI":"10.1016\/j.adhoc.2019.101948","article-title":"Enhanced Authentication and Key Management Scheme for Securing Data Transmission in the Internet of Things","volume":"94","author":"Harbi","year":"2019","journal-title":"Ad Hoc Netw."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Yuan, E., Wang, L., Cheng, S., Ao, N., and Guo, Q. (2020). A Key Management Scheme Based on Pairing-Free Identity Based Digital Signature Algorithm for Heterogeneous Wireless Sensor Networks. Sensors, 20.","DOI":"10.3390\/s20061543"},{"key":"ref_34","first-page":"102648","article-title":"A Provably Secure Dynamic ID-Based Authenticated Key Agreement Framework for Mobile Edge Computing without a Trusted Party","volume":"55","author":"Mishra","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"3699","DOI":"10.1007\/s10586-022-03585-4","article-title":"An Enhanced Smart Card and Dynamic ID Based Remote Multi-Server User Authentication Scheme","volume":"25","author":"Andola","year":"2022","journal-title":"Cluster Comput."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1732","DOI":"10.1109\/JSYST.2020.3004551","article-title":"A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments","volume":"15","author":"Gupta","year":"2021","journal-title":"IEEE Syst. J."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2022\/9403986","article-title":"Risk-Based Dynamic Identity Authentication Method Based on the UCON Model","volume":"2022","author":"Liu","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"14253","DOI":"10.1109\/JIOT.2023.3340259","article-title":"Two-Factor Privacy Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks","volume":"11","author":"Sibahee","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_39","first-page":"1","article-title":"Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments","volume":"2021","author":"Li","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","article-title":"A Robust ECC-Based Provable Secure Authen-Tication Protocol with Privacy Preserving for Industrial Internet of Things","volume":"14","author":"Li","year":"2017","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_41","first-page":"102802","article-title":"EASBF: An Efficient Authentication Scheme over Blockchain for Fog Computing-Enabled Internet of Vehicles","volume":"59","author":"Eddine","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1007\/s10586-021-03420-2","article-title":"Blockchain-Assisted Authentication and Key Agreement Scheme for Fog-Based Smart Grid","volume":"25","author":"Tomar","year":"2022","journal-title":"Clust. Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"67787","DOI":"10.1109\/ACCESS.2022.3185016","article-title":"CKMIB: Construction of Key Agreement Protocol for Cloud Medical Infrastructure Using Blockchain","volume":"10","author":"Itoo","year":"2022","journal-title":"IEEE Access"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"21838","DOI":"10.1109\/JIOT.2022.3181609","article-title":"A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things","volume":"9","author":"Jia","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.comcom.2020.06.012","article-title":"A Secure Authentication Scheme with Forward Secrecy for Industrial Internet of Things Using Rabin Cryptosystem","volume":"160","author":"Shuai","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"102112","DOI":"10.1016\/j.sysarc.2021.102112","article-title":"A Secure and Efficient Authentication and Data Sharing Scheme for Internet of Things Based on Blockchain","volume":"117","author":"Fan","year":"2021","journal-title":"J. Syst. Arch."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Mutlaq, K.A.A., Nyangaresi, V.O., Omar, M.A., and Abduljabbar, Z.A. (2022). Symmetric Key Based Scheme for Veri-Fication Token Generation in Internet of Things Communication Environment. EAI International Conference on Applied Cryptography in Computer and Communications, Springer Nature.","DOI":"10.1007\/978-3-031-17081-2_4"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Khalid, H., Hashim, S.J., Ahmad, S.M.S., Hashim, F., and Chaudhary, M.A. (2021). Robust Multi-Gateway Authentication Scheme for Agriculture Wireless Sensor Network in Society 5.0 Smart Communities. Agriculture, 11.","DOI":"10.3390\/agriculture11101020"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"e335","DOI":"10.1002\/spy2.335","article-title":"A Robust and Secure User Authentication Scheme Based on Multifactor and Multi-gateway in IoT Enabled Sensor Networks","volume":"7","author":"Kumar","year":"2024","journal-title":"Secur. Priv."},{"key":"ref_50","first-page":"49062","article-title":"SEMS-5G: A Secure and Efficient Multi-Server Authentication Scheme for 5G Networks","volume":"12","author":"Irshad","year":"2024","journal-title":"IEEE Access"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"102310","DOI":"10.1016\/j.rineng.2024.102310","article-title":"Enhancing Security and Privacy in Smart Agriculture: A Novel Homomorphic Signcryption System","volume":"22","author":"Taji","year":"2024","journal-title":"Results Eng."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"56875","DOI":"10.1109\/ACCESS.2023.3280542","article-title":"A Secure and Privacy-Preserving Lightweight Authentication and Key Exchange Algorithm for Smart Agriculture Monitoring System","volume":"11","author":"Itoo","year":"2023","journal-title":"IEEE Access"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"100154","DOI":"10.1016\/j.hcc.2023.100154","article-title":"Provably Secure Authentication Protocol for Traffic Exchanges in Unmanned Aerial Vehicles","volume":"3","author":"Nyangaresi","year":"2023","journal-title":"High-Confid. Comput."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1007\/s42979-022-01300-z","article-title":"Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey","volume":"3","author":"Bahache","year":"2022","journal-title":"SN Comput. Sci."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/1\/7\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T10:30:51Z","timestamp":1759919451000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/1\/7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,17]]},"references-count":54,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["cryptography9010007"],"URL":"https:\/\/doi.org\/10.3390\/cryptography9010007","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2025,1,17]]}}}