{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T11:37:15Z","timestamp":1771501035994,"version":"3.50.1"},"reference-count":57,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T00:00:00Z","timestamp":1651708800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Deputyship for Research &amp; innovation, Ministry of Education in Saudi Arabia","award":["1129"],"award-info":[{"award-number":["1129"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The invention of smart low-power devices and ubiquitous Internet connectivity have facilitated the shift of many labour-intensive jobs into the digital domain. The shortage of skilled workforce and the growing food demand have led the agriculture sector to adapt to the digital transformation. Smart sensors and systems are used to monitor crops, plants, the environment, water, soil moisture, and diseases. The transformation to digital agriculture would improve the quality and quantity of food for the ever-increasing human population. This paper discusses the security threats and vulnerabilities to digital agriculture, which are overlooked in other published articles. It also provides a comprehensive review of the side-channel attacks (SCA) specific to digital agriculture, which have not been explored previously. The paper also discusses the open research challenges and future directions.<\/jats:p>","DOI":"10.3390\/s22093520","type":"journal-article","created":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T02:46:39Z","timestamp":1651805199000},"page":"3520","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":74,"title":["Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture"],"prefix":"10.3390","volume":"22","author":[{"given":"Adel N.","family":"Alahmadi","sequence":"first","affiliation":[{"name":"Department of Mathematics, Faculty of Science, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2159-865X","authenticated-orcid":false,"given":"Saeed Ur","family":"Rehman","sequence":"additional","affiliation":[{"name":"College of Science and Engineering, Flinders University, Adelaide, SA 5001, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7190-5884","authenticated-orcid":false,"given":"Husain S.","family":"Alhazmi","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Faculty of Science, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6399-7771","authenticated-orcid":false,"given":"David G.","family":"Glynn","sequence":"additional","affiliation":[{"name":"College of Science and Engineering, Flinders University, Adelaide, SA 5001, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1888-8154","authenticated-orcid":false,"given":"Hatoon","family":"Shoaib","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Faculty of Science, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"given":"Patrick","family":"Sol\u00e9","sequence":"additional","affiliation":[{"name":"I2M (Centrale Marseille, CNRS, Aix-Marseille University), 13009 Marseilles, France"}]}],"member":"1968","published-online":{"date-parts":[[2022,5,5]]},"reference":[{"key":"ref_1","unstructured":"Desa, U. (2019). United Nations, Department of Economic and Social Affairs, Population Division. World Population Prospects, United Nations. Available online: https:\/\/population.un.org\/wpp\/Publications\/Files\/WPP2019_10KeyFindings.pdf."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1038\/s41893-020-0510-0","article-title":"Digital agriculture to design sustainable agricultural systems","volume":"3","author":"Basso","year":"2020","journal-title":"Nat. Sustain."},{"key":"ref_3","unstructured":"Mathews, L. (2021, December 19). Florida Water Plant Hackers Exploited Old Software and Poor Password Habits. Available online: https:\/\/www.forbes.com\/sites\/leemathews\/2021\/02\/15\/florida-water-plant-hackers-exploited-old-software-and-poor-password-habits\/?sh=78dd125c334e."},{"key":"ref_4","unstructured":"Musotto, R., and Naser, M. (2021, December 19). Ransomware Attack on Sheep Farmers Shows There\u2019s No Room for Woolly Thinking in Cyber Security. Available online: https:\/\/theconversation.com\/ransomware-attack-on-sheep-farmers-shows-theres-no-room-for-woolly-thinking-in-cyber-security-132882."},{"key":"ref_5","unstructured":"Seselja, E. (2021, December 19). Cyber Attack Shuts Down Global Meat Processing Giant JBS. Available online: https:\/\/www.abc.net.au\/news\/2021-05-31\/cyber-attack-shuts-down-global-meat-processing-giant-jbs\/100178310."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"105776","DOI":"10.1016\/j.compag.2020.105776","article-title":"Requirements for cyber-security in agricultural communication networks","volume":"179","author":"Nikander","year":"2020","journal-title":"Comput. Electron. Agric."},{"key":"ref_7","unstructured":"Zahidi, S. (2022, January 19). The Global Risks Report 2022, 17th Edition. Available online: https:\/\/www3.weforum.org\/docs\/WEFTheGlobalRisksReport2022.pdf."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Nakhodchi, S., Dehghantanha, A., and Karimipour, H. (2020). Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis. Handbook of Big Data Privacy, Springer.","DOI":"10.1007\/978-3-030-38557-6_14"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Kristen, E., Kloibhofer, R., D\u00edaz, V.H., and Castillejo, P. (2021). Security Assessment of Agriculture IoT (AIoT) Applications. Appl. Sci., 11.","DOI":"10.3390\/app11135841"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Haas, R., and Hoffmann, C. (2020). Cyber Threats and Cyber Risks in Smart Farming, VDI Verlag.","DOI":"10.51202\/9783181023747-37"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Demestichas, K., Peppes, N., and Alexakis, T. (2020). Survey on Security Threats in Agricultural IoT and Smart Farming. Sensors, 20.","DOI":"10.3390\/s20226458"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Rosline, G.J., Rani, P., and Rajesh, D.G. (2022). Comprehensive Analysis on Security Threats Prevalent in IoT-Based Smart Farming Systems. Ubiquitous Intelligent Systems, Springer.","DOI":"10.1007\/978-981-16-3675-2_13"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Tudosa, I., Picariello, F., Balestrieri, E., Vito, L.D., and Lamonaca, F. (2019, January 4\u20136). Hardware Security in IoT era: The Role of Measurements and Instrumentation. Proceedings of the 2nd Workshop on Metrology for Industry 4.0 and IoT MetroInd4.0&IoT 2019, Naples, Italy.","DOI":"10.1109\/METROI4.2019.8792895"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Randolph, M., and Diehl, W. (2020). Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman. Cryptography, 4.","DOI":"10.3390\/cryptography4020015"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Devi, M., and Majumder, A. (2021). Side-Channel Attack in Internet of Things: A Survey. Applications of Internet of Things, Springer.","DOI":"10.1007\/978-981-15-6198-6_20"},{"key":"ref_16","unstructured":"Schimmelpfennig, D. (2016). Farm Profits and Adoption of Precision Agriculture, U.S. Department of Agriculture, Economic Research Services. Technical Report ERR-217."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1737","DOI":"10.1016\/j.agwat.2009.07.009","article-title":"A method for spatial prediction of daily soil water status for precise irrigation scheduling","volume":"96","author":"Hedley","year":"2009","journal-title":"Agric. Water Manag."},{"key":"ref_18","unstructured":"Salam, A. (2019, January 7\u201312). A path loss model for through the soil wireless communications in digital agriculture. Proceedings of the 2019 IEEE International Symposium on Antennas and Propagation (IEEE APS), Atlanta, GA, USA."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.still.2016.04.016","article-title":"Application of an on-line sensor to map soil packing density for site specific cultivation","volume":"162","author":"Shamal","year":"2016","journal-title":"Soil Tillage Res."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Katta, S., Ramatenki, S., and Sammeta, H. (2022). Smart irrigation and crop security in agriculture using IoT. AI, Edge and IoT-Based Smart Agriculture, Academic Press.","DOI":"10.1016\/B978-0-12-823694-9.00019-0"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Blender, T., Buchner, T., Fernandez, B., Pichlmaier, B., and Schlegel, C. (2016, January 24\u201327). Managing a mobile agricultural robot swarm for a seeding task. Proceedings of the IECON 2016-42nd Annual Conference of the IEEE Industrial Electronics Society, Florence, Italy.","DOI":"10.1109\/IECON.2016.7793638"},{"key":"ref_22","unstructured":"Weis, S. (2022, January 15). Protecting data in-use from firmware and physical attacks. Black Hat, Available online: https:\/\/www.blackhat.com\/docs\/us-14\/materials\/us-14-Weis-Protecting-Data-In-Use-From-Firmware-And-Physical-Attacks-WP.pdf."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"32031","DOI":"10.1109\/ACCESS.2020.2973178","article-title":"Security and privacy for green IoT-based agriculture: Review, blockchain solutions, and challenges","volume":"8","author":"Ferrag","year":"2020","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Madhurikkha, S., and Sabitha, R. (2016). An Efficient Integral Power-Elector Method with Enhanced AODV to Avoid Sleep Deprivation in Manet. Indian J. Sci. Technol., 9.","DOI":"10.17485\/ijst\/2016\/v9i21\/95140"},{"key":"ref_25","unstructured":"Whalen, S., Bishop, M., and Engle, S. (2005). Protocol Vulnerability Analysis, Department of Computer Science, University of California. Technical Report CSE-2005-04."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Bettayeb, M., Nasir, Q., and Talib, M.A. (2019, January 7\u20139). Firmware update attacks and security for IoT devices: Survey. Proceedings of the ArabWIC 6th Annual International Conference Research Track, Rabat, Morocco.","DOI":"10.1145\/3333165.3333169"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Osanaiye, O., Alfa, A.S., and Hancke, G.P. (2018). A statistical approach to detect jamming attacks in wireless sensor networks. Sensors, 18.","DOI":"10.3390\/s18061691"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Shaikh, A.A. (2016, January 3\u20135). Attacks on cloud computing and its countermeasures. Proceedings of the 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, India.","DOI":"10.1109\/SCOPES.2016.7955539"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13677-017-0098-8","article-title":"Classifying malware attacks in IaaS cloud environments","volume":"6","author":"Rakotondravony","year":"2017","journal-title":"J. Cloud Comput."},{"key":"ref_30","unstructured":"Borchi, J., Woodcock, M., Redshaw, M., and Raniga, B. (2021). Cyber Security Threats\u2014Are We Prepared? A Threat-Based Assessment of the Cyber Resilience of the Australian Agricultural Sector, AgriFutures Australia. Technical Report."},{"key":"ref_31","first-page":"1","article-title":"Ethics of using AI and big data in agriculture: The case of a large agriculture multinational","volume":"2","author":"Ryan","year":"2019","journal-title":"ORBIT J."},{"key":"ref_32","first-page":"398","article-title":"A blockchain maturity model in agricultural supply chain","volume":"8","author":"Ronaghi","year":"2021","journal-title":"Inf. Process. Agric."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.compind.2014.12.011","article-title":"A control model for object virtualization in supply chain management","volume":"68","author":"Verdouw","year":"2015","journal-title":"Comput. Ind."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Mylrea, M., and Gourisetti, S.N.G. (2018, January 20\u201323). Blockchain for supply chain cyber-security, optimization and compliance. Proceedings of the 2018 Resilience Week (RWS), Denver, CO, USA.","DOI":"10.1109\/RWEEK.2018.8473517"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Lou, X., Zhang, T., Jiang, J., and Zhang, Y. (2021). A survey of microarchitectural side-channel vulnerabilities, attacks and defenses in cryptography. arXiv.","DOI":"10.1145\/3456629"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Kocher, P.C. (1996). Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Annual International Cryptology Conference, Springer.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Johnson, A., and Ward, R. (2020, January 1\u20132). Introducing The \u2018Unified Side Channel Attack-Model\u2019(USCA-M). Proceedings of the 2020 8th International Symposium on Digital Forensics and Security (ISDFS), Beirut, Lebanon.","DOI":"10.1109\/ISDFS49300.2020.9116291"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"100007","DOI":"10.1016\/j.hcc.2021.100007","article-title":"USB Powered Devices: A Survey of Side-Channel Threats and Countermeasures","volume":"1","author":"Liu","year":"2021","journal-title":"High-Confid. Comput."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.diin.2019.03.002","article-title":"A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics","volume":"29","author":"Sayakkara","year":"2019","journal-title":"Digit. Investig."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s41635-017-0025-y","article-title":"A survey of side-channel attacks on caches and countermeasures","volume":"2","author":"Lyu","year":"2018","journal-title":"J. Hardw. Syst. Secur."},{"key":"ref_41","first-page":"388","article-title":"Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing","volume":"2005","author":"Zhou","year":"2005","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s13389-021-00257-8","article-title":"Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC","volume":"11","author":"Valencia","year":"2021","journal-title":"J. Cryptogr. Eng."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s13389-019-00212-8","article-title":"Applications of machine learning techniques in side-channel attacks: A survey","volume":"10","author":"Hettwer","year":"2020","journal-title":"J. Cryptogr. Eng."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Tiri, K. (2007, January 4\u20138). Side-channel attack pitfalls. Proceedings of the 2007 44th ACM\/IEEE Design Automation Conference, San Diego, CA, USA.","DOI":"10.1109\/DAC.2007.375044"},{"key":"ref_45","unstructured":"Suzaki, K., Iijima, K., Yagi, T., and Artho, C. (2011, January 23\u201326). Software side-channel attack on memory deduplication. Proceedings of the ACM Symposium on Operating Systems Principles (SOSP 2011), Poster Session, Cascais, Portugal."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Conti, M., Mancini, L.V., Spolaor, R., and Verde, N.V. (2015, January 2\u20134). Can\u2019t you hear me knocking: Identification of user actions on android apps via traffic analysis. Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA.","DOI":"10.1145\/2699026.2699119"},{"key":"ref_47","first-page":"307","article-title":"Acoustic Side-Channel Attacks on Printers","volume":"9","author":"Backes","year":"2010","journal-title":"USENIX Secur. Symp."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Compagno, A., Conti, M., Lain, D., and Tsudik, G. (2017, January 2\u20136). Don\u2019t skype & type! acoustic eavesdropping in voice-over-ip. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates.","DOI":"10.1145\/3052973.3053005"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2636242.2636244","article-title":"Predicting user traits from a snapshot of apps installed on a smartphone","volume":"18","author":"Seneviratne","year":"2014","journal-title":"ACM Sigmobile Mob. Comput. Commun. Rev."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/s10207-014-0264-7","article-title":"Keyboard acoustic side-channel attacks: Exploring realistic and security-sensitive scenarios","volume":"14","author":"Halevi","year":"2015","journal-title":"Int. J. Inf. Secur."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.4304\/jcp.9.4.1005-1013","article-title":"Mitigating cross-VM side-channel attack on multiple tenants cloud platform","volume":"9","author":"Liu","year":"2014","journal-title":"J. Comput."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Islam, M.A., Ren, S., and Wierman, A. (November, January 30). Exploiting a thermal side-channel for power attacks in multi-tenant data centers. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA.","DOI":"10.1145\/3133956.3133994"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"1930","DOI":"10.1109\/TVLSI.2021.3111407","article-title":"Applying Thermal Side-Channel Attacks on Asymmetric Cryptography","volume":"29","author":"Aljuffri","year":"2021","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","article-title":"Physical unclonable functions and applications: A tutorial","volume":"102","author":"Herder","year":"2014","journal-title":"Proc. IEEE"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the Internet of things for network forensic analytics: Bot-iot dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1186\/s42400-019-0038-7","article-title":"Survey of intrusion detection systems: Techniques, datasets and challenges","volume":"2","author":"Khraisat","year":"2019","journal-title":"Cybersecurity"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"17430","DOI":"10.1109\/JSEN.2020.3017695","article-title":"FPDP: Flexible privacy-preserving data publishing scheme for smart agriculture","volume":"21","author":"Song","year":"2020","journal-title":"IEEE Sens. J."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/9\/3520\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:06:31Z","timestamp":1760137591000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/9\/3520"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,5]]},"references-count":57,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2022,5]]}},"alternative-id":["s22093520"],"URL":"https:\/\/doi.org\/10.3390\/s22093520","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,5]]}}}