| Literature DB >> 35591211 |
Adel N Alahmadi1, Saeed Ur Rehman2, Husain S Alhazmi1, David G Glynn2, Hatoon Shoaib1, Patrick Solé3.
Abstract
The invention of smart low-power devices and ubiquitous Internet connectivity have facilitated the shift of many labour-intensive jobs into the digital domain. The shortage of skilled workforce and the growing food demand have led the agriculture sector to adapt to the digital transformation. Smart sensors and systems are used to monitor crops, plants, the environment, water, soil moisture, and diseases. The transformation to digital agriculture would improve the quality and quantity of food for the ever-increasing human population. This paper discusses the security threats and vulnerabilities to digital agriculture, which are overlooked in other published articles. It also provides a comprehensive review of the side-channel attacks (SCA) specific to digital agriculture, which have not been explored previously. The paper also discusses the open research challenges and future directions.Entities:
Keywords: cryptography; digital agriculture; power analysis attack; security threats; side-channel attacks; smart agriculture; smart farming; vulnerability analysis
Mesh:
Year: 2022 PMID: 35591211 PMCID: PMC9105922 DOI: 10.3390/s22093520
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1An overview of digital agriculture and its various applications.
Typical threats to digital agriculture and countermeasures.
| Sensing/Actuation | Gateway | Storage | User | |
|---|---|---|---|---|
| Description | Threats are related to hardware, physical access, damage, firmware/hardware modification, or the wrong actuation to destroy crops. | Threats are related to data in transit and involve network devices and communication protocols. Vulnerabilities can be exploited to sniff out and access data, leading to diverse attacks. | Threats are related to data at rest, either in the cloud or on-premises. The compromise of data could lead to IP theft. | The end-user interface is at Layer 4, and the compromise of credentials through social engineering or malware injection could compromise the whole system. |
| Threats | Physical attacks, device/sensor or firmware alteration [ | Protocol vulnerabilities [ | SQL injection, data privacy, IP theft, encryption, confidentiality and integrity, cloud malware injection [ | Social engineering, phishing, access control, service interruption, insider attacks |
|
Countermeasures
Periodic assessment of devices including vulnerabilities, auditing, penetration testing Firmware/software update mechanism to patch security vulnerabilities End-to-end encrypted communication including encrypted drives to keep data inaccessible in the case of device theft Two-factor authentication and secure password recovery mechanisms Block unnecessary services and ports on the devices Avoid device tampering with a physically unclonable function Adaption of a zero-trust model assuming a perimeter-less network | ||||
Figure 2Side-channel attacks for a typical digital agriculture application.
Side-channel attacks’ classification and implications for digital agriculture.
| SCA Threats | Method and Techniques | Explanation | Implication to DigAg |
|---|---|---|---|
| Microarchitectural (MA) [ | Speculative execution, branch prediction, data flow analysis, reverse engineering | Malicious user compromises the vulnerability in hardware and software optimisation features of the computer system (CPU, GPU) to reveal secret information. | Most of the equipment is deployed remotely. Therefore, reverse engineering and MA techniques could be used to compromise secret keys. |
| Power usage [ | Simple power analysis, correlation power analysis, differential power
analysis, USB power analysis [ | Electronic components utilise energy to execute different instructions. The analysis of energy consumption to execute different instructions can be used to extract secret information. | Like MA, voltage and current analysis could be easily carried out with physical access to the devices. |
| Electromagnetic emission [ | EM fault induction, EM disturbance, EM correlation analysis | Electromagnetic emission is related to power usage. Frequency and amplitude are additional information revealed in EM. | Both physical and remote attacks are possible with EM emissions’ analysis. |
| Clock timing [ | Timing analysis including differential timing, evict and reload, flush and reload, prime, and count | Clock timing is related to MA side-channel attacks, where internal clock timing analysis could be used to time the execution of an instruction or access the memory. | DigAg applications are deployed in a hostile unmonitored environment. Physically compromising the devices would make it easy to recover secret keys using MA, EM, power usage, and clock timing. |
| Cryptographic operation [ | Crypto algorithm attacks [ | Cryptographic algorithms are implemented in hardware or software. MA, EM, power usage, or machine learning could reveal public or private keys. | A combination of MA, EM, power usage, or machine learning techniques can be used to extract secret keys used in public and private cryptography. |
| Memory operations [ | Memory deduplication [ | Memory deduplication is a virtualisation technique in which the same contents across the pages are shared between processors. | Recovery of memory traces by physically accessing the devices used in DigAg applications. |
| User interaction [ | Gesture inference, keystroke inference, reflective inference, | User interaction with devices could be used to infer secret information. e.g., how keys are pressed or different gestures while using the device. | These threats are related to users and using the devices to access the DigAg applications. |
| Acoustic [ | Noise inference [ | Audio leakage of keystrokes, voice recording for voice authentication are some examples | Hardware bugs to record the acoustic data and exfiltrate for later analysis |
| Virtualisation interface [ | Multi-tenant cross-talk [ | The same physical resource is shared among different applications, and the attackers could recover memory traces. | These SCA threats are related to applications and data hosted on the cloud and can lead to IP, PII, and commercial data theft. |
| Network interface [ | LED interface, light induction | Physically clamping to the network card or eavesdropping on the wireless communication | Identifying communicating parties—from sending and receiving patterns, behavioural profiling to improve fingerprinting for marketing reasons |
| Thermal Dissipation [ | Thermal pattern correlation | Measuring thermal dissipation and correlating it to the workload in the hardware during the execution of instructions. | Thermal cameras and heat maps can be used alongside other SCA techniques on DigAg devices |