Cyber Attacks on Smart Farming Infrastructure

dc.contributor.authorSontowski, Sina
dc.contributor.authorGupta, Maanak
dc.contributor.authorChukkapalli, Sai Sree Laya
dc.contributor.authorAbdelsalam, Mahmoud
dc.contributor.authorMittal, Sudip
dc.contributor.authorJoshi, Anupam
dc.contributor.authorSandhu, Ravi
dc.date.accessioned2020-08-27T15:34:26Z
dc.date.available2020-08-27T15:34:26Z
dc.date.issued2021-01-20
dc.description2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)
dc.description.abstractSmart farming also known as precision agriculture is gaining more traction for its promising potential to fulfill increasing global food demand and supply. In a smart farm, technologies and connected devices are used in a variety of ways, from finding the real-time status of crops and soil moisture content to deploying drones to assist with tasks such as applying pesticide spray. However, the use of heterogeneous internet-connected devices has introduced numerous vulnerabilities within the smart farm ecosystem. Attackers can exploit these vulnerabilities to remotely control and disrupt data flowing from/to on-field sensors and autonomous vehicles like smart tractors and drones. This can cause devastating consequences especially during a high-risk time, such as harvesting, where live-monitoring is critical. In this paper, we demonstrate a Denial of Service (DoS) attack that can hinder the functionality of a smart farm by disrupting deployed on-field sensors. In particular, we discuss a Wi-Fi deauthentication attack that exploits IEEE 802.11 vulnerabilities, where the management frames are not encrypted. A MakerFocus ESP8266 Development Board WiFiDeauther Monster is used to detach the connected Raspberry Pi from the network and prevent sensor data from being sent to the remote cloud. Additionally, this attack was expanded to include the entire network, obstructing all devices from connecting to the network. To this end, we urge practitioners to be aware of current vulnerabilities when deploying smart farming ecosystems and encourage the cybersecurity community to further investigate the domain-specific characteristics of smart farming.en_US
dc.description.urihttps://ieeexplore.ieee.org/document/9319032en_US
dc.format.extent9 pagesen_US
dc.genreconference papers and proceedingsen_US
dc.genrepreprints
dc.identifierdoi:10.13016/m27qm3-eqa1
dc.identifier.citationSina Sontowski et al., Cyber Attacks on Smart Farming Infrastructure, 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC), 20 january, 2021; https://doi.org/10.1109/CIC50333.2020.00025en_US
dc.identifier.urihttp://hdl.handle.net/11603/19525
dc.identifier.urihttps://doi.org/10.1109/CIC50333.2020.00025
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2021 IEEE.  Personal use of this material is permitted.  Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.subjectUMBC Ebiquity Research Group
dc.titleCyber Attacks on Smart Farming Infrastructureen_US
dc.typeTexten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
1031.pdf
Size:
5.96 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: