Acessibilidade / Reportar erro

Blockchain Based Secure Data Sharing in Precision Agriculture: a Comprehensive Methodology Incorporating Deep learning and Hybrid Encryption Model

Abstract

The precision agriculture discipline swiftly adopted blockchain as a key technology in numerous applications. From just smart farms to an internet of smart farms in precision farming, the Internet of Things (IoT) and blockchain is going to boost crop yield in precision agriculture. This proposed methodology presents a comprehensive approach for secure data sharing in precision agriculture. It integrates advanced techniques through multiple layers, including Data Collection, Data Preprocessing, Intelligent Analysis, Security, and Blockchain. IoT sensors collect data on soil moisture, temperature, humidity, crop health, and weather conditions. Preprocessing involves removing outliers, normalizing values, and extracting relevant features, then the required features are selected using the hybrid Sand Cat with Fire Hawk Algorithm (HSCFHA) which is the combination of standard Fire Hawk Optimization (FHO) and Sand Cat Swarm Optimization (SCSO). Deep learning models like Capsule Neural Network (CapsNet), Recurrent Neural Network (RNN), and Bi-directional Long Short-Term Memory (Bi-LSTM) networks provide valuable insights for prediction, classification, and anomaly detection. The blockchain layer establishes a decentralized and tamper-resistant ledger for transparent and immutable data transactions. Smart contracts automate and enforce data sharing rules. By incorporating optimized clustering, deep learning models, hybrid encryption, and blockchain technology, this framework empowers precision agriculture while ensuring secure and efficient data sharing with 98.31% of accuracy.

Keywords:
Precision agriculture; blockchain; Internet of Things; Security; Capsule Neural Network; Bi-directional Long Short-Term Memory

HIGHLIGHTS

This proposed methodology presents a comprehensive approach for secure data sharing in precision agriculture.

Deep learning models like Capsule Neural Network (CapsNet), Recurrent Neural Network (RNN), and Bi-directional Long Short-Term Memory (Bi-LSTM) networks provide valuable insights for prediction, classification, and anomaly detection.

This framework empowers precision agriculture while ensuring secure and efficient data sharing with 98.31% of accuracy.

INTRODUCTION

Precision agriculture, a data-driven farming technique that enables farmers to increase crop yield, has transformed the agricultural industry. With the advancement of technologies like the Internet of Things (IoT) and blockchain in precision agriculture, the significance of secure data sharing has increased. This introduction explores the relationship between blockchain and IoT in the context of secure data sharing for precision agriculture [11 Demestichas K, Daskalakis E. Data lifecycle management in precision agriculture supported by information and communication technology. Agron. 2020;10(11):1648.https://doi.org/10.3390/agronomy10111648
https://doi.org/10.3390/agronomy10111648...
], [22 Dong M, Yu H, Zhang L, Sui Y, Zhao R. A PCA-SMO Based Hybrid Classification Model for Predictions in Precision Agriculture. TV/TG, 2023; 30(5):1652-1660. https://doi.org/10.17559/TV-20230530000682
https://doi.org/10.17559/TV-202305300006...
], [33 McLennon E, Dari B, Jha G, Sihi D, Kankarla V. Regenerative agriculture and integrative permaculture for sustainable and technology driven global food production and security. J. Agron. 2021;113(6):4541-59.https://doi.org/10.1002/agj2.20814
https://doi.org/10.1002/agj2.20814...
]. Large volumes of data are produced by precision farming from a number of sources, including as sensors, drones, weather stations, and satellite photos. Understanding crop health, soil conditions, weather patterns, and resource utilization are all aided by this knowledge [44 Mateja O, Vojislav S, Nevena T, Emil V, Ivan Z, Nenad G. Analyzing Site-Specific Tractor Draft Force in Different Passes during Plowing. TV/TG, 31, 1(2024):228-232. https://doi.org/10.17559/TV-20230614000733
https://doi.org/10.17559/TV-202306140007...
], [55 Hemming S, de Zwart F, Elings A, Righini I, Petropoulou A. Remote control of greenhouse vegetable production with artificial intelligence-greenhouse climate, irrigation, and crop production. Sens. 2019;19(8):1807.https://doi.org/10.3390/s19081807
https://doi.org/10.3390/s19081807...
]. This data has to be exchanged efficiently and securely in order for stakeholders including farmers, researchers, agronomists, and supply chain partners to make informed decisions.

The existing techniques used for crop monitoring mainly rely on the pricey, time-consuming, and labor-intensive process of crop scouting, which entails hand sampling and recording the state of the fields. This old-fashioned method is frequently ineffective and could not give timely and reliable information on the crops. On the other hand, the rise of precision agriculture has created new opportunities by utilizing technology to collect and analyze data straight from the field [66 Tantalaki N, Souravlas S, Roumeliotis M. Data-driven decision making in precision agriculture: The rise of big data in agricultural systems. J. Agric. Food Inf. 2019; 20(4):344-80. http://dx.doi.org/10.1080/10496505.2019.1638264
http://dx.doi.org/10.1080/10496505.2019....
], [77 Ayaz M, Ammad-Uddin M, Sharif Z, Mansour A, Aggoune EHM. Internet-of-Things (IoT)-based smart agriculture: Toward making the fields talk.IEEE accs.2019; 7:129551-83. https://doi.org/10.1109/ACCESS.2019.2932609
https://doi.org/10.1109/ACCESS.2019.2932...
]. The use of cutting-edge technologies to acquire exact data on agricultural activities is referred to as precision agriculture. Utilizing sensors and other data collecting tools to keep track of numerous field factors is a crucial component of precision agriculture [88 Sanjeevi P, Prasanna S, Siva Kumar B, Gunasekaran G, Alagiri I, Vijay Anand R. Precision agriculture and farming using Internet of Things based on wireless sensor network. Trans. Emerg. Telecommun. Technol. 2020; 31(12):e3978.https://doi.org/10.1002/ett.3978
https://doi.org/10.1002/ett.3978...
], [99 Akhter R, Sofi SA. Precision agriculture using IoT data analytics and machine learning. J. King Saud Univ. - Comput. Inf. Sci. 2022; 34(8):5602-18.http://dx.doi.org/10.1016/j.jksuci.2021.05.013
http://dx.doi.org/10.1016/j.jksuci.2021....
], [1010 Popescu D, Stoican F, Stamatescu G, Ichim L, Dragana C. Advanced UAV-WSN system for intelligent monitoring in precision agriculture. Sens. 2020; 20(3):817.https://doi.org/10.3390/s20030817
https://doi.org/10.3390/s20030817...
]. Data from these sensors may be obtained on elements including soil moisture, temperature, nutrient levels, insect infestations, and crop growth stages. However, there are now just a few of these sensors available and functioning, and in certain circumstances, they might not even exist. The absence of complete capabilities for monitoring space, time, and composition is a significant obstacle in the field of precision agriculture [1111 Kong J, Wang H, Wang X, Jin X, Fang X, Lin S. Multi-stream hybrid architecture based on cross-level fusion strategy for fine-grained crop species recognition in precision agriculture. Comput. Electron. Agric. 2021; 185:106134.http://dx.doi.org/10.1016/j.compag.2021.106134
http://dx.doi.org/10.1016/j.compag.2021....
], [1212 Lloret J, Sendra S, Garcia L, Jimenez JM. A wireless sensor network deployment for soil moisture monitoring in precision agriculture. Sens. 2021; 21(21):7243.https://doi.org/10.3390/s21217243
https://doi.org/10.3390/s21217243...
], [1313 Vinoth Kumar K, Duraisamy B. Efficient Privacy-Preserving Red Deer Optimization Algorithm with Blockchain Technology for Clustered VANET. TV/TG, 29, 3(2022), 813-817. https://doi.org/10.17559/TV-20211216115635
https://doi.org/10.17559/TV-202112161156...
]. A limited picture of the field's circumstances may be gained from the frequently fine-grained data collected by sensors. This constraint makes it more difficult for farmers to decide what to do and how to do it to maximize crop yield. Additionally, it is challenging to efficiently integrate and analyze the information since the data gathered from sensors is frequently siloed within certain hardware or software.

Farmers frequently employ generalized strategies, such as excessive usage of fertilizers, pesticides, or irrigation water, in the absence of reliable and timely data [1414 Linaza MT, Posada J, Bund J, Eisert P, Quartulli M, Döllner J, et al. Data-driven artificial intelligence applications for sustainable precision agriculture. Agron. 2021; 11(6):1227.https://doi.org/10.3390/agronomy11061227
https://doi.org/10.3390/agronomy11061227...
], [1515 Thiruvenkatasamy S, Sivaraj R, Vijayakumar M. Blockchain Assisted Fireworks Optimization with Machine Learning based Intrusion Detection System (IDS). Technical Gazette. 2024;31(2):596-603. doi: 10.17559/TV-20230712000798.]. These actions may result in financial waste and environmental issues, such as higher expenses and potential ecological harm. Current precision agricultural research and development activities are concentrated on strengthening sensor technology, building thorough monitoring systems, and improving data gathering techniques. The objective is to make it possible for farmers to collect precise, real-time data on a variety of characteristics of their fields, such as soil quality, crop health, and meteorological conditions.

The literature review is provided in section 2 of the paper, and the suggested technique is described in section 3 of the document, the result obtained for the proposed model is discussed in section 4 and at last the conclusion is given in section 5.

LITERATURE REVIEW

An authentication mechanism with drone help is thought to be possible in an IoT-enabled agricultural situation [1616 Bera B, Vangala A, Das AK, Lorenz P, Khan MK. Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment.Comput. Stand. Interfaces. 2022; 80:103567.http://dx.doi.org/10.1016/j.csi.2021.103567
http://dx.doi.org/10.1016/j.csi.2021.103...
]. For IoT-enabled IPA, a new authentication and key management framework known as AKMS-AgriIoT has been presented using the private blockchain-orientedtechnique. The proposed AKMS-AgriIoT systems offers stronger safety, more functionality characteristics, lower communication expenses, and similar computing costs when contrasted with other analogous systems, according to a thorough security analysis and comparative research.

The distributed Ledger (DTL) techniqueson the IoT. The paper provides a DLT-based solution for maintaining IoT detail integrity that safely handle the combined field information [1717 Lamtzidis O, Pettas D, Gialelis J. A novel combination of distributed ledger technologies on internet of things: Use case on precision agriculture. Appl. Syst. Innov. 2019; 2(3):30. https://doi.org/10.3390/asi2030030
https://doi.org/10.3390/asi2030030...
]. The inherent usage of IOTA's "The Tangle" ledger, which is used to transport and store the data, is what gives it its distinctiveness. Where the Super nodes only gather information and transfer it to the web, where it is controlled by every device in a distributed, decentralized network.

An IoT and blockchain concepts for a distributed process control system extension for a mushroom farm [1818 Branco F, Moreira F, Martins J, Au-Yong-Oliveira M, Gonçalves R. Conceptual approach for an extension to a mushroom farm distributed process control system: IoT and blockchain. New Knowledge in Information Systems and Technologies, Springer. 2019; 1:738-47. http://dx.doi.org/10.1007/978-3-030-16181-1_69
http://dx.doi.org/10.1007/978-3-030-1618...
]. The paper suggest a theoretical framework for an upgrade to a distributed process control platform for a mushroom farm that integrates IoT and blockchain. That enhancement may not only supplement the present cultivation control system, which is essential for the general efficacy of the agricultural business system used by the team of executives, but will also enable the gathering of shared information on ecological signs inherent to the growing of mushrooms.

A precision agriculture with IoT support using Deep Aerial Semantic Segmentation Framework [1919 Anand T, Sinha S, Mandal M, Chamola V, Yu FR. AgriSegNet: Deep aerial semantic segmentation framework for IoT-assisted precision agriculture. IEEE Sens. J. 2021; 21(16):17581-90.]. In order to detect agricultural patterns in images taken by UAVs, this work presents the powerful neural network framework AgriSegNet. Incorporating a multi scale attention module, a dynamic class weighting loss, and dice loss together with the intended structure enables higher IoU. the training set where there is a class inequality, these modules assist in optimizing the model training.

IoT and blockchain technologies are being used to produce smart farming [2020 Awan SH, Ahmed S, Safwan N, Najam Z, Hashim MZ, Safdar T. Role of internet of things (IoT) with blockchain technology for the development of smart farming. J. mech. continua math. sci.2019;14(5):170-188.http://doi.org/10.26782/jmcms.2019.10.00014
http://doi.org/10.26782/jmcms.2019.10.00...
]. the fact whether they are connected or not, this technique offers equal chance to all parties participating in the organic supply of food. To minimise the need for individuals to participate in data collection, capturing, and confirmation, IoT devices are included into the smart model. Compared to our own approach, which does not employ blockchain and only consists of placing IoT sensors in the monitoring field, our unique model's validity is evaluated.

The two-chain approach for Internet of Things network security of agricultural sampling data [2121 Ren W, Wan X, Gan P. A double-blockchain solution for agricultural sampled data security in Internet of Things network. Future Gener. Comput. Syst. 2021; 117:453-61.http://dx.doi.org/10.1016/j.future.2020.12.007
http://dx.doi.org/10.1016/j.future.2020....
]. That research provide a double blockchain-based Inter Planetary File System (IPFS) storage solution for the safety of agricultural sampling data in an IoT network. To preserve a record of the public in case there are any hostile assaults, block hashes will be created once the data have been saved in ASDC blocks and uploaded to Ethereum's main chain.

A Novel Routing Scheme for Intelligent Agriculture. In order to find a Base Station (BS) path, the proposed technique uses electronic contracts in diverse IoT networks [2222 Awan SH, Ahmed S, Nawaz A, Sulaiman S, Zaman K, Ali MY,Khan ZN, Saeed SI. BlockChain with IoT, an emergent routing scheme for smart agriculture. Int. J. Adv. Comput. Sci. Appl.2020; 11(4):420-9.http://dx.doi.org/10.14569/IJACSA.2020.0110457
http://dx.doi.org/10.14569/IJACSA.2020.0...
]. With the proposed routing protocol, duplicated data is eliminated, IoT architectural attacks are prevented, energy consumption is reduced, and network life is extended. It is compared to our current system to see how well it performs. Internet of Things-based agriculture and LEACH in agriculture.

A Blockchain-Based, Cloud-Based IoT in Innovative Agriculture for Safety Monitoring. That paper offers a system for smart-farm security monitoring, which can efficiently track sensor abnormalities and device status, as well as reduce security threats by observing behavioural trends [2323 Chaganti R, Varadarajan V, Gorantla VS, Gadekallu TR, Ravi V. Blockchain-based cloud-enabled security monitoring using Internet of Things in smart agriculture. Future Internet.2022;14(9):250.https://doi.org/10.3390/fi14090250
https://doi.org/10.3390/fi14090250...
]. Additionally, a blockchain-based smart contract programme was built to safely record data about safety anomalies and prevent similar assaults from happening to other farms in the area.

A Blockchain-Based Authentication Scheme for Smart Farming Based on Smart Contracts. This paper suggests a new authentication method based on smart contracts for a hybrid blockchain-based edge computing-based smart farming architecture [2424 Vangala A, Sutrala AK, Das AK, Jo M. Smart contract-based blockchain-envisioned authentication scheme for smart farming. IEEE IoT- J.2021; 8(13):10792-806.https://doi.org/10.1109/JIOT.2021.3050676
https://doi.org/10.1109/JIOT.2021.305067...
]. Anonymity and traceability are supported as security characteristics by the proposed approach (SCBAS-SF). Additionally, SCBAS-SF is explicitly tested using the automated validation tool AVISPA protection from man-in-the-middle and replay attacks.

A private blockchain-based intelligent agriculture network security system. This study suggests using dark web technologies to protect the anonymity of servers and blockchains. To avoid distributed denial-of-service (DDOS) assaults, the study will track the frequency of packet transfer in intelligent agriculture [2525 Ramamoorthi R, Ramasamy A. Block Chain Technology Assisted Privacy Preserving Resource Allocation Scheme for Internet of Things Based Cloud Computing. Tehničkivjesnik. 2023;30(6):1943-50. doi: 10.17559/TV-20230404000503.
https://doi.org/10.17559/TV-202304040005...
]. The system's key characteristics are: an identity authentication method; secure information transfer; private blockchain creation; a quicker, more effective authentication system for blockchain information; and resilience to DoS assaults.

The demand for reliable authentication and security solutions has been prompted by the growing integration of IoT technology in agricultural contexts. The security of data integrity, privacy, and effective key management are issues that current authentication techniques must address. Additionally, the rising usage of drones in IoT-enabled agricultural contexts adds new challenges to authentication and safe data transfer. An authentication and key management system based on blockchain has been developed to overcome these issues. In order to improve security, usability, and communication effectiveness in IoT-enabled agricultural situations, this scheme will make use of the advantages of blockchain technology. The plan calls for the creation of encrypted transaction blocks that include GSS-generated signatures when appropriate. To validate and add these blocks to the private blockchain center, cloud servers mine them.

The proposed scheme's security features, must be carefully examined and compared to those of other pertinent systems. Furthermore, research is needed into how distributed ledger technology (DLTs) might be integrated with IoT systems in the agriculture sector. As an alternative to the cloud-centric IoT architecture, a distributed ledger system utilizing IOTA's ledger, referred to as "The Tangle," is suggested. By enabling each Super node to own and store the aggregated field data in a distributed and decentralized database, this node-centric approach seeks to assure data integrity. Additionally, conceptual frameworks and methodologies are needed for the integration of IoT and blockchain technology in particular agricultural applications, such as distributed process control systems for mushroom farms, precision agriculture, and smart farming. These strategies have to focus on information gathering, environmental monitoring, pattern detection, and general farm management information system improvement.

PROPOSED METHODOLOGY

This proposed methodology presents a comprehensive approach for secure data sharing in precision agriculture by integrating advanced techniques. The methodology consists of multiple layers, including the Data Layer, Data Preprocessing Layer, Intelligent Layer, Security Layer, and Blockchain Layer. Each layer performs specific tasks to ensure efficient and secure data sharing in precision agriculture. The Data Layer focuses on data collection using IoT devices such as sensors that gather information on soil moisture, temperature, humidity, crop health, and weather conditions. The collected data is then preprocessed to remove outliers, normalize values, and extract relevant features. Optimal clustering techniques and feature selection algorithms enhance the data analysis process. The Intelligent Layer utilizes deep learning models such as cascaded CNNs, RNNs, and Bi-LSTM networks to extract valuable insights from the preprocessed data. These models enable accurate prediction, classification, and anomaly detection. The work flow of the proposed secure data sharing model for precision agriculture is shown in Figure 1.

Figure 1
Block diagram of the proposed secure data sharing model.

The Security Layer ensures the confidentiality, integrity, and authenticity of the data through a hybrid encryption algorithm that combines symmetric and asymmetric encryption techniques. This step guarantees data security during transmission and storage. The Blockchain Layer leverages blockchain technology to create a decentralized and tamper-resistant ledger for recording and verifying data transactions. The integration of data sharing transactions onto the blockchain network ensures transparency, immutability, and secure sharing among authorized entities. Smart contracts automate and enforce the rules and conditions of data sharing, enhancing security and efficiency. This proposed methodology provides a comprehensive framework for secure data sharing in precision agriculture, enabling data-driven decision-making, collaboration among stakeholders, and ensuring the privacy and integrity of sensitive agricultural data. By incorporating advanced techniques such as optimized clustering, deep learning models, hybrid encryption, and blockchain technology, this methodology empowers precision agriculture to optimize crop yield, resource management, and sustainable practices.

Data layer: Data Collection

In the data collection phase, IoT devices like sensors are deployed to gather data for precision agriculture from multiple sources. These sources include crop health, meteorological conditions, soil moisture, temperature, and humidity. The gathered data serves as the basis for further research and offers insightful knowledge into the agricultural environment.

Data Preprocessing Layer

In order to assure the quality and usefulness of the obtained data for future analysis, the Data preprocessing Layer concentrates on cleaning and preparing it. The steps listed below are part of this layer.

The dataset may be cleaned by eliminating duplicated values, adding missing data, and deleting and repairing undesirable sample-level structures. The dataset must be normalized using the minimum and maximum scaling values as in the following equations after being cleaned:

Z n o r m = Z - min ( z ) max ( z ) - min ( z ) (1)

Where min(z) is the property Z's minimal value and max(z) is its highest value, respectively. The feature values Znorm and d=k=1Ki=1n(xiuk)2 are normalized and original, respectively.

Optimal Clustering

To efficiently group comparable data points together, an optimized clustering technique is used, such as the (proposed) optimized K-means clustering. To increase the precision and effectiveness of clustering findings, the method uses an improved initialization strategy. This process helps to find links and patterns in the data.

The K-means method is an uncomplicated iterative clustering technique. Using the K classes in the data set and the distance as the measurement, determine the distance mean, which will produce the initial centroid and characterize every class. These K-values are optimally selected using new hybrid optimization model called HSCFHA. For a given data collection X with n multivariate information points and a group K to be divided, the clustering aims are to minimise the total of the squares of various sorts, and the Euclidean distance is selected as the similarity metric, shown in Eq. (2).

u k (2)

where k denotes the number of clusters centers, uk denotes the center's position, and xidenotes the data set's ith point. The following is the answer to the centroid uk:

u k = u k k = 1 K i = 1 n ( x i u k ) 2 (3)

u k = i = 1 n 2 ( x i u k ) (4)

Let Eq. (4) be zero; then

u k = 1 n i = 1 n x i (5)

The main principle of the technique is to randomly select K sample points as the first cluster's center: By placing every data point into the cluster that is symbolized by its closest center point, cluster centers are found, with the center of each cluster being the intersection of all sample points inside it. The cluster's center point must remain constant or reach the specified number of iterations before the aforementioned processes should be repeated. The choice of the center point affects the algorithm's output, which leads to unstable outcomes. The centre point is determined by the K value, the algorithm's focus point, and it directly affects the clustering results, such as either worldwide or local the level of optimality.

Feature Extraction

Statistical characteristics and methods like PCA are used to extract pertinent features from the preprocessed data. While maintaining the most crucial features, PCA assists in lowering the dimensionality of the data. Summary statistics that depict the distribution and core patterns of the data are provided by statistical characteristics including mean, median, standard deviation, variance, skewness, and kurtosis.

PCA

A linear dimensionality reduction method known as PCA includes converting high-dimensional data into lower-dimensional data by the lowest dimension's variance should be maximized. The computation of the feature vector's covariance matrix comes first, and its associated eigenvectors are calculated after that. It must implement feature scaling or normalization similar to supervised learning approaches depending on the n-dimensional training datay(1),y(2),.,y(n).Eq.(6) is used to compute the mean of each characteristic.

μ i = 1 n j = 1 n y i ( j ) (6)

Thatcan scale separate characteristics so that they have comparable ranges of mean values if they possess distinct mean values for different attributes. To guarantee that every yi value has an absolute zero mean value, then swap out each yivariable with its corresponding yiμi value. In the context of supervised learning, this measuring of the ithcomponent is defined by Eq. (7), where siis the |maxmean|score of the ith feature.

y i ( j ) = y i ( j ) μ i s i (7)

It is necessary to determine the mean square error of the data being projected on the m multidimensional vector in order to lower the feature's dimension from N to m (where m×N) and pinpoint the region in a space with N dimensions onto which the projected data are located. It is difficult and outside the scope of this research to computationally verify the computation of these m vectors: μ(1),μ(2),.,μ(m) and the anticipated points: wu(1),w(2),.,w(N)on these vectors. Eq. (3) is used to calculate the covariance matrix, which has the dimensions N×1 for the y(j)vector and 1×N for the(y(j))T. This results in a covariance matrix with the dimensions N×N. The covariance matrix's eigenvalues and eigenvectors, which stand for the feature vectors' new magnitude and associated directions in the modified vector space, are next calculated. Conversely, eigenvectors with tiny eigenvalues contain relatively little data about the dataset. The covariance matrix is given in Eq. (8),

C v = 1 N j = 1 N y ( j ) × ( y ( j ) ) T (8)

Where Cv is the covariance matrix.As a consequence, the formula t(p)=y(j)z(p) may be used to calculate the score for the pth entire PCA of a data vector, where z(p)is the pth eigenvector of the Cvof y(j). As a result, the entire PCA reduction of the vector Y may be represented as T=Y×Z, where Z is the eigenvector of the Cv. Then we establish a cutoff value at which the eigenvalues are deemed valuable and the other ones are eliminated as irrelevant characteristics.

Statistical Features

Make traffic flow statistics calculations at certain times or locations, including the mean, median, standard deviation, variance, skewness, and kurtosis. The formulas are given in Table 1.

Table 1.Formula
for Statistical and higher order statistical features

Feature Selection

For feature selection, a hybrid optimization approach that combines evolutionary algorithms and mathematical programming is used. The objective of this model is to extract the most discriminative and informative characteristics. Feature selection improves the computational effectiveness and interpretability of following analysis processes by lowering the dimensionality of the data. The regular FHO and SCSO are combined to create the hybrid optimization model called HSCFHA.

Mathematical model

Initialization

In order to accurately simulate the hunting habits of fire hawks, the HSCFHA metaheuristic algorithm considers both the process of igniting and spreading fires as well as gathering food. From a variety of possible solution outcomes (Xi), the initial position coordinates of the fire hawks and prey are selected. Utilizing a random initialization technique, these vectors' beginning positions in the search area are chosen, shown in Eq. (9).

X = [ X 1 X i X N ] N × m = [ x 1,1 x 1, d x 1, m x i ,1 x i , d x i , m x N ,1 x N , d x N , M ] N × m (9)

x i , j ( 0 ) = x i , j ( min ) + r a n d . ( x i , j ( max ) - x i , j ( min ) ) (10)

Where i=1, 2,…,N, j=1,2,…, d

Wherexi,j(min), and xi,j(max) are the minimum and maximum solutions,Xidenotes theith solution candidate in the search space, d denotes the dimension of the problem under consideration, xi,j denotes the jth decision variable of the ith solution candidate, xi,j(0) denotes the initial position of the solution candidates, andm×N denotes the total number of solution candidates in the search space. In the ways indicated below, these qualities are shown schematically and statistically:

P R = [ P R 1 P R k P R m ] , k = 1,2, , m (11)

F H = [ F H 1 F H l F H n ] , l = 1,2, , n (12)

Where PRk is the kth prey inside the search space with respect to a total of m preys, and FHl is the lth fire hawk with respect to a total of nfire hawks within the search space.

The total distance (Dkl)among the Fire Hawks and the prey is computed in the algorithm's subsequent stage is given in Eq. (13),

D k l = ( x 2 - - x 1 ) 2 + ( y 2 - y 1 ) 2 (13)

Where m is the total number of preys in the search space, and (x1,y1) and (x2,y2) indicate the location of the fire hawks and their prey inside the search area. The nearest adjacent prey is utilised to determine the Fire Hawks' domain after using the method outlined above to gauge the total distance between them and their prey.

Search for Prey (Proposed Exploration Stage)

The Fire Hawks gather burning sticks throughout the algorithm's next phase in order to prevent achieving the local optimum; each one's sensitivity range (r) is unique. The HSCFHAalgorithm benefits from the sand cat's low-frequency hearing skills. Because of this, in mathematical modelling, the sensitivity rG is described by Eq.(14). Additionally, the algorithm exploration and exploitation capability are regulated, and the parameter R is generated using Eq. (15).

F H n e w = F H + r * ( r 1 + r G - r 2 * F H n e a r ) (14)

Where the value of r is shown usingEq. (14) and Eq. (15) of SCSO

r G = S M - ( S M * t T ) (15)

R = 2 * r G * r a n d ( 0,1 ) - r G (16)

Where T is the number of iterations over the maximum allowed and SM is 2.

In the sensitivity range, each sand cat will at random select a new site to look for prey. In this environment, algorithms may be explored and used more effectively. Each sand cat's sensitivity range (r) is unique in order to prevent slipping into the local optimum, based on Eq. (17).

r = S M * r a n d ( 0,1 ) (17)

When the guiding parameter rG is utilized.Each sand cat will look for the prey's location using the best candidate position (Posbc), current position (Posc(t)), and sensitivity range (r) as a guide. In Eq. (18), the particular Formula is shown.

P o s ( t + 1 ) = r * P o s b c ( t ) - r a n d ( 0,1 ) * P o s c ( t ) (18)

Movement of prey inside the territory

The migration of prey within each search agent's area is taken into consideration as a critical aspect of behavioural patterns for the position modifying process in the algorithm's following phase. When the Fire Hawk drops a flaming stick, the prey may probably choose to hide, escape, or will unwittingly move in the direction of the search agent. When updating a location, the following equation might be used to account for various operations:

P R q n e w = P R q + ( r 3 * F H l - r 4 * S P l ) (19)

Where l=1,2,,nandq=1,2,.,r, GB is widely regarded as the top option in the primary fire search space; SPl is a hide place beneath the territory of the lthsearch agent; and r3 and r4 are random integers with a uniform distribution in the range of (0, 1) to predict the motions of prey approaching the search agent and the safe location. When updating a position, the ensuing equation can be utilized to account for these actions.

P R q n e w = P R q + ( r 5 * F H a l t e r - r 6 * S P ) (20)

Where PRqnewis the updated position vector of the qth prey (PRq)) that is being pursued by the lth fire hawk (FHl); SP is a secure location beyond the lth Fire Hawk's territory; and r5andr6 have evenly distributed at random in an interval of (0, 1) for predicting the preys' movements towards the other search agent and the secure location beyond the territory. The numerical description of SPland SP is built on the assumption that the majority of species assemble in a safe region of nature to remain secure during a hazard.

S P l = q = 1 r P R q r (21)

S P = k = 1 m P R k m (22)

Where PRk is the kth prey in the search area and PRq is the qth prey being guarded by the lth fire hawk (FHl).

Attack Prey (Exploitation Stage)

Eq. (23) displays the distance (Posrnd) between the sand cat and its target in order to replicate the sand cat's attack on its victim. The value of the randomly chosen angle falls between 1 and 1, as it ranges from 0 to 360 degrees. This allows each sand cat to wander through the search area in a variety of circumferential directions. After that, the prey is assaulted using Eq. (24). The dune cat can get to its hunting location more quickly in this fashion.

P o s r n d = | r a n d ( 0,1 ) * P o s b ( t ) - P o s c ( t ) | (23)

P o s ( t + 1 ) = P o s b ( t ) - r * P o s r n d * cos ( α ) (24)

Position updating

By adjusting the adaptive parameters rG and R, the HSCFHA controls the algorithm's exploration and exploitation. Eq. (24) demonstrates that throughout repetition, rG drops linearly from 2 to 0. In light of this, the parameter R has the random value [44 Mateja O, Vojislav S, Nevena T, Emil V, Ivan Z, Nenad G. Analyzing Site-Specific Tractor Draft Force in Different Passes during Plowing. TV/TG, 31, 1(2024):228-232. https://doi.org/10.17559/TV-20230614000733
https://doi.org/10.17559/TV-202306140007...
, 44 Mateja O, Vojislav S, Nevena T, Emil V, Ivan Z, Nenad G. Analyzing Site-Specific Tractor Draft Force in Different Passes during Plowing. TV/TG, 31, 1(2024):228-232. https://doi.org/10.17559/TV-20230614000733
https://doi.org/10.17559/TV-202306140007...
]. When R is a multiple of one or fewer, the sand cat will assault its victim. If not, the sand cat will hunt for prey, as shown by Eq. (25).

P o s ( t + 1 ) = { r * ( P o s b c ( t ) - r a n d ( 0,1 ) * P o s c ( t ) | R | > 1 ; exp l o r a t i o n P o s b ( t ) - P o s r a n d * cos ( α ) * r | R | 1 ; exp l o i t a t i o n (25)

Each sand cat's updated position during the exploration and exploitation stage is shown in Eq. (25). The sand cat will attack its victim if R is less than 1. Otherwise, the sand cat's job is to scour the entire planet for fresh prey.

Intelligent Layer

The Intelligent Layer analyses the preprocessed data and draws insightful conclusions using machine learning and deep learning techniques. The subsequent actions are part of this layer. A three-tier deep learning framework is employed, consisting of CASPSNet, RNNs, and Bi-LSTM networks. These models are trained on the preprocessed data to perform tasks such as prediction, classification, and anomaly detection. They leverage the extracted features to make accurate and informed decisions.

CapsNet Architecture

Convolutional, primary, and digit capsule layers make up CapsNet's three major layers. The first step is to utilize the convolutional layer to extract the key characteristics from the input data. Two convolutional layers, with 64 and 128 feature maps each, are employed. Each feature map's output may be calculated in Eq. (26) as follows:

y ( i , j ) = m = - N N n = - M M x ( i + m , j + n ) * k ( m , n ) (26)

Where x is the convolutional layer's input, k is the filter's kernel (also known as the kernel), and NandMare the kernel sizes. In this instance, we utilize a 33-kernel size and 1 sample for the kernel strides because the input is 40031 in size. Following each convolutional layer, the Rectified Linear Unit (ReLU) is utilized as an activation function, with the following result:

A c t ( y ) = max ( 0, y ) (27)

The output of the convolutional feature maps is divided into a number of vector representations called capsules ui for the principal capsule, which produces combinations of the features. By applying a convolutional operation to their input, capsule behaviour is comparable to that of a convolutional layer. With three samples per stride and a kernel size of 3×3, we utilize. The input data, including its orientation and location, are all included in the capsule. Four 16-channel capsules are used in this instance. As a result, 134×1×16×4 is the form of the capsule layer's output. Because of the vector that the capsule's output is, it is impossible to use the conventional activation function. Consequently, the following Eq. (28) utilizes a non-linear squashing function:

v j = s j 2 1 + s j 2 * s j s j 2 (28)

Where the capsule j's input and output are sj and vj respectively. Short vectors are supposed to be reduced to virtually zero length, while large vectors are supposed to be shrunk to a length just below 1 using the squashing activation function. The third factor is the 2D form of the digit capsule layer. Both the earthquake and noise classifications apply to our issue. Based on the dynamic routing (routing by agreement) idea, the main capsule is connected to the digit capsule. The weighted sum total output contribution (u^j|i)is one way to describe the variable sj. Following Eq. (29) is the way to calculate the sj:

s j = i c i j u ^ j | i (29)

Hence, in the method for dynamic routing, cij stands for the coupling coefficient. Following are the steps to acquire the u^j|iin Eq. (30) and cijEq. (20):

u ^ j | i = W i j u i (30)

c i j = exp ( b i j ) c exp ( b i c ) (31)

Where Wij stands for the weight matrix and bij and bictwo capsules' logarithmic prior chances. The routing algorithm uses an iterative process with numerous phases. First, bij is initialized to zero for all capsules in layer l and capsulej in layer l+1, whereas Wij is started at random for the weight matrix. Second, Eq. (31) is used to derive the coupling coefficient cij. Thirdly, the sj and vj are determined using the coupling coefficient cij and the capsule result layeru^j|i). Finally, bij is updated as follows:

b i j + ( u ^ j | i . v j ) b i j (32)

The digit caspule's output is in the form of a 2×8 matrix. Using an 8-dimensional vector, each class may be represented. Our routing method goes through three rounds. The margin loss function is minimized using the Adam optimizer, which is utilized to optimize the CapNet network settings, shown in Eq. (33):

L k = T k max ( 0, m + - v k 2 + λ ( 1 - T k ) max ( 0, v k - m - ) 2 (33)

Where Tk equals 1, m+ = 0.9 and m= 0.1. λ denotes the down-weighting of the loss which is constant at 0.5.

RNN

The data utilized in each computation is kept in memory by RNNs. It uses the exact same settings for each input since it provides the same outcome by carrying out the same operation on all inputs or h-layers.

Each Mwi forecasts the probabilities g1,g2,.,gnof each label R for given input Q for input network data, such as Q with n columns and written as Q=Q1,Q2,...,Qn. The ensembler combines the Mwi probability values to create an ensemble prediction function f(q) that accepts predictions as a vote for the labels from each model. With the given input data Q, Eq. (34) represents the computation of probability predictions.

g i = r i ˜ ( M w i ( Q ) ) (34)

f ( q ) = arg max r R j = 1 J I ( r = h j ( q ) ) (35)

According to Eq. (35), the prediction function f(q)ceives input from the prediction probability values of seven ML models Mwi for each label. In critical infrastructure, labels that identify the sort of attack or activity being observed may be included in the output of an anomaly detection system. System administrators and security workers can be informed of potential security concerns using these labels, which enable to take the necessary precautions to reduce the risks.

Bi-LSTM

A forward and a backward RNN are both included in each training series of a bi-RNN, and each have an output layer connecting them. At every stage of the input process for the output layer, the whole historical and prospective contextual information is provided. Since there is no data transfer between the forward and the backward postulated layers, the extension of the graph is therefore guaranteed to be non-cyclic.

The Bi-LSTM model has the following layers: input to forward and backward hidden layer weights (w1-w3), hidden layer to hidden layer weights (w2-w5), and forward and backward hidden layer to output layer weights (w4-w6). At each time step, the same six weights are applied. The hidden layer of the Bi-LSTM model must store two values of ht: one for the forward computation and one for the backward calculation. Following are mathematical equations (Eq. (36)-Eq. (38)) that represent the final output value ot that is produced by merging the outputs of the two layers:

h t = f ( w 1 x t + w 2 h t - 1 ) (36)

h t = f ( w 3 x t + w 5 h t + 1 ) (37)

o t = g ( w 4 h t + w 6 h t ) (38)

Security Layer

Before sharing the sensitive information with authorized parties, the Security Layer concentrates on securing it. Following is a step included in this layer:

Data Encryption

To guarantee the data's secrecy, integrity, and validity, a hybrid encryption technique is used. Asymmetric and symmetric encryption methods are used in hybrid encryption. ECC and DES are combined to create the hybrid encryption paradigm. The optimal key is generated using the HSCFHA optimization technique. By using encryption, the data is protected both during transmission and storage.

To maximize speed and security, hybrid encryption combines the benefits of symmetric and asymmetric encryption techniques. ECC for key exchange and DES for data encryption and decryption can be used together to create a hybrid encryption method for precision agriculture or any other sector. This is how precision agriculture may benefit from a hybrid encryption system that combines ECC and DES:

Key Exchange

  1. The sender creates an ECC key pair with a matching private key and public key.

  2. The sender safely sends the recipient's public key across the Internet.

Data Encryption

  1. An unpredictable session key is created by the sender for DES encryption.

  2. The ciphertext is produced by the sender after the real data is encrypted with the session key and DES algorithm.

  3. The receiver's ECC public key is used by the sender to encrypt the session key, creating the encrypted session key.

Data Decryption

  1. The recipient uses their private key to decrypt the encrypted session key in order to obtain the original session key.

  2. The recipient recovers the original data by decrypting the ciphertext with the DES algorithm and the session key.

The hybrid encryption system guarantees safe key distribution by using ECC for key exchange. Without having to communicate it directly, ECC offers a safe way for sender and receiver to exchange the session key.

Blockchain Layer

With the use of Ethereum blockchain technology, the Blockchain Layer establishes a decentralized, impenetrable ledger for logging and validating data transactions. Our solution ensures the security, privacy, and accuracy of data and transactions by utilizing these components of blockchain technology. The system is protected against unauthorized access, manipulation, and data breaches thanks to the distributed ledger, immutability, consensus procedures, cryptographic security, access control, privacy safeguards, and encrypted data.

Smart Contracts

In order to automate and enforce the terms and conditions of data sharing, smart contracts are created. Between data suppliers and users, these contracts specify the access privileges, authorizations, and financial obligations. As the contracts automatically carry out the agreed-upon terms without the need for middlemen, using smart contracts makes the data exchange process more safe, transparent, and effective.

Each consensus node must carry out the logics that are written into smart contracts, which are published on the blockchain. Smart contracts are contracts that are kept as computer code on the blockchain, much like in the blockchain context. These smart contracts constantly enforce the rules as well as define them. This makes it possible for developers to create their own contracts using logical code that contains the conditions of each party's contract and requires self-execution.

RESULT AND DISCUSSION

In this part, the proposed model's ability to securely share the information in precision agriculture is assessed using several performance measures, including accuracy, sensitivity, specificity, recall, recall, recall, F-Measure, NPV, FPR, FNR, and MCC. The entire amount of data in this dataset is split into training (70%), testing (20%), and validation (10%) categories. Based on a variety of criteria, this dataset enables users to create a prediction model that would suggest the best crops to plant at a certain farm. The Python platform is used to carry out the implementation.

The performance of the proposed model is compared with the existing techniques like Bi-LSTM, RNN, CapsNet. The comparison of the DL model is evaluated in terms of performance metrics, shown in Table 2.

Table 2
Comparison of the proposed and existing techniques

Among the techniques, the proposed approach demonstrates the highest sensitivity (0.9629) and specificity (0.9901), indicating its ability to accurately identify positive and negative instances. It achieves a high overall accuracy of 0.9831, reflecting its effectiveness in correctly classifying instances. The precision of the proposed approach is also high (0.9831), indicating a low rate of false positives. The recall, or true positive rate, matches the precision at 0.9831, indicating that a high proportion of positive instances are correctly identified. This is further supported by the F-measure value of 0.9831, which considers both precision and recall.

The NPV of the proposed approach is 0.9964, reflecting its ability to correctly identify negative instances. The FPR is low at 0.0194, indicating a low rate of falsely classifying negative instances as positive. The FNR is also low at 0.0556, suggesting a low rate of falsely classifying positive instances as negative. Finally, the MCC for the proposed approach is 0.9700, which is a measure of the quality of binary classification, taking into account true and false positives and negatives. A higher MCC value indicates a better classification performance.

Comparatively, the other techniques such as Bi-LSTM, RNN, CapsNet, GRU, and MLP also demonstrate varying levels of performance across the evaluation metrics. The graphical representation of sensitivity and specificity is shown in Figure 2.

Figure 2
Comparison of sensitivity and specificity

The Bi-LSTM technique achieves a sensitivity of 0.9323, the RNN technique demonstrates a sensitivity of 0.9267, CapsNet achieves a sensitivity of 0.9002, the GRU technique demonstrates a sensitivity of 0.8204, MLP achieves a sensitivity of 0.7963. The specificity of Bi-LSTM is 0.9934,RNN achieves a specificity of 0.9964, CapsNet achieves a sensitivity of 0.9002, the GRU technique demonstrates a sensitivity of 0.8204, and MLP achieves a sensitivity of 0.7963. Figure 3 displays the accuracy and precision in visual form.

Figure 3
Comparison of accuracy and precision

The proposed approach achieves an accuracy of 0.9831. With anaccuracy of 0.9701, accuracy values range from of 0.9588for the RNN to 0.9440 for CapsNet, 0.9206 for GRU, and 0. 0.8953 for MLP. The proposed approach achieves a precision of 0.9831. Bi-LSTM's precision is 0.9771, which means that 97.71% of the negative cases are accurately identified by it. The precision of RNN is 0.9728, the precision of CapsNet is 0.9690, the GRU method has a precision of 0.8901, and the precision of MLP is 0.8866. Figure 4 displays a visual illustration of recall and NPV.

Figure 4
Comparison of recall and NPV

The proposed approach achieves a recall of 0.9831. A recall of 0.9771 means that the Bi-LSTM method accurately detects 97.71% of the positive cases. CapsNet obtains a recall of 0.9690, RNN achieves a recall of 0.9728, GRU achieves a recall of 0.8901, and MLP earns a recall of 0.8866. The proposed approach achieves an NPV of 0.9964. Bi-LSTM properly distinguishes 99.34% of the negative cases, according to its NPV of 0.9934. NPV for RNN is 0.9901, NPV for CapsNet is 0.9800, NPV for the GRU method is 0.9769, and NPV for MLP is 0.9306. Figure 5 displays F-measure and MCC as a graphical depiction.

Figure 5
Comparison of F-measure and MCC

The proposed approach achieves an F-measure of 0.9831. Bi-LSTM successfully recognizes the F-measure of 0.9771. The RNN method obtains a F-measure of 0.9728, CapsNet accomplishes a F-measure of 0.9690, GRU accomplishes a F-measure of 0.8901, and MLP accomplishes a F-measure of 0.8866. The proposed approach achieves an MCC of 0.9700. The Bi-LSTM's MCC value is0.9550. The MCC of the RNN is 0.8831, the MCC of CapsNet is 0.8736, the MCC of the GRU method is 0.8083, and the MCC of MLP is 0.7432. Figure 6 displays a graphical representation of FNR and FPR.

Figure 6
Comparison of FNR and FPR

The FNR and FPR are the error metrics, the lower values of FNR and FPR indicates that the proposed model achieve lower error rate compared to the existing Bi-LSTM, RNN, CapsNet, GRU and MLP.

Comparison of security measures

Based on the Table3, the proposed encryption technique demonstrates relatively faster encryption and decryption times compared to DES, ECC, Blowfish, and RSA.

Table 3
Comparison of the security metrics

CONCLUSION

In conclusion, the proposed methodology presents a comprehensive and advanced approach for secure data sharing in precision agriculture. By integrating multiple layers including the Data Layer, Data Preprocessing Layer, Intelligent Layer, Security Layer, and Blockchain Layer, the methodology ensures efficient and secure handling of agricultural data. this methodology empowers precision agriculture by enabling data-driven decision-making, fostering collaboration among stakeholders, and ensuring the privacy and integrity of sensitive agricultural data. By incorporating advanced techniques such as optimized clustering, deep learning models, hybrid encryption, and blockchain technology, this comprehensive framework contributes to optimizing crop yield, improving resource management, and promoting sustainable practices in precision agriculture. By adopting this methodology, stakeholders in precision agriculture can harness the full potential of data while maintaining security, trust, and efficiency throughout the data sharing process. The integration of advanced techniques and the use of blockchain technology provide a solid foundation for the development and growth of precision agriculture, leading to improved productivity and sustainability in the agricultural sector.

REFERENCES

  • 1
    Demestichas K, Daskalakis E. Data lifecycle management in precision agriculture supported by information and communication technology. Agron. 2020;10(11):1648.https://doi.org/10.3390/agronomy10111648
    » https://doi.org/10.3390/agronomy10111648
  • 2
    Dong M, Yu H, Zhang L, Sui Y, Zhao R. A PCA-SMO Based Hybrid Classification Model for Predictions in Precision Agriculture. TV/TG, 2023; 30(5):1652-1660. https://doi.org/10.17559/TV-20230530000682
    » https://doi.org/10.17559/TV-20230530000682
  • 3
    McLennon E, Dari B, Jha G, Sihi D, Kankarla V. Regenerative agriculture and integrative permaculture for sustainable and technology driven global food production and security. J. Agron. 2021;113(6):4541-59.https://doi.org/10.1002/agj2.20814
    » https://doi.org/10.1002/agj2.20814
  • 4
    Mateja O, Vojislav S, Nevena T, Emil V, Ivan Z, Nenad G. Analyzing Site-Specific Tractor Draft Force in Different Passes during Plowing. TV/TG, 31, 1(2024):228-232. https://doi.org/10.17559/TV-20230614000733
    » https://doi.org/10.17559/TV-20230614000733
  • 5
    Hemming S, de Zwart F, Elings A, Righini I, Petropoulou A. Remote control of greenhouse vegetable production with artificial intelligence-greenhouse climate, irrigation, and crop production. Sens. 2019;19(8):1807.https://doi.org/10.3390/s19081807
    » https://doi.org/10.3390/s19081807
  • 6
    Tantalaki N, Souravlas S, Roumeliotis M. Data-driven decision making in precision agriculture: The rise of big data in agricultural systems. J. Agric. Food Inf. 2019; 20(4):344-80. http://dx.doi.org/10.1080/10496505.2019.1638264
    » http://dx.doi.org/10.1080/10496505.2019.1638264
  • 7
    Ayaz M, Ammad-Uddin M, Sharif Z, Mansour A, Aggoune EHM. Internet-of-Things (IoT)-based smart agriculture: Toward making the fields talk.IEEE accs.2019; 7:129551-83. https://doi.org/10.1109/ACCESS.2019.2932609
    » https://doi.org/10.1109/ACCESS.2019.2932609
  • 8
    Sanjeevi P, Prasanna S, Siva Kumar B, Gunasekaran G, Alagiri I, Vijay Anand R. Precision agriculture and farming using Internet of Things based on wireless sensor network. Trans. Emerg. Telecommun. Technol. 2020; 31(12):e3978.https://doi.org/10.1002/ett.3978
    » https://doi.org/10.1002/ett.3978
  • 9
    Akhter R, Sofi SA. Precision agriculture using IoT data analytics and machine learning. J. King Saud Univ. - Comput. Inf. Sci. 2022; 34(8):5602-18.http://dx.doi.org/10.1016/j.jksuci.2021.05.013
    » http://dx.doi.org/10.1016/j.jksuci.2021.05.013
  • 10
    Popescu D, Stoican F, Stamatescu G, Ichim L, Dragana C. Advanced UAV-WSN system for intelligent monitoring in precision agriculture. Sens. 2020; 20(3):817.https://doi.org/10.3390/s20030817
    » https://doi.org/10.3390/s20030817
  • 11
    Kong J, Wang H, Wang X, Jin X, Fang X, Lin S. Multi-stream hybrid architecture based on cross-level fusion strategy for fine-grained crop species recognition in precision agriculture. Comput. Electron. Agric. 2021; 185:106134.http://dx.doi.org/10.1016/j.compag.2021.106134
    » http://dx.doi.org/10.1016/j.compag.2021.106134
  • 12
    Lloret J, Sendra S, Garcia L, Jimenez JM. A wireless sensor network deployment for soil moisture monitoring in precision agriculture. Sens. 2021; 21(21):7243.https://doi.org/10.3390/s21217243
    » https://doi.org/10.3390/s21217243
  • 13
    Vinoth Kumar K, Duraisamy B. Efficient Privacy-Preserving Red Deer Optimization Algorithm with Blockchain Technology for Clustered VANET. TV/TG, 29, 3(2022), 813-817. https://doi.org/10.17559/TV-20211216115635
    » https://doi.org/10.17559/TV-20211216115635
  • 14
    Linaza MT, Posada J, Bund J, Eisert P, Quartulli M, Döllner J, et al. Data-driven artificial intelligence applications for sustainable precision agriculture. Agron. 2021; 11(6):1227.https://doi.org/10.3390/agronomy11061227
    » https://doi.org/10.3390/agronomy11061227
  • 15
    Thiruvenkatasamy S, Sivaraj R, Vijayakumar M. Blockchain Assisted Fireworks Optimization with Machine Learning based Intrusion Detection System (IDS). Technical Gazette. 2024;31(2):596-603. doi: 10.17559/TV-20230712000798.
  • 16
    Bera B, Vangala A, Das AK, Lorenz P, Khan MK. Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment.Comput. Stand. Interfaces. 2022; 80:103567.http://dx.doi.org/10.1016/j.csi.2021.103567
    » http://dx.doi.org/10.1016/j.csi.2021.103567
  • 17
    Lamtzidis O, Pettas D, Gialelis J. A novel combination of distributed ledger technologies on internet of things: Use case on precision agriculture. Appl. Syst. Innov. 2019; 2(3):30. https://doi.org/10.3390/asi2030030
    » https://doi.org/10.3390/asi2030030
  • 18
    Branco F, Moreira F, Martins J, Au-Yong-Oliveira M, Gonçalves R. Conceptual approach for an extension to a mushroom farm distributed process control system: IoT and blockchain. New Knowledge in Information Systems and Technologies, Springer. 2019; 1:738-47. http://dx.doi.org/10.1007/978-3-030-16181-1_69
    » http://dx.doi.org/10.1007/978-3-030-16181-1_69
  • 19
    Anand T, Sinha S, Mandal M, Chamola V, Yu FR. AgriSegNet: Deep aerial semantic segmentation framework for IoT-assisted precision agriculture. IEEE Sens. J. 2021; 21(16):17581-90.
  • 20
    Awan SH, Ahmed S, Safwan N, Najam Z, Hashim MZ, Safdar T. Role of internet of things (IoT) with blockchain technology for the development of smart farming. J. mech. continua math. sci.2019;14(5):170-188.http://doi.org/10.26782/jmcms.2019.10.00014
    » http://doi.org/10.26782/jmcms.2019.10.00014
  • 21
    Ren W, Wan X, Gan P. A double-blockchain solution for agricultural sampled data security in Internet of Things network. Future Gener. Comput. Syst. 2021; 117:453-61.http://dx.doi.org/10.1016/j.future.2020.12.007
    » http://dx.doi.org/10.1016/j.future.2020.12.007
  • 22
    Awan SH, Ahmed S, Nawaz A, Sulaiman S, Zaman K, Ali MY,Khan ZN, Saeed SI. BlockChain with IoT, an emergent routing scheme for smart agriculture. Int. J. Adv. Comput. Sci. Appl.2020; 11(4):420-9.http://dx.doi.org/10.14569/IJACSA.2020.0110457
    » http://dx.doi.org/10.14569/IJACSA.2020.0110457
  • 23
    Chaganti R, Varadarajan V, Gorantla VS, Gadekallu TR, Ravi V. Blockchain-based cloud-enabled security monitoring using Internet of Things in smart agriculture. Future Internet.2022;14(9):250.https://doi.org/10.3390/fi14090250
    » https://doi.org/10.3390/fi14090250
  • 24
    Vangala A, Sutrala AK, Das AK, Jo M. Smart contract-based blockchain-envisioned authentication scheme for smart farming. IEEE IoT- J.2021; 8(13):10792-806.https://doi.org/10.1109/JIOT.2021.3050676
    » https://doi.org/10.1109/JIOT.2021.3050676
  • 25
    Ramamoorthi R, Ramasamy A. Block Chain Technology Assisted Privacy Preserving Resource Allocation Scheme for Internet of Things Based Cloud Computing. Tehničkivjesnik. 2023;30(6):1943-50. doi: 10.17559/TV-20230404000503.
    » https://doi.org/10.17559/TV-20230404000503.
  • Funding:

    The authors declare they have no funding applied.

Edited by

Editor-in-Chief:

Alexandre Rasi Aoki

Associate Editor:

Fabio Alessandro Guerra

Publication Dates

  • Publication in this collection
    19 Aug 2024
  • Date of issue
    2024

History

  • Received
    14 Aug 2023
  • Accepted
    18 Oct 2023
Instituto de Tecnologia do Paraná - Tecpar Rua Prof. Algacyr Munhoz Mader, 3775 - CIC, 81350-010 Curitiba PR Brazil, Tel.: +55 41 3316-3052/3054, Fax: +55 41 3346-2872 - Curitiba - PR - Brazil
E-mail: babt@tecpar.br