curity level becomes more complicated, the usabil-
ity usually drops. However, any complicated process
might discourage farmers from using such systems,
especially that the security awareness in farms is not
high. Therefore, The system should have simple ex-
pressive policy language such as roles, time, loca-
tion, device, capability etc. In addition, It could be
beneficial to use policy automation to fill the gap be-
tween farmer intuitive policies and the matching de-
tailed technical configurations and rules.
3. Resolving Conflicts: The system should be able to
identify and resolve conflicts of access demands.
4. Access Policies: Policies should at least consist
of the triplet: <Individual’s Role, Device Capability,
Contextual Factors>.
5. Policy Creation, Enforcement & Execution: All
specified access control policies should be enforced
on the system. And access control requests should be
evaluated against the enforced policies.
Smart devices are usually managed through a hub
device. The hub device is used to facilitate the com-
munication between devices and the cloud. Once the
farmer specifies the required access controls, it should
be sent through the hub device to the server on the
cloud. That server then should generate the required
policies and ensure it is enforced over all system re-
sources. Whenever an access control to a system re-
source is requested, it should be automatically for-
warded to the server. The server should check the
request against the created policies. If the request is
valid it should be accepted on the specified resource,
otherwise it should be denied as shown in Figure 4.
6 RELATED WORK
Many researches have started looking into the secu-
rity and privacy issues in different IoT domains such
as (Fan et al., 2019) who designed access controls
considering fog computing for providing data confi-
dentiality, variability and attribute based encryption.
However, there have been a limited work explor-
ing specifically the security in smart farming and pre-
cision agriculture despite that the U.S. Department
of Homeland Security issued a report (Aida Boghos-
sian, 2018) identifying the different threats to preci-
sion agriculture and emphasizing the need for more
research regarding this area. Most researches were
focused on blockchain solutions such as (Kamilaris
et al., 2019) who studied the challenges and implica-
tions of using blockchain technology projects in the
agriculture sector and (Ferrag et al., 2020) who pro-
vided the consensus algorithms for the solutions that
are based on blockchain and how can they be adapted
for smart farming. We omit further blockchain work
as its not related to our main focus.
7 PAPER SUMMARY
Smart farming is an emerging sector of IoT applica-
tions. It faces many challenges ranging from adoption
of its technologies to the security issues that stems
from applying it inside the farms. Therefor, an exten-
sive research is required in this area. In this paper we
explored different security scenarios that stems form
the diverse nature of smart farms. We identified the
structure of smart farms and the different stakeholders
who are involved in the system. We explored relevant
access control policies that can be particularly applied
to smart farms.
REFERENCES
2021 Smart farming: How iot-driven precision agriculture
helps feed the globe.
Aida Boghossian, S. L. (2018). Threats to precision agricul-
ture,u.s. dept. homeland secur., washington, dc, USA.
Bigelow, D. (2019). Farmland ownership and tenure.
Agricultural Resources and Environmental Indicators,
2019, 87:84.
Bigelow, D., Borchers, A., and Hubbs, T. (2016). Us farm-
land ownership, tenure, and transfer. Technical report.
Bruinsma, J. et al. (2009). The resource outlook to 2050:
by how much do land, water and crop yields need to
increase by 2050. In Expert meeting on how to feed
the world, volume 2050, pages 24–26.
De Araujo Zanella, A. R., da Silva, E., and Albini, L. C. P.
(2020). Security challenges to smart agriculture: Cur-
rent state, key issues, and future directions. Array,
page 100048.
Fan, K., Xu, H., Gao, L., Li, H., and Yang, Y. (2019). Ef-
ficient and privacy preserving access control scheme
for fog-enabled iot. Future Generation Computer Sys-
tems, 99:134–142.
Ferrag, M. A., Shu, L., Yang, X., Derhab, A., and Maglaras,
L. (2020). Security and privacy for green iot-based
agriculture: Review, blockchain solutions, and chal-
lenges. IEEE access, 8:32031–32053.
Horton, T. J. and Kirchmeier, D. (2020). John deere’s at-
tempted monopolization of equipment repair, and the
digital agricultural data market-who will stand up for
american farmers? CPI Antitrust Chronicle, Jan.
Kamilaris, A., Fonts, A., and Prenafeta-Bold
´
ν, F. X. (2019).
The rise of blockchain technology in agriculture and
food supply chains. Trends in Food Science & Tech-
nology, 91:640–652.
Roser, M.(2013). Future population growth. Our World
in Data https://ourworldindata.org/future-population-
growth.
ICISSP 2022 - 8th International Conference on Information Systems Security and Privacy
452