Page 237 - Kaleidoscope Academic Conference Proceedings 2024
P. 237

Innovation and Digital Transformation for a Sustainable World




                                                              agricultural companies like Food and Ag-ISAC is essential.
                                                              While ISAC in finance, transportation, and electricity
                                                              has existed, ISAC in agriculture is becoming increasingly
                                                              essential. Therefore, the Food and Ag-ISAC [34] has been
                                                              established to share information on ransomware infections
                                                              and other threats to food and agricultural companies that are
                                                              members of the ISAC.

                                                                              7.  CONCLUSION

                                                              In this paper, we created a taxonomy of agricultural products
                                                              with networking capabilities and classified the products
                                                              available in the market. Next, we surveyed the actual situation
                                                              of agricultural IoT device security using Shodan. Noteworthy,
                                                              despite warnings in many security reports, few agricultural
                      Figure 6 – Sample of Web GUI            IoT devices were targeted by cyberattacks. Furthermore, we
                                                              presented the threats to agricultural IoT devices that could
           these standards are not specific to particular applications, such  emerge based on actual analysis cases. This paper shows
           as agriculture, but rather to general-purpose devices that are  the actual situation in smart farm from the cyber security
           the target of currently emerging threats.          perspective.

           6.2  Issues to be solved in the future                              REFERENCES

           In this section, we summarize three issues that need to be
                                                               [1] S. Rudrakar, P. Rughani, “IoT based Agriculture
           resolved in the future in the agricultural sector as open issues
                                                                  (Ag-IoT): A detailed study on Architecture, Security
           and provide recommendations for new countermeasures.
                                                                  and Forensics,”, Information Processing in Agriculture,
                                                                  Elsevier, 2023.
           Open Issues
                                                               [2] B.B Sinha, R. Dhanalakshmi, “Recent advancements
            1. There is an increasing probability that more and more  and challenges of Internet of Things in smart
               network-related devices in smart agriculture will be  agriculture: A survey,” Future Generation Computer
               opened to the Internet, as indicated in the use case of  Systems, Elsevier BV, pp. 169-184, 2022.
               solar power plants in Section 5.
            2. There is an increasing probability that the number of  [3] K. Demestichas, N. Peppes, and T. Alexakis, “Survey
               cases of unauthorized login from the Web GUI will  on Security Threats in Agricultural IoT and Smart
               increase as systems related to smart agriculture become  Farming,” Sensors 2020, 20(22), vol. 20 no. 22,
               more widespread, as indicated in the use case in Section  pp. 6458, 2020.
               5.
                                                               [4] S. Sontowski, M. Gupta, S.S.L. Chukkapalli, “Cyber
            3. Lack of coordination between organizations in charge
                                                                  attacks on smart farming infrastructure,” J2020 IEEE
               of security measures and agricultural companies
                                                                  6th International Conference on Collaboration and
               makes sharing information on security measures and
                                                                  Internet Computing (CIC), pp. 135-143, 2020.
               cyber-attack incidents difficult.
                                                               [5] Tractors vs. threat actors:  How to hack a farm |
           To overcome the first issue, vendors that provide services
                                                                  WeLiveSecurity,   https://www.welivesecurity.com/
           should inform users about security measures for network
                                                                  2022/12/05/tractors-threat-actors-how-hack-farm/,
           equipment (Switch, Gateway, and Remote I/O) used for
                                                                  Accessed on May 9, 2024.
           agricultural services. These network devices are likely to be
           general-purpose products, not targeted only for agricultural  [6] The  Rising  IoT  Threat  to  the  Agriculture
           services. Therefore, attackers can target multiple industries  Industry and the Global Food Supply,  https:
           with small costs, and attacks are expected to increase. To  //www.f5.com/labs/articles/threat-intelligence/
           overcome the second issue, vendors should inform users of  the-rising-iot-threat-to-the-agriculture-industry
           the dangers of unchecked security measures when deploying  -and-the-global-food-supply, Accessed on May 9,
           agriculture-related products or services.  For example,  2024.
           suppose an unauthorized login is made from a Web GUI
           unnecessarily opened to the Internet.  In that case, an  [7] IoT  cybersecurity:  A  major  concern  for
           attacker can manipulate parameters such as temperature  agriculture  -  IoT   Agenda,    https://www.
           settings or spraying pesticides, which can negatively impact  techtarget.com/iotagenda/blog/IoT-Agenda/
           the harvest.  To overcome the third issue, establishing  IoT-cybersecurity-A-major-concern-for-agriculture,
           an ISAC(Information Sharing and Analysis Centers) for  Accessed on May 9, 2024.




                                                          – 193 –
   232   233   234   235   236   237   238   239   240   241   242