Author
Listed:
- Emil Marian Pasca
(Department of Electrical, Electronics and Computer Engineering, Technical University of Cluj-Napoca, 400114 Cluj-Napoca, Romania
European University of Technology, European Union
These authors contributed equally to this work.)
- Daniela Delinschi
(Department of Electrical, Electronics and Computer Engineering, Technical University of Cluj-Napoca, 400114 Cluj-Napoca, Romania
European University of Technology, European Union
These authors contributed equally to this work.)
- Rudolf Erdei
(Department of Electrical, Electronics and Computer Engineering, Technical University of Cluj-Napoca, 400114 Cluj-Napoca, Romania
European University of Technology, European Union
These authors contributed equally to this work.)
- Iulia Baraian
(Department of Electrical, Electronics and Computer Engineering, Technical University of Cluj-Napoca, 400114 Cluj-Napoca, Romania
European University of Technology, European Union
These authors contributed equally to this work.)
- Oliviu Dorin Matei
(Department of Electrical, Electronics and Computer Engineering, Technical University of Cluj-Napoca, 400114 Cluj-Napoca, Romania
HOLISUN SRL, 430397 Baia Mare, Romania)
Abstract
Agricultural Internet of Things (IoT) deployments face unique cybersecurity challenges due to resource constraints and direct impact on food production. This paper introduces a vulnerable-by-design, containerized IoT framework simulating both cybersecurity vulnerabilities and sensor health anomalies in agricultural settings. We demonstrate its agricultural relevance through a tomato greenhouse case study where combined DDoS attacks and sensor faults masked critical temperature increases to 43 °C, potentially reducing yields by up to 30%. Our masking analysis revealed counter-intuitive relationships between sensor faults and attack detectability: spike faults enhanced BOLA attack detectability by up to 95.9%, while dropout faults masked command injection attacks by 18.0%. We identified distinctive temporal signatures for each attack type and quantified these relationships through a composite detectability score. Our LSTM-based validation achieved moderate recall (0.5473 average) with significant variation across fault conditions (0.3194–0.8145), while maintaining strong precision (0.8285). The LSTM model performed best with drift fault conditions (0.9749 accuracy), while DDoS attacks were most consistently detectable (avg. score: 0.6886) and resource exhaustion attacks the most difficult (0.3056). These findings challenge conventional approaches that treat sensor health and security as separate domains. Our open-source implementation with systematic dataset generation capabilities addresses reproducibility challenges in agricultural IoT security while demonstrating that integrated health-security monitoring could significantly improve threat detection in smart agriculture deployments.
Suggested Citation
Emil Marian Pasca & Daniela Delinschi & Rudolf Erdei & Iulia Baraian & Oliviu Dorin Matei, 2025.
"A Vulnerable-by-Design IoT Sensor Framework for Cybersecurity in Smart Agriculture,"
Agriculture, MDPI, vol. 15(12), pages 1-36, June.
Handle:
RePEc:gam:jagris:v:15:y:2025:i:12:p:1253-:d:1675523
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jagris:v:15:y:2025:i:12:p:1253-:d:1675523. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.