AgriTrust—A Trust Management Approach for Smart Agriculture in Cloud-based Internet of Agriculture Things

Internet of Things (IoT) provides a diverse platform to automate things where smart agriculture is one of the most promising concepts in the field of Internet of Agriculture Things (IoAT). Due to the requirements of more processing power for computations and predictions, the concept of Cloud-based smart agriculture is proposed for autonomic systems. This is where digital innovation and technology helps to improve the quality of life in the area of urbanization expansion. For the integration of cloud in smart agriculture, the system is shown to have security and privacy challenges, and most significantly, the identification of malicious and compromised nodes along with a secure transmission of information between sensors, cloud, and base station (BS). The identification of malicious and compromised node among soil sensors communicating with the BS is a notable challenge in the BS to cloud communications. The trust management mechanism is proposed as one of the solutions providing a lightweight approach to identify these nodes. In this article, we have proposed a novel trust management mechanism to identify malicious and compromised nodes by utilizing trust parameters. The trust mechanism is an event-driven process that computes trust based on the pre-defined time interval and utilizes the previous trust degree to develop an absolute trust degree. The system also maintains the trust degree of a BS and cloud service providers using distinct approaches. We have also performed extensive simulations to evaluate the performance of the proposed mechanism against several potential attacks. In addition, this research helps to create friendlier environments and efficient agricultural productions for the migration of people to the cities.

In IoAT, there are numerous security and privacy challenges that are required to be addressed in urban environment. Without a robust solution, it is not possible to take a complete advantage of the smart agriculture. The major security challenges of IoAT can be summarized as the identification of malicious and compromised nodes [47,48], authenticity [49], confidentiality [50,51], and privacy preservation of users [52]. In IoT, sensors are considered as edge nodes, which do not have enough capability to maintain resilience towards several potential attacks in distinct scenarios, such as smart homes [53], smart universities, and smart agriculture [54]. In all these environments, it is significant to keep resilience toward attacks generated by hackers with the help of malicious and compromised nodes. Besides, specifically in smart agriculture, if any of the sensors becomes malicious, then it affects the decision making that directly disturbs the production. Several existing approaches address the identification of malicious nodes by utilizing trust, however, the field of smart agriculture is totally neglected in those proposals. In this article, a privacy-aware trust management mechanism is proposed for smart agriculture, which provides security by identifying malicious and compromised nodes to maintain a secure environment. The proposed mechanism utilizes distinct trust parameters to evaluate the degree of trust between the sensors and BS, and then between the BS and the cloud. To improve the scalability and lighten the computational burden, AgriTrust is a time-driven approach that computes trust for a specific time and performs communications based on its computed trust degree. To improve the robustness and eliminate non-repudiation, the proposed mechanism uses the previous and current trust degrees to evaluate the aggregated trust while computing direct trust values. When the BS has no previous observation or previous trust, then it relies on indirect trust, which is computed based on recommendations. Each node has to maintain its minimum degree of trust that satisfies the threshold value to perform and transmit data.
The structure of the rest of the article is as follows: Section 2 elaborates on the existing work; Section 3 explains the proposed AgriTrust mechanism along with its working, trust composition, trust aggregation, and trust development; Section 4 presents the simulation results; and Section 5 concludes the paper.

Literature Review
The implementation of Cloud-based IoAT is not possible without addressing all the security challenges along with trust management, reliability, stack challenges, quality-of-service (QoS), and access control. Many current researches have pointed out numerous research gaps that are required to be addressed wherein trust management is one of those domains in which a significant amount of research is needed to provide adequate security. However, it has been neglected and no such mechanism is proposed to identify malicious nodes based on trust parameters. A considerable amount of research has been done in various fields of smart agriculture, which is elucidated in this section.
In [55], a study has been published that focuses on the digitization of smart cites and agriculture. The study stated that it is significant to use arrowhead technologies that increase the performance of a network and helps to address the challenges associated with transmission speed, latency, etc. With respect to smart agriculture, the study has integrated the arrowhead local cloud that consists of data connector components and data transformation engine connected with data storage and decision support units. The collected data is further used by data visualization component for aggregation and analytics. A smart irrigation system is proposed to efficiently utilize the energy resources [56]. The system designs a node having the capability of long-transmission and utilizes low energy by using SOC CC1310. Further, the proposed mechanism integrates 6LoWPAN along with fuzzy to predict the irrigation strategies.
In [57], another smart irrigation system is proposed that focuses on reducing the cost by using Message Queue Telemetry Transport protocol (MQTT). In the proposed mechanism, the system designs a simple water pumping mechanism controlled by sensors along with NodeMCU-12E and Esp8266. The transmission and receiving of sensor information is forwarded by utilizing MQTT protocol. The soil moisture sensor has to transmit the findings towards NodeMCU-12E, whereby it further takes the required actions. Another smart irrigation system is proposed to reduce the cost of irrigation by using low-cost moisture sensors along with XBEE communications [58]. The study stated that efficient water management plays a vital role and it should be the prime focus of the world to utilize it with precision to reduce water wastage. In the proposed mechanism, the soil moisture is gathered from the sensors where the XBEE communication is integrated in a centralized server that controls the water resources for supply when required.
In [59], a cryptographic algorithm is proposed to improve the security of IoT-based irrigation system. The study stated that it is important to provide security to those devices which have less resources where cryptography is one of the most prominent solutions to maintain the integrity and confidentiality among nodes. The approach utilizes Secure Hashing Algorithm (SHA-256), Rivest Cipher (RS4), and Elliptic-Curve Cryptography (ECC). In [60], a solar-based security system is proposed for the smart irrigation system in IoAT. The security is provided by using ARM LAC2148 with an integrated LASER and Solar panel along with the GSM module. The major contribution of the study is the use of ARM controller, which provides adequate accuracy with minimal error. Similarly, a secure watering mechanism was proposed for smart agriculture in [61], which uses fuzzy logic along with blockchain to provide security. The proposed approach uses an Android platform for the consumption of water in small or medium gardens. This approach uses sensors to capture data, which include moisture level of soil, air temperature, etc. The blockchain maintains the privacy and reliability where the fuzzy logic is used for decision marking.
Despite the fact that several existing approaches have been proposed for the smart irrigation system, a few of them are concerned about maintaining low-cost while others focus on the provision of energy-efficient systems. Moreover, the existing researches for security in IoAT require notable consideration to address several security challenges, such as data privacy, reliability, and integrity among others, which have been pointed out in [62][63][64][65][66]. Moreover, several trust management mechanisms are proposed in IoT showing to have a significant impact on the identification of malicious nodes [67,68]. While in IoAT, it is important to identify such nodes that can affect smart irrigation systems. In [69], the study discussed the adoption of IoT in smart agriculture and the role of trust to minimize the risk. The study elaborated the significance of trust and stated that trust is a key for the technology acceptance model, which can also play a vital role to build positive relations among nodes. However, trust management in IoAT is neglected over a decade and a robust mechanism is required for cloud-based IoAT to maintain a secure environment among sensors, BS, and cloud service providers.

Proposed AgriTrust Approach
A trust management mechanism is proposed as an alternative to traditional cryptography approaches that consume more energy where devices with less computational resources are unable to perform such computations that cause vulnerabilities. The smart agriculture in IoAT consists of several sensors placed in soil to collect and transmit information, while the BS and cloud perform several distinct computational operations to find the results and take the required actions. The identification of malicious and compromised sensors is a significant challenge because a malicious sensor can transmit wrong findings that affect the production of crops or can also execute potential attacks to reduce the performance of the BS. Moreover, the BS to cloud transmission faces the same challenges and it is important to maintain a secure environment, which is efficient to identify the malicious and compromised nodes while using less energy resources. To address these challenges, trust is the most prominent solution that has been neglected in IoAT till date. In this article, a trust management mechanism is proposed to identify malicious nodes and maintain a robust environment. The proposed approach includes three distinct trust management models, i.e., sensors to BS trust computation, cloud to BS trust computation, and BS to cloud computation, where all these computations use their own trust parameters to identify malicious and compromised nodes. The AgriTrust mechanism computes the trust based on direct computations. The direct trust evaluation utilizes the available observations related to pre-defined parameters and computes the trust. The computation of trust degree is performed by utilizing the statistical model, while the trust is computed by the centralized authorities, i.e., BS and cloud service providers. The trust computations performed by the authorities are time-driven, which means that when a degree of trust is computed, then the central authority has to compute the trust degree over a specific period of time.
The proposed architecture of AgriTrust consists of agriculture fields equipped with sensors, dedicated BS, and cloud, as shown in Figure 2. The sensors collect data about the soil and transmit it to the BS. The communication between sensors and BS is equipped with WiFi module ESP8266 wireless connectivity. The sensors utilize in this model are soil moisture sensors that collect real-time data for water management. The yield monitoring sensor helps to identify spatial distribution of crop utilized for long term decision making. Other components are water, environmental, and soil micro-nutrients sensors. When a BS receives the data transmitted by the sensors, it first computes the trust value based on the pre-defined parameters and then compares it with the threshold value. If the trust degree meets the minimum requirement of trust, it accepts the value and exerts the required actions. On the other hand, if the requirements are not satisfied, then the BS neglects the value and starts monitoring that particular sensor for abnormal behaviors. The trust computation between the BS and cloud is also calculated based on the pre-defined parameters while utilizing the previous trust degree to evaluate the aggregated trust. The trust computations of agriculture sensors, BS, and cloud are elaborated in Sections 3.1-3.3, respectively. The relevant authority stores each computed observation in its particular category to fetch it for future computations. These observations are the previous computed trust degrees used by a node to formulate the aggregated trust value. The trust degree lies between 0.0 to 1.0, which means that 0.0 is the minimum trust and 1.0 is the maximum trust, whereas the default trust value for sensors is 0.5 and 0.6 for the BS and cloud, respectively. The trust computation in AgriTrust is time-driven and the default trust duration of superior trust per computation is 90 min, while it is 45 min in case of mid trust degree. When the BS computes the trust degree of a particular sensor or the cloud computes the trust degree of a BS, then they can communicate with each other for 90 min based on the same trust. On the contrary, if they want to exchange information after that specific time, they have to compute the trust degree again by using the same procedure.

Base Station to Sensor Trust Evaluation
The trust degree evaluation by the BS towards on-field sensors is initiated when they receive the transmitted data from the sensors. The sensors collect the findings and transmit data towards the BS. The BS evaluates the trust degree of that particular sensor first and then accepts the data. The trust evaluation of BS towards sensor is time-driven, which means that the BS evaluates the trust degree and accepts the data using the same trust for a specific period, as elaborated in Section 3. The trust evaluation process of sensors is illustrated in Algorithm 1 that is started by collecting the observation to identify whether it is possible to evaluate direct trust or should rely on the indirect/default trust degree. The trust parameters consist of credibility (cr), robustness (ro), and reliability (re). Equation (1) illustrates the observation check of the BS-to-sensors trust evaluation where p represents the previous trust and cr, ro, re represent the trust parameters, while ob cr 1−n , ob ro 1−n , ob re 1−n show the number of available observations. P cr t = ob cr 1 + ob cr 2 + . . . + ob cr n (1a) :  19: if (φ(t) ≥ 0.6) then 21: DeclaredTrustworthy; 22: else 23: StartMonitoring; If the observations are available about a particular sensor, then the AgriTrust starts evaluating the direct degree of trust by evaluating credibility, as represented in Equation (2). The credibility of a sensor shows the believability consist of subjective and objective components of trust. Equation (2) is evaluated by applying the summation function to all the available observations that give an output lies between the limit of the trust degree.
In Equation (2), c represents current trust, cr is the credibility evaluation, and ob cr 1−n shows the number of available observations related to credibility. The next process is to evaluate the robustness of a particular sensor evaluated on the basis of quality of being rigorous against potential attacks. Equation (3) shows the evaluation of robustness by applying summation to the available observations, where c represents current trust, ro is the trust parameter of robustness, and ob ro 1−n shows the number of available observations at particular time (t).
The last parameter evaluation is reliability, which represents the quality of being trustworthy and working consistency of a particular sensor. The trust evaluation of reliability is represented by Equation (4), where re represents the reliability parameter and ob re 1−n shows the observations related to reliability.
After evaluating the trust parameters based on the available observations, the next process is to develop an absolute value of trust from all trust parameters evaluation. The process of trust development begins by applying summation to the evaluation of the current parameters, as represented in Equation (5). The equation also applies a limit to formulate the value lying in the trust threshold value to compare it during the decision making phase. In Equation (5), T current n−id represents the current trust of a particular node, where n-id shows the unique identify of that node. The c trust cr , c trust ro ,c trust re represent the current trust evaluation of credibility, robustness, and reliability of trust parameters, respectively. After the development of trust parameter, the next process is to find the aggregate trust by utilizing the previous trust value that may provide an aggregated trust, as shown in Equation (6).
After evaluating the aggregated trust, the BS compares it with the threshold value where t ≥ 0.8 is the superior trust, t ≥ 0.6 is the mid trust, while the default trust value is t ≥ 0.5. If the trust degree of a sensor satisfies the threshold, then the BS accepts the findings of sensors and processes it for decision making. Otherwise, if the trust degree t ≤ 0.4, then the BS neglects to accept the findings and starts monitoring sensors for any abnormal behavior. If the sensor trust degree is estimated as superior, then the BS will utilize and accept the findings by using the same trust degree for 90 min and 45 min if the trust value lies between 0.6-0.7.

Base Station to Cloud Trust Evaluation
In IoAT, the BS and cloud are independent to communicate and exchange information with each other at any time. Their communications required to be secure and it is significant to maintain the integrity of information exchange during communications to preserve the privacy. To address these challenges, it is significant to maintain the trustworthiness by evaluating the trust degree using trust parameters. The AgriTrust proposes a two-way mechanism to evaluate the trustworthiness. The BS trust evaluation towards the cloud is elaborated in this section, while the cloud service trust evaluation towards the BS is explained in Section 3.3. The trust evaluation flow process is illustrated in Figure 2, while the computation process is represented in Algorithm 2.
No − Trust& if t ≤ 0.5 20: if (φ(t) ≥ 0.5) then 21: DeclaredTrustworthy; StartMonitoring; The process of cloud trust evaluation started by collecting the observations of parameters, i.e., congeniality, responsiveness, and QoS. The congeniality represents the quality of congenial host and provides the services according to the requirements. The responsiveness parameter is evaluated based on the ability of the cloud to respond quickly and positively. The QoS is evaluated and graded based on transmit delay, overhead, and throughput. The evaluation of these parameters is illustrated in Equation (7). In Equation (7a), the evaluation of congenial trust is based on the available observation where c represents the current trust and ob cog 1−n shows the collection of available observations.  (7b), c, cog, and trust show the congenial evaluation of current trust evaluated by applying the summation function on the current observations. After the evaluation of trust parameters, the BS will apply the summation to find the absolute value from the current values of trust, which can be computed using pre-defined parameters. The absolute trust development process is shown in Equation (8), where T current c−id shows the development cloud trust, c-id is the unique identity of trust utilized by the BS to maintain and store the trust degree for future aggregation.
The complete process of trust development leads the process to the next phase, which is used to compute the aggregated trust by applying summation to the previous trust value, as shows in Equation (9)  After finding the aggregated trust, the BS compares it with the threshold value. If the absolute trust degree fulfils the requirement of the minimum trust value, then the BS will transmit and receive information for a specific period of time, as elaborated in Section 3.

Cloud to Base Station Trust Evaluation
The AgriTrust is a two way trust-evaluation mechanism in which the BS and cloud service providers can both maintain the trust between each other for secure communications. The transmission of data from the BS contains critical information and the cloud performs numerous operations on that data, as illustrated in Figure 1. After processing data, the cloud gets the results, which is then transmitted towards the BS for performing necessary operations. The cloud performs the trust evaluation of the BS to identify the trustworthiness for secure communications and integrity of data. The trust evaluation of cloud towards BS is a different process that begins by collecting the available observations about a particular BS. The process of trust degree computation is represented by Algorithm 3. The trust evaluation of the BS consists of discreetness, credibility, and honesty parameters.

Algorithm 3 Cloud to Base Station Trust Evaluation
No − Trust& if t ≤ 0.5 20: if (φ(t) ≥ 0.5) then 21: DeclaredTrustworthy; 22: else 23: StartMonitoring; When the cloud receives data from the BS, it evaluates the trust and uses the same value for the pre-defined interval of time where the process of trust evaluation begins by evaluating the trust parameters of BS, which is illustrated by Equation (10). Equation (10a) shows the evaluation of BS discreetness where T current bs−id represents the current trust evaluation of the BS with the utilization of unique identity represented by bs − id. After the evaluation of discreetness, the next process is to evaluate the credibility and honesty represented by Equations (10b,c).
In Equation (10b), c trust cre shows the evaluation of current trust degree of credibility by applying summation function to the available observations, where in Equation (10c), c trust h shows the computation of BS honesty evaluation and ob h 1−n represents the number of available observations related to the honesty parameter. After the completion of trust parameter computation, the next step is to develop an absolute trust degree of the previous value and then aggregate these values with the current trust evaluation. In addition, it estimates the final trust degree of a particular BS to compare it with the threshold value to make the final decision. The computation of finding aggregated trust is represented by Equation (11).
In Equation (11a), T pre bs−id represents the previous trust degrees of a particular node where bs − id shows the unique identity of a specific BS and T pre 1−n c−id is the number of available trust degree. Equation (11b) demonstrates the evaluation of aggregated trust degree by adding the previous and current trust where T current bs−id shows the current trust degree, while T pre bs−id is the previous trust degree. The estimation of absolute trust degree by aggregating the previous and current trust leads the process to compare the final trust value with the threshold value. While the threshold value, in this case, is the same as elaborated during the BS-to-cloud trust degree evaluation in Section 3.2. If the trust degree satisfies the threshold value, then both will communicate. On the other hand, if the BS holds no trust, then the cloud will start monitoring for a pre-defined time. If the BS becomes trustworthy, then the cloud utilizes the same trust to communicate as trust computation, in this case, it is time-driven.

Indirect Trust Evaluation
The indirect trust is computed by gathering the recommendations from neighboring nodes. However, in the architecture of IoAT, the scenario is not the same. The architecture of IoAT includes three major components, i.e., sensors, BS, and cloud. As Sensor is only transmitting data to the BS and not communicating with anyone else, hence, gathering recommendations is not possible. In that situation when the BS cannot gather recommendations, it will assign the default degree of trust for communications. The situation of BS towards cloud is the same, however, the BS only transmits the data to a specific cloud and does not communicate with any other cloud or BS. Therefore, the recommendation gathering in this case is also not possible. Hence, the cloud assigns the default trust degree when it contains no previous observations. In the case of BS to cloud service provider, the BS can gather recommendations from the other BS as the cloud provides services to numerous BSs. In this situation, a particular BS generates a recommendation request for the neighboring connected BS and takes services from the same cloud. All BSs of the same cloud share recommendations based on their recommendations. When a BS receives these recommendations, then it applies the summation function to estimate the absolute trust degree, as shown in Equation (12).
After applying the summation function to the received recommendations, the BS will compare it with the predefined value and take the decision accordingly. However, there is no monitoring of cloud performed by the BS in case of low trust values.

Simulation and Results
This section discusses the simulation outcomes of the proposed AgriTrust mechanism under several scenarios. The performance of the BS and cloud service providers is also evaluated based on several QoS parameters.

Quality-of-Service Evaluation
The QoS evaluation is based on delivery ratio, latency, and overhead. The delivery ratio represents the number of packets successfully delivered from source to destination. The latency in the cloud-based IoAT causes the burden of computations on the BS or Cloud, while the overhead ratio represents the combination of indirect computational time. The QoS evaluation is performed under 4 distinct scenarios by varying the number of nodes from a minimum of 50 to a maximum of 250. Figure 3 represents the evaluation outcomes of the BS and cloud delivery ratios, which reveal that both maintain higher throughput. The BS maintains the average delivery ratio of 0.8, while the cloud sustains with 0.9. The cloud reaches higher delivery ratio, i.e., 0.99, when the number of nodes becomes 150. Whereas, the BS reaches the maximum delivery ratio when the number of nodes is near to 250.  Figure 4 represents the evaluation of latency average measured in time (seconds) by varying the number of nodes between 50-250, and the results show that the BS and cloud both successfully maintain the computational burden and compute the trust timely and respond back quickly. The minimum latency of the BS and cloud is 4000 and 2100, while the maximum latency is 5700 and 4260, respectively. Figure 5 shows the overhead ratio of the cloud and BS by increasing the number of nodes after a specific time. The simulation outcome shows the increase in the overhead ratios as the number of nodes increases with time.

Honest and Dishonest Precision Evaluation
The honest and dishonest trust precision represent the difference in the actual and estimated trust computed by AgriTrust. In the trust precision evaluation, the trust degrees of honest cloud, sensor, and BS have been simulated. Figure 6 represents the simulation outcomes of the trust degree of honest server, which shows that the proposed mechanism is able to estimate the actual trust within 55 s. Figure 7 shows the trust computation outcome of a dishonest sensor in which the AgriTrust is able to estimate the actual trust of a particular sensor within 75 s. The significant aspect of trust estimation is that the proposed approach assigns the low degree of trust in comparison to the actual trust of a node.      Figure 8 represents the trust precision of honest BS evaluated by AgriTrust and the simulation outcome shows that the actual and estimated trust become similar after 55 s. In comparison to the trust degree of an honest BS, the AgriTrust takes 5 more seconds to estimate the actual trust of dishonest BS (see Figure 9). Further, we have also evaluated the trust precision of honest and dishonest cloud service providers to validate the performance of the proposed approach and the result shows that AgriTrust can estimate the actual trust degree of an honest node after 55 s. of separate computations over distinct time, as presented in Figure 10. Figure 11 shows the trust precision of dishonest cloud where the proposed approach can identify the actual trust degree after 70 s. The significant aspect of trust degree precision evaluation is that AgriTrust estimates and assigns the lower degree of trust in comparison to the actual trust.

Whitewashing Attack
Whitewashing is a kind of attack whereby a node leaves the network with a low reputation and rejoins to gain the default reputation for communications. In the IoAT architecture, the most chances of executing a whitewashing attack are performed by the BS because sensors do not have the ability to leave the network. Similarly, it is also difficult for the cloud to leave the network as it is connected with numerous BSs. Figure 12 represents the simulation outcomes of the whitewashing attack under different scenarios created by increasing the number of nodes and the percentage ratios of malicious nodes. In scenario-1, the number of nodes variation made is 50∼250 with 20% malicious nodes where Figure 12 shows that the proposed mechanism assigns the lowest degree of trust after identifying malicious nodes and assigns higher/superior trust degree when it recognizes good/well-reputed nodes. In scenario-2, the total number of nodes is 50∼250 where 40% of the nodes are malicious and compromised. The simulation results show the effective performance of AgriTrust, which successfully identifies the nodes that try to execute the attack. In scenario-3, the variation of nodes is the same while the total percentage of malicious and compromised nodes increases as 60%. The simulation outcomes represent the efficient performance of the proposed methodology even with higher number of malicious nodes. In the last scenario, the number of node variations is also the same, but the number of malicious nodes becomes 80%. When the number of malicious nodes increases, it becomes difficult to maintain a secure and robust environment. In Figure 12, the result represents that AgriTrust successfully identifies the attacking nodes and maintains non-repudiation.

On-off Attack
It is a type of attack in which nodes start behaving maliciously after receiving a low trust degree that affects the performance of the whole network. The successful execution of an on-off attack may compromise the network that can raise the integrity and privacy challenges in addition to affect the decision making at the cloud side, which directly affects the agriculture fields. Figure 13 represents the simulation results with four different scenarios where the BS becomes malicious and tries to execute an on-off attack. Whereas the cloud has the responsibility to identify and stop them by adding into the monitoring list. In four different scenarios, the number of node variations is from 50∼250 where the percentage of malicious nodes are 15%, 25%, 35%, and 45%, respectively. As illustrated in Figure 13, in scenarios 2 and 4, the maximum number of malicious nodes execute the attacks successfully identified by AgriTrust while showing a significant downfall in the trust degree when the number of nodes reaches 100. As mentioned earlier, the number of malicious nodes in scenario 1 is more limited and no node is able to execute the attack because the trust degree graph shows the highest trust degree assigned to the nodes. Scenario 3 represents notable fluctuations after each time interval showing the identification and assigning low trust degree every time when malicious nodes try to execute an attack.

Energy Consumption
The energy consumption is significant for the successful implementation of Green IoAT. Also, there are numerous remote areas where a continuous supply of energy resources is not possible and they have to utilize the resources effectively and efficiently. Figure 14 illustrates the simulation results of the proposed mechanism, which shows the effective utilization of AgriTrust while performing trust computations. During simulations, the consumption of energy resources is represented by Joule whereby the simulation outcomes show that the computations performed by AgriTrust require fewer energy resources, which make it efficient for such remote areas where a continuous supply of energy is not possible. The effective utilization of energy resources makes AgriTrust a suitable approach for Green IoAT.

Conclusion
Smart automated agriculture is a significant concept presented in the domain of Internet of Agriculture Things (IoAT) wherein several sensors are placed in soil to monitor it and transmit the findings towards the BS and it further takes help from the cloud to make effective decisions to take perfect actions. However, security in the major components of smart agriculture requires a lightweight mechanism that can identify malicious and compromised nodes to maintain a secure environment. Moreover, one of the significant concepts of trust management is proposed by researchers that can play a notable role to maintain an adequate secure environment in IOAT, but it is neglected in the field of smart agriculture. In this article, a time driven-based trust management mechanism is proposed to identify those nodes which can affect secure environments of IoAT by any means. The proposed AgriTrust approach consists of three different trust management mechanisms, i.e., sensors to BS, cloud to BS, and BS to cloud trust evaluations. Each trust evaluation uses distinct trust parameters to identify malicious and compromised nodes. The simulation results illustrate the effective performance of these parameters in identifying malicious nodes where AgriTrust estimates the actual trust degree of nodes in a minimal time. The proposed work can be extended by employing artificial neural network to make the system intelligent having the capability to predict the malicious behavior of nodes.