Research Paper 01

Public Research / March 29, 2026

Designing Farm Operating Systems for Low-Connectivity Environments.

Farm software for rural deployment should treat intermittent connectivity as a normal operating condition, not an exception. This paper presents a bounded architectural case study of how that can be done.

Evidence base: peer-reviewed digital agriculture literature plus Anthedon's internal architecture and validation documentation. This is an architectural case study, not a field trial, benchmark suite, or security audit.

Abstract

Digital agriculture increasingly relies on connected sensing, cloud analytics, and platform-mediated workflows. Yet recurring literature across farm management, decentral digital farming, and smart-farming security points to two persistent fragilities: operational dependence on reliable internet access and fragmented, weakly interoperable toolchains [2]-[6], [8]. This paper argues that farm software intended for rural deployment should be designed as offline-first or local-first infrastructure rather than as a thin client around an always-on cloud [7].

The paper synthesizes design requirements from resilient digital agriculture literature and presents Anthedon Farm OS as a bounded architecture and implementation case study grounded in internal technical documentation [1]. The documented system combines a Progressive Web App, local persistence via IndexedDB and Dexie for core records and workflows, queued writes, asynchronous push and pull synchronization to a cloud backend, database-level tenant isolation, and edge telemetry ingestion through LoRaWAN gateway infrastructure with local buffering [1]. The contribution is a literature-grounded requirements synthesis, a concrete architectural decomposition, and an operational flow model distinguishing offline-capable from online-required functions. The evidence supports a restrained conclusion: offline-first farm operating systems are a credible response to low-connectivity environments, but claims about reliability, security assurance, scalability, or farm-level performance outcomes require future empirical validation.

Keywords offline-first systems local-first software digital agriculture resilience edge computing multi-tenant isolation

1. Introduction

Digital agriculture is often narrated through sensors, AI, and cloud analytics, but farm operations also depend on basic systems properties: records must remain available in the field, workflows must continue during outages, and actions taken under degraded connectivity must remain intelligible and auditable later. Rural production environments make these requirements unusually difficult because connectivity is intermittent, devices are distributed, and operational decisions cross physical and digital layers.

The farm management literature repeatedly identifies internet dependence and interoperability failures as structural vulnerabilities rather than incidental inconveniences. Bökle et al. describe lack of interoperability and dependency on internet connectivity as among the most important fragilities in digitized farming processes [2]. The same literature also describes a fragmented software landscape in which farms routinely combine multiple Farm Management Information Systems and specialized tools because no single platform fully covers operational needs [2], [4], [8]. A connectivity outage in such an environment is therefore not merely a temporary loss of cloud convenience; it can interrupt the operational center of the farm.

Security research sharpens the same concern. Smart farming systems expand attack surfaces across sensors, gateways, cloud services, and control interfaces, while remote and decentralized deployment conditions make secure communication and integrity preservation harder to sustain [6]. At the same time, the systems literature on local-first software argues that applications should preserve user control and core functionality on the local device and synchronize later, rather than making the cloud the sole locus of truth and availability [7]. For agricultural operations in low-connectivity regions, this is not only a usability preference. It is a resilience requirement.

This paper therefore asks a bounded architectural question: how should a farm operating system be designed when reliable connectivity cannot be assumed? The paper does not claim to prove that any one architecture improves yields, profitability, or security outcomes. Instead, it develops a requirements synthesis from the literature and uses Anthedon Farm OS as a case study to document how an offline-first architecture can be structured in practice [1].

This paper makes three contributions:

  1. It synthesizes literature-grounded design requirements for farm software deployed under intermittent connectivity.
  2. It documents Anthedon Farm OS as a bounded architecture and implementation case study, distinguishing documented mechanisms from unvalidated claims.
  3. It presents two practical analytical artifacts: a requirements synthesis table and an operational flow model that separates offline-capable from online-required functions.

3. Method and Evidence Base

This paper follows a bounded architectural case-study method. Peer-reviewed sources are used to define the problem context, establish design pressures, and provide comparison points for resilience, interoperability, integration, and security [2]-[9]. Anthedon's internal technical briefing is used as the primary evidence base for the case-study architecture, implementation details, and operational flow classifications [1]. The technical briefing describes intended capabilities and documented mechanisms, but it is not an independent evaluation.

Source hierarchy matters here. The technical briefing remains the primary source for architecture and operational-flow descriptions [1], while internal pilot and validation documents are used only for narrow proof points concerning sync recovery, command round-trip behavior, tenant-isolation enforcement, and available validation commands [10]-[12]. Accordingly, the paper draws a strict claim boundary in the method itself. Claims about connectivity dependence, interoperability fragmentation, integration pressure, and security maturity are derived from peer-reviewed sources [2]-[9], while claims about Anthedon's architecture are limited to mechanisms described in the technical briefing, including local persistence, deferred synchronization, tenant isolation, gateway buffering, and authenticated gateway handling [1]. The paper does not claim validated farm-level performance, full offline parity across every feature, proven enterprise scalability, or audited security assurance.

Within that boundary, the validation layer provides a modest but material implementation proof surface. The hardware pilot runbook records a sync-soak proof in which 60 queued task writes drained successfully after reconnection, and a dry-run valve_open command that was acknowledged and created an irrigation event [10]. The security proof shows tenant-isolation evidence in which cross-farm reads returned zero rows while cross-farm device_commands inserts were rejected with HTTP 403 [11]. The repository validation-command layer, as recorded in the project README, identifies current proof paths including verify:tenant-isolation, pilot:heartbeat-probe, and pilot:command-roundtrip [12]. These artifacts do not establish production proof, but they do support treating the case study as implemented architecture rather than a purely conceptual sketch.

4. Design Requirements for Low-Connectivity Farm Operating Systems

The literature supports six design requirements for a farm operating system intended for deployment under intermittent connectivity. Core workflows must remain locally usable; writes must be durable before cloud acknowledgement; online dependency must be explicit; resilience must include the edge; integration breadth must be matched by disciplined data modeling; and security, integrity, and governance must be treated as co-requirements [2]-[9].

Table 1. Requirements synthesis for low-connectivity farm operating systems.

Dimension Literature pressure Architectural implication
Local continuity Cloud dependence creates continuity risk in farming workflows [2], [3]. Core field and operational records should remain locally available and writable on user devices [1], [7].
Deferred synchronization Work must proceed without immediate server acknowledgement [3], [7]. Writes should be queued locally and synchronized opportunistically when connectivity returns [1].
Explicit online boundaries External services and shared state cannot always be made fully offline [4], [5]. The system should clearly separate offline-capable from online-required functions and provide fallbacks where possible [1].
Edge resilience The operational edge introduces transport interruptions and device-layer risk [3], [6], [9]. Telemetry and command paths need edge buffering, retry semantics, and bounded replay behavior [1].
Integrated operational scope Fragmentation and weak interoperability reduce usefulness and increase administrative friction [2], [4], [8]. A single operational surface should cover multiple farm domains while preserving contextual metadata and record provenance [1].
Integrity and governance Smart-farm threats are cross-layer, while many advanced defenses remain immature [6]. Favor mature controls: RBAC, tenant isolation, authenticated gateway ingestion, replay protection, and append-only audit records [1].

5. Anthedon Farm OS as a Case Study

Anthedon Farm OS is documented as a multi-module farm operations platform covering dashboard and map views, power, irrigation, security, alerts, crops, livestock, weather, tasks, inventory, finance, harvest, equipment, pest logging, approvals, and audit trails [1]. That breadth matters because it places offline-first requirements across operational, administrative, and governance workflows rather than confining them to a narrow field-data tool.

The documented delivery model is a Progressive Web App intended to function on mobile and desktop devices [1]. Operational data are stored locally on the device using IndexedDB via Dexie, while application resources are cached through service-worker behavior [1]. This choice aligns with the local-first principle that core records and interaction should remain available on the local device, while synchronization and upstream service integrations can remain explicitly network-bound [7].

The synchronization model is described as local-first. User writes are committed locally, queued, and later synchronized via push and pull paths to cloud services [1]. The technical briefing names synchronization functions, describes conflict detection and resolution, and notes that real-time propagation can be enabled when bandwidth permits [1]. However, the documentation does not specify the exact merge model or formal correctness guarantees. The safest claim is therefore that conflict handling is documented, not that convergence or strong consistency have been empirically demonstrated.

On the backend, the technical briefing describes Supabase services, PostgreSQL storage, and database-level row-level security policies used to enforce farm isolation [1]. Role-based access control and farm-membership context are used to scope user permissions [1]. This is significant because it shows that governance boundaries are not delegated solely to the user interface. The architecture attempts to preserve farm-level separation at the database layer itself.

The edge path is equally important. Anthedon's technical briefing documents a LoRaWAN ingestion path built around a gateway bridge and ChirpStack, with local buffering between the gateway and cloud endpoints so telemetry is not lost during interruptions [1]. It also documents a command lifecycle with queued, sent, acknowledged, executed, failed, and expired states, plus scheduled requeue behavior for commands stranded in transit [1]. These details indicate an architecture that treats instability on both the user-device side and the gateway side as a normal operating condition.

6. Operational Flow Model and Security Considerations

Offline-first claims are only credible when they identify which functions remain useful without the network and which remain online-bound. Table 2 classifies Anthedon's documented flows conservatively and makes explicit that the architecture preserves offline continuity for core local work, not full offline parity across synchronization and external integrations.

Table 2. Operational flow classification for the documented Anthedon architecture.

Functional flow Offline status Evidence-based interpretation
Local navigation and interaction with the installed PWA Offline-capable The technical briefing documents offline-capable application-shell behavior and local persistence for the installed client, without implying parity for every networked feature [1].
Creating or editing locally persisted farm records on the device Offline-capable The system is documented as local-first, with durable local writes and deferred sync [1].
Synchronizing queued changes to shared cloud state Online-required Synchronization is explicitly the point at which connectivity is required [1].
Receiving real-time remote updates Online-required Real-time propagation is documented as an online feature and may be disabled in constrained settings [1].
Viewing cached weather already stored locally Partially offline-capable Cached and fallback weather behavior is documented, but freshness depends on earlier successful network access [1].
Fetching fresh weather data from external providers Online-required External weather updates depend on upstream connectivity [1].
Sending approval or priority alerts through Telegram Online-required Telegram delivery is an external notification path and therefore remains connectivity-dependent [1].
Sending daily digests or alert emails through Resend Online-required Email dispatch depends on an external service and cannot be treated as an offline-capable flow [1].
Gateway telemetry persistence during backhaul outage Buffered at the edge The gateway bridge stores readings locally before forwarding them to cloud endpoints [1].
Hardware gateway control and command execution Online-required The current gateway control path depends on Supabase Edge Functions, MQTT, and host services, so it should not be presented as an offline-capable product flow [1], [10].

Offline-capable read access in this matrix should also be read as cached-local-state access rather than guaranteed fresh shared state. Where the system remains usable without the network, freshness still depends on the last successful synchronization or upstream fetch [1].

Anthedon's documented controls include authentication through Supabase Auth, role-based authorization, PostgreSQL row-level security for farm isolation, per-gateway HMAC request signing, timestamp-bounded replay protection, and append-only audit records [1]. These are not exotic mechanisms, and that is precisely their strength in this context. Zahid et al. show that many smart-farming security solutions remain below deployment readiness [6]. A platform intended for real farm operations benefits more from inspectable, widely understood controls than from advanced mechanisms that cannot yet be validated in deployment conditions.

The most defensible security claim is therefore limited but meaningful: the documented architecture aligns with known smart-farming threat categories by preserving tenant boundaries, authenticating gateway-originated requests, bounding replay windows, and retaining audit evidence [1], [6]. The repository validation layer now adds narrow but real implementation evidence that the access boundary is enforced below the user interface: cross-farm reads returned zero rows, and cross-farm device_commands inserts were rejected with HTTP 403 [11]. What cannot yet be claimed is full security assurance. The available evidence still does not include a threat model, penetration test, red-team exercise, incident-response drill, or formal mapping of implemented controls to ISO or IEC product-security criteria.

7. Discussion and Limitations

The Anthedon case study is best understood as a hybrid response to a real systems tension. The decentral digital farming literature favors more localized server infrastructure and reduced dependence on opaque cloud services [3]. Integrated digital agriculture literature, by contrast, often assumes shared platforms, data aggregation, and cloud-connected decision support [4], [8]. Anthedon's documented architecture occupies the middle ground: core work is pushed to the local device and the farm edge, while synchronization, aggregation, and certain external services still rely on the cloud [1].

That hybrid position has strengths. It reduces the operational fragility of a pure cloud-first design while preserving the coordination benefits of shared backends and remote access. It also fits the local-first systems argument that availability, ownership, and basic control should start at the edge of use rather than in a distant service boundary [7]. At the same time, the hybrid approach does not eliminate the harder governance questions emphasized by the decentral server literature. Data jurisdiction, cloud trust, and failure modes in the synchronization plane remain relevant [3].

The case study also exposes the integration tax of offline-first agricultural software. It is relatively straightforward to make a narrow field form work offline. It is much harder to preserve coherent semantics across tasks, inventory, finance, device telemetry, approvals, and audit trails in one system. Anthedon's breadth is therefore important, but it also magnifies the need for explicit conflict models, module-level offline guarantees, and careful metadata discipline [1], [2], [4].

Several limitations still bound the paper. The case study relies on internal technical documentation and narrow pilot or validation documents rather than field trials, public code review, or independent system evaluation [1], [10]-[12]. The synchronization model is described operationally but not specified formally, so the paper cannot claim proven convergence, strong consistency, or correctness under adversarial edit patterns [1]. Scalability claims remain out of scope because the available materials do not provide benchmark evidence or transparent load-test methodology [1]. Security controls now have narrow implementation proof, but they are not independently validated through audit, penetration testing, or incident exercises [1], [6], [11]. The reference set also supports the architectural argument more strongly than it supports novelty claims or broad claims about the entire FMIS market.

8. Conclusion

The literature on digital farming, decentralized agricultural infrastructure, and smart-farming security converges on a practical diagnosis: internet dependence, fragmented software ecosystems, and cross-layer integrity risks are serious operational problems for farms working under intermittent connectivity [2]-[6], [8], [9]. These pressures justify a shift in architectural stance. Farm software for rural deployment should treat disconnection as a normal operating condition rather than as an exception.

Within that framing, Anthedon Farm OS offers a concrete and publishable case study of an offline-first farm operating system architecture. The documented design combines a PWA client, durable local persistence, queued writes, asynchronous synchronization, tenant isolation at the database layer, and edge-aware telemetry buffering through LoRaWAN gateway infrastructure [1]. That combination does not prove superior performance, security, or business value. What it does provide is a clear reference architecture for how a farm operations platform can be structured when continuity matters more than cloud convenience.

The appropriate conclusion is therefore bounded and practical. Offline-first farm operating systems are a credible response to low-connectivity agricultural environments. Anthedon shows how such a system can be composed. The next step for the field is not more rhetoric about smart agriculture in the abstract, but rigorous empirical validation of outage behavior, synchronization correctness, interoperability, and security assurance in real farm deployments.

References

  1. Anthedon, Anthedon Farm OS - Technical Briefing, internal technical documentation, 2026.
  2. S. Bökle, D. S. Paraforos, D. Reiser, and H. W. Griepentrog, "Conceptual framework of a decentral digital farming system for resilient and safe data management," Smart Agricultural Technology, vol. 2, p. 100039, 2022, doi: 10.1016/j.atech.2022.100039.
  3. S. Bökle, M. Gscheidle, M. Weis, D. S. Paraforos, and H. W. Griepentrog, "A concept of a decentral server infrastructure to connect farms, secure data, and increase the resilience of digital farming," Smart Agricultural Technology, vol. 10, p. 100701, 2025, doi: 10.1016/j.atech.2024.100701.
  4. G. Gebresenbet, T. Bosona, D. Patterson, H. Persson, B. Fischer, N. Mandaluniz, G. Chirici, A. Zacepins, V. Komasilovs, T. Pitulac, and A. Nasirahmadi, "A concept for application of integrated digital technologies to enhance future smart agricultural systems," Smart Agricultural Technology, vol. 5, p. 100255, 2023, doi: 10.1016/j.atech.2023.100255.
  5. V. Kumar, K. V. Sharma, N. Kedam, A. Patel, T. R. Kate, and U. Rathnayake, "A comprehensive review on smart and sustainable agriculture using IoT technologies," Smart Agricultural Technology, vol. 8, p. 100487, 2024, doi: 10.1016/j.atech.2024.100487.
  6. F. Zahid, X. Chen, S. Sohail, B. Li, and M. P.-L. Ooi, "Systematic mapping study to assess security landscape for IoT-based smart farming systems," Computers & Security, vol. 162, p. 104790, 2026, doi: 10.1016/j.cose.2025.104790.
  7. M. Kleppmann, A. Wiggins, P. van Hardenberg, and M. McGranaghan, "Local-first software: You own your data, in spite of the cloud," in Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software, 2019, pp. 154-178, doi: 10.1145/3359591.3359737.
  8. J. Wolfert, L. Ge, C. Verdouw, and M. J. Bogaardt, "Big data in smart farming - A review," Agricultural Systems, vol. 153, pp. 69-80, 2017, doi: 10.1016/j.agsy.2017.01.023.
  9. R. Moreira, L. F. R. Moreira, P. L. A. Munhoz, E. A. Lopes, and R. A. A. Ruas, "AgroLens: A low-cost and green-friendly Smart Farm Architecture to support real-time leaf disease diagnostics," Internet of Things, vol. 19, p. 100570, 2022, doi: 10.1016/j.iot.2022.100570.
  10. Anthedon, Anthedon Farm OS - Hardware Pilot Runbook, internal pilot documentation, 2026.
  11. Anthedon, Anthedon Farm OS - Security Proof, internal validation documentation, 2026.
  12. Anthedon, Anthedon Farm OS README and validation commands, internal repository documentation, 2026.

Research follow-through

Need the implementation context behind the paper?

Use the technical briefing for deployment detail, or contact Anthedon directly if the paper raises diligence or licensing questions.