State of the Art: Tantangan dan Pentingnya Standarisasi Keamanan IoT dalam Berbagai Implementasi
Keywords:
Keamanan IoT, Keamanan Siber, Perusahaan IoT, Standarisasi IoTAbstract
Standarisasi keamanan data di lingkungan IoT telah menjadi isu utama dengan adopsi teknologi IoT yang cepat. Penelitian ini memberikan gambaran tentang pentingnya standarisasi keamanan informasi untuk melindungi perangkat dan data IoT. Dengan standar keamanan yang jelas dan teruji, pengembang dapat merancang perangkat IoT dengan langkah keamanan yang konsisten. Perusahaan mendapatkan benefit dari investasi keamanan. Selain itu, standardisasi juga memungkinkan interoperabilitas perangkat IoT dari vendor yang berbeda, mengurangi risiko serangan, melindungi privasi pengguna, dan meningkatkan kepercayaan pengguna terhadap teknologi IoT. Penelitian ini juga menyatakan bahwa meskipun standar keamanan IoT sudah ada, penelitian dan pengembangan masih diperlukan untuk mengatasi ancaman keamanan baru yang hadir seiring dengan kemajuan teknologi IoT.References
[1] W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf, and Y. A. Bangash, “An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security,” IEEE Internet Things J, vol. 7, no. 10, pp. 10250–10276, 2020, doi: 10.1109/JIOT.2020.2997651.
[2] N. M. Karie, N. M. Sahri, W. Yang, C. Valli, and V. R. Kebande, “A Review of Security Standards and Frameworks for IoT-Based Smart Environments,” IEEE Access, vol. 9, pp. 121975–121995, 2021, doi: 10.1109/ACCESS.2021.3109886.
[3] R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2019, doi: 10.1016/j.comnet.2012.12.018.
[4] Zen Munawar and Novianti Indah Putri, “Keamanan IoT Dengan Deep Learning dan Teknologi Big Data,” Tematik, vol. 7, no. 2, pp. 161–185, 2020, doi: 10.38204/tematik.v7i2.479.
[5] A. Haryanto and S. M. Sutra, “Upaya Peningkatan Keamanan Siber Indonesia oleh Badan Siber dan Sandi Negara (BSSN) Tahun 2017-2020,” Global Political Studies Journal, vol. 7, no. 1, pp. 56–69, 2023, doi: 10.34010/gpsjournal.v7i1.8141.
[6] L. Arsada and H. Pembahasan, “Penerapan Metode NIST untuk Analisis Serangan Denial of Service (DOS) pada Perangkat Internet of Things (IoT),” Jurnal Ilmiah Komputasi, vol. 20, no. 2, pp. 275–281, 2021, doi: 10.32409/jikstik.20.2.2724.
[7] W. Zhou et al., “Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems,” IEEE Internet Things J, vol. 8, no. 14, pp. 11621–11639, 2021, doi: 10.1109/JIOT.2021.3059457.
[8] R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, “Internet of things (IoT) security: Current status, challenges and prospective measures,” 2015 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, pp. 336–341, 2016, doi: 10.1109/ICITST.2015.7412116.
[9] D. Lammert, “The connection between the sustainability impacts of software products and the role of software engineers,” ACM International Conference Proceeding Series, pp. 294–299, 2021, doi: 10.1145/3463274.3463346.
[10] F. Chen, D. Luo, J. Li, V. C. M. Leung, S. Li, and J. Fan, “Arm PSA-Certified IoT Chip Security: A Case Study,” Tsinghua Sci Technol, vol. 28, no. 2, pp. 244–257, 2023, doi: 10.26599/TST.2021.9010094.
[11] M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali, and M. Guizani, “A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security,” IEEE Communications Surveys and Tutorials, vol. 22, no. 3, pp. 1646–1685, 2020, doi: 10.1109/COMST.2020.2988293.
[12] D. Minoli and B. Occhiogrosso, “Blockchain mechanisms for IoT security,” Internet of Things (Netherlands), vol. 1–2, pp. 1–13, 2018, doi: 10.1016/j.iot.2018.05.002.
[13] J. Shepard, “New Security Requirements for All Z-Wave Certified IoT Devices,” eepower.com.
[14] Silicon Lab, “Introduction to Z-Wave SmartStart,” 2017.
[15] I. Unwala, Z. Taqvi, and J. Lu, “IoT security: ZWave and thread,” IEEE Green Technologies Conference, vol. 2018-April, pp. 176–182, 2018, doi: 10.1109/GreenTech.2018.00040.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Sutan Muhammad Sadam Awal, Darwis Muhammad

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
CC BY-SA 4.0
Creative Commons Attribution-ShareAlike 4.0 International
This license requires that reusers give credit to the creator. It allows reusers to distribute, remix, adapt, and build upon the material in any medium or format, even for commercial purposes. If others remix, adapt, or build upon the material, they must license the modified material under identical terms.
BY: Credit must be given to you, the creator.
SA: Adaptations must be shared under the same terms.ng