Analisis Protokol Keamanan Jaringan dalam Era Internet of Things (IoT)

Authors

  • Imam Hidayatullah Universitas Madura
  • Muh Hafiz Khairi Universitas Madura
  • Irfan Maulana Universitas Madura
  • Fauzan Prasetyo Eka Putra Universitas Madura

DOI:

https://doi.org/10.29408/jit.v8i2.30257

Keywords:

Security, information system, Internet Of Things, Smart Home, Industry

Abstract

This study explores the challenges and solutions related to information system security in the Internet of Things (IoT) era, focusing on smart homes and industrial settings. Using a qualitative approach through a comprehensive literature review, this research analyzes academic sources including journals, technical reports, and research publications. Findings show that cyber threats such as malware, ransomware, and denial of service (DoS) attacks significantly affect IoT system performance and reliability. Key issues include the absence of standardized security measures, limited device interoperability, and low user awareness. The study contributes by mapping critical security concerns in IoT ecosystems and offering strategic recommendations such as enhancing security protocols, developing data protection policies, and promoting user education. This research aims to support the development of secure, adaptive, and sustainable IoT systems in an increasingly connected digital world

References

[1]. S. Megawati dan A. Lawi, “Pengembangan Sistem Teknologi Internet of Things Yang Perlu Dikembangkan Negara Indonesia,” JIIET (Journal of Information Engineering and Educational Technology), vol. 5, no. 1, hlm. 19–26, 2021, doi: https://doi.org/10.26740/jieet.v5n1.p19-26.

[2]. N. Kristianti, “Pengaruh Internet Of Things (Iot) Pada Education Business Model : Studi Kasus Universitas Atma Jaya Yogyakarta,” Jurnal Teknologi Informasi: Jurnal Keilmuan Dan Aplikasi Bidang Teknik Informatika, vol. 13, no. 2, hlm. 47–53, 2019, doi: https://doi.org/10.47111/jti.v13i2.254.

[3]. F. P. E. Putra, Ubaidi, Holipah, Moch. , A. Mahmud, dan R. Paradina, “Comparing the Performance of LoRaWAN and MQTT Protocols for IoT Sensor Networks,” Journal of Information and Technology, vol. 6, no. 2, hlm. 221–228, 2024, doi: 10.60083/jidt.v6i2.565.

[4]. K. T. Antara, “Pengaruh IoT pada Transformasi Jaringan Multimedia: Literatur Review,” Jurnal Ilmu Komputer dan Sistem Informasi (JIKOMSI, vol. 7, no. 1, hlm. 173–181, 2024, doi: https://doi.org/10.55338/jikomsi.v7i1.2736.

[5]. L. Maulana, A. Kusyanti, dan F. A. Bakhtiar, “Implementasi Metode Autentikasi dengan Zero Knowledge Proof menggunakan Protokol Feige-Fiat-Shamir Identification Scheme pada Perangkat Internet of Things,” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 3, no. 9, hlm. 8937–8945, 2019, doi: https://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/6311.

[6]. B. W. Aulia, M. Rizki, P. Prindiyana, dan S. Surgana, “Peran Krusial Jaringan Komputer dan Basis Data dalam Era Digital,” JUSTINFO | Jurnal Sistem Informasi dan Teknologi Informasi, vol. 1, no. 1, hlm. 9–20, Des 2023, doi: 10.33197/justinfo.vol1.iss1.2023.1253.

[7]. E. M. P. Siagian, J. Siregar, dan R. H. Siahaan, “Analisis Keamanan Pada Sistem Internet Of Things Untuk Pengendalian Perangkat Elektronik Rumah Tangga,” Jurnal Teknologi Informasi dan Industri, vol. 4, no. 1, hlm. 45–53, 2023.

[8]. F. P. E. Putra, M. , A. Mahmud, dan I. S. Maqom, “Pengembangan Sistem Pemantauan Lingkungan Berbasis Internet of Things (IoT) di Kampus,” Digital Transformation Technology (Digitech), vol. 3, no. 2, hlm. 996–1001, 2023, doi: 10.47709/digitech.v3i2.3457.

[9]. Y. B. Widodo, A. M. Ichsan, dan T. Sutabri, “Perancangan Sistem Smart Home Dengan Konsep Internet Of Things Hybrid Berbasis Protokol Message Queuing Telemetry Transport,” Jurnal Teknologi Informatika dan Komputer MH Thamrin, vol. 6, no. 2, hlm. 123–136, 2020, doi: http://journal.thamrin.ac.id/index.php/jtik/issue/view/31.

[10]. Y. Duhin Mukin, “Simulasi Jaringan Smart Home dengan Sistem Berbasis IoT,” Jurnal Komunikasi Sains dan Teknologi, vol. 2, no. 1, hlm. 63–72, 2023, doi: https://doi.org/10.61098/jkst.v2i1.34.

[11]. Wilianto dan A. Kurniawan, “Sejarah, Cara Kerja Dan Manfaat Internet Of Things,” JURNAL MATRIX, vol. 8, no. 2, hlm. 36–41, 2018, doi: https://dx.doi.org/10.31940/matrix.v8i2.818

[12]. A. Sudianto, B. A. C. Permana, Muhammad Wasil, and Harianto, “Penerapan Sistem Payment Gateway Pada E-Commerce Sebagai Upaya Peningkatan Penjualan”, INFOTEK, vol. 8, no. 1, pp. 271–279, Jan. 2025

[13]. Kartarina, M. Madani, dan M. N. Dwitama, “Prototyping Pengendalian Keamanan Ruangan Berbasis Internet of Things (IoT) Menggunakan NodeMCU V3 (Prototyping Controlling Rooms Security Internet of Things (IoT) Using NodeMCU V3),” JTIM : Jurnal Teknologi Informasi dan Multimedia, vol. 3, no. 3, hlm. 138–143, 2021, doi: https://doi.org/10.35746/jtim.v3i3.153.

[14]. M. I. KURNIAWAN, U. SUNARYA, dan R. TULLOH, “Internet of Things : Sistem Keamanan Rumah berbasis Raspberry Pi dan Telegram Messenger,” ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika, vol. 6, no. 1, hlm. 1–15, Apr 2018, doi: 10.26760/elkomika.v6i1.1.

[15]. I. Gunawan dan H. Ahmadi, “Kajian Dan Rancang Bangun Alat Pakan Ikan Otomatis (Smart Feeder) Pada Kolam Budidaya Ikan Berbasis Internet Of Things,” Infotek: Jurnal Informatika dan Teknologi, vol. 7, no. 1, hlm. 40–51, Jan 2024, doi: 10.29408/jit.v7i1.23523.

[16]. A. Zein dan E. S. Eriana, “Perancangan Internet Of Things (IOT) Smart Home,” Sainstech, vol. 31, no. 2, hlm. 48–53, 2021, doi: https://doi.org/10.37277/stch.v31i2.1156.

[17]. Anggy Giri Prawiyogi dan Aang Solahudin Anwar, “Perkembangan Internet of Things (IoT) pada Sektor Energi : Sistematik Literatur Review,” Jurnal MENTARI: Manajemen, Pendidikan dan Teknologi Informasi, vol. 1, no. 2, hlm. 187–197, Jan 2023, doi: 10.34306/mentari.v1i2.254.

[18]. E. Susanto, Lady Antira, K. Kevin, E. Stanzah, dan A. A. Majid, “Manajemen Keamanan Cyber di Era Digital,” Journal of Business and Entrepreneurship, vol. 11, no. 1, hlm. 23–33, 2023, doi: 10.46273/job&e.v11i1.365.

[19]. M. O. Hoshmand dan S. Ratnawati, “Analisis Keamanan Infrastruktur Teknologi Informasi dalam Menghadapi Ancaman Cybersecurity,” Jurnal Sains dan Teknologi, vol. 5, no. 2, hlm. 679–686, 2023, doi: https://ejournal.sisfokomtek.org/index.php/saintek/article/view/2347.

[20]. Atmaja Rafli, Rosalina Nela, dan Wardoyo Andika, “Penerapan Teknologi Cerdas Dalam Bidang Industri Jaringan,” Jurnal Fakultas Teknik Kuningan, vol. 5, no. 1, hlm. 38–42, 2024, doi: https://doi.org/10.70476/jft.v5i1.007.

[21]. Y. Marine, E. Sukses, S. Devisi, P. Sistem, dan C. Y. C. Id Saluky, “Penerapan IoT untuk Kota Cerdas,” ITEJ (Information Technology Engineering Journals), vol. 3, no. 1, hlm. 36–47, 2018, doi: https://doi.org/10.24235/itej.v3i1.24.

[22]. M. Yusuf, M. Sodik, S. Darussalam, dan K. Nganjuk, “Penggunaan Teknologi Internet Of Things (IOT) Dalam Pengelolaan Fasilitas Dan Infrastruktur Lembaga Pendidikan Islam,” PROHEPTIK, vol. 1, no. 2, hlm. 65–82, 2023, doi: https://doi.org/10.26533/prophetik.v1i2.3233.

[23]. Ömer Aslan Aslan dan Refik Samet, “A Comprehensive Review on Malware Detection Approaches,” IEEE Access, vol. 8, hlm. 6249–6271, 2020, doi: 10.1109/ACCESS.2019.2963724.

[24]. S. Afdilah, N. S. Agustina, I. Hani, dan I. Gunawan, “Penerapan Teknologi Blockchain dalam Meningkatkan Keamanan Sistem Identifikasi Pengguna,” JOURNAL SHIFT, vol. 4, no. 2, hlm. 47–62, 2024, doi: https://doi.org/10.24252/shift.v4i2.142.

[25]. E. Susanto, D. Adika Prasetya, I. Arbatona, J. Christian Marpaung, dan S. Hikmatyar Rahadian, “Pengamanan Objek Vital, Keamanan File, Dan Keamanan Cyber Pada Pt Pos Indonesia,” Jurnal Mutiara Ilmu Akuntansi (JUMIA), vol. 1, no. 3, hlm. 163–174, 2023, doi: https://doi.org/10.55606/jumia.v1i3.1516.

[26]. S. Ghildiyal, A. K. Mishra, A. Gupta, dan N. Garg, “Analysis of Denial of Service (DOS) Attacks in Wireless Sensor Networks,” IJRET : Internet Journal of Reasearch in Engineering and Technology, vol. 3, no. 10, hlm. 140–143, 2014.

[27]. R. Roman, J. Zhou, dan J. Lopez, “On The Features and Challenges of Security and Privacy in Distributed Internet of Things,” Computer Network Journal, vol. 57, no. 10, hlm. 2266–2279, 2013, doi: https://doi.org/10.1016/j.comnet.2012.12.018.

[28]. S. Gunawan, A. A. R. Santosa, dan E. M. S. Sakti, “Analisis Keamanan Jaringan 5G: Ancaman dan Upaya Mitigasi,” TEKINFO, vol. 22, no. 2, hlm. 54–62, Okt 2024, doi: 10.37817/tekinfo.v25i2.

[29]. Wulan dkk., “Tinjauan Ancaman dan Risiko pada Sistem Keamanan Internet of Things, Berbasis Cloud Computing dalam Penggunaan E-Commerce dan Rencana Strategis,” Jurnal Kewirausahaan dan Multi Talenta (JKMT), vol. 2, no. 2, hlm. 126–137, 2024, doi: 10.38035/jkmt.v2i2.

[30]. M. Syani, E. A. Firdaus, dan D. Mulyana, “Design a Chicken Coop Monitoring System Based on the Internet of Things,” NUANSA INFORMATIKA, vol. 18, no. 1, hlm. 106–114, 2024, doi: https://doi.org/10.25134/ilkom.v18i1.64.

[31]. U. Z. Agustiana, “Pemanfaatan Blockchain untuk Meningkatkan Keamanan Siber dalam Pembayaran Lintas Batas di Industri Fintech,” Jurnal Bisnis, Ekonomi Syariah, dan Pajak, vol. 1, no. 4, hlm. 206–215, 2024, doi: 10.61132/jbep.v1i4.738.

[32]. R. D. Rusnawati dan R. T. S. Hariyati, “Implementasi Internet Of Things Pada Layanan Kesehatan (Literature Review),” Jorunal of Innovation Reasearch and Knowledge, vol. 1, no. 8, hlm. 569–574, 2022, doi: https://doi.org/10.53625/jirk.v1i8.1082.

[33]. A. Irawan, W. Hamzah, N. Fadholi, Z. Erikamaretha, F. Sinlae, dan P. S. Informatika, “Tantangan dan Strategi Manajemen Keamanan Siber di Indonesia berbasis IoT,” JOURNAL ZETROEM, vol. 6, no. 1, 2024, doi: https://doi.org/10.36526/ztr.v6i1.3376.

[34]. W. Najib, T. Ancaman dan Solusi Keamanan, S. Sulistyo, dan K. Kunci, “Tinjauan Ancaman dan Solusi Keamanan pada Teknologi Internet of Things (Review on Security Threat and Solution of Internet of Things Technology),” Jurnal Nasional Teknik Elektro dan Teknologi Informasi |, vol. 9, no. 4, hlm. 375–384, 2020, doi: https://doi.org/10.22146/jnteti.v9i4.539.

[35]. F. P. E. Putra, H. Amir, W. Agel, dan R. , O. F. Kusuma, “Impelementasi Sistem Keamanan Jaringan Mikrotik Menggunakan Firewall Filtering dan Port Knocking,” Jurnal Sistim Informasi dan Teknologi, vol. 5, no. 4, hlm. 82–87, Jan 2024, doi: 10.60083/jsisfotek.v5i4.329.

[36]. P. E. A. Kaunang, S. R. U. A. Sompie, dan A. S. M. Lumenta, “Implementasi Google Internet of Things Core pada Monitoring Volume Ban Angin Mobil,” Jurnal Teknik Elektro dan Komputer, vol. 9, no. 3, hlm. 163–170, 2020, doi: https://doi.org/10.35793/jtek.v9i3.30131.

[37]. C. Qiang, G. Quang, B. Yu, dan L. Yang, “Research on Security Issues oof the Internet of Things,” International Journal of Future Generation Communication and Networking, vol. 6, no. 6, hlm. 1–10, 2013, doi: http://dx.doi.org/10.14257/ijfgcn.2013.6.6.01.

[38]. E. D. Meutia, “Internet of Things - Keamanan dan Privasi,” Seminar Nasional dan Expo Teknik Elektro 2015, vol. 1, no. 1, hlm. 85–89, 2015.

[39]. A. Esmaeily dan K. Kralevska, “Orchestrating Isolated Network Slices in 5G Networks,” Electronics (Switzerland), vol. 13, no. 8, Apr 2024, doi: 10.3390/electronics13081548.

[40]. A. R. Kelrey dan A. Muzaki, “Pengaruh Ethical Hacking Bagi Keamanan Data Perusahaan,” CyberSecurity dan Forensik Digital, vol. 2, no. 2, hlm. 77–81, 2019, doi: https://doi.org/10.14421/csecurity.2019.2.2.1625.

[41]. S. Umar Anggono, E. Siswanto, dan L. Rajendra Haidar Azani Fajri, “User Interface Berbasis Web Pada Perangkat Internet Of Things,” JURNAL ILMU TEKNIK DAN INFORMATIKA (TEKNIK), vol. 3, no. 1, hlm. 35–54, 2023, doi: https://doi.org/10.51903/teknik.v3i1.326.

[42]. A. Ali dkk., “An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network,” Sensors, vol. 22, no. 2, Jan 2022, doi: 10.3390/s22020572.

[43]. K. A. Nugraha, “JEPIN (Jurnal Edukasi dan Penelitian Informatika) Efisiensi Pertukaran Data Client-Server menggunakan Web Socket pada Perangkat Berbasis Internet of Things,” JEPIN (Jurnal Edukasi dan Penelitian Informatika), vol. 10, no. 1, hlm. 33–39, 2024, doi: https://dx.doi.org/10.26418/jp.v10i1.73145.

[44]. Rosmayati Siti dan Maulana Arman, “Peluang Dan Tantangan Ekonomi Bisnis Dan Kesehatan Di Era Society 5.0 ,” Coopetition Jurnal Ilmiah Manajemen, vol. 15, no. 1, hlm. 113–130, Mar 2024, doi: https://dx.doi.org/10.32670/coopetition.v15i1.4124.

[45]. St. M. Muhtar, A. S. Amir, dan N. Arya, “Utilizing Social Media For Public Health Advocacy And Awareness In Digital Health Communication,” Prosiding Webinar Nasional IAHN-TP Palangka Raya, no. 3, hlm. 195–202, Feb 2024, doi: 10.61942/msj.v2i1.96.

[46]. F. P. E. Putra, A. B. Tamam, R. W. Efendi, dan M. , Z. Mun’im, “Pertahanan Tingkat Server Terhadap Serangan Dns Spoofing Di Jaringan Modern,” Just IT : Jurnal Sistem Informasi, Teknologi Informasi dan Komputer, vol. 14, no. 2, hlm. 139–149, 2024, doi: https://doi.org/10.24853/justit.14.2.139-149.

[47]. F. P. E. Putra, S. M. Dewi, Maugfiroh, dan A. Hamzah, “Jurnal Sistim Informasi dan Teknologi https://jsisfotek.org/index.php Privasi dan Keamanan Penerapan IoT Dalam Kehidupan Sehari-Hari : Tantangan dan Implikasi,” Jurnal Sistim Informasi dan Teknologi, vol. 5, no. 2, hlm. 26–32, 2023, doi: 10.37034/jsisfotek.v5i1.232.

[48]. F. P. E. Putra, Ubaidi, A. Zulfikri, G. Arifin, dan R. M. Ilhamsyah, “Analysis of Phishing Attack Trends, Impacts and Prevention Methods: Literature Study,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, hlm. 413–421, Agu 2024, doi: 10.47709/brilliance.v4i1.4357.

[49]. F. P. E. Putra, Ubaidi, S. A. A. Sugi, K. Mufidah, dan Y. R. Febriani, “Analysis of Cyber Attacks on Network Security,” Jurnal Informasi dan Teknologi, vol. 6, no. 2, hlm. 204–208, 2024, doi: https://doi.org/10.60083/jidt.v6i2.569.

[50]. D. Kim, N. Kim, dan J. Ahn, “Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis,” Computers, Materials and Continua, vol. 78, no. 3, hlm. 3867–3889, 2024, doi: 10.32604/cmc.2024.046871

Downloads

Published

15-07-2025

How to Cite

Hidayatullah, I., Khairi, M. H., Maulana, I., & Eka Putra, F. P. (2025). Analisis Protokol Keamanan Jaringan dalam Era Internet of Things (IoT). Infotek: Jurnal Informatika Dan Teknologi, 8(2), 356–366. https://doi.org/10.29408/jit.v8i2.30257

Similar Articles

<< < 15 16 17 18 19 20 21 22 > >> 

You may also start an advanced similarity search for this article.