Analisis Keamanan Arsitektur Sistem Smart Farming Berbasis NIST Cybersecurity Framework di Living Lab Universitas Widyatama

Authors

  • Albani Akbar Universitas Sebelas April
  • Ari Purno Wahyu Wahyu Wibowo Universitas Widyatama
  • Ignatius Oki Dewa Brata Universitas Widyatama

DOI:

https://doi.org/10.55606/jutiti.v5i3.6578

Keywords:

Cybersecurity, Internet of Things (IoT), NIST Cybersecurity Framework, Off-Grid Systems, Smart Farming

Abstract

The development of Internet of Things (IoT) technology has driven digital transformation in the agricultural sector through the concept of Smart Farming, including in the academic environment. However, increased system connectivity and automation are also accompanied by increased cybersecurity risks, especially in IoT systems that are developed independently and are closed (proprietary). This study aims to analyze the cybersecurity posture of the IoT-based Smart Farming system architecture in the Living Lab of Widyatama University using the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) version 2.0. The study uses a qualitative method with a case study approach, where the analysis focuses on the six core functions of the NIST CSF, namely Govern, Identify, Protect, Detect, Respond, and Recover. The object of the study is an off-grid Smart Farming system that utilizes Solar Power Plants (PLTS) for real-time monitoring of catfish cultivation water quality. The results of the study indicate that the level of system security maturity is still at Tier 1 (Partial), with major weaknesses in the aspects of security governance, early detection mechanisms, and incident response and recovery procedures. While the system offers advantages in energy independence and operational continuity, the absence of formal security policies and adequate technical controls potentially increases the risk of operational disruptions due to cyber threats. This study recommends implementing NIST CSF v2.0-based security to improve data integrity, operational reliability, and resilience of IoT-based Smart Farming systems in academic environments.

Downloads

Download data is not yet available.

References

Alshaikh, M. (2020). Developing cybersecurity culture to influence employee behavior: A practice perspective. Computers & Security, 98, 102003. https://doi.org/10.1016/j.cose.2020.102003

Alshaikh, M. (2023). Cybersecurity governance and risk management. Springer.

Alshaikh, M. (2024). Cybersecurity governance maturity and organizational resilience. Computers & Security, 136, 103544. https://doi.org/10.1016/j.cose.2023.103544

Brata, I. O. D. (2021). Analisis dan perancangan sistem. Jurnal Akuntansi Bisnis dan Ekonomi, 7(1). https://doi.org/10.33197/jabe.vol7.iss1.2021.629

Dimakopoulou, D., & Rantos, K. (2024). Cybersecurity risk assessment frameworks for critical infrastructures: A comparative analysis. Journal of Information Security and Applications, 78, 103602. https://doi.org/10.1016/j.jisa.2023.103602

Ferrag, M. A., Maglaras, L., Janicke, H., & Smith, R. (2020). Security for smart agriculture: Threats, attacks and countermeasures. IEEE Internet of Things Journal, 7(10), 9379–9397. https://doi.org/10.1109/JIOT.2020.2990761

Goda, S., & Neta, S. (2024). Cyber threats and resilience in agricultural IoT systems. Computers and Electronics in Agriculture, 215, 108410. https://doi.org/10.1016/j.compag.2023.108410

Humayed, A., Lin, J., Li, F., & Luo, B. (2021). Cyber-physical systems security—A survey. IEEE Internet of Things Journal, 8(6), 5122–5143. https://doi.org/10.1109/JIOT.2020.3047954

Khan, M. A., Ali, T., Khan, A., & Lee, S. (2022). Security challenges in proprietary IoT-based systems. Journal of Network and Computer Applications, 195, 103223. https://doi.org/10.1016/j.jnca.2021.103223

Khan, M. A., Ali, T., Khan, A., & Lee, S. (2023). Security challenges in proprietary IoT-based systems. Journal of Network and Computer Applications, 219, 103735. https://doi.org/10.1016/j.jnca.2022.103735

Khan, M. A., Ali, T., Khan, A., & Lee, S. (2024). Authentication and access control challenges in IoT environments. Journal of Network and Computer Applications, 224, 103825. https://doi.org/10.1016/j.jnca.2023.103825

Kim, H., & Solomon, M. G. (2023). Fundamentals of information systems security (4th ed.). Jones & Bartlett Learning.

Li, L., Zhang, Q., & Huang, D. (2021). A review of imaging techniques for plant phenotyping. Sensors, 21(4), 1416. https://doi.org/10.3390/s21041416

National Institute of Standards and Technology. (2023). Cybersecurity framework 2.0. NIST. https://www.nist.gov

Nugroho, A., Prabowo, H., & Santoso, I. (2024). Assessing IoT security maturity and its impact on operational performance. Information Systems Frontiers, 26, 1–15. https://doi.org/10.1007/s10796-023-10402-9

Sari, R. F., Pratama, A., & Hidayat, R. (2024). IoT-based smart aquaculture monitoring systems: Recent advances and challenges. Aquacultural Engineering, 106, 102492. https://doi.org/10.1016/j.aquaeng.2023.102492

Stallings, W. (2023). Effective cybersecurity: A guide to using best practices and standards. Addison-Wesley.

Wibowo, A., Prasetyo, A., & Nugraha, D. (2025). Web-based interactive monitoring for smart farming systems. Sensors, 25(3), 1124. https://doi.org/10.3390/s25031124

Wibowo, A., Susanto, S., & Anisarida, A. (2025). Evaluation of machine learning models for road damage detection as a framework for a road condition monitoring system in Subang. Jurnal Teknik Sipil Cendekia (JTSC), 6(1), 138–158.

Yin, R. K. (2023). Case study research and applications (7th ed.). Sage Publications.

Downloads

Published

2025-12-30

How to Cite

Albani Akbar, Ari Purno Wahyu Wahyu Wibowo, & Ignatius Oki Dewa Brata. (2025). Analisis Keamanan Arsitektur Sistem Smart Farming Berbasis NIST Cybersecurity Framework di Living Lab Universitas Widyatama. Jurnal Teknik Informatika Dan Teknologi Informasi, 5(3), 762–775. https://doi.org/10.55606/jutiti.v5i3.6578

Similar Articles

<< < 1 2 3 4 5 6 7 > >> 

You may also start an advanced similarity search for this article.