Analisis Keamanan Arsitektur Sistem Smart Farming Berbasis NIST Cybersecurity Framework di Living Lab Universitas Widyatama
DOI:
https://doi.org/10.55606/jutiti.v5i3.6578Keywords:
Cybersecurity, Internet of Things (IoT), NIST Cybersecurity Framework, Off-Grid Systems, Smart FarmingAbstract
The development of Internet of Things (IoT) technology has driven digital transformation in the agricultural sector through the concept of Smart Farming, including in the academic environment. However, increased system connectivity and automation are also accompanied by increased cybersecurity risks, especially in IoT systems that are developed independently and are closed (proprietary). This study aims to analyze the cybersecurity posture of the IoT-based Smart Farming system architecture in the Living Lab of Widyatama University using the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) version 2.0. The study uses a qualitative method with a case study approach, where the analysis focuses on the six core functions of the NIST CSF, namely Govern, Identify, Protect, Detect, Respond, and Recover. The object of the study is an off-grid Smart Farming system that utilizes Solar Power Plants (PLTS) for real-time monitoring of catfish cultivation water quality. The results of the study indicate that the level of system security maturity is still at Tier 1 (Partial), with major weaknesses in the aspects of security governance, early detection mechanisms, and incident response and recovery procedures. While the system offers advantages in energy independence and operational continuity, the absence of formal security policies and adequate technical controls potentially increases the risk of operational disruptions due to cyber threats. This study recommends implementing NIST CSF v2.0-based security to improve data integrity, operational reliability, and resilience of IoT-based Smart Farming systems in academic environments.
Downloads
References
Alshaikh, M. (2020). Developing cybersecurity culture to influence employee behavior: A practice perspective. Computers & Security, 98, 102003. https://doi.org/10.1016/j.cose.2020.102003
Alshaikh, M. (2023). Cybersecurity governance and risk management. Springer.
Alshaikh, M. (2024). Cybersecurity governance maturity and organizational resilience. Computers & Security, 136, 103544. https://doi.org/10.1016/j.cose.2023.103544
Brata, I. O. D. (2021). Analisis dan perancangan sistem. Jurnal Akuntansi Bisnis dan Ekonomi, 7(1). https://doi.org/10.33197/jabe.vol7.iss1.2021.629
Dimakopoulou, D., & Rantos, K. (2024). Cybersecurity risk assessment frameworks for critical infrastructures: A comparative analysis. Journal of Information Security and Applications, 78, 103602. https://doi.org/10.1016/j.jisa.2023.103602
Ferrag, M. A., Maglaras, L., Janicke, H., & Smith, R. (2020). Security for smart agriculture: Threats, attacks and countermeasures. IEEE Internet of Things Journal, 7(10), 9379–9397. https://doi.org/10.1109/JIOT.2020.2990761
Goda, S., & Neta, S. (2024). Cyber threats and resilience in agricultural IoT systems. Computers and Electronics in Agriculture, 215, 108410. https://doi.org/10.1016/j.compag.2023.108410
Humayed, A., Lin, J., Li, F., & Luo, B. (2021). Cyber-physical systems security—A survey. IEEE Internet of Things Journal, 8(6), 5122–5143. https://doi.org/10.1109/JIOT.2020.3047954
Khan, M. A., Ali, T., Khan, A., & Lee, S. (2022). Security challenges in proprietary IoT-based systems. Journal of Network and Computer Applications, 195, 103223. https://doi.org/10.1016/j.jnca.2021.103223
Khan, M. A., Ali, T., Khan, A., & Lee, S. (2023). Security challenges in proprietary IoT-based systems. Journal of Network and Computer Applications, 219, 103735. https://doi.org/10.1016/j.jnca.2022.103735
Khan, M. A., Ali, T., Khan, A., & Lee, S. (2024). Authentication and access control challenges in IoT environments. Journal of Network and Computer Applications, 224, 103825. https://doi.org/10.1016/j.jnca.2023.103825
Kim, H., & Solomon, M. G. (2023). Fundamentals of information systems security (4th ed.). Jones & Bartlett Learning.
Li, L., Zhang, Q., & Huang, D. (2021). A review of imaging techniques for plant phenotyping. Sensors, 21(4), 1416. https://doi.org/10.3390/s21041416
National Institute of Standards and Technology. (2023). Cybersecurity framework 2.0. NIST. https://www.nist.gov
Nugroho, A., Prabowo, H., & Santoso, I. (2024). Assessing IoT security maturity and its impact on operational performance. Information Systems Frontiers, 26, 1–15. https://doi.org/10.1007/s10796-023-10402-9
Sari, R. F., Pratama, A., & Hidayat, R. (2024). IoT-based smart aquaculture monitoring systems: Recent advances and challenges. Aquacultural Engineering, 106, 102492. https://doi.org/10.1016/j.aquaeng.2023.102492
Stallings, W. (2023). Effective cybersecurity: A guide to using best practices and standards. Addison-Wesley.
Wibowo, A., Prasetyo, A., & Nugraha, D. (2025). Web-based interactive monitoring for smart farming systems. Sensors, 25(3), 1124. https://doi.org/10.3390/s25031124
Wibowo, A., Susanto, S., & Anisarida, A. (2025). Evaluation of machine learning models for road damage detection as a framework for a road condition monitoring system in Subang. Jurnal Teknik Sipil Cendekia (JTSC), 6(1), 138–158.
Yin, R. K. (2023). Case study research and applications (7th ed.). Sage Publications.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Jurnal Teknik Informatika dan Teknologi Informasi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.




