Keamanan Data Internet of Things dalam Perspektif Pseudosains Mario Bunge
Internet of Things Data Security in Mario Bunge's Pseudoscience Perspective
DOI:
https://doi.org/10.23887/jfi.v7i2.72435Kata Kunci:
keamanan data, internet of things, pseudosains, Mario BungeAbstrak
Keamanan data menjadi perhatian utama dalam Internet of Things (IoT) yang berkembang pesat. Artikel ini menyelidiki aspek keamanan data pada IoT dengan perspektif pseudosains yang terinspirasi oleh Mario Bunge. Tujuan penelitian ini adalah untuk memahami dan mengatasi tantangan keamanan data di lingkungan IoT. Pertama, penulis mengidentifikasi dan mengevaluasi potensi kerentanan dan ancaman terhadap data, risiko peretasan, dan kebutuhan enkripsi data. Penulis kemudian menganalisis metode dan strategi keamanan yang umum digunakan, termasuk blockchain, fog computing, edge computing, dan machine learning. Pendekatan pseudosains Bunge membantu dalam memahami dan menganalisis keamanan data IoT secara komprehensif. Hasilnya menunjukkan pemahaman yang lebih dalam tentang tantangan keamanan data di IoT, serta rekomendasi terperinci untuk mitigasi risiko. Penelitian ini menyoroti pentingnya pendekatan holistik yang memadukan aspek teknis dan filosofis untuk mengatasi masalah keamanan data di IoT. Perspektif pseudosains membantu dalam mengembangkan kerangka konseptual yang kokoh dan mendorong pemikiran kritis dalam merumuskan strategi keamanan yang efektif. Kesimpulannya, artikel ini memberikan kontribusi penting dalam memahami dan mengatasi kompleksitas keamanan data di IoT.
Referensi
Al-Ghaili, A. M., Gunasekaran, S. S., Jamil, N., Alyasseri, Z. A., Al-Hada, N. M., Ibrahim, Z.-A., Bakar, A. A., Kasim, H., Hosseini, E., Omar, R., Kasmani, R. Md., & Razali, R. A. (2023). A Review on Role of Image Processing Techniques to Enhancing Security of Iot Applications. IEEE Access, 1–1. https://doi.org/10.1109/access.2023.3312682.
Alsoliman, A., Rigoni, G., Callegaro, D., Levorato, M., Pinotti, C. M., & Conti, M. (2023). Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics. ACM Transactions on Cyber-Physical Systems, 7(2). https://doi.org/10.1145/3579999.
Aribilola, I., Asghar, M. N., Kanwal, N., Fleury, M., & Lee, B. (2023). SecureCam: Selective Detection and Encryption Enabled Application for Dynamic Camera Surveillance Videos. IEEE Transactions on Consumer Electronics, 69(2), 156–169. https://doi.org/10.1109/TCE.2022.3228679.
Arisdakessian, S., Wahab, O. A., Mourad, A., Otrok, H., & Guizani, M. (2023). A Survey on IoT Intrusion Detection: Federated Learning, Game Theory, Social Psychology, and Explainable AI as Future Directions. IEEE Internet of Things Journal, 10(5), 4059–4092. https://doi.org/10.1109/JIOT.2022.3203249.
Bhattacharya, S., Manousakas, Di., Ramos, A. G. C. P., Venieris, S. I., Lane, N. D., & Mascolo, C. (2020). Countering Acoustic Adversarial Attacks in Microphone-equipped Smart Home Devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 4(2). https://doi.org/10.1145/3397332.
Blessing, L. T. M., & Chakrabarti, A. (2009). DRM, a Design Research Methodology. Springer.
Brocke, J. vom, Hevner, A., & Maedche, A. (2020). Design Science Research. Springer. https://doi.org/10.1201/b16768-26.
Bunge, M. (1983). What Is Pseudoscience? The Skeptical Inquirer, 9, 36–46.
Burhan, M., Alam, H., Arsalan, A., Rehman, R. A., Anwar, M., Faheem, M., & Ashraf, M. W. (2023). A Comprehensive Survey on the Cooperation of Fog Computing Paradigm-Based IoT Applications: Layered Architecture, Real-Time Security Issues, and Solutions. IEEE Access, 11, 73303–73329. https://doi.org/10.1109/ACCESS.2023.3294479.
CC2020 Task Force. (2021). Computing Curricula 2020. Paradigms for Global Computing Education. Dalam Computing Curricula 2020. https://dl.acm.org/doi/book/10.1145/3467967.
Duarte, F. (2023). Number of IoT Devices (2023). Exploding Topics. https://explodingtopics.com/blog/number-of-iot-devices.
Fagbohungbe, O., Reza, S. R., Dong, X., & Qian, L. (2022). Efficient Privacy Preserving Edge Intelligent Computing Framework for Image Classification in IoT. IEEE Transactions on Emerging Topics in Computational Intelligence, 6(4), 941–956. https://doi.org/10.1109/TETCI.2021.3111636.
Ghazal, T. M., Hasan, M. K., Abdallah, S. N. H., & Abubakkar, K. A. (2022). Secure IoMT Pattern Recognition and Exploitation for Multimedia Information Processing using Private Blockchain and Fuzzy Logic. ACM Transactions on Asian and Low-Resource Language Information Processing. https://doi.org/10.1145/3523283.
Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., & Sikdar, B. (2019). A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. Dalam IEEE Access (Vol. 7, hlm. 82721–82743). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ACCESS.2019.2924045.
Kemp, S. (2023). Digital 2023: Global Overview Report. Data Reportal. https://datareportal.com/reports/digital-2023-global-overview-report.
Kitchenham, B. (2007). Guidelines for Performing Systematic Literature Reviews in Software Engineering. https://www.researchgate.net/publication/302924724.
Krishnan, P., Jain, K., Jose, P. G., Achuthan, K., & Buyya, R. (2021). SDN Enabled QoE and Security Framework for Multimedia Applications in 5G Networks. ACM Transactions on Multimedia Computing, Communications and Applications, 17(2). https://doi.org/10.1145/3377390.
Lachtar, N., Ibdah, D., Khan, H., & Bacha, A. (2023). RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware. ACM Transactions on Privacy and Security, 26(3). https://doi.org/10.1145/3579822.
Liang, H., Wu, J., Zheng, X., Zhang, M., Li, J., & Jolfaei, A. (2021). Fog-Based Secure Service Discovery for Internet of Multimedia Things: A Cross-Blockchain Approach. ACM Transactions on Multimedia Computing, Communications and Applications, 16(3s). https://doi.org/10.1145/3415151.
Lin, C., He, D., Kumar, N., Huang, X., Vijayakumar, P., & Choo, K. K. R. (2020). HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes. IEEE Internet of Things Journal, 7(2), 818–829. https://doi.org/10.1109/JIOT.2019.2944400.
Mahayana, D. (2022). Filsafat Sains: Dari Newton, Einstein hingga Sains-Data (E. Warsidi, Ed.). ITB Press.
Mahayana, D. (2023). Pseudoscience, Big Data Analytics & Artificial Intelligence. Paper presented at lecturer for Filsafat Sains, STEI ITB.
Usman, M., Jan, M. A., & Puthal, D. (2020). PAAL: A Framework Based on Authentication, Aggregation, and Local Differential Privacy for Internet of Multimedia Things. IEEE Internet of Things Journal, 7(4), 2501–2508. https://doi.org/10.1109/JIOT.2019.2936512
Wang, L., Chen, M., Lu, L., Ba, Z., Lin, F., & Ren, K. (2023). VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 7(1). https://doi.org/10.1145/3580789.
Wang, Y., Cai, W., Gu, T., Shao, W., Li, Y., & Yu, Y. (2019). Secure your voice: An Oral Airflow-Based Continuous Liveness Detection for Voice Assistants. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 3(4). https://doi.org/10.1145/3369811.
Wu, H., Dwivedi, A. D., & Srivastava, G. (2021). Security and Privacy of Patient Information in Medical Systems Based on Blockchain Technology. ACM Transactions on Multimedia Computing, Communications and Applications, 17(2s). https://doi.org/10.1145/3408321
Xiang, T., Zeng, H., Chen, B., & Guo, S. (2023). BMIF: Privacy-preserving Blockchain-based Medical Image Fusion. ACM Transactions on Multimedia Computing, Communications, and Applications, 19(1). https://doi.org/10.1145/3531016.
Xu, X., Huang, Q., Zhang, Y., Li, S., Qi, L., & Dou, W. (2021). An LSH-based Offloading Method for IoMT Services in Integrated Cloud-Edge Environment. ACM Transactions on Multimedia Computing, Communications, and Applications, 16(3s). https://doi.org/10.1145/3408319.
Xue, Z., Zhou, P., Xu, Z., Wang, X., Xie, Y., Ding, X., & Wen, S. (2021). A Resource-Constrained and Privacy-Preserving Edge-Computing-Enabled Clinical Decision System: A Federated Reinforcement Learning Approach. IEEE Internet of Things Journal, 8(11), 9122–9138. https://doi.org/10.1109/JIOT.2021.3057653.
Zhong, H., Wang, L., Cui, J., Zhang, J., & Bolodurina, I. (2023). Secure Edge Computing-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks. IEEE Transactions on Information Forensics and Security, 18, 3774–3786. https://doi.org/10.1109/TIFS.2023.3287731.
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2024 Jurnal Filsafat Indonesia

Artikel ini berlisensiCreative Commons Attribution-ShareAlike 4.0 International License.

Jurnal Filsafat Indonesia Undiksha is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.