Studi Literatur: Mekanisme Autentikasi Perangkat IoT untuk Mencegah Serangan Injection pada Database Pertanian Cerdas
Kata Kunci:
Pertanian Cerdas, Kemanan IoT, Autentikasi Perangkat, Serangan Injection, Analisis Literature SistematisAbstrak
Implementasi teknologi Internet of Things (IoT) dalam ekosistem pertanian cerdas (smart agriculture) telah membawa transformasi signifikan dalam efisiensi pengelolaan sumber daya, namun di sisi lain memunculkan tantangan keamanan siber yang sangat kompleks, terutama terkait perlindungan integritas data pada database pusat. Perangkat IoT yang umumnya memiliki keterbatasan sumber daya komputasi dan energi sering kali menjadi titik lemah yang dimanfaatkan oleh penyerang sebagai vektor untuk meluncurkan serangan injection, seperti SQL Injection atau NoSQL Injection, yang dapat mengakibatkan manipulasi data sensor, pencurian informasi sensitif, hingga kegagalan sistem irigasi atau pemupukan otomatis. Analisis Literatur Sistematis (SLR) ini dilakukan untuk mengidentifikasi, menganalisis, dan mensintesis berbagai mekanisme autentikasi perangkat IoT yang paling efektif dalam memitigasi risiko serangan injection pada infrastruktur pertanian cerdas. Melalui tinjauan mendalam terhadap literatur ilmiah dari lima tahun terakhir, penelitian ini mengeksplorasi beragam skema autentikasi mulai dari protokol kriptografi ringan (lightweight cryptography) yang efisien energi, sistem autentikasi berbasis token seperti JWT dan OAuth2, hingga pemanfaatan teknologi blockchain untuk memastikan identitas perangkat yang terdesentralisasi dan tidak dapat dimanipulasi. Hasil analisis menunjukkan bahwa meskipun metode autentikasi yang kuat sangat krusial, terdapat trade-off yang signifikan antara tingkat kompleksitas keamanan dengan konsumsi daya baterai pada node sensor di lapangan. Temuan dalam SLR ini memberikan gambaran komprehensif mengenai kondisi terkini riset keamanan IoT pertanian, menyoroti keunggulan masing-masing mekanisme dalam memvalidasi payload data sebelum masuk ke database, serta mengidentifikasi kesenjangan penelitian saat ini yang memerlukan pengembangan protokol autentikasi hibrida yang lebih adaptif, ringan, dan aman secara cross-layer guna menjamin keberlanjutan operasional serta keandalan data pada sistem pertanian cerdas generasi masa depan.
Unduhan
Referensi
[1] K. Haseeb, I. Ud Din, A. Almogren, and N. Islam, “An Energy Efficient and Secure IoT-Based WSN Framework: An Application to Smart Agriculture,” Sensors, vol. 20, no. 7, p. 2081, Jan. 2020, doi: 10.3390/s20072081.
[2] K. Aggarwal, G. Sreenivasula Reddy, R. Makala, T. Srihari, N. Sharma, and C. Singh, “Studies on energy efficient techniques for agricultural monitoring by wireless sensor networks,” Comput. Electr. Eng., vol. 113, p. 109052, Jan. 2024, doi: 10.1016/j.compeleceng.2023.109052.
[3] J. Li, A. Sun, J. Han, and C. Li, “A Survey on Deep Learning for Named Entity Recognition,” IEEE Trans. Knowl. Data Eng., vol. 34, no. 1, pp. 50–70, Jan. 2022, doi: 10.1109/TKDE.2020.2981314.
[4] T. J. Bruno and P. D. N. Svoronos, CRC Handbook of Basic Tables for Chemical Analysis, 3rd ed. Boca Raton: CRC Press, 2010. doi: 10.1201/b10385.
[5] F. P. E. Putra, N. Ramadhani, F. Fauzan, and M. Mursidi, “Service Quality Analysis of RFID-Based Smart Door Lock in Front One Azana Style Hotel Area | Brilliance: Research of Artificial Intelligence,” Jul. 2024, Accessed: Apr. 30, 2026. [Online]. Available: https://jurnal.itscience.org/index.php/brilliance/article/view/4292
[6] J. Hlaváč and J. Štefanovič, “Machine Learning and Business Intelligence or from Descriptive Analytics to Predictive Analytics,” in 2020 Cybernetics & Informatics (K&I), Jan. 2020, pp. 1–4. doi: 10.1109/KI48306.2020.9039874.
[7] P. M. Gotovtsev and I. A. Konova, “Synthetic Biology as a Bridge to Integration of Bio Objects into Internet of Things,” in 2019 International Conference on Sensing and Instrumentation in IoT Era (ISSI), Aug. 2019, pp. 1–6. doi: 10.1109/ISSI47111.2019.9043737.
[8] A. S. Ibrahim et al., “AI-IoT based smart agriculture pivot for plant diseases detection and treatment,” Sci. Rep., vol. 15, no. 1, p. 16576, May 2025, doi: 10.1038/s41598-025-98454-6.
[9] D. Srinivasan, A. Kiran, S. Parameswari, and J. Vellaichamy, “Energy efficient hierarchical clustering based dynamic data fusion algorithm for wireless sensor networks in smart agriculture,” Sci. Rep., vol. 15, no. 1, p. 7207, Feb. 2025, doi: 10.1038/s41598-024-85076-7.
[10] L. Safari, G. Barile, G. Ferri, and V. Stornelli, “A New Low-Voltage Low-Power Dual-Mode VCII-Based SIMO Universal Filter,” Electronics, vol. 8, no. 7, p. 765, Jul. 2019, doi: 10.3390/electronics8070765.
[11] L. Wang, J. Li, H. Nie, J. Liu, and S. Ke, “Coaxial Nested Couplers-Based Offset-Tolerance Rotary Wireless Power Transfer Systems for Electric Excitation Motors,” IEEE Access, vol. 8, pp. 44913–44923, 2020, doi: 10.1109/ACCESS.2020.2978130.
[12] F. P. E. Putra, M. A. Mahmud, and I. S. Maqom, “Pengembangan Sistem Pemantauan Lingkungan Berbasis Internet of Things (IoT) di Kampus,” Digit. Transform. Technol., vol. 3, no. 2, pp. 996–1001, 2023, doi: 10.47709/digitech.v3i2.3457.
[13] N. N. Hurrah, S. A. Parah, J. A. Sheikh, F. Al-Turjman, and K. Muhammad, “Secure data transmission framework for confidentiality in IoTs,” Ad Hoc Netw., vol. 95, p. 101989, Dec. 2019, doi: 10.1016/j.adhoc.2019.101989.
[14] M. Dorraki, A. Fouladzadeh, A. Allison, C. S. Bonder, and D. Abbott, “Angiogenic Networks in Tumors—Insights via Mathematical Modeling,” IEEE Access, vol. 8, pp. 43215–43228, 2020, doi: 10.1109/ACCESS.2020.2977062.
[15] F. P. E. Putra, Iksan, and N. Saadah, “Interaktif dan Personalisasi Peningkatan Pembelajaran IoT di Sekolah,” J. Sistim Inf. Dan Teknol., pp. 175–181, Jul. 2023, doi: 10.37034/jsisfotek.v5i2.236.
[16] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Jan. 2000, p. 10 pp. vol.2-. doi: 10.1109/HICSS.2000.926982.
[17] F. Karray, M. W. Jmal, A. Garcia-Ortiz, M. Abid, and A. M. Obeid, “A comprehensive survey on wireless sensor node hardware platforms,” Comput. Netw., vol. 144, pp. 89–110, Oct. 2018, doi: 10.1016/j.comnet.2018.05.010.
[18] S. Chen and J. Zhao, “The requirements, challenges, and technologies for 5G of terrestrial mobile telecommunication,” IEEE Commun. Mag., vol. 52, no. 5, pp. 36–43, May 2014, doi: 10.1109/MCOM.2014.6815891.
[19] F. Eka Putra, M. Mustafida, R. Alfadili, and A. Nahriyah, “Perancangan Jaringan Nirkabel Berbasis Mesh untuk Menunjang Aplikasi Smart City,” J. Inform. Dan Tekonologi Komput. JITEK, vol. 5, pp. 84–92, Mar. 2025, doi: 10.55606/jitek.v5i1.5934.
[20] C. L. González, S. L. Delgado, J. M. Alberola, L. F. Niño, and V. Julián, “Toward Autonomous and Distributed Intersection Management with Emergency Vehicles,” Electronics, vol. 11, no. 7, p. 1089, Jan. 2022, doi: 10.3390/electronics11071089.
[21] A. Ron, A. Shulman-Peleg, and A. Puzanov, “Analysis and Mitigation of NoSQL Injections,” IEEE Secur. Priv., vol. 14, no. 2, pp. 30–39, Mar. 2016, doi: 10.1109/MSP.2016.36.
[22] F. P. E. Putra, D. T. Agustina, T. S. K. Khotimah, and T. Ramadhanty, “Analisis Kinerja Jaringan 5G dalam Meningkatkan Konektivitas Internet of Things (IoT),” J. Inform. Dan Tekonologi Komput. JITEK, vol. 5, no. 1, pp. 56–62, Mar. 2025, doi: 10.55606/jitek.v5i1.5836.
[23] T. Gaber, A. El-Ghamry, and A. E. Hassanien, “Injection attack detection using machine learning for smart IoT applications,” Phys. Commun., vol. 52, p. 101685, Jun. 2022, doi: 10.1016/j.phycom.2022.101685.
[24] U. Tariq, I. Ahmed, A. K. Bashir, and K. Shaukat, “A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review,” Sensors, vol. 23, no. 8, p. 4117, Apr. 2023, doi: 10.3390/s23084117.
[25] Y. Wang and Z. Tian, “IVDST: A Fast Algorithm for Atomic Norm Minimization in Line Spectral Estimation,” IEEE Signal Process. Lett., vol. 25, no. 11, pp. 1715–1719, Nov. 2018, doi: 10.1109/LSP.2018.2870539.
[26] E. Pateromichelakis, D. Dimopoulos, and A. Salkintzis, “NetApps Enabling Application-Layer Analytics for Vertical IoT Industry,” IEEE Internet Things Mag., vol. 5, no. 4, pp. 130–135, Dec. 2022, doi: 10.1109/IOTM.001.2200212.
[27] “IEEE Internet of Things Journal publication information,” IEEE Internet Things J., vol. 2, no. 2, pp. C2–C2, Apr. 2015, doi: 10.1109/JIOT.2015.2420253.
[28] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications,” IEEE Internet Things J., vol. 4, no. 5, pp. 1125–1142, Oct. 2017, doi: 10.1109/JIOT.2017.2683200.
[29] F. P. E. Putra, U. Ubaidi, R. N. Saputra, F. M. Haris, and S. N. R. Barokah, “Application of Internet of Things Technology in Monitoring Water Quality in Fishponds,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 356–361, Feb. 2024, doi: 10.47709/brilliance.v4i1.4231.
[30] C. Qi, X. Sun, Y. Deng, and A. Nallanathan, “QoS Constrained Pilot Allocation Scheme for Massive MIMO Systems,” IEEE Trans. Veh. Technol., vol. 69, no. 5, pp. 5661–5665, May 2020, doi: 10.1109/TVT.2020.2980082.
[31] F. P. Eka Putra, A. Baidawi, A. A. Mubarok, and Frediyanto, “Merancang Jaringan Sensor Nirkabel dan IoT untuk Kota Pintar Pamekasan,” J. Inf. Dan Teknol., pp. 138–145, Jul. 2023, doi: 10.37034/jidt.v5i2.331.
[32] E. Badry, A. Shalaby, and M. S. Sayed, “Intra Mode Decision Acceleration for HEVC Screen Content Coding,” in 2019 7th International Japan-Africa Conference on Electronics, Communications, and Computations, (JAC-ECC), Dec. 2019, pp. 92–95. doi: 10.1109/JAC-ECC48896.2019.9051167.
[33] F. Tang, Y. Yan, L. Peng, S. K. Bose, and G. Shen, “Crosstalk-Aware Counter-Propagating Core Assignment to Reduce Inter-Core Crosstalk and Capacity Wastage in Multi-Core Fiber Optical Networks,” J. Light. Technol., vol. 37, no. 19, pp. 5010–5027, Oct. 2019, doi: 10.1109/JLT.2019.2927025.
[34] M. Fouda, Z. Fadlullah, N. Kato, R. Lu, and X. Shen, “Towards a light-weight message authentication mechanism tailored for Smart Grid communications,” Apr. 2011, pp. 1018–1023. doi: 10.1109/INFCOMW.2011.5928776.
[35] E. Wagner, M. Serror, K. Wehrle, and M. Henze, “BP-MAC: Fast Authentication for Short Messages,” in Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, May 2022, pp. 201–206. doi: 10.1145/3507657.3528554.
[36] F. P. E. Putra, S. M. Dewi, Maugfiroh, and A. Hamzah, “Privasi dan Keamanan Penerapan IoT Dalam Kehidupan Sehari-Hari : Tantangan dan Implikasi,” J. Sistim Inf. Dan Teknol., pp. 26–32, Jul. 2023, doi: 10.37034/jsisfotek.v5i2.232.
[37] R. E. Navas, M. Lagos, L. Toutain, and K. Vijayasankar, “Nonce-based authenticated key establishment over OAuth 2.0 IoT proof-of-possession architecture,” in 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Dec. 2016, pp. 317–322. doi: 10.1109/WF-IoT.2016.7845424.
[38] T. Akhtar and I. Politis, “A Decentralized Self-Sovereign-Identity Management and On-Boarding Framework for Industrial IoT Environment,” Jun. 2025, pp. 1–6. doi: 10.1109/EEITE65381.2025.11166505.
[39] F. P. E. Putra, Fauzan, Syirofi, M. Mursidi, D. Wahid, and A. Nuraini, “Sistem Pengendali Lingkungan Pertanian Dengan Wireless Sensor Network Untuk Mengoptimalkan Budidaya Hidroponik,” Digit. Transform. Technol., vol. 3, no. 2, pp. 931–937, 2023, doi: 10.47709/digitech.v3i2.3461.
[40] “Decentralized Identity Management Using Blockchain:,” J. Glob. Inf. Manag., vol. 31, no. 2, Jan. 2023, doi: 10.4018/JGIM.315283.
[41] K. Patidar et al., “Blockchain Based Decentralized Identity Management System for Authentication and Authorization in IoT Networks,” Informatica, vol. 49, no. 34, Aug. 2025, doi: 10.31449/inf.v49i34.9164.
[42] F. P. E. Putra, suhdi, A. Ramadhani, and Marzuq, “Integrasi Teknologi Kuantum dan fiber Optik untuk Meningkatkan Keamanan dan Efisiensi Jaringan Masa Depan,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 151–163, Jul. 2025, doi: 10.47324/ilkominfo.v8i2.342.
[43] Z. Diao et al., “Localization technologies for smart agriculture and precision farming: A review,” Comput. Electron. Agric., vol. 236, p. 110464, Sep. 2025, doi: 10.1016/j.compag.2025.110464.
[44] Y. Bai, Z. Liao, J. Shang, W. Gan, X. Kong, and X. Wei, “A review on real-time plant monitoring sensors for smart agriculture,” Chem. Eng. J., vol. 523, p. 168868, Nov. 2025, doi: 10.1016/j.cej.2025.168868.
[45] G. Biagini, “Towards an AI-Literate Future: A Systematic Literature Review Exploring Education, Ethics, and Applications,” Int. J. Artif. Intell. Educ., vol. 35, no. 4, pp. 2616–2666, Dec. 2025, doi: 10.1007/s40593-025-00466-w.
[46] J. Zhang et al., “When LLMs meet cybersecurity: a systematic literature review,” Cybersecurity, vol. 8, no. 1, p. 55, Feb. 2025, doi: 10.1186/s42400-025-00361-w.
[47] N. Bernard, Y. Sagawa Jr, N. Bier, T. Lihoreau, L. Pazart, and T. Tannou, “Using artificial intelligence for systematic review: the example of elicit,” BMC Med. Res. Methodol., vol. 25, no. 1, p. 75, Mar. 2025, doi: 10.1186/s12874-025-02528-y.
[48] P. De Corte, M. Klinghardt, S. von Stockum, and K. Heinemann, “Time to Diagnose Endometriosis: Current Status, Challenges and Regional Characteristics—A Systematic Literature Review,” BJOG Int. J. Obstet. Gynaecol., vol. 132, no. 2, pp. 118–130, 2025, doi: 10.1111/1471-0528.17973.
[49] S. Khan, P. A. Ferreira Lopes martins, B. Sousa, and V. Pereira, “A Comprehensive Review on Lightweight Cryptographic Mechanisms for Industrial Internet of Things Systems,” ACM Comput Surv, vol. 58, no. 1, p. 23:1-23:37, Sep. 2025, doi: 10.1145/3757734.
[50] R. Brignardello-Petersen, N. Santesso, and G. H. Guyatt, “Systematic reviews of the literature: an introduction to current methods,” Am. J. Epidemiol., vol. 194, no. 2, pp. 536–542, Feb. 2025, doi: 10.1093/aje/kwae232.
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2026 Yuris Ikrar RABBANI, Wildan Ramadhani (Penulis)

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.








