Keamanan Data Internet of Things dalam Perspektif Pseudosains Mario Bunge
Internet of Things Data Security in Mario Bunge's Pseudoscience Perspective
DOI:
https://doi.org/10.23887/jfi.v7i2.72435Keywords:
data security, internet of things, pseudosains, Mario BungeAbstract
Data security is a major concern in the rapidly growing Internet of Things (IoT). This paper investigates the data security aspects of IoT with a pseudoscience perspective inspired by Mario Bunge. The purpose of this research is to understand and address data security challenges in IoT environments. First, researcher identify and evaluate potential vulnerabilities and threats to data, hacking risks, and data encryption needs. Then, researcher analyze commonly used security methods and strategies, including blockchain, fog computing, edge computing, and machine learning. Bunge's pseudoscience approach helps in comprehensively understanding and analyzing IoT data security. The results show a deeper understanding of the data security challenges in IoT, as well as detailed recommendations for risk mitigation. This research highlights the importance of a holistic approach that blends technical and philosophical aspects to address data security issues in IoT. The pseudoscience perspective helps in developing a solid conceptual framework and encourages critical thinking in formulating effective security strategies. In conclusion, this paper makes an important contribution in understanding and addressing the complexities of data security in IoT.
References
Al-Ghaili, A. M., Gunasekaran, S. S., Jamil, N., Alyasseri, Z. A., Al-Hada, N. M., Ibrahim, Z.-A., Bakar, A. A., Kasim, H., Hosseini, E., Omar, R., Kasmani, R. Md., & Razali, R. A. (2023). A Review on Role of Image Processing Techniques to Enhancing Security of Iot Applications. IEEE Access, 1–1. https://doi.org/10.1109/access.2023.3312682.
Alsoliman, A., Rigoni, G., Callegaro, D., Levorato, M., Pinotti, C. M., & Conti, M. (2023). Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics. ACM Transactions on Cyber-Physical Systems, 7(2). https://doi.org/10.1145/3579999.
Aribilola, I., Asghar, M. N., Kanwal, N., Fleury, M., & Lee, B. (2023). SecureCam: Selective Detection and Encryption Enabled Application for Dynamic Camera Surveillance Videos. IEEE Transactions on Consumer Electronics, 69(2), 156–169. https://doi.org/10.1109/TCE.2022.3228679.
Arisdakessian, S., Wahab, O. A., Mourad, A., Otrok, H., & Guizani, M. (2023). A Survey on IoT Intrusion Detection: Federated Learning, Game Theory, Social Psychology, and Explainable AI as Future Directions. IEEE Internet of Things Journal, 10(5), 4059–4092. https://doi.org/10.1109/JIOT.2022.3203249.
Bhattacharya, S., Manousakas, Di., Ramos, A. G. C. P., Venieris, S. I., Lane, N. D., & Mascolo, C. (2020). Countering Acoustic Adversarial Attacks in Microphone-equipped Smart Home Devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 4(2). https://doi.org/10.1145/3397332.
Blessing, L. T. M., & Chakrabarti, A. (2009). DRM, a Design Research Methodology. Springer.
Brocke, J. vom, Hevner, A., & Maedche, A. (2020). Design Science Research. Springer. https://doi.org/10.1201/b16768-26.
Bunge, M. (1983). What Is Pseudoscience? The Skeptical Inquirer, 9, 36–46.
Burhan, M., Alam, H., Arsalan, A., Rehman, R. A., Anwar, M., Faheem, M., & Ashraf, M. W. (2023). A Comprehensive Survey on the Cooperation of Fog Computing Paradigm-Based IoT Applications: Layered Architecture, Real-Time Security Issues, and Solutions. IEEE Access, 11, 73303–73329. https://doi.org/10.1109/ACCESS.2023.3294479.
CC2020 Task Force. (2021). Computing Curricula 2020. Paradigms for Global Computing Education. Dalam Computing Curricula 2020. https://dl.acm.org/doi/book/10.1145/3467967.
Duarte, F. (2023). Number of IoT Devices (2023). Exploding Topics. https://explodingtopics.com/blog/number-of-iot-devices.
Fagbohungbe, O., Reza, S. R., Dong, X., & Qian, L. (2022). Efficient Privacy Preserving Edge Intelligent Computing Framework for Image Classification in IoT. IEEE Transactions on Emerging Topics in Computational Intelligence, 6(4), 941–956. https://doi.org/10.1109/TETCI.2021.3111636.
Ghazal, T. M., Hasan, M. K., Abdallah, S. N. H., & Abubakkar, K. A. (2022). Secure IoMT Pattern Recognition and Exploitation for Multimedia Information Processing using Private Blockchain and Fuzzy Logic. ACM Transactions on Asian and Low-Resource Language Information Processing. https://doi.org/10.1145/3523283.
Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., & Sikdar, B. (2019). A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. Dalam IEEE Access (Vol. 7, hlm. 82721–82743). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ACCESS.2019.2924045.
Kemp, S. (2023). Digital 2023: Global Overview Report. Data Reportal. https://datareportal.com/reports/digital-2023-global-overview-report.
Kitchenham, B. (2007). Guidelines for Performing Systematic Literature Reviews in Software Engineering. https://www.researchgate.net/publication/302924724.
Krishnan, P., Jain, K., Jose, P. G., Achuthan, K., & Buyya, R. (2021). SDN Enabled QoE and Security Framework for Multimedia Applications in 5G Networks. ACM Transactions on Multimedia Computing, Communications and Applications, 17(2). https://doi.org/10.1145/3377390.
Lachtar, N., Ibdah, D., Khan, H., & Bacha, A. (2023). RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware. ACM Transactions on Privacy and Security, 26(3). https://doi.org/10.1145/3579822.
Liang, H., Wu, J., Zheng, X., Zhang, M., Li, J., & Jolfaei, A. (2021). Fog-Based Secure Service Discovery for Internet of Multimedia Things: A Cross-Blockchain Approach. ACM Transactions on Multimedia Computing, Communications and Applications, 16(3s). https://doi.org/10.1145/3415151.
Lin, C., He, D., Kumar, N., Huang, X., Vijayakumar, P., & Choo, K. K. R. (2020). HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes. IEEE Internet of Things Journal, 7(2), 818–829. https://doi.org/10.1109/JIOT.2019.2944400.
Mahayana, D. (2022). Filsafat Sains: Dari Newton, Einstein hingga Sains-Data (E. Warsidi, Ed.). ITB Press.
Mahayana, D. (2023). Pseudoscience, Big Data Analytics & Artificial Intelligence. Paper presented at lecturer for Filsafat Sains, STEI ITB.
Usman, M., Jan, M. A., & Puthal, D. (2020). PAAL: A Framework Based on Authentication, Aggregation, and Local Differential Privacy for Internet of Multimedia Things. IEEE Internet of Things Journal, 7(4), 2501–2508. https://doi.org/10.1109/JIOT.2019.2936512
Wang, L., Chen, M., Lu, L., Ba, Z., Lin, F., & Ren, K. (2023). VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 7(1). https://doi.org/10.1145/3580789.
Wang, Y., Cai, W., Gu, T., Shao, W., Li, Y., & Yu, Y. (2019). Secure your voice: An Oral Airflow-Based Continuous Liveness Detection for Voice Assistants. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 3(4). https://doi.org/10.1145/3369811.
Wu, H., Dwivedi, A. D., & Srivastava, G. (2021). Security and Privacy of Patient Information in Medical Systems Based on Blockchain Technology. ACM Transactions on Multimedia Computing, Communications and Applications, 17(2s). https://doi.org/10.1145/3408321
Xiang, T., Zeng, H., Chen, B., & Guo, S. (2023). BMIF: Privacy-preserving Blockchain-based Medical Image Fusion. ACM Transactions on Multimedia Computing, Communications, and Applications, 19(1). https://doi.org/10.1145/3531016.
Xu, X., Huang, Q., Zhang, Y., Li, S., Qi, L., & Dou, W. (2021). An LSH-based Offloading Method for IoMT Services in Integrated Cloud-Edge Environment. ACM Transactions on Multimedia Computing, Communications, and Applications, 16(3s). https://doi.org/10.1145/3408319.
Xue, Z., Zhou, P., Xu, Z., Wang, X., Xie, Y., Ding, X., & Wen, S. (2021). A Resource-Constrained and Privacy-Preserving Edge-Computing-Enabled Clinical Decision System: A Federated Reinforcement Learning Approach. IEEE Internet of Things Journal, 8(11), 9122–9138. https://doi.org/10.1109/JIOT.2021.3057653.
Zhong, H., Wang, L., Cui, J., Zhang, J., & Bolodurina, I. (2023). Secure Edge Computing-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks. IEEE Transactions on Information Forensics and Security, 18, 3774–3786. https://doi.org/10.1109/TIFS.2023.3287731.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Jurnal Filsafat Indonesia
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Jurnal Filsafat Indonesia Undiksha is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.