##plugins.themes.bootstrap3.article.main##

Lisdawati Gurning

Abstract

This research designs and evaluates an edge-centric, local-first IoT-based Smart Church architecture that supports three pillars: prayer discipline, togetherness, and data security/privacy. The method used is mixed-methods engineering + field evaluation with a stepped-wedge design in two church communities for 8 weeks. The system layer includes devices (occupancy, prayer intention buttons, NFC/QR), an edge gateway with store-and-forward (MQTT/CoAP), an event-driven service platform (RBAC/ABAC), and a congregational application/servant dashboard. Technical indicators (p95 latency, uptime, message loss), security/privacy (incidents, time-to-patch, consent opt-in), and socio-spiritual (per capita prayer check-ins, cell group participation, Likert-type perception of togetherness) are measured periodically; qualitative data from interviews/FGDs are analyzed thematically and integrated through a joint display. Pilot results demonstrated consistent technical improvements (decreased p95 latency and message loss, increased uptime), improved prayer discipline (increased weekly check-ins) and togetherness (higher cell participation and togetherness scores), and strengthened security/privacy (fewer incidents, faster time-to-patch, and increased opt-in consent). Qualitative findings confirmed that privacy-conscious ethical nudging and data flow transparency build congregational trust without forcing compliance. Practical implications include the adoption of an edge + store-and-forward pattern with p95 latency/uptime-based SLOs, RBAC/ABAC integration according to church roles, and periodic patching and configuration audit cycles. Limitations of the study include the short time horizon and limited community scale; further research is recommended with longer durations, cluster randomization, and exploration of privacy-preserving analytics (e.g., differential/federated) to ensure that spiritual-communal benefits remain aligned with the dignity and confidentiality of the congregation.

##plugins.themes.bootstrap3.article.details##

References
[1] OASIS. (2019). MQTT Version 5.0 – OASIS Standard (07 Mar 2019). OASIS Open+1
[2] Shelby, Z., Hartke, K., & Bormann, C. (2014). The Constrained Application Protocol (CoAP). RFC 7252, IETF. IETF Datatracker+1
[3] Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446, IETF. IETF Datatracker+1
[4] Rescorla, E., Tschofenig, H., et al. (2022). Datagram TLS (DTLS) 1.3. RFC 9147, IETF. IETF Datatracker+1
[5] ISO/IEC. (2018). ISO/IEC 30141: Internet of Things (IoT) — Reference Architecture. Geneva: ISO. ISO+2ISO+2
[6] Satyanarayanan, M. (2017). The emergence of edge computing. IEEE Computer, 50(1), 30–39. https://doi.org/10.1109/MC.2017.9 ACM Digital Library+1
[7] NIST. (2020). Zero Trust Architecture (SP 800-207). Gaithersburg, MD: NIST. NIST Publications+1
[8] European Data Protection Board (EDPB). (2020). Guidelines 05/2020 on consent under Regulation 2016/679. edpb.europa.eu+2edpb.europa.eu+2
[9] Cavoukian, A. (2011). Privacy by Design: The 7 Foundational Principles. Information and Privacy Commissioner of Ontario. Simon Fraser University+1
[10] ENISA. (2019). Good Practices for Security of IoT – Secure Software Development Lifecycle. enisa.europa.eu+1
[11] OWASP. (2025). OWASP Internet of Things Top 10 (project page & resources). OWASP Nest+1
[12] ISO/IEC. (2022). ISO/IEC 27001:2022 – Information security, cybersecurity and privacy protection — ISMS requirements. Geneva: ISO. ISO+1
[13] Hemming, K., et al. (2015). The stepped-wedge cluster randomised trial: rationale, design, analysis, and reporting. BMJ, 350, h391. https://doi.org/10.1136/bmj.h391 BMJ+1
[14] Hemming, K., et al. (2018). Reporting of stepped wedge cluster randomised trials: CONSORT extension. BMJ, 363, k1614. equator-network.org
[15] Dwork, C., & Roth, A. (2014). The Algorithmic Foundations of Differential Privacy. Foundations and Trends in TCS, 9(3–4), 211–407. https://doi.org/10.1561/0400000042 ACM Digital Library+1
[16] McMahan, H. B., Moore, E., Ramage, D., Hampson, S., & Agüera y Arcas, B. (2017). Communication-Efficient Learning of Deep Networks from Decentralized Data. Proc. AISTATS (PMLR). Proceedings of Machine Learning Research+1
[17] Microsoft. (2022). Threat Modeling Tool overview (STRIDE). Microsoft Learn
[18] NIH Research Methods Resources. (2025). Stepped Wedge Group-Randomized Trials (design guidance). researchmethodsresources.nih.gov
[19] Cloudflare. (2018). A detailed look at RFC 8446 (TLS 1.3) (engineering explainer). The Cloudflare Blog
[20] OpenTelemetry Authors. (2024). OpenTelemetry Specification (metrics, traces, logs).