Claim Missing Document
Check
Articles

Found 21 Documents
Search

Flatbuffers Implementation on MQTT Publish/Subscribe Communication as Data Delivery Format Muhammad Adna Pradana; Andrian Rakhmatsyah; Aulia Arif Wardana
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.1942

Abstract

Communication between devices can be done in various ways, one of them is the Publish / Subscribe model that uses the MQTT protocol From the shortcomings that exist in JSON, such as long processing time, Google recently introduced a new data format called Flatbuffers. Flatbuffers has a better data format serialization process than other data formats. This paper will discuss the implementation and testing of the Flatbuffers data format performance compared to other data formats through the MQTT Publish / Subscribe communication model. Testing is done by measuring the value of payload, latency, and throughput obtained from each data format. The test results show that the Flatbuffers data format is very well used as a data extraction format based on data processing latency of 0.5002 ms and throughput 518.4649 bytes/ms with payload 0.996108949 character/byte.
Pendeteksian PHP Vulnerabilities Menggunakan Metode Forward Taint Data Analisis Shyffa Ilmallia Noer Fhadillah; Parman Sukarno; Aulia Arif Wardana
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 7 No 1 (2020): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (192.381 KB) | DOI: 10.35957/jatisi.v7i1.237

Abstract

This research builds the detection of php scripts using the Forward Taint data analysis method. Research has been carried out to test this attack. However, the accuracy that has been inferred is still very low. This is getting higher because of the false positive generated. So in solving this problem, the forward taint data analysis method performs double checks that will reduce the positive false value generated. Accuracy resulting from this research reached 90%. These results outperform other existing methods.
Penerapan Metode Anomaly Based Detection Untuk Mendeteksi Serangan Black Hole Pada Topologi Mesh Di Lora Anjar Apriyanti; Vera Suryani; Aulia Arif Wardana
eProceedings of Engineering Vol 7, No 2 (2020): Agustus 2020
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak LoRa adalah sistem telekomunikasi nirkabel jarak jauh, dan berdaya rendah. LoRa masih rentan terhadap bentuk serangan yang dapat merusak rute pengiriman data, serta dapat menghapus data beserta informasi pada LoRa. Salah satu serangan yang terdapat pada LoRa adalah Black Hole. Penilitian ini fokus pada pendeteksian dan pencegahan node yang berperan sebagai node black hole yang mendrop paket dengan menggunakan metode Anomaly Based Detection dan menggunakan parameter packet loss pada topologi mesh di LoRa. Pengujian ini dilakukan dengan jumlah node sebanyak 6 node, 1 node berperan sebagai gateway, node 6 berperan sebagai node black hole, dengan kondisi pada node normal dan node yang terdapat black hole node. Dari penilitian ini dapat disimpulkan bahwa node black hole dapat terdeteksi dengan menggunakan anomaly based detection. Serta dapat melakukan pencegahan terhadap node black hole dengan menggunakan metode Baited Based. Kata kunci : LoRa, Black Hole, Node, Mesh. Abstract LoRa is a low-power wireless telecommunications system. LoRa is still vulnerable to forms of attack that can damage data delivery routes, and can delete data and information on LoRa. One of the attacks found on LoRa is the Black Hole attack. This research focuses on detecting and prevention nodes that act as black hole nodes dropping packets using the Anomaly Based Detection method and using packet loss parameters on the mesh topology in LoRa. This test is carried out with 6 nodes, 1 node acts as a gateway, node 6 acts as a black hole node, with conditions on normal nodes and nodes that have black hole nodes. From this research it can be concluded that black hole nodes can be detected using anomaly based detection. And can prevent black hole nodes using by Baited Based method. Keywords: LoRa, Black Hole, Node, Mesh.
Penerapan Keamanan Komunikasi Pada Jaringan Lora(long Range) Menggunakan Algoritma Advanced Encryption Standard(aes) Dan Message Authentication Code(mac) Putri Apriyanti Windya; Vera Suryani; Aulia Arif Wardana
eProceedings of Engineering Vol 8, No 2 (2021): April 2021
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak Internet of Things (IoT) merupakan suatu hal yang populer saat ini. Penggunaan IoT semakin meningkat setiap tahun khususnya penggunaan LoRa, begitu juga dengan pengembangan perangkat IoT. Salah satu karakteristik perangkat IoT yaitu resource yang terbatas. Perangkat ini sering disebut sebagai constrained device IoT. Seiring dengan meningkatnya penggunaan LoRa, aspek keamanan komunikasi pada jaringan LoRa juga harus diperhatikan. Akan tetapi, keterbatasan resource yang dimiliki oleh perangkat IoT menjadi tantangan dalam memilih metode security yang sesuai. Oleh karena itu, untuk mengatasi masalah tersebut dibutuhkan sebuah metode security yang sesuai yaitu pemanfaatan algoritma AES dan MAC. Jenis AES yang digunakan pada penelitian ini yaitu AES128 dan AES256. Sedangkan Algoritma MAC yang digunakan adalah Hash-based Message Authentication Code (HMAC). Berdasarkan hasil analisis keamanan yang telah dilakukan, metode ini mampu menjamin aspek confidentiality, integrity dan authentication. Selain itu, penelitian ini juga melakukan analisis overhead pada constrained devices IoT kelas 0 dan kelas 2. Hasil analisis overhead menunjukkan bahwa metode ini cocok untuk diterapkan pada kelas 0 dan kelas 2. Kata kunci : Long Range, constrained devices, CIA, AES, HMAC Abstract Internet of Things (IoT) is a popular thing nowadays. The use of IoT is increasing every year especially the use of LoRa, as well as the development of IoT devices. One of the characteristics of IoT devices is limited resources. This device is often referred to as IoT-constrained devices. Along with the increasing use of LoRa, the communication security aspect of the LoRa network must also be considered. However, the limited resources possessed by IoT devices are a challenge in choosing the appropriate security method. Therefore, to overcome this problem an appropriate security method is needed namely the use of AES algorithms and MAC. Variants of AES algorithm used in this research are AES128 and AES256. Meanwhile, the MAC algorithm used is Hash-based Message Authentication Code (HMAC). Based on the results of the security analysis that has been done, this methode is able to guarantee aspects of confidentiality, integrity and authentication. In addition, this study also performs overhead analysis on IoT constrained devices class 0 and class 2. The results of the overhead analysis show that this method is suitable to be implemented on IoT constrained devices class 0 and class 2. Keywords: Long Range, constrained devices, CIA, AES, HMAC
Analisis Dan Implementasi Sistem Pendeteksi Ijazah Dan Transkrip Palsu Dengan Menggunakan Ipfs Dan Smart Contract Blockchain Muhammad Danil Muis; Parman Sukarno; Aulia Arif Wardana
eProceedings of Engineering Vol 8, No 5 (2021): Oktober 2021
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Pemalsuan ijazah/transkrip merupakan salah satu masalah dalam dunia pendidikan. Dalam menyikapi hal ini, Lembaga Layanan Pendidikan Tinggi membuat Sistem Verifikasi Ijazah Secara Online (SIVIL) dan kebijakan Penomoran Ijazah Nasional (PIN). Sistem yang dibangun masih menggunakan penyimpanan secara terpusat sehingga rentan terhadap peretasan seperti SQLInjection yang membahayakan data. Oleh karena itu, sistem yang dikembangkan pada penelitian ini menggunakan penyimpanan terdistribusi untuk mencegah terjadinya serangan tersebut. Sistem ini menggunakan InterPlanetary File System (IPFS) untuk menyimpan data secara terdistribusi dan smart contract blockchain untuk menyimpan hash file ijazah/transkrip. Dalam mengetahui performansi sistem, maka dilakukan pengujian Quality of Service (QoS) dengan menggunakan parameter throughput, packet loss dan delay serta analisis penggunaan Central Processing Unit (CPU) dan Random Access Memory (RAM). Berdasarkan penelitian yang sudah dilakukan, sistem pendeteksi ijazah/transkrip palsu dapat dijalankan dengan baik dengan menggunakan 1 node sampai dengan 5 node. Nilai throughout terbaik pada saat proses pembuatan serta proses validasi ijazah/transkrip adalah dengan menggunakan 1 node. Nilai packet loss pada proses pembuatan serta proses validasi ijazah/transkrip memiliki kategori sangat bagus. Nilai delay pada proses pembuatan serta proses validasi ijazah/transkrip memiliki kategori sangat bagus. Kata kunci : IPFS, Blockchain, Ijazah
Access Control and File Distribution Management for Electronic Diploma and Transcript using Ethereum Smart Contract and InterPlanetary File System Muhammad Danil Muis; Muhammad Rifki Fauzan; Parman Sukarno; Aulia Arif Wardana
Jurnal Sistem Informasi Vol. 17 No. 2 (2021): Jurnal Sistem Informasi (Journal of Information System)
Publisher : Faculty of Computer Science Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (575.083 KB) | DOI: 10.21609/jsi.v17i2.1093

Abstract

This reserach build access control and file distribution management system for electronic diploma and transcript using ethereum smart contract and InterPlanetary File System (IPFS). The falsification of diplomas/transcripts is one of the problems in education. In Indonesia, falsification of diplomas/transcripts is a form of criminal act of falsifying letters. In addition, diplomas/transcripts that have not been digitalized make them easily damaged, lost, and difficult to manage. Therefore, this research developed digital diploma/transcript as digital twin from the hardcopy of diploma/tramscript. This research used IPFS to store data in a distributed system and Smart Contracts Blockchain to store and protect the digital diploma/transcript. The system also comes with access control to create and give approval for diplomas or transcripts to be published and saved into the system. Access control settings will be saved using the blockchain. This research using Quality of Service test method for measurethroughput, packet loss, and delay. Beside that, tis research also analysis the usage of Central Processing Unit and Random Access Memory from the system. Based on the test that has been done, the fake diploma/transcript detection system can be run properly by using 1 node to 5 nodes. The best throughput value during the process of making and validating the diploma/transcript is to use 1 node. The value of packet loss in the process of making and validating the certificate/transcript has a very good category. The value of delay in the process of making and validating the diploma/transcript has a very good category.
Perancangan dan Analisis Crowdsec Sebagai Intrusion Prevention System pada Infrastruktur Server Muhammad Thariq Sunu Rendratama; Parman Sukarno; Aulia Arif Wardana
eProceedings of Engineering Vol 10, No 2 (2023): April 2023
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak-Belakangan ini perkembangan teknologi semakin membesar, industri - industri Technology Information (IT) banyak menerapkan dan membangun teknologi - teknologi baru tersebut ke dalam bisnis perusahaannya, salah satunya bisnis Financial Technology atau biasa disebut Fintech. Fintech ini merupakan sebuah industri perusahaan yang berbasis finansial atau keuangan, dimana mereka ingin memberikan layanan dalam mengelola uang kepada masyarakat agar lebih efisien dan juga mudah. Banyak dari Fintech ini memberikan layanan keuangan misalkan payment, assest management, dan juga financing [2] secara daring tersebut. Dari banyak hal Fintech tersebut maka akan semakin banyak juga kejahatan siber di internet yang mengincar perusahan tersebut, untuk itu orang - orang yang berada di dalam sektor tersebut perlu meningkatkan sistem keamanan yang sangat ekstra guna menangkal serangan - serangan yang ada. Dan salah satu cara yang paling ampuh digunakan adalah memblokir akses pengguna ke dalam sistem bagi pengguna yang dinilai bersifat membayakan, dan tool yang akan digunakan pada penelitian ini yaitu Crowdsec. Crowdsec merupakan sebuah Intrusion Detection and Prevention System (IDPS) untuk mendeteksi dan juga mencegah sistem dari ancaman siber yang ada, teknisnya adalah dia akan mem-ban atau memblokir akses pengguna melalui IP address yang dibacanya sebagai akses mencurigakan atau gagal.Kata Kunci- fintech, blockchain, cryptocurrentcy crowdsec, pengguna, sistem.
Monitoring Floating Solar Tracker Based on Axis Coordinates using LoRa Network Abyan Arief Fernandez; Andrian Rakhmatsyah; Aulia Arif Wardana
International Journal of Renewable Energy Development Vol 9, No 2 (2020): July 2020
Publisher : Center of Biomass & Renewable Energy, Diponegoro University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/ijred.9.2.141-149

Abstract

This research aimed to build a solar tracker for a floating solar panel and used long–range (LoRa) communication to harvest energy and monitor its process. With the rising demand for renewable energy in these recent years especially for solar energy, it needs to meet this demand to remain relevant for the upcoming years where it will have an even larger impact as we shift into clean energy. Monitoring single–axis solar trackers on rural areas difficult and cost–intensive. The purpose of a floating solar farm is to reduce the cost from buying/renting land. Floating solar panels cannot be monitored using wired because they are moving nodes in the water, it makes wired installation complicated. Hence, using wireless sensornetwork is a solution that allowsremote monitoring of floating solar panels in rural areas and makes moving nodes mentioned above possible. Testing wasperformed by sending 100 packets from the node to its gateway using LoRa modulation, and the gateway successfully received about 90% of the packets sent by the node. The vertical single-axis solar tracker used in floating solar managed to get 17% more energy than the fixed solar with a more stable income for the whole duration of sending 100 packets.
Simplification of Workflow-oriented Security Assessment Edri Yunizal; Aulia Arif Wardana; Abdurrahman Niarman
IJAIT (International Journal of Applied Information Technology) Vol 07 No 02 (November 2023)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v7i02.6797

Abstract

One of the protection mechanisms for organizations to protect their data is through information security risk assessment. The main obstacle in this area is asset dependency. Previous research developments tended to produce models that were difficult to implement because they were only applied to small assets, in contrast to the complexity of implementation in the field. This form of problem solving is a workflow-oriented security assessment solution that provides security rationale from a holistic perspective. The weakness of complexity in workflow oriented then became the basis of this research. The proposed solution is a simplification by using combined nodes that enable a modular concept. The modular concept is then applied to a reliable model, a data flow diagram. The study output shows the contribution of offerings with assessment solutions that consider dependencies by simplifying asset complexity in workflows in a modular manner with data flow diagrams.
Estimasi Utilisasi Prosesor pada Jaringan Interkoneksi Optik menggunakan Regresi Gaussian NUHA, HILAL HUDAN; WARDANA, AULIA ARIF
ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika Vol 10, No 3: Published July 2022
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/elkomika.v10i3.702

Abstract

ABSTRAKTeknologi prosesor paralel melibatkan lebih dari satu node prosesor dalam interkoneksi optik. Unjuk kerja dari desain dari jaringan optik tersebut harus diestimasi sebelum diimplementasikan. Atribut yang bisa diambil diambil dari desain tersebut yaitu nomor node dan thread, distribusi spasial dan temporal, dan rasio T/R. Kajian ini mengevaluasi teknik estimasi utilitasi prosesor menggunakan regresi Gaussian yang dibandingkan dengan Support Vector Machine untuk regresi dan regresi linear. Hasil percobaan penunjukkan bahwa regresi Gaussian menghasilkan akurasi estimasi paling tinggi dengan nilai koefisien determinasi sebesar 98.75%.Kata kunci: Utilisasi prosesor, interkoneksi optik, regresi Gaussian ABSTRACTParallel processor technology involves more than one processor node in an optical interconnection. The performance of the design of the optical network must be estimated before further deployment. The attributes that can be obtained from the design are the number of nodes and threads, the spatial and temporal distribution, and the T/R ratio. This study evaluates the processor utility estimation technique using Gaussian regression compared to the Support Vector Machine for linear regression and regression. The experimental results show that Gaussian regression produces the highest estimation accuracy with a coefficient of determination of 98.75%.Keywords: Processor Utilization, Optical Interconnection, Gaussian Regression