Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Journal Innovations Computer Science

IoT-Based Integrated Monitoring System for Household Water Level and Usage Tracking Rivaldi, Muhammad Rizki; Said, Fadillah
Journal Innovations Computer Science Vol. 4 No. 2 (2025): November
Publisher : Yayasan Kawanad

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56347/jics.v4i2.317

Abstract

Conventional household water management often results in inefficiencies, including tank overflow, unexpected shortages, and a lack of awareness about daily consumption. Most existing solutions address these issues only partially—either by monitoring water levels, automating pump control, or recording usage data—without integrating the three into a unified system. To address this gap, this research developed and validated a low-cost Internet of Things (IoT) prototype that combines real-time water-level monitoring, daily consumption measurement, and automatic pump control within a smartphone-connected platform. The system is built on a NodeMCU ESP8266 microcontroller equipped with an HC-SR04 ultrasonic sensor, a YF-S201 flow sensor, and a relay-controlled pump, with data transmitted via Wi-Fi to the Blynk application. Using a Research and Development (R&D) methodology with a prototyping model, the study conducted functional, accuracy, and usability testing. Results show that the prototype achieved reliable performance, with an average error below 2% for both sensors and stable operation during 24-hour trials. Beyond technical validation, the system demonstrated its potential as an eco-feedback tool by providing clear consumption data that can encourage more sustainable water use at the household level.
Implementation of Defense In Depth and IAM Best Practices Based on Segmented VPC Architecture Using Amazon Web Services (AWS) for Small Business Network Security Asrori, Muhamad Umar Hassan; Said, Fadillah
Journal Innovations Computer Science Vol. 4 No. 2 (2025): November
Publisher : Yayasan Kawanad

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56347/jics.v4i2.318

Abstract

This study presents the design, implementation, and validation of a cloud security architecture on Amazon Web Services (AWS) that integrates Defense in Depth strategies with Identity and Access Management (IAM) Best Practices, tailored for small and medium-sized enterprises (SMEs). Using the AWS Free Tier, an experimental cloud infrastructure was constructed to evaluate the effectiveness of multi-layered protection encompassing network segmentation, least-privilege access control, and real-time monitoring. The architecture employed a segmented Virtual Private Cloud (VPC) with public and private subnets, controlled by Security Groups (SGs) and Network Access Control Lists (NACLs), while IAM policies and Multi-Factor Authentication (MFA) enforced identity-level security. Centralized monitoring through CloudTrail and CloudWatch enabled anomaly detection and event logging with high accuracy. Test results showed that unauthorized access was effectively blocked, suspicious activities were detected promptly, and all administrative actions were recorded reliably. The findings indicate that combining layered network defenses and IAM governance significantly enhances the resilience, visibility, and security posture of SMEs adopting AWS environments. Beyond its technical effectiveness, the model offers scalability, auditability, and cost-efficiency—demonstrating that enterprise-grade protection can be achieved even within the resource constraints of SMEs. Future work is encouraged to integrate automation and advanced AWS tools such as GuardDuty and Config to strengthen real-world adaptability and compliance.