Claim Missing Document
Check
Articles

Implementasi Ethereum Blockchain dan Smart Contract Pada Jaringan Smart Energy Meter Mabruroh, Anggun Mugi; Favian Dewanta; Aulia Arif Wardana
MULTINETICS Vol. 7 No. 1 (2021): MULTINETICS Mei (2021)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this study, we propose the creation of an Internet of Things device, namely a smart energy meter by implementing a blockchain system as a database. Internet of Things has a centralized storage system on the database server, if the server is down then the database cannot be used and data may be lost. There is a storage system that has a decentralized and distributed network, namely the blockchain. The private blockchain system is built using the Ethereum framework. Sensor data will be read by the Raspberry Pi 4B and sent to node 1 via MQTT. Node 1 will save the data to the block. Two nodes Ethereum account will validate the block. If accepted then the block will be stored on the blockchain and create a new block chain. In the storage process, there is a smart contract between Ethereum accounts that is created using Solidity and accessed using the web3 API. Successfully saved data will be displayed to the user's web. Based on the results of measuring the performance of the MQTT protocol and blockchain system when compared to traditional databases, blockchain is less fast in the storage process because there is a transaction process and data verification. However, if it is applied to smart energy meter data, it doesn't matter because the time required for the storage process is a maximum of 1 minute. The number of nodes and the size of the data or block does not affect the performance of the proof of authority consensus algorithm
Perancangan dan Analisis Intrusion Prevention System Berbasis SNORT dan IPTABLES dengan Integrasi Honeypot pada Arsitektur Software Defined Network Barends, Julian Kevin; Dewanta, Favian; Karna, Nyoman Bogi Aditya
MULTINETICS Vol. 7 No. 2 (2021): MULTINETICS Nopember (2021)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Software Defined Network is a network architecture that allows the network to be controlled centrally by separating the Control Plane and Data Plane making it easier from the operator's side to manage the network consistently, therefore SDN is believed to be able to replace the existing network which tends to be rigid. But despite the capabilities of the SDN, SDN security is still a major concern. In project, the design of an Snort and IPTables based IPS system that is integrated with the Honeypot system in the Software Defined Network network architecture will be carried out. IPS will detect attacks based on the applied rules and if there is an attack then IPS will give an alert to the Controller which then the Controller will check the database and divert the attack traffic to the Honeypot. The results shows that the accuracy rate is 99.87%, the average detection speed for Port Scanning, Ping of Death, ICMP Flood and TCP SYN Flood attacks are 1.207 s, 1.045 s, 1.047 s, and 1.101 s. While the QoS measurement shows that after the attack is transferred, there is an increase in the Throughput value and a decrease in the Packet Loss value.
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localization Schemes in Wireless Sensor Networks Doan Perdana; Adi Nugroho; Favian Dewanta
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 3: June 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i3.8560

Abstract

In the field of high-risk observation, the nodes in Wireless Sensor Network (WSN) are distributed randomly. The result from sensing becomes meaningless if it is not known from where the originating node is. Therefore, a sensor node positioning scheme, known as the localization scheme, is required. The localization scheme consists of distance estimation and position computing. Thus, this research used connectivity as distance estimation within range free algorithm DV-Hop and Amorphous, and then trilateral algorithm for computing the position. Besides that, distance estimation using the connectivity between nodes is not needed for the additional hardware ranging as required by a range-based localization scheme. In this research compared the localization algorithm based on range free localization, which are DV-Hop algorithm and Amorphous algorithm. The simulation result shows that the amorphous algorithm have achieved 13.60% and 24.538% lower than dv-hop algorithm for each parameter error localization and energy consumption. On node density variations, dv-hop algorithm gained a localization error that is 26.95% lower than amorphous algorithm, but for energy consumption parameter, amorphous gained 14.227% lower than dv-hop algorithm. In the communication range variation scenario, dv-hop algorithm gained a localization error that is50.282% lower than amorphous. However, for energy consumption parameter, amorphous algorithm gained 12.35%. lower than dv-hop algorithm.
Load Balancing Server and Homomorphic Encryption in Internet of Things Muhammad Hafiz Amrullah; Favian Dewanta; Sussi Sussi
Khazanah Informatika Vol. 7 No. 2 October 2021
Publisher : Department of Informatics, Universitas Muhammadiyah Surakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v7i2.13607

Abstract

User demand for Internet of Things (IoT) services is ever increasing. The growing user demand can lead to an escalation of server workloads and faces the threat of theft of critical data. Consequently, a system is necessary to balance the server load and is protected with data encryption. In this study, we designed a system to share server workloads using load balancing methods. The load balancing technique uses open-source web server software. The system is equipped with data security using a homomorphic encryption algorithm from AES on the sender's side. The system embeds in an IoT telemedicine apparatus. During testing, we analyze the error requests that arrive at each server for the HTTP GET and POST methods. We also evaluate the speed of data encryption and decryption. The results showed that server load balancing reduces the number of error requests for the GET method by 97%. Meanwhile, the number of error requests for the POST method decreases by 66.75%. Observations reveal that the average homomorphic encryption speed, computation time, and decryption time are 15.66 ms, 764.18 µs, and 362.49 µs, respectively.
Pengembangan Sistem Pembelajaran Berbasis Komputer di Lingkungan Madrasah Aliyah Pesantren As-Suruur Sebagai Bentuk Persiapan dalam Menghadapi Ujian Nasional Berbasis Komputer (UNBK) Danang Triantoro Murdiansyah; Z. K. Abdurahman Baizal; Nurul Ikhsan; Favian Dewanta; Umar Ali Ahmad; Reza Rendian Septiawan; Ika Arum Puspita; Devi Pratami; Litasari Widyastuti Suwarsono
Charity : Jurnal Pengabdian Masyarakat Vol 4 No 1 (2021): Charity-Jurnal Pengabdian Masyarakat
Publisher : PPM Universitas Telkom

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/charity.v4i1.3212

Abstract

Adanya ketentuan tentang kewajiban pelaksanaan Ujian Nasional Berbasis Komputer (UNBK) dan Ujian Sekolah Berbasis Komputer (USBK) oleh pemerintah di setiap sekolah setara Sekolah Menengah Atas (SMA), menuntut adanya kesiapan dari berbagai pihak untuk dapat melaksanakan kegiatan tersebut termasuk diantaranya Madrasah Aliyah Pesantren As-Suruur. Masih minimnya keterampilan siswa dalam menggunakan media belajar berbasis komputer menjadi salah satu kendala dalam menghadapi UNBK. Ketidaksiapan siswa ini diprediksikan akan mempengaruhi performansi siswa dalam menghadapi ujian. Oleh karenanya dibutuhkan upaya untuk mempersiapkan siswa dalam menghadapi sistem ujian yang baru bagi mereka. Universitas Telkom melalui program pengabdian masyarakat, mengembangkan sistem pembelajaran berbasis komputer di lingkungan Madrasah Aliyah Pesantren As-Suruur agar para siswa semakin terbiasa dalam mengoperasikan komputer sebagai bentuk persiapan dalam menghadapi UNBK. Selain pengembangan sistem, dilakukan pelatihan bagi guru pesantren yang selanjutnya akan mengambil peran besar dalam menyiapkan siswa dalam UNBK. Pelaksanaan program dapat dikatakan berhasil dilihat dari dapat digunakannya sistem dan juga respon positif guru untuk menggunakan sistem yang ada.
MESSAGE SCHEDULING ON CAN BUS FOR SHIP ENGINE SYSTEMS Favian Dewanta; Dong-Sung Kim; Rendy Munadi
TEKTRIKA Vol 1 No 1 (2016)
Publisher : Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/tektrika.v1i1.242

Abstract

This paper reports novel algorithm for handling real time message scheduling on CAN bus which consider buffer occupancy and message type (alarm, periodic real time and non real time). This algorithm is derived to reduce burden of the distributed control unit (DCU) which have obligation to deliver message within strict time and also manage buffer storage occupancy. The algorithm works by changing the message priority which is attached in the identifier field of message frame. The priority adjustment is performed by online calculation prior to send the message on the CAN bus. Finally, this proposed algorithm is applied on ship engine systems which consist of certain number of DCUs. In this networked control system, the proposed algorithm can decrease buffer overflow. Furthermore, the important message alarm and periodic real time message can be delivered within the deadline.Keywords: CAN Bus, message scheduling, DCU
Rancang Bangun Smart Farming Untuk Observasi Pertumbuhan Tanaman Kangkung Dengan Dukungan Teknologi Sonic Bloom Putri Ayu Rezeki; Favian Dewanta; Sri Astuti
MULTINETICS Vol. 8 No. 1 (2022): MULTINETICS Mei (2022)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v8i1.4683

Abstract

Water spinach is one of the popular vegetables in Indonesia because it has fast-growing properties and is relatively fast in harvesting. Currently, some farmers are cultivating water spinach hydroponically because the technique is more efficient. In the growth of kale, farmers usually always look directly at the garden. So to see from a distance, a water spinach growth monitoring test will be carried out using the Internet of Things (IoT) combined with sonic bloom technology taken from dangdut, jazz, and murottal music with a frequency of 4000 Hz. Sonic Bloom is a technology development that utilizes sound waves to accelerate the opening of the leaf mouth (stomata). The parameters for testing the productivity of water spinach were plant height, room temperature, and water temperature. Network performance testing parameters are delay, throughput, and packet loss. The purpose of this study was to compare the results of three types of music that affect water spinach and water spinach without sonic bloom technology and to test the results of network performance. The application of sonic bloom technology was successfully implemented on water spinach with the most influential result being jazz music with a height of 25.47 cm. Very good network performance in this study is testing with delivery every 5 minutes in 30 minutes of observation with a distance of 2 meters with a delay value of 28.34 ms, throughput 71010.70 bps and packet loss of 0%.
ANALISIS PENGGUNAAN ECC PADA SISTEM AUTENTIKASI DI IOT Daniel Perdana Putra Purwiko; Favian Dewanta; Farah Afianti
MULTINETICS Vol. 8 No. 1 (2022): MULTINETICS Mei (2022)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v8i1.4701

Abstract

The Internet of Things is a complex system that is widely used in many ways to advance human life. As a result, Internet of Things (IoT) has many security vulnerabilities and requires an authentication system to protect user data. Selecting the authentication type that suits your needs is critical to achieving excellent performance on your Internet of Things (IoT) devices with relatively minimal specifications. Due to this situation, Elliptic Curve Cryptography (ECC) algorithm is one of the recommended algorithms which consumes less resources in the process. This study aims to test and compare the Fiat-Shamir based Elliptic Curve Cryptography (ECC) and Elliptic Curve Diffie-Hellman based Hash Message Authentication Code (ECDH-HMAC) authentication algorithms. Parameters for this test are computation time, delay, program storage, and communication cost of the authentication algorithm. The experimental results show that the Elliptic Curve Diffie-Hellman based Hash Message Authentication Code (ECDH-HMAC) algorithm has the lowest computational time, delay, and program storage usage, and the Fiat-Shamir based Elliptic Curve Cryptography (ECC) algorithm has the lowest communication cost value.
Analisis Perbandingan Block Cipher Simon-Speck, Simeck, Skinny pada Komunikasi Berbasis LoRa Winda Ezranata Putri; Favian Dewanta; Farah Afianti
MULTINETICS Vol. 8 No. 2 (2022): MULTINETICS Nopember (2022)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v8i2.4821

Abstract

Inventions solving problems through the incorporation of technology and social impacts to facilitate human life can be defined as the Internet of Things (IoT). Security and privacy are challenges in various Internet of Things applications given the rapid growth of IoT devices. Meanwhile, IoT devices still do not have sufficient communication security. Communication systems on IoT devices require cryptographic to maintain the security of their communications. The appropriate algorithm to be implemented on IoT devices should be the smallest and fastest lightweight cryptographic algorithm or commonly called Lightweight Cryptography because IoT devices have limited memory and computing power. In this study, the proposed algorithm to be implemented in Long Range or LoRa-based IoT devices is the Simon-Speck, Simeck, and Skinny encryption algorithm. This study discusses the implementation of the Simon-Speck, Simeck, and Skinny algorithms on Long Range-based IoT devices. The parameters compared are the computation time of the encryption and decryption process and the avalanche effect value. In the encryption and decryption process, the Speck algorithm has the fastest computation time. Meanwhile, the highest avalanche effect value is obtained by the Skinny algorithm, which is 50.34%.
KLASIFIKASI BEBAN LISTRIK DENGAN MACHINE LEARNING MENGGUNAKAN METODE K-NEAREST NEIGHBOR Salma Salma; Favian Dewanta; Muhammad Abdillah
RESISTOR (Elektronika Kendali Telekomunikasi Tenaga Listrik Komputer) Vol 5, No 2 (2022): RESISTOR (Elektronika Kendali Telekomunikasi Tenaga Listrik Komputer)
Publisher : Universitas Muhammadiyah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24853/resistor.5.2.163-172

Abstract

ABSTRAKSistem pengenalan beban listrik merupakan peran yang penting dalam melakukan manajemen dan penghematan listrik. Sistem pengenalan beban listrik memiliki keandalan dalam memperoleh informasi yang relevan dari setiap beban listrik. Pada penelitian ini, akan dilakukan analisis karakteristik berbagai fitur beban listrik secara independen dan hubungan pencocokan antara fitur yang berbeda dan algoritma klasifikasi yang berbeda. Yaitu dengan melakukan perbandingan antara dua algoritma klasifikasi K-Nearest Neighbours dan Regresi Logistik Multinomial dari segi akurasi dan kecepatan proses dalam analisis. Sistem klasifikasi akan mengidentifikasikan jenis, model, dan prasyarat yang tidak diketahui dari beban listrik dan mengelompokannya. Karakteristik kelistrikan dari beban listrik yang akan diteliti antaralain besarnya tegangan dan arus root mean square, gelombang harmonisa, daya dan faktor daya dari variasi sample beban listrik yang berbeda. Hasil penelitian pada metode k-Nearest Neighbours didapatkan akurasi sebesar 99.619% sedangkan dengan metode Regresi Logistik Multinomial didapatkan akurasi sebesar 91.125% Kata Kunci : Beban Listrik, Klasifikasi, K-Nearest Neighbours, Regresi Logistik MultinomialABSTRACTThe electrical load recognition system plays an important role in managing and saving electricity. In this study, the caharacteristic of various electrical load features in independent condition and the matching relationship between different features and different classification algorithm will be analyzed by doing a comparison between two classification algorithms, k-Nearest Neighbours and Multinomial Logistic Regression in terms of accuracy and speed of analysis process. The classification system will be identify unknown types, models and prerequisites of different electrical loads and classify them. The characteristics of the electrical load that will be analyzed include the magnitude of root mean square voltage and current, harmonic waves, power series, and power factor from variety of different electrical load samples. The results of the research on the k-Nearest Neighbors method obtained an accuracy of 99.619% while the Multinomial Logistics Regression method obtained an accuracy of 91.125%.Keywords: Electrical Load, Classification, Machine Learning, k-Nearest Neighbours, Multinomial Logistic Regression
Co-Authors Adhirajasa, Radhiyya Putra Adi Nugroho Adimas Fachri Ranunegoro Aditya Karyadi Kusuma Ahmad Tri Hanuranto Angga Rusdinar Anita Rosdina Nasution Arif Indra Irawan AULIA ARIF WARDANA Bagus Aditya Bagus Aditya Baiq Yuniar Yustiarini Balqis Hasna Salsabila Barends, Julian Kevin Danang Triantoro Murdiansyah Daniel Perdana Putra Purwiko Deny Kurniawan Devi Pratami Dhanar Bintang Pratama Dhea Dearly Herman Dimas, I Gusti Ngurah Bagus Doan Perdana Dong-Sung Kim Evander Alfa Bahana Fadly Firmansyah Putra Fajrin, Alvin Nur Farah Afianti Hanif, Nasywan Harsritanto, Bangun Indrakusumo Radityo Hilal Hudan Nuha Hilman Fauzi, Hilman Ika Arum Puspita Istikmal Izzulhaq, Muhammad Hilmi Kautsar , Rifki Ikbar Khalif Ibrahim Litasari Widyastuti, Litasari Loudry Achmad Tiransri Mabruroh, Anggun Mugi Manalu, Jesseline Regina Muhammad Abdillah Muhammad Abdullah Rasyad Muhammad Bagas Arya Darmawan Muhammad Hafiz Amrullah Muhammad Zuhairi Nasution, Muhammad Surya Alghifary Niken Dwi Wahyu Cahyani Nuha, Hilal H Nurislami, Rifky Nudhar Nurul Ikhsan Nyoman Bogi Aditya Karna Parulian, Christian Antonius Puji Dwika Pradana Putri Ayu Rezeki Raffinaldy, Muhammad Zaky Rendy Munadi Retno Hendryanti Reza Rendian Septiawan Ridha Muldina Negara Rissa Mellani Nur Wulandari Rizky, Muhamad Wildan Salma Salma Saputra, Maulana Reza Sitepu, Dharma Agung Sofia Naning Hertiana Sri Astuti Subagyo, Lutfi Bramantio Sussi Syamsul Rizal Tarigan , Jesikapna Kristina Br Umar Ali Ahmad Vicha Octavia Dewanto Putri Wardana, Fareza Arya Winda Ezranata Putri ZK Abdurahman Baizal