Claim Missing Document
Check
Articles

Found 2 Documents
Search

Zero Knowledge Authentication Modification for Drone and Server Communication Security Choirun Nisa; Amang Sudarsono; Mike Yuliana
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol5.2021.1446.pp1019-1029

Abstract

Drones are now being used in various fields. One of the uses of drones is for delivery service. When delivering goods, the drone needs to report its condition while traveling to the server so that the server can monitor the drone and the server can give some commands to the drone. However, when the drone receives data from the server, there are many vulnerabilities it has against the attacker that can take control of the drone device. Taking control of the drone can occur if the attacker manages to send a script that can take over control of the drone. If the attacker can take control over the drone device, the attacker can steal the drone both physically or data of the drone. For this reason, in this study, we propose an authentication algorithm that can filter out who is allowed to send data to the system. The algorithm used is Zero-Knowledge Authentication. To improve the performance of the Zero-Knowledge Authentication algorithm in terms of authentication speed, we try to combine it with the secret key generated from the Secret Key Generation process. From the results of authentication testing, the effectiveness of the proposed algorithm after a Brute Force attack experiment is 100% for single attacker scenarios and for multiple attackers the effectiveness is 100% in LOS and NLOS conditions. Because drones have limited resources, the authentication time experiment is also performed and the result is that in all scenarios the time required to authenticate is in microseconds so that the proposed algorithm can be implemented on drones with limited resources.
Performance Enhancement of RSS-Based Secret Key Generation using Lightweight Minimal Bit Syndrome Reconciliation Method for IoT Devices Nisa, Choirun; M. Cahyo Kriswantoro
Telekontran : Jurnal Ilmiah Telekomunikasi, Kendali dan Elektronika Terapan Vol. 13 No. 2 (2025): TELEKONTRAN vol 13 no 2 Oktober 2025
Publisher : Program Studi Teknik Elektro, Fakultas Teknik dan Ilmu Komputer, Universitas Komputer Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/telekontran.v13i2.17658

Abstract

Secure communication in Internet of Things (IoT) devices can be improved through physical-layer secret key generation. In secret key generation, an information reconciliation process is required to match the bit sequences between the two communicating devices. However, this process often involves complex statistical computations that increase system overhead and require the transmission of bits over an insecure public channel. Therefore, this research presents a lightweight reconciliation algorithm based on minimal bit syndrome to reduce overhead and improve key security. The proposed method processes quantized Received Signal Strength (RSS)  values into 8-bit block syndrome-based reconciliation mechanism and only the 8-bit syndromes from mismatched block are transmitted over the public channel. System testing was conducted under both static and dynamic scenarios in an indoor area using Raspberry Pi nodes. The results show that the proposed scheme demonstrates an improvement in the Key Generation Rate (KGR) by 2.2% and reduces the processing time by 11.6% in dynamic scenario and 8.3% in the static scenario. Also, the proposed scheme reduce the quantization and reconciliation time by 50% compared to previous research. Furthermore, the proposed method maintained a Key Disagreement Rate (KDR) of 0% across all block size and successfully passed the NIST randomness and complexity test, with all test parameters achieving p-values above 0.01. These result indicate that the proposed scheme improve the performance of existing secret key generation methods and it is suitable for implementation in IoT devices.