Claim Missing Document
Check
Articles

Tinjauan Ancaman dan Solusi Keamanan pada Teknologi Internet of Things Warsun Najib; Selo Sulistyo; Widyawan
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 9 No 4: November 2020
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1423.089 KB) | DOI: 10.22146/jnteti.v9i4.539

Abstract

Internet of Things (IoT) is a well-known technology globally, which helps to connect things such as sensors, vehicles, hospital-instruments, industries, and consumer-goods through the internet. Compact smart devices constitute an essential part of IoT. They range widely in use, size, computing resources, and memory. However, integrating these intelligent things into the internet introduces several security challenges, because most internet technologies and communication protocols were not designed specifically to support IoT. Moreover, IoT's commercialization has led to public security concerns, including personal privacy issues, threats of cyberattacks, and organized crime. This review aims to provide a comprehensive list of IoT vulnerabilities and counter-measures against them. To achieve this goal, we first describe three widely-known IoT reference models and define security in the context of IoT. Second, we discuss the potential motivations of the attackers who target this technology. Third, we discuss different attacks and threats. Fourth, we describe possible countermeasures against these attacks. Finally, we describe emerging security challenges in IoT system.
Data Benchmark pada Google BigQuery dan Elasticsearch Nisrina Akbar Rizky Putri; Widyawan; Teguh Bharata Adji
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 10 No 3: Agustus 2021
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1334.058 KB) | DOI: 10.22146/jnteti.v10i3.1745

Abstract

Nowadays,the cloud is not only a data storage medium but can be used as a medium for managing or analyzing data. Google offers Google BigQueryas a platform capable of managing and analyzing data,while Elasticsearch itself is a search and analysis engine that can be used to analyze data using Kibana. Using a dataset in the form of tweets crawled through http://netlytic.org/,containing the hashtags #COVID19 and #coronavirus, the data will be analyzed and used to compare its performance with benchmarks. Benchmark is a process used to measure and compare performance against an activity so that the desired level of performance is achieved. Data benchmark is performed on both platforms to generate or determine the workload of the platforms. The result obtained in this study is that Google BigQueryhas superior results, both from the upload container for larger datasets than Elasticsearch and with two query testing models.The query management time on Google BigQueryis also shorter and faster than Elasticsearch. Meanwhile, the visualization results from these two platforms have the same percentage amount.
Rancang Bangun Identity and Access Management IoT Berbasis KSI dan Permissioned Blockchain Guntur Dharma Putra; Sujoko Sumaryono; Widyawan Widyawan
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 7 No 4: November 2018
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1118.359 KB)

Abstract

Blockchain offers several technological break-throughs, ranging from monetary solutions to healthcare systems. Some approaches have proposed blockchain implementation in IoT for providing better performance and scalability. However, massive scale implementation of IoT devices suffers from several issues in identity and access managements of interconnected devices. The present study proposes the combination of permissioned blockchain and Keyless Signature Infrastructure (KSI) as a means of governing the identity and access management of IoT devices. KSI is known for its ability to offer digital signature services without the need of public or private key but hash trees updated in a regular basis. With the decentralization fashion of blockchain, KSI can be implemented more efficiently. The results may give an identity and access management with high scalability.
Sistem Pendukung Keputusan Penerimaan Mahasiswa Baru dengan FAM (Studi Kasus : Politeknik Indramayu) Munengsih Sari Bunga; Widyawan
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 4 No 4: November 2015
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (365.213 KB)

Abstract

Polytechnic Indramayu is a new Polytechnic established by the District Government of Indramayu based on the Decree of the National Education Minister of Republik Indonesia Number 124/D/O/2008 and District Local Regulation of Indramayu No.5 of 2008. In accordance with its mission to prepare graduates who are competent in their field, the selection process is required to capture prospective students and to prepare their ability to compete in the global market. The selection process is conducted based on several criteria including the score of test entrance, highschool certificate, academic and non-academic achievement, age, and parental income for determining who will be accepted as a student. Issues to be resolved through this thesis is how to design a web-based decision support systems and sms using Fuzzy Associative Memory (FAM) to determine who will be accepted as a student at Polytechnic Indramayu by grouping data into two categories of new students, accepted or not accepted. SMS Gateway in this study only run the process of sending data information of students who are accepted as a new student. Test is conducted using 20 samples of student data. The number of 20 applicants can be processed by decision support systems that are made and the announcement of the results of entrance examinations and the results of new admissions can be done more quickly in about one week.
Pedestrian Dead Reckoning pada Ponsel Cerdas sebagai Sistem Penentuan Posisi dalam Ruangan Azkario Rizky Pratama; Widyawan
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 2 No 3: Agustus 2013
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (401.619 KB)

Abstract

Nowadays, personal positioning systems are more necessary to build many location-based services. Pedestrian Dead Reckoning (PDR), which is a pedestrian positioning technique using the accelerometer sensor to recognize pattern of steps, is an alternative method that has advantages in terms of infrastructure-independent. However, the variation of walking pattern on each individual will make some difficulties for the system to detect displacement. This is really interested authors to develop a sensor-based positioning system that applied generally to all individuals. In the test, 15 test subjects was taken with the distance of each 10m, 20m and 30m. Experiment begins with the feasibility test of accelerometer sensor. In this work, a smartphone with average sampling rate 63.79 Hz and standard deviation of 1.293 is used to records the acceleration. Then, the acceleration data are analyzed to detect step and to estimate the travelled distance using several methods. Detection of steps are able to make an average error of 2.925%, while the most nearly correct displacement estimation is using Scarlet experimental method which is make a distance average error of 1.39metres at all the traveled distance.
Analisis Kinerja Reactive Routing Protocol dalam Mobile Ad-Hoc Network (MANET) Menggunakan NS-2 (Network simulator) Olivia Kembuan; Widyawan; Sri Suning Kusumawardani
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 1 No 1: Februari 2012
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (444.236 KB) | DOI: 10.22146/jnteti.v1i1.1

Abstract

Mobile Ad-Hoc Network (MANET) is the type of network that can connect people without depending on fixed infrastructure. Dynamic topology that characterizes this network leads to different routing process compared to wired-network with fixed topology. The two main classes of routing protocols for mobile ad-hoc networks (MANETs) are proactive and reactive (or on-demand). Reactive routing protocols consume less bandwidth compared to proactive routing protocols because they establish the route on demand. This thesis presents the simulation results and performance analysis of reactive routing protocol Dynamic Source Routing (DSR) and Ad Hoc On-demand distance Vector Routing (AODV). The analysis is based on packet delivery ratio, routing overhead, average delay, and averagethroughput by varying the number of nodes and speed of nodes. The simulation is performed using NS2 network simulator. The results show that AODV outperforms DSR in more stress situations, however DSR outperforms AODV in less stressful situations (smaller number of nodes and lower speed of nodes). DSR produces higher delay in all scenarios, therefore this protocol not recommended for MANET with the need for low delay.
Unjuk Kerja Routing Protocol OLSR Pada Wireless Mesh Network Berbasis Standar IEEE 802.11b/g Ari Primaned; Widyawan; Sri Suning Kusumawardani
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 1 No 1: Februari 2012
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (64.503 KB) | DOI: 10.22146/jnteti.v1i1.2

Abstract

WMN merupakan model jaringan komunikasi yang menggabungkan teknologi wireless dan routing ad-hoc yang membentuk sebuah topologi mesh. Optimized Link State Routing Protocol (OLSR) merupakan salah satu routing protocol yang digunakan untuk jaringan ad-hoc agar setiap wireless router yang terhubung dalam jaringan dapat melakukan komunikasi dan menghasilkan jaringan dengan jangkauan yang luas. Tujuan penelitian ini adalah melakukan analisis terhadap kinerja yang dihasilkan oleh testbed WMN dengan menggunakan routing protocol OLSR.Untuk mengetahui kinerja dari WMN, dilakukan pengukuran parameter throughput, latency, jitter, dan packet loss pada tesbed WMN yang dibangun menggunakan lima buah wireless router Linksys WRT54GL dengan firmware OpenWRT Freifunk pada lantai 1 Gedung KPTU Fakultas Teknik, Universitas Gadjah Mada.Hasil analisis pada testbed WMN tersebut adalah sebagai berikut; nilai throughput pada singlehop 988.48 Kbps dan pada multihop 78.952 Kbps, nilai latency berkisar antara 0.5 ms – 7.15 ms, nilai jitter pada singlehop 16.3931 ms dan pada multihop 105.5513 ms, nilai packet loss pada singlehop 2.06 % dan pada multihop 33.3 %.
Pengembangan Virtual Appliance Server Dengan Metode Virtualisasi Novan Ardianto; Widyawan; Sujoko Sumaryono
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 1 No 1: Februari 2012
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (448.225 KB) | DOI: 10.22146/jnteti.v1i1.4

Abstract

With the increasing of advanced and sophisticated computer technology currently, especially for PC and server, is marked by the appearance of dual core processor, quad core processor, even hexa core processor. Besides all applications currently, especially not 3D animation and games which utilize the maximum performance of the multicore processor, makes the advanced processor work with a low utilization rate or a little usage of this processor. The advanced processor can be used for running application and services virtually.Virtualization can be seen as a part of whole IT company trend currently. Day by day the virtualization engineering become more popular and widely used because in addition tosaving the power source, it can have a good performance at running various server services in a network. Even nowadays virtualization can run on a cluster infrastructure, which will produce HA (High Availability) server.By using applications, such as VirtualBox and Proxmox, which are very powerful tools, easily-setting and especially free, virtual appliances can be made including functions and services of a server in the real network. It aims to prove how effective and efficient the usage of the multicore processor computer is.
Performance Improvement Using CNN for Sentiment Analysis Moch. Ari Nasichuddin; Teguh Bharata Adji; Widyawan Widyawan
IJITEE (International Journal of Information Technology and Electrical Engineering) Vol 2, No 1 (2018): March 2018
Publisher : Department of Electrical Engineering and Information Technology,Faculty of Engineering UGM

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1136.606 KB) | DOI: 10.22146/ijitee.36642

Abstract

The approach using Deep Learning method provides great results in various field implementations, especially in the field of Sentiment Analysis. One of Deep Learning methods is CNN which has the ability to provide great accuracy in some previous research. However, there are some parts of the training process which can be improved to upgrade the accuracy level and the training time. In this paper, we try to improve the accuracy and processing time of sentiment analysis using CNN model. By tuning the filter size, frameworks, and pre-training, the results show that the use of smaller filter size and pre-training word2vec provide greater accuracy than some previous studies.
Development of Bot Detection Applications on Twitter Social Media Using Machine Learning with a Random Forest Classifier Algorithm Aqilah Aini Zahra; Widyawan Widyawan; Silmi Fauziati
IJITEE (International Journal of Information Technology and Electrical Engineering) Vol 4, No 2 (2020): June 2020
Publisher : Department of Electrical Engineering and Information Technology,Faculty of Engineering UGM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijitee.56154

Abstract

A Twitter bot is a Twitter account programmed to automatically do social activities by sending tweets through a scheduling program. Some bots intend to disseminate useful information such as earthquake and weather information. However, not a few bots have a negative influence, such as broadcasting false news, spam, or become a follower to increase an account's popularity. It can change public sentiments about an issue, decrease user confidence, or even change the social order. Therefore, an application is needed to distinguish between a bot and non-bot accounts. Based on these problems, this paper develops bot detection systems using machine learning for multiclass classification. These classes include human classes, informative, spammers, and fake followers. The model training used guided methods based on labeled training data. First, a dataset of 2,333 accounts was pre-processed to obtain 28 feature sets for classification. This feature set came from analysis of user profiles, temporal analysis, and analysis of tweets with numeric values. Afterward, the data was partitioned, normalized with scaling, and a random forest classifier algorithm was implemented on the data. After that, the features were reselected into 17 feature sets to obtain the highest accuracy achieved by the model. In the evaluation stage, bot detection models generated an accuracy of 96.79%, 97% precision, 96% recall, and an f-1 score of 96%. Therefore, the detection model was classified as having high accuracy. The bot detection model that had been completed was then implemented on the website and deployed to the cloud. In the end, this machine learning-based web application could be accessed and used by the public to detect Twitter bots.