Nico Surantha
Bina Nusantara University

Published : 8 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Bulletin of Electrical Engineering and Informatics

Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome IoT architecture Vincent Simadiputra; Nico Surantha
Bulletin of Electrical Engineering and Informatics Vol 10, No 2: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i2.2741

Abstract

Internet-of-Things or IoT technology becomes essential in everyday lives. The risk of security and privacy towards IoT devices, especially smarthomes IoT gateway device, becoming apparent as IoT technology progressed. The need for affordable, secure smarthome gateway device or router that smarthome user prefer. The problem of low-performance smarthome gateways was running security programs on top of smarthome gateway programs. This problem motivates the researcher designing a secure and efficient smarthome gateway using Raspberry Pi hardware as an affordable smarthome gateway device and able to run both smarthome gateways and security programs. In this research, researchers implemented snort as intrusion detection system (IDS), openHab as IoT gateway applications, and well-known encryption algorithms for file encryption in Raspberry PI 3B+ model. The researcher evaluated Snort capability on network attacks and compared each of the well-known encryption algorithm efficiency. From the result, we found Rasefiberry customized snort configuration for Raspberry pi 60 percent of the simulated network attacks. Twofish encryption algorithms were found to have best encryption time, throughput, and power consumption compared to other encryption algorithms in the research. Rasefiberry architecture successfully processes both lightweight security programs and Openhab smarthome gateway programs with a lowperformance computing device such as Raspberry Pi.
Smart and real-time door lock system for an elderly user based on face recognition Rezki Saputra; Nico Surantha
Bulletin of Electrical Engineering and Informatics Vol 10, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i3.2955

Abstract

Many sophisticated smart door lock systems have been made. Still, most of them required the user to use an additional device such as a smartphone, tag, smartcard, or accessing some user interfaces, which is complicated to use for inexperienced elderly. This condition creates a gap between the elderly and technology which makes it difficult for the elderly to accept and use the technology. In this paper, we proposed a smart and real-time door lock system for an elderly user based on local binary pattern histogram as a face recognition algorithm with modular system architecture design. The novelty in our proposed system design, it does not require any additional device, it does not use any user interface, and the least user participation by automating the processes. All the user needs to do just walk toward the door and stand in front of it and the door will automatically unlock and locked back after the user enters the house and close the door. The system resulted in an accuracy of 98%, with an average processing time is 1.449 seconds for the entire process. Additional advantages, the system is designed with a modular approach that makes it flexible and scalable for further development.
Risk assessment in fleet management system using OCTAVE allegro Salman Alfarisi; Nico Surantha
Bulletin of Electrical Engineering and Informatics Vol 11, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i1.3241

Abstract

The purpose of this study is to use the OCTAVE allegro methodology to identify risks in fleet management system (FMS), determine prioritized risks to be mitigated, provide mitigation recommendations for these prioritized risks, and shows how effective the recommendation is. The result of this study is expected to become an input for FMS service provider of possible risks in FMS services, and risk mitigation approaches that can be used to handle those risks. This risk assessment has successfully identified 6 critical information assets, 10 risks in total, and 4 risks that need to be mitigated, followed by proposed mitigation approaches for those risks. Some of the recommendation has been applied by the company and contribute to SLA achievement of the system. The result also showed that application and simulation software provide most prominent risks in FMS service, thus securing these two will eliminate most risk in FMS service.
A case analysis for Kubernetes network security of financial service industry in Indonesia using zero trust model Nico Surantha; Felix Ivan; Ritchie Chandra
Bulletin of Electrical Engineering and Informatics Vol 12, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i5.4240

Abstract

In this study, a case analysis of Kubernetes application in an enterprise providing financial services in Indonesia is presented. It is implemented to improve their digital services-based application, developed using micro-services architecture. Kubernetes, an application container technology, has been applied in the enterprise providing financial services in Indonesia to improve their digital services-based application, developed using micro-services architecture concepts. Without incorporating any additional hardware, the new technology and services have been adopted to existing virtualized resources of the enterprise. An infrastructure design for secure Kubernetes networking was built and has been studied using the data center provided by the enterprise. This study focuses on two important aspects: network and security. As a security guideline, the network recommendations from VMware, Cisco, and Forrester’s zero trust model were employed to design the infrastructure and were evaluated. The proposed secure network infrastructure design is successfully applied in the container networks using the zero trust requirement, the enterprise’s requirements, and constraints. And we hope this study about network design security can be used and adaptable with existing network and reduce risk and disruption to the business caused by the network.