Claim Missing Document
Check
Articles

Found 19 Documents
Search

Sybil Attack Prediction on Vehicle Network Using Deep Learning Zulfahmi Helmi; Ramzi Adriman; Teuku Yuliar Arif; Hubbul Walidainy; Maya Fitria
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (434.315 KB) | DOI: 10.29207/resti.v6i3.4089

Abstract

Vehicular Ad Hoc Network (VANET) or vehicle network is a technology developed for autonomous vehicles in Intelligent Transportation Systems (ITS). The communication system of VANET is using a wireless network that is potentially being attacked. The Sybil attack is one of the attacks that occur by broadcasting spurious information to the nodes in the network and could cause a crippled network. The Sybil strikes the network by camouflaging themselves as a node and providing false information to nearby nodes. This study is conducted to predict the Sybil attack by analyzing the attack pattern using a deep learning algorithm. The variables exerted in this research are time, location, and traffic density. By implementing a deep learning algorithm enacting the Sybil attack pattern and combining several variables, such as time, position, and traffic density, it reaches 94% of detected Sybil attacks.
Peningkatan Sistem Keamanan Autentikasi Single Sign On (SSO) Menggunakan Algoritma AES dan One-Time Password Studi Kasus: SSO Universitas Ubudiyah Indonesia Zuhar Musliyana; Teuku Yuliar Arif; Rizal Munadi
Jurnal Rekayasa Elektrika Vol 12, No 1 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2314.546 KB) | DOI: 10.17529/jre.v12i1.2896

Abstract

Single Sign On (SSO) merupakan model autentikasi independen yang diimplementasikan Universitas Ubudiyah Indonesia (UUI) menggunakan Message-Digest Algorithm 5 (MD5) dan web service NuSOAP berbasis bahasa pemograman PHP. Sistem ini berjalan pada protokol Hypertext Transfer Protocol (HTTP). Faktanya penggunaan protokol HTTP ini sangat rentan terhadap berbagai jenis serangan karena data dikirim dalam bentuk plaintext tanpa ada proses enkripsi dan penerapan algoritma MD5 pada autentikasi login juga rentan terhadap serangan dictionary attacks dan rainbow tables. Disisi lain, Penggunaan web service NuSOAP juga menciptakan celah keamanan karena pengiriman dan penerimaan payload tidak dienkripsi. Saat ini diketahui sudah ada beberapa metode yang dapat digunakan untuk meningkatkan pengamanan kerentanan tersebut diantaranya yaitu menggunakan Hypertext Transfer Protocol Secure (HTTPS), Secure Hypertext Transfer Protocol (SHTTP) dan Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA). Namun beberapa hasil penelitian terkait memperlihatkan masih terdapat beberapa kelemahan dari penggunaan HTTPS, SHTTP dan CAPTCHA. Penelitian ini mengusulkan penggunaan algoritma Advanced Encryption Standard (AES) dengan pembangkit kunci dinamis dan metode One-Time Password (OTP) berbasis sinkronisasi waktu dengan kombinasi salt untuk meningkatkan keamanan pada autentikasi SSO UUI. Hasil pengujian menunjukkan penerapan algoritma AES dan OTP  dapat mengamankan proses autentikasi SSO  dari serangan dictionary attack dan rainbow table.
Analisis TCP Cubic dan Simulasi untuk Menentukan Parameter Congestion Window dan Throughput Optimal pada Jaringan Nirkabel Ad Hoc Ary Firnanda; Teuku Yuliar Arif; Syahrial Syahrial
Jurnal Rekayasa Elektrika Vol 13, No 2 (2017)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (677.865 KB) | DOI: 10.17529/jre.v13i2.4874

Abstract

Ad hoc wireless network performance often declines caused the onset of congestion on the process of sending data. TCP Congestion Control used to solve these problems. TCP Cubic is one variant TCP Congestion Control. This research was conducted with the test and compare between variable value b=0.2 with the value of the variable b to be used in ad hoc wireless networks. This research was conducted with the experimental method using network simulation software NS-3. The results showed that the value of variable b is the right on ad hoc wireless network with packet loss by 5% to generate optimal congestion window max is b=0.5 and the average throughput optimal is b=0.1
Perancangan dan Penerapan Algoritme 4DES (Studi Kasus Pada Keamanan Berkas Rekam Medis) Yeni Yanti; Teuku Yuliar Arif; Rizal Munadi
Jurnal Rekayasa Elektrika Vol 12, No 3 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2303.152 KB) | DOI: 10.17529/jre.v12i3.3271

Abstract

Information is necessary for life because everything can not be done properly in the absence of information. The security problem is one of the most crucial aspects of a file containing sensitive information, for example, medical record files. Often, the file owner, designer, and manager of the information systems pay less attention to the security issues. One way to anticipate this is by using a cryptographic method, which is the science and art to keep the message security. This study aimed to evaluate the performance analysis and building a security system prototype of medical record files using the 4DES algorithm. The 4DES algorithm is a variant of the 3DES algorithm that is more robust and capable of protecting information properly. The 4DES security system has four keys; each key has a key length of 64 bits so that the total length of four keys is 256 bits and K1≠K2≠K3≠K4. The encrypted / decrypted files (Word, Excel, and Image)  using an external key of minimum eight characters (64 bits). During encryption, there was an addition of padding bytes in each of data block size to minimalized attack from the attacker using a CBC operation mode process. Results showed that the processing speed of the encrypted files using the 4DES was 1 second faster than that of using the 3DES algorithm. Also, the 4DES algorithm has superiority regarding of file safety, which has time enduring 3.45 x1056years longer to brute force attack technique which able to discover text file and the secret key.
Kombinasi Waktu Sinkronisasi dan Nilai Salt untuk Peningkatan Keamanan pada Single Sign-On Rizal Munadi; Zuhar Musliyana; Teuku Yuliar Arif; Afdhal; Syahrial
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1026.358 KB)

Abstract

Single sign-on (SSO) is a session authentication process that allows a user to login by using user registered identity and password in order to access appropriate applications. The authentication process takes the user in to login for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session. Its implementation will provide a reduction of password burden to access many applications for every login process. Ease of access through a single account needs to be addressed carefully to ensure the authentication credentials that are not scattered and known by others. Currently, there are several open source SSO authentication methods available. However, the use of existing authentication methods is still vulnerable to attack, such as Man-In-The-Middle. In this study, SSO authentication algorithm using One-Time Password (OTP) is proposed using a combination of time synchronization and salt value. These combinations are used to verify user session while accessing any application with SSO mechanism. The results show that the proposed OTP algorithm can handle SSO authentication process in good fashion and also protect from Man-In-The-Middle Attack.
Peningkatan Sistem Keamanan Autentikasi Single Sign On (SSO) Menggunakan Algoritma AES dan One-Time Password Studi Kasus: SSO Universitas Ubudiyah Indonesia Zuhar Musliyana; Teuku Yuliar Arif; Rizal Munadi
Jurnal Rekayasa Elektrika Vol 12, No 1 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v12i1.2896

Abstract

Single Sign On (SSO) merupakan model autentikasi independen yang diimplementasikan Universitas Ubudiyah Indonesia (UUI) menggunakan Message-Digest Algorithm 5 (MD5) dan web service NuSOAP berbasis bahasa pemograman PHP. Sistem ini berjalan pada protokol Hypertext Transfer Protocol (HTTP). Faktanya penggunaan protokol HTTP ini sangat rentan terhadap berbagai jenis serangan karena data dikirim dalam bentuk plaintext tanpa ada proses enkripsi dan penerapan algoritma MD5 pada autentikasi login juga rentan terhadap serangan dictionary attacks dan rainbow tables. Disisi lain, Penggunaan web service NuSOAP juga menciptakan celah keamanan karena pengiriman dan penerimaan payload tidak dienkripsi. Saat ini diketahui sudah ada beberapa metode yang dapat digunakan untuk meningkatkan pengamanan kerentanan tersebut diantaranya yaitu menggunakan Hypertext Transfer Protocol Secure (HTTPS), Secure Hypertext Transfer Protocol (SHTTP) dan Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA). Namun beberapa hasil penelitian terkait memperlihatkan masih terdapat beberapa kelemahan dari penggunaan HTTPS, SHTTP dan CAPTCHA. Penelitian ini mengusulkan penggunaan algoritma Advanced Encryption Standard (AES) dengan pembangkit kunci dinamis dan metode One-Time Password (OTP) berbasis sinkronisasi waktu dengan kombinasi salt untuk meningkatkan keamanan pada autentikasi SSO UUI. Hasil pengujian menunjukkan penerapan algoritma AES dan OTP  dapat mengamankan proses autentikasi SSO  dari serangan dictionary attack dan rainbow table.
Analisis TCP Cubic dan Simulasi untuk Menentukan Parameter Congestion Window dan Throughput Optimal pada Jaringan Nirkabel Ad Hoc Ary Firnanda; Teuku Yuliar Arif; Syahrial Syahrial
Jurnal Rekayasa Elektrika Vol 13, No 2 (2017)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v13i2.4874

Abstract

Ad hoc wireless network performance often declines caused the onset of congestion on the process of sending data. TCP Congestion Control used to solve these problems. TCP Cubic is one variant TCP Congestion Control. This research was conducted with the test and compare between variable value b=0.2 with the value of the variable b to be used in ad hoc wireless networks. This research was conducted with the experimental method using network simulation software NS-3. The results showed that the value of variable b is the right on ad hoc wireless network with packet loss by 5% to generate optimal congestion window max is b=0.5 and the average throughput optimal is b=0.1
IoT based System for Air Pollution Monitoring in Banda Aceh Roslidar Roslidar; Karnaini Karnaini; Teuku Yuliar Arif
Jurnal Rekayasa Elektrika Vol 19, No 3 (2023)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v19i3.28686

Abstract

Air pollution is a factor that affects the clear skies and breathable air of the city. Humans cannot directly quantify the changes in air quality; hence we need a technological tool to detect the changes in air quality around them. This study proposed a prototype to monitor air quality using embedded system hardware of Arduino Uno-R4 and ESP8266. A Thingspeak database is used as a platform for data communication between smartphones and sensors in real time. The data is retrieved once every 15 seconds. In this prototype, the Arduino Uno-R3 is used as the main brain of the system to connect to WiFi communication via ESP8266 and to four (4) sensors, namely CO (MQ-7), CO2 (MQ-9), dust (PM10), and DHT22 (temperature and humidity). The developed prototype is portable and has low power consumption. Several testing locations have been identified to monitor the air pollution; (1) Simpang Lima Intersection and (2) Jeulingke Bus Stop in Banda Aceh. The system performance shows the connectivity between devices has only a delay of ± 1.1 seconds; therefore, the system is suitable for real-time usage.
Perancangan dan Penerapan Algoritme 4DES (Studi Kasus Pada Keamanan Berkas Rekam Medis) Yeni Yanti; Teuku Yuliar Arif; Rizal Munadi
Jurnal Rekayasa Elektrika Vol 12, No 3 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v12i3.3271

Abstract

Information is necessary for life because everything can not be done properly in the absence of information. The security problem is one of the most crucial aspects of a file containing sensitive information, for example, medical record files. Often, the file owner, designer, and manager of the information systems pay less attention to the security issues. One way to anticipate this is by using a cryptographic method, which is the science and art to keep the message security. This study aimed to evaluate the performance analysis and building a security system prototype of medical record files using the 4DES algorithm. The 4DES algorithm is a variant of the 3DES algorithm that is more robust and capable of protecting information properly. The 4DES security system has four keys; each key has a key length of 64 bits so that the total length of four keys is 256 bits and K1≠K2≠K3≠K4. The encrypted / decrypted files (Word, Excel, and Image)  using an external key of minimum eight characters (64 bits). During encryption, there was an addition of padding bytes in each of data block size to minimalized attack from the attacker using a CBC operation mode process. Results showed that the processing speed of the encrypted files using the 4DES was 1 second faster than that of using the 3DES algorithm. Also, the 4DES algorithm has superiority regarding of file safety, which has time enduring 3.45 x1056years longer to brute force attack technique which able to discover text file and the secret key.