Claim Missing Document
Check
Articles

Found 33 Documents
Search

Implementation of Event-Based Dynamic Authentication on MQTT Protocol Rizka Reza Pahlevi; Parman Sukarno; Bayu Erfianto
Jurnal Rekayasa Elektrika Vol 15, No 2 (2019)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (734.611 KB) | DOI: 10.17529/jre.v15i2.13963

Abstract

This paper proposes an authentication mechanism on the MQ Telemetry Transport (MQTT) protocol. The exchange of data in the IoT system became an important activity. The MQTT protocol is a fast and lightweight communication protocol for IoT. One of the problems with the MQTT protocol is that there is no security mechanism in the initial setup. One security attack may occur during the client registration phase. The client registration phase has a vulnerability to accept false clients due to the absence of an authentication mechanism. An authentication mechanism has been previously made using Transport Layer Security (TLS). However, the TLS mechanism consumes more than 100 KB of data memory and is not suitable for devices that have limitations. Therefore, a suitable authentication mechanism for constraint devices is required. This paper proposes a protocol for authentication mechanisms using dynamic and event-based authentication for the MQTT protocol. The eventbased is used to reduce the computing burden of constraint devices. Dynamic usage is intended to provide different authentication properties for each session so that it can improve authentication security. As results, the applied of the event-based dynamic authentication protocol was successful in the constraint devices of  microcontrollers and broker. The microcontroller, as a client, is able to process the proposed protocol. The client uses 52% of the memory for the proposed protocol and only consumes 2% higher than the protocol without security. The broker can find authentic clients and constraint devices capable of computing to carry out mutual authentication processes to clients. The broker uses a maximum of 4.3 MB of real memory and a maximum CPU usage of 3.7%.
Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare Rizka Reza Pahlevi; Parman Sukarno; Bayu Erfianto
Jurnal Rekayasa Elektrika Vol 17, No 2 (2021)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (497.867 KB) | DOI: 10.17529/jre.v17i2.20428

Abstract

Replay and eavesdropping attacks threaten the information security that is held by smart healthcare devices. An authenticated key exchange method to provide cryptography sessions is the best way to provide information security and secure authentication. However, smart healthcare devices do not have sufficient computation to perform heavy cryptography processes due to the limitations of the embedded devices used. We propose an authenticated key exchange protocol based on a physical unclonable function (PUF). The proposed protocol aimed to countermeasure from replay and eavesdropping attacks. We designed our protocol with one handshake process and three authentication processes. We evaluated our proposed protocol using Tamarin Prover. From the results of the evaluation, our proposed protocol can exchange properties correctly between communication actors and is valid in proving each lemma in eavesdropping and replay attacks.
Implementasi Fuzzy Logic Control pada Pelacakan Panel Surya Angga Juliat Saputra; Bayu Erfianto; Mas'ud Adhi Saputra; SIDIK Prabowo; Novian Anggis Suwastika
Jurnal Teknologi Bahan dan Barang Teknik Vol 9, No 1 (2019)
Publisher : Balai Besar Bahan dan Barang Teknik

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (574.256 KB) | DOI: 10.37209/jtbbt.v9i1.107

Abstract

A dynamic solar panel equipped with a fuzzy-method tracking system has been developed to improve its performance. In this solar panel with tracking system, the voltage and current of the solar panels were used as inputs for the fuzzy algorithms. From observations for seven days, dynamic and static solar panels produced the highest voltage of 21.65 V and 20.13 V, as well the highest current of 0.58 A and 0.54 A respectively. Dynamic solar panel could produce an average voltage of 19% and an average current of 16% higher than static solar panels. The length time of battery charging on a dynamic solar panel was one hour shorter than that of static solar panel.Panel surya dinamis yang dilengkapi sistem pelacakan dengan metoda fuzzy telah dikembangkan untuk meningkatkan kinerjanya. Dalam panel surya dengan sistem pelacakan ini, tegangan dan arus dari panel surya digunakan sebagai input untuk fuzzy algorithms. Dari pengamatan selama tujuh hari, panel surya dinamis dan statis menghasilkan berturut-turut tegangan tertinggi 21,65 V dan 20,13 V, serta arus 0,58 A dan 0,54 A. Panel surya dinamis dapat menghasilkan tegangan rata-rata 19% dan arus rata-rata 16% lebih tinggi daripada panel surya statis. Lama waktu pengisian baterai pada panel surya dinamis satu jam lebih singkat daripada panel surya statis.
Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare Rizka Reza Pahlevi; Parman Sukarno; Bayu Erfianto
Jurnal Rekayasa Elektrika Vol 17, No 2 (2021)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v17i2.20428

Abstract

Replay and eavesdropping attacks threaten the information security that is held by smart healthcare devices. An authenticated key exchange method to provide cryptography sessions is the best way to provide information security and secure authentication. However, smart healthcare devices do not have sufficient computation to perform heavy cryptography processes due to the limitations of the embedded devices used. We propose an authenticated key exchange protocol based on a physical unclonable function (PUF). The proposed protocol aimed to countermeasure from replay and eavesdropping attacks. We designed our protocol with one handshake process and three authentication processes. We evaluated our proposed protocol using Tamarin Prover. From the results of the evaluation, our proposed protocol can exchange properties correctly between communication actors and is valid in proving each lemma in eavesdropping and replay attacks.
Implementation of Event-Based Dynamic Authentication on MQTT Protocol Rizka Reza Pahlevi; Parman Sukarno; Bayu Erfianto
Jurnal Rekayasa Elektrika Vol 15, No 2 (2019)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v15i2.13963

Abstract

This paper proposes an authentication mechanism on the MQ Telemetry Transport (MQTT) protocol. The exchange of data in the IoT system became an important activity. The MQTT protocol is a fast and lightweight communication protocol for IoT. One of the problems with the MQTT protocol is that there is no security mechanism in the initial setup. One security attack may occur during the client registration phase. The client registration phase has a vulnerability to accept false clients due to the absence of an authentication mechanism. An authentication mechanism has been previously made using Transport Layer Security (TLS). However, the TLS mechanism consumes more than 100 KB of data memory and is not suitable for devices that have limitations. Therefore, a suitable authentication mechanism for constraint devices is required. This paper proposes a protocol for authentication mechanisms using dynamic and event-based authentication for the MQTT protocol. The eventbased is used to reduce the computing burden of constraint devices. Dynamic usage is intended to provide different authentication properties for each session so that it can improve authentication security. As results, the applied of the event-based dynamic authentication protocol was successful in the constraint devices of  microcontrollers and broker. The microcontroller, as a client, is able to process the proposed protocol. The client uses 52% of the memory for the proposed protocol and only consumes 2% higher than the protocol without security. The broker can find authentic clients and constraint devices capable of computing to carry out mutual authentication processes to clients. The broker uses a maximum of 4.3 MB of real memory and a maximum CPU usage of 3.7%.
INFRAMAP WEBGIS SEBAGAI SOLUSI PEMETAAN INFRASTRUKTUR DI KABUPATEN MAJALENGKA MENGGUNAKAN APLIKASI FITUR PETA Bayu Erfianto; Ilhamdaniah Ilhamdaniah; Vera Juntriesta; Monterico Adrian
Jurnal Sinergitas PKM & CSR Vol 7, No 3 (2023): DECEMBER
Publisher : Universitas Pelita Harapan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19166/jspc.v7i3.7772

Abstract

Pemerintah Daerah Kabupaten Majalengka telah berusaha untuk membangun sistem informasi spasial yang menampilkan data infrastruktur di Kabupaten Majalengka. Namun hingga saat ini, pengelolaan data dan informasi spasial yang dilaksanakan pemerintah maupun swasta masih dilakukan secara parsial sesuai dengan kebutuhan dan kebijakan masing-masing. Akibatnya adalah daya guna data dan informasi spasial tersebut terbatas pada instansi masing-masing dan sekaligus membatasi pemanfaatannya bagi masyarakat atau investor swasta.  Kondisi saat ini Pemda Kabupaten Majalengka telah mempunyai portal/web yang menampilkan data dan informasi pembangunan, namun informasinya masih secara parsial.  Sebagai solusi untuk mengatasi permasalahan tersebut, beberapa staf dosen dari Telkom University dan Universitas Pendidikan bekerjasama dengan BAPPEDALITBANG Kabupaten Majalengka telah membangun InfraWeb, yaitu suatu aplikasi WebGIS untuk menampilkan informasi secara spasial tentang pengelolaan data infrastruktur dan kewilayahan Kabupaten Majalengka. InfraWeb dapat diakses melalui Internet dan terintegrasi dengan portal pemerintah daerah yang ada saat ini. InfraWeb didesain untuk mengelola dan menyajikan data dan informasi mengenai infrastruktur di Kabupaten Majalengka dengan fitur tematik seperti irigasi, jalan dan jembatan, fasilitas Pendidikan, dll. Dengan demikian, setiap dinas / instansi memungkinkan untuk memperbaharui informasi melalui peta spasial sesuai tema secara independen tanpa menggangu sistem informasi peta spasial secara keseluruhan. Data spasial yang ada juga dapat dipergunakan oleh antar instansi yang terkait untuk keperluan pendataan, pembangunan, pemeliharaan atas asset dan potensi daerah.
Accuracy Improvement for Indoor Positioning Using Decawave on ESP32 UWB Pro with Display and Regression Hapsari, Gita Indah; Munadi, Rendy; Erfianto, Bayu; Irawati, Indrarini Dyah
Journal of Robotics and Control (JRC) Vol 5, No 3 (2024)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v5i3.20825

Abstract

In UWB-based indoor positioning, it is important to observe the ranging performance of the UWB module to prevent positioning errors. Ranging is the initial process in computing positioning. This research aims to observe the ranging accuracy and precision of the ESP32 UWB Pro with a Display module and analyze its performance in indoor positioning using TDoA and Trilateration. The ranging method was held using the SS-TWR which is the basic ranging used generally in UWB. ESP32 Pro is a module consisting of ESP32 and OLED display which is integrated with Decawave DW 1000. Analysis of 6750 ranging error data is carried out to determine the appropriate method to increase accuracy. The convergence of error ranges that occur leads to the use of regression as an error mitigation method for Decawave on the ESP32 UWB Pro with Display module. Increasing the accuracy of ranging regression can reduce the error from MAE of 79.98cm to only 5.05cm. It’s applied to positioning to obtain the accuracy and precision performance of the TDoA and Trilateration positioning.  The resulting MAE values are 7.47cm for X and 10.49cm for Y in TDoA Positioning. Meanwhile, in Trilateration, the MAE was 8.15cm for X and 8.47cm for Y. Our findings indicate that an increase in ranging accuracy with regression had an impact on positioning accuracy. However, the spread of error positioning shows that it’s still weak in precision.
Video Extraction Into PPG Signal To Identify Blood Pressure With XGBoost Method Adhan Mulya Rahmawan; Bedy Purnama; Bayu Erfianto
Indonesia Journal on Computing (Indo-JC) Vol. 9 No. 2 (2024): August, 2024
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2024.9.2.942

Abstract

Abstract
The Application Of Multi-Sensor Data Fusion Method with Fuzzy Time Series Model to Improve Indoor Water Prediction Accuracy Quality Khoiri, Isfa' Bil; Erfianto, Bayu
Building of Informatics, Technology and Science (BITS) Vol 4 No 4 (2023): March 2023
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i4.3082

Abstract

There is a lot of indoor air pollution, especially from cigarette smoke, wall paint, air fresheners and gas. With this situation, the room uses Air Box WP6003 air quality detection device by transmitting information about air quality through visualization index. This study aims to improve prediction accuracy with fuzzy time series methods processed through 2 naïve and moving average models using forecast transformers and without transformers. The level of prediction accuracy is calculated through several metrics, namely Mean Absolute Percentage Error (MAPE), Sum of Squares Error (SSE), Mean Square Error (MSE), Root Mean Square Error (RMSE) and Mean Absolute Error (MAE). These results can be calculated between the actual value and the predicted value. The data used is 204584 data from 4 parameters including Temperature, TVOC, HCHO and CO2. The test results with the difference from the forecast transformer and without transformer are comparable. Temperature value obtained using naïve with transformer from RMSE of 0.158866 and naïve without transformer of 0.782397, data using moving average with transformer obtained by 0.147546 and moving average without transformer of 0.772570. This can be explained by the error analysis that was tried, where the error rate continued to increase so that the experimental results continued to be far from the actual number. From the test results it can be concluded that the accuracy of air quality prediction using naïve forecast transformer is pretty accurate.
The Anomaly Detection in Time Series Data of VOC (Volatile Organic Compound) To Generate Indoor Air Quality Alerts Nusantara, Hadi Dharma; Erfianto, Bayu
Building of Informatics, Technology and Science (BITS) Vol 4 No 4 (2023): March 2023
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Indoor air quality is a very important factor and needs to be considered for health. Poor indoor air quality can trigger illness, reduce productivity, and disrupt the comfort of people in the space. In residential areas, hospitals, schools, nursing homes and other specialized environments, indoor air pollution can affect groups that are more vulnerable to health problems due to their health conditions or age. This research aims to predict indoor air quality using the Long Short-Term Memory (LSTM) method and provide alerts when the prediction results exceed a predetermined limit. The accuracy level is measured using Mean Absolute Percentage Error (MAPE) by calculating the difference between the original data and the prediction results. In this study, a system was created that utilizes Internet of Things (IoT) technology that can monitor the state of indoor air quality such as temperature, TVOC, CO2 and HCHO gas levels. The system uses the WP6003 Air Box Reader tool as an indoor air quality detector that is connected to the website created. This website can display data that is being recorded, download datasets that have been recorded, visualize predictions of temperature, TVOC, CO2 and HCHO and notify if any data crosses a predetermined limit. The results obtained are quite good prediction accuracy by getting a MAPE value of 0.30452, RMSE 0.023475 and the average value of the test data is 24.035 which means that if the RMSE value is close to 0, the prediction results will be more accurate. Anomalies result in values of room temperature and HCHO that are above normal limits.