Claim Missing Document
Check
Articles

Implementasi Mekanisme Mini Batch Pada Transmisi Data Elektrokardiografi (EKG) dari Internet of Things (IoT) Gateway Berbasis Perangkat Mobile Android ke Broker MQTT Dwiyan Ramadhan Dharmanzah; Adhitya Bhawiyuga; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 2 (2021): Februari 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Acquisition Electrocardiography (ECG) data using Internet of Things (IoT) technology frequently generate a lot of data that need to considered the quality of ECG data. ECG data has a chance to detect a disease like heart disease. Accordingly, ECG data need high rate of quality for not losing any data when send to any networks. Implementation BLE (Bluetooth Low Energy) is using to support acquisition ECG data from heart sensor to smartphone. ECG data that required are convert to mini-batch in pre-processing method. Formatting mini-batch is done by grouping ECG data from 130 data per second up to 650 data per five seconds and convert to JSON array. Mini-batch data are transmitting to MQTT broker using MQTT QoS level 2 protocol. The testing is done by measuring latency and success ratio from each transmitted data using mini-batch and not using mini-batch. The results of measuring latency using mini batch are maximum latency is 1518 ms, minimum latency is 423 ms and average latency start from 531 ms up to 663 ms. In other measuring test without mini batch are maximum latency is 3389 ms, minimum latency is 1330 ms, and average latency is 1938 ms. In other measuring latency, success ratio also measured and acquired rate of success ratio using mini batch and without mini batch are 100% and 4,261%.
Implementasi Mekanisme Carry and Forward Antar Broker MQTT pada Lingkungan dengan Konektivitas Tidak Stabil (Intermittent Connection) Dyah Ayu Ocky Mawardani; Adhitya Bhawiyuga; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 4 (2021): April 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Connecting internal system of IoT through internet can be done using MQTT protocol. MQTT was designed for application that required data collection accross constrained networks. However, its architecture doesn't support to handle mobility if the disconnected period takes longer time. It also has not been able to handle the problem of data delivery in intermittent connectivity environment. As a solution to handle such problem, this research focused on implementation carry and forward mechanism between MQTT brokers. The tests that were carried out include functionality, success rate, and delay between nodes. In functionality test, the functional requirements that have been designed, can be met by server and client. In success rate test, the results show the success rate of data delivery is 100%. The average delay between nodes from publisher 1 to local broker 32.63 seconds, local broker to broker agent 33.01 seconds and broker agent to subscribers 1, 2, and 3 respectively, 603181.91 seconds, 603201.15 seconds, and 603193.48 seconds. Then, from publisher 2 to local broker 78.31 seconds, local broker to broker agent 30.90 seconds and broker agent to subscriber 1, 2, and 3 respectively, 2118.80 seconds, 2110.62 seconds, and 2112.32 seconds. Last, from publisher 3 to local broker 78.55 seconds, local broker to agent broker 30.90 seconds and agent broker to subscribers 1, 2 and 3, respectively, 605302.96 seconds, 605313.72 seconds, and 605322.29 seconds.
Mitigasi Serangan Blackhole Pada Wireless Sensor Network Dengan Protokol Routing Aodv Menggunakan Algoritma Probabilitas Sequence Number Yanuar Alfianus Yosephan Raharjo; Dany Primanita Kartikasari; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 5 (2021): Mei 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Wireless Sensor Network (WSN) merupakan infrakstruktur jaringan yang dapat memudahkan dalam pemantauan pada sebuah objek. Penelitian ini menggunakan routing protocol AODV, protocol AODV memudahkan jaringan wireless sensor network dalam melakukan penentuan jalur pengiriman data secara mandiri. Protocol AODV memiliki kelemahan didalam pengiriman data. Blackhole attack dilakukan dengan mengirimkan paket RREP palsu ke dalam jaringan. Tujuannya untuk melakukan drop packet pada setiap pengiriman data antara source node dan destination node. Algoritma probabilitas sequence number merupakan mekanisme yang dapat digunakan untuk melakukan mitigasi blackhole attack pada jaringan wireless sensor network yang menggunakan protocol AODV. Mekanisme algoritma probabilitas sequence number dilakukan dengan cara memfilter sequence number sehingga hanya packet RREP asli yang dapat diterima oleh source node. Sequence number merupakan salah satu parameter yang terdapat pada paket RREQ dan RREP. Nilai parameter sequence number akan semakin bertambah setiap terdapat perubahan jalur yang digunakan. Hasil penelitian ini, algoritma probabilitas sequence number dapat memitigasi blackhole attack sebanyak 8 node dari 25 malicious node. Rata-rata packet loss sebesar 27,72 %. Rata-rata end to end delay sebesar 129.752 ms. Rata-rata packet delivery ratio sebesar 72,30 %.
Deteksi Serangan Black Hole terhadap Protokol Routing Ad Hoc On-Demand Distance Vector menggunakan Support Vector Machine Awit Priharsiwi; Dany Primanita Kartikasari; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 10 (2021): Oktober 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Wireless Sensor Networks used to collect all of data and information in complex environments. WSN uses wireless communication channel technology to transmit data, without security protection, data is very vulnerable to internal and external attacks. Black hole is one of the attacks that occur on WSN. A black hole attack works by declaring itself to have the shortest route to the destination node. This is very dangerous if the package contains important information. From these problems, black hole attacks can be detected using the Support Vector Machine method on the Ad Hoc On-Demand Distance Vector reactive protocol. SVM is a powerful method for classification and regression. The purpose of this study is to determine the accuracy of SVM in detecting black hole attacks and how much data is discarded by these malicious nodes. In the test results, it can be seen when the simulation is under normal conditions, the packet loss is small (1), while in the simulation there are black holes (239) 100%. Simulation with normal conditions on the packet delivery ratio as much as 99,5816%, while the simulation has a black hole with a value of 0%. Simulations with normal conditions have an average end-to-end delay of 202,429 ms, while in the simulation there are black holes of about 172,524 ms to 214,979 ms. The results showed that the SVM algorithm in classifying black hole attacks with calculations produced accurate results.
Pengujian Kinerja MQTT Broker berbasis Kontainer menggunakan Docker pada Perangkat Raspberry Pi Andika Kurniawan; Mahendra Data; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 12 (2021): Desember 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

To test the performance of the MQTT broker using containerization technology on Raspberry Pi devices with two different image bases, we use several experimental parameters. The experimental parameters are resource usage (CPU and memory), latency, and packet loss. To test the resource usage, we created a Python script. Meanwhile, to test latency and packet loss, we used the MQTT broker measure latency measure. The base images used as the installation media for the MQTT broker (Mosquitto) are belenalib/raspberry-pi2 and belenalib/raspberry-pi2-alpine. We created the Docker images using Dockerfiles. The image is built and run with the commands provided by the Docker program. Regarding resource usage (CPU), the MQTT broker running on docker based on the belenalib/raspberry-pi2 image performs better than native with 0.53% to 10.38% lower CPU usage. However, the resource usage (memory) of both MQTT brokers running on docker is still higher than MQTT brokers running natively, which has a difference about more than 50%. Likewise with the latency test, the two MQTT brokers running on docker are still higher than the MQTT brokers running natively, which has a difference of more than 50%. While in the packet loss test, the MQTT broker with the belenalib/raspberry-pi2 image base can provide better performance where only 28.60% experienced packet loss on 1000 MQTT clients and 0 QoS.
Implementasi Routing Dinamis pada Wireless Sensor Network menggunakan Modul Komunikasi LoRa Mahardika Putra Utama; Dany Primanita Kartikasari; Aditya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 12 (2021): Desember 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of the WSN (Wireless Sensor Network) concept on the Internet of Things allows communication to be carried out wirelessly so as to help node mobility. Nodes that can move freely to move away from the gateway can cause communication to be interrupted so that a relay is needed as an intermediary for data transmission. Other nodes can be used to become a relay that helps bridge data transmission between nodes and gateways and utilizes multihop communication. So that each relay is responsible for sending its own data and forwarding data to other nodes that are not in the range of the gateway. In addition, this multihop concept can increase the range of wireless communication modules by utilizing other nodes as relays. A node that is not directly connected to the gateway must be able to find a routing path to get to the gateway. The path chosen must be the shortest path, so we need a routing protocol that can collect existing network information and choose the shortest path to get to the gateway. The routing protocol that is created must also be dynamic so that it can adapt to changes in the network because nodes on the network can move freely, so the arrangement of routing paths can change. There are two tests carried out to measure the feasibility of the system made, namely functional testing and performance testing. In functional testing the system can run well where nodes can collect all network information and choose the shortest path, send sensor data, forward sensor data from other nodes, and adapt to network changes such as disconnection of the selected path. Performance testing is conducted to test the ability of the system based on convergence time, packet delivery ratio, and delay with the effect of distance, number of hops, and delivery time intervals. The results of the functional testing of the node managed to meet all the requirements that have been determined. In the results of testing the performance of node convergence time it takes 7,365 seconds at a distance of 50 meters to get network information, while at a distance of 100 meters it takes 10,807 seconds. Then in the packet loss performance test, the lowest percentage is at a distance of 100 meters and the number of 1 hop jumps is 6% and the highest percentage is at a distance of 50 meters and the number of 3 hops jumps is 22%. In testing the delay performance, the lowest value is obtained at a distance of 50 meters and the number of 1 hop jumps is 276ms and the highest value at a distance of 100 meters 3 hops is 755ms.
Pengaruh Tipe Propagasi Two Ray Ground dan Free Space terhadap Konsumsi Energi Protokol Destination Sequenced Distance Vector (DSDV) pada Mobile Ad Hoc Network (MANET) Indra Lesmana Putra; Dany Primanita Kartikasari; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 2 (2022): Februari 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

MANET is a dynamic wireless network. Each node in MANET has a function as a host to connect to the wireless network and also as a router that functions to forward data packets to other nodes. In a MANET system, MANET is expected to have good performance and have a maximum level of energy efficiency. This is because each node on the MANET network requires energy to communicate with each other. In addition, the selection of propagation type can also affect of energy efficiency in MANET. In order to understand how the effect of the propagation type on energy consumption in MANET, we have conducted a study that focuses on energy consumption in MANET using two different propagation types. The two types of propagation that we used are the free space propagation type and the two ray ground propagation type. In this study, we will use the DSDV routing protocol which will regulate the routing of data transmission from the sending node to the receiving node. The DSDV protocol guarantees that there will be no looping in data transmission, so it is very suitable to be applied in this research. To achieve credible results, this study uses four test scenarios based on the number of nodes used. Each scenario will be tested 10 times using Network Simulator 2.
Implementasi Algoritma Trilateration pada Penentuan Posisi Obyek Dhiyaan Khansa Afifah; Dany Primanita Kartikasari; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 4 (2022): April 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

accuracy
Analisis Dampak Serangan Wormhole terhadap Protokol Routing Ad-Hoc On Demand Distance Vector (AODV) pada LoRa Muhamad Ralfi Akbar; Dany Primanita Kartikasari; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 11 (2022): November 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Long Range (LoRa) is one of IoT technology used in a system that require long distance communication and in a need of low cost system. Delivering a packet on LoRa takes time depending on the distance to the destination, the farther the distance, the longer delivery time will take. This makes LoRa network security while delivering packet, vulnerable to attacks. This research analyze packet delivery on LoRa using the AODV routing protocol and the impact of Wormhole attack lon the AODV routing protocol on LoRa. This study uses 3 LoRa nodes and 1 malicous wormhole node. The analysis is reviewed with QoS paramers, namely Troughput, Delay, Jitter, and Packet Loss. The result of the test show that Wormhole attack affects the performance of packet delivery in LoRa. In the non-attack scenario, the average Delay value is 0.171s, Packet Loss is 0%, the average of Troughput is 408,321 kbps, and the average of Jitter is 0.0003ms. In the Wormhole attack scenario, the average Delay values is increased to 0.343s, Packet Loss increased to 70%, Troughput decreases by an average of 204,105 kbps and Jitter increases by an average of 0.05724ms. It can be concluded that Wormhole attack on the AODV routing protocol affects the qualiy of QoS on the delivery of each packet.
Naive Bayes untuk Klasifikasi Pergantian Operating System pada Personal Computer di Bank X Syifa Namira Neztigaty; Dian Eka Ratnawati; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 6 (2022): Juni 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Bank X is one of the largest banks in Indonesia. The Desktop Team, which is one of the teams that carry out risk identification and periodic evaluation on PCs. Through this evaluation, the Desktop Team found many operating systems on PCs at Bank X were end-of-support. This condition poses a risk if there are bugs or security holes in the operating system that can lead to data theft. In order to avoid this incident, the entire operating system of end-of-support PCs must be replaced with a newer operating system. Currently the operating system replacement activity has been carried out, but it is still done manually and has not been effective. The process has succeeded in replacing ±5,000 PCs. Through this system, the Desktop Team Desktop Team will get the class results from the PC. The data could be classified by using data mining classification method, namely Naive Bayes. From the PC attribute data does not yet have a class, the system will perform data processing. Then the data is calculated using the existing functions on the controller, by accessing classified PC database. Information about the classification results is displayed on the prediction results page. From the results of testing the accuracy value is 92.8371%.