Claim Missing Document
Check
Articles

Secure Wireless Sensor Network using Cryptography for Smart Farming Systems Wahid, Abdul; Juliady, Ilham; Zain, Satria Gunawan; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 2 No. 4 (2022): Vol. 2 No. 4 (2022): Volume 2 Issue 4, 2022 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1555.547 KB) | DOI: 10.31763/iota.v2i4.554

Abstract

Internet of Things (IoT) technology has become part of human life. Agriculture in many parts is one of IoT implementation segment including the Cultivation of mold oysters. Internet of Things (IoT) is applied to collect data from combined sensors in the Wireless Sensor Network (WSN) will make it easy for farmers to monitor and control garden they remotely. Regardless of the application system control distance far based WSN that will make it easy for a farmer, the system has gap security, and one of them that is hacking and tapping of communication data The IoT . is really dangerous on effort if condition room mold oyster the known by someone hacker who can just is rival effort. It is a needed something method for secure communication when the data transfer process is over-guaranteed. The method used is application Base64 -based data encryption/decryption on WSN node devices and controlling and monitoring mobile devices. Based on results trials carried out after the implementation of Secure WSN with scenario tapping using the Wireshark tool show no data can be read. Analysis results show that this model could be applied as Secure WSN for Smart Farming System.
Development of a Parking System Using the High Sensitive R503 Fingerprint Sensor for Sequential Search Algorithm Based Customer Detection Suhartono, Suhartono; Parenreng, Jumadi M; Syafriandi K, Fahri; Zain, Satria Gunawan; Suhardi, Iwan
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 2 (2023): Volume 3 Issue 2, 2023 [May]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i2.586

Abstract

Today's technological developments are very sophisticated. It can be seen with various innovations in this era, from simple innovations to innovations that are trending in the world. Parking is a condition where the driver places his vehicle in a parking lot. The parking system using the Radio Frequency Identification (RFID) system has become a technology applied to parking systems, by facilitating and providing security to customers when parking, even though they have used an RFID card, the drawbacks of the system are that anyone who has an RFID card can issue the owner's vehicle another by using the same RFID card. The solution to the lack of an RFID-based parking system is by using the High Sensitive R503 Fingerprint Sensor which will make security much better than using an RFID card, by applying the Sequential Search Algorithm to detect customers in fingerprint registration applications and using the Fingerprint R503 sensor with data verification speed. average 0.78 Second to open the parking portal.
Integrated Smart Rescue Box Design With Information Systems as a Solution to Indonesian Disaster Emergency Response Supriadi, Dewi Sri Mulyana; Jaya, Hendra; Djawat, Yasser Abd; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 1 (2023): Vol. 3 No.1 (2023): Volume 3 Issue 1, 2023 [February]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i1.600

Abstract

This study uses the design method with a prototype research model. This is motivated by the fact that Indonesia is prone to natural disasters, so preparing for an effective and efficient disaster emergency response process is necessary. The resulting innovation is an intelligent rescue box prototype product integrated with an information system as a disaster emergency response solution, especially in meeting the basic emergency needs of post-disaster refugees. The effect will consist of two, and the first is the Smart rescue box (SRB), which provides the emergency needs of evacuees in one package to meet the electricity needs of refugees. There is a solar tracker system with real-time clock (RTC) data that is set as if it can follow the direction of the sun's movement for maximum absorption of sunlight. The second product is the SRB information system which is a disaster information system consisting of several useful features and a disaster education menu that can provide insights regarding disasters and disaster information that can be accessed easily. The measurement and observation test results show that the product has worked as expected, so it is feasible. The resulting product is still in the form of a prototype so that suggestions for further research can be further developed in terms of features and technology to become a complete product to facilitate the disaster emergency response process.
Security System Analysis Using the HTTP Protocol Against Packet Sniffing Attacks Manguling, Inez sri wahyuningsi; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 4 (2023): Vol. 3 No. 4 (2023): Volume 3 Issue 4, 2023 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i4.612

Abstract

The security level of the SIM MBKM website information system needs to be analyzed because it is accessed by many students who provide essential data. The security testing process for the SIM MBKM system uses the software Ettercap and Wireshark to test the system's security level and network data against cybercrime attacks. The results of these experiments showed the same essential data, but Wireshark displayed more personal information. The difference lies in the system architecture using different methods or stages, namely ARP Poisoning and Filtering HTTP. The third difference is the estimated time taken during the experiment. Ettercap and Wireshark applications enable eavesdropping on confidential and essential data and information. Through security testing using Ettercap and Wireshark, more critical data is displayed. solutions and preventive actions can be implemented by encrypting confidential data and improving website security using the HTTPS (Hypertext Transfer Protocol Secure) protocol.
Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN) rosyidah, aliyyah; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 3 (2023): Vol. 3 No. 3 (2023): Volume 3 Issue 3, 2023 [August]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i3.613

Abstract

The network security system is continuously advancing alongside technological developments. VPNs, which utilize open networks, aim to provide security by leveraging IPSec to transmit private data through L2TP tunneling strategy from the server to the branch computer/client and vice versa. Conversely, it can also lead to poor security practices. VPNs are implemented using the layer 2 IPSec tunneling protocol with two MikroTik devices. Testing is conducted to assess the security and speed of the network using the command line and MikroTik Winbox, where the server monitors packet delays to determine the improvement in network security quality. This research has identified several weaknesses in implementing this VPN protocol, namely the need for caution regarding the security of transmitted data to prevent misuse by the VPN provider
Network Security Analysis Using Switch Port Security CPT Istiqamah, Nurfadilah; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 4 (2023): Vol. 3 No. 4 (2023): Volume 3 Issue 4, 2023 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i4.614

Abstract

The gradual advancement of information network technology has rapidly increased due to the growing demand for efficient, stable, and fast network connectivity, as well as reliable information security. One factor that influences network quality is network security, which encompasses various techniques to enhance network security, such as building firewalls, layer seven protocols, and port security. Port security utilizes existing ports to enable secure switching access. The switch can protect the local area network (LAN). Several types of switch port security are commonly used, including default/static port security, dynamic learning port security, and sticky port security.
Smart System for Stabilizing Water Flow Output on Android-Based Taps Parenreng, Jumadi M; Zain, Satria Gunawan; Yusuf, Zulfatni; Suhardi, Iwan; Kaswar, Andi Baso
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 4 (2023): Vol. 3 No. 4 (2023): Volume 3 Issue 4, 2023 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i4.668

Abstract

This study aims to produce and find out the results of the Smart System Stabilization Water Discharge Output Test on Android-Based Faucets based on the results of water flow sensor readings whose data is used as a reference for the rotation of the Adj or Adjustable Water Pressure Reducing Regulator Valve. The tests were carried out in the form of measuring water flow without and with Adj and measuring water discharge without and with Adj. Based on the research results, the water flow without Adj is 7 L/min for tap 1.9 L/min for tap 2. The water flow with Adj for both taps is 8 L/min. The flow of water from both taps is more stable with Adj than without Adj because the flow of both taps is 8 L/min. The measurement results of the water discharge without Adj are 0.1216 L/s for tap 1 and 0.1470 L/s for tap 2; the difference in water discharge is 0.0254 L/s. Water debit with Adj 0.135 L/s tap 1 and 0.14125 L/s tap 2, the difference in water discharge is 0.00625 L/s. The water debit is more stable with Adj than without Adj because the difference in water discharge is smaller.
Simulation and Analysis of Network Security using Port Knocking and Intrusion Prevention System on Linux Server Parenreng, Jumadi Mabe; Rizal, Fahru; Wahyuni, Maya Sari
Internet of Things and Artificial Intelligence Journal Vol. 4 No. 2 (2024): Volume 4 Issue 2, 2024 [May]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v4i2.726

Abstract

This research aims to design and simulate a network security system using port knocking and an intrusion prevention system (IPS) on a Linux-based server and analyze its security using port scanning, brute force, and DoS attacks. IPS uses inline snort mode with DAQ NFQ. The test results show that port knocking successfully opens and closes the port according to the knock sequence so that only those who know the knock sequence can access the port. The port scanning, SSH, and FTP Brute Force test results were successfully detected by IPS so that the attacker could not obtain any information. DoS testing with LOIC increased server CPU and memory usage, but after IPS rules were applied, usage stabilized. DoS testing with slowhttptest makes the webserver inaccessible to users, but after the IPS rule is applied, web access runs normally. In conclusion, IPS was successful in preventing all attacks because the attack packets complied with IPS rules so they were detected as threats and dropped by IPS. Test results of the Telegram monitoring system show that the system succeeded in sending real-time attack notifications with an average time difference of 2.9 seconds, and the report, start, and stop features worked as expected.
Integration of Telkom ISP and 3 LTE Using PCC Method to Improve Internet Connection Stability Putra, Muh. Fardika Irwan Pratama; Parenreng, Jumadi Mabe; Yahya, Muhammad
Internet of Things and Artificial Intelligence Journal Vol. 4 No. 2 (2024): Volume 4 Issue 2, 2024 [May]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v4i2.728

Abstract

This research focuses on improving internet connection stability at the Network Laboratory of JTIK, Faculty of Engineering, Universitas Negeri Makassar. The study aims to address the challenges of disruptions and instability frequently faced by users of Telkom WiFi in the laboratory, causing significant disruptions in internet activities. This instability is exacerbated by simultaneous internet usage, leading to network overload and bandwidth competition among users, ultimately reducing the overall network performance. As a solution, the research proposes the implementation of a network system that integrates Telkom ISP and 3 LTE using the PCC method. The system is equipped with a failover mechanism that automatically redirects the network connection to the active ISP when issues are detected. Additionally, the research categorizes users into admin lecturers and students, imposing bandwidth limitations specifically for students to prevent excessive network traffic. Three in-depth testing scenarios were conducted, demonstrating that the system smoothly redirects internet connections to the active ISP during issues, ensuring uninterrupted and effective internet access for users.
Hybrid Electrical Interchange System in IoT-Based Egg-Hatching Equipment Parenreng, Jumadi Mabe; Wahyuni , Maya Sari; Lia, Resky Amalia; Muliadi, Muliadi; Adiba, Fhatiah
Internet of Things and Artificial Intelligence Journal Vol. 4 No. 2 (2024): Volume 4 Issue 2, 2024 [May]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v4i2.730

Abstract

Manual egg hatching still requires time and human labor every day to regulate temperature, adjust humidity, and turn the eggs. This egg hatcher works using solar panels as an alternative energy source. This study aims to design and determine the results of the effectiveness of testing the hybrid electrical interchange system on IoT-based egg hatchers. The research method used is the R&D method. Based on the results of the research, switching energy sources is declared valid because the tools and applications are integrated. The average voltage difference in the battery in charging condition by turning on the tool is -0.01 Volts, proving that even though it is in charging condition when the tool is turned on, the voltage in the battery will still decrease. The measurement results of the average daily energy demand on the hatchery by applying a hybrid electrical interchange system is 0.142 kWh and without applying the system 0.163 kWh, proving by applying a hybrid electrical interchange system device more efficient use of PLN electricity due to assistance from PLTS. On-off automation of lights and fans can keep the temperature at an ideal state of 37°C-39°C, thus affecting the egg-hatching process. On-off automation using a relay connected to a mist maker also affects keeping humidity at 55%-65% humidity, humidity also affects the egg-hatching process, where the success rate in hatching eggs is maximized. Based on the results of tests carried out by the hybrid electrical interchange system on IoT-based egg hatchers, it can be concluded that this tool can maintain the stability of temperature and humidity automatically in egg hatchers well until the eggs hatch.
Co-Authors Abd. Fattah Abd. Fattah Abd. Rahman Patta Abd. Rasyid Syamsuri Abdul Hafizh Abdul Hafizh Abdul Muis Mappalotteng Abdul Wahid Abdul Wahid Abdul Wahid Ade Mulawarman Adi, Puput Dani Prasetyo Adiba, Fhatiah Ahmad Ridwan Ahmad Wahyudi Ahmad Wahyudi Akbar, Trisakti Al Imran Al Imran Alimuddin Sa’ban Miru Alimuddin Sa’ban Miru Aminuddin Bakry Anak Agung Istri Sri Wiadnyani Andani, Andi Ferry Adlian Tri Andi Baso Kaswar Andi Baso Kaswar Andi Farmadi Andi Wawan Indrawan Andi, Asirah Anggit Priadmojo Ary Masharuddin Shiddiqi Asham Bin Jamaluddin Aswa, M. Andika Atthariq, Atthariq Ayu Lestari Ayu Lestari Azhar Azhar Baso, Fadhlirrahman Budi, Tri Setyo Cyahrani Wulan Purnama Cyahrani Wulan Purnama Rasyid Dewi Fatmarani Surianto Djawat, Yasser Abd Djuanda, Djuanda Dodon Turianto Nugrahadi Dyah Vitaloka Edi Suhardi Rahman Fachrul, Achmad FADIAH, NUR Fahmi, Moghfina Moghfina Fajar B, Muhammad Farid Wajidi Fathahillah Fathahillah Fatimah Hidayahni Amin Febry Maryani Yatu Febry Maryani Yatu Fhatiah Adiba Firdaus Firdaus, Muhammad Eka Ganefri . Haq, Andi Muh. Sahirul Harifuddin Haripuddin Hartono Hartono Hasrul Bakri Hendarawaty, Hendarawaty Hendra Jaya Hentje Ponto I Nyoman Sila Ibnu Fikrie Syahputra Iin Mahgafhira Ikram Anas Ikram Anas Ilham Juliady Irmawati Irmawati Irmawati Irmawati Irmawati Irvanshah Irvanshah Irwan Budiman Istiqamah, Nurfadilah Iwan Suhardi Jariah, Rezki Nurul Jufri, Muhammad Fadhil Juliady, Ilham Jusniar . Kasim, Muh. Alwi Rizkyansyah Kurnia Prima Putra Kusnandar, Welly Chandra Kusumah Lia, Resky Amalia M. Fajar B M. Ruhan Bachry M. Syahid Nur Wahid M. Syahid Nur Wahid Mahabror, Dendy Manguling, Inez Sri Wahyuningsi Massikki, Massikki Moghina Fahmi Muh Mujahidin Muh. Irfan Nur Muh. Yusuf Mappeasse Muh. Yusuf Mappeasse Muhammad Agung Muhammad Agung Muhammad Agung Muhammad Agung Muhammad agung Muhammad Alkaff Muhammad Fajar B Muhammad Fajri, syamsir Muhammad Ilyas Syarif Muhammad Mahdinul Bahar Muhammad Mahdinul Bahar Muhammad Reza Faisal, Muhammad Reza Muhammad Yahya Muharram Muharram Muhira Muhira Muliadi Muliadi Muliadi Mustari Mustari Mustari S. Lamada Nununk Febryanti Nur, Muh Irfan Nurdin Nurdin Nurftriani Maskur Nurul Istiqamah Qalbi Nurul Izzah Dwi Nurul Izzah Dwi Nurdinah Parenreng, Syarif Mabe Prima, Delta Ardy Putra, Muh. Fardika Irwan Pratama Rais, Muh Rasyid, A. Ramli Rasyid, M. Udin Harun Al Riana T.Mangesa Ridwan Daud Mahande Rizal, Fahru rosyidah, aliyyah Sanatang Saragih, Triando Hamonangan Sariningrum, Ros Satria Gunawan Zain Seny Luhriyani Sunusi Shiraj, Muhammad Reza Sofyan, Muh Azikin Sugeng A. Karim Sugeng A. Karim Suhartono Suhartono Suhartono Suhartono, Suhartono Suhendar Aji Putra Suhendhar Aji Putra Supeno Djanali Supriadi, Dewi Sri Mulyana Suyanta Suyanta Syafriandi K, Fahri Syahrul Syahrul Syahrul Syahrul Syamsinar Syarifuddin Kasim Syarifuddin Kasim Tenri Nadya Wenny Titin Jumriah Tri Setyo Budi Tri Setyo Budi Usman Mulbar Wahda Arfiana AR Wahid, M. Syahid Nur Wahyu Hidayat M Wahyu Hidayat M Wahyuni , Maya Sari Wahyuni, Maya Sari Widyanti Utami A. Winda Agustina Yasdin, Yasdin Yunus Tjandi Yunus Tjandi Yusuf, Zulfatni Zulhajji, Zulhajji Zulkiplih Zulkiplih Zulkiplih Zulkiplih Zulkiplih