Claim Missing Document
Check
Articles

Found 4 Documents
Search

Multi-Factor Authentication Using a Smart Card and Fingerprint (Case Study: Parking Gate) Isa Mulia Insan; Parman Sukarno; Rahmat Yasirandi
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 2 (2019): September, 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2019.4.2.309

Abstract

Security is one of the considerations in the development of smart parking. In Indonesia, the most common authentication factor is using a smart card as an authentication factor at the gate. Using a smart card as an authentication factor has loopholes that can be misused. Accordingly, authentication system needs an additional factor (more than one). Authentication that uses more than one factor is also called Multi-Factor Authentication (MFA). However, the MFA applied to smart parking can still be misused. The cause of the MFA can be misused because the MFA cannot ensure the user's smart card. Therefore, we apply the MFA at the gate in smart parking using a two-factor authentication system on this research. These two factors are the smart card and biometric data (fingerprint). This authentication system can prove the hypothesis that if the smart card lost, the smart card cannot be used by other than the owner (H0) and the smart card whose data has been rewritten or cloned cannot be a threat to the system (H1). Proofing of this hypothesis is bypassing several attack scenarios. Thus, the security of the proposed parking gate system can be guaranteed.
Strategic Planning of Information Systems to Improve the Quality of Business Processes at the University: Perencanaan Strategis Sistem Informasi untuk Meningkatkan Kualitas Proses Bisnis di Universitas Eka Novita Sari; Isa Mulia Insan; Christian Susetyo Harjanto
Software Development, Digital Business Intelligence, and Computer Engineering Vol. 3 No. 02 (2025): SESSION (MARET 2025)
Publisher : Politeknik Negeri Banyuwangi Jl. Raya Jember km. 13 Labanasem, Kabat, Banyuwangi, Jawa Timur (68461) Telp. (0333) 636780

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57203/session.v3i02.2025.47-52

Abstract

Information Technology (IT) is one of the innovations that has been widely applied in various fields. In Indonesia, the field of education is currently implementing a lot of IT. However, IT owned by universities in Indonesia is still not used optimally. This happens because there is no strategic planning for the use of IT owned by the university. By optimizing the application of IT, universities can improve the quality of their business processes. This study will propose IS/IT strategic planning that can be applied to universities in Indonesia. To design the strategy, literature studies and observations were carried out to obtain the appropriate data. The data needed are in the form of the latest internal and external conditions from one of the universities in Indonesia. From the data that has been obtained, the processing is carried out with the framework that has been adopted. The output generated from all IS/IT strategic planning activities at the university is an IS/IT strategic planning document that contains several analysis results, such as the direction of the company's business development and the direction of development of Information Systems (IS) used to support the path of business development. In addition, IS recommendations based on business analysis results and IS trends have also been generated. The strategy for implementing IT has been designed based on the current situation so that the resulting strategy can be used as a reference for the implementation of IT at the university.
Encryption Of Internet Of Things Constrained Device For Digital Envelope: A Systematic Literature Review Insan, Isa Mulia; Samopa, Febriliyan
IPTEK The Journal for Technology and Science Vol 34, No 3 (2023)
Publisher : IPTEK, DRPM, Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j20882033.v34i3.16830

Abstract

Not only the exchange of information between IoT devices but integration between IoT devices and cloud servers has also brought IoT to a higher level. Security is the main problem for IoT devices with limited resources for exchanging information. Digital envelopes are one method that uses encryption to secure data. However, limited resources on constrained devices necessitate selecting the proper encryption. This systematic literature review (SLR) was conducted on 11 of 43 studies that have used encryption algorithms for IoT devices. In addition to using the algorithm, it will also explain the device used and the safety factor. A suitable encryption algorithm for the digital envelope has been found. In addition, Some of the safety factors, IoT devices, and specifications are also shown.
Pemodelan UML Sistem Keamanan Berbasis Amplop Digital untuk Memenuhi Layanan Keamanan Insan, Isa Mulia; Husen, Jati Hiliamsyah; Yasirandi, Rahmat
The Indonesian Journal of Computer Science Vol. 14 No. 5 (2025): The Indonesian Journal of Computer Science
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v14i5.4986

Abstract

This research focuses on the development and systematic redesign of a Unified Modeling Language (UML) model to represent a digital envelope-based security system. The digital envelope method, integrating both symmetric and asymmetric encryption, is employed to leverage the strengths of each encryption type, ensuring performance and security in data protection. The study enhances a previously proposed UML model by incorporating security symbols and notations tailored for security modeling, effectively capturing encryption principles while ensuring clarity and accuracy. However, several limitations were identified, particularly the lack of detailed separation between the encryption and decryption processes, which are crucial for ensuring data integrity, confidentiality, and non-repudiation. The research concludes that further development is required to refine these notations, including a clear distinction between encryption and decryption stages, and the inclusion of more detailed symbols for key management. Future work should focus on extending the notations to better address the security challenges faced by digital envelope-based systems, enhancing their representation of key generation, storage, and distribution