Claim Missing Document
Check
Articles

Kombinasi Waktu Sinkronisasi dan Nilai Salt untuk Peningkatan Keamanan pada Single Sign-On Rizal Munadi; Zuhar Musliyana; Teuku Yuliar Arif; Afdhal; Syahrial
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1026.358 KB)

Abstract

Single sign-on (SSO) is a session authentication process that allows a user to login by using user registered identity and password in order to access appropriate applications. The authentication process takes the user in to login for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session. Its implementation will provide a reduction of password burden to access many applications for every login process. Ease of access through a single account needs to be addressed carefully to ensure the authentication credentials that are not scattered and known by others. Currently, there are several open source SSO authentication methods available. However, the use of existing authentication methods is still vulnerable to attack, such as Man-In-The-Middle. In this study, SSO authentication algorithm using One-Time Password (OTP) is proposed using a combination of time synchronization and salt value. These combinations are used to verify user session while accessing any application with SSO mechanism. The results show that the proposed OTP algorithm can handle SSO authentication process in good fashion and also protect from Man-In-The-Middle Attack.
Reduksi Osilasi Daya Pada MPPT Panel Surya Dengan Metode Kombinasi PNO dan Fuzzy Suriadi Suriadi; Intan Nurul Fajri; Rizal Munadi; Mansur Gapy
Jurnal Rekayasa Elektrika Vol 15, No 2 (2019)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v15i2.13682

Abstract

Solar panels are an essential part of a system of electrical source devices that receives light energy to be processed into electrical energy with direct current (DC) output. The main problem in the use of solar panels is that the production of power in solar panels is not constant due to the temperature and solar radiation changes. This non-constant power causes the solar panel output power to fluctuate and become unstable. This output power will be used in processing using the MPPT Perturb and Observe (PNO) method to obtain the maximum solar panel receiving point. This PNO method uses two input parameters and can be applied to all types of solar panels. This study aims to reduce the oscillation of the output power of MPPT using electronic power simulations on a three-level boost converter by combining PNO and Fuzzy MPPT methods. The Fuzzy method in this study uses the Mamdani inference method, which uses two inputs and one output. The boost converter was tested using a simulation on several conditions of sunlight received by solar panels. The simulation results show that the power output from the MPPT PNO and Fuzzy methods can reduce oscillation more optimally, 78.57%. 
Peningkatan Sistem Keamanan Autentikasi Single Sign On (SSO) Menggunakan Algoritma AES dan One-Time Password Studi Kasus: SSO Universitas Ubudiyah Indonesia Zuhar Musliyana; Teuku Yuliar Arif; Rizal Munadi
Jurnal Rekayasa Elektrika Vol 12, No 1 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v12i1.2896

Abstract

Single Sign On (SSO) merupakan model autentikasi independen yang diimplementasikan Universitas Ubudiyah Indonesia (UUI) menggunakan Message-Digest Algorithm 5 (MD5) dan web service NuSOAP berbasis bahasa pemograman PHP. Sistem ini berjalan pada protokol Hypertext Transfer Protocol (HTTP). Faktanya penggunaan protokol HTTP ini sangat rentan terhadap berbagai jenis serangan karena data dikirim dalam bentuk plaintext tanpa ada proses enkripsi dan penerapan algoritma MD5 pada autentikasi login juga rentan terhadap serangan dictionary attacks dan rainbow tables. Disisi lain, Penggunaan web service NuSOAP juga menciptakan celah keamanan karena pengiriman dan penerimaan payload tidak dienkripsi. Saat ini diketahui sudah ada beberapa metode yang dapat digunakan untuk meningkatkan pengamanan kerentanan tersebut diantaranya yaitu menggunakan Hypertext Transfer Protocol Secure (HTTPS), Secure Hypertext Transfer Protocol (SHTTP) dan Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA). Namun beberapa hasil penelitian terkait memperlihatkan masih terdapat beberapa kelemahan dari penggunaan HTTPS, SHTTP dan CAPTCHA. Penelitian ini mengusulkan penggunaan algoritma Advanced Encryption Standard (AES) dengan pembangkit kunci dinamis dan metode One-Time Password (OTP) berbasis sinkronisasi waktu dengan kombinasi salt untuk meningkatkan keamanan pada autentikasi SSO UUI. Hasil pengujian menunjukkan penerapan algoritma AES dan OTP  dapat mengamankan proses autentikasi SSO  dari serangan dictionary attack dan rainbow table.
Perancangan dan Penerapan Algoritme 4DES (Studi Kasus Pada Keamanan Berkas Rekam Medis) Yeni Yanti; Teuku Yuliar Arif; Rizal Munadi
Jurnal Rekayasa Elektrika Vol 12, No 3 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v12i3.3271

Abstract

Information is necessary for life because everything can not be done properly in the absence of information. The security problem is one of the most crucial aspects of a file containing sensitive information, for example, medical record files. Often, the file owner, designer, and manager of the information systems pay less attention to the security issues. One way to anticipate this is by using a cryptographic method, which is the science and art to keep the message security. This study aimed to evaluate the performance analysis and building a security system prototype of medical record files using the 4DES algorithm. The 4DES algorithm is a variant of the 3DES algorithm that is more robust and capable of protecting information properly. The 4DES security system has four keys; each key has a key length of 64 bits so that the total length of four keys is 256 bits and K1≠K2≠K3≠K4. The encrypted / decrypted files (Word, Excel, and Image)  using an external key of minimum eight characters (64 bits). During encryption, there was an addition of padding bytes in each of data block size to minimalized attack from the attacker using a CBC operation mode process. Results showed that the processing speed of the encrypted files using the 4DES was 1 second faster than that of using the 3DES algorithm. Also, the 4DES algorithm has superiority regarding of file safety, which has time enduring 3.45 x1056years longer to brute force attack technique which able to discover text file and the secret key.
Analysis of Multi-Node QoS in Shrimp Pond Monitoring System with Fog Computing Anisah; Munadi, Rizal; Away, Yuwaldi; Bahri, Al; Novandri, Andri
Sinkron : jurnal dan penelitian teknik informatika Vol. 8 No. 1 (2024): Articles Research Volume 8 Issue 1, January 2024
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v9i1.13205

Abstract

Most of Indonesia’s territory consists of oceans, presenting a significant potential for developing the fisheries sector. Shrimp is among Indonesia’s flagship commodities with substantial export potential. Internationally, Indonesia holds the fourth position as the largest exporter of frozen shrimp globally. However, shrimp cultivation faces various challenges, including declining water quality due to factors such as water sources and weather, which can adversely affect harvest yields. To preempt potential failures, employing smart devices and technology in shrimp cultivation offers an effective and efficient solution for monitoring and management. This study aims to analyze water quality monitoring in ponds considering the speed of data transmission from end devices to fog using Quality of Service (QoS) parameters like delay/latency, throughput, and packet loss. Data transmission tests were conducted at data rates of 5 Mbps and 10 Mbps, with a bandwidth of 1500 Mbps. The study involves three sensors—water temperature, pH, and salinity—placed in shrimp ponds. Test results showed a decrease in throughput by 1.54% at the sensor node and 2.99% at the sink node when packet data delivery encountered barriers like obstacles. There was a 74.13% increase in latency when the delivery distance extended to 35 meters. The achievable delivery range with low latency was up to 10 meters with barriers and 25 meters without. Thus, latency and throughput values vary depending on the presence of barriers and transmission distance. Barriers tend to increase latency and decrease throughput.
SISTEM IDENTIFIKASI MENGGUNAKAN RFID DAN SENSOR INFRARED BERBASIS IOT TERHADAP PENGEMBANGAN KAMPUS PINTAR Nazuarsyah, Nazuarsyah; Muzakir, Ully; Mukhroji, Mukhroji; Ginting, Rossiana; Munadi, Rizal
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 7, No 2 (2023)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22373/cj.v7i2.21632

Abstract

This study aims to discuss the development of an identification system tool to unlock doors using Radio Frequency Identification (RFID) and infrared sensors based on the Internet of Things (IoT). This research model is the development of prototyping, consisting of several stages, namely the needs analysis stage through interviews with lecturers and education staff, and conducting literature studies on previous research to get more information on this research. The design and design phase of the tool consists of RFID, infrared sensor, relay, and I2C LCD connected to microcontroller. The solenoid lock is connected directly to the relay as output. The test results on the hardware and software side, the average response time of the device to unlock from outside the room using RFID is 1.13 seconds, while the average response time of the tool to unlock from inside the room using infrared is 0.77 seconds. Thus, the results of this study found the average response time of infrared sensors is faster by 0.09 seconds than RFID. This system can be further developed using other access media such as bluetooth devices that are easily found in smartphones.
Sistem Pemantau dan Pengontrol Suhu dan pH Air Otomatis pada Budidaya Ikan Gabus Meutia, Ernita Dewi; Utama, Muhammad Yoga; Munadi, Rizal; Irhamsyah, Muhammad
Journal of Engineering and Science Vol. 2 No. 2 (2023): July-December 2023
Publisher : Yayasan Kawanad

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56347/jes.v2i2.143

Abstract

Maintaining the temperature and pH of water in fish farming is important to maintain the survival of the commodities being cultivated. Snakehead fish as one of the freshwater fish cultivation commodities, live in a temperature range of 25° to 32°C, and a pH of 4,5 to 6. Changes in temperature and pH due to  differences in day and night and weather conditions can be mortal for the fish. To help the fish farmers maintain water quality, in this research a prototype of IoT based temperature and pH monitor and control was built using Arduino microcontroller, that  can be accessed through a mobile application on Android smartphone. The test results show that the prototype has successfully control the temperature by turning the heater on when it dropped below 25°C, turned the acid solution pump on when the pH felt below 4.5, and alkaline solution pump when pH was above 6. Continuous sensor readings are able to  maintain the stability of water quality.
Penerapan Multiple Attribute Decision Making dengan Metode Simple Additive Weighting untuk Pemeringkatan Kerentanan Keamanan Website MUNADI, RIZAL; MUKHROJI, MUKHROJI; SYAHRIAL, SYAHRIAL; MEUTIA, ERNITA DEWI
ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika Vol 6, No 2: Published May 2018
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/elkomika.v6i2.194

Abstract

ABSTRAKPada universitas, website dibangun sebagai jendela informasi elektronik yang menyediakan informasi tentang pendidikan tinggi. Namun, adanya celah keamanan pada website berpotensi untuk dieksploitasi bagi kriminal teknologi informasi. Berdasarkan masalah ini, fokus penelitian ini ditekankan pada aspek keamanan. Dalam penelitian ini, perangkat lunak OWASP digunakan sebagai alat uji. Kemudian, evaluasi dan analisis dilakukan terhadap kerentanan website terhadap serangan. Akhirnya, dengan menggunakan teknik Multiple Attribute Decision Making dengan metode Simple Additive Weighting dilakukan proses pemeringkatan kerentanan terhadap lima website universitas negeri di Provinsi Aceh. Hasil pengujian menunjukkan bahwa potensi kerentanan yang paling tinggi terjadi pada Universitas-2 dengan nilai rata-rata kerentanan, 1,72. Kerentanan ini menunjukkan adanya celah keamanan ini yang harus segera diperbaiki segera agar informasi yang tersedia menjadi akurat.Kata kunci: Website, OWASP, MADM, SAW, KerentananABSTRACTAt the university, the website is built as a window of electronic information that provides information about higher education. However, the existence of security holes on the website has the potential to be exploited for criminal information technology. Based on this issue, the focus of this research is emphasized on the security aspect. In this study, OWASP software is used as a test tool. Then, the evaluation and analysis carried out against the vulnerability of the website against the attack. Finally, using the Multiple Attribute Decision Making technique using the Simple Additive Weighting method, vulnerability rating was made to five public university websites in Aceh Province. The test results show that the highest vulnerability potential occurs at University-2 with an average vulnerability score of 1.72. This vulnerability indicates a security hole that needs to be fixed immediatelyso that the information available becomes accurate. Keywords: Website, OWASP, MADM, SAW, Vulnerability
Penerapan Metode Naïve Bayes pada Honeypot Dionaea dalam Mendeteksi Serangan Port Scanning NURILAHI, DESI KURNIA; MUNADI, RIZAL; SYAHRIAL, SYAHRIAL; BAHRI, AL
ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika Vol 10, No 2: Published April 2022
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/elkomika.v10i2.309

Abstract

ABSTRAKPeningkatan serangan terhadap jaringan komputer terus terjadi setiap tahunnya dan dampaknya membuat layanan menjadi terganggu. Pada Penelitian ini Dionaea Honeypot yang merupakan jenis Low Interaction Honeypot, diterapkan untuk mengevaluasi serangan yang terjadi berdasarkan teknik serangan Port Scanning. Data Log yang diperoleh dari pengujian, dianalisis dengan metode Naïve Bayes. Lebih lanjut, data pemetaan Port Scanning dengan menggunakan perangkat lunak Nmap, ditemukan port yang terbuka sebanyak 359 data. Hasil uji klasifikasi dengan menggunakan perangkat lunak WEKA dan penerapan metode Naïve Bayes. Hasil uji klasifikasi diperoleh nilai akurasi sebesar 86,2% dengan nilai rata-rata Precision sebesar 0,885%, Recall sebesar 0,862% dan F-measure sebesar 0,849%. Hasil ini menunjukkan penerapan metode Naïve Bayes berhasil mengklasifikasikan potensi serangan yang dilakukan berdasarkan teknik Port Scanning.Kata kunci: Jaringan Komputer, Low Interaction Honeypot, Port Scanning, Uji Klasifikasi, Akurasi ABSTRACTIncreasing attacks on computer networks continue to occur every year, and the impact makes services disrupted. In this study, Dionaea Honeypot, a type of Low Interaction Honeypot, is applied to evaluate attacks based on the Port Scanning attack technique. Log data obtained from the test were analyzed using the Naïve Bayes method. Furthermore, Port Scanning mapping data using Nmap software on the network found 359 open ports data. The results of the classification test using WEKA software and the application of the Naïve Bayes method. The classification test results obtained are accuracy value, 86.2% with an average value of 0.885% Precision, 0.862% Recall and 0.849% F-measure. This result shows that the application of the Naïve Bayes method has succeeded in classifying potential attacks based on the Port Scanning technique.Keywords: Computer Network, Low Interaction Honeypot, Port Scanning, Classification Test, Accuracy
Perencanaan Balai Pengajian TPA An Nur di Desa Lambada Peukan, Kecamatan Darussalam, Kabupaten Aceh Besar Fuady, Mirza; Ridwan, Nasrullah; Buraida, Buraida; Munadi, Rizal
PESARE: Jurnal Pengabdian Sains dan Rekayasa Vol 2, No 3 (2024): Oktober 2024
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24815/pesare.v2i3.41531

Abstract

Community service activities in the form of Planning for the Taman Pendidikan Alquran (TPA) An-Nur Study Center, aim to provide TPA supporting facility planning services by making drawings of the study center plan and cost budget plan for the implementation of its construction. The target audience in this community service activity is the manager of the TPA An-Nur in Lambada Peukan Village. The stage of data collection for planning begins with an interview on the needs of facilities and observation of the introduction of existing conditions at the planning site. The interview method is used to obtain information on the condition of existing facilities and the needs of facilities needed for the future. Furthermore, the data collected is processed into concepts and plan drawings. Meanwhile, in the final stage, a cost budget plan is made for the implementation of the planned facility construction. The benefits obtained from this community service activity are the production of a drawing document of the plan of the TPA An-Nur Study Center and a budget plan for its construction costs, making it easier for managers to follow up on the construction stage of the TPA An-Nur facility.